


default search action
Journal of Computer Science and Technology, Volume 22
Volume 22, Number 1, January 2007
- Weiwu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu:

Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology. 1-14 - Yulai Zhao, Xianfeng Li, Dong Tong, Xu Cheng:

An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking. 15-24 - Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang:

A 485ps 64-Bit Parallel Adder in 0.18mum CMOS. 25-27 - Chiou-Yng Lee

, Yung-Hui Chen, Che Wun Chiou, Jim-Min Lin:
Unified Parallel Systolic Multiplier Over GF(2m). 28-38 - Zhi-Hong Tao, Conghua Zhou, Zhong Chen, Lifu Wang:

Bounded Model Checking of CTL. 39-43 - Dong-Xi Liu:

CSchema: A Downgrading Policy Language for XML Access Control. 44-53 - Ying-Han Pang

, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Two-Factor Cancelable Biometrics Authenticator. 54-59 - Issam W. Damaj:

Higher-Level Hardware Synthesis of the KASUMI Algorithm. 60-70 - Xinyi Huang, Willy Susilo

, Yi Mu, Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. 71-74 - Haixia Xu, Bao Li:

Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme. 75-78 - Jie Liang, Xuejia Lai:

Improved Collision Attack on Hash Function MD5. 79-87 - Yonglong Luo, Liusheng Huang, Hong Zhong:

Secure Two-Party Point-Circle Inclusion Problem. 88-91 - Duo Liu, Ping Luo, Yiqi Dai:

Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. 92-94 - Haibo Tian, Xi Sun, Yumin Wang:

A New Public-Key Encryption Scheme. 95-102 - Zhenchuan Chai, Zhenfu Cao

, Yuan Zhou:
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. 103-108 - Wei Gao, Xueli Wang, Dongqing Xie:

Chameleon Hashes Without Key Exposure Based on Factoring. 109-113 - Min Liu, Zhongcheng Li, Xiao-Bing Guo:

An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN. 114-120 - Jing Zhou, David De Roure

:
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System. 121-130 - Kwangjin Park, Hyunseung Choo, Chong-Sun Hwang:

An Efficient Data Dissemination Scheme for Spatial Query Processing. 131-134 - Yong Liao, Xudong Chen, Guangze Xiong, Qingxin Zhu, Nan Sang:

End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems. 135-146 - Han-Bing Yan, Shi-Min Hu, Ralph R. Martin:

3D Morphing Using Strain Field Interpolation. 147-155 - Wen Zheng, Jun-Hai Yong, Jean-Claude Paul:

Visual Simulation of Multiple Unmixable Fluids. 156-160 - Sheng-You Lin, Jiao-Ying Shi:

A Markov Random Field Model-Based Approach to Natural Image Matting. 161-167
Volume 22, Number 2, March 2007
- Changxuan Wan, Xiping Liu

:
Structural Join and Staircase Join Algorithms of Sibling Relationship. 171-181 - Donghong Han, Guoren Wang, Chuan Xiao

, Rui Zhou
:
Load Shedding for Window Joins over Streams. 182-189 - Xiaobo Fan, Ting-Ting Xie, Cuiping Li, Hong Chen:

MRST - An Efficient Monitoring Technology of Summarization on Stream Data. 190-196 - Jun Zhang, Zhaohui Peng, Shan Wang, Huijing Nie:

CLASCN: Candidate Network Selection for Efficient Top- k Keyword Queries over Databases. 197-207 - Yi Zhuang, Yueting Zhuang, Fei Wu:

Composite Distance Transformation for Indexing and k -Nearest-Neighbor Searching in High-Dimensional Spaces. 208-217 - Qiang Liu, Tao Huang, Shaohua Liu, Hua Zhong:

An Ontology-Based Approach for Semantic Conflict Resolution in Database Integration. 218-227 - Tao-Yuan Cheng, Shan Wang:

A Novel Approach to Clustering Merchandise Records. 228-231 - Yunjun Gao, Chun Li, Gencai Chen, Ling Chen, Xianta Jiang, Chun Chen:

Efficient k -Nearest-Neighbor Search Algorithms for Historical Moving Object Trajectories. 232-244 - Ji-Dong Chen, Xiao-Feng Meng:

Indexing Future Trajectories of Moving Objects in a Constrained Network. 245-251 - Hongding Wang, Yunhai Tong, Shaohua Tan, Shi-Wei Tang, Dongqing Yang, Guohui Sun:

An Adaptive Approach to Schema Classification for Data Warehouse Modeling. 252-260 - Yuhai Zhao, Guoren Wang, Ying Yin, Guangyu Xu:

A Novel Approach to Revealing Positive and Negative Co-Regulated Genes. 261-272 - Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:

Efficient Execution of Multiple Queries on Deep Memory Hierarchy. 273-279 - Chaokun Wang, Jianmin Wang

, Jia-Guang Sun, Shengfei Shi
, Hong Gao:
AbIx: An Approach to Content-Based Approximate Query Processing in Peer-to-Peer Data Systems. 280-286 - Unil Yun:

Analyzing Sequential Patterns in Retail Databases. 287-296 - Min Zhao, Suqing Han, Jue Wang:

Tree Expressions for Information Systems. 297-307 - Changle Zhou, Yun Yang, Xiaoxi Huang:

Computational Mechanisms for Metaphor in Languages: A Survey. 308-319 - Bo Yang, Dayou Liu:

A Heuristic Clustering Algorithm for Mining Communities in Signed Networks. 320-328 - Huixuan Tang, Hui Wei:

A Coarse-to-Fine Method for Shape Recognition. 330-334 - Shizhu Liu, Heping Hu:

Text Classification Using Sentential Frequent Itemsets. 334-337
Volume 22, Number 3, May 2007
- Giuseppe Lami

, Robert W. Ferguson:
An Empirical Study on the Impact of Automation on the Requirements Analysis Process. 338-347 - Pierre Bourque, Serge Oligny, Alain Abran

, Bertrand Fournier:
Developing Project Duration Models in Software Engineering. 348-357 - Nelly Condori-Fernández

, Silvia Abrahão
, Oscar Pastor
:
On the Estimation of the Functional Size of Software from Requirements Specifications. 358-370 - Juan Jose Cuadrado-Gallego, Daniel Rodríguez, Miguel-Ángel Sicilia

, Miguel Garre, Ángel García-Crespo:
Software Project Effort Estimation Based on Multiple Parametric Models Generated Through Data Clustering. 371-378 - Liguo Yu, Srini Ramaswamy:

Component Dependency in Object-Oriented Software. 379-386 - Taghi M. Khoshgoftaar, Pierre Rebours:

Improving Software Quality Prediction by Noise Filtering Techniques. 387-396 - Piotr Tomaszewski

, Lars Lundberg, Håkan Grahn
:
Improving Fault Detection in Modified Code - A Study from the Telecommunication Industry. 397-409 - Chong-Yi Yuan, Wen Zhao, Shikun Zhang, Yu Huang:

A Three-Layer Model for Business Processes - Process Logic, Case Semantics and Workflow Management. 410-425 - Chunxiao Lin, Yiyun Chen, Long Li, Bei Hua:

Garbage Collector Verification for Proof-Carrying Code. 426-437 - Xiaolan Joy Zhang, Brian King:

An Anti-Counterfeiting RFID Privacy Protection Protocol. 438-448 - Wenling Wu, Wentao Zhang, Dengguo Feng:

Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. 449-456 - Xinli Huang, Futai Zou, Fan-Yuan Ma:

Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. 457-468 - Xiao-Li Huang, Chuan-Kun Wu:

Cryptanalysis of Achterbahn-Version 1 and -Version 2. 469-475 - Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song:

Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. 476-480 - Enjian Bai, Xiaojuan Liu:

Some Notes on Prime-Square Sequences. 481-486 - Chang-Ji Wang, Yong Tang, Qin Li

:
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. 487-493 - (Withdrawn) Edge-Oriented Spatial Interpolation for Error Concealment of Consecutive Blocks. 494-497

Volume 22, Number 4, July 2007
- Zhiyuan Li:

Simultaneous Minimization of Capacity and Conflict Misses. 497-504 - Youcef Derbal:

A Model of Grid Service Capacity. 505-514 - Jung-Hoon Lee:

Next High Performance and Low Power Flash Memory Package Structure. 515-520 - Jun Yao, Jiwu Shu, Weimin Zheng:

Distributed Storage Cluster Design for Remote Mirroring Based on Storage Area Network. 521-526 - Jian-Hui Huang, Depei Qian, Shengling Wang:

Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network. 527-531 - Minghui Jiang, Joel Gillespie

:
Engineering the Divide-and-Conquer Closest Pair Algorithm. 532-540 - Yuyan Chao, Lifeng He, Tsuyoshi Nakamura, Zhenghao Shi, Kenji Suzuki

, Hidenori Itoh:
An Improvement of Herbrand's Theorem and Its Application to Model Generation Theorem Proving. 541-553 - Yisong Wang, Mingyi Zhang, Yu-Ping Shen:

Consistency Property of Finite FC-Normal Logic Programs. 554-561 - Xi-Shun Zhao, Yu-Ping Shen:

Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction. 562-568 - Jing-Fa Liu, Wen-Qi Huang:

Quasi-Physical Algorithm of an Off-Lattice Model for Protein Folding Problem. 569-574 - Xiaoju Dong, Yuxi Fu:

Barbed Congruence of Asymmetry and Mismatch. 575-579 - Anwar M. Mirza

, Asmatullah Chaudhry, Badre Munir
:
Spatially Adaptive Image Restoration Using Fuzzy Punctual Kriging. 580-589 - Feng Xue

, You-Sheng Zhang, Julang Jiang, Min Hu, Xindong Wu, Ronggui Wang:
Real-Time Texture Synthesis Using s-Tile Set. 590-596 - Gang Xu

, Guozhao Wang:
AHT Bézier Curves and NUAH B-Spline Curves. 597-607 - Jun Zhao, Feifan Liu:

Linguistic Theory Based Contextual Evidence Mining for Statistical Chinese Co-Reference Resolution. 608-617 - Yong-Dong Zhang, Sheng Tang, Jin-Tao Li:

Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. 618-625 - Fengxi Song, David Zhang

, Cai-Kou Chen
, Jing-Yu Yang:
Facial Feature Extraction Method Based on Coefficients of Variances. 626-632 - Xiafen Zhang, Yueting Zhuang, Jiangqin Wu, Fei Wu:

Hierarchical Approximate Matching for Retrieval of Chinese Historical Calligraphy Character. 633-640
Volume 22, Number 5, September 2007
- Xian-He Sun, Surendra Byna

, Yong Chen
:
Server-Based Data Push Architecture for Multi-Processor Environments. 641-652 - Qiang Zhou, Yici Cai, Duo Li, Xianlong Hong:

A Yield-Driven Gridless Router. 653-660 - Kai Liu, Keyan Wang, Yunsong Li, Chengke Wu:

A Novel VLSI Architecture for Real-Time Line-Based Wavelet Transform Using Lifting Scheme. 661-672 - Wei Wang, Yu Hu, Yinhe Han, Xiaowei Li, You-Sheng Zhang:

Leakage Current Optimization Techniques During Test Based on Don't Care Bits Assignment. 673-680 - Ozgur Sinanoglu

:
Low Cost Scan Test by Test Correlation Utilization. 681-694 - Francesc Giné, Francesc Solsona

, Mauricio Hanzich
, Porfidio Hernández
, Emilio Luque
:
Cooperating CoScheduling: A Coscheduling Proposal Aimed at Non-Dedicated Heterogeneous NOWs. 695-710 - Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu:

A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams. 711-724 - Jianhua Feng, Qian Qian, Jianyong Wang, Li-Zhu Zhou:

Efficient Mining of Frequent Closed XML Query Pattern. 725-735 - Jianhua Feng, Yuguo Liao, Yong Zhang:

HCH for Checking Containment of XPath Fragment. 736-748 - Yongwei Miao, Jieqing Feng, Chunxia Xiao, Qunsheng Peng, A. Robin Forrest:

Differentials-Based Segmentation and Parameterization for Point-Sampled Surfaces. 749-760 - Hao-Da Huang, Xin Tong

, Wen-Cheng Wang:
Accelerated Parallel Texture Optimization. 761-769 - Bo Li, Runhai Jiao, Yuancheng Li

:
Fast Adaptive Wavelet for Remote Sensing Image Compression. 770-778 - Pyung-Soo Kim

, Myung-Eui Lee:
A New FIR Filter for State Estimation and Its Application. 779-784
Volume 22, Number 6, November 2007
- Dennis Y. W. Liu

, Joseph K. Liu
, Yi Mu, Willy Susilo
, Duncan S. Wong:
Revocable Ring Signature. 785-794 - Rafiullah Chamlawi

, Asifullah Khan
, Adnan Idris:
Wavelet Based Image Authentication and Recovery. 795-804 - Bo Qin, Qianhong Wu, Willy Susilo

, Yi Mu, Yumin Wang, Zhengtao Jiang:
Short Group Signatures Without Random Oracles. 805-821 - Rong-Hua Li, Chuan-Kun Wu:

A Protocol for a Private Set-Operation. 822-829 - Shengqiang Li, Zhixiong Chen, Xiaotong Fu, Guozhen Xiao:

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length pq. 830-834 - Vincent Le Chevalier, Marc Jaeger, Xing Mei, Paul-Henry Cournède

:
Simulation and Visualisation of Functional Landscapes: Effects of the Water Resource Competition Between Plants. 835-845 - Zhang-Lin Cheng

, Xiaopeng Zhang, Baoquan Chen:
Simple Reconstruction of Tree Branches from a Single Range Image. 846-858 - Jun Teng, Marc Jaeger, Bao-Gang Hu

:
A Fast Ambient Occlusion Method for Real-Time Plant Rendering. 859-866 - Murat Ekinci, Murat Aykut

:
Human Gait Recognition Based on Kernel PCA Using Projections. 867-876 - Chaveevan Pechsiri

, Asanee Kawtrakul:
Mining Causality for Explanation Knowledge from Text. 877-889 - Yu Li, Yongtian Wang, Yue Liu:

Fiducial Marker Based on Projective Invariant for Augmented Reality. 890-897 - Xiao-Dong Wang, Ying-Jie Wu:

An Improved HEAPSORT Algorithm with n log n - 0.788928 n Comparisons in the Worst Case. 898-903 - Heitor Silvério Lopes

, Reginaldo Bitello:
A Differential Evolution Approach for Protein Folding Using a Lattice Model. 904-908 - Yongxi Cheng:

Generating Combinations by Three Basic Operations. 909-913

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














