


default search action
Journal of Computer Science and Technology, Volume 23
Volume 23, Number 1, January 2008
- Xiaodong Li

, Wenjian Luo, Xin Yao
:
Preface. 1 - Xiaomin Hu, Jun Zhang

, Yun Li
:
Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems. 2-18 - Ehab Zaki Elfeky

, Ruhul A. Sarker
, Daryl Essam
:
Analyzing the Simple Ranking and Selection Process for Constrained Evolutionary Optimization. 19-34 - Nan Ding, Shude Zhou, Zengqi Sun:

Histogram-Based Estimation of Distribution Algorithm: A Competent Method for Continuous Optimization. 35-43 - Lam Thu Bui

, Kalyanmoy Deb, Hussein A. Abbass
, Daryl Essam
:
Interleaving Guidance in Evolutionary Multi-Objective Optimization. 44-63 - Grant Dick, Peter A. Whigham:

Spatially-Structured Sharing Technique for Multimodal Problems. 64-76 - Daniel Kunkle, Donghui Zhang, Gene Cooperman:

Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy. 77-102 - Zhenhua Huang, Jiankui Guo, Sheng-Li Sun, Wei Wang:

Efficient Optimization of Multiple Subspace Skyline Queries. 103-111 - Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu:

Clustering Text Data Streams. 112-128 - Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:

Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. 129-140 - Han-Xin Sun, Kun-Peng Yang, Yulai Zhao, Dong Tong, Xu Cheng:

CASA: A New IFU Architecture for Power-Efficient Instruction Cache and TLB Designs. 141-153 - Chengdong Jiang, Guo-Liang Chen:

Double Barrier Coverage in Dense Sensor Networks. 154-165
Volume 23, Number 2, March 2008
- Sheng Zhong, Rui Xue:

Preface. 165 - Rui Xue, Ninghui Li, Jiangtao Li:

Algebraic Construction for Zero-Knowledge Sets. 166-175 - Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki:

WWW Business Applications Based on the Cellular Model. 176-187 - Grigorios Loukides, Jianhua Shao:

An Efficient Clustering Algorithm for k -Anonymisation. 188-202 - Chun-Lin Xin, Wei-Min Ma, Lei Yang:

Competitive Analysis of Two Special Online Device Replacement Problems. 203-213 - Baodong Qin, Ming Li, Fanyu Kong:

Cryptanalysis of a Type of CRT-Based RSA Algorithms. 214-221 - Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guosheng Zhao:

WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization. 222-230 - Bo Chen, Hui He, Jun Guo:

Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis. 231-239 - Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:

Generic Transformation from Weakly to Strongly Unforgeable Signatures. 240-252 - Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin:

New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. 253-264 - Shengli Liu, Xiaofeng Chen, Fangguo Zhang

:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. 265-269 - Yanli Liu, Jin Wang, Xi Chen, Yanwen Guo, Qunsheng Peng:

A Robust and Fast Non-Local Means Algorithm for Image Denoising. 270-279 - Yueh-Yi Lai, Wen-Kai Tai:

Transition Texture Synthesis. 280-289 - Jia Li, Liyong Shen

, Xiao-Shan Gao:
Proper Reparametrization of Rational Ruled Surface. 290-297 - Zusong Li, Dandan Huan, Weiwu Hu, Zhimin Tang:

Chip Multithreaded Consistency Model. 298-305
Volume 23, Number 3, May 2008
- Miaomiao Wang, Jiannong Cao

, Jing Li, Sajal K. Das:
Middleware for Wireless Sensor Networks: A Survey. 305-326 - Jie Wu, Shuhui Yang:

SmallWorld Model-Based Polylogarithmic Routing Using Mobile Nodes. 327-342 - Vaishali P. Sadaphal, Bijendra N. Jain:

Random and Periodic Sleep Schedules for Target Detection in Sensor Networks. 343-354 - Xiaolin Li, Jiannong Cao

:
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications. 355-364 - Kan Cai, Michael J. Feeley, Brendan Cully, Sharath J. George:

Understanding Performance for Two 802.11 Competing Flows. 365-376 - Fereshteh Amini

, Moazzam Khan, Jelena V. Misic, Hossein Pourreza:
Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange. 377-388 - Vasileios Karyotis

, Anastasios Kakalis, Symeon Papavassiliou:
Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. 389-399 - Michele Garetto

, Marco Gribaudo
, Carla-Fabiana Chiasserini
, Emilio Leonardi
:
Sensor Deployment and Relocation: A Unified Scheme. 400-412 - Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal:

ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks. 413-425 - Feng Lu, Liang-Tien Chia, Kok-Leong Tay, Wai-Hoe Chong:

NBgossip: An Energy-Efficient Gossip Algorithm for Wireless Sensor Networks. 426-437 - Juan A. Sánchez, Rafael Marín-Pérez

, Pedro M. Ruiz:
Beacon-Less Geographic Routing in Real Wireless Sensor Networks. 438-450 - François Ingelrest, David Simplot-Ryl:

Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions. 451-460 - Jaime Lloret, Miguel Garcia

, Jesús Tomás, Fernando Boronat
:
GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks. 461-480
Volume 23, Number 4, July 2008
- Haixun Wang, Jian Pei

:
Clustering by Pattern Similarity. 481-496 - Lu-An Tang, Bin Cui

, Hongyan Li, Gaoshan Miao, Dongqing Yang, Xinbiao Zhou:
PGG: An Online Pattern Based Approach for Stream Variation Management. 497-515 - Byron Choi, Gao Cong

, Wenfei Fan
, Stratis Viglas:
Updating Recursive XML Views of Relations. 516-537 - Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen

, Xiaoyang Sean Wang, Xuemin Lin:
Continually Answering Constraint k - NN Queries in Unstructured P2P Systems. 538-556 - Xian Zhang

, Yu Hao, Xiaoyan Zhu, Ming Li:
New Information Distance Measure and Its Application in Question Answering System. 557-572 - Loris Nanni, Alessandra Lumini

:
Cluster-Based Nearest-Neighbour Classifier and Its Application on the Lightning Classification. 573-581 - Xiaoyong Fang, Zhigang Luo, Zhenghua Wang:

Predicting RNA Secondary Structure Using Profile Stochastic Context-Free Grammars and Phylogenic Analysis. 582-589 - Hao Lang, Bin Wang, Gareth J. F. Jones

, Jin-Tao Li, Fan Ding, Yi-Xuan Liu:
Query Performance Prediction for Information Retrieval Based on Covering Topic Score. 590-601 - Xu Sun, Houfeng Wang, Bo Wang:

Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression. 602-611 - Hai Zhao, Chunyu Kit

:
Scaling Conditional Random Fields by One-Against-the-Other Decomposition. 612-619 - Weiwu Hu, Jian Wang:

Making Effective Decisions in Computer Architects' Real-World: Lessons and Experiences with Godson-2 Processor Designs. 620-632 - Qiong Zou, Xiao-Feng Li, Long-Bing Zhang:

Runtime Engine for Dynamic Profile Guided Stride Prefetching. 633-643 - Jigang Wu, Thambipillai Srikanthan, Guang-Wei Zou:

New Model and Algorithm for Hardware/Software Partitioning. 644-651 - Tiziana Calamoneri

, Saverio Caminiti, Rossella Petreschi:
A General Approach to L ( h, k )-Label Interconnection Networks. 652-659 - Renyi Xiao:

Survey on Anonymity in Unstructured Peer-to-Peer Systems. 660-671 - Nan Du, Bai Wang, Bin Wu:

Community Detection in Complex Networks. 672-683 - Youjian Zhao, Zuhui Yue, Jianping Wu:

Research on Next-Generation Scalable Routers Implemented with H-Torus Topology. 684-693
Volume 23, Number 5, September 2008
- Markus Hinkelmann, Andreas Jakoby, Peer Stechert:

t-Private and t-Secure Auctions. 694-710 - Bing Yang, Jing Chen, Enyue Lu, Si-Qing Zheng:

Design and Performance Evaluation of Sequence Partition Algorithms. 711-718 - Avraham Trakhtman:

Some Aspects of Synchronization of DFA. 719-727 - Xuehou Tan, Bo Jiang:

Searching a Polygonal Region by Two Guards. 728-739 - Wei-Lin Li, Peng Zhang, Daming Zhu:

On Constrained Facility Location Problems. 740-748 - Florian Diedrich, Rolf Harren, Klaus Jansen, Ralf Thöle, Henning Thomas:

Approximation Algorithms for 3D Orthogonal Knapsack. 749-762 - Jianxin Wang, Xiaoshuang Xu, Jianer Chen:

Approximation Algorithm Based on Chain Implication for Constrained Minimum Vertex Covers in Bipartite Graphs. 763-768 - Weiming Wang, Ligang Dong, Bin Zhuge:

Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation. 769-779 - Shaoliang Peng

, Shanshan Li, Lei Chen
, Yuxing Peng, Nong Xiao:
Scalable Base-Station Model-Based Multicast in Wireless Sensor Networks. 780-791 - Dong-nian Cheng, Yuxiang Hu, Cai-xia Liu:

Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability. 792-805 - Lizhong Dai, Dongmei Zhao:

Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks. 806-814 - Pisai Setthawong, Surat Tanterdtid:

Flood Avoidance Mechanisms for Bridged Resilient Packet Rings. 815-824 - Jun-Wu Dong, Dingyi Pei, Xue-Li Wang:

A Class of Key Predistribution Schemes Based on Orthogonal Arrays. 825-831 - Haibo Tian, Willy Susilo

, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. 832-842 - Zhixiong Chen, Shengqiang Li:

Some Notes on Generalized Cyclotomic Sequences of Length pq. 843-850 - Murat Ekinci, Murat Aykut

:
Palmprint Recognition by Applying Wavelet-Based Kernel PCA. 851-861 - Gang Xu

, Guozhao Wang, Xiao-Diao Chen:
Free-Form Deformation with Rational DMS-Spline Volumes. 862-873 - Kangwoo Lee:

Guiding Attention by Cooperative Cues. 874-884
Volume 23, Number 6, November 2008
- Jian Yu

, Yanbo Han, Jun Han, Yan Jin, Paolo Falcarin
, Maurizio Morisio:
Synthesizing Service Composition Models on the Basis of Temporal Business Rules. 885-894 - Gang Huang, Lianshan Sun:

An Access Control Framework for Reflective Middleware. 895-904 - Hua-Ming Liao, Guo-Shun Pei:

Cache-Based Aggregate Query Shipping: An Efficient Scheme of Distributed OLAP Query Processing. 905-915 - Yong Xi, Kewei Sha

, Weisong Shi, Loren Schwiebert
, Tao Zhang:
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. 916-928 - Donggeon Noh

, Heonshik Shin:
URECA: Efficient Resource Location Middleware for Ubiquitous Environment. 929-943 - Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao

:
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks. 944-956 - Yongxuan Lai, Yilong Chen, Hong Chen:

PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks. 957-972 - Hong Shen, Yu Zhang:

Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows. 973-987 - Jianhua Feng, Guoliang Li, Na Ta:

A Semantic Cache Framework for Secure XML Queries. 988-997 - Nan Chen, Lidan Shou, Gang Chen, Jinxiang Dong:

Adaptive Indexing of Moving Objects with Highly Variable Update Frequencies. 998-1014 - Bailin Yang, Frederick W. B. Li

, Zhigeng Pan, Xun Wang:
An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks. 1015-1025 - Chandrajit L. Bajaj, Guoliang Xu, Qin Zhang:

Higher-Order Level-Set Method and Its Application in Biomolecular Surfaces Construction. 1026-1036 - Da Wang, Yu Hu, Huawei Li

, Xiaowei Li:
Design-for-Testability Features and Test Implementation of a Giga Hertz General Purpose Microprocessor. 1037-1046

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














