


default search action
Frontiers of Computer Science, Volume 8
Volume 8, Number 1, February 2014
- Yuanjie Si, Jun Sun

, Yang Liu
, Jin Song Dong, Jun Pang, Shao Jie Zhang, Xiaohu Yang:
Model checking with fairness assumptions using PAT. 1-16 - Changpeng Zhu, Yinliang Zhao, Bo Han, Qinghua Zeng, Ying Ma:

Runtime support for type-safe and context-based behavior adaptation. 17-32 - Cuiyun Hu, XinJun Mao, Mengjun Li, Zhi Zhu:

Organization-based agent-oriented programming: model, mechanisms, and language. 33-51 - Qiang Sun, Yuting Chen, Jianjun Zhao:

A constraint-weaving approach to points-to analysis for AspectJ. 52-68 - Tao Wang, Huaimin Wang, Gang Yin, Charles X. Ling, Xiao Li, Peng Zou:

Tag recommendation for open source software. 69-82 - Yaobin He, Haoyu Tan, Wuman Luo, Shengzhong Feng, Jianping Fan:

MR-DBSCAN: a scalable MapReduce-based DBSCAN algorithm for heavily skewed data. 83-99 - Jamal Yousaf, Juanzi Li, Lu Chen, Jie Tang, Xiaowen Dai:

Generalized multipath planning model for ride-sharing systems. 100-118 - Heng Chen, Hai Jin, Feng Zhao:

PSG: a two-layer graph model for document summarization. 119-130 - Ke Lu, Peiquan Jin, Puyuan Yang, Shouhong Wan, Lihua Yue:

Adaptive in-page logging for flash-memory storage systems. 131-144 - Li Cui:

SWVFS: a saliency weighted visual feature similarity metric for image quality assessment. 145-155 - Hong Song, Qingjie Zhao, Yinghong Liu:

Splitting touching cells based on concave-point and improved watershed algorithms. 156-162 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:

Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. 163-173
Volume 8, Number 2, April 2014
- Bin Lin, Shanshan Li, Xiangke Liao, Jing Zhang, Xiaodong Liu:

Leach: an automatic learning cache for inline primary deduplication system. 175-183 - Wei Li, Yuefei Sui:

A sound and complete R-calculi with respect to contraction and minimal change. 184-191 - Wang Lin, Min Wu, Zhengfeng Yang

, Zhenbing Zeng:
Proving total correctness and generating preconditions for loop programs via symbolic-numeric computation methods. 192-202 - Wenzhong Guo, Genggeng Liu

, Guolong Chen, Shaojun Peng:
A hybrid multi-objective PSO algorithm with local search strategy for VLSI partitioning. 203-216 - Ali Khazaee

, Ataollah Ebrahimzadeh:
ECG beat classification using particle swarm optimization and support vector machine. 217-231 - Shangfei Wang, Shan He, Yue Wu, Menghua He, Qiang Ji:

Fusion of visible and thermal images for facial expression recognition. 232-242 - Yin Lu, Fuxiang Wang, Xiaoyan Luo, Feng Liu:

Novel infrared and visible image fusion method based on independent component analysis. 243-254 - Chaoqun Li, Liangxiao Jiang

, Hongwei Li:
Naive Bayes for value difference metric. 255-264 - Weiyi Liu, Kun Yue, Hui Liu, Ping Zhang, Suiye Liu, Qianyi Wang:

Associative categorization of frequent patterns based on the probabilistic graphical model. 265-278 - Qingliang Miao, Qiudan Li, Daniel Zeng, Yao Meng, Shu Zhang, Hao Yu:

Entity attribute discovery and clustering from online reviews. 279-288 - Yuan Guan, Shimin Cai

, Mingsheng Shang
:
Recommendation algorithm based on item quality and user rating preferences. 289-297 - Jiansu Pu, Siyuan Liu, Panpan Xu, Huamin Qu, Lionel M. Ni:

MViewer: mobile phone spatiotemporal data viewer. 298-315 - Kuifei Yu, Hengshu Zhu

, Huanhuan Cao, Baoxian Zhang, Enhong Chen, Jilei Tian, Jinghai Rao:
Learning to detect subway arrivals for passengers on a train. 316-329 - Lili Wang, Qinglin Qi

, Yi Chen, Wei Ke
, Aimin Hao:
Interactive texture design and synthesis from mesh sketches. 330-341
Volume 8, Number 3, June 2014
- Xiangke Liao:

MilkyWay-2: back to the world Top 1. 343-344 - Xiangke Liao, Liquan Xiao

, Canqun Yang, Yutong Lu:
MilkyWay-2 supercomputer: system and application. 345-356 - Zhengbin Pang, Min Xie, Jun Zhang, Yi Zheng, Guibin Wang, Dezun Dong, Guang Suo:

The TH Express high performance interconnect networks. 357-366 - Weixia Xu, Yutong Lu, Qiong Li, Enqiang Zhou, Zhenlong Song, Yong Dong, Wei Zhang, Dengping Wei, Xiaoming Zhang, Haitao Chen, Jianying Xing, Yuan Yuan:

Hybrid hierarchy storage system in MilkyWay-2 supercomputer. 367-377 - Kai Lu, Xiaoping Wang, Gen Li, Ruibo Wang, Wanqing Chi, Yongpeng Liu, Hong-Wei Tang, Hua Feng, Yinghui Gao:

Iaso: an autonomous fault-tolerant management system for supercomputers. 378-390 - Najme Mansouri:

Network and data location aware approach for simultaneous job scheduling and data replication in large-scale data grid environments. 391-408 - Lei Xie

, Sanglu Lu, Yingchun Cao, Daoxu Chen:
Towards energy-efficient storage placement in large scale sensor networks. 409-425 - Jingyuan Wang, Jiangtao Wen, Yuxing Han, Jun Zhang, Chao Li, Zhang Xiong:

Achieving high throughput and TCP Reno fairness in delay-based TCP over large networks. 426-439 - Yanfei Lv, Bin Cui

, Xuexuan Chen, Jing Li:
HAT: an efficient buffer management method for flash-based hybrid storage systems. 440-455 - Mingwu Zhang, Yi Mu:

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. 456-468 - Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. 469-477 - Chang-Ai Sun, Zuoyi Wang, Guan Wang:

A property-based testing framework for encryption programs. 478-489 - Haibo Tian, Jin Li:

A short non-delegatable strong designated verifier signature. 490-502 - Solomon Guadie Worku, Chunxiang Xu, Jining Zhao:

Cloud data auditing with designated verifier. 503-512 - Le Dong, Wenling Wu, Shuang Wu, Jian Zou:

Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. 513-525
Volume 8, Number 4, August 2014
- Jianjun Yang, Yunhai Tong, Zitian Wang, Shaohua Tan:

Efficient and effective Bayesian network local structure learning. 527-536 - Hebah ElGibreen

, Mehmet Sabih Aksoy:
RULES-IT: incremental transfer learning with RULES family. 537-562 - Min Xu, Hisao Ishibuchi

, Xin Gu, Shitong Wang:
Dm-KDE: dynamical kernel density estimation by sequences of KDE estimators with fixed number of components over data streams. 563-580 - Lu Liu, Tao Peng:

Clustering-based topical Web crawling using CFu-tree guided by link-context. 581-595 - Xiaodong Li, Xiaotie Deng

, Shanfeng Zhu, Feng Wang, Haoran Xie
:
An intelligent market making strategy in algorithmic trading. 596-608 - Shangfei Wang, Menghua He, Zhen Gao, Shan He, Qiang Ji:

Emotion recognition from thermal infrared images using deep Boltzmann machine. 609-618 - Omar S. Al-Kadi

, Osama Al-Kadi
, Rizik M. H. Al-Sayyed
, Ja'far Alqatawna
:
Road scene analysis for determination of road traffic density. 619-628 - Ruiji Fu, Bing Qin

, Ting Liu:
Generating Chinese named entity data from parallel corpora. 629-641 - Ruochen Liu, Chenlin Ma, Fei He, Wenping Ma, Licheng Jiao

:
Reference direction based immune clone algorithm for many-objective optimization. 642-655 - Wenbo Shi, Neeraj Kumar

, Peng Gong, Zezhong Zhang:
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. 656-666 - Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:

A lattice-based signcryption scheme without random oracles. 667-675 - Peng Zhang:

Unbalanced graph cuts with minimum capacity. 676-683 - Yuyue Du, Yuhui Ning:

Property analysis of logic Petri nets by marking reachability graphs. 684-692 - Yingsheng Ji

, Yingzhuo Zhang, Guangwen Yang:
Interpolation oriented parallel communication to optimize coupling in earth system modeling. 693-708
Volume 8, Number 5, October 2014
- Qin Li, Yongxin Zhao, Huibiao Zhu, Jifeng He:

A UTP semantic model for Orc language with execution status and fault handling. 709-725 - Yan Zhang, Dunwei Gong:

Generating test data for both paths coverage and faults detection using genetic algorithms: multi-path case. 726-740 - Pushpinder Singh

:
Some new distance measures for type-2 fuzzy sets and distance measure based ranking for group decision making problems. 741-752 - Zaiyue Zhang, Xibei Yang:

Tolerance-based multigranulation rough sets in incomplete systems. 753-762 - Yunping Zheng, Mudar Sarem:

A novel binary image representation algorithm by using NAM and coordinate encoding procedure and its application to area calculation. 763-772 - Wenjie Cai, Seiichi Uchida

, Hiroaki Sakoe:
Comparative performance analysis of stroke correspondence search methods for stroke-order free online multi-stroke character recognition. 773-784 - Leilei Yang, Songcan Chen:

Linear discriminant analysis with worst between-class separation and average within-class compactness. 785-792 - Xu Yu, Jing Yang, Zhiqiang Xie:

Training SVMs on a bound vectors set based on Fisher projection. 793-806 - Zhisong Pan, Zhantao Deng, Yibing Wang, Yanyan Zhang:

Dimensionality reduction via kernel sparse representation. 807-815 - Xiaojian Zhang

, Xiaofeng Meng:
Discovering top-k patterns with differential privacy-an accurate approach. 816-827 - Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:

Lattice-based certificateless encryption scheme. 828-836 - Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:

Key-insulated aggregate signature. 837-846 - Jong-Hyuk Lee, SungJin Choi, Joon-Min Gil, Taeweon Suh, Heon-Chang Yu

:
A scheduling algorithm with dynamic properties in mobile grid. 847-857
Volume 8, Number 6, December 2014
- Huijui Wang, Furong Li, Xuan Zhou, Yu Cao, Xiongpai Qin, Jidong Chen, Shan Wang:

HC-Store: putting MapReduce's foot in two camps. 859-871 - Yu Zhang, Xiaofei Liao, Hai Jin, Li Lin, Feng Lu:

An adaptive switching scheme for iterative computing in the cloud. 872-884 - Yuqing Lan, Hao Xu:

Research on technology of desktop virtualization based on SPICE protocol and its improvement solutions. 885-892 - Hongpeng Yin, Jinxing Li, Yi Chai

, Simon X. Yang
:
A survey on distributed compressed sensing: theory and applications. 893-904 - Qiang Li, Yahong Han, Jianwu Dang:

Image decomposing for inpainting using compressed sensing in DCT domain. 905-915 - Tusar Kanti Mishra

, Banshidhar Majhi, Pankaj Kumar Sa, Sandeep Panda:
Model based odia numeral recognition using fuzzy aggregated features. 916-922 - Xian-Fa Cai, Guihua Wen, Jia Wei, Zhiwen Yu:

Relative manifold based semi-supervised dimensionality reduction. 923-932 - Djamal Ziani:

Feature selection on probabilistic symbolic objects. 933-947 - Yongyi Yan, Zengqiang Chen, Zhongxin Liu

:
Semi-tensor product of matrices approach to reachability of finite automata with application to language recognition. 948-957 - Xiaoxiao Yang, Yu Zhang, Ming Fu, Xinyu Feng:

A temporal programming model with atomic blocks based on projection temporal logic. 958-976 - Xiang Qiu, Li Zhang:

Specifying redundancy tactics as crosscutting concerns using aspect-oriented modeling. 977-995 - Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:

Detection of semantically similar code. 996-1011 - Xixiang Lv, Hui Li:

Error- and loss-tolerant bundle fragment authentication for space DTNs. 1012-1023 - Weiliang Wang, Yangyu Fan, Ruihu Li

:
Optimal binary codes and binary construction of quantum codes. 1024-1031

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














