default search action
Frontiers of Computer Science, Volume 8
Volume 8, Number 1, February 2014
- Yuanjie Si, Jun Sun, Yang Liu, Jin Song Dong, Jun Pang, Shao Jie Zhang, Xiaohu Yang:
Model checking with fairness assumptions using PAT. 1-16 - Changpeng Zhu, Yinliang Zhao, Bo Han, Qinghua Zeng, Ying Ma:
Runtime support for type-safe and context-based behavior adaptation. 17-32 - Cuiyun Hu, XinJun Mao, Mengjun Li, Zhi Zhu:
Organization-based agent-oriented programming: model, mechanisms, and language. 33-51 - Qiang Sun, Yuting Chen, Jianjun Zhao:
A constraint-weaving approach to points-to analysis for AspectJ. 52-68 - Tao Wang, Huaimin Wang, Gang Yin, Charles X. Ling, Xiao Li, Peng Zou:
Tag recommendation for open source software. 69-82 - Yaobin He, Haoyu Tan, Wuman Luo, Shengzhong Feng, Jianping Fan:
MR-DBSCAN: a scalable MapReduce-based DBSCAN algorithm for heavily skewed data. 83-99 - Jamal Yousaf, Juanzi Li, Lu Chen, Jie Tang, Xiaowen Dai:
Generalized multipath planning model for ride-sharing systems. 100-118 - Heng Chen, Hai Jin, Feng Zhao:
PSG: a two-layer graph model for document summarization. 119-130 - Ke Lu, Peiquan Jin, Puyuan Yang, Shouhong Wan, Lihua Yue:
Adaptive in-page logging for flash-memory storage systems. 131-144 - Li Cui:
SWVFS: a saliency weighted visual feature similarity metric for image quality assessment. 145-155 - Hong Song, Qingjie Zhao, Yinghong Liu:
Splitting touching cells based on concave-point and improved watershed algorithms. 156-162 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. 163-173
Volume 8, Number 2, April 2014
- Bin Lin, Shanshan Li, Xiangke Liao, Jing Zhang, Xiaodong Liu:
Leach: an automatic learning cache for inline primary deduplication system. 175-183 - Wei Li, Yuefei Sui:
A sound and complete R-calculi with respect to contraction and minimal change. 184-191 - Wang Lin, Min Wu, Zhengfeng Yang, Zhenbing Zeng:
Proving total correctness and generating preconditions for loop programs via symbolic-numeric computation methods. 192-202 - Wenzhong Guo, Genggeng Liu, Guolong Chen, Shaojun Peng:
A hybrid multi-objective PSO algorithm with local search strategy for VLSI partitioning. 203-216 - Ali Khazaee, Ataollah Ebrahimzadeh:
ECG beat classification using particle swarm optimization and support vector machine. 217-231 - Shangfei Wang, Shan He, Yue Wu, Menghua He, Qiang Ji:
Fusion of visible and thermal images for facial expression recognition. 232-242 - Yin Lu, Fuxiang Wang, Xiaoyan Luo, Feng Liu:
Novel infrared and visible image fusion method based on independent component analysis. 243-254 - Chaoqun Li, Liangxiao Jiang, Hongwei Li:
Naive Bayes for value difference metric. 255-264 - Weiyi Liu, Kun Yue, Hui Liu, Ping Zhang, Suiye Liu, Qianyi Wang:
Associative categorization of frequent patterns based on the probabilistic graphical model. 265-278 - Qingliang Miao, Qiudan Li, Daniel Zeng, Yao Meng, Shu Zhang, Hao Yu:
Entity attribute discovery and clustering from online reviews. 279-288 - Yuan Guan, Shimin Cai, Mingsheng Shang:
Recommendation algorithm based on item quality and user rating preferences. 289-297 - Jiansu Pu, Siyuan Liu, Panpan Xu, Huamin Qu, Lionel M. Ni:
MViewer: mobile phone spatiotemporal data viewer. 298-315 - Kuifei Yu, Hengshu Zhu, Huanhuan Cao, Baoxian Zhang, Enhong Chen, Jilei Tian, Jinghai Rao:
Learning to detect subway arrivals for passengers on a train. 316-329 - Lili Wang, Qinglin Qi, Yi Chen, Wei Ke, Aimin Hao:
Interactive texture design and synthesis from mesh sketches. 330-341
Volume 8, Number 3, June 2014
- Xiangke Liao:
MilkyWay-2: back to the world Top 1. 343-344 - Xiangke Liao, Liquan Xiao, Canqun Yang, Yutong Lu:
MilkyWay-2 supercomputer: system and application. 345-356 - Zhengbin Pang, Min Xie, Jun Zhang, Yi Zheng, Guibin Wang, Dezun Dong, Guang Suo:
The TH Express high performance interconnect networks. 357-366 - Weixia Xu, Yutong Lu, Qiong Li, Enqiang Zhou, Zhenlong Song, Yong Dong, Wei Zhang, Dengping Wei, Xiaoming Zhang, Haitao Chen, Jianying Xing, Yuan Yuan:
Hybrid hierarchy storage system in MilkyWay-2 supercomputer. 367-377 - Kai Lu, Xiaoping Wang, Gen Li, Ruibo Wang, Wanqing Chi, Yongpeng Liu, Hong-Wei Tang, Hua Feng, Yinghui Gao:
Iaso: an autonomous fault-tolerant management system for supercomputers. 378-390 - Najme Mansouri:
Network and data location aware approach for simultaneous job scheduling and data replication in large-scale data grid environments. 391-408 - Lei Xie, Sanglu Lu, Yingchun Cao, Daoxu Chen:
Towards energy-efficient storage placement in large scale sensor networks. 409-425 - Jingyuan Wang, Jiangtao Wen, Yuxing Han, Jun Zhang, Chao Li, Zhang Xiong:
Achieving high throughput and TCP Reno fairness in delay-based TCP over large networks. 426-439 - Yanfei Lv, Bin Cui, Xuexuan Chen, Jing Li:
HAT: an efficient buffer management method for flash-based hybrid storage systems. 440-455 - Mingwu Zhang, Yi Mu:
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. 456-468 - Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. 469-477 - Chang-Ai Sun, Zuoyi Wang, Guan Wang:
A property-based testing framework for encryption programs. 478-489 - Haibo Tian, Jin Li:
A short non-delegatable strong designated verifier signature. 490-502 - Solomon Guadie Worku, Chunxiang Xu, Jining Zhao:
Cloud data auditing with designated verifier. 503-512 - Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. 513-525
Volume 8, Number 4, August 2014
- Jianjun Yang, Yunhai Tong, Zitian Wang, Shaohua Tan:
Efficient and effective Bayesian network local structure learning. 527-536 - Hebah ElGibreen, Mehmet Sabih Aksoy:
RULES-IT: incremental transfer learning with RULES family. 537-562 - Min Xu, Hisao Ishibuchi, Xin Gu, Shitong Wang:
Dm-KDE: dynamical kernel density estimation by sequences of KDE estimators with fixed number of components over data streams. 563-580 - Lu Liu, Tao Peng:
Clustering-based topical Web crawling using CFu-tree guided by link-context. 581-595 - Xiaodong Li, Xiaotie Deng, Shanfeng Zhu, Feng Wang, Haoran Xie:
An intelligent market making strategy in algorithmic trading. 596-608 - Shangfei Wang, Menghua He, Zhen Gao, Shan He, Qiang Ji:
Emotion recognition from thermal infrared images using deep Boltzmann machine. 609-618 - Omar Sultan Al-Kadi, Osama Al-Kadi, Rizik M. H. Al-Sayyed, Ja'far Alqatawna:
Road scene analysis for determination of road traffic density. 619-628 - Ruiji Fu, Bing Qin, Ting Liu:
Generating Chinese named entity data from parallel corpora. 629-641 - Ruochen Liu, Chenlin Ma, Fei He, Wenping Ma, Licheng Jiao:
Reference direction based immune clone algorithm for many-objective optimization. 642-655 - Wenbo Shi, Neeraj Kumar, Peng Gong, Zezhong Zhang:
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. 656-666 - Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:
A lattice-based signcryption scheme without random oracles. 667-675 - Peng Zhang:
Unbalanced graph cuts with minimum capacity. 676-683 - Yuyue Du, Yuhui Ning:
Property analysis of logic Petri nets by marking reachability graphs. 684-692 - Yingsheng Ji, Yingzhuo Zhang, Guangwen Yang:
Interpolation oriented parallel communication to optimize coupling in earth system modeling. 693-708
Volume 8, Number 5, October 2014
- Qin Li, Yongxin Zhao, Huibiao Zhu, Jifeng He:
A UTP semantic model for Orc language with execution status and fault handling. 709-725 - Yan Zhang, Dunwei Gong:
Generating test data for both paths coverage and faults detection using genetic algorithms: multi-path case. 726-740 - Pushpinder Singh:
Some new distance measures for type-2 fuzzy sets and distance measure based ranking for group decision making problems. 741-752 - Zaiyue Zhang, Xibei Yang:
Tolerance-based multigranulation rough sets in incomplete systems. 753-762 - Yunping Zheng, Mudar Sarem:
A novel binary image representation algorithm by using NAM and coordinate encoding procedure and its application to area calculation. 763-772 - Wenjie Cai, Seiichi Uchida, Hiroaki Sakoe:
Comparative performance analysis of stroke correspondence search methods for stroke-order free online multi-stroke character recognition. 773-784 - Leilei Yang, Songcan Chen:
Linear discriminant analysis with worst between-class separation and average within-class compactness. 785-792 - Xu Yu, Jing Yang, Zhiqiang Xie:
Training SVMs on a bound vectors set based on Fisher projection. 793-806 - Zhisong Pan, Zhantao Deng, Yibing Wang, Yanyan Zhang:
Dimensionality reduction via kernel sparse representation. 807-815 - Xiaojian Zhang, Xiaofeng Meng:
Discovering top-k patterns with differential privacy-an accurate approach. 816-827 - Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. 828-836 - Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. 837-846 - Jong-Hyuk Lee, SungJin Choi, Joon-Min Gil, Taeweon Suh, Heon-Chang Yu:
A scheduling algorithm with dynamic properties in mobile grid. 847-857
Volume 8, Number 6, December 2014
- Huijui Wang, Furong Li, Xuan Zhou, Yu Cao, Xiongpai Qin, Jidong Chen, Shan Wang:
HC-Store: putting MapReduce's foot in two camps. 859-871 - Yu Zhang, Xiaofei Liao, Hai Jin, Li Lin, Feng Lu:
An adaptive switching scheme for iterative computing in the cloud. 872-884 - Yuqing Lan, Hao Xu:
Research on technology of desktop virtualization based on SPICE protocol and its improvement solutions. 885-892 - Hongpeng Yin, Jinxing Li, Yi Chai, Simon X. Yang:
A survey on distributed compressed sensing: theory and applications. 893-904 - Qiang Li, Yahong Han, Jianwu Dang:
Image decomposing for inpainting using compressed sensing in DCT domain. 905-915 - Tusar Kanti Mishra, Banshidhar Majhi, Pankaj Kumar Sa, Sandeep Panda:
Model based odia numeral recognition using fuzzy aggregated features. 916-922 - Xian-Fa Cai, Guihua Wen, Jia Wei, Zhiwen Yu:
Relative manifold based semi-supervised dimensionality reduction. 923-932 - Djamal Ziani:
Feature selection on probabilistic symbolic objects. 933-947 - Yongyi Yan, Zengqiang Chen, Zhongxin Liu:
Semi-tensor product of matrices approach to reachability of finite automata with application to language recognition. 948-957 - Xiaoxiao Yang, Yu Zhang, Ming Fu, Xinyu Feng:
A temporal programming model with atomic blocks based on projection temporal logic. 958-976 - Xiang Qiu, Li Zhang:
Specifying redundancy tactics as crosscutting concerns using aspect-oriented modeling. 977-995 - Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:
Detection of semantically similar code. 996-1011 - Xixiang Lv, Hui Li:
Error- and loss-tolerant bundle fragment authentication for space DTNs. 1012-1023 - Weiliang Wang, Yangyu Fan, Ruihu Li:
Optimal binary codes and binary construction of quantum codes. 1024-1031
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.