default search action
Frontiers of Computer Science in China, Volume 4
Volume 4, Number 1, March 2010
- Lu Yang, Chaochen Zhou, Naijun Zhan, Bican Xia:
Recent advances in program verification through computer algebra. 1-16 - Mingsong Lv, Nan Guan, Qingxu Deng, Ge Yu, Wang Yi:
Static worst-case execution time analysis of the µC/OS-II real-time kernel. 17-27 - Shuling Wang, Qin Shu, Yijing Liu, Zongyan Qiu:
A semantic model of confinement and Locality theorem. 28-46 - Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai Zhang, Hongyong Zang, Yaqiong Li, Yajun Yang, Ran Ao, Yongbing Huang:
TRainbow: a new trusted virtual machine based platform. 47-64 - Ming Fu, Yu Zhang, Yong Li:
Formal verification of concurrent programs with read-write locks. 65-77 - Jiaqi Zhu, Hanpin Wang, Zhongyuan Xu, Chunxiang Xu:
A new model for model checking: cycle-weighted Kripke structure. 78-88 - Chaofeng Sha, Jian Gong, Aoying Zhou:
Mining non-redundant diverse patterns: an information theoretic perspective. 89-99 - Feng Wang, Jie Tang, Juanzi Li, Kehong Wang:
A constraint-based topic modeling approach for name disambiguation. 100-111 - Xuesong Feng, Junyi Zhang, Akimasa Fujiwara, Yoshitsugu Hayashi, Hirokazu Kato:
Improved feedback modeling of transport in enlarging urban areas of developing countries. 112-122 - Qiyuan Zhang, Xuehai Zhou:
Efficient distributed location verification in wireless sensor networks. 123-134 - Zheng Liu, Heng Dai, Farouk Y. M. Alkadhi, Jufeng Dai:
An effective scheduling scheme for multi-hop multicast in wireless mesh networks. 135-142 - Xin Li, Zhe Li:
A MANET accessing Internet routing algorithm based on dynamic gateway adaptive selection. 143-150
Volume 4, Number 2, June 2010
- Zhiying Liu, David Lorge Parnas, Baltasar Trancón y Widemann:
Documenting and verifying systems assembled from components. 151-161 - Ying Jin, Jing Zhang, Weiping Hao, Pengfei Ma, Yan Zhang, Haiyan Zhao, Hong Mei:
A concern-based approach to generating formal requirements specifications. 162-172 - Mircea Marin, Temur Kutsia:
On the computation of quotients and factors of regular languages. 173-184 - Shuo Bai, Shouyang Wang, Lean Yu, Aoying Zhou:
Financial information processing and development of emerging financial markets. 185-186 - Wai-Ki Ching, Ho-Yin Leung, Zhenyu Wu, Hao Jiang:
Modeling default risk via a hidden Markov model of multiple sequences. 187-195 - Lean Yu, Shouyang Wang, Kin Keung Lai:
Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship management. 196-203 - Niannian Jia, Changqing Jia, Wei Qiu:
A class of life insurance reserve model and risk analysis in a stochastic interest rate environment. 204-211 - Rui Liang, Yueshan Yu, Jinwu Gao, Zhi-Qiang Liu:
N-person credibilistic strategic game. 212-219 - Ling Zhang, Edward I. Altman, Jerome Yen:
Corporate financial distress diagnosis model and application in credit rating for listing firms in China. 220-236 - Xiujuan Zhao, Jianmin Shi:
Evaluation of mutual funds using multi-dimensional information. 237-253 - Dabin Zhang, Lean Yu, Shouyang Wang, Haibin Xie:
Neural network methods for forecasting turning points in economic time series: an asymmetric verification to business cycles. 254-262 - Guoxing Zhang, Ju'e Guo, Guorong Chai, Li Gong, Xuejun Wang:
Using jump-diffusion modeling for valuing real options in infrastructure projects. 263-270 - Zaigui Yang:
Partially funded public pension, human capital and endogenous growth. 271-279 - Ali Daud, Juanzi Li, Lizhu Zhou, Faqir Muhammad:
Knowledge discovery through directed probabilistic topic models: a survey. 280-301 - Xixiang Lv, Hui Li:
ID-based authenticated group key agreement from bilinear maps. 302-307
Volume 4, Number 3, September 2010
- Lionel M. Ni, Zhang Xiong:
Cognitive sense of China. 309-310 - Feng Zhu, Matt W. Mutka, Anish Bivalkar, Abdullah Demir, Yue Lu, Chockalingam Chidambaram:
Toward secure and private service discovery anywhere anytime. 311-323 - Qiang Yang:
Three challenges in data mining. 324-333 - Yunhao Liu, Guomo Zhou, Jizhong Zhao, Guojun Dai, Xiang-Yang Li, Ming Gu, Huadong Ma, Lufeng Mo, Yuan He, Jiliang Wang:
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs. 334-338 - Jiannong Cao, Hejun Wu, Xuefeng Liu, Yi Lai:
iSensNet: an infrastructure for research and development in wireless sensor networks. 339-353 - An Lu, Wenbin Fang, Chang Xu, Shing-Chi Cheung, Yu Liu:
Data-driven testing methodology for RFID systems. 354-364 - Ye Li, Honggang Li, Yuwei Zhang, Dengyu Qiao:
Packet transmission policies for battery operated wireless sensor networks. 365-375 - Lei Chen, Mitchell M. Tseng, Xiang Lian:
Development of foundation models for Internet of Things. 376-385 - Zhenyong Chen, Wei Fan, Zhang Xiong, Pingan Zhang, Lixin Luo:
Visual data security and management for smart cities. 386-393 - Biao Leng, Zhang Xiong, Xiangwei Fu:
A 3D shape retrieval framework for 3D smart cities. 394-404 - Ming C. Lin, Dinesh Manocha:
Virtual cityscapes: recent advances in crowd modeling and traffic simulation. 405-416 - Weifeng Lv, Bowen Du, Dianfu Ma, Tongyu Zhu, Chen Wang:
Applied research of data sensing and service to ubiquitous intelligent transportation system. 417-426
Volume 4, Number 4, December 2010
- Guoliang Chen:
Petaflop supercomputers of China. 427 - Xianghui Xie, Xing Fang, Sutai Hu, Dong Wu:
Evolution of supercomputers. 428-436 - Yunquan Zhang, Jiachang Sun, Guoxing Yuan, Linbo Zhang:
Perspectives of China's HPC system development: a view from the 2009 China HPC TOP100 list. 437-444 - Xuejun Yang, Xiangke Liao, Weixia Xu, Junqiang Song, Qingfeng Hu, Jinshu Su, Liquan Xiao, Kai Lu, Qiang Dou, Juping Jiang, Canqun Yang:
TH-1: China's first petaflop supercomputer. 445-455 - Fei Chen, Zheng Cao, Kai Wang, Xuejun An, Ninghui Sun:
HPP controller: a system controller for high performance computing. 456-465 - Qiang Li, Bo Li, Zhigang Huo, Ninghui Sun:
Design and implementation of communication system of the Dawning 6000 supercomputer. 466-474 - Mingfa Zhu, Limin Xiao, Li Ruan, Qinfen Hao:
DeepComp: towards a balanced system design for high performance computer systems. 475-479 - Zeyao Mo, Aiqing Zhang, Xiaolin Cao, Qingkai Liu, Xiaowen Xu, Hengbin An, Wenbing Pei, Shaoping Zhu:
JASMIN: a parallel software infrastructure for scientific computing. 480-488 - Jianxi Fan, Kenli Li, Shukui Zhang, Wujun Zhou, Baolei Cheng:
One-to-one communication in twisted cubes under restricted connectivity. 489-499 - Ye Tian, Bangchuan Liu, Zhenhua He:
PopCap: popularity oriented proxy caching for peer-assisted Internet video-on-demand streaming services. 500-515 - Jiqiang Liu, Xun Chen, Zhen Han:
Full and partial deniability for authentication schemes. 516-521 - Xinguang Tian, Xueqi Cheng, Miyi Duan, Rui Liao, Hong Chen, Xiaojuan Chen:
Network intrusion detection based on system calls and data mining. 522-528 - Zhixiong Chen, Xiaoni Du:
Linear complexity and autocorrelation values of a polyphase generalized cyclotomic sequence of length pq. 529-535 - Ruochen Liu, Licheng Jiao, Yangyang Li, Jing Liu:
An immune memory clonal algorithm for numerical and combinatorial optimization. 536-559 - Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification. 560-570 - Zhipin Deng, Kebin Jia, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi Siu:
Fast motion and disparity estimation for multiview video coding. 571-579 - Jiangtao Wang, Debao Chen, Jingyu Yang:
Human behavior classification by analyzing periodic motions. 580-588
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.