default search action
Frontiers of Computer Science (in China), Volume 6
Volume 6, Number 1, February 2012
- Shaoying Liu:
Formal engineering methods for software quality assurance. 1-2 - David Lorge Parnas:
The use of mathematics in software quality assurance. 3-16 - Wei Ke, Xiaoshan Li, Zhiming Liu, Volker Stolz:
rCOS: a formal model-driven engineering method for component-based software. 17-39 - Hong Zhu:
An institution theory of formal meta-modelling in graphically extended BNF. 40-56 - Anh Tuan Luu, Jun Sun, Yang Liu, Jin Song Dong, Xiaohong Li, Thanh Tho Quan:
SeVe: automatic tool for verification of security protocols. 57-75 - Zhiyuan Liu, Xinxiong Chen, Maosong Sun:
Mining the interests of Chinese microbloggers via keyword extraction. 76-87 - Jiliang Tang, Xufei Wang, Huiji Gao, Xia Hu, Huan Liu:
Enriching short text representation in microblog for clustering. 88-101 - Xiaochen Li, Wenji Mao, Daniel Zeng:
Forecasting complex group behavior via multiple plan recognition. 102-110 - Xiaolong Li, Gang Pan, Zhaohui Wu, Guande Qi, Shijian Li, Daqing Zhang, Wangsheng Zhang, Zonghui Wang:
Prediction of urban human mobility using large-scale taxi traces and its applications. 111-121 - Tao Wang, Qingpeng Zhang, Zhong Liu, Wenli Liu, Ding Wen:
On social computing research collaboration patterns: a social network perspective. 122-130
Volume 6, Number 2, April 2012
- Robert Gwadera:
Multi-stream join answering for mining significant cross-stream correlations. 131-142 - Nicolas Cebron:
Active improvement of hierarchical object features under budget constraints. 143-153 - Jingrui He, Hanghang Tong, Jaime G. Carbonell:
An effective framework for characterizing rare categories. 154-165 - Fabian Gieseke, Gabriel Moruz, Jan Vahrenhold:
Resilient k-d trees: k-means in space revisited. 166-178 - Tantan Liu, Fan Wang, Gagan Agrawal:
Stratified sampling for data mining on the deep web. 179-196 - Suhrid Balakrishnan, Sumit Chopra:
Two of a kind or the ratings game? Adaptive pairwise preferences and latent factor models. 197-208 - Sertan Girgin, Jérémie Mary, Philippe Preux, Olivier Nicol:
Managing advertising campaigns - an approximate planning approach. 209-229 - Tim Schlüter, Stefan Conrad:
An approach for automatic sleep stage scoring and apnea-hypopnea detection. 230-241
Volume 6, Number 3, June 2012
- Rada Chirkova, Leonid Libkin, Juan L. Reutter:
Tractable XML data exchange via relations. 243-263 - Min Xie, Laks V. S. Lakshmanan, Peter T. Wood:
Composite recommendations: from items to packages. 264-277 - Jaffer Gardezi, Leopoldo E. Bertossi, Iluju Kiringa:
Matching dependencies: semantics and query answering. 278-292 - Pei Li, Xin Luna Dong, Andrea Maurino, Divesh Srivastava:
Linking temporal records. 293-312 - Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Yinghui Wu:
Adding regular expressions to graph reachability and pattern queries. 313-338
Volume 6, Number 4, August 2012
- Zhiwei Xu:
How much power is needed for a billion-thread high-throughput server? 339-346 - Chunjie Luo, Jianfeng Zhan, Zhen Jia, Lei Wang, Gang Lu, Lixin Zhang, Cheng-Zhong Xu, Ninghui Sun:
CloudRank-D: benchmarking and ranking cloud computing systems for data processing applications. 347-362 - Xiaolin Wang, Xiang Wen, Yechen Li, Zhenlin Wang, Yingwei Luo, Xiaoming Li:
Dynamic cache partitioning based on hot page migration. 363-372 - Hui Chen, Ping Lu, Pengcheng Xiong, Cheng-Zhong Xu, Zhiping Wang:
Energy-aware application performance management in virtualized data centers. 373-387 - Gang Huang, Xing Chen, Ying Zhang, Xiaodong Zhang:
Towards architecture-based management of platforms in the cloud. 388-397 - Wei Gao, Hai Jin, Song Wu, Xuanhua Shi, Jinyan Yuan:
Effectively deploying services on virtualization infrastructure. 398-408 - Yubao Liu, Xiuwei Chen, Zhan Li, Zhijie Li, Raymond Chi-Wing Wong:
An efficient method for privacy preserving location queries. 409-420 - Rajeev Anand Sahu, Sahadeo Padhye:
Efficient ID-based proxy multi-signature scheme secure in random oracle. 421-428 - Boyang Wang, Hui Li, Jin Cao:
An efficient MAC scheme for secure network coding with probabilistic detection. 429-441 - Xiaojun Bi, Jing Xiao:
Classification-based self-adaptive differential evolution and its application in multi-lateral multi-issue negotiation. 442-461 - Yu Jiang, Shuli Gong:
Bus holding strategy based on shuffled complex evolution method. 462-468 - Shangfei Wang, Rui Ding:
A qualitative and quantitative study of color emotion using valence-arousal. 469-476 - Xingyi Zhang, Xiangxiang Zeng, Bin Luo, Zheng Zhang:
A uniform solution to the independent set problem through tissue P systems with cell separation. 477-488
Volume 6, Number 5, October 2012
- Bo Yuan, Wenhuang Liu:
Measure oriented training: a targeted approach to imbalanced classification problems. 489-497 - Kuo-Wei Hsu, Jaideep Srivastava:
Improving bagging performance through multi-algorithm ensembles. 498-512 - Jing Wang, Zhijing Liu, Hui Zhao:
A probabilistic model with multi-dimensional features for object extraction. 513-526 - Hao Sheng, Chao Li, Yuanxin Ouyang, Zhang Xiong:
A precise approach to tracking dim-small targets using spectral fingerprint features. 527-536 - Zhaoxiang Zhang, Yunhong Wang:
Automatic object classification using motion blob based local feature fusion for traffic scene surveillance. 537-546 - Guangtao Xue, Ke Zhang, Qi He, Hongzi Zhu:
Real-time urban traffic information estimation with a limited number of surveillance cameras. 547-559 - Qi Li, Wei Ba:
A group priority earliest deadline first scheduling algorithm. 560-567 - Anca Maria Ivanescu, Marc Wichterich, Christian Beecks, Thomas Seidl:
The ClasSi coefficient for the evaluation of ranking quality in the presence of class similarities. 568-580 - Jie Wen, Xiaofeng Meng, Xing Hao, Jianliang Xu:
An efficient approach for continuous density queries. 581-595 - Kaishun Wu, Jiang Xiao, Lionel M. Ni:
Rethinking the architecture design of data center networks. 596-603 - Wei Duan, Xiaogang Qiu:
Fostering artificial societies using social learning and social control in parallel emergency management systems. 604-610 - Xiaolong Zheng, Yongguang Zhong, Daniel Zeng, Fei-Yue Wang:
Social influence and spread dynamics in social networks. 611-620 - Dion Detterer, Paul Wing Hing Kwan, Cedric Gondro:
A co-evolving memetic wrapper for prediction of patient outcomes in TCM informatics. 621-629
Volume 6, Number 6, December 2012
- Quan Liu, Xudong Yang, Ling Jing, Jin Li, Jiao Li:
A parallel scheduling algorithm for reinforcement learning in large state space. 631-646 - Yongqing Wang, Wenji Mao, Daniel Zeng, Fen Xia:
Listwise approaches based on feature ranking discovery. 647-659 - Wei Fan, Zhenyong Chen, Zhang Xiong, Hui Chen:
The Internet of data: a new idea to extend the IOT in the digital world. 660-667 - Min Jiao, Yansong Zhang, Zhanwei Wang, Shan Wang:
MiNT-OLAP cluster: minimizing network transmission cost in OLAP cluster for main memory analytical database. 668-676 - Xiaoming Wang, Guoxiang Yao:
Access control scheme with tracing for outsourced databases. 677-685 - Cheqing Jin, Jingwei Zhang, Aoying Zhou:
Continuous ranking on uncertain streams. 686-699 - Lianying Jia, Jianqing Xi, Mengjuan Li, Yong Liu, Decheng Miao:
ETI: an efficient index for set similarity queries. 700-712 - Tulika Pandey, Deepak Garg, Manoj Madhava Gore:
Publish/subscribe based information dissemination over VANET utilizing DHT. 713-724 - Ying Zhang, Gang Huang, Wei Zhang, Xuanzhe Liu, Hong Mei:
Towards module-based automatic partitioning of Java applications. 725-740 - Shuyi Zhu, Xiaochun Cao, Handong Zhao:
Photographic composite detection using circles. 741-755 - Jia Liu, Zhiguo Jiang, Hongjun Li, Xiaopeng Zhang:
Easy modeling of realistic trees from freehand sketches. 756-768 - Jinjiang Li, Hanyi Ge:
New progress in geometric computing for image and video processing. 769-775
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.