default search action
Frontiers of Computer Science in China, Volume 1
Volume 1, Number 1, February 2007
- Wenjun Wu, Xiao-Shan Gao:
Mathematics mechanization and applications after thirty years. 1-8 - Jifeng He, Huibiao Zhu, Geguang Pu:
A model for BPEL-like languages. 9-19 - Ninghui Sun, Dan Meng:
Dawning4000A high performance computer. 20-25 - Jigui Sun, Minghao Yin:
Recognizing the agent's goals incrementally: planning graph as a basis. 26-36 - Gheorghe Paun:
A quick overview of membrane computing with some details about spiking neural P systems. 37-49 - Donggang Cao, Hong Mei, Minghui Zhou:
Supporting crosscutting concern modelling in software architecture design. 50-57 - Qun Liu, Xiangdong Wang, Hong Liu, Le Sun, Sheng Tang, Deyi Xiong, Hongxu Hou, Yuanhua Lv, Wenbo Li, Shouxun Lin, Yueliang Qian:
HTRDP evaluations on Chinese information processing and intelligent human-machine interface. 58-93 - Xuejun Yang, Huizhan Yi, Xiangli Qu, Haifang Zhou:
Compiler-directed power optimization of high-performance interconnection networks for load-balancing MPI applications. 94-105 - Réjean Plamondon, Xiaolin Li, Moussa Djioua:
Extraction of delta-lognormal parameters from handwriting strokes. 106-113 - Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao:
P2P worm detection based on application identification. 114-122
Volume 1, Number 2, May 2007
- Yuanyan Tang:
Remarks on different reviews of Chinese character recognition. 123-125 - Ruwei Dai, Chenglin Liu, Baihua Xiao:
Chinese character recognition: history, status and prospects. 126-136 - Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball:
Offline Chinese handwriting recognition: an assessment of current technology. 137-155 - Yunquan Zhang, Guoliang Chen, Guangzhong Sun, Qiankun Miao:
Models of parallel computation: a survey and classification. 156-165 - Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics. 166-179 - Tielin Liang, Dongming Wang:
On the design and implementation of a geometric-object-oriented language. 180-190 - Kaile Su, Yinyin Xiao, Qingliang Chen, Han Lin:
Semantic interpretation of compositional logic in instantiation space. 191-199 - Hai Jin, Chuanjiang Yi:
CMM: Credential migration management system based on trusted computing in CGSP. 200-207 - Renfa Li, Yunlong Xie, Jigang Wen, Guangxue Yue:
EMMP: a highly efficient membership management protocol. 208-212 - Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou:
SONNET: subscription using path queries over structured overlay networks. 213-225 - Weiguo Zhang, Mian Cai, Guozhen Xiao:
On constructing disjoint linear codes. 226-230 - Xuejun Yang, Panfeng Wang, Yunfei Du, Haifang Zhou:
A data-distributed parallel algorithm for wavelet-based fusion of remote sensing images. 231-240 - Chuanbo Chen, Yunping Zheng, Mudar Sarem:
A mesh-based automatic in-betweening algorithm in computer-assisted animation. 241-245
Volume 1, Number 3, July 2007
- Guilu Long, Yang Liu:
Search an unsorted database with quantum mechanics. 247-271 - YuZhong Zhao, Yun Xu, Qiangfeng Zhang, Guoliang Chen:
An overview of the haplotype problems and algorithms. 272-282 - Shilong Ma, Yuefei Sui, Ke Xu:
Well limit behaviors of term rewriting systems. 283-296 - Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Cheng Liu, Zhifang Wang:
A pointer logic and certifying compiler. 297-312 - Shi Zhang, Linpeng Huang:
Research on dynamic update transaction for Java classes. 313-321 - Keqing He, Peng Liang, Rong Peng, Bing Li, Jing Liu:
Requirement emergence computation of networked software. 322-328 - Yuanzhuo Wang, Chuang Lin, Yang Yang, Zhiguang Shan:
Performance analysis of a dependable scheduling strategy based on a fault-tolerant grid model. 329-337 - Jianjin Jiang, Guangwen Yang:
An optimal replication strategy for data grid systems. 338-348 - Lingfang Zeng, Dan Feng, Hong Jiang:
High TPO/TCO for data storage: policy, algorithm and early practice. 349-360 - Hui Wei:
A hierarchical model for structure learning based on the physiological characteristics of neurons. 361-372
Volume 1, Number 4, October 2007
- Ying Jiang, Guo-Qiang Zhang:
Weakly distributive domains (II). 373-384 - Dengguo Feng, Chuankun Wu:
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. 385-396 - Teijiro Isokawa, Shin'ya Kowada, Ferdinand Peper, Naotake Kamiura, Nobuyuki Matsui:
Online isolation of defects in cellular nanocomputers. 397-406 - Shuicheng Yan, Huan Wang, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang:
Ranking with uncertain labels and its applications. 407-412 - Tiejun Zhao, Yi Guan, Ting Liu, Qiang Wang:
Recent advances on NLP research in Harbin Institute of Technology. 413-428 - Limin Wang, Xuecheng Wang, Xiongfei Li:
Inference and learning in hybrid probabilistic network. 429-435 - Yijiao Yu, Hai Jin:
Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach. 436-449 - Kai Nan, Jianjun Yu, Hao Su, Shengmin Guo, Hui Zhang, Ke Xu:
Towards structural Web Services matching based on Kernel methods. 450-458 - Yingxin Guo, Ke Xu:
An improved algorithm for finding community structure in networks with an application to IPv6 backbone network. 459-467 - Cheqing Jin, Aoying Zhou, Jeffrey Xu Yu, Joshua Zhexue Huang, Feng Cao:
Adaptive scheduling for shared window joins over data streams. 468-477 - Lingfang Zeng, Dan Feng, Zhan Shi, Jianxi Chen, Qingsong Wei, Zhixiang Li:
A high-speed and low-cost storage architecture based on virtual interface. 478-492 - Dong Xie, Luming Yang:
Study on consistent query answering in inconsistent databases. 493-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.