default search action
Journal of Computer Science and Technology, Volume 23
Volume 23, Number 1, January 2008
- Xiaodong Li, Wenjian Luo, Xin Yao:
Preface. 1 - Xiaomin Hu, Jun Zhang, Yun Li:
Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems. 2-18 - Ehab Zaki Elfeky, Ruhul A. Sarker, Daryl Essam:
Analyzing the Simple Ranking and Selection Process for Constrained Evolutionary Optimization. 19-34 - Nan Ding, Shude Zhou, Zengqi Sun:
Histogram-Based Estimation of Distribution Algorithm: A Competent Method for Continuous Optimization. 35-43 - Lam Thu Bui, Kalyanmoy Deb, Hussein A. Abbass, Daryl Essam:
Interleaving Guidance in Evolutionary Multi-Objective Optimization. 44-63 - Grant Dick, Peter A. Whigham:
Spatially-Structured Sharing Technique for Multimodal Problems. 64-76 - Daniel Kunkle, Donghui Zhang, Gene Cooperman:
Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy. 77-102 - Zhenhua Huang, Jiankui Guo, Sheng-Li Sun, Wei Wang:
Efficient Optimization of Multiple Subspace Skyline Queries. 103-111 - Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu:
Clustering Text Data Streams. 112-128 - Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. 129-140 - Han-Xin Sun, Kun-Peng Yang, Yulai Zhao, Dong Tong, Xu Cheng:
CASA: A New IFU Architecture for Power-Efficient Instruction Cache and TLB Designs. 141-153 - Chengdong Jiang, Guo-Liang Chen:
Double Barrier Coverage in Dense Sensor Networks. 154-165
Volume 23, Number 2, March 2008
- Sheng Zhong, Rui Xue:
Preface. 165 - Rui Xue, Ninghui Li, Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets. 166-175 - Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki:
WWW Business Applications Based on the Cellular Model. 176-187 - Grigorios Loukides, Jianhua Shao:
An Efficient Clustering Algorithm for k -Anonymisation. 188-202 - Chun-Lin Xin, Wei-Min Ma, Lei Yang:
Competitive Analysis of Two Special Online Device Replacement Problems. 203-213 - Baodong Qin, Ming Li, Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms. 214-221 - Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guosheng Zhao:
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization. 222-230 - Bo Chen, Hui He, Jun Guo:
Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis. 231-239 - Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures. 240-252 - Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. 253-264 - Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. 265-269 - Yanli Liu, Jin Wang, Xi Chen, Yanwen Guo, Qunsheng Peng:
A Robust and Fast Non-Local Means Algorithm for Image Denoising. 270-279 - Yueh-Yi Lai, Wen-Kai Tai:
Transition Texture Synthesis. 280-289 - Jia Li, Liyong Shen, Xiao-Shan Gao:
Proper Reparametrization of Rational Ruled Surface. 290-297 - Zusong Li, Dandan Huan, Weiwu Hu, Zhimin Tang:
Chip Multithreaded Consistency Model. 298-305
Volume 23, Number 3, May 2008
- Miaomiao Wang, Jiannong Cao, Jing Li, Sajal K. Das:
Middleware for Wireless Sensor Networks: A Survey. 305-326 - Jie Wu, Shuhui Yang:
SmallWorld Model-Based Polylogarithmic Routing Using Mobile Nodes. 327-342 - Vaishali P. Sadaphal, Bijendra N. Jain:
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks. 343-354 - Xiaolin Li, Jiannong Cao:
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications. 355-364 - Kan Cai, Michael J. Feeley, Brendan Cully, Sharath J. George:
Understanding Performance for Two 802.11 Competing Flows. 365-376 - Fereshteh Amini, Moazzam Khan, Jelena V. Misic, Hossein Pourreza:
Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange. 377-388 - Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou:
Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. 389-399 - Michele Garetto, Marco Gribaudo, Carla-Fabiana Chiasserini, Emilio Leonardi:
Sensor Deployment and Relocation: A Unified Scheme. 400-412 - Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal:
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks. 413-425 - Feng Lu, Liang-Tien Chia, Kok-Leong Tay, Wai-Hoe Chong:
NBgossip: An Energy-Efficient Gossip Algorithm for Wireless Sensor Networks. 426-437 - Juan A. Sánchez, Rafael Marín-Pérez, Pedro M. Ruiz:
Beacon-Less Geographic Routing in Real Wireless Sensor Networks. 438-450 - François Ingelrest, David Simplot-Ryl:
Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions. 451-460 - Jaime Lloret, Miguel Garcia, Jesús Tomás, Fernando Boronat:
GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks. 461-480
Volume 23, Number 4, July 2008
- Haixun Wang, Jian Pei:
Clustering by Pattern Similarity. 481-496 - Lu-An Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Dongqing Yang, Xinbiao Zhou:
PGG: An Online Pattern Based Approach for Stream Variation Management. 497-515 - Byron Choi, Gao Cong, Wenfei Fan, Stratis Viglas:
Updating Recursive XML Views of Relations. 516-537 - Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin:
Continually Answering Constraint k - NN Queries in Unstructured P2P Systems. 538-556 - Xian Zhang, Yu Hao, Xiaoyan Zhu, Ming Li:
New Information Distance Measure and Its Application in Question Answering System. 557-572 - Loris Nanni, Alessandra Lumini:
Cluster-Based Nearest-Neighbour Classifier and Its Application on the Lightning Classification. 573-581 - Xiaoyong Fang, Zhigang Luo, Zhenghua Wang:
Predicting RNA Secondary Structure Using Profile Stochastic Context-Free Grammars and Phylogenic Analysis. 582-589 - Hao Lang, Bin Wang, Gareth J. F. Jones, Jin-Tao Li, Fan Ding, Yi-Xuan Liu:
Query Performance Prediction for Information Retrieval Based on Covering Topic Score. 590-601 - Xu Sun, Houfeng Wang, Bo Wang:
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression. 602-611 - Hai Zhao, Chunyu Kit:
Scaling Conditional Random Fields by One-Against-the-Other Decomposition. 612-619 - Weiwu Hu, Jian Wang:
Making Effective Decisions in Computer Architects' Real-World: Lessons and Experiences with Godson-2 Processor Designs. 620-632 - Qiong Zou, Xiao-Feng Li, Long-Bing Zhang:
Runtime Engine for Dynamic Profile Guided Stride Prefetching. 633-643 - Jigang Wu, Thambipillai Srikanthan, Guang-Wei Zou:
New Model and Algorithm for Hardware/Software Partitioning. 644-651 - Tiziana Calamoneri, Saverio Caminiti, Rossella Petreschi:
A General Approach to L ( h, k )-Label Interconnection Networks. 652-659 - Renyi Xiao:
Survey on Anonymity in Unstructured Peer-to-Peer Systems. 660-671 - Nan Du, Bai Wang, Bin Wu:
Community Detection in Complex Networks. 672-683 - Youjian Zhao, Zuhui Yue, Jianping Wu:
Research on Next-Generation Scalable Routers Implemented with H-Torus Topology. 684-693
Volume 23, Number 5, September 2008
- Markus Hinkelmann, Andreas Jakoby, Peer Stechert:
t-Private and t-Secure Auctions. 694-710 - Bing Yang, Jing Chen, Enyue Lu, Si-Qing Zheng:
Design and Performance Evaluation of Sequence Partition Algorithms. 711-718 - Avraham Trakhtman:
Some Aspects of Synchronization of DFA. 719-727 - Xuehou Tan, Bo Jiang:
Searching a Polygonal Region by Two Guards. 728-739 - Wei-Lin Li, Peng Zhang, Daming Zhu:
On Constrained Facility Location Problems. 740-748 - Florian Diedrich, Rolf Harren, Klaus Jansen, Ralf Thöle, Henning Thomas:
Approximation Algorithms for 3D Orthogonal Knapsack. 749-762 - Jianxin Wang, Xiaoshuang Xu, Jianer Chen:
Approximation Algorithm Based on Chain Implication for Constrained Minimum Vertex Covers in Bipartite Graphs. 763-768 - Weiming Wang, Ligang Dong, Bin Zhuge:
Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation. 769-779 - Shaoliang Peng, Shanshan Li, Lei Chen, Yuxing Peng, Nong Xiao:
Scalable Base-Station Model-Based Multicast in Wireless Sensor Networks. 780-791 - Dong-nian Cheng, Yuxiang Hu, Cai-xia Liu:
Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability. 792-805 - Lizhong Dai, Dongmei Zhao:
Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks. 806-814 - Pisai Setthawong, Surat Tanterdtid:
Flood Avoidance Mechanisms for Bridged Resilient Packet Rings. 815-824 - Jun-Wu Dong, Dingyi Pei, Xue-Li Wang:
A Class of Key Predistribution Schemes Based on Orthogonal Arrays. 825-831 - Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. 832-842 - Zhixiong Chen, Shengqiang Li:
Some Notes on Generalized Cyclotomic Sequences of Length pq. 843-850 - Murat Ekinci, Murat Aykut:
Palmprint Recognition by Applying Wavelet-Based Kernel PCA. 851-861 - Gang Xu, Guozhao Wang, Xiao-Diao Chen:
Free-Form Deformation with Rational DMS-Spline Volumes. 862-873 - Kangwoo Lee:
Guiding Attention by Cooperative Cues. 874-884
Volume 23, Number 6, November 2008
- Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcarin, Maurizio Morisio:
Synthesizing Service Composition Models on the Basis of Temporal Business Rules. 885-894 - Gang Huang, Lianshan Sun:
An Access Control Framework for Reflective Middleware. 895-904 - Hua-Ming Liao, Guo-Shun Pei:
Cache-Based Aggregate Query Shipping: An Efficient Scheme of Distributed OLAP Query Processing. 905-915 - Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang:
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. 916-928 - Donggeon Noh, Heonshik Shin:
URECA: Efficient Resource Location Middleware for Ubiquitous Environment. 929-943 - Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao:
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks. 944-956 - Yongxuan Lai, Yilong Chen, Hong Chen:
PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks. 957-972 - Hong Shen, Yu Zhang:
Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows. 973-987 - Jianhua Feng, Guoliang Li, Na Ta:
A Semantic Cache Framework for Secure XML Queries. 988-997 - Nan Chen, Lidan Shou, Gang Chen, Jinxiang Dong:
Adaptive Indexing of Moving Objects with Highly Variable Update Frequencies. 998-1014 - Bailin Yang, Frederick W. B. Li, Zhigeng Pan, Xun Wang:
An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks. 1015-1025 - Chandrajit L. Bajaj, Guoliang Xu, Qin Zhang:
Higher-Order Level-Set Method and Its Application in Biomolecular Surfaces Construction. 1026-1036 - Da Wang, Yu Hu, Huawei Li, Xiaowei Li:
Design-for-Testability Features and Test Implementation of a Giga Hertz General Purpose Microprocessor. 1037-1046
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.