default search action
Frontiers of Computer Science, Volume 7
Volume 7, Number 1, February 2013
- Jian Lin, Li Zha, Zhiwei Xu:
Consolidated cluster systems for data centers in the cloud age: a survey and analysis. 1-19 - Weiwei Ni, Zhihong Chong, Hu Shu, Jiajia Bao, Aoying Zhou:
Evaluation of RDF queries via equivalence. 20-33 - Yue-hua Dai, Yi Shi, Yong Qi, Jianbao Ren, Peijian Wang:
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. 34-43 - Botao Wang, Jingwei Qu, Xiaosong Wang, Guoren Wang, Masaru Kitsuregawa:
VGQ-Vor: extending virtual grid quadtree with Voronoi diagram for mobile k nearest neighbor queries over mobile objects. 44-54 - Yuming Wu, Xiaodong Luo, Zhen Yang:
Semantic separator learning and its applications in unsupervised Chinese text parsing. 55-68 - Lai Kang, Lingda Wu, Yee-Hong Yang:
A novel unsupervised approach for multilevel image clustering from unordered image collection. 69-82 - Jie Luo:
A general framework for computing maximal contractions. 83-94 - Jing Liu, Ziwei Liu, Jifeng He, Frédéric Mallet, Zuohua Ding:
Hybrid MARTE statecharts. 95-108 - Wei Ke, Zhiming Liu, Shuling Wang, Liang Zhao:
A graph-based generic type system for object-oriented programs. 109-134 - Yongjian Zhao, Hong He, Jian-Xun Mi:
Noisy component extraction with reference. 135-144 - Xuejuan Zhang, Xiaochun Cao, Jingjie Li:
Geometric attack resistant image watermarking based on MSER. 145-156
Volume 7, Number 2, April 2013
- Jinchuan Chen, Yueguo Chen, Xiaoyong Du, Cuiping Li, Jiaheng Lu, Suyun Zhao, Xuan Zhou:
Big data challenge: a data management perspective. 157-164 - Ling Liu:
Computing infrastructure for big data processing. 165-170 - Haixin Ma, Weining Qian, Fan Xia, Xiaofeng He, Jun Xu, Aoying Zhou:
Towards modeling popularity of microblogs. 171-184 - Rong-Hua Li, Jianquan Liu, Jeffrey Xu Yu, Hanxiong Chen, Hiroyuki Kitagawa:
Co-occurrence prediction in a large location-based social network. 185-194 - Biao Leng, Jiabei Zeng, Zhang Xiong, Weifeng Lv, Yueliang Wan:
Probability tree based passenger flow prediction and its application to the Beijing subway system. 195-203 - R. Priscilla, S. Swamynathan:
A semi-supervised hierarchical approach: two-dimensional clustering of microarray gene expression data. 204-213 - Zheng Wang, Geguang Pu, Jianwen Li, Yuxiang Chen, Yongxin Zhao, Mingsong Chen, Bin Gu, Mengfei Yang, Jifeng He:
A novel requirement analysis approach for periodic control systems. 214-235 - Qin Shu, Zongyan Qiu, Shuling Wang:
Confinement framework for encapsulating objects. 236-256 - Bo Wang, Zhenjiang Hu, Qiang Sun, Haiyan Zhao, Yingfei Xiong, Wei Zhang, Hong Mei:
Supporting feature model refinement with updatable view. 257-271 - Yu Zhou, Weiguo Zhang, Juan Li, Xinfeng Dong, Guozhen Xiao:
The autocorrelation distribution of balanced Boolean function. 272-278 - Zhiyuan Liu, Jun Pang, Chenyi Zhang:
Design and formal verification of a CEM protocol with transparent TTP. 279-297 - Xianpeng Huangfu, Deke Guo, Honghui Chen, Xueshan Luo:
KMcube: the compound of Kautz digraph and Möbius cube. 298-306
Volume 7, Number 3, June 2013
- Yi Wang, Renfa Li:
FPGA based unified architecture for public key and private key cryptosystems. 307-316 - Xiao Pan, Xiaofeng Meng:
Preserving location privacy without exact locations in mobile services. 317-340 - Nan Wu, HaiXing Hu, Fangmin Song, Huimin Zheng, Xiangdong Li:
Quantum software framework: a tentative study. 341-349 - Tao Song, Xiaolong Shi, Jinbang Xu:
Reversible spiking neural P systems. 350-358 - Qiang Qian, Songcan Chen:
Co-metric: a metric learning algorithm for data with multiple views. 359-369 - Savas Konur:
A survey on temporal logics for specifying and verifying real-time systems. 370-403 - Qinma Kang, Hong He:
Task assignment for minimizing application completion time using honeybee mating optimization. 404-415 - Amit Kumar Singh, Akash Kumar, Jigang Wu, Thambipillai Srikanthan:
CADSE: communication aware design space exploration for efficient run-time MPSoC management. 416-430 - Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai, Gang Yin:
An online service-oriented performance profiling tool for cloud computing systems. 431-445 - Zihou Wang, Yanni Han, Tao Lin, Yuemei Xu, Song Ci, Hui Tang:
Topology-aware virtual network embedding based on closeness centrality. 446-457
Volume 7, Number 4, August 2013
- Heng Wu, Wenbo Zhang, Jianhua Zhang, Jun Wei, Tao Huang:
A benefit-aware on-demand provisioning approach for multi-tier applications in cloud computing. 459-474 - Yuwei Wang, Yuanchun Zhou, Ying Liu, Ze Luo, Danhuai Guo, Jing Shao, Fei Tan, Liang Wu, Jianhui Li, Baoping Yan:
A grid-based clustering algorithm for wild bird distribution. 475-485 - Guozhi Song, Liying Yang, Jigang Wu, John A. Schormans:
Performance comparisons between cellular-only and cellular/WLAN integrated systems based on analytical models. 486-495 - Wei Li, Wei Zhang:
Multiple target localization in wireless visual sensor networks. 496-504 - Yujin Lim, Sanghyun Ahn:
Architecture for mobile group communication in campus environment. 505-513 - Song Wang, Seiichi Uchida, Marcus Liwicki, Yaokai Feng:
Part-based methods for handwritten digit recognition. 514-525 - Yun Ye, Shengrong Gong, Chunping Liu, Jia Zeng, Ning Jia, Yi Zhang:
Online belief propagation algorithm for probabilistic latent semantic analysis. 526-535 - Wanpeng Li, Chunxiang Xu, Wenzheng Zhang, Shixiong Zhu, Xiujie Zhang:
New forward-secure signature schemes with untrusted update. 536-543 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A novel pairing-free certificateless authenticated key agreement protocol with provable security. 544-557 - Zhiyi Ma, Xiao He, Chao Liu:
Assessing the quality of metamodels. 558-570 - Mei Chen, Xiaolong Jin, Yuanzhuo Wang, Xueqi Cheng, Geyong Min:
Modelling priority queuing systems with varying service capacity. 571-582 - Weidong Min, Ke Chen, Yongzhen Ke:
A matrix grammar approach for automatic distributed network resource management. 583-594
Volume 7, Number 5, October 2013
- Jean-Pierre Talpin:
Foreword to the special section on synchronous programming. 595-597 - Van Chan Ngo, Jean-Pierre Talpin, Thierry Gautier, Paul Le Guernic, Loïc Besnard:
Formal verification of synchronous data-flow program transformations toward certified compilers. 598-616 - Kai Hu, Teng Zhang, Zhibin Yang:
Multi-threaded code generation from Signal program to OpenMP. 617-626 - Huafeng Yu, Yue Ma, Thierry Gautier, Loïc Besnard, Jean-Pierre Talpin, Paul Le Guernic, Yves Sorel:
Exploring system architectures in AADL via Polychrony and SynDEx. 627-649 - Jean-Vivien Millo, Frédéric Mallet, Anthony Coadou, S. Ramesh:
Scenario-based verification in presence of variability using a synchronous approach. 650-672 - Zhibin Yang, Jean-Paul Bodeveix, Mamoun Filali:
A comparative study of two formal semantics of the SIGNAL language. 673-693 - Wenjun Wu, Wei-Tek Tsai, Wei Li:
An evaluation framework for software crowdsourcing. 694-709 - Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao, Zongyan Qiu, Shengchao Qin:
Algorithms for checking channel passing in web service choreography. 710-728 - Pablo Rabanal, Ismael Rodríguez, Fernando Rubio:
An ACO-RFD hybrid method to solve NP-complete problems. 729-744 - Lishan Qiao, Limei Zhang, Songcan Chen:
Dimensionality reduction with adaptive graph. 745-753 - Kok-Lim Alvin Yau, Kae Hsiang Kwong, Chong Shen:
Reinforcement learning models for scheduling in wireless networks. 754-766 - Hunny Mehrotra, Banshidhar Majhi:
Local feature based retrieval approach for iris biometrics. 767-781 - R. Priya, T. N. Shanmugam:
A comprehensive review of significant researches on content based indexing and retrieval of visual information. 782-799
Volume 7, Number 6, December 2013
- Dongchen Jiang, Wei Li, Jie Luo, Yihua Lou, Zhengzhong Liao:
A decomposition based algorithm for maximal contractions. 801-811 - Dantong Ouyang, Xianji Cui, Yuxin Ye:
Integrity constraints in OWL ontologies based on grounded circumscription. 812-821 - Dunwei Gong, Yan Zhang:
Generating test data for both path coverage and fault detection using genetic algorithms. 822-837 - Chunping Liu, Yang Zheng, Shengrong Gong:
Image categorization using a semantic hierarchy model with sparse set of salient regions. 838-851 - Zengchang Qin, Tao Wan:
Hybrid Bayesian estimation tree learning with discrete and fuzzy labels. 852-863 - Ran Liu, Wenjian Luo, Lihua Yue:
Classifying and clustering in negative databases. 864-874 - Rong Zhang, Koji Zettsu, Yutaka Kidawara, Yasushi Kiyoki, Aoying Zhou:
Context-sensitive Web service discovery over the bipartite graph model. 875-893 - Hadi Saboohi, Sameem Abdul Kareem:
An automatic subdigraph renovation plan for failure recovery of composite semantic Web services. 894-913 - Wenbing Jin, Feng Shi, Qiugui Song, Yang Zhang:
A novel architecture for ahead branch prediction. 914-923 - Chuang Lin, Yiping Deng, Yuming Jiang:
On applying stochastic network calculus. 924-942 - Iftikhar Ahmed Khan, Willem-Paul Brinkman, Robert M. Hierons:
Towards estimating computer users' mood from interaction behaviour with keyboard and mouse. 943-954 - Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang, Wanpeng Li:
Threshold public key encryption scheme resilient against continual leakage without random oracles. 955-968
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.