default search action
Frontiers of Computer Science, Volume 9
Volume 9, Number 1, February 2015
- Fei He, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Generalized interface automata with multicast synchronization. 1-14 - Luxi Chen, Linpeng Huang, Chen Li, Tao Zan:
Integrating behavior analysis into architectural modeling. 15-33 - Zhenbo Xu, Jian Zhang, Zhongxing Xu:
Melton: a practical and precise memory leak detection tool for C programs. 34-54 - Silvano Colombo Tosatto, Pierre Kelsen, Qin Ma, Marwane El Kharbili, Guido Governatori, Leendert W. N. van der Torre:
Algorithms for tractable compliance problems. 55-74 - Qingliang Chen, Kaile Su, Yong Hu, Guiwu Hu:
A complete coalition logic of temporal knowledge for multi-agent systems. 75-86 - Yanwen Chen, Yixiang Chen, Eric Madelaine:
Timed-pNets: a communication behavioural semantic model for distributed systems. 87-110 - Zhikun Chen, Shuqiang Yang, Shuang Tan, Li He, Hong Yin, Ge Zhang:
A new fragment re-allocation strategy for NoSQL database systems. 111-127 - Xite Wang, Derong Shen, Mei Bai, Tiezheng Nie, Yue Kou, Ge Yu:
SAMES: deadline-constraint scheduling in MapReduce. 128-141 - Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. 142-156 - Cong Guo, Zijian Zhang, Liehuang Zhu, Yu-an Tan, Zhen Yang:
Scalable protocol for cross-domain group password-based authenticated key exchange. 157-169
Volume 9, Number 2, April 2015
- Wenge Rong, Baolin Peng, Yuanxin Ouyang, Chao Li, Zhang Xiong:
Structural information aware deep semi-supervised recurrent neural network for sentiment analysis. 171-184 - Shangfei Wang, Menghua He, Yachen Zhu, Shan He, Yue Liu, Qiang Ji:
Learning with privileged information using Bayesian networks. 185-199 - Siyuan Liu, Shuhui Wang, Ce Liu, Ramayya Krishnan:
Understanding taxi drivers' routing choices from spatial and social traces. 200-209 - Rong Zhang, Wenzhe Yu, Chaofeng Sha, Xiaofeng He, Aoying Zhou:
Product-oriented review summarization and scoring. 210-223 - Huiju Wang, Xiongpai Qin, Xuan Zhou, Furong Li, Zuoyan Qin, Qing Zhu, Shan Wang:
Efficient query processing framework for big data warehouse: an almost join-free approach. 224-236 - Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hosseinabadi:
A model-driven approach to semi-structured database design. 237-252 - Ziyang Chen, Jia Liu, Xingmin Zhao, Junfeng Zhou:
Efficient subtree results computation for XML keyword queries. 253-264 - Xiaodong Fu, Kun Yue, Li Liu, Ping Zou, Yong Feng:
Discovering admissible Web services with uncertain QoS. 265-279 - Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, Abdul Waheed Khan:
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. 280-296 - Rahat Masood, Muhammad Awais Shibli, Yumna Ghazi, Ayesha Kanwal, Arshad Ali:
Cloud authorization: exploring techniques and approach towards effective access control framework. 297-321 - Xiong Fu, Chen Zhou:
Virtual machine selection and placement for dynamic consolidation in Cloud computing environment. 322-330
Volume 9, Number 3, June 2015
- Yanhong Huang, Jifeng He, Huibiao Zhu, Yongxin Zhao, Jianqi Shi, Shengchao Qin:
Semantic theories of programs with nested interrupts. 331-345 - Priyanka Chawla, Inderveer Chana, Ajay Rana:
A novel strategy for automatic test data generation using soft computing technique. 346-363 - Yu Zhou, Yankai Huang, Ou Wei, Zhiqiu Huang:
Verifying specifications with associated attributes in graph transformation systems. 364-374 - Xiaoyan Luo, Jun Zhang, Qionghai Dai:
Hybrid fusion and interpolation algorithm with near-infrared image. 375-382 - Bojun Xie, Yi Liu, Hui Zhang, Jian Yu:
Efficient image representation for object recognition via pivots selection. 383-391 - Xuzhou Li, Yilong Yin, Yanbin Ning, Gongping Yang, Lei Pan:
A hybrid biometric identification framework for high security applications. 392-401 - Hui Li, Yun Liu, Shengwu Xiong, Lin Wang:
Pedestrian detection algorithm based on video sequences and laser point cloud. 402-414 - Yang Zhao, Ye Tian, Yong Liu:
Extracting viewer interests for automated bookmarking in video-on-demand services. 415-430 - Chenggang Clarence Yan, Hui Yu, Weizhi Xu, Yingping Zhang, Bochuan Chen, Zhu Tian, Yuxuan Wang, Jian Yin:
Memory bandwidth optimization of SpMV on GPGPUs. 431-441 - Mingqiang Guo, Ying Huang, Zhong Xie:
A balanced decomposition approach to real-time visualization of large vector maps in CyberGIS. 442-455 - Xuezhen Huang, Xin Sun, Zhong Ren, Xin Tong, Baining Guo, Kun Zhou:
Irradiance regression for efficient final gathering in global illumination. 456-465 - Chuantao Yin, Bingxue Zhang, Bertrand David, Zhang Xiong:
A hierarchical ontology context model for work-based learning. 466-473 - Wu Chen, Dongmo Zhang, Maonian Wu:
A sequential model of bargaining in logic programming. 474-484 - Haobin Shi, Lincheng Xu, Lin Zhang, Wei Pan, Genjiu Xu:
Research on self-adaptive decision-making mechanism for competition strategies in robot soccer. 485-494
Volume 9, Number 4, August 2015
- Jianghua Lv, Shilong Ma, Xianjun Li, Jiangong Song:
A high order collaboration and real time formal model for automatic testing of safety critical systems. 495-510 - Lai-Xiang Shan, Xiaomin Du, Zheng Qin:
Efficient approach of translating LTL formulae into Büchi automata. 511-523 - Long Zheng, Xiaofei Liao, Song Wu, Xuepeng Fan, Hai Jin:
Understanding and identifying latent data races cross-thread interleaving. 524-539 - Xing Chen, Aipeng Li, Xue'e Zeng, Wenzhong Guo, Gang Huang:
Runtime model based approach to IoT application development. 540-553 - Xiaolan Xu, Wenjun Wu, Ya Wang, Yuchuan Wu:
Software crowdsourcing for developing Software-as-a-Service. 554-565 - Qi Wang, Donghui Wang, Chaohuan Hou:
Exploiting write power asymmetry to improve phase change memory system performance. 566-575 - Genggeng Liu, Wenzhong Guo, Rongrong Li, Yuzhen Niu, Guolong Chen:
XGRouter: high-quality global router in X-architecture with particle swarm optimization. 576-594 - Jie Xin, Zhiming Cui, Pengpeng Zhao, Tianxu He:
Active transfer learning of matching query results across multiple sources. 595-607 - Jianjun Yu, Tongyu Zhu:
Combining long-term and short-term user interest for personalized hashtag recommendation. 608-622 - Lijin Wang, Yilong Yin, Yiwen Zhong:
Cuckoo search with varied scaling factor. 623-635 - Jozef Pócs, Jana Pócsova:
Basic theorem as representation of heterogeneous concept lattices. 636-642 - Xiangxiang Zeng, Sisi Yuan, Xianxian Huang, Quan Zou:
Identification of cytokine via an improved genetic algorithm. 643-651 - Li Zhang, Songcan Chen, Xuejun Liu:
Detecting differential expression from RNA-seq data with expression measurement uncertainty. 652-663
Volume 9, Number 5, October 2015
- Kezhi Li, Shuang Cong:
State of the art and prospects of structured sensing matrices in compressed sensing. 665-677 - KC Santosh, Laurent Wendling:
Character recognition based on non-linear multi-projection profiles measure. 678-690 - Yichao Xu, Kazuki Maeno, Hajime Magahara, Rin-Ichiro Taniguchi:
Camera array calibration for light field acquisition. 691-702 - Xue-xia Zhong, Guorui Feng, Jian Wang, Wenfei Wang, Wen Si:
A novel adaptive image zooming scheme via weighted least-squares estimation. 703-712 - Ke Tu, Hongbo Li, Fuchun Sun:
A statistical learning based image denoising approach. 713-719 - Fengying Xie, Yefen Wu, Yang Li, Zhiguo Jiang, Rusong Meng:
Adaptive segmentation based on multi-classification model for dermoscopy images. 720-728 - Xuan Dong, Jiangtao Wen:
A pixel-based outlier-free motion estimation algorithm for scalable video quality enhancement. 729-740 - Chenggang Clarence Yan, Hongtao Xie, Bing Zhang, Yanping Ma, Qiong Dai, Yizhi Liu:
Fast approximate matching of binary codes with distinctive bits. 741-750 - Shijian Luo, Yuxiao Zhou:
Effects of smartphone icon background shapes and figure/background area ratios on visual search performance and user preferences. 751-764 - Xiaochun Cao, Meili Ma, Xiaojie Guo, Ling Du, Dongdai Lin:
A new encryption scheme for surveillance videos. 765-777 - Yun Song, Zhihui Li, Yongming Li, Ren Xin:
The optimal information rate for graph access structures of nine participants. 778-787 - Ronggang Bai, Jiqiang Xia, Qingfeng Man:
Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model. 788-805 - Wei Duan, Zongchen Fan, Peng Zhang, Gang Guo, Xiaogang Qiu:
Mathematical and computational approaches to epidemic modeling: a comprehensive review. 806-826
Volume 9, Number 6, December 2015
- Yili Gong, Wei Huang, Wenjie Wang, Yingchun Lei:
A survey on software defined networking and its applications. 827-845 - Zixiao Jia, Jiwei Huang, Chuang Lin:
Hierarchical caches in content-centric networks: modeling and analysis. 846-859 - Lailong Luo, Deke Guo, Wenxin Li, Tian Zhang, Junjie Xie, Xiaolei Zhou:
Compound graph based hybrid data center topologies. 860-874 - Bing Yu, Yanni Han, Hanning Yuan, Xu Zhou, Zhen Xu:
A cost-effective scheme supporting adaptive service migration in cloud data center. 875-886 - Hua Ma, Zhigang Hu:
Recommend trustworthy services using interval numbers of four parameters via cloud model for potential users. 887-903 - Quanqing Xu, Rajesh Vellore Arumugam, Khai Leong Yong, Yonggang Wen, Yew-Soon Ong, Weiya Xi:
Adaptive and scalable load balancing for metadata server cluster in cloud-scale file systems. 904-918 - Xiaoyan Wang, Tao Yang, Jinchuan Chen, Long He, Xiaoyong Du:
RDF partitioning for scalable SPARQL query processing. 919-933 - Jian Hu, Tun Li, Sikun Li:
Equivalence checking between SLM and TLM using coverage directed simulation. 934-943 - Xi Chang, Zhuo Zhang, Peng Zhang, Jianxin Xue, Jianjun Zhao:
BIFER: a biphasic trace filter approach to scalable prediction of concurrency errors. 944-955 - Franco Ronchetti, Facundo Manuel Quiroga, Laura Lanzarini, Cesar Estrebou:
Distribution of action movements (DAM): a descriptor for human action recognition. 956-965 - Hongbo Ni, Shu Wu, Bessam Abdulrazak, Daqing Zhang, Xiaojuan Ma, Xingshe Zhou:
Non-intrusive sleep pattern recognition with ubiquitous sensing in elderly assistive environment. 966-979 - Chuanping Hu, Zheng Xu, Yunhuai Liu, Lin Mei:
Video structural description technology for the new generation video surveillance systems. 980-989 - Vahid Mehrdad, Hossein Ebrahimnezhad:
3D object retrieval based on histogram of local orientation using one-shot score support vector machine. 990-1005
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.