Frontiers of Computer Science, Volume 8 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 8, Number 1, February 2014

Yuanjie Si, Jun Sun
, Yang Liu
, Jin Song Dong, Jun Pang, Shao Jie Zhang, Xiaohu Yang:
Model checking with fairness assumptions using PAT. 1-16

Changpeng Zhu, Yinliang Zhao, Bo Han, Qinghua Zeng, Ying Ma:
Runtime support for type-safe and context-based behavior adaptation. 17-32

Cuiyun Hu, XinJun Mao, Mengjun Li, Zhi Zhu:
Organization-based agent-oriented programming: model, mechanisms, and language. 33-51

Qiang Sun, Yuting Chen, Jianjun Zhao:
A constraint-weaving approach to points-to analysis for AspectJ. 52-68

Tao Wang, Huaimin Wang, Gang Yin, Charles X. Ling, Xiao Li, Peng Zou:
Tag recommendation for open source software. 69-82

Yaobin He, Haoyu Tan, Wuman Luo, Shengzhong Feng, Jianping Fan:
MR-DBSCAN: a scalable MapReduce-based DBSCAN algorithm for heavily skewed data. 83-99

Jamal Yousaf, Juanzi Li, Lu Chen, Jie Tang, Xiaowen Dai:
Generalized multipath planning model for ride-sharing systems. 100-118

Ke Lu, Peiquan Jin, Puyuan Yang, Shouhong Wan, Lihua Yue:
Adaptive in-page logging for flash-memory storage systems. 131-144

Li Cui:
SWVFS: a saliency weighted visual feature similarity metric for image quality assessment. 145-155

Hong Song, Qingjie Zhao, Yinghong Liu:
Splitting touching cells based on concave-point and improved watershed algorithms. 156-162

Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. 163-173
Volume 8, Number 2, April 2014

Bin Lin, Shanshan Li, Xiangke Liao, Jing Zhang, Xiaodong Liu:
Leach: an automatic learning cache for inline primary deduplication system. 175-183

Wei Li, Yuefei Sui:
A sound and complete R-calculi with respect to contraction and minimal change. 184-191

Wang Lin, Min Wu, Zhengfeng Yang
, Zhenbing Zeng:
Proving total correctness and generating preconditions for loop programs via symbolic-numeric computation methods. 192-202

Wenzhong Guo, Genggeng Liu
, Guolong Chen, Shaojun Peng:
A hybrid multi-objective PSO algorithm with local search strategy for VLSI partitioning. 203-216

Ali Khazaee
, Ataollah Ebrahimzadeh:
ECG beat classification using particle swarm optimization and support vector machine. 217-231

Shangfei Wang, Shan He, Yue Wu, Menghua He, Qiang Ji:
Fusion of visible and thermal images for facial expression recognition. 232-242

Yin Lu, Fuxiang Wang, Xiaoyan Luo, Feng Liu:
Novel infrared and visible image fusion method based on independent component analysis. 243-254

Chaoqun Li, Liangxiao Jiang
, Hongwei Li:
Naive Bayes for value difference metric. 255-264

Weiyi Liu, Kun Yue, Hui Liu, Ping Zhang, Suiye Liu, Qianyi Wang:
Associative categorization of frequent patterns based on the probabilistic graphical model. 265-278

Qingliang Miao, Qiudan Li, Daniel Zeng, Yao Meng, Shu Zhang, Hao Yu:
Entity attribute discovery and clustering from online reviews. 279-288

Yuan Guan, Shimin Cai
, Mingsheng Shang
:
Recommendation algorithm based on item quality and user rating preferences. 289-297

Jiansu Pu, Siyuan Liu, Panpan Xu, Huamin Qu, Lionel M. Ni:
MViewer: mobile phone spatiotemporal data viewer. 298-315

Kuifei Yu, Hengshu Zhu
, Huanhuan Cao, Baoxian Zhang, Enhong Chen, Jilei Tian, Jinghai Rao:
Learning to detect subway arrivals for passengers on a train. 316-329

Lili Wang, Qinglin Qi
, Yi Chen, Wei Ke
, Aimin Hao:
Interactive texture design and synthesis from mesh sketches. 330-341
Volume 8, Number 3, June 2014

Xiangke Liao:
MilkyWay-2: back to the world Top 1. 343-344

Xiangke Liao, Liquan Xiao
, Canqun Yang, Yutong Lu:
MilkyWay-2 supercomputer: system and application. 345-356

Zhengbin Pang, Min Xie, Jun Zhang, Yi Zheng, Guibin Wang, Dezun Dong, Guang Suo:
The TH Express high performance interconnect networks. 357-366

Weixia Xu, Yutong Lu, Qiong Li, Enqiang Zhou, Zhenlong Song, Yong Dong, Wei Zhang, Dengping Wei, Xiaoming Zhang, Haitao Chen, Jianying Xing, Yuan Yuan:
Hybrid hierarchy storage system in MilkyWay-2 supercomputer. 367-377

Kai Lu, Xiaoping Wang, Gen Li, Ruibo Wang, Wanqing Chi, Yongpeng Liu, Hong-Wei Tang, Hua Feng, Yinghui Gao:
Iaso: an autonomous fault-tolerant management system for supercomputers. 378-390

Najme Mansouri:
Network and data location aware approach for simultaneous job scheduling and data replication in large-scale data grid environments. 391-408

Lei Xie
, Sanglu Lu, Yingchun Cao, Daoxu Chen:
Towards energy-efficient storage placement in large scale sensor networks. 409-425

Jingyuan Wang, Jiangtao Wen, Yuxing Han, Jun Zhang, Chao Li, Zhang Xiong:
Achieving high throughput and TCP Reno fairness in delay-based TCP over large networks. 426-439

Yanfei Lv, Bin Cui
, Xuexuan Chen, Jing Li:
HAT: an efficient buffer management method for flash-based hybrid storage systems. 440-455

Mingwu Zhang, Yi Mu:
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. 456-468

Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. 469-477

Chang-Ai Sun, Zuoyi Wang, Guan Wang:
A property-based testing framework for encryption programs. 478-489

Haibo Tian, Jin Li:
A short non-delegatable strong designated verifier signature. 490-502

Solomon Guadie Worku, Chunxiang Xu, Jining Zhao:
Cloud data auditing with designated verifier. 503-512

Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. 513-525
Volume 8, Number 4, August 2014

Jianjun Yang, Yunhai Tong, Zitian Wang, Shaohua Tan:
Efficient and effective Bayesian network local structure learning. 527-536

Hebah ElGibreen
, Mehmet Sabih Aksoy:
RULES-IT: incremental transfer learning with RULES family. 537-562

Min Xu, Hisao Ishibuchi
, Xin Gu, Shitong Wang:
Dm-KDE: dynamical kernel density estimation by sequences of KDE estimators with fixed number of components over data streams. 563-580

Xiaodong Li, Xiaotie Deng
, Shanfeng Zhu, Feng Wang, Haoran Xie
:
An intelligent market making strategy in algorithmic trading. 596-608

Shangfei Wang, Menghua He, Zhen Gao, Shan He, Qiang Ji:
Emotion recognition from thermal infrared images using deep Boltzmann machine. 609-618

Omar S. Al-Kadi
, Osama Al-Kadi
, Rizik M. H. Al-Sayyed
, Ja'far Alqatawna
:
Road scene analysis for determination of road traffic density. 619-628

Ruochen Liu, Chenlin Ma, Fei He, Wenping Ma, Licheng Jiao
:
Reference direction based immune clone algorithm for many-objective optimization. 642-655

Wenbo Shi, Neeraj Kumar
, Peng Gong, Zezhong Zhang:
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. 656-666

Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:
A lattice-based signcryption scheme without random oracles. 667-675

Peng Zhang:
Unbalanced graph cuts with minimum capacity. 676-683

Yuyue Du, Yuhui Ning:
Property analysis of logic Petri nets by marking reachability graphs. 684-692

Yingsheng Ji
, Yingzhuo Zhang, Guangwen Yang:
Interpolation oriented parallel communication to optimize coupling in earth system modeling. 693-708
Volume 8, Number 5, October 2014

Qin Li, Yongxin Zhao, Huibiao Zhu, Jifeng He:
A UTP semantic model for Orc language with execution status and fault handling. 709-725

Yan Zhang, Dunwei Gong:
Generating test data for both paths coverage and faults detection using genetic algorithms: multi-path case. 726-740

Pushpinder Singh
:
Some new distance measures for type-2 fuzzy sets and distance measure based ranking for group decision making problems. 741-752

Zaiyue Zhang, Xibei Yang:
Tolerance-based multigranulation rough sets in incomplete systems. 753-762

Yunping Zheng, Mudar Sarem:
A novel binary image representation algorithm by using NAM and coordinate encoding procedure and its application to area calculation. 763-772

Wenjie Cai, Seiichi Uchida
, Hiroaki Sakoe:
Comparative performance analysis of stroke correspondence search methods for stroke-order free online multi-stroke character recognition. 773-784

Leilei Yang, Songcan Chen:
Linear discriminant analysis with worst between-class separation and average within-class compactness. 785-792

Xu Yu, Jing Yang, Zhiqiang Xie:
Training SVMs on a bound vectors set based on Fisher projection. 793-806

Zhisong Pan, Zhantao Deng, Yibing Wang, Yanyan Zhang:
Dimensionality reduction via kernel sparse representation. 807-815

Xiaojian Zhang
, Xiaofeng Meng:
Discovering top-k patterns with differential privacy-an accurate approach. 816-827

Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. 828-836

Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. 837-846

Jong-Hyuk Lee, SungJin Choi, Joon-Min Gil, Taeweon Suh, Heon-Chang Yu
:
A scheduling algorithm with dynamic properties in mobile grid. 847-857
Volume 8, Number 6, December 2014

Huijui Wang, Furong Li, Xuan Zhou, Yu Cao, Xiongpai Qin, Jidong Chen, Shan Wang:
HC-Store: putting MapReduce's foot in two camps. 859-871

Yu Zhang, Xiaofei Liao, Hai Jin, Li Lin, Feng Lu:
An adaptive switching scheme for iterative computing in the cloud. 872-884

Yuqing Lan, Hao Xu:
Research on technology of desktop virtualization based on SPICE protocol and its improvement solutions. 885-892

Hongpeng Yin, Jinxing Li, Yi Chai
, Simon X. Yang
:
A survey on distributed compressed sensing: theory and applications. 893-904

Qiang Li, Yahong Han, Jianwu Dang:
Image decomposing for inpainting using compressed sensing in DCT domain. 905-915

Tusar Kanti Mishra
, Banshidhar Majhi, Pankaj Kumar Sa, Sandeep Panda:
Model based odia numeral recognition using fuzzy aggregated features. 916-922

Xian-Fa Cai, Guihua Wen, Jia Wei, Zhiwen Yu:
Relative manifold based semi-supervised dimensionality reduction. 923-932

Djamal Ziani:
Feature selection on probabilistic symbolic objects. 933-947

Yongyi Yan, Zengqiang Chen, Zhongxin Liu
:
Semi-tensor product of matrices approach to reachability of finite automata with application to language recognition. 948-957

Xiaoxiao Yang, Yu Zhang, Ming Fu, Xinyu Feng:
A temporal programming model with atomic blocks based on projection temporal logic. 958-976

Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:
Detection of semantically similar code. 996-1011

Xixiang Lv, Hui Li:
Error- and loss-tolerant bundle fragment authentication for space DTNs. 1012-1023

Weiliang Wang, Yangyu Fan, Ruihu Li
:
Optimal binary codes and binary construction of quantum codes. 1024-1031

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







