default search action
Journal of Computer Science and Technology, Volume 22
Volume 22, Number 1, January 2007
- Weiwu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu:
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology. 1-14 - Yulai Zhao, Xianfeng Li, Dong Tong, Xu Cheng:
An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking. 15-24 - Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang:
A 485ps 64-Bit Parallel Adder in 0.18mum CMOS. 25-27 - Chiou-Yng Lee, Yung-Hui Chen, Che Wun Chiou, Jim-Min Lin:
Unified Parallel Systolic Multiplier Over GF(2m). 28-38 - Zhi-Hong Tao, Conghua Zhou, Zhong Chen, Lifu Wang:
Bounded Model Checking of CTL. 39-43 - Dong-Xi Liu:
CSchema: A Downgrading Policy Language for XML Access Control. 44-53 - Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Two-Factor Cancelable Biometrics Authenticator. 54-59 - Issam W. Damaj:
Higher-Level Hardware Synthesis of the KASUMI Algorithm. 60-70 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. 71-74 - Haixia Xu, Bao Li:
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme. 75-78 - Jie Liang, Xuejia Lai:
Improved Collision Attack on Hash Function MD5. 79-87 - Yonglong Luo, Liusheng Huang, Hong Zhong:
Secure Two-Party Point-Circle Inclusion Problem. 88-91 - Duo Liu, Ping Luo, Yiqi Dai:
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. 92-94 - Haibo Tian, Xi Sun, Yumin Wang:
A New Public-Key Encryption Scheme. 95-102 - Zhenchuan Chai, Zhenfu Cao, Yuan Zhou:
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. 103-108 - Wei Gao, Xueli Wang, Dongqing Xie:
Chameleon Hashes Without Key Exposure Based on Factoring. 109-113 - Min Liu, Zhongcheng Li, Xiao-Bing Guo:
An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN. 114-120 - Jing Zhou, David De Roure:
FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System. 121-130 - Kwangjin Park, Hyunseung Choo, Chong-Sun Hwang:
An Efficient Data Dissemination Scheme for Spatial Query Processing. 131-134 - Yong Liao, Xudong Chen, Guangze Xiong, Qingxin Zhu, Nan Sang:
End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems. 135-146 - Han-Bing Yan, Shi-Min Hu, Ralph R. Martin:
3D Morphing Using Strain Field Interpolation. 147-155 - Wen Zheng, Jun-Hai Yong, Jean-Claude Paul:
Visual Simulation of Multiple Unmixable Fluids. 156-160 - Sheng-You Lin, Jiao-Ying Shi:
A Markov Random Field Model-Based Approach to Natural Image Matting. 161-167
Volume 22, Number 2, March 2007
- Changxuan Wan, Xiping Liu:
Structural Join and Staircase Join Algorithms of Sibling Relationship. 171-181 - Donghong Han, Guoren Wang, Chuan Xiao, Rui Zhou:
Load Shedding for Window Joins over Streams. 182-189 - Xiaobo Fan, Ting-Ting Xie, Cuiping Li, Hong Chen:
MRST - An Efficient Monitoring Technology of Summarization on Stream Data. 190-196 - Jun Zhang, Zhaohui Peng, Shan Wang, Huijing Nie:
CLASCN: Candidate Network Selection for Efficient Top- k Keyword Queries over Databases. 197-207 - Yi Zhuang, Yueting Zhuang, Fei Wu:
Composite Distance Transformation for Indexing and k -Nearest-Neighbor Searching in High-Dimensional Spaces. 208-217 - Qiang Liu, Tao Huang, Shaohua Liu, Hua Zhong:
An Ontology-Based Approach for Semantic Conflict Resolution in Database Integration. 218-227 - Tao-Yuan Cheng, Shan Wang:
A Novel Approach to Clustering Merchandise Records. 228-231 - Yunjun Gao, Chun Li, Gencai Chen, Ling Chen, Xianta Jiang, Chun Chen:
Efficient k -Nearest-Neighbor Search Algorithms for Historical Moving Object Trajectories. 232-244 - Ji-Dong Chen, Xiao-Feng Meng:
Indexing Future Trajectories of Moving Objects in a Constrained Network. 245-251 - Hongding Wang, Yunhai Tong, Shaohua Tan, Shi-Wei Tang, Dongqing Yang, Guohui Sun:
An Adaptive Approach to Schema Classification for Data Warehouse Modeling. 252-260 - Yuhai Zhao, Guoren Wang, Ying Yin, Guangyu Xu:
A Novel Approach to Revealing Positive and Negative Co-Regulated Genes. 261-272 - Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:
Efficient Execution of Multiple Queries on Deep Memory Hierarchy. 273-279 - Chaokun Wang, Jianmin Wang, Jia-Guang Sun, Shengfei Shi, Hong Gao:
AbIx: An Approach to Content-Based Approximate Query Processing in Peer-to-Peer Data Systems. 280-286 - Unil Yun:
Analyzing Sequential Patterns in Retail Databases. 287-296 - Min Zhao, Suqing Han, Jue Wang:
Tree Expressions for Information Systems. 297-307 - Changle Zhou, Yun Yang, Xiaoxi Huang:
Computational Mechanisms for Metaphor in Languages: A Survey. 308-319 - Bo Yang, Dayou Liu:
A Heuristic Clustering Algorithm for Mining Communities in Signed Networks. 320-328 - Huixuan Tang, Hui Wei:
A Coarse-to-Fine Method for Shape Recognition. 330-334 - Shizhu Liu, Heping Hu:
Text Classification Using Sentential Frequent Itemsets. 334-337
Volume 22, Number 3, May 2007
- Giuseppe Lami, Robert W. Ferguson:
An Empirical Study on the Impact of Automation on the Requirements Analysis Process. 338-347 - Pierre Bourque, Serge Oligny, Alain Abran, Bertrand Fournier:
Developing Project Duration Models in Software Engineering. 348-357 - Nelly Condori-Fernández, Silvia Abrahão, Oscar Pastor:
On the Estimation of the Functional Size of Software from Requirements Specifications. 358-370 - Juan Jose Cuadrado-Gallego, Daniel Rodríguez, Miguel-Ángel Sicilia, Miguel Garre, Ángel García-Crespo:
Software Project Effort Estimation Based on Multiple Parametric Models Generated Through Data Clustering. 371-378 - Liguo Yu, Srini Ramaswamy:
Component Dependency in Object-Oriented Software. 379-386 - Taghi M. Khoshgoftaar, Pierre Rebours:
Improving Software Quality Prediction by Noise Filtering Techniques. 387-396 - Piotr Tomaszewski, Lars Lundberg, Håkan Grahn:
Improving Fault Detection in Modified Code - A Study from the Telecommunication Industry. 397-409 - Chong-Yi Yuan, Wen Zhao, Shikun Zhang, Yu Huang:
A Three-Layer Model for Business Processes - Process Logic, Case Semantics and Workflow Management. 410-425 - Chunxiao Lin, Yiyun Chen, Long Li, Bei Hua:
Garbage Collector Verification for Proof-Carrying Code. 426-437 - Xiaolan Joy Zhang, Brian King:
An Anti-Counterfeiting RFID Privacy Protection Protocol. 438-448 - Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. 449-456 - Xinli Huang, Futai Zou, Fan-Yuan Ma:
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. 457-468 - Xiao-Li Huang, Chuan-Kun Wu:
Cryptanalysis of Achterbahn-Version 1 and -Version 2. 469-475 - Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song:
Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN. 476-480 - Enjian Bai, Xiaojuan Liu:
Some Notes on Prime-Square Sequences. 481-486 - Chang-Ji Wang, Yong Tang, Qin Li:
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. 487-493 - (Withdrawn) Edge-Oriented Spatial Interpolation for Error Concealment of Consecutive Blocks. 494-497
Volume 22, Number 4, July 2007
- Zhiyuan Li:
Simultaneous Minimization of Capacity and Conflict Misses. 497-504 - Youcef Derbal:
A Model of Grid Service Capacity. 505-514 - Jung-Hoon Lee:
Next High Performance and Low Power Flash Memory Package Structure. 515-520 - Jun Yao, Jiwu Shu, Weimin Zheng:
Distributed Storage Cluster Design for Remote Mirroring Based on Storage Area Network. 521-526 - Jian-Hui Huang, Depei Qian, Shengling Wang:
Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network. 527-531 - Minghui Jiang, Joel Gillespie:
Engineering the Divide-and-Conquer Closest Pair Algorithm. 532-540 - Yuyan Chao, Lifeng He, Tsuyoshi Nakamura, Zhenghao Shi, Kenji Suzuki, Hidenori Itoh:
An Improvement of Herbrand's Theorem and Its Application to Model Generation Theorem Proving. 541-553 - Yisong Wang, Mingyi Zhang, Yu-Ping Shen:
Consistency Property of Finite FC-Normal Logic Programs. 554-561 - Xi-Shun Zhao, Yu-Ping Shen:
Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction. 562-568 - Jing-Fa Liu, Wen-Qi Huang:
Quasi-Physical Algorithm of an Off-Lattice Model for Protein Folding Problem. 569-574 - Xiaoju Dong, Yuxi Fu:
Barbed Congruence of Asymmetry and Mismatch. 575-579 - Anwar M. Mirza, Asmatullah Chaudhry, Badre Munir:
Spatially Adaptive Image Restoration Using Fuzzy Punctual Kriging. 580-589 - Feng Xue, You-Sheng Zhang, Julang Jiang, Min Hu, Xindong Wu, Ronggui Wang:
Real-Time Texture Synthesis Using s-Tile Set. 590-596 - Gang Xu, Guozhao Wang:
AHT Bézier Curves and NUAH B-Spline Curves. 597-607 - Jun Zhao, Feifan Liu:
Linguistic Theory Based Contextual Evidence Mining for Statistical Chinese Co-Reference Resolution. 608-617 - Yong-Dong Zhang, Sheng Tang, Jin-Tao Li:
Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. 618-625 - Fengxi Song, David Zhang, Cai-Kou Chen, Jing-Yu Yang:
Facial Feature Extraction Method Based on Coefficients of Variances. 626-632 - Xiafen Zhang, Yueting Zhuang, Jiangqin Wu, Fei Wu:
Hierarchical Approximate Matching for Retrieval of Chinese Historical Calligraphy Character. 633-640
Volume 22, Number 5, September 2007
- Xian-He Sun, Surendra Byna, Yong Chen:
Server-Based Data Push Architecture for Multi-Processor Environments. 641-652 - Qiang Zhou, Yici Cai, Duo Li, Xianlong Hong:
A Yield-Driven Gridless Router. 653-660 - Kai Liu, Keyan Wang, Yunsong Li, Chengke Wu:
A Novel VLSI Architecture for Real-Time Line-Based Wavelet Transform Using Lifting Scheme. 661-672 - Wei Wang, Yu Hu, Yinhe Han, Xiaowei Li, You-Sheng Zhang:
Leakage Current Optimization Techniques During Test Based on Don't Care Bits Assignment. 673-680 - Ozgur Sinanoglu:
Low Cost Scan Test by Test Correlation Utilization. 681-694 - Francesc Giné, Francesc Solsona, Mauricio Hanzich, Porfidio Hernández, Emilio Luque:
Cooperating CoScheduling: A Coscheduling Proposal Aimed at Non-Dedicated Heterogeneous NOWs. 695-710 - Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu:
A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams. 711-724 - Jianhua Feng, Qian Qian, Jianyong Wang, Li-Zhu Zhou:
Efficient Mining of Frequent Closed XML Query Pattern. 725-735 - Jianhua Feng, Yuguo Liao, Yong Zhang:
HCH for Checking Containment of XPath Fragment. 736-748 - Yongwei Miao, Jieqing Feng, Chunxia Xiao, Qunsheng Peng, A. Robin Forrest:
Differentials-Based Segmentation and Parameterization for Point-Sampled Surfaces. 749-760 - Hao-Da Huang, Xin Tong, Wen-Cheng Wang:
Accelerated Parallel Texture Optimization. 761-769 - Bo Li, Runhai Jiao, Yuancheng Li:
Fast Adaptive Wavelet for Remote Sensing Image Compression. 770-778 - Pyung-Soo Kim, Myung-Eui Lee:
A New FIR Filter for State Estimation and Its Application. 779-784
Volume 22, Number 6, November 2007
- Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong:
Revocable Ring Signature. 785-794 - Rafiullah Chamlawi, Asifullah Khan, Adnan Idris:
Wavelet Based Image Authentication and Recovery. 795-804 - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang:
Short Group Signatures Without Random Oracles. 805-821 - Rong-Hua Li, Chuan-Kun Wu:
A Protocol for a Private Set-Operation. 822-829 - Shengqiang Li, Zhixiong Chen, Xiaotong Fu, Guozhen Xiao:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length pq. 830-834 - Vincent Le Chevalier, Marc Jaeger, Xing Mei, Paul-Henry Cournède:
Simulation and Visualisation of Functional Landscapes: Effects of the Water Resource Competition Between Plants. 835-845 - Zhang-Lin Cheng, Xiaopeng Zhang, Baoquan Chen:
Simple Reconstruction of Tree Branches from a Single Range Image. 846-858 - Jun Teng, Marc Jaeger, Bao-Gang Hu:
A Fast Ambient Occlusion Method for Real-Time Plant Rendering. 859-866 - Murat Ekinci, Murat Aykut:
Human Gait Recognition Based on Kernel PCA Using Projections. 867-876 - Chaveevan Pechsiri, Asanee Kawtrakul:
Mining Causality for Explanation Knowledge from Text. 877-889 - Yu Li, Yongtian Wang, Yue Liu:
Fiducial Marker Based on Projective Invariant for Augmented Reality. 890-897 - Xiao-Dong Wang, Ying-Jie Wu:
An Improved HEAPSORT Algorithm with n log n - 0.788928 n Comparisons in the Worst Case. 898-903 - Heitor Silvério Lopes, Reginaldo Bitello:
A Differential Evolution Approach for Protein Folding Using a Lattice Model. 904-908 - Yongxi Cheng:
Generating Combinations by Three Basic Operations. 909-913
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.