default search action
Frontiers of Computer Science in China, Volume 2
Volume 2, Number 1, March 2008
- Jian Zhang, Wenhui Zhang, Naijun Zhan, Yi-Dong Shen, Haiming Chen, Yunquan Zhang, Yongji Wang, Enhua Wu, Hongan Wang, Xueyang Zhu:
Basic research in computer science and software engineering at SKLCS. 1-11 - Masahiko Sato, Takafumi Sakurai, Yukiyoshi Kameyama, Atsushi Igarashi:
Calculi of meta-variables. 12-21 - Tetsuya Mizutani, Shigeru Igarashi, Masayuki Shio, Yasuwo Ikeda:
Human factors in continuous time-concerned cooperative systems represented by N Sigma-labeled calculus. 22-28 - Yixiang Chen, Hengyang Wu:
Semantics of sub-probabilistic programs. 29-38 - Asem Kasem, Tetsuo Ida:
Computational origami environment on the web. 39-54 - Changbo Chen, Marc Moreno Maza, Wei Pan, Yuzhen Xie:
On the verification of polynomial system solvers. 55-66 - Wenqin Zhou, David J. Jeffrey:
Fraction-free matrix factors: new forms for LU and QR factors. 67-80 - Lifei Chen, Qingshan Jiang:
An extended EM algorithm for subspace clustering. 81-86 - Chuangbai Xiao, Jing Yu, Kaina Su:
Gibbs artifact reduction for POCS super-resolution image reconstruction. 87-93 - Juanzi Li, Jie Tang, Jing Zhang, Qiong Luo, Yunhao Liu, MingCai Hong:
Arnetminer: expertise oriented search using social networks. 94-105 - Lingling Wang, Guoyin Zhang, Chunguang Ma:
ID-based deniable ring authentication with constant-size signature. 106-112
Volume 2, Number 2, June 2008
- Guilu Long, Tzyh Jong Tarn:
Progress in theoretical quantum computing. 113 - Xiuhong Gao, Sergio Albeverio, Kai Chen, Shao-Ming Fei, Xianqing Li-Jost:
Entanglement of formation and concurrence for mixed states. 114-128 - Wei Cui, Zairong Xi, Yu Pan:
Decoherence control for high-temperature reservoirs. 129-137 - Dafa Li:
Quantum fixed-point search algorithm with general phase shifts. 138-142 - Hao Chen:
Constructing quantum codes. 143-146 - Xihan Li, Fuguo Deng:
Controlled teleportation. 147-160 - Jiafu Xu, Fanming Song:
Quantum programming languages. 161-166 - Guilu Long, Yang Liu:
Duality quantum computing. 167-178 - Ting Gao, Fengli Yan, Zhi-Xi Wang, Youcheng Li:
Quantum probabilistically cloning and computation. 179-189 - Yuchun Wu, Guangcan Guo:
High-dimension Bell inequalities. 190-192 - Daowen Qiu, Lvzhou Li:
An overview of quantum computation models: quantum automata. 193-207
Volume 2, Number 3, September 2008
- Aoying Zhou:
Introduction to the special section on peer-to-peer computing and web data management. 209-210 - Bin Yang, Weining Qian, Aoying Zhou:
Using Wide Table to manage web data: a survey. 211-223 - Rong Zhang, Koji Zettsu, Yutaka Kidawara, Yasushi Kiyoki:
Decentralized architecture for resource management of group-based distributed systems. 224-233 - Mei Li, Wang-Chien Lee, Anand Sivasubramaniam, Jizhong Zhao:
Supporting K nearest neighbors query on high-dimensional data in P2P systems. 234-247 - Jianliang Xu, Xueyan Tang, Wang-Chien Lee:
Distributed query processing in flash-based sensor networks. 248-256 - Fengrong Li, Takuya Iida, Yoshiharu Ishikawa:
Traceable P2P record exchange: a database-oriented approach. 257-267 - Yuanyan Tang:
Status of pattern recognition with wavelet analysis. 268-294 - Jian Yang, Jing-Yu Yang, David Zhang:
Median Fisher Discriminator: a robust feature extraction method with applications to biometrics. 295-305 - Guoshun Hao, Shilong Ma, Yuefei Sui, Jianghua Lv:
Dynamic description logic model for data integration. 306-330
Volume 2, Number 4, December 2008
- Lan Lin, Jesse H. Poore:
Pushing requirements changes through to changes in specifications. 331-343 - Chenguang Luo, Shengchao Qin, Zongyan Qiu:
Verifying BPEL-like programs with Hoare logic. 344-356 - Jun Pang, Zhengqin Luo, Yuxin Deng:
On automatic verification of self-stabilizing population protocols. 357-367 - Jun Sun, Yang Liu, Jin Song Dong, Jing Sun:
Compositional encoding for bounded model checking. 368-379 - Zhifang Wang, Yiyun Chen, Zhenming Wang, Baojian Hua:
Automated verification of pointer programs in pointer logic. 380-397 - Antonio Brogi, Razvan Popescu:
Workflow-based semantics for peer-to-peer specifications. 398-412 - Lianwei Guan, Xingyu Li, Hao Hu, Jian Lu:
A Petri net-based approach for supporting aspect-oriented modeling. 413-423 - Yue Hu, Xiaoyu Gao, Li Li, Qingshi Gao:
Style transformation in natural languages. 424-430 - Yunping Zheng, Chuanbo Chen, Mudar Sarem:
An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles. 431-437 - Xin Li, Bei Hua, Yi Shang, Yan Xiong:
A robust localization algorithm in wireless sensor networks. 438-450 - Xiaoru Zhang, Zaiyue Zhang, Yuefei Sui:
Types, structures and theories in NKI. 451-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.