​
Login / Signup
Frontiers Comput. Sci. China
2007
2012
2007
2012
Keyphrases
Publications
volume 6, number 1, 2012
Anh Tuan Luu
,
Jun Sun
,
Yang Liu
,
Jin Song Dong
,
Xiaohong Li
,
Thanh Tho Quan
SeVe: automatic tool for verification of security protocols.
Frontiers Comput. Sci. China
6 (1) (2012)
Hong Zhu
An institution theory of formal meta-modelling in graphically extended BNF.
Frontiers Comput. Sci. China
6 (1) (2012)
David Lorge Parnas
The use of mathematics in software quality assurance.
Frontiers Comput. Sci. China
6 (1) (2012)
Xiaochen Li
,
Wenji Mao
,
Daniel Zeng
Forecasting complex group behavior via multiple plan recognition.
Frontiers Comput. Sci. China
6 (1) (2012)
Jiliang Tang
,
Xufei Wang
,
Huiji Gao
,
Xia Hu
,
Huan Liu
Enriching short text representation in microblog for clustering.
Frontiers Comput. Sci. China
6 (1) (2012)
Xiaolong Li
,
Gang Pan
,
Zhaohui Wu
,
Guande Qi
,
Shijian Li
,
Daqing Zhang
,
Wangsheng Zhang
,
Zonghui Wang
Prediction of urban human mobility using large-scale taxi traces and its applications.
Frontiers Comput. Sci. China
6 (1) (2012)
Wei Ke
,
Xiaoshan Li
,
Zhiming Liu
,
Volker Stolz
rCOS: a formal model-driven engineering method for component-based software.
Frontiers Comput. Sci. China
6 (1) (2012)
Zhiyuan Liu
,
Xinxiong Chen
,
Maosong Sun
Mining the interests of Chinese microbloggers via keyword extraction.
Frontiers Comput. Sci. China
6 (1) (2012)
Shaoying Liu
Formal engineering methods for software quality assurance.
Frontiers Comput. Sci. China
6 (1) (2012)
Tao Wang
,
Qingpeng Zhang
,
Zhong Liu
,
Wenli Liu
,
Ding Wen
On social computing research collaboration patterns: a social network perspective.
Frontiers Comput. Sci. China
6 (1) (2012)
volume 5, number 1, 2011
Xiaoqin Fan
,
Xianwen Fang
,
Zhijun Ding
Indeterminacy-aware service selection for reliable service composition.
Frontiers Comput. Sci. China
5 (1) (2011)
Conghua Zhou
,
Bo Sun
,
Zhifeng Liu
Abstraction for model checking multi-agent systems.
Frontiers Comput. Sci. China
5 (1) (2011)
volume 5, number 2, 2011
Wei Wang
,
Zhiliang Wang
,
Siyi Zheng
,
Xuejing Gu
Individual difference of artificial emotion applied to a service robot.
Frontiers Comput. Sci. China
5 (2) (2011)
Yansong Zhang
,
Shan Wang
,
Jiaheng Lu
Improving performance by creating a native join-index for OLAP.
Frontiers Comput. Sci. China
5 (2) (2011)
Wenfeng Yang
,
Yupu Hu
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions.
Frontiers Comput. Sci. China
5 (2) (2011)
Lei Han
,
Jiqiang Liu
,
Zhen Han
,
Xueye Wei
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.
Frontiers Comput. Sci. China
5 (2) (2011)
Lan Li
,
Wenjun Xiao
Psu: a novel low-latency constant-degree overlay network.
Frontiers Comput. Sci. China
5 (2) (2011)
Xibei Yang
,
Ming Zhang
Dominance-based fuzzy rough approach to an interval-valued decision system.
Frontiers Comput. Sci. China
5 (2) (2011)
Defa Hu
,
Qiaoliang Li
A simple fingerprinting scheme for large user groups.
Frontiers Comput. Sci. China
5 (2) (2011)
Bailing Liu
,
Feng Xiao
,
Ke Deng
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation.
Frontiers Comput. Sci. China
5 (2) (2011)
Ruixuan Li
,
Kunmei Wen
,
Xiwu Gu
,
Yuhua Li
,
Xiaolin Sun
,
Bing Li
Type-2 fuzzy description logic.
Frontiers Comput. Sci. China
5 (2) (2011)
Guojun Wang
,
Jie Wu
FlowTrust: trust inference with network flows.
Frontiers Comput. Sci. China
5 (2) (2011)
Eryun Liu
,
Heng Zhao
,
Fangfei Guo
,
Jimin Liang
,
Jie Tian
Fingerprint segmentation based on an AdaBoost classifier.
Frontiers Comput. Sci. China
5 (2) (2011)
Yehu Shen
Efficient normalized cross correlation calculation method for stereo vision based robot navigation.
Frontiers Comput. Sci. China
5 (2) (2011)
volume 5, number 3, 2011
Stephen F. Bush
nanoscale communication networks: utilizing an active network architecture.
Frontiers Comput. Sci. China
5 (3) (2011)
Xianchao Zhang
,
Quanzeng You
An improved spectral clustering algorithm based on random walk.
Frontiers Comput. Sci. China
5 (3) (2011)
Baojian Hua
Static typing for a substructural lambda calculus.
Frontiers Comput. Sci. China
5 (3) (2011)
Jun Xu
,
Xuehai Zhou
,
Feng Yang
Traceback in wireless sensor networks with packet marking and logging.
Frontiers Comput. Sci. China
5 (3) (2011)
Haizheng Yu
,
Jianfeng Ma
,
Hong Bian
Reasonable routing in delay/disruption tolerant networks.
Frontiers Comput. Sci. China
5 (3) (2011)
Yuzhong Sun
,
Yiqiang Zhao
,
Ying Song
,
Yajun Yang
,
Haifeng Fang
,
Hongyong Zang
,
Yaqiong Li
,
Yunwei Gao
Green challenges to system software in data centers.
Frontiers Comput. Sci. China
5 (3) (2011)
Xiubo Geng
,
Xueqi Cheng
Learning multiple metrics for ranking.
Frontiers Comput. Sci. China
5 (3) (2011)
Xudong Zhu
,
Zhijing Liu
Human behavior clustering for anomaly detection.
Frontiers Comput. Sci. China
5 (3) (2011)
Jiuyue Hao
,
Chao Li
,
Zhang Xiong
,
Ejaz Hussain
A temporal-spatial background modeling of dynamic scenes.
Frontiers Comput. Sci. China
5 (3) (2011)
Chao Lv
,
Hui Li
,
Jianfeng Ma
,
Meng Zhao
Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China
5 (3) (2011)
Defu Chen
,
Zhengsu Tao
An adaptive polling interval and short preamble media access control protocol for wireless sensor networks.
Frontiers Comput. Sci. China
5 (3) (2011)
Shaoying Liu
Pre-post notation is questionable in effectively specifying operations of object-oriented systems.
Frontiers Comput. Sci. China
5 (3) (2011)
volume 5, number 4, 2011
Kenli Li
,
Zhao Tong
,
Dan Liu
,
Teklay Tesfazghi
,
Xiangke Liao
A PTS-PGATS based approach for data-intensive scheduling in data grids.
Frontiers Comput. Sci. China
5 (4) (2011)
Wei Zhao
,
Ye San
RBF neural network based on q-Gaussian function in function approximation.
Frontiers Comput. Sci. China
5 (4) (2011)
Yanfang Ma
,
Min Zhang
,
Yixiang Chen
,
Liang Chen
Two-thirds simulation indexes and modal logic characterization.
Frontiers Comput. Sci. China
5 (4) (2011)
Yongjian Zhao
,
Boqiang Liu
,
Sen Wang
A robust extraction algorithm for biomedical signals from noisy mixtures.
Frontiers Comput. Sci. China
5 (4) (2011)
Mingfen Wu
Approximation operators based on vague relations and roughness measures of vague sets.
Frontiers Comput. Sci. China
5 (4) (2011)
Sheng Gao
,
Wenping Ma
,
Zepeng Zhuo
,
Fenghe Wang
On cross-correlation indicators of an S-box.
Frontiers Comput. Sci. China
5 (4) (2011)
Weimin Wang
,
Jingchun Zhang
,
Cong Cao
,
Tao Hou
,
Yue Liu
,
Keji Chen
An efficient approach to representing and mining knowledge from Qing court medical records.
Frontiers Comput. Sci. China
5 (4) (2011)
Shuguo Yang
Research on resource allocation for multi-tier web applications in a virtualization environment.
Frontiers Comput. Sci. China
5 (4) (2011)
Pu Huang
,
Zhenmin Tang
,
Cai-Kou Chen
,
Xintian Cheng
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition.
Frontiers Comput. Sci. China
5 (4) (2011)
Yutaka Okaie
,
Tadashi Nakano
Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation.
Frontiers Comput. Sci. China
5 (4) (2011)
Dongsheng Wang
Answering contextual questions based on ontologies and question templates.
Frontiers Comput. Sci. China
5 (4) (2011)
Zijian Guo
,
Wenyuan Wang
,
Guolei Tang
,
Jun Huang
A recursive model for static empty container allocation.
Frontiers Comput. Sci. China
5 (4) (2011)
Xixiang Lv
,
Hui Li
,
Baocang Wang
Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China
5 (4) (2011)
Wei Wang
Certifying assembly programs with trails.
Frontiers Comput. Sci. China
5 (4) (2011)