Volume 1,
Number 1,
February 2007
- Wenjun Wu, Xiaoshan Gao:
Mathematics mechanization and applications after thirty years.
1-8
- Jifeng He, Huibiao Zhu, Geguang Pu:
A model for BPEL-like languages.
9-19
- Ninghui Sun, Dan Meng:
Dawning4000A high performance computer.
20-25
- Jigui Sun, Minghao Yin:
Recognizing the agent's goals incrementally: planning graph as a basis.
26-36
- Gheorghe Paun:
A quick overview of membrane computing with some details about spiking neural P systems.
37-49
- Donggang Cao, Hong Mei, Minghui Zhou:
Supporting crosscutting concern modelling in software architecture design.
50-57
- Qun Liu, Xiangdong Wang, Hong Liu, Le Sun, Sheng Tang, Deyi Xiong, Hongxu Hou, Yuanhua Lv, Wenbo Li, Shouxun Lin, Yueliang Qian:
HTRDP evaluations on Chinese information processing and intelligent human-machine interface.
58-93
- Xuejun Yang, Huizhan Yi, Xiangli Qu, Haifang Zhou:
Compiler-directed power optimization of high-performance interconnection networks for load-balancing MPI applications.
94-105
- Réjean Plamondon, Xiaolin Li, Moussa Djioua:
Extraction of delta-lognormal parameters from handwriting strokes.
106-113
- Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao:
P2P worm detection based on application identification.
114-122
Volume 1,
Number 2,
May 2007
- Yuanyan Tang:
Remarks on different reviews of Chinese character recognition.
123-125
- Ruwei Dai, Chenglin Liu, Baihua Xiao:
Chinese character recognition: history, status and prospects.
126-136
- Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball:
Offline Chinese handwriting recognition: an assessment of current technology.
137-155
- Yunquan Zhang, Guoliang Chen, Guangzhong Sun, Qiankun Miao:
Models of parallel computation: a survey and classification.
156-165
- Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics.
166-179
- Tielin Liang, Dongming Wang:
On the design and implementation of a geometric-object-oriented language.
180-190
- Kaile Su, Yinyin Xiao, Qingliang Chen, Han Lin:
Semantic interpretation of compositional logic in instantiation space.
191-199
- Hai Jin, Chuanjiang Yi:
CMM: Credential migration management system based on trusted computing in CGSP.
200-207
- Renfa Li, Yunlong Xie, Jigang Wen, Guangxue Yue:
EMMP: a highly efficient membership management protocol.
208-212
- Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou:
SONNET: subscription using path queries over structured overlay networks.
213-225
- Weiguo Zhang, Mian Cai, Guozhen Xiao:
On constructing disjoint linear codes.
226-230
- Xuejun Yang, Panfeng Wang, Yunfei Du, Haifang Zhou:
A data-distributed parallel algorithm for wavelet-based fusion of remote sensing images.
231-240
- Chuanbo Chen, Yunping Zheng, Mudar Sarem:
A mesh-based automatic in-betweening algorithm in computer-assisted animation.
241-245
Volume 1,
Number 3,
July 2007
- Guilu Long, Yang Liu:
Search an unsorted database with quantum mechanics.
247-271
- YuZhong Zhao, Yun Xu, Qiangfeng Zhang, Guoliang Chen:
An overview of the haplotype problems and algorithms.
272-282
- Shilong Ma, Yuefei Sui, Ke Xu:
Well limit behaviors of term rewriting systems.
283-296
- Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Cheng Liu, Zhifang Wang:
A pointer logic and certifying compiler.
297-312
- Shi Zhang, Linpeng Huang:
Research on dynamic update transaction for Java classes.
313-321
- Keqing He, Liang Peng, Rong Peng, Bing Li, Jing Liu:
Requirement emergence computation of networked software.
322-328
- Yuanzhuo Wang, Chuang Lin, Yang Yang, Zhiguang Shan:
Performance analysis of a dependable scheduling strategy based on a fault-tolerant grid model.
329-337
- Jianjin Jiang, Guangwen Yang:
An optimal replication strategy for data grid systems.
338-348
- Lingfang Zeng, Dan Feng, Hong Jiang:
High TPO/TCO for data storage: policy, algorithm and early practice.
349-360
- Hui Wei:
A hierarchical model for structure learning based on the physiological characteristics of neurons.
361-372
Volume 1,
Number 4,
October 2007
- Ying Jiang, Guo-Qiang Zhang:
Weakly distributive domains (II).
373-384
- Dengguo Feng, Chuankun Wu:
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
385-396
- Teijiro Isokawa, Shin'ya Kowada, Ferdinand Peper, Naotake Kamiura, Nobuyuki Matsui:
Online isolation of defects in cellular nanocomputers.
397-406
- Shuicheng Yan, Huan Wang, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang:
Ranking with uncertain labels and its applications.
407-412
- Tiejun Zhao, Yi Guan, Ting Liu, Qiang Wang:
Recent advances on NLP research in Harbin Institute of Technology.
413-428
- Limin Wang, Xuecheng Wang, Xiongfei Li:
Inference and learning in hybrid probabilistic network.
429-435
- Yijiao Yu, Hai Jin:
Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach.
436-449
- Kai Nan, Jianjun Yu, Hao Su, Shengmin Guo, Hui Zhang, Ke Xu:
Towards structural Web Services matching based on Kernel methods.
450-458
- Yingxin Guo, Ke Xu:
An improved algorithm for finding community structure in networks with an application to IPv6 backbone network.
459-467
- Cheqing Jin, Aoying Zhou, Jeffrey Xu Yu, Joshua Zhexue Huang, Feng Cao:
Adaptive scheduling for shared window joins over data streams.
468-477
- Lingfang Zeng, Dan Feng, Zhan Shi, Jianxi Chen, Qingsong Wei, Zhixiang Li:
A high-speed and low-cost storage architecture based on virtual interface.
478-492
- Dong Xie, Luming Yang:
Study on consistent query answering in inconsistent databases.
493-501
Copyright © Fri Mar 12 17:27:34 2010
by Michael Ley (ley@uni-trier.de)