


default search action
FCST 2007: Wuhan, China
- Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2007, Wuhan, China, 1-3 November, 2007. IEEE Computer Society 2007, ISBN 978-0-7695-3036-9

- Guojun Wang, Qingjun Mo, Minyi Guo, Weijia Jia:

Designing Piecewise QoS Routing Protocol in Large-Scale MANETs. 1-6 - Mianxiong Dong

, Shinji Watanabe, Minyi Guo:
Performance Evaluation to Optimize the UMP System Focusing on Network Transmission Speed. 7-12 - Haiguang Chen, Huafeng Wu, Xiu Cao, Chuanshan Gao:

Trust Propagation and Aggregation in Wireless Sensor Networks. 13-20 - Song Wu, Li Qi, Hai Jin, Heng He:

Research on Architecture of Grid-Based Simulation Platform. 21-28 - Gongye Zhou, Qiuju Lan, Jincai Chen:

A Dynamic Metadata Equipotent Subtree Partition Policy for Mass Storage System. 29-34 - Mo Sha

, Ming Chen, Yuebin Bai, Boliang Chen, Xiaocong Wang:
A Prototype for Active Service System. 35-40 - Fang Wang, Yinliang Yue, Dan Feng, Juang Wang, Peng Xia:

High Availability Storage System Based on Two-Level Metadata Management. 41-48 - Wenyu Qu, Masaru Kitrsregawa, Keqiu Li:

Probabilistic Access Allocation of Disk Files for Energy-Efficient Server Systems. 49-56 - Hitoshi Oi

:
A Case Study: Performance Evaluation of a DRAM-Based Solid State Disk. 57-60 - Hongwei Lu, Bailing Liu:

Improved Policy Database System for Protecting Possession Sensitive Attributes in Automated Trust Negotiation. 61-66 - Zaobin Gan, Jiufei Tang, Ping Wu, Vijay Varadharajan

:
A Novel Security Risk Evaluation for Information Systems. 67-73 - Gang Tu, Junlin Li, Fumin Yang:

Adaptable Scheduling Framework for Window-Based Real-Time Constraints. 74-79 - Xiaogang Zhao, Changsheng Xie, Haiwei Wang:

The Research about Containment the Radial Error Propagation in Self-Servowriting in Hard Disk. 80-85 - Zhiyuan Zeng, Juan Zhao

, Xu Bin:
An Outward-Appearance Patent-Image Retrieval Approach Based on the Contour-Description Matrix. 86-89 - Hong Zhu

, Jing Cheng, Renchao Jin
, Kevin Lü
:
Executing Query over Encrypted Character Strings in Databases. 90-97 - Masaki Hasegawa, Subhash Bhalla

, Tomoko Izumita:
A High-Level Query Interface for Web User's Access to Data Resources. 98-105 - Masaki Hasegawa, Subhash Bhalla

, Tomoko Izumita:
A User Oriented Query Interface for Web-Based Geographic Information Systems. 106-113 - Jingning Liu, Wanli Peng, Fang Wang, Yinliang Yue:

SDBIA: A Novel Approach to Improve the Reading Performance of Large Objects for Object-Based Storage Device. 114-118 - Wenqi Huang, Kun He:

A New Quasi-Human Algorithm for the Strongly Heterogeneous Container Loading Problem. 119-124 - Shangqin Xiao, Hefei Ling, Fuhao Zou, Zhengding Lu:

Adaptive Image Watermarking Algorithm in Contourlet Domain. 125-130 - Guohui Li, Jun Xiang, Bing Yang, Hui Hui Chen:

Scheduling Algorithm of Update Transactions and Quality of Service Management Based on Derived Data in Real-Time and Mobile Database Systems. 131-138 - Min Sun, Mei Li, Feizhou Zhang, Zhipeng Wang, Daozheng Wu:

Hybrid Tracking for Augmented Reality GIS Registration. 139-145 - Hiroyuki Kobayashi, Qiangfu Zhao:

Face Detection Based on LDA and NN. 146-154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














