


default search action
FCST 2009: Shanghai, China
- Fourth International Conference on Frontier of Computer Science and Technology, FCST 2009, Shanghai, China, 17-19 December, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3932-4

- Jianjiang Li, Lin Yan, Dan Hei, Lei Zhang:

One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth Migration. 3-8 - Xingang Wang, Yue Hu, Bin Cheng, Weiqin Tong:

A Study on the Preprocessing of MLFMA Parallel Computation. 9-13 - Zhiqiang Liu, Junqiang Song, Kaijun Ren, Fen Xu, Xiaoling Qu:

A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore Systems. 14-21 - Bin Cheng, Xingang Wang, Ying Li, Weiqing Tong:

Formal Approach for Performance Analysis Oriented Parallel System Design. 22-26 - Yaobin Wang, Hong An, Jie Yan, Qi Li, Wenting Han, Li Wang, Gu Liu:

Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications. 27-32 - Gu Liu, Hong An, Wenting Han, Guang Xu, Ping Yao, Mu Xu, Xiurui Hao, Yaobin Wang:

A Program Behavior Study of Block Cryptography Algorithms on GPGPU. 33-39 - Weijiang Liu, Wenyu Qu, Hong Ye, Zhaobin Liu, Keqiu Li:

A Resource-Efficient System for Measuring Flow Length Distribution. 40-44 - Bin Wu, Shengqi Yang, Haizhou Zhao, Bai Wang:

A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduce. 45-51 - Xiaoshuang Xia, Yi Liu, Yunbin Wang, Tengfei Mu:

Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems. 52-58 - Jinbo Du, Hao-peng Chen, Can Zhang:

A Heuristic Approach with Branch Cut to Service Substitution in Service Orchestration. 59-67 - Bo Li, Koichi Wada:

Communication Latency Tolerant Parallel Algorithm for Particle Swarm Optimization. 68-74 - Yi Shao, Liehui Jiang, Qiuxia Zhao, Yuliang Wang:

High Performance and Parallel Model for LU Decomposition on FPGAs. 75-79 - Keqin Li:

A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular Networks. 80-85 - Songqiao Han

, Yong Zhang:
Performance Evaluation of Mobile Service Design Paradigm in Ubiquitous Computing Environments. 89-95 - Long Zheng, Mianxiong Dong

, Hai Jin, Minyi Guo, Li Li:
An Improved Approach to Tag Reduction on Low Power CMP with Trade-Off of Energy and Performance. 96-102 - Wen Zhao, Xueyang Liu, Xinpeng Li, Dianxing Liu, Shikun Zhang:

Research on Hierarchical P2P Based RFID Code Resolution Network and Its Security. 103-111 - Jiangfeng Li, Chenxi Zhang:

A Decentralized Cooperative Autonomic Management Model in Grid Systems. 112-118 - Lili Shi, Shoubao Yang, Liangmin Guo, Bin Wu:

A Markov Chain Based Resource Prediction in Computational Grid. 119-124 - Yuqiong Xu, Shijian Li, Gang Pan:

ScudOSGi: Enabling Facility-Involved Task Migration in OSGi Framework. 125-131 - Tomohiro Sugahara, Masato Honda, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:

Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part One. 135-141 - Tatsuya Sakuma, Masato Honda, Tomohiro Sugahara, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:

Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part Two. 142-148 - Masayuki Moriguchi, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:

Network-Based Data Flow Processing System with Variable Data Granularity for Inter-module Communication. 149-155 - Ying Li, Chengchen Ge, Weiqin Tong, Bin Cheng, Xiaoli Zhi:

The Application of the Adaptive Multi-mode Interactive Interface Based on Embedded Equipments. 156-160 - Lianlai Wang, Peitao Wang, Yujun Zheng:

Emergency Software Maintenance for Individual Industrial Equipments. 161-167 - Hui-Ya Li, Cheng-Tsun Yang, Wen-Jyi Hwang:

Efficient VLSI Architecture for Fuzzy C-Means Clustering in Reconfigurable Hardware. 168-174 - Willy Yanthy, Takayuki Sekiya, Kazunori Yamaguchi

:
Mining Interesting Rules by Association and Classification Algorithms. 177-182 - Jia Liu, Yongwei Wu, Guangwen Yang:

Optimization of Data Retrievals in Processing Data Integration Queries. 183-189 - Youyou Lu, Zhuzhong Qian, Sanglu Lu:

A Tree-Based Hierarchy Framework for RFID Data Repository. 190-196 - Wei Liu, Wei Du:

Reputation-Aware Scheduling for Storage Systems in Data Grids. 197-202 - Suzhen Wu, Dan Feng, Bo Mao:

CWC: Compressed Write Cache for Improving Storage System Performance. 203-209 - Tingting Wang, Jinkui Xie, Bei Jin, Zongyuan Yang:

Combinatorial Auctions Based Network Resource Allocation Mechanism with High Welfare. 213-218 - Suke Li, Liyong Tang, Jian-bin Hu, Zhong Chen:

Automatic Data Extraction from Web Discussion Forums. 219-225 - Jing Cao:

Flexible Data Collecting over Distributed Sensors on Enterprise Service Bus. 226-230 - Tao Hu, Song Guo

, Minyi Guo, Feilong Tang, Mianxiong Dong
:
Analysis of the Availability of Composite Web Services. 231-237 - Leming Qu:

Wavelet Image Restoration and Regularization Parameters Selection. 241-247 - Chengzhi Deng, Hui Sun, Xi Chen:

Shearlet-Based Adaptive Bayesian Estimator for Image Denoising. 248-253 - Xi Chen, Hui Sun, Chengzhi Deng:

Image Denoising Algorithm Using Adaptive Shrinkage Threshold Based on Shearlet Transform. 254-257 - Zusheng Zhang, Fengqi Yu, Baoli Zhang:

A Depth-Based TDMA Scheduling for Clustering Sensor Networks. 261-266 - Yang Wang, Xiong Fu, Liusheng Huang:

A Storage Node Placement Algorithm in Wireless Sensor Networks. 267-271 - Daidi Lin, Shining Li:

TCLA: A Triangular Cross-Layer Architecture for Wireless Sensor Networks. 272-278 - Liang He, Jingdong Xu, Yuntao Yu, Boxing Liu:

Optimizing the Path-Points Identification for Data Mules in Mobile WSNs. 279-284 - Huakang Li, Long Zheng, Jie Huang, Chunlei Zhao, Qunfei Zhao:

Mobile Robot Position Identification with Specially Designed Landmarks. 285-291 - Yao Shen, Feilong Tang, Minyi Guo, Song Guo

:
A Realistic Interference Model in Ad Hoc Networks. 292-297 - Changde Li, Xingshe Zhou, Yuying Wang, Yunwei Dong:

An Improved Path-Based Reliability Prediction Model for Component-Based Embedded Software. 301-307 - Nan Wang, Jizhong Han

, Yonghao Zhou, Jinyun Fang:
CURRF: A Code-Based Framework for Faithful Replay Distributed Applications. 308-316 - Xutao Du, Chunxiao Xing

, Lizhu Zhou:
A Chu Spaces Semantics of BPEL-Like Fault Handling. 317-323 - Aruna Jamdagni, Zhiyuan Tan

, Priyadarsi Nanda, Xiangjian He
, Ren Liu:
Intrusion Detection Using Geometrical Structure. 327-333 - Longjun Zhang:

Analysis and Research on the Security Key Technology of Grid. 334-338 - Junfeng Tian, Peng Yuan, Yuzhen Lu:

Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid. 339-345 - Renren Dong, Ray Kresman:

Indirect Disclosures in Data Mining. 346-350 - Ilsun You, Kouichi Sakurai, Yoshiaki Hori:

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6. 351-355 - HaiQin Xu, Yongsheng Ding:

Optimizing Method for Analog Circuit Design Using Adaptive Immune Genetic Algorithm. 359-363 - Ismail Yusuf

, Nanna Suryana Herman
, Siti Mariyam Hj. Shamsuddin:
The Application of Genetic Algorithm into Membership Function FLC Used Floating Point. 364-370 - Dao-Lei Liang, Jian Jin, Guo-Xing Huang:

A Fuzzy Clustering Algorithm with Effectiveness Factor. 371-376 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication System. 377-381

- Laila Mohamed El Fangary

:
Mining Data of Buffalo and Cow Production in Egypt. 382-387 - Jacek Kubacki, Leszek Koszalka, Iwona Pozniak-Koszalka, Andrzej Kasprzak:

Comparison of Heuristic Algorithms to Solving Mesh Network Path Finding Problem. 388-392 - Guanqun Liang, Huanye Sheng:

A Chinese Health Care Reform Simulation Method Based on Mechanism Design. 393-398 - Yuxin Deng, Wenjie Du:

A Local Algorithm for Checking Probabilistic Bisimilarity. 401-407 - Jing Yang:

A Framework for Formalizing UML Models with Formal Language Rcos. 408-416 - Jing Yang:

Analyzing UML Sequence Diagrams with UTP. 417-423 - Sattar Hashemi

, M. R. ZadMiralvad:
Automatic Refinement of Platform Independent Models Using Graph Transformation System. 424-428 - Lizhi Cai, Weiqin Tong, Bin Zhu, Juan Zhang:

Modeling Software Testing Process Using HTCPN. 429-434 - Tingtao Sun, Yindong Yang, Hongbo Yang, Haibing Guan, Alei Liang:

Return Instruction Analysis and Optimization in Dynamic Binary Translation. 435-440 - Abbas Vafaei

, M. Miralipoor:
Structure and Parameter Learning of CDHMM Based on Reduction. 441-445 - F. Taghizadeh, S. R. Taghizadeh:

A Graph Transformation-Based Approach for Applying MDA to SOA. 446-451 - JiZhe Li, Yongjun Yuan:

Research & Implementation of Lightweight ESB with Microsoft .NET. 455-459 - Haifeng Ling, Xianzhong Zhou, Yujun Zheng:

Design and Implementation of DSL via Category Theoretic Computations. 460-466 - Dong Li, Youli Lu:

Design and Implementation of Integrated Transport Network Planning Evaluation System Based on GIS. 467-472 - Kaihua Xu, Jun Zhou, Yuhua Liu, Shuyun Dong:

Signal Integrity Research of High Speed Circuit of Embedded System. 473-477 - Chorng-Shiuh Koong, Hung-Jui Lai, Kuan-Chou Lai:

An Embedded Software Architecture for Robot with Variable Structures. 478-484 - Xiaona Xia, Baoxiang Cao, Jiguo Yu

:
The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric System. 485-491 - Bicheng Li, Huang Jie, Hujun Yin:

A General Fuzzy Modeling Approach to Detection Decision Fusion. 495-501 - Bing Sun, Guohui Zhou:

A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular Parts. 502-509 - Tingting Zhou, Samuel K. F. Yung, Zhenghua Wang, Yunping Zhu:

A New Recursive Approach for Reconstructing Metabolic Networks from KEGG. 510-515 - Ranxiao Frances Wang:

A Case Study on Human Learning of Four-Dimensional Objects in Virtual Reality: Passive Exploration and Display Techniques. 519-523 - Chunxin Lia, Chaojun Lu:

Extending BPEL to Model Business Processes Involving Human Activities. 524-529 - Dong Li, Youli Lu:

Design and Implementation of Online Classroom Real-Time Generating and On-Demand System. 530-536 - Bofeng Zhang, Tiezheng Zou, Yongjun Wang, Baokang Zhang:

Remote Operation System Detection Base on Machine Learning. 539-542 - Yuxiang Hu, Julong Lan, Chengwei Wan:

An Algorithm for Unsplittable Flow Problem in Flexible Reconfigurable Network. 543-547 - Yanxiang He, Tao Liu, Hai Zhong, Qi Xiong:

EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks. 548-552 - Weimin Luo, Jing Liu, Jingbo Liu, Chengyu Fan:

An Exact Model for Active P2P Worms Propagation. 553-558 - Yongsheng Liu, Jie Li

:
Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks. - Huang Lu

, Jie Li
, Guojun Wang:
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks. 565-570 - Chengwei Wan, Julong Lan, Yuxiang Hu:

Lookup with CAM Aided Hash Table. 571-575 - Yang Li, Chengwei Wan, Xiumei Fan:

Range Matching without TCAM Entries Expansion for Packet Classification. 576-580 - Yipin Sun, Baokang Zhao, Jinshu Su

:
ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications. 581-586 - Yan Xia, Zhenghu Gong, Baokang Zhao, Jinshu Su

:
A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks. 587-592 - Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang:

Research on Trust Evaluation Model Based on TPM. 593-597 - Miao Yu, Peijie Yu, Shang Gao, Qian Lin, Min Zhu, Zhengwei Qi:

HBSP: A Lightweight Hardware Virtualization Based Framework for Transparent Software Protection in Commodity Operating Systems. 601-606 - Ahmad Iqbal, Daisuke Horie, Yuichi Goto

, Jingde Cheng:
A Database System for Effective Utilization of ISO/IEC 27002. 607-612 - Guiping Dai, Yong Wang:

Trust-Aware Component Service Selection Algorithm in Service Composition. 613-618 - Yuichi Goto

, Jingde Cheng:
Information Assurance, Privacy, and Security in Ubiquitous Questionnaire. 619-624 - Shoichi Morimoto:

Application of COBIT to Security Management in Information Systems Development. 625-630 - Menglong Jiang, Zhengwei Qi, Haibing Guan, Anil Kumar Karna:

Croth: Effective Process Protection and Monitoring with Hardware Virtualization. 633-638 - Dan Li, Yingsong Hu, Xiangxiao Hu, Hefei Ling:

Self-Checking Tamper-Proofing Based on Software Behavior Model. 639-643 - Hui Wang, Guoping Zhang, Huiguo Chen, Xueshu Jiang:

Mining Association Rules for Intrusion Detection. 644-648 - Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:

Decoupling Dynamic Test Generation from Specific Operating System Details Based on Whole System Virtual Machine. 649-654 - Yongqin Huang:

DFHR: A Design Framework for HPC Reliability. 655-660 - Honghao Zhang, Guang Jin, Wei Wei, Fei Zhang, Huizhan Zhang, Zhijun Xie

:
ASTVA: Traffic Validation Architecture Based on Autonomous Systems. 661-665 - Chuan-xiang Ma, Ze-ming Fang, Rui Chen:

An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules Mining. 666-671 - Jun-Zhao Sun, Jiehan Zhou

:
A CFSM-Based Reprogramming Scheme for Flexible Wireless Sensor Networks. 675-680 - Xiaoyang Liu, Cai Fu, Jiandong Yang, Lansheng Han:

Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes. 681-685 - Jiehan Zhou

, Jukka Riekki
, Jun-Zhao Sun:
Pervasive Service Computing toward Accommodating Service Coordination and Collaboration. 686-691 - Hongyan Mao, Ningkang Jiang, Qin Li, Huibiao Zhu:

Formal Approaches to SMS Service Based on Pi Calculus. 692-697 - Iván Sánchez Milara

, Oleg Davidyuk, Jukka Riekki
:
Towards User-Oriented Application Composition. 698-704 - Jiehan Zhou

, Jun-Zhao Sun, Mika Rautiainen, Oleg Davidyuk, Meirong Liu, Ekaterina Gilman
, Xiang Su, Mika Ylianttila
, Jukka Riekki
:
PSC-RM: Reference Model for Pervasive Service Composition. 705-709 - Linyang Sheng, Liming Zhang:

The Implementation and Design of Electronic Bag Based on ARM. 710-714 - Songhua Huang, Heng Wang, Feng Ding:

Configure Care-of Address for Nested Network Mobility. 717-721 - Jing Jin, Zhiguang Qin, Hu Xiong, Juan Wang, Zhigang Wu:

DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets. 722-727 - Haigang Gong, Xue Zhang, Lingfei Yu, Xiaomin Wang, Fasheng Yi:

A Study on MAC Protocols for Wireless Sensor Networks. 728-732 - Xiaomin Wang, Chao Song:

A Distributed Cluster-Based Algorithm in Wireless Sensor Networks. 733-737

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














