


default search action
Journal of Computer Science and Technology, Volume 20
Volume 20, Number 1, January 2005
- Zhiwei Xu:

Preface. 1-2 - Benjamin W. Wah, Zhe Wu:

Penalty Formulations and Trap-Avoidance Strategies for Solving Hard Satisfiability Problems. 3-17 - Jian-Er Chen:

Parameterized Computation and Complexity: A New Approach Dealing with NP-Hardness. 18-37 - Xiaowei Li, Guanghui Li, Ming Shao:

Formal Verification Techniques Based on Boolean Satisfiability Problem. 38-47 - Zhi-Hua Zhou, Yang Yu:

Adapt Bagging to Nearest Neighbor Classifiers. 48-54 - Shan Wang, Kunlong Zhang:

Searching Databases with Keywords. 55-62 - Joong Hyuk Chang, Won Suk Lee:

Effect of Count Estimation in Finding Frequent Itemsets over Online Transactional Data Streams. 63-69 - David Zhang

, Guangming Lu, Adams Wai-Kin Kong, Michael Wong:
Online Palmprint Identification System for Civil Applications. 70-76 - Ligang Liu, Bo Zhang, Baining Guo, Heung-Yeung Shum:

Polygonal Shape Blending with Topological Evolutions. 77-89 - Ling Zhang, Bo Zhang:

A Quotient Space Approximation Model of Multiresolution Signal Analysis. 90-94 - Huimin Lin:

Predicate µ-Calculus for Mobile Ambients. 95-104 - Wen Gao, Lionel M. Ni, Zhiwei Xu, Shing-Chi Cheung

, Li Cui, Qiong Luo
:
BLOSSOMS: Building Lightweight Optimized Sensor Systems on a Massive Scale. 105-177 - Swapan Bhattacharya, Anirban Banerjee, Shibdas Bandyopadhyay:

CORBA-Based Analysis of Multi Agent Behavior. 118-124 - Xiaobing Feng, Li Chen, Yi-Ran Wang, Xiao-Mi An, Lin Ma, Chun-Lei Sang, Zhaoqing Zhang:

Integrating Parallelizing Compilation Technologies for SMP Clusters. 125-133 - Changjun Jiang, Zhaohui Zhang, Guosun Zeng, Hongzhong Chen, Duoqian Miao, Yu Fang, Xiaofeng Tao, Qing Zhi, Feng Yue, Yang Luo, Anqing Zhou, Lin Chen, Lei Liu:

Urban Traffic Information Service Application Grid. 134-140 - Andrew A. Chien, Xian-He Sun, Zhiwei Xu:

Viewpoints on Grid Standards. 141-143 - Jian Pei:

Book Review on "Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists". 144-145
Volume 20, Number 2, March 2005
- Xiaowei Li:

Perface. 145 - Dian Zhou, Ruiming Li:

Design and Verification of High-Speed VLSI Physical Design. 147-165 - Ozgur Sinanoglu

, Alex Orailoglu:
Efficient RT-Level Fault Diagnosis. 166-174 - Li Shen:

VFSim: Concurrent Fault Simulation at Register Transfer Level. 175-186 - Xiaoqing Wen, Hideo Tamamoto, Kewal K. Saluja, Kozo Kinoshita:

Fault Diagnosis of Physical Defects Using Unknown Behavior Model. 187-194 - Jean Marc Gallière, Michel Renovell, Florence Azaïs, Yves Bertrand:

Delay Testing Viability of Gate Oxide Short Defects. 195-200 - Yinhe Han, Xiaowei Li, Huawei Li

, Anshuman Chandra:
Test Resource Partitioning Based on Efficient Response Compaction for Test Time and Tester Channels Reduction. 201-209 - Terumine Hayashi, Haruna Yoshioka, Tsuyoshi Shinogi, Hidehiko Kita, Haruhiko Takase:

On Test Data Compression Using Selective Don't-Care Identification. 210-215 - Abdil Rashid Mohamed, Zebo Peng, Petru Eles:

A Wiring-Aware Approach to Minimizing Built-In Self-Test Overhead. 216-223 - Yici Cai, Jin Shi, Zuying Luo, Xianlong Hong:

Modeling and Analysis of Mesh Tree Hybrid Power/Ground Networks with Multiple Voltage Supply in Time Domain. 224-230 - Hailong Yao, Yici Cai, Qiang Zhou, Xianlong Hong:

Crosstalk-Aware Routing Resource Assignment. 231-236 - Yinshui Xia, Lun-Yao Wang, A. E. A. Almaini:

A Novel Multiple-Valued CMOS Flip-Flop Employing Multiple-Valued Clock. 237-242 - Weiwu Hu, Fuxin Zhang, Zusong Li:

Microarchitecture of the Godson-2 Processor. 243-249 - Masayuki Hirayama, Osamu Mizuno

, Tohru Kikuno:
Analysis of Software Test Item Generation - Comparison Between High Skilled and Low Skilled Engineers. 250-257 - Shundong Li, Yiqi Dai:

Secure Two-Party Computational Geometry. 258-263 - Lei Hu, Jun-Wu Dong, Dingyi Pei:

Implementation of Cryptosystems Based on Tate Pairing. 264-269 - Qianhong Wu, Bo Qin, Yumin Wang:

Extended Methodology of RS Design and Instances Based on GIP. 270-275 - Yun Li, Keping Long, Weiliang Zhao, Feng-Rui Yang:

RWBO(pdw): A Novel Backoff Algorithm for IEEE 802.11 DCF. 276-281 - Yong Peng, Shiduan Cheng, Junliang Chen:

RSAD: A Robust Distributed Contention-Based Adaptive Mechanism for IEEE 802.11 Wireless LANs. 282-288
Volume 20, Number 3, May 2005
- Hai Zhuge, Xiang-Feng Luo:

Knowledge Map: Mathematical Model and Dynamic Behaviors. 289-295 - JuHum Kwon, Chee-Yang Song, Chang-Joo Moon

, Doo-Kwon Baik:
Bridging Real World Semantics to Model World Semantics for Taxonomy Based Knowledge Representation System. 296-308 - Cai-Yan Jia, Xie-Ping Gao:

Multi-Scaling Sampling: An Adaptive Sampling Method for Discovering Approximate Association Rules. 309-318 - Menq-Wen Lin, K. Robert Lai

, Ting-Jung Yu:
Fuzzy Constraint-Based Agent Negotiation. 319-330 - Huaping Zhang

, Jian Sun, Bing Wang, Shuo Bai:
Computation on Sentence Semantic Distance for Novelty Detection. 331-337 - Yu Sun, Yuefei Sui, Youming Xia:

Logical Sentences as the Intent of Concepts. 338-344 - Hong Gao, Jianzhong Li:

Parallel Data Cube Storage Structure for Range Sum Queries and Dynamic Updates. 345-356 - Dun-Ren Che:

Accomplishing Deterministic XML Query Optimization. 357-366 - Sheng-En Li, Shan Wang:

Semi-Closed Cube: An Effective Approach to Trading Off Data Cube Size and Query Response Time. 367-372 - Guoren Wang, Xiaolin Zhang:

Declarative XML Update Language Based on a Higher Data Model. 373-377 - Jie Yang, Mohammed Al-Rawi

:
Illumination Invariant Recognition of Three-Dimensional Texture in Color Images. 378-388 - Chen-Dong Xu, Fa-Lai Chen:

Blending Canal Surfaces Based on PH Curves. 389-395 - Hong Chen, Ling Chen, Gencai Chen:

Effects of Local-Lag Mechanism on Task Performance in a Desktop CVE System. 396-401 - Nadir Farah

, Labiba Souici
, Mokhtar Sellami
:
Arabic Word Recognition by Classifiers and Context. 402-410 - Xiangqian Wu, Kuanquan Wang, David Zhang

:
Wavelet Energy Feature Extraction and Matching for Palmprint Recognition. 411-418 - Junzhou Huang

, Tieniu Tan, Li Ma, Yunhong Wang:
Phase Correlation Based Iris Image Registration Model. 419-425 - Yangli Wang, Chengke Wu:

Complete Multiple Description Mesh-Based Video Coding Scheme and Its Performance. 426-431
Volume 20, Number 4, July 2005
- Ying Xu, Liming Cai, Zhiping Weng:

Preface. 433 - Liang Chen, Hongyu Zhao

:
Integrating mRNA Decay Information into Co-Regulation Study. 434-438 - Peter M. Haverty, Zhiping Weng, Ulla Hansen

:
Transcriptional Regulatory Networks Activated by PI3K and ERK Transduced Growth Signals in Human Glioblastoma Cells. 439-445 - Heng Li, Jin-Song Liu, Zhao Xu, Jiao Jin, Lin Fang, Lei Gao, Yu-Dong Li, Zi-Xing Xing, Shao-Gen Gao, Tao Liu, Hai-Hong Li, Yan Li, Li-Jun Fang, Hui-Min Xie, Wei-Mou Zheng, Bailin Hao:

Test Data Sets and Evaluation of Gene Prediction Programs on the Rice Genome. 446-453 - Yinglei Song, Jizhen Zhao, Chunmei Liu, Kan Liu, Russell L. Malmberg, Liming Cai:

RNA Structural Homology Search with a Succinct Stochastic Grammar Model. 454-464 - Xiu-Feng Wan, Dong Xu:

Intrinsic Terminator Prediction and Its Application in Synechococcus sp. WH8102. 465-482 - Bo Yan, Youxing Qu, Fenglou Mao, Victor Olman, Ying Xu:

PRIME: A Mass Spectrum Data Mining Tool for De Nova Sequencing and PTMs Identification. 483-490 - Zhike Zi

, Zhirong Sun:
Robustness Analysis of the IFN-y Induced JAK-STAT Signaling Pathway. 491-495 - Su Feng:

Mechanizing Weakly Ground Termination Proving of Term Rewriting Systems by Structural and Cover-Set Inductions. 496-513 - Guang-Ping Qin, Jin-Zhao Wu:

Action Refinement for Real-Time Concurrent Processes with Urgency. 514-525 - Jianmin Pang, Paul Callaghan, Zhaohui Luo:

LFTOP: An LF-Based Approach to Domain-Specific Reasoning. 526-535 - Ping Hou:

Some Representation Theorems for Recovering Contraction Relations. 536-541 - Huaimin Wang, Yufeng Wang, Yang-Bin Tang:

StarBus+: Distributed Object Middleware Practice for Internet Computing. 542-551 - Xiaojun Wan, Yuxin Peng:

A New Retrieval Model Based on TextTiling for Document Similarity Search. 552-558 - Shengzhi Du

, Zengqiang Chen, Zhuzhi Yuan:
Evolutionary Pseudo-Relaxation Learning Algorithm for Bidirectional Associative Memory. 559-566 - Hui Wei, Shang-Min Luan:

Ganglion-Based Balance Design of Multi-Layer Model and Its Watchfulness-Keeping. 567-573 - Xiaoping Sun, Qing Li:

The Knowledge Grid. 574
Volume 20, Number 5, September 2005
- Pen-Chung Yew

, Jingling Xue
:
Forword. 575-576 - Ruby B. Lee, Xiao Yang, Zhijie Shi:

Single-Cycle Bit Permutations with MOMR Execution. 577-585 - Philip Machanick

:
The Value of a Small Microkernel for Dreamy Memory and the RAMpage Memory Hierarchy. 586-595 - Ying Chen, Karthik Ranganathan, Vasudev V. Pai, David J. Lilja, Kia Bazargan:

A Novel Memory Structure for Embedded Systems: Flexible Sequential and Random Access Memory. 596-606 - Cheol Kim, Sung Chung, Chu Shik Jhon:

A Power-Aware Branch Predictor by Accessing the BTB Selectively. 607-614 - Yong Xiao, Xing-Ming Zhou:

Performance Evaluation of Data Value Prediction Schemes. 615-623 - Sebastian Wallner:

Micro-Task Processing in Heterogeneous Reconfigurable Systems. 624-634 - Mei Wen, Nan Wu, Haiyan Li, Chunyuan Zhang:

Multiple-Morphs Adaptive Stream Architecture. 635-646 - Wu Jigang, Thambipillai Srikanthan:

Power Efficient Sub-Array in Reconfigurable VLSI Meshes. 647-653 - Ben Leslie, Peter Chubb, Nicholas Fitzroy-Dale, Stefan Götz, Charles Gray, Luke Macpherson, Daniel Potts, Yue-Ting Shen, Kevin Elphinstone, Gernot Heiser:

User-Level Device Drivers: Achieved Performance. 654-664 - Youfeng Wu, Yong-Fong Lee:

Hardware-Software Collaborative Techniques for Runtime Profiling and Phase Transition Detection. 665-675 - Weisong Shi, Sharun Santhosh, Hanping Lufei:

Secure Application-Aware Service Differentiation in Public Area Wireless Networks. 676-688 - Yu Jiang, Binxing Fang, Ming-Zeng Hu, Xiang Cui:

Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement. 689-701 - Wei-Sheng Si

, Cheng-Zhi Li:
RMAC: A Reliable MAC Protocol Supporting Multicast for Wireless Ad Hoc Networks. 702-712 - Ya-feng Wu, Yinlong Xu, Guo-Liang Chen:

Approximation Algorithms for Steiner Connected Dominating Set. 713-716 - I-Shyan Hwang, I-Feng Huang, Shin-Cheng Yu:

Dynamic Fuzzy Controlled RWA Algorithm for IP/GMPLS over WDM Networks. 717-727 - Ruochen Liu, Licheng Jiao

, Haifeng Du:
Clonal Strategy Algorithm Based on the Immune Memory. 728-734
Volume 20, Number 6, November 2005
- Jin-yi Cai, Hong Zhu:

Progress in Computational Complexity Theory. 735-750 - Ruqian Lu:

Towards a Mathematical Theory of Knowledge. 751-757 - Daoyun Xu, Zhi-Hong Tao:

Complexities of Homomorphism and Isomorphism for Definite Logic Programs. 758-762 - Xu-bin Deng, Yangyong Zhu:

L-Tree Match: A New Data Extraction Model and Algorithm for Huge Text Stream with Noises. 763-773 - Yongji Wang, Matthew P. Cartmell

, Qiu-Ming Tao, Han Liu:
A Generalized Real-Time Obstacle Avoidance Method Without the Cspace Calculation. 774-787 - Zille Huma, Muhammad Rehman, Nadeem Iftikhar

:
An Ontology-Based Framework for Semi-Automatic Schema Integration. 788-796 - Imad Jawhar, Jie Wu:

QoS Support in TDMA-Based Mobile Ad Hoc Networks. 797-810 - Kwang-Jin Park, MoonBae Song, Chong-Sun Hwang:

Broadcast-Based Spatial Queries. 811-821 - Jipeng Zhou:

Fault-Tolerant Wormhole Routing with 2 Virtual Channels in Meshes. 822-830 - Jin-Yu Zhang, Liu Li, Hong-Hui Li, Liu Feng:

Quantitative QoS Management Implement Mechanism in IP-DiffServ. 831-835 - Caixia Zhang, Zhanyi Hu:

A General Sufficient Condition of Four Positive Solutions of the P3P Problem. 836-842 - Xiang-Sheng Wu:

A New Technique for Digital Image Watermarking. 843-848 - Hua Li, Shuicheng Yan, Li-Zhong Peng:

Robust Non-Frontal Face Alignment with Edge Based Texture. 849-854 - Shuqiang Jiang, Jun Du, Qingming Huang, Tie-Jun Huang, Wen Gao:

Visual Ontology Construction for Digitized Art Image Retrieval. 855-860 - Ming Li, Xiao-Shan Gao, Jin-San Cheng:

Generating Symbolic Interpolants for Scattered Data with Normal Vectors. 861-874 - Wei Lu, Xiu-Tao Yang, Tao Lv, Xiaowei Li:

An Efficient Evaluation and Vector Generation Method for Observability-Enhanced Statement Coverage. 875-884 - Jian-Hui Jiang:

An Error Recoverable Structure Based on Complementary Logic and Alternating-Retry. 885-894 - Yinshui Xia, Lun-Yao Wang, Zong-Gang Zhou, Xien Ye, Jianping Hu:

Novel Synthesis and Optimization of Multi-Level Mixed Polarity Reed-Muller Functions. 895-900 - Yici Cai, Xin Zhao, Qiang Zhou, Xianlong Hong:

Shielding Area Optimization Under the Solution of Interconnect Crosstalk. 901-906

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














