Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/fcsc/fcsc5.bht:"
@article{DBLP:journals/fcsc/BaiWHZJ11, author = {Hao Bai and Kunsheng Wang and Changzhen Hu and Gang Zhang and Xiao{-}chuan Jing}, title = {Boosting performance in attack intention recognition by integrating multiple techniques}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {109--118}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0321-y}, doi = {10.1007/S11704-010-0321-Y}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/BaiWHZJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Bush11, author = {Stephen F. Bush}, title = {Toward \emph{in vivo} nanoscale communication networks: utilizing an active network architecture}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {316--326}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0116-9}, doi = {10.1007/S11704-011-0116-9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/Bush11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ChenT11, author = {Defu Chen and Zhengsu Tao}, title = {An adaptive polling interval and short preamble media access control protocol for wireless sensor networks}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {300--307}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0134-7}, doi = {10.1007/S11704-011-0134-7}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ChenT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/FanFD11, author = {Xiaoqin Fan and Xianwen Fang and Zhijun Ding}, title = {Indeterminacy-aware service selection for reliable service composition}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {26--36}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0077-4}, doi = {10.1007/S11704-010-0077-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/FanFD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/FuS11, author = {Zheng Fu and Graeme Smith}, title = {Property transformation under specification change}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {1--13}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0112-5}, doi = {10.1007/S11704-010-0112-5}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/FuS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GaoMZW11, author = {Sheng Gao and Wenping Ma and Zepeng Zhuo and Fenghe Wang}, title = {On cross-correlation indicators of an S-box}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {448--453}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0177-9}, doi = {10.1007/S11704-011-0177-9}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/GaoMZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GengC11, author = {Xiubo Geng and Xueqi Cheng}, title = {Learning multiple metrics for ranking}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {259--267}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0152-5}, doi = {10.1007/S11704-011-0152-5}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/GengC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GuoWTH11, author = {Zijian Guo and Wenyuan Wang and Guolei Tang and Jun Huang}, title = {A recursive model for static empty container allocation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {486--495}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1013-y}, doi = {10.1007/S11704-011-1013-Y}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/GuoWTH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HanLHW11, author = {Lei Han and Jiqiang Liu and Zhen Han and Xueye Wei}, title = {Design and implementation of a portable {TPM} scheme for general-purpose trusted computing based on {EFI}}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {169--180}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9180-4}, doi = {10.1007/S11704-011-9180-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/HanLHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HanLW11, author = {Yanni Han and Deyi Li and Teng Wang}, title = {Identifying different community members in complex networks based on topology potential}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {87--99}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0071-x}, doi = {10.1007/S11704-010-0071-X}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/HanLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HaoLXH11, author = {Jiuyue Hao and Chao Li and Zhang Xiong and Ejaz Hussain}, title = {A temporal-spatial background modeling of dynamic scenes}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {290--299}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0377-3}, doi = {10.1007/S11704-011-0377-3}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/HaoLXH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HuL11, author = {Defa Hu and Qiaoliang Li}, title = {A simple fingerprinting scheme for large user groups}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {163--168}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9163-5}, doi = {10.1007/S11704-011-9163-5}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/HuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Hua11, author = {Baojian Hua}, title = {Static typing for a substructural lambda calculus}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {369--380}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9106-1}, doi = {10.1007/S11704-011-9106-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Hua11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HuangTCC11, author = {Pu Huang and Zhenmin Tang and Cai{-}Kou Chen and Xintian Cheng}, title = {Nearest-neighbor classifier motivated marginal discriminant projections for face recognition}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {419--428}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1012-z}, doi = {10.1007/S11704-011-1012-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/HuangTCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/JiaLJ11, author = {Jianhua Jia and Bingxiang Liu and Licheng Jiao}, title = {Soft spectral clustering ensemble applied to image segmentation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {66--78}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0161-9}, doi = {10.1007/S11704-010-0161-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/JiaLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Jiang11, author = {Liangxiao Jiang}, title = {Learning random forests for ranking}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {79--86}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0388-5}, doi = {10.1007/S11704-010-0388-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/Jiang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiTLTL11, author = {Kenli Li and Zhao Tong and Dan Liu and Teklay Tesfazghi and Xiangke Liao}, title = {A {PTS-PGATS} based approach for data-intensive scheduling in data grids}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {513--525}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0970-5}, doi = {10.1007/S11704-011-0970-5}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiTLTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiWGLSL11, author = {Ruixuan Li and Kunmei Wen and Xiwu Gu and Yuhua Li and Xiaolin Sun and Bing Li}, title = {Type-2 fuzzy description logic}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {205--215}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0109-8}, doi = {10.1007/S11704-011-0109-8}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LiWGLSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiX11, author = {Lan Li and Wenjun Xiao}, title = {Psu: a novel low-latency constant-degree overlay network}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {250--258}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0333-y}, doi = {10.1007/S11704-011-0333-Y}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiZ11, author = {Yujian Li and Chenguang Zhang}, title = {A metric normalization of tree edit distance}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {119--125}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9336-2}, doi = {10.1007/S11704-011-9336-2}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Liu11, author = {Shaoying Liu}, title = {Pre-post notation is questionable in effectively specifying operations of object-oriented systems}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {341--352}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0130-y}, doi = {10.1007/S11704-011-0130-Y}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Liu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiuXD11, author = {Bailing Liu and Feng Xiao and Ke Deng}, title = {Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {135--147}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9307-7}, doi = {10.1007/S11704-011-9307-7}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiuXD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiuZGLT11, author = {Eryun Liu and Heng Zhao and Fangfei Guo and Jimin Liang and Jie Tian}, title = {Fingerprint segmentation based on an AdaBoost classifier}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {148--157}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9134-x}, doi = {10.1007/S11704-011-9134-X}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiuZGLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LvLMZ11, author = {Chao Lv and Hui Li and Jianfeng Ma and Meng Zhao}, title = {Security analysis of two recently proposed {RFID} authentication protocols}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {335--340}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0153-4}, doi = {10.1007/S11704-011-0153-4}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LvLMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LvLW11, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Identity-based key distribution for mobile Ad Hoc networks}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {442--447}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0197-5}, doi = {10.1007/S11704-011-0197-5}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LvLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/MaZCC11, author = {Yanfang Ma and Min Zhang and Yixiang Chen and Liang Chen}, title = {Two-thirds simulation indexes and modal logic characterization}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {454--471}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0140-9}, doi = {10.1007/S11704-011-0140-9}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/MaZCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/OkaieN11, author = {Yutaka Okaie and Tadashi Nakano}, title = {Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {496--505}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0190-z}, doi = {10.1007/S11704-011-0190-Z}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/OkaieN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Shen11, author = {Yehu Shen}, title = {Efficient normalized cross correlation calculation method for stereo vision based robot navigation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {227--235}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9190-2}, doi = {10.1007/S11704-011-9190-2}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Shen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/SunZSYFZLG11, author = {Yuzhong Sun and Yiqiang Zhao and Ying Song and Yajun Yang and Haifeng Fang and Hongyong Zang and Yaqiong Li and Yunwei Gao}, title = {Green challenges to system software in data centers}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {353--368}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0369-3}, doi = {10.1007/S11704-011-0369-3}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/SunZSYFZLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Wang11, author = {Dongsheng Wang}, title = {Answering contextual questions based on ontologies and question templates}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {405--418}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1031-9}, doi = {10.1007/S11704-011-1031-9}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Wang11a, author = {Wei Wang}, title = {Certifying assembly programs with trails}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {472--485}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0166-z}, doi = {10.1007/S11704-011-0166-Z}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Wang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangLW11, author = {Jian Wang and Yubai Li and Chang Wu}, title = {An analytical model for Network-on-Chip with finite input buffer}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {126--134}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0117-0}, doi = {10.1007/S11704-010-0117-0}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangW11, author = {Guojun Wang and Jie Wu}, title = {FlowTrust: trust inference with network flows}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {181--194}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0323-4}, doi = {10.1007/S11704-011-0323-4}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangWZG11, author = {Wei Wang and Zhiliang Wang and Siyi Zheng and Xuejing Gu}, title = {Individual difference of artificial emotion applied to a service robot}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {216--226}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0145-9}, doi = {10.1007/S11704-010-0145-9}, timestamp = {Sun, 08 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangWZG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangZCHLC11, author = {Weimin Wang and Jingchun Zhang and Cong Cao and Tao Hou and Yue Liu and Keji Chen}, title = {An efficient approach to representing and mining knowledge from Qing court medical records}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {395--404}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1021-y}, doi = {10.1007/S11704-011-1021-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangZCHLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WenLX11, author = {Jia Wen and Chao Li and Zhang Xiong}, title = {Behavior pattern extraction by trajectory analysis}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {37--44}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0074-7}, doi = {10.1007/S11704-010-0074-7}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/WenLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Wu11, author = {Mingfen Wu}, title = {Approximation operators based on vague relations and roughness measures of vague sets}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {429--441}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9176-0}, doi = {10.1007/S11704-011-9176-0}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Wu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/XuZY11, author = {Jun Xu and Xuehai Zhou and Feng Yang}, title = {Traceback in wireless sensor networks with packet marking and logging}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {308--315}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0361-y}, doi = {10.1007/S11704-011-0361-Y}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/XuZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Yang11, author = {Shuguo Yang}, title = {Research on resource allocation for multi-tier web applications in a virtualization environment}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {506--512}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0127-6}, doi = {10.1007/S11704-011-0127-6}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Yang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/YangH11, author = {Wenfeng Yang and Yupu Hu}, title = {A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {158--162}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9158-2}, doi = {10.1007/S11704-011-9158-2}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/YangH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/YangZ11, author = {Xibei Yang and Ming Zhang}, title = {Dominance-based fuzzy rough approach to an interval-valued decision system}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {195--204}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0331-4}, doi = {10.1007/S11704-011-0331-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/YangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/YinH11, author = {Xuesong Yin and Enliang Hu}, title = {Distance metric learning guided adaptive subspace semi-supervised clustering}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {100--108}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0376-9}, doi = {10.1007/S11704-010-0376-9}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/YinH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/YuMB11, author = {Haizheng Yu and Jianfeng Ma and Hong Bian}, title = {Reasonable routing in delay/disruption tolerant networks}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {327--334}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0139-2}, doi = {10.1007/S11704-011-0139-2}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/YuMB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangWL11, author = {Yansong Zhang and Shan Wang and Jiaheng Lu}, title = {Improving performance by creating a native join-index for {OLAP}}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {2}, pages = {236--249}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-9181-3}, doi = {10.1007/S11704-011-9181-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangY11, author = {Xianchao Zhang and Quanzeng You}, title = {An improved spectral clustering algorithm based on random walk}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {268--278}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0023-0}, doi = {10.1007/S11704-011-0023-0}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhaoJL11, author = {Feng Zhao and Licheng Jiao and Hanqiang Liu}, title = {Fuzzy c-means clustering with non local spatial information for noisy image segmentation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {45--56}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0393-8}, doi = {10.1007/S11704-010-0393-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhaoJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhaoLW11, author = {Yongjian Zhao and Boqiang Liu and Sen Wang}, title = {A robust extraction algorithm for biomedical signals from noisy mixtures}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {387--394}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1043-5}, doi = {10.1007/S11704-011-1043-5}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhaoLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhaoS11, author = {Wei Zhao and Ye San}, title = {{RBF} neural network based on q-Gaussian function in function approximation}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {4}, pages = {381--386}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-1041-7}, doi = {10.1007/S11704-011-1041-7}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhaoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhengS11, author = {Yunping Zheng and Mudar Sarem}, title = {A fast algorithm for computing moments of gray images based on {NAM} and extended shading approach}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {57--65}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0337-3}, doi = {10.1007/S11704-010-0337-3}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhengS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhouSL11, author = {Conghua Zhou and Bo Sun and Zhifeng Liu}, title = {Abstraction for model checking multi-agent systems}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {1}, pages = {14--25}, year = {2011}, url = {https://doi.org/10.1007/s11704-010-0358-y}, doi = {10.1007/S11704-010-0358-Y}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhouSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhuL11, author = {Xudong Zhu and Zhijing Liu}, title = {Human behavior clustering for anomaly detection}, journal = {Frontiers Comput. Sci. China}, volume = {5}, number = {3}, pages = {279--289}, year = {2011}, url = {https://doi.org/10.1007/s11704-011-0080-4}, doi = {10.1007/S11704-011-0080-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.