Search dblp for Publications

export results for "toc:db/journals/fcsc/fcsc5.bht:"

 download as .bib file

@article{DBLP:journals/fcsc/BaiWHZJ11,
  author       = {Hao Bai and
                  Kunsheng Wang and
                  Changzhen Hu and
                  Gang Zhang and
                  Xiao{-}chuan Jing},
  title        = {Boosting performance in attack intention recognition by integrating
                  multiple techniques},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {109--118},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0321-y},
  doi          = {10.1007/S11704-010-0321-Y},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/BaiWHZJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Bush11,
  author       = {Stephen F. Bush},
  title        = {Toward \emph{in vivo} nanoscale communication networks: utilizing
                  an active network architecture},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {316--326},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0116-9},
  doi          = {10.1007/S11704-011-0116-9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/Bush11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ChenT11,
  author       = {Defu Chen and
                  Zhengsu Tao},
  title        = {An adaptive polling interval and short preamble media access control
                  protocol for wireless sensor networks},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {300--307},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0134-7},
  doi          = {10.1007/S11704-011-0134-7},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ChenT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/FanFD11,
  author       = {Xiaoqin Fan and
                  Xianwen Fang and
                  Zhijun Ding},
  title        = {Indeterminacy-aware service selection for reliable service composition},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {26--36},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0077-4},
  doi          = {10.1007/S11704-010-0077-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/FanFD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/FuS11,
  author       = {Zheng Fu and
                  Graeme Smith},
  title        = {Property transformation under specification change},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {1--13},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0112-5},
  doi          = {10.1007/S11704-010-0112-5},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/FuS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GaoMZW11,
  author       = {Sheng Gao and
                  Wenping Ma and
                  Zepeng Zhuo and
                  Fenghe Wang},
  title        = {On cross-correlation indicators of an S-box},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {448--453},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0177-9},
  doi          = {10.1007/S11704-011-0177-9},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/GaoMZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GengC11,
  author       = {Xiubo Geng and
                  Xueqi Cheng},
  title        = {Learning multiple metrics for ranking},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {259--267},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0152-5},
  doi          = {10.1007/S11704-011-0152-5},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/GengC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GuoWTH11,
  author       = {Zijian Guo and
                  Wenyuan Wang and
                  Guolei Tang and
                  Jun Huang},
  title        = {A recursive model for static empty container allocation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {486--495},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1013-y},
  doi          = {10.1007/S11704-011-1013-Y},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/GuoWTH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HanLHW11,
  author       = {Lei Han and
                  Jiqiang Liu and
                  Zhen Han and
                  Xueye Wei},
  title        = {Design and implementation of a portable {TPM} scheme for general-purpose
                  trusted computing based on {EFI}},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {169--180},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9180-4},
  doi          = {10.1007/S11704-011-9180-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/HanLHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HanLW11,
  author       = {Yanni Han and
                  Deyi Li and
                  Teng Wang},
  title        = {Identifying different community members in complex networks based
                  on topology potential},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {87--99},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0071-x},
  doi          = {10.1007/S11704-010-0071-X},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/HanLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HaoLXH11,
  author       = {Jiuyue Hao and
                  Chao Li and
                  Zhang Xiong and
                  Ejaz Hussain},
  title        = {A temporal-spatial background modeling of dynamic scenes},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {290--299},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0377-3},
  doi          = {10.1007/S11704-011-0377-3},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/HaoLXH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HuL11,
  author       = {Defa Hu and
                  Qiaoliang Li},
  title        = {A simple fingerprinting scheme for large user groups},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {163--168},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9163-5},
  doi          = {10.1007/S11704-011-9163-5},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/HuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Hua11,
  author       = {Baojian Hua},
  title        = {Static typing for a substructural lambda calculus},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {369--380},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9106-1},
  doi          = {10.1007/S11704-011-9106-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Hua11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HuangTCC11,
  author       = {Pu Huang and
                  Zhenmin Tang and
                  Cai{-}Kou Chen and
                  Xintian Cheng},
  title        = {Nearest-neighbor classifier motivated marginal discriminant projections
                  for face recognition},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {419--428},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1012-z},
  doi          = {10.1007/S11704-011-1012-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/HuangTCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/JiaLJ11,
  author       = {Jianhua Jia and
                  Bingxiang Liu and
                  Licheng Jiao},
  title        = {Soft spectral clustering ensemble applied to image segmentation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {66--78},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0161-9},
  doi          = {10.1007/S11704-010-0161-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/JiaLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Jiang11,
  author       = {Liangxiao Jiang},
  title        = {Learning random forests for ranking},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {79--86},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0388-5},
  doi          = {10.1007/S11704-010-0388-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/Jiang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiTLTL11,
  author       = {Kenli Li and
                  Zhao Tong and
                  Dan Liu and
                  Teklay Tesfazghi and
                  Xiangke Liao},
  title        = {A {PTS-PGATS} based approach for data-intensive scheduling in data
                  grids},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {513--525},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0970-5},
  doi          = {10.1007/S11704-011-0970-5},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiTLTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiWGLSL11,
  author       = {Ruixuan Li and
                  Kunmei Wen and
                  Xiwu Gu and
                  Yuhua Li and
                  Xiaolin Sun and
                  Bing Li},
  title        = {Type-2 fuzzy description logic},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {205--215},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0109-8},
  doi          = {10.1007/S11704-011-0109-8},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiWGLSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiX11,
  author       = {Lan Li and
                  Wenjun Xiao},
  title        = {Psu: a novel low-latency constant-degree overlay network},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {250--258},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0333-y},
  doi          = {10.1007/S11704-011-0333-Y},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiZ11,
  author       = {Yujian Li and
                  Chenguang Zhang},
  title        = {A metric normalization of tree edit distance},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {119--125},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9336-2},
  doi          = {10.1007/S11704-011-9336-2},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Liu11,
  author       = {Shaoying Liu},
  title        = {Pre-post notation is questionable in effectively specifying operations
                  of object-oriented systems},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {341--352},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0130-y},
  doi          = {10.1007/S11704-011-0130-Y},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiuXD11,
  author       = {Bailing Liu and
                  Feng Xiao and
                  Ke Deng},
  title        = {Resolving conflicts between negotiation success and sensitive information
                  protection in automated trust negotiation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {135--147},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9307-7},
  doi          = {10.1007/S11704-011-9307-7},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiuXD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiuZGLT11,
  author       = {Eryun Liu and
                  Heng Zhao and
                  Fangfei Guo and
                  Jimin Liang and
                  Jie Tian},
  title        = {Fingerprint segmentation based on an AdaBoost classifier},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {148--157},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9134-x},
  doi          = {10.1007/S11704-011-9134-X},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiuZGLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LvLMZ11,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma and
                  Meng Zhao},
  title        = {Security analysis of two recently proposed {RFID} authentication protocols},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {335--340},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0153-4},
  doi          = {10.1007/S11704-011-0153-4},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LvLMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LvLW11,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Identity-based key distribution for mobile Ad Hoc networks},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {442--447},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0197-5},
  doi          = {10.1007/S11704-011-0197-5},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LvLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/MaZCC11,
  author       = {Yanfang Ma and
                  Min Zhang and
                  Yixiang Chen and
                  Liang Chen},
  title        = {Two-thirds simulation indexes and modal logic characterization},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {454--471},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0140-9},
  doi          = {10.1007/S11704-011-0140-9},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/MaZCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/OkaieN11,
  author       = {Yutaka Okaie and
                  Tadashi Nakano},
  title        = {Non-cooperative optimization games in market-oriented overlay networks:
                  an integrated model of resource pricing and network formation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {496--505},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0190-z},
  doi          = {10.1007/S11704-011-0190-Z},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/OkaieN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Shen11,
  author       = {Yehu Shen},
  title        = {Efficient normalized cross correlation calculation method for stereo
                  vision based robot navigation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {227--235},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9190-2},
  doi          = {10.1007/S11704-011-9190-2},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Shen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/SunZSYFZLG11,
  author       = {Yuzhong Sun and
                  Yiqiang Zhao and
                  Ying Song and
                  Yajun Yang and
                  Haifeng Fang and
                  Hongyong Zang and
                  Yaqiong Li and
                  Yunwei Gao},
  title        = {Green challenges to system software in data centers},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {353--368},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0369-3},
  doi          = {10.1007/S11704-011-0369-3},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/SunZSYFZLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Wang11,
  author       = {Dongsheng Wang},
  title        = {Answering contextual questions based on ontologies and question templates},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {405--418},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1031-9},
  doi          = {10.1007/S11704-011-1031-9},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Wang11a,
  author       = {Wei Wang},
  title        = {Certifying assembly programs with trails},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {472--485},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0166-z},
  doi          = {10.1007/S11704-011-0166-Z},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Wang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangLW11,
  author       = {Jian Wang and
                  Yubai Li and
                  Chang Wu},
  title        = {An analytical model for Network-on-Chip with finite input buffer},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {126--134},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0117-0},
  doi          = {10.1007/S11704-010-0117-0},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangW11,
  author       = {Guojun Wang and
                  Jie Wu},
  title        = {FlowTrust: trust inference with network flows},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {181--194},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0323-4},
  doi          = {10.1007/S11704-011-0323-4},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangWZG11,
  author       = {Wei Wang and
                  Zhiliang Wang and
                  Siyi Zheng and
                  Xuejing Gu},
  title        = {Individual difference of artificial emotion applied to a service robot},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {216--226},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0145-9},
  doi          = {10.1007/S11704-010-0145-9},
  timestamp    = {Sun, 08 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangWZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangZCHLC11,
  author       = {Weimin Wang and
                  Jingchun Zhang and
                  Cong Cao and
                  Tao Hou and
                  Yue Liu and
                  Keji Chen},
  title        = {An efficient approach to representing and mining knowledge from Qing
                  court medical records},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {395--404},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1021-y},
  doi          = {10.1007/S11704-011-1021-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangZCHLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WenLX11,
  author       = {Jia Wen and
                  Chao Li and
                  Zhang Xiong},
  title        = {Behavior pattern extraction by trajectory analysis},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {37--44},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0074-7},
  doi          = {10.1007/S11704-010-0074-7},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/WenLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Wu11,
  author       = {Mingfen Wu},
  title        = {Approximation operators based on vague relations and roughness measures
                  of vague sets},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {429--441},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9176-0},
  doi          = {10.1007/S11704-011-9176-0},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Wu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/XuZY11,
  author       = {Jun Xu and
                  Xuehai Zhou and
                  Feng Yang},
  title        = {Traceback in wireless sensor networks with packet marking and logging},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {308--315},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0361-y},
  doi          = {10.1007/S11704-011-0361-Y},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/XuZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Yang11,
  author       = {Shuguo Yang},
  title        = {Research on resource allocation for multi-tier web applications in
                  a virtualization environment},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {506--512},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0127-6},
  doi          = {10.1007/S11704-011-0127-6},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Yang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YangH11,
  author       = {Wenfeng Yang and
                  Yupu Hu},
  title        = {A resynchronization attack on stream ciphers filtered by Maiorana-McFarland
                  functions},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {158--162},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9158-2},
  doi          = {10.1007/S11704-011-9158-2},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/YangH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YangZ11,
  author       = {Xibei Yang and
                  Ming Zhang},
  title        = {Dominance-based fuzzy rough approach to an interval-valued decision
                  system},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {195--204},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0331-4},
  doi          = {10.1007/S11704-011-0331-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/YangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YinH11,
  author       = {Xuesong Yin and
                  Enliang Hu},
  title        = {Distance metric learning guided adaptive subspace semi-supervised
                  clustering},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {100--108},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0376-9},
  doi          = {10.1007/S11704-010-0376-9},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/YinH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YuMB11,
  author       = {Haizheng Yu and
                  Jianfeng Ma and
                  Hong Bian},
  title        = {Reasonable routing in delay/disruption tolerant networks},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {327--334},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0139-2},
  doi          = {10.1007/S11704-011-0139-2},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/YuMB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangWL11,
  author       = {Yansong Zhang and
                  Shan Wang and
                  Jiaheng Lu},
  title        = {Improving performance by creating a native join-index for {OLAP}},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {2},
  pages        = {236--249},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-9181-3},
  doi          = {10.1007/S11704-011-9181-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangY11,
  author       = {Xianchao Zhang and
                  Quanzeng You},
  title        = {An improved spectral clustering algorithm based on random walk},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {268--278},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0023-0},
  doi          = {10.1007/S11704-011-0023-0},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhaoJL11,
  author       = {Feng Zhao and
                  Licheng Jiao and
                  Hanqiang Liu},
  title        = {Fuzzy c-means clustering with non local spatial information for noisy
                  image segmentation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {45--56},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0393-8},
  doi          = {10.1007/S11704-010-0393-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhaoJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhaoLW11,
  author       = {Yongjian Zhao and
                  Boqiang Liu and
                  Sen Wang},
  title        = {A robust extraction algorithm for biomedical signals from noisy mixtures},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {387--394},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1043-5},
  doi          = {10.1007/S11704-011-1043-5},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhaoLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhaoS11,
  author       = {Wei Zhao and
                  Ye San},
  title        = {{RBF} neural network based on q-Gaussian function in function approximation},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {4},
  pages        = {381--386},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-1041-7},
  doi          = {10.1007/S11704-011-1041-7},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhaoS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhengS11,
  author       = {Yunping Zheng and
                  Mudar Sarem},
  title        = {A fast algorithm for computing moments of gray images based on {NAM}
                  and extended shading approach},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {57--65},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0337-3},
  doi          = {10.1007/S11704-010-0337-3},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhengS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhouSL11,
  author       = {Conghua Zhou and
                  Bo Sun and
                  Zhifeng Liu},
  title        = {Abstraction for model checking multi-agent systems},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {1},
  pages        = {14--25},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-010-0358-y},
  doi          = {10.1007/S11704-010-0358-Y},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhouSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhuL11,
  author       = {Xudong Zhu and
                  Zhijing Liu},
  title        = {Human behavior clustering for anomaly detection},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {5},
  number       = {3},
  pages        = {279--289},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11704-011-0080-4},
  doi          = {10.1007/S11704-011-0080-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics