- Wenjun Wu, Xiaoshan Gao:
Mathematics mechanization and applications after thirty years.
- Jifeng He, Huibiao Zhu, Geguang Pu:
A model for BPEL-like languages.
- Ninghui Sun, Dan Meng:
Dawning4000A high performance computer.
- Jigui Sun, Minghao Yin:
Recognizing the agent's goals incrementally: planning graph as a basis.
- Gheorghe Paun:
A quick overview of membrane computing with some details about spiking neural P systems.
- Donggang Cao, Hong Mei, Minghui Zhou:
Supporting crosscutting concern modelling in software architecture design.
- Qun Liu, Xiangdong Wang, Hong Liu, Le Sun, Sheng Tang, Deyi Xiong, Hongxu Hou, Yuanhua Lv, Wenbo Li, Shouxun Lin, Yueliang Qian:
HTRDP evaluations on Chinese information processing and intelligent human-machine interface.
- Xuejun Yang, Huizhan Yi, Xiangli Qu, Haifang Zhou:
Compiler-directed power optimization of high-performance interconnection networks for load-balancing MPI applications.
- Réjean Plamondon, Xiaolin Li, Moussa Djioua:
Extraction of delta-lognormal parameters from handwriting strokes.
- Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao:
P2P worm detection based on application identification.
- Yuanyan Tang:
Remarks on different reviews of Chinese character recognition.
- Ruwei Dai, Chenglin Liu, Baihua Xiao:
Chinese character recognition: history, status and prospects.
- Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball:
Offline Chinese handwriting recognition: an assessment of current technology.
- Yunquan Zhang, Guoliang Chen, Guangzhong Sun, Qiankun Miao:
Models of parallel computation: a survey and classification.
- Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics.
- Tielin Liang, Dongming Wang:
On the design and implementation of a geometric-object-oriented language.
- Kaile Su, Yinyin Xiao, Qingliang Chen, Han Lin:
Semantic interpretation of compositional logic in instantiation space.
- Hai Jin, Chuanjiang Yi:
CMM: Credential migration management system based on trusted computing in CGSP.
- Renfa Li, Yunlong Xie, Jigang Wen, Guangxue Yue:
EMMP: a highly efficient membership management protocol.
- Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou:
SONNET: subscription using path queries over structured overlay networks.
- Weiguo Zhang, Mian Cai, Guozhen Xiao:
On constructing disjoint linear codes.
- Xuejun Yang, Panfeng Wang, Yunfei Du, Haifang Zhou:
A data-distributed parallel algorithm for wavelet-based fusion of remote sensing images.
- Chuanbo Chen, Yunping Zheng, Mudar Sarem:
A mesh-based automatic in-betweening algorithm in computer-assisted animation.
- Guilu Long, Yang Liu:
Search an unsorted database with quantum mechanics.
- YuZhong Zhao, Yun Xu, Qiangfeng Zhang, Guoliang Chen:
An overview of the haplotype problems and algorithms.
- Shilong Ma, Yuefei Sui, Ke Xu:
Well limit behaviors of term rewriting systems.
- Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Cheng Liu, Zhifang Wang:
A pointer logic and certifying compiler.
- Shi Zhang, Linpeng Huang:
Research on dynamic update transaction for Java classes.
- Keqing He, Liang Peng, Rong Peng, Bing Li, Jing Liu:
Requirement emergence computation of networked software.
- Yuanzhuo Wang, Chuang Lin, Yang Yang, Zhiguang Shan:
Performance analysis of a dependable scheduling strategy based on a fault-tolerant grid model.
- Jianjin Jiang, Guangwen Yang:
An optimal replication strategy for data grid systems.
- Lingfang Zeng, Dan Feng, Hong Jiang:
High TPO/TCO for data storage: policy, algorithm and early practice.
- Hui Wei:
A hierarchical model for structure learning based on the physiological characteristics of neurons.
Copyright © Mon Nov 2 21:36:02 2009
by Michael Ley (email@example.com)
- Ying Jiang, Guo-Qiang Zhang:
Weakly distributive domains (II).
- Dengguo Feng, Chuankun Wu:
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
- Teijiro Isokawa, Shin'ya Kowada, Ferdinand Peper, Naotake Kamiura, Nobuyuki Matsui:
Online isolation of defects in cellular nanocomputers.
- Shuicheng Yan, Huan Wang, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang:
Ranking with uncertain labels and its applications.
- Tiejun Zhao, Yi Guan, Ting Liu, Qiang Wang:
Recent advances on NLP research in Harbin Institute of Technology.
- Limin Wang, Xuecheng Wang, Xiongfei Li:
Inference and learning in hybrid probabilistic network.
- Yijiao Yu, Hai Jin:
Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach.
- Kai Nan, Jianjun Yu, Hao Su, Shengmin Guo, Hui Zhang, Ke Xu:
Towards structural Web Services matching based on Kernel methods.
- Yingxin Guo, Ke Xu:
An improved algorithm for finding community structure in networks with an application to IPv6 backbone network.
- Cheqing Jin, Aoying Zhou, Jeffrey Xu Yu, Joshua Zhexue Huang, Feng Cao:
Adaptive scheduling for shared window joins over data streams.
- Lingfang Zeng, Dan Feng, Zhan Shi, Jianxi Chen, Qingsong Wei, Zhixiang Li:
A high-speed and low-cost storage architecture based on virtual interface.
- Dong Xie, Luming Yang:
Study on consistent query answering in inconsistent databases.