Journal: Science in China Series F: Information Sciences

Volume 49, Issue 6

681 -- 701Xicheng Lu, Huaimin Wang, Ji Wang. Internet-based virtual computing environment (iVCE): Concepts and architecture
702 -- 730Hong Mei, Gang Huang, Haiyan Zhao, Wenpin Jiao. A software architecture centric engineering approach for Internetware
731 -- 758Jinpeng Huai, Chunming Hu, Jianxin Li, Hailong Sun, Tianyu Wo. CROWN: A service grid middleware with trust management mechanism
759 -- 773Huaimin Wang, Yang-Bin Tang, Gang Yin, Lei Li. Trustworthiness of Internet-based software
774 -- 791Tao Huang, Xiaoning Ding, Jun Wei. An application-semantics-based relaxed transaction model for internetware
792 -- 820Lishan Hou, Zhi Jin, Budan Wu. Modeling and verifying Web services driven by requirements: An ontology-based approach
821 -- 842Wei-Tek Tsai, Bingnan Xiao, Qian Huang, Yinong Chen. Collaborative software design in an SOA environment
843 -- 863Jing Dong, Yongtao Sun, Sheng Yang, Kang Zhang. Dynamic web service composition based on OWL-S
864 -- 884Jing Liu, Jifeng He, Zhiming Liu. A strategy for service realization in service-oriented design
885 -- 905Jiannong Cao, Jingyang Zhou, Weiwei Zhu, Xuhui Li. Mobile agent-enabled framework for structuring and building distributed systems on the internet
906 -- 926Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao. Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments

Volume 49, Issue 5

545 -- 565Qingguang Ji, Sihan Qing, Yeping He. A formal model for integrity protection based on DTE technique
566 -- 577Shaoji Feng, Dexing Feng. Exact internal controllability for shallow shells
578 -- 591Liying Zhu, Yuzhen Wang. Study on the stability of switched dissipative Hamiltonian systems
592 -- 603Bing Deng, Ran Tao, Yue Wang. Convolution theorems for the linear canonical transform and their applications
604 -- 615Zhenfu Cao, Haojin Zhu, Rongxing Lu. Provably secure robust threshold partial blind signature
616 -- 626Weidong Li, Wei Hong, Zhangcheng Hao, Houxing Zhou. Hybrid algorithm for accelerating the double series of Floquet vector modes
627 -- 638Jimin Ye, Xianda Zhang, Xiaolong Zhu. Blind source separation with unknown and dynamically changing number of source signals
639 -- 652Zhaoshui He, Shengli Xie, Yuli Fu. Sparse representation and blind source separation of ill-posed mixtures
653 -- 664Zhizhong Zhang, Fang Cheng, Jiangtao Luo, Qijian Mao, Jun Wang, Shaofeng Qiu. Preemptive and non-preemptive scheduling of optical switches with configuration delay
665 -- 680Zuying Luo, Yici Cai, Sheldon X.-D. Tan, Xianlong Hong, Xiaoyi Wang, Zhu Pan, Jingjing Fu. Time-domain analysis methodology for large-scale RLC circuits and its applications

Volume 49, Issue 4

409 -- 420Yantai Shu, Huifang Feng, Hua Wang, Maode Ma. Dynamic admission control in hybrid QoS networks with WiFi access
421 -- 435Guocheng Li, Shiji Song, Cheng Wu. Subgradient-based feedback neural networks for non-differentiable convex optimization problems
436 -- 445Yanhong Liu, Chunwen Li, Rebing Wu. Feedback control of nonlinear differential algebraic systems using Hamiltonian function method
446 -- 460ZongBen Xu, Jianjun Wang. The essential order of approximation for nearly exponential type neural networks
461 -- 470Xiao Lu, Wei Wang. Kalman filtering for time-delayed linear systems
471 -- 483Jun Li, Guojun Wang. Theory of truth degrees of propositions in the logic system ::::L::::::::::n:::::::::*:::
484 -- 493Qingwen Lü, Wufan Chen. Unsupervised segmentation of medical image based on difference of mutual information
494 -- 503Feng Liu. Diffusion filtering in image processing based on wavelet transform
504 -- 515Shouzhi Yang, Lizhong Peng. Construction of high order balanced multiscaling functions via PTST
516 -- 532Jinbiao Xiao, Xu Liu, Chun Cai, Hehong Fan, Xiaohan Sun. An improved three-dimensional full-vectorial finite-difference imaginary-distance beam propagation method
533 -- 544Bingyu Liao, Hong Yuan, Baojun Lin. Smoother and Bayesian filter based semi-codeless tracking of dual-frequency GPS signals

Volume 49, Issue 3

273 -- 285Junhui He, Jiwu Huang. Steganalysis of stochastic modulation steganography
286 -- 301Bin Zhang, Dengguo Feng. Security analysis of a new stream cipher
302 -- 312Jiande Sun, Ju Liu. A blind video watermarking scheme based on ICA and shot segmentation
313 -- 327Yao Zhao. Geometrically robust video watermarking based on wavelet transform
328 -- 338Yanxia Zhang, Lei Guo. Convergence analysis of cautious control
339 -- 363Hongxing Li. Probability representations of fuzzy systems
364 -- 371Xiaozhu Lin, Yun Sha, Junwei Ji, Yanmin Wang. A proof of image Euler Number formula
372 -- 385Minghu Ha, Yan Li, Jia Li, Dazeng Tian. The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space
386 -- 396Hai Li, Zhenfang Li, Guisheng Liao, Zheng Bao. An estimation method for InSAR interferometric phase combined with image auto-coregistration
397 -- 408Yuanyuan Xu, Shanhong Xia, Chao Bian, Shaofeng Chen. A micro amperometric immunosensor for detection of human immunoglobulin

Volume 49, Issue 2

137 -- 154Meiqin Liu. Discrete-time delayed standard neural network model and its application
155 -- 174Sihan Qing, Gaicheng Li. Formal analysis and design of multi-party fair exchange protocols
175 -- 188Xiaohong Zhang, Huacan He, Yang Xu. A fuzzy logic system based on Schweizer-Sklar t-norm
189 -- 207Jiang Wang, Hanqiao Gao, Huiyan Li. Adaptive robust control of nonholonomic systems with stochastic disturbances
208 -- 218Daiyuan Peng, Pingzhi Fan, Moon Ho Lee. Lower bounds on the periodic Hamming correlations of frequency hopping sequences with low hit zone
219 -- 227Jingwei Zhang, Jianjuan Xiu, You He, Wei Xiong. Distributed interacted multisensor joint probabilistic data association algorithm based on D-S theory
228 -- 234Gang Wang, Qishan Zhang. The novel generating algorithm and properties of hybrid-P-ary generalized bridge functions
235 -- 253Shefeng Yan, Yuanliang Ma. Optimal design and verification of temporal and spatial filters using second-order cone programming approach
254 -- 261Han Tao, Xiaojun Ji, Wenkang Shi. Optimal pressure-sensitive cuts for surface acoustic waves on langasite
262 -- 272Yinhe Han, Huawei Li, Xiaowei Li, Anshuman Chandra. Response compaction for system-on-a-chip based on advanced convolutional codes

Volume 49, Issue 1

1 -- 25Ran Tao, Bing Deng, Yue Wang. Research progress of the fractional Fourier transform in signal processing
26 -- 47Xianxian Li, Jinpeng Huai. Cryptographic protocol security analysis based on bounded constructing algorithm
48 -- 62Jianru Xue, Nanning Zheng, Xiaopin Zhong. Sequential stratified sampling belief propagation for multiple targets tracking
63 -- 79Maoguo Gong, Haifeng Du, Licheng Jiao. Optimal approximation of linear systems by artificial immune response
80 -- 89Yiguang Hong, Jiankui Wang. Non-smooth finite-time stabilization for a class of nonlinear systems
90 -- 102Jianwen Hu, Weiming Zhang, Zhong Liu, Xiaofeng Hu, Guangya Si. A novel complex-system-view-based method for system effectiveness analysis: Monotonic indexes space
103 -- 127Kaidong Wang, Kechu Yi, Bin Tian, Chengke Wu. Packet routing algorithm for polar orbit LEO satellite constellation network
128 -- 137Lizhong Peng, Xiaoyong Chu. Design of smooth orthogonal wavelets with beautiful structure from 2-band to 4-band