Journal: Frontiers of Computer Science in China

Volume 2, Issue 4

331 -- 343Lan Lin, Jesse H. Poore. Pushing requirements changes through to changes in specifications
344 -- 356Chenguang Luo, Shengchao Qin, Zongyan Qiu. Verifying BPEL-like programs with Hoare logic
357 -- 367Jun Pang, Zhengqin Luo, Yuxin Deng. On automatic verification of self-stabilizing population protocols
368 -- 379Jun Sun 0001, Yang Liu, Jin Song Dong, Jing Sun. Compositional encoding for bounded model checking
380 -- 397Zhifang Wang, Yiyun Chen, Zhenming Wang, Baojian Hua. Automated verification of pointer programs in pointer logic
398 -- 412Antonio Brogi, Razvan Popescu. Workflow-based semantics for peer-to-peer specifications
413 -- 423Lianwei Guan, Xingyu Li, Hao Hu, Jian Lu. A Petri net-based approach for supporting aspect-oriented modeling
424 -- 430Yue Hu, Xiaoyu Gao, Li Li, Qingshi Gao. Style transformation in natural languages
431 -- 437Yunping Zheng, Chuanbo Chen, Mudar Sarem. An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles
438 -- 450Xin Li, Bei Hua, Yi Shang, Yan Xiong. A robust localization algorithm in wireless sensor networks
451 -- 459Xiaoru Zhang, Zaiyue Zhang, Yuefei Sui. Types, structures and theories in NKI

Volume 2, Issue 3

209 -- 210Aoying Zhou. Introduction to the special section on peer-to-peer computing and web data management
211 -- 223Bin Yang, Weining Qian, Aoying Zhou. Using Wide Table to manage web data: a survey
224 -- 233Rong Zhang, Koji Zettsu, Yutaka Kidawara, Yasushi Kiyoki. Decentralized architecture for resource management of group-based distributed systems
234 -- 247Mei Li, Wang-Chien Lee, Anand Sivasubramaniam, Jizhong Zhao. Supporting ::::K:::: nearest neighbors query on high-dimensional data in P2P systems
248 -- 256Jianliang Xu, Xueyan Tang, Wang-Chien Lee. Distributed query processing in flash-based sensor networks
257 -- 267Fengrong Li, Takuya Iida, Yoshiharu Ishikawa. Traceable P2P record exchange: a database-oriented approach
268 -- 294Yuanyan Tang. Status of pattern recognition with wavelet analysis
295 -- 305Jian Yang, Jing-yu Yang, David Zhang. Median Fisher Discriminator: a robust feature extraction method with applications to biometrics
306 -- 330Guoshun Hao, Shilong Ma, Yuefei Sui, Jianghua Lv. Dynamic description logic model for data integration

Volume 2, Issue 2

113 -- 0Guilu Long, Tzyh Jong Tarn. Progress in theoretical quantum computing
114 -- 128Xiuhong Gao, Albeverio Sergio, Kai Chen, Shaoming Fei, Xianqing Li-Jost. Entanglement of formation and concurrence for mixed states
129 -- 137Wei Cui, Zairong Xi, Yu Pan. Decoherence control for high-temperature reservoirs
138 -- 142Dafa Li. Quantum fixed-point search algorithm with general phase shifts
143 -- 146Hao Chen. Constructing quantum codes
147 -- 160Xihan Li, Fuguo Deng. Controlled teleportation
161 -- 166Jiafu Xu, Fanming Song. Quantum programming languages
167 -- 178Guilu Long, Yang Liu. Duality quantum computing
179 -- 189Ting Gao, Fengli Yan, Zhixi Wang, Youcheng Li. Quantum probabilistically cloning and computation
190 -- 192Yuchun Wu, GuangCan Guo. High-dimension Bell inequalities
193 -- 207Daowen Qiu, Lvzhou Li. An overview of quantum computation models: quantum automata

Volume 2, Issue 1

1 -- 11Jian Zhang, Wenhui Zhang, Naijun Zhan, Yi-Dong Shen, Haiming Chen, Yunquan Zhang, Yongji Wang, Enhua Wu, Hongan Wang, Xueyang Zhu. Basic research in computer science and software engineering at SKLCS
12 -- 21Masahiko Sato, Takafumi Sakurai, Yukiyoshi Kameyama, Atsushi Igarashi. Calculi of meta-variables
22 -- 28Tetsuya Mizutani, Shigeru Igarashi, Masayuki Shio, Yasuwo Ikeda. Human factors in continuous time-concerned cooperative systems represented by ::::N:::: Sigma-labeled calculus
29 -- 38Yixiang Chen, Hengyang Wu. Semantics of sub-probabilistic programs
39 -- 54Asem Kasem, Tetsuo Ida. Computational origami environment on the web
55 -- 66Changbo Chen, Marc Moreno Maza, Wei Pan, Yuzhen Xie. On the verification of polynomial system solvers
67 -- 80Wenqin Zhou, David J. Jeffrey. Fraction-free matrix factors: new forms for LU and QR factors
81 -- 86Lifei Chen, Qingshan Jiang. An extended EM algorithm for subspace clustering
87 -- 93Chuangbai Xiao, Jing Yu, Kaina Su. Gibbs artifact reduction for POCS super-resolution image reconstruction
94 -- 105Juanzi Li, Jie Tang, Jing Zhang, Qiong Luo, Yunhao Liu, MingCai Hong. Arnetminer: expertise oriented search using social networks
106 -- 112Lingling Wang, Guoyin Zhang, Chunguang Ma. ID-based deniable ring authentication with constant-size signature