Journal: J. Comput. Sci. Technol.

Volume 22, Issue 6

785 -- 794Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong. Revocable Ring Signature
795 -- 804Rafiullah Chamlawi, Asifullah Khan, Adnan Idris. Wavelet Based Image Authentication and Recovery
805 -- 821Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, Zheng-Tao Jiang. Short Group Signatures Without Random Oracles
822 -- 829Rong-Hua Li, Chuan-Kun Wu. A Protocol for a Private Set-Operation
830 -- 834Shengqiang Li, Zhixiong Chen, Xiaotong Fu, Guozhen Xiao. Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length ::::pq::::
835 -- 845Vincent Le Chevalier, Marc Jaeger, Xing Mei, Paul-Henry Cournède. Simulation and Visualisation of Functional Landscapes: Effects of the Water Resource Competition Between Plants
846 -- 858Zhang-Lin Cheng, Xiaopeng Zhang, Baoquan Chen. Simple Reconstruction of Tree Branches from a Single Range Image
859 -- 866Jun Teng, Marc Jaeger, Bao-Gang Hu. A Fast Ambient Occlusion Method for Real-Time Plant Rendering
867 -- 876Murat Ekinci, Murat Aykut. Human Gait Recognition Based on Kernel PCA Using Projections
877 -- 889Chaveevan Pechsiri, Asanee Kawtrakul. Mining Causality for Explanation Knowledge from Text
890 -- 897Yu Li, Yongtian Wang, Yue Liu. Fiducial Marker Based on Projective Invariant for Augmented Reality
898 -- 903Xiao Dong Wang, Ying-Jie Wu. An Improved HEAPSORT Algorithm with ::::n:::: log ::::n:::: - 0.788928 ::::n:::: Comparisons in the Worst Case
904 -- 908Heitor Silvério Lopes, Reginaldo Bitello. A Differential Evolution Approach for Protein Folding Using a Lattice Model
909 -- 913Yongxi Cheng. Generating Combinations by Three Basic Operations

Volume 22, Issue 5

641 -- 652Xian-He Sun, Surendra Byna, Yong Chen. Server-Based Data Push Architecture for Multi-Processor Environments
653 -- 660Qiang Zhou, Yici Cai, Duo Li, Xianlong Hong. A Yield-Driven Gridless Router
661 -- 672Kai Liu, Keyan Wang, Yunsong Li, Chengke Wu. A Novel VLSI Architecture for Real-Time Line-Based Wavelet Transform Using Lifting Scheme
673 -- 680Wei Wang, Yu Hu, Yinhe Han, Xiaowei Li, You-Sheng Zhang. Leakage Current Optimization Techniques During Test Based on Don t Care Bits Assignment
681 -- 694Ozgur Sinanoglu. Low Cost Scan Test by Test Correlation Utilization
695 -- 710Francesc Giné, Francesc Solsona, Mauricio Hanzich, Porfidio Hernández, Emilio Luque. Cooperating CoScheduling: A Coscheduling Proposal Aimed at Non-Dedicated Heterogeneous NOWs
711 -- 724Xuegang Hu, Pei-Pei Li, Xindong Wu, Gong-Qing Wu. A Semi-Random Multiple Decision-Tree Algorithm for Mining Data Streams
725 -- 735Jianhua Feng, Qian Qian, Jianyong Wang, Li-Zhu Zhou. Efficient Mining of Frequent Closed XML Query Pattern
736 -- 748Jianhua Feng, Yuguo Liao, Yong Zhang. HCH for Checking Containment of XPath Fragment
749 -- 760Yongwei Miao, Jieqing Feng, Chunxia Xiao, Qunsheng Peng, A. Robin Forrest. Differentials-Based Segmentation and Parameterization for Point-Sampled Surfaces
761 -- 769Hao-Da Huang, Xin Tong, Wen-Cheng Wang. Accelerated Parallel Texture Optimization
770 -- 778Bo Li, Runhai Jiao, Yuancheng Li. Fast Adaptive Wavelet for Remote Sensing Image Compression
779 -- 784Pyung Soo Kim, Myung-Eui Lee. A New FIR Filter for State Estimation and Its Application

Volume 22, Issue 4

497 -- 504Zhiyuan Li. Simultaneous Minimization of Capacity and Conflict Misses
505 -- 514Youcef Derbal. A Model of Grid Service Capacity
515 -- 520Jung Hoon Lee. Next High Performance and Low Power Flash Memory Package Structure
521 -- 526Jun Yao, Jiwu Shu, Weimin Zheng. Distributed Storage Cluster Design for Remote Mirroring Based on Storage Area Network
527 -- 531Jian-Hui Huang, Depei Qian, Shengling Wang. Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network
532 -- 540Minghui Jiang, Joel Gillespie. Engineering the Divide-and-Conquer Closest Pair Algorithm
541 -- 553Yuyan Chao, Lifeng He, Tsuyoshi Nakamura, Zhenghao Shi, Kenji Suzuki, Hidenori Itoh. An Improvement of Herbrand s Theorem and Its Application to Model Generation Theorem Proving
554 -- 561Yi-Song Wang, Ming-Yi Zhang, Yu-Ping Shen. Consistency Property of Finite FC-Normal Logic Programs
562 -- 568Xi-Shun Zhao, Yu-Ping Shen. Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction
569 -- 574Jing-Fa Liu, Wen-Qi Huang. Quasi-Physical Algorithm of an Off-Lattice Model for Protein Folding Problem
575 -- 579Xiaoju Dong, Yuxi Fu. Barbed Congruence of Asymmetry and Mismatch
580 -- 589Anwar M. Mirza, Asmatullah Chaudhry, Badre Munir. Spatially Adaptive Image Restoration Using Fuzzy Punctual Kriging
590 -- 596Feng Xue, You-Sheng Zhang, Ju-Lang Jiang, Min Hu, Xin-Dong Wu, Rong-Gui Wang. Real-Time Texture Synthesis Using s-Tile Set
597 -- 607Gang Xu, Guo-Zhao Wang. AHT Bézier Curves and NUAH B-Spline Curves
608 -- 617Jun Zhao, Feifan Liu. Linguistic Theory Based Contextual Evidence Mining for Statistical Chinese Co-Reference Resolution
618 -- 625Yong-Dong Zhang, Sheng Tang, Jin-Tao Li. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication
626 -- 632Fengxi Song, David Zhang, Cai-Kou Chen, Jing-yu Yang. Facial Feature Extraction Method Based on Coefficients of Variances
633 -- 640Xiafen Zhang, Yueting Zhuang, Jiangqin Wu, Fei Wu. Hierarchical Approximate Matching for Retrieval of Chinese Historical Calligraphy Character

Volume 22, Issue 3

338 -- 347Giuseppe Lami, Robert W. Ferguson. An Empirical Study on the Impact of Automation on the Requirements Analysis Process
348 -- 357Pierre Bourque, Serge Oligny, Alain Abran, Bertrand Fournier. Developing Project Duration Models in Software Engineering
358 -- 370Nelly Condori-Fernández, Silvia Mara Abrahão, Oscar Pastor. On the Estimation of the Functional Size of Software from Requirements Specifications
371 -- 378Juan Jose Cuadrado-Gallego, Daniel Rodríguez, Miguel-Ángel Sicilia, Miguel Garre, Ángel García-Crespo. Software Project Effort Estimation Based on Multiple Parametric Models Generated Through Data Clustering
379 -- 386Liguo Yu, Srini Ramaswamy. Component Dependency in Object-Oriented Software
387 -- 396Taghi M. Khoshgoftaar, Pierre Rebours. Improving Software Quality Prediction by Noise Filtering Techniques
397 -- 409Piotr Tomaszewski, Lars Lundberg, Håkan Grahn. Improving Fault Detection in Modified Code - A Study from the Telecommunication Industry
410 -- 425Chong-Yi Yuan, Wen Zhao, Shikun Zhang, Yu Huang. A Three-Layer Model for Business Processes - Process Logic, Case Semantics and Workflow Management
426 -- 437Chunxiao Lin, Yiyun Chen, Long Li, Bei Hua. Garbage Collector Verification for Proof-Carrying Code
438 -- 448Xiaolan Zhang 0003, Brian King. An Anti-Counterfeiting RFID Privacy Protection Protocol
449 -- 456Wenling Wu, Wentao Zhang, Dengguo Feng. Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
457 -- 468Xinli Huang, Futai Zou, Fan-Yuan Ma. Targeted Local Immunization in Scale-Free Peer-to-Peer Networks
469 -- 475. Cryptanalysis of Achterbahn-Version 1 and -Version 2
476 -- 480Sinkyu Kim, Jae-Woo Choi, DaeHun Nyang, GeneBeck Hahn, JooSeok Song. Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN
481 -- 486Enjian Bai, Xiaojuan Liu. Some Notes on Prime-Square Sequences
487 -- 493Chang-ji Wang, Yong Tang, Qing Li. ID-Based Fair Off-Line Electronic Cash System with Multiple Banks
494 -- 497Wei Fu, Guang-Zhong Xing. Edge-Oriented Spatial Interpolation for Error Concealment of Consecutive Blocks

Volume 22, Issue 2

171 -- 181Changxuan Wan, Xiping Liu. Structural Join and Staircase Join Algorithms of Sibling Relationship
182 -- 189Donghong Han, Guoren Wang, Chuan Xiao, Rui Zhou. Load Shedding for Window Joins over Streams
190 -- 196Xiaobo Fan, Ting-Ting Xie, Cuiping Li, Hong Chen. MRST - An Efficient Monitoring Technology of Summarization on Stream Data
197 -- 207Jun Zhang, Zhaohui Peng, Shan Wang, Huijing Nie. CLASCN: Candidate Network Selection for Efficient Top- ::::k:::: Keyword Queries over Databases
208 -- 217Yi Zhuang, Yueting Zhuang, Fei Wu. Composite Distance Transformation for Indexing and ::::k:::: -Nearest-Neighbor Searching in High-Dimensional Spaces
218 -- 227Qiang Liu, Tao Huang, Shaohua Liu, Hua Zhong. An Ontology-Based Approach for Semantic Conflict Resolution in Database Integration
228 -- 231Tao-Yuan Cheng, Shan Wang. A Novel Approach to Clustering Merchandise Records
232 -- 244Yunjun Gao, Chun Li, Gencai Chen, Ling Chen, Xianta Jiang, Chun Chen. Efficient ::::k:::: -Nearest-Neighbor Search Algorithms for Historical Moving Object Trajectories
245 -- 251Ji-Dong Chen, Xiao-Feng Meng. Indexing Future Trajectories of Moving Objects in a Constrained Network
252 -- 260Hongding Wang, Yunhai Tong, Shaohua Tan, Shi-Wei Tang, Dongqing Yang, Guo-Hui Sun. An Adaptive Approach to Schema Classification for Data Warehouse Modeling
261 -- 272Yuhai Zhao, Guoren Wang, Ying Yin, Guangyu Xu. A Novel Approach to Revealing Positive and Negative Co-Regulated Genes
273 -- 279Yan Zhang, Zhifeng Chen, Yuanyuan Zhou. Efficient Execution of Multiple Queries on Deep Memory Hierarchy
280 -- 286Chaokun Wang, Jianmin Wang, Jia-Guang Sun, Shengfei Shi, Hong Gao. AbIx: An Approach to Content-Based Approximate Query Processing in Peer-to-Peer Data Systems
287 -- 296Unil Yun. Analyzing Sequential Patterns in Retail Databases
297 -- 307Min Zhao, Suqing Han, Jue Wang. Tree Expressions for Information Systems
308 -- 319Changle Zhou, Yun Yang, Xiaoxi Huang. Computational Mechanisms for Metaphor in Languages: A Survey
320 -- 328Bo Yang, Dayou Liu. A Heuristic Clustering Algorithm for Mining Communities in Signed Networks
330 -- 334Hui-Xuan Tang, Hui Wei. A Coarse-to-Fine Method for Shape Recognition
334 -- 337Shizhu Liu, Heping Hu. Text Classification Using Sentential Frequent Itemsets

Volume 22, Issue 1

1 -- 14Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, Chris Wu. Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
15 -- 24Yulai Zhao, Xianfeng Li, Dong Tong, Xu Cheng. An Energy-Efficient Instruction Scheduler Design with Two-Level Shelving and Adaptive Banking
25 -- 27Dong-Yu Zheng, Yan Sun, Shao-Qing Li, Liang Fang. A 485ps 64-Bit Parallel Adder in 0.18::::mu::::m CMOS
28 -- 38Chiou-Yng Lee, Yung-Hui Chen, Che Wun Chiou, Jim-Min Lin. Unified Parallel Systolic Multiplier Over ::::GF::::(2:::::::m:::::::)
39 -- 43Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang. Bounded Model Checking of CTL
54 -- 59Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling. Two-Factor Cancelable Biometrics Authenticator
60 -- 70Issam Damaj. Higher-Level Hardware Synthesis of the KASUMI Algorithm
71 -- 74Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004
75 -- 78Haixia Xu, Bao Li. Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme
79 -- 87Jie Liang, Xue-Jia Lai. Improved Collision Attack on Hash Function MD5
88 -- 91Yonglong Luo, Liusheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem
92 -- 94Duo Liu, Ping Luo, Yiqi Dai. Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
95 -- 102Haibo Tian, Xi Sun, YuMin Wang. A New Public-Key Encryption Scheme
103 -- 108Zhenchuan Chai, Zhenfu Cao, Yuan Zhou. Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
109 -- 113Wei Gao, Xueli Wang, Dongqing Xie. Chameleon Hashes Without Key Exposure Based on Factoring
114 -- 120Min Liu, Zhongcheng Li, Xiao-Bing Guo. An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN
121 -- 130Jing Zhou, David De Roure. FloodNet: Coupling Adaptive Sampling with Energy Aware Routing in a Flood Warning System
131 -- 134KwangJin Park, Hyunseung Choo, Chong-Sun Hwang. An Efficient Data Dissemination Scheme for Spatial Query Processing
135 -- 146Yong Liao, Xudong Chen, Guangze Xiong, Qingxin Zhu, Nan Sang. End-to-End Utilization Control for Aperiodic Tasks in Distributed Real-Time Systems
147 -- 155Han-Bing Yan, Shi-Min Hu, Ralph R. Martin. 3D Morphing Using Strain Field Interpolation
156 -- 160Wen Zheng, Jun-Hai Yong, Jean-Claude Paul. Visual Simulation of Multiple Unmixable Fluids
161 -- 167Sheng-You Lin, Jiao-Ying Shi. A Markov Random Field Model-Based Approach to Natural Image Matting