Journal: J. Comput. Sci. Technol.

Volume 24, Issue 6

997 -- 999Fei-Yue Wang, Ning-Hui Sun, Wenji Mao, Xiao-Wei Li. Preface
1000 -- 1009Huaifeng Zhang, Yanchang Zhao, Longbing Cao, Chengqi Zhang, Hans Bohlscheid. Customer Activity Sequence Classification for Debt Prevention in Social Security
1010 -- 1017Xiaochen Li, Wenji Mao, Daniel Zeng, Peng Su, Fei-Yue Wang. Performance Evaluation of Machine Learning Methods in Cultural Modeling
1018 -- 1027Xindong Wu, Xingquan Zhu, Qijun Chen, Fei-Yue Wang. Ubiquitous Mining with Interactive Data Mining Agents
1028 -- 1034Huiqian Li, Fen Xia, Daniel Zeng, Fei-Yue Wang, Wenji Mao. Exploring Social Annotations with the Application to Web Page Recommendation
1035 -- 1047Yang Li, Chang-Jun Hu, Xin Yao. Innovative Batik Design with an Interactive Evolutionary Art System
1048 -- 1060Jianwei Xu, Mingyu Chen, Gui Zheng, Zheng Cao, Huiwei Lv, Ninghui Sun. SimK: A Large-Scale Parallel Simulation Engine
1061 -- 1073Dongrui Fan, Nan Yuan, Junchao Zhang, Yongbin Zhou, Wei Lin, Fenglong Song, Xiaochun Ye, He Huang, Lei Yu, Guoping Long, Hao Zhang, Lei Liu. Godson-T: An Efficient Many-Core Architecture for Parallel Program Executions
1074 -- 1085Ying Zhang, Huawei Li, Xiaowei Li. Selected Crosstalk Avoidance Code for Reliable Network-on-Chip
1086 -- 1097Wei Mi, Xiaobing Feng 0002, Yao-Cang Jia, Li Chen, Jing-Ling Xue. PARBLO: Page-Allocation-Based DRAM Row Buffer Locality Optimization
1098 -- 1108Utku Kalay, Oya Kalipsiz. A Comparison Study of Moving Object Index Structures
1109 -- 1124Arianna D Ulizia, Fernando Ferri, Anna Formica, Patrizia Grifoni. Approximating Geographical Queries
1125 -- 1137Yisong Wang, Mingyi Zhang, Jia-Huai You. Logic Programs, Compatibility and Forward Chaining Construction
1138 -- 1148Soon-Gyu Jeong, Sang-Jo Yoo. Distributed Coordinator Election Scheme for QoS Support and Seamless Connectivity in WPANs
1149 -- 1161Moonki Jung, Hyundeok Cho, Taehwan Roh, Kunwoo Lee. Integrated Framework for Vehicle Interior Design Using Digital Human Model
1162 -- 1170Fang-Fang Dong, Zhen Liu. A New Gradient Fidelity Term for Avoiding Staircasing Effect

Volume 24, Issue 5

808 -- 819Qing Zhang, Wei Wei, Ting Yu. On the Modeling of Honest Players in Reputation Systems
820 -- 832Anna Gutowska, Andrew Sloane, Kevan Buckley. On Desideratum for B2C E-Commerce Reputation Systems
833 -- 843Huanyu Zhao, Xiaolin Li. H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid
844 -- 854Xavier Bonnaire, Erika Rosas. WTR: A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor
855 -- 867Ya-Fei Yang, Qin-Yuan Feng, Yan (Lindsay) Sun, Ya-Fei Dai. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator
868 -- 882Xiao-Yong Li, Xiao-lin Gui. A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks
883 -- 892Yu Zhang, Huajun Chen, Xiaohong Jiang, Hao Sheng, Zhaohui Wu. RCCtrust: A Combined Trust Model for Electronic Community
893 -- 900Haihua Li, Xiaoyong Du, Xuan Tian. A Review-Based Reputation Evaluation Approach for Web Services
901 -- 912Yong-Qin Huang, Hong-Liang Li, Xiang-Hui Xie, Lei Qian, Zi-Yu Hao, Feng Guo, Kun Zhang. ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer
913 -- 924Gabriel Falcão Paiva Fernandes, Shinichi Yamagiwa, Vítor Manuel Mendes da Silva, Leonel Sousa. Parallel LDPC Decoding on GPUs Using a Stream-Based Computing Approach
925 -- 938Sarbani Roy, Nandini Mukherjee. Adaptive Execution of Jobs in Computational Grid Environment
939 -- 948Ozgur Sinanoglu, Mohammed Al-Mulla, Noora A. Shunaiber, Alex Orailoglu. Scan Cell Positioning for Boosting the Compression of Fan-Out Networks
949 -- 961Dianxiang Xu, Omar el Ariss, Wei-Feng Xu, Lin-Zhang Wang. Aspect-Oriented Modeling and Verification with Finite State Machines
962 -- 974Dan Hao, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun. Interactive Fault Localization Using Test Information
975 -- 986Mingjun Xiao, Liusheng Huang, Qun-Feng Dong, An Liu, Zhen-Guo Yang. Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks
987 -- 997Shaoliang Peng, Shanshan Li, Xiangke Liao, Yuxing Peng, Nong Xiao. Estimation of a Population Size in Large-Scale Wireless Sensor Networks

Volume 24, Issue 4

615 -- 625Hang Guo, Li-Zhu Zhou, Ling Feng. Self-Switching Classification Framework for Titled Documents
626 -- 637Yue Kou, Derong Shen, Ge Yu, Tiezheng Nie. Combining Local Scoring and Global Aggregation to Rank Entities for Deep Web Queries
638 -- 651An Liu, Hai Liu, Qing Li, Liusheng Huang, Mingjun Xiao. Constraints-Aware Scheduling for Transactional Services Composition
652 -- 664Gang Wu, Juan-Zi Li, Jianqiang Hu, Kehong Wang. System Pi: A Native RDF Repository Based on the Hypergraph Representation for RDF Data Model
665 -- 674Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir. Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking
675 -- 686Narjes Hachani, Mohamed Ali Ben Hassine, Hanene Chettaoui, Habib Ounelli. Cooperative Answering of Fuzzy Queries
687 -- 707Hua Luan, Xiaoyong Du, Shan Wang. Prefetching J:::+:::-Tree: A Cache-Optimized Main Memory Database Index Structure
708 -- 722Hua Luan, Xiaoyong Du, Shan Wang. Cache-Conscious Data Cube Computation on a Modern Processor
723 -- 733Hailong Liu, Qun Chen, Zhanhuai Li. Optimization Techniques for RFID Complex Event Processing
734 -- 744Hua Huang, Yu Zang, Paul L. Rosin, Chun Qi. Edge-Aware Level Set Diffusion and Bilateral Filtering Reconstruction for Image Magnification
745 -- 752Young-suk Shin. Facial Expression Recognition of Various Internal States via Manifold Learning
753 -- 760Wu Chen, Mingyi Zhang, Mao-Nian Wu. A Logic-Program-Based Negotiation Mechanism
761 -- 774San-Cheng Peng, Wei-Jia Jia, Guo-Jun Wang. Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks
775 -- 785Feng Zeng, Zhigang Chen. Cost-Sensitive and Load-Balancing Gateway Placement in Wireless Mesh Networks with QoS Constraints
786 -- 797Xinde Li, Florentin Smarandache, Jean Dezert, Xianzhong Dai. Combination of Qualitative Information with 2-Tuple Linguistic Representation in DSmT
798 -- 804Qingshi Gao, Xiaoyu Gao, Yue Hu. A New Fuzzy Set Theory Satisfying All Classical Set Formulas

Volume 24, Issue 3

405 -- 417Surendra Byna, Yong Chen, Xian-He Sun. Taxonomy of Data Prefetching for Multicore Processors
418 -- 433François Bonnet, Michel Raynal. Conditions for Set Agreement with an Application to Synchronous Systems
434 -- 446Xiao-min Zhu, Peizhong Lu. Multi-Dimensional Scheduling for Real-Time Tasks on Heterogeneous Clusters
447 -- 462Jing Zhou, Wendy Hall, David De Roure. Building a Distributed Infrastructure for Scalable Triple Stores
463 -- 471Xiao-hua Wang, Yi-gang He, Tian-Zan Li. Neural Network Algorithm for Designing FIR Filters Utilizing Frequency-Response Masking Technique
472 -- 481Raja Gunasekaran, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Sudharsan Rajagopalan, Selvaraj Sujitha Priyadarshini. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks
482 -- 494Jiahai Yang, Hui Zhang, Jin-Xiang Zhang, Changqing An. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences
495 -- 504Hao Wen, Chuang Lin, Zhijia Chen, Hao Yin, Tao He, Eryk Dutkiewicz. An Improved Markov Model for IEEE 802.15.4 Slotted CSMA/CA Mechanism
505 -- 516Xue-Hou Tan. Searching a Polygonal Region by a Boundary Searcher
517 -- 533Shin-Ichi Nakano, Ryuhei Uehara, Takeaki Uno. A New Approach to Graph Recognition and Applications to Distance-Hereditary Graphs
534 -- 543Hai-Bin Zhang, Zhen-Hua Duan. Symbolic Algorithmic Analysis of Rectangular Hybrid Systems
544 -- 556Sriparna Saha, Sanghamitra Bandyopadhyay. A New Line Symmetry Distance and Its Application to Data Clustering
557 -- 567Yanli Liu, Xiao-Gang Xu, Yanwen Guo, Jin Wang, Xin Duan, Xi Chen, Qunsheng Peng. Pores-Preserving Face Cleaning Based on Improved Empirical Mode Decomposition
568 -- 577Yong-Xi Gong, Yu Liu, Lun Wu, Yu-Bo Xie. Boolean Operations on Conic Polygons
578 -- 587Bin Sheng, Jian Zhu, Enhua Wu, Yan-Ci Zhang. Lumiproxy: A Hybrid Representation of Image-Based Models
588 -- 603Shung Han Cho, Yuntai Kyong, Sangjin Hong, We-Duke Cho. Self Localization Method Using Parallel Projection Model for Mobile Sensor in Navigation Applications
604 -- 0Muhammad Hussain. Efficient Simplification Methods for Generating High Quality LODs of 3D Meshes

Volume 24, Issue 2

183 -- 188Jeff Kramer, Jeff Magee. A Rigorous Architectural Approach to Adaptive Software Engineering
189 -- 197David Notkin. Software, Software Engineering and Software Engineering Research: Some Unconventional Thoughts
198 -- 211Leon J. Osterweil. Formalisms to Support the Definition of Processes
212 -- 237Patrick H. S. Brito, Rogério de Lemos, Cecília M. F. Rubira, Eliane Martins. Architecting Fault Tolerance with Exception Handling: Verification and Validation
238 -- 249Chao Cai, Zongyan Qiu, Hongli Yang, Xiangpeng Zhao. Global-to-Local Approach to Rigorously Developing Distributed System with Exception Handling
250 -- 261Yu Dai, Lei Yang, Bin Zhang. QoS-Driven Self-Healing Web Service Composition Based on Performance Prediction
262 -- 272Javier Garzás, Félix García, Mario Piattini. Do Rules and Patterns Affect Design Maintainability?
273 -- 283Varun Gupta, Jitender Kumar Chhabra. Package Coupling Measurement in Object-Oriented Software
284 -- 293Dan Hao, Lu Zhang, Ming-Hao Liu, He Li, Jiasu Sun. Test-Data Generation Guided by Static Defect Detection
294 -- 308Tao Huang, Guoquan Wu, Jun Wei. Runtime Monitoring CompositeWeb Services Through Stateful Aspect Extension
309 -- 318Santi Martínez, Magda Valls, Concepció Roig, Josep M. Miret, Francesc Giné. A Secure Elliptic Curve-Based RFID Protocol
319 -- 338Xin Peng, Seok-Won Lee, Wenyun Zhao. Feature-Oriented Nonfunctional Requirement Analysis for Software Product Line
339 -- 346Thandar Thein, Jong Sou Park. Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization
347 -- 356Ji Wang, Xiaodong Ma, Wei Dong, Hou-Feng Xu, Wanwei Liu. Demand-Driven Memory Leak Detection Based on Flow- and Context-Sensitive Pointer Analysis
357 -- 372Bangyu Wu, Chi-Hung Chi, Shijie Xu, Ming Gu, Jia-Guang Sun. QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
373 -- 385Feng Xu, Jing Pan, Wen Lu. A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments
386 -- 404Jiang Yu, Andrew Tappenden, James Miller, Michael R. Smith. A Scalable Testing Framework for Location-Based Services

Volume 24, Issue 1

2 -- 5Daniel Cohen-Or. Space Deformations, Surface Deformations and the Opportunities In-Between
6 -- 18Weiwei Xu, Kun Zhou. Gradient Domain Mesh Deformation - A Survey
19 -- 29Tao Ju. Fixing Geometric Errors on Polygonal Models: A Survey
30 -- 38Gregory M. Nielson, Liyan Zhang, Kun Lee, Adam Huang. Spherical Parameterization of Marching Cubes IsoSurfaces Based upon Nearest Neighbor Coordinates
39 -- 46Fuhua (Frank) Cheng, Fengtao Fan, Shuhua Lai, Conglin Huang, Jiaxi Wang, Jun-Hai Yong. Loop Subdivision Surface Based Progressive Interpolation
47 -- 55Yong Zhao, Xin-guo Liu, Qunsheng Peng, Hu-Jun Bao. Rigidity Constraints for Large Mesh Deformation
56 -- 64George W. Hart. An Algorithm for Constructing 3D Struts
65 -- 75Zhe Bian, Shi-Min Hu, Ralph R. Martin. Evaluation for Small Visual Difference Between Conforming Meshes on Strain Field
76 -- 95Sa ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane. An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs
96 -- 109Liang Xu, Wei Chen, Yanyan Xu, Wenhui Zhang. Improved Bounded Model Checking for the Universal Fragment of CTL
110 -- 121Long Li, Yu Zhang, Yiyun Chen, Yong Li. Certifying Concurrent Programs Using Transactional Memory
122 -- 137Xian Xu. Expressing First-Order pi-Calculus in Higher-Order Calculus of Communicating Systems
138 -- 151Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu. ::::n:::: PAKE:::+:::: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
152 -- 164Xuejun Yang, Yu Deng, Li Wang, Xiao-Bo Yan, Jing Du, Ying Zhang, Guibin Wang, Tao Tang. SRF Coloring: Stream Register File Allocation via Graph Coloring
165 -- 174Xiang Zhang, Gong Cheng, Weiyi Ge, Yuzhong Qu. Summarizing Vocabularies in the Global Semantic Web
175 -- 180Kevin Chiew, Yingjiu Li. Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics