default search action
FCST 2009: Shanghai, China
- Fourth International Conference on Frontier of Computer Science and Technology, FCST 2009, Shanghai, China, 17-19 December, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3932-4
- Jianjiang Li, Lin Yan, Dan Hei, Lei Zhang:
One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth Migration. 3-8 - Xingang Wang, Yue Hu, Bin Cheng, Weiqin Tong:
A Study on the Preprocessing of MLFMA Parallel Computation. 9-13 - Zhiqiang Liu, Junqiang Song, Kaijun Ren, Fen Xu, Xiaoling Qu:
A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore Systems. 14-21 - Bin Cheng, Xingang Wang, Ying Li, Weiqing Tong:
Formal Approach for Performance Analysis Oriented Parallel System Design. 22-26 - Yaobin Wang, Hong An, Jie Yan, Qi Li, Wenting Han, Li Wang, Gu Liu:
Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications. 27-32 - Gu Liu, Hong An, Wenting Han, Guang Xu, Ping Yao, Mu Xu, Xiurui Hao, Yaobin Wang:
A Program Behavior Study of Block Cryptography Algorithms on GPGPU. 33-39 - Weijiang Liu, Wenyu Qu, Hong Ye, Zhaobin Liu, Keqiu Li:
A Resource-Efficient System for Measuring Flow Length Distribution. 40-44 - Bin Wu, Shengqi Yang, Haizhou Zhao, Bai Wang:
A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduce. 45-51 - Xiaoshuang Xia, Yi Liu, Yunbin Wang, Tengfei Mu:
Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems. 52-58 - Jinbo Du, Hao-peng Chen, Can Zhang:
A Heuristic Approach with Branch Cut to Service Substitution in Service Orchestration. 59-67 - Bo Li, Koichi Wada:
Communication Latency Tolerant Parallel Algorithm for Particle Swarm Optimization. 68-74 - Yi Shao, Liehui Jiang, Qiuxia Zhao, Yuliang Wang:
High Performance and Parallel Model for LU Decomposition on FPGAs. 75-79 - Keqin Li:
A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular Networks. 80-85 - Songqiao Han, Yong Zhang:
Performance Evaluation of Mobile Service Design Paradigm in Ubiquitous Computing Environments. 89-95 - Long Zheng, Mianxiong Dong, Hai Jin, Minyi Guo, Li Li:
An Improved Approach to Tag Reduction on Low Power CMP with Trade-Off of Energy and Performance. 96-102 - Wen Zhao, Xueyang Liu, Xinpeng Li, Dianxing Liu, Shikun Zhang:
Research on Hierarchical P2P Based RFID Code Resolution Network and Its Security. 103-111 - Jiangfeng Li, Chenxi Zhang:
A Decentralized Cooperative Autonomic Management Model in Grid Systems. 112-118 - Lili Shi, Shoubao Yang, Liangmin Guo, Bin Wu:
A Markov Chain Based Resource Prediction in Computational Grid. 119-124 - Yuqiong Xu, Shijian Li, Gang Pan:
ScudOSGi: Enabling Facility-Involved Task Migration in OSGi Framework. 125-131 - Tomohiro Sugahara, Masato Honda, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:
Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part One. 135-141 - Tatsuya Sakuma, Masato Honda, Tomohiro Sugahara, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:
Development of General-Purpose Processing Element and Network-Based Dataflow Processing System: Part Two. 142-148 - Masayuki Moriguchi, Arata Shinozaki, Takayuki Nakatomi, Mitsunori Kubo, Minyi Guo:
Network-Based Data Flow Processing System with Variable Data Granularity for Inter-module Communication. 149-155 - Ying Li, Chengchen Ge, Weiqin Tong, Bin Cheng, Xiaoli Zhi:
The Application of the Adaptive Multi-mode Interactive Interface Based on Embedded Equipments. 156-160 - Lianlai Wang, Peitao Wang, Yujun Zheng:
Emergency Software Maintenance for Individual Industrial Equipments. 161-167 - Hui-Ya Li, Cheng-Tsun Yang, Wen-Jyi Hwang:
Efficient VLSI Architecture for Fuzzy C-Means Clustering in Reconfigurable Hardware. 168-174 - Willy Yanthy, Takayuki Sekiya, Kazunori Yamaguchi:
Mining Interesting Rules by Association and Classification Algorithms. 177-182 - Jia Liu, Yongwei Wu, Guangwen Yang:
Optimization of Data Retrievals in Processing Data Integration Queries. 183-189 - Youyou Lu, Zhuzhong Qian, Sanglu Lu:
A Tree-Based Hierarchy Framework for RFID Data Repository. 190-196 - Wei Liu, Wei Du:
Reputation-Aware Scheduling for Storage Systems in Data Grids. 197-202 - Suzhen Wu, Dan Feng, Bo Mao:
CWC: Compressed Write Cache for Improving Storage System Performance. 203-209 - Tingting Wang, Jinkui Xie, Bei Jin, Zongyuan Yang:
Combinatorial Auctions Based Network Resource Allocation Mechanism with High Welfare. 213-218 - Suke Li, Liyong Tang, Jian-bin Hu, Zhong Chen:
Automatic Data Extraction from Web Discussion Forums. 219-225 - Jing Cao:
Flexible Data Collecting over Distributed Sensors on Enterprise Service Bus. 226-230 - Tao Hu, Song Guo, Minyi Guo, Feilong Tang, Mianxiong Dong:
Analysis of the Availability of Composite Web Services. 231-237 - Leming Qu:
Wavelet Image Restoration and Regularization Parameters Selection. 241-247 - Chengzhi Deng, Hui Sun, Xi Chen:
Shearlet-Based Adaptive Bayesian Estimator for Image Denoising. 248-253 - Xi Chen, Hui Sun, Chengzhi Deng:
Image Denoising Algorithm Using Adaptive Shrinkage Threshold Based on Shearlet Transform. 254-257 - Zusheng Zhang, Fengqi Yu, Baoli Zhang:
A Depth-Based TDMA Scheduling for Clustering Sensor Networks. 261-266 - Yang Wang, Xiong Fu, Liusheng Huang:
A Storage Node Placement Algorithm in Wireless Sensor Networks. 267-271 - Daidi Lin, Shining Li:
TCLA: A Triangular Cross-Layer Architecture for Wireless Sensor Networks. 272-278 - Liang He, Jingdong Xu, Yuntao Yu, Boxing Liu:
Optimizing the Path-Points Identification for Data Mules in Mobile WSNs. 279-284 - Huakang Li, Long Zheng, Jie Huang, Chunlei Zhao, Qunfei Zhao:
Mobile Robot Position Identification with Specially Designed Landmarks. 285-291 - Yao Shen, Feilong Tang, Minyi Guo, Song Guo:
A Realistic Interference Model in Ad Hoc Networks. 292-297 - Changde Li, Xingshe Zhou, Yuying Wang, Yunwei Dong:
An Improved Path-Based Reliability Prediction Model for Component-Based Embedded Software. 301-307 - Nan Wang, Jizhong Han, Yonghao Zhou, Jinyun Fang:
CURRF: A Code-Based Framework for Faithful Replay Distributed Applications. 308-316 - Xutao Du, Chunxiao Xing, Lizhu Zhou:
A Chu Spaces Semantics of BPEL-Like Fault Handling. 317-323 - Aruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Liu:
Intrusion Detection Using Geometrical Structure. 327-333 - Longjun Zhang:
Analysis and Research on the Security Key Technology of Grid. 334-338 - Junfeng Tian, Peng Yuan, Yuzhen Lu:
Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid. 339-345 - Renren Dong, Ray Kresman:
Indirect Disclosures in Data Mining. 346-350 - Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6. 351-355 - HaiQin Xu, Yongsheng Ding:
Optimizing Method for Analog Circuit Design Using Adaptive Immune Genetic Algorithm. 359-363 - Ismail Yusuf, Nanna Suryana Herman, Siti Mariyam Hj. Shamsuddin:
The Application of Genetic Algorithm into Membership Function FLC Used Floating Point. 364-370 - Dao-Lei Liang, Jian Jin, Guo-Xing Huang:
A Fuzzy Clustering Algorithm with Effectiveness Factor. 371-376 - (Withdrawn) Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication System. 377-381
- Laila Mohamed El Fangary:
Mining Data of Buffalo and Cow Production in Egypt. 382-387 - Jacek Kubacki, Leszek Koszalka, Iwona Pozniak-Koszalka, Andrzej Kasprzak:
Comparison of Heuristic Algorithms to Solving Mesh Network Path Finding Problem. 388-392 - Guanqun Liang, Huanye Sheng:
A Chinese Health Care Reform Simulation Method Based on Mechanism Design. 393-398 - Yuxin Deng, Wenjie Du:
A Local Algorithm for Checking Probabilistic Bisimilarity. 401-407 - Jing Yang:
A Framework for Formalizing UML Models with Formal Language Rcos. 408-416 - Jing Yang:
Analyzing UML Sequence Diagrams with UTP. 417-423 - Sattar Hashemi, M. R. ZadMiralvad:
Automatic Refinement of Platform Independent Models Using Graph Transformation System. 424-428 - Lizhi Cai, Weiqin Tong, Bin Zhu, Juan Zhang:
Modeling Software Testing Process Using HTCPN. 429-434 - Tingtao Sun, Yindong Yang, Hongbo Yang, Haibing Guan, Alei Liang:
Return Instruction Analysis and Optimization in Dynamic Binary Translation. 435-440 - Abbas Vafaei, M. Miralipoor:
Structure and Parameter Learning of CDHMM Based on Reduction. 441-445 - F. Taghizadeh, S. R. Taghizadeh:
A Graph Transformation-Based Approach for Applying MDA to SOA. 446-451 - JiZhe Li, Yongjun Yuan:
Research & Implementation of Lightweight ESB with Microsoft .NET. 455-459 - Haifeng Ling, Xianzhong Zhou, Yujun Zheng:
Design and Implementation of DSL via Category Theoretic Computations. 460-466 - Dong Li, Youli Lu:
Design and Implementation of Integrated Transport Network Planning Evaluation System Based on GIS. 467-472 - Kaihua Xu, Jun Zhou, Yuhua Liu, Shuyun Dong:
Signal Integrity Research of High Speed Circuit of Embedded System. 473-477 - Chorng-Shiuh Koong, Hung-Jui Lai, Kuan-Chou Lai:
An Embedded Software Architecture for Robot with Variable Structures. 478-484 - Xiaona Xia, Baoxiang Cao, Jiguo Yu:
The Self-Adaptive Routing Evolution Model's Research about Internetware of Architecture-centric System. 485-491 - Bicheng Li, Huang Jie, Hujun Yin:
A General Fuzzy Modeling Approach to Detection Decision Fusion. 495-501 - Bing Sun, Guohui Zhou:
A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular Parts. 502-509 - Tingting Zhou, Samuel K. F. Yung, Zhenghua Wang, Yunping Zhu:
A New Recursive Approach for Reconstructing Metabolic Networks from KEGG. 510-515 - Ranxiao Frances Wang:
A Case Study on Human Learning of Four-Dimensional Objects in Virtual Reality: Passive Exploration and Display Techniques. 519-523 - Chunxin Lia, Chaojun Lu:
Extending BPEL to Model Business Processes Involving Human Activities. 524-529 - Dong Li, Youli Lu:
Design and Implementation of Online Classroom Real-Time Generating and On-Demand System. 530-536 - Bofeng Zhang, Tiezheng Zou, Yongjun Wang, Baokang Zhang:
Remote Operation System Detection Base on Machine Learning. 539-542 - Yuxiang Hu, Julong Lan, Chengwei Wan:
An Algorithm for Unsplittable Flow Problem in Flexible Reconfigurable Network. 543-547 - Yanxiang He, Tao Liu, Hai Zhong, Qi Xiong:
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks. 548-552 - Weimin Luo, Jing Liu, Jingbo Liu, Chengyu Fan:
An Exact Model for Active P2P Worms Propagation. 553-558 - Yongsheng Liu, Jie Li:
Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks. - Huang Lu, Jie Li, Guojun Wang:
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks. 565-570 - Chengwei Wan, Julong Lan, Yuxiang Hu:
Lookup with CAM Aided Hash Table. 571-575 - Yang Li, Chengwei Wan, Xiumei Fan:
Range Matching without TCAM Entries Expansion for Packet Classification. 576-580 - Yipin Sun, Baokang Zhao, Jinshu Su:
ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications. 581-586 - Yan Xia, Zhenghu Gong, Baokang Zhao, Jinshu Su:
A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks. 587-592 - Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang:
Research on Trust Evaluation Model Based on TPM. 593-597 - Miao Yu, Peijie Yu, Shang Gao, Qian Lin, Min Zhu, Zhengwei Qi:
HBSP: A Lightweight Hardware Virtualization Based Framework for Transparent Software Protection in Commodity Operating Systems. 601-606 - Ahmad Iqbal, Daisuke Horie, Yuichi Goto, Jingde Cheng:
A Database System for Effective Utilization of ISO/IEC 27002. 607-612 - Guiping Dai, Yong Wang:
Trust-Aware Component Service Selection Algorithm in Service Composition. 613-618 - Yuichi Goto, Jingde Cheng:
Information Assurance, Privacy, and Security in Ubiquitous Questionnaire. 619-624 - Shoichi Morimoto:
Application of COBIT to Security Management in Information Systems Development. 625-630 - Menglong Jiang, Zhengwei Qi, Haibing Guan, Anil Kumar Karna:
Croth: Effective Process Protection and Monitoring with Hardware Virtualization. 633-638 - Dan Li, Yingsong Hu, Xiangxiao Hu, Hefei Ling:
Self-Checking Tamper-Proofing Based on Software Behavior Model. 639-643 - Hui Wang, Guoping Zhang, Huiguo Chen, Xueshu Jiang:
Mining Association Rules for Intrusion Detection. 644-648 - Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:
Decoupling Dynamic Test Generation from Specific Operating System Details Based on Whole System Virtual Machine. 649-654 - Yongqin Huang:
DFHR: A Design Framework for HPC Reliability. 655-660 - Honghao Zhang, Guang Jin, Wei Wei, Fei Zhang, Huizhan Zhang, Zhijun Xie:
ASTVA: Traffic Validation Architecture Based on Autonomous Systems. 661-665 - Chuan-xiang Ma, Ze-ming Fang, Rui Chen:
An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules Mining. 666-671 - Jun-Zhao Sun, Jiehan Zhou:
A CFSM-Based Reprogramming Scheme for Flexible Wireless Sensor Networks. 675-680 - Xiaoyang Liu, Cai Fu, Jiandong Yang, Lansheng Han:
Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes. 681-685 - Jiehan Zhou, Jukka Riekki, Jun-Zhao Sun:
Pervasive Service Computing toward Accommodating Service Coordination and Collaboration. 686-691 - Hongyan Mao, Ningkang Jiang, Qin Li, Huibiao Zhu:
Formal Approaches to SMS Service Based on Pi Calculus. 692-697 - Iván Sánchez Milara, Oleg Davidyuk, Jukka Riekki:
Towards User-Oriented Application Composition. 698-704 - Jiehan Zhou, Jun-Zhao Sun, Mika Rautiainen, Oleg Davidyuk, Meirong Liu, Ekaterina Gilman, Xiang Su, Mika Ylianttila, Jukka Riekki:
PSC-RM: Reference Model for Pervasive Service Composition. 705-709 - Linyang Sheng, Liming Zhang:
The Implementation and Design of Electronic Bag Based on ARM. 710-714 - Songhua Huang, Heng Wang, Feng Ding:
Configure Care-of Address for Nested Network Mobility. 717-721 - Jing Jin, Zhiguang Qin, Hu Xiong, Juan Wang, Zhigang Wu:
DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets. 722-727 - Haigang Gong, Xue Zhang, Lingfei Yu, Xiaomin Wang, Fasheng Yi:
A Study on MAC Protocols for Wireless Sensor Networks. 728-732 - Xiaomin Wang, Chao Song:
A Distributed Cluster-Based Algorithm in Wireless Sensor Networks. 733-737
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.