中国计算机科学前沿

时间:2022-08-19 11:56:28

中国计算机科学前沿

1.Cognitive Sense of ChinaLionel M. NI,Zhang XIONG

2.Toward secure and private service discovery anywhere anytimeFeng ZHU,Matt MUTKA,Anish BIVALKAR,Abdullah DEMIR,Yue LU,Chockalingam CHIDAMBARM

3.Three challenges in data miningQiang YANG

4.Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbsYunhao LIU,Guomo ZHOU,Jizhong ZHAO,Guojun DAI,Xiang-Yang LI,Ming GU,Huadong MA,Lufeng MO,Yuan HE,Jiliang WANG,Mo LI,Kebin LIU,Wei DONG,Wei XI

5.iSensNet: an infrastructure for research and development in wireless sensor networksJiannong CAO,Hejun WU,Xuefeng LIU,Yi LAI

6.Data-driven testing methodology for RFID systemsAn LU,Wenbin FANG,Chang XU,Shing-Chi CHEUNG,Yu LIU

7.Packet transmission policies for battery operated wireless sensor networksYe LI,Honggang LI,Yuwei ZHANG,Dengyu QIAO

8.Development of foundation models for Internet of ThingsLei CHEN,Mitchell TSENG,Xiang LIAN

9.Visual data security and management for smart citiesZhenyong CHEN,Wei FAN,Zhang XIONG,Pingan ZHANG,Lixin LUO

10.A 3D shape retrieval framework for 3D smart citiesBiao LENG,Zhang XIONG,Xiangwei FU

11.Virtual cityscapes: recent advances in crowd modeling and traffic simulationMing C. LIN,Dinesh MANOCHA

12.Applied research of data sensing and service to ubiquitous intelligent transportation systemWeifeng LV,Bowen DU,Dianfu MA,Tongyu ZHU,Chen WANG

1.Documenting and verifying systems assembled from componentsZhiying LIU,David Lorge PARNAS,Baltasar Trancon y WIDEMANN

2.A concern-based approach to generating formal requirements specificationsYing JIN,Jing ZHANG,Weiping HAO,Pengfei MA,Yan ZHANG,Haiyan ZHAO,Hong MEI

3.On the computation of quotients and factors of regular languagesMircea MARIN,Temur KUTSIA

4.Financial information processing and development of emerging financial marketsShuo BAI,Shouyang WANG,Lean YU,Aoying ZHOU

5.Modeling default risk via a hidden Markov model of multiple sequencesWai-Ki Ching,Ho-Yin LEUNG,Zhenyu WU,Hao JIANG

6.Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship managementLean YU,Shouyang WANG,Kin Keung LAI

7.A class of life insurance reserve model and risk analysis in a stochastic interest rate environmentNiannian JIA,Changqing JIA,Wei QIU

8.N-person credibilistic strategic gameRui LIANG,Yueshan YU,Jinwu GAO,Zhi-Qiang LIU

9.Corporate financial distress diagnosis model and application in credit rating for listing firms in ChinaLing ZHANG,Edward I. ALTMAN,Jerome YEN

10.Evaluation of mutual funds using multi-dimensional informationXiujuan ZHAO,Jianmin SHI

11.Neural network methods for forecasting turning points in economic time series:an asymmetric verification to business cyclesDabin ZHANG,Lean YU,Shouyang WANG,Haibin XIE

12.Using jump-diffusion modeling for valuing real options in infrastructure projectsGuoxing ZHANG,Ju'e GUO,Guorong CHAI,Li GONG,Xuejun WANG

13.Partially funded public pension, human capital and endogenous growthZaigui YANG

14.Knowledge discovery through directed probabilistic topic models: a surveyAli DAUD,Juanzi LI,Lizhu ZHOU,Faqir MUHAMMAD

15.ID-based authenticated group key agreement from bilinear mapsXixiang LV,Hui LI

1.Socially inspired search and ranking in mobile social networking: concepts and challengesYufeng WANG,Akihiro NAKAO,Jianhua MA

2.Detecting academic experts by topic-sensitive link analysisHao WU,Yijian PEI,Jiang YU

3.Knowledge fusion framework based on Web page textsSikang HU,Yuanda CAO

4.Measurement of refinement and correctnessHengyang WU

5.Geometric algorithm for point projection and inversion onto Bézier surfacesJinting XU,Weijun LIU,Jianhuang WU,Hongyou BIAN,Lun LI

6.Validation indices for projective clusteringLifei CHEN,Shanjun HE,Qingshan JIANG

7.On the equal-weight symmetric Boolean functionsYu ZHOU,Guozhen XIAO

8.Security evaluation against differential and linear cryptanalyses for Feistel ciphersNianping WANG,Chenhui JIN

9.A bipartite model for load balancing in grid computing environmentsWenchao JIANG,Matthias BAUMGARTEN,Yanhong ZHOU,Hai JIN

10.Approximation algorithm for constructing data aggregation trees for wireless sensor networksDeying LI,Jiannong CAO,Qinghua ZHU

11.Virtual node based adaptive routing in wireless ad hoc networksGang LI,Hongmei SUN

12.Research of localization approach for the new comer in wireless sensor networksWei QU,Zhe LI

13.A new parallel scheduling system for multiple radio wireless mesh networkYun HU,Shoubao YANG,Qi ZHANG,Dapeng WANG,Qinwei SHEN

14.Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectorsMingfen WU

1.Challenges and possible approaches: towards the petaflops computersDepei QIAN,Danfeng ZHU

2.Four styles of parallel and net programmingZhiwei XU,Yongqiang HE,Wei LIN,Li ZHA

3.Cluster based parallel database management system for data intensive computingJianzhong LI,Wei ZHANG

4.Minimizing interconnect length on reconfigurable meshesJigang WU,Thambipillai SRIKANTHAN,Kai WANG

plex networks and computingShuigeng ZHOU,Zhongzhi ZHANG

6.An alternative approach to characterize the topology of complex networks and its application in epidemic spreadingZonghua LIU,Xiaoyan WU,Pak-Ming HUI

7.Multidimensional views on mobile call networkShengqi YANG,Bin WU,Bai WANG

8.Correlation in mobile call networks from structure perspectiveBin WU,Deyong HU,Qi YE,Bai WANG

9.A new centrality measure based on sub-treeLili RONG,Tianzhu GUO,Jiyong ZHANG

10.SIS model of epidemic spreading on dynamical networks with communityChengyi XIA,Shiwen SUN,Feng RAO,Junqing SUN,Jinsong WANG,Zengqiang CHEN

11.Detecting community structure in networks by representative energyJi LIU,Guishi DENG

12.Scale-free network models with accelerating growthHuan LI

13.Hybrid information retrieval policies based on cooperative cache in mobile P2P networksQuanqing XU,Hengtao SHEN,Zaiben CHEN,Bin CUI,Xiaofang ZHOU,Yafei DAI

14.Class structure refactoring of object-oriented softwares using community detection in dependency networksWeifeng PAN,Bing LI,Yutao MA,Jing LIU,Yeyi QIN

15.A fast iterative-clique percolation method for identifying functional modules in protein interaction networksPenggang SUN,Lin GAO

16.Evaluation of subgraph searching algorithms for detecting network motifs in biological networksJialu HU,Lin GAO,Guimin QIN

17.Improved collaborative filtering algorithm based on heat conductionQiang GUO,Jianguo LIU,Binghong WANG

18.Generalized collaboration networks in software systems: a case study of Linux kernelsShiwen SUN,Chengyi XIA,Zhenhai CHEN,Junqing SUN,Zengqiang CHEN

19.SWER: small world-based efficient routing for wireless sensor networks with mobile sinksXuejun LIU,Jihong GUAN,Guangwei BAI,Haiming LU

1.Financial information processingShuo BAI,Shouyang WANG,Lean YU,Aoying ZHOU

2.Stock prediction: an event-driven approach based on bursty keywordsDi WU,Gabriel Pui Cheong FUNG,Jeffrey Xu YU,Qi PAN

3.Risk aversion and agents' survivability in a financial marketSerge HAYWARD

4.Forecasting foreign exchange rates with an improved back-propagation learning algorithm with adaptive smoothing momentum termsLean YU,Shouyang WANG,Kin Keung LAI

5.Daily prediction of short-term trends of crude oil prices using neural networks exploiting multimarket dynamicsHeping PAN,Imad HAIDAR,Siddhivinayak KULKARNI

6.A class of classification and regression methods by multiobjective programmingDongling ZHANG,Yong SHI,Yingjie TIAN,Meihong ZHU

7.Benchmarking binary classification models on data sets with different degrees of imbalanceLigang ZHOU,Kin Keung LAI

8.A novel PPGA-based clustering analysis method for business cycle indicator selectionDabin ZHANG,Lean YU,Shouyang WANG,Yingwen SONG

9.Macro finance early warning systemGuihuan ZHENG,Xun ZHANG,Wei SHANG,Shanying XU

10.Algorithmic trading system: design and applicationsFeng WANG,Keren DONG,Xiaotie DENG

11.APF-guided adaptive immune network algorithm for robot path planningMingxin YUAN,Sunan WANG,Canyang WU,Kunpeng LI

12.Outage analysis of interference-limited systems using STBC with co-channel MIMO interferersYongzhao LI,Leonard J.CIMINI,JR.,Nageen HIMAYAT

13.Energy-efficient cooperative routing in BER constrained multihop networksBehrouz MAHAM,Mérouane DEBBAH,Are HJ(φ)RUNGNES

1.From nature to computing and backKe TANG,Xin YAO

2.Pareto analysis of evolutionary and learning systemsYaochu JIN,Robin GRUNA,Bernhard SENDHOFF

3.Evolutionary multi-objective optimization: some current research trends and topics that remain to be exploredCarlos A. COELLO COELLO

4.Monitoring of particle swarm optimizationYuhui SHI,Russ EBERHART

5.A hybrid multi-swarm particle swarm optimization to solve constrained optimization problemsYong WANG,Zixing CAI

6.Forecasting- where computational intelligence meets the stock marketEdward TSANG

7.Runtime analysis of search heuristics on software engineering problemsPer Kristian LEHRE,Xin YAO

8.Evolving Nash-optimal poker strategies using evolutionary computationHanyang QUEK,Chunghoong WOO,Kaychen TAN,Arthur TAY

9.Integrative biological systems modeling:challenges and opportunitiesJialiang WU,Eberhard VOIT

10.Optimisation of algorithm control parameters in cultural differential evolution applied to molecular crystallographyMaryjane TREMAYNE,Samantha Y. CHONG,Duncan BELL

11.Incorporating prior knowledge into learning by dividing training dataBaoliang LU,Xiaolin WANG,Masao UTIYAMA

12.Evolutionary algorithm based on schemata theoryTakashi MARUYAMA,Eisuke KITA

13.Symbolic model checking APSLWanwei LIU,Ji WANG,Huowang CHEN,Xiaodong MA,Zhaofei WANG

1.Pushing requirements changes through to changes in specificationsLan LIN,Jesse H. POORE

2.Verifying BPEL-like programs with Hoare logicChenguang LUO,Shengcbao QIN,Zongyan QIU

3.On automatic verification of self-stabilizing population protocolsJun PANG,Zhengqin LUO,Yuxin DENG

positional encoding for bounded model checkingJun SUN,Yang LIU,Jin Song DONG,Jing SUN

5.Automated verification of pointer programs in pointer logicZhifang WANG,Yiyun CHEN,Zhenming WANG,Baojian HUA

6.Workflow-based semantics for peer-to-peer specificationsAntonio BROGI,Razvan POPESCU

7.A Petri net-based approach for supporting aspect-oriented modelingLianwei GUAN,Xingyu LI,Hao HU,Jian LU

8.Style transformation in natural languagesYue HU,Xiaoyu GAO,Li LI,Qingshi GAO

9.An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectanglesYunping ZHENG,Chuanbo CHEN,Mudar SAREM

10.A robust localization algorithm in wireless sensor networksXin LI,Bei HUA,Yi SHANG,Yan XIONG

11.Types, structures and theories in NKIXiaoru ZHANG,Zaiyue ZHANG,Yuefei SUI

1.Introduction to the special section on peer-to-peer computing and web data managementAoying ZHOU

2.Using Wide Table to manage web data: a surveyBin YANG,Weining QIAN,Aoying ZHOU

3.Decentralized architecture for resource management of group-based distributed systemsRong ZHANG,Koji ZETTSU,Yutaka KIDAWARA,Yasushi KIYOKI

4.Supporting K nearest neighbors query on high-dimensional data in P2P systemsMei LI,Wang-Chien LEE,Anand SIVASUBRAMANIAM,Jizhong ZHAO

5.Distributed query processing in flash-based sensor networksJianliang XU,Xueyan TANG,Wang-Chien LEE

6.Traceable P2P record exchange: a database-oriented approachFengrong LI,Takuya IIDA,Yoshiharu ISHIKAWA

7.Status of pattern recognition with wavelet analysisYuanyan TANG

8.Median Fisher Discriminator: a robust feature extraction method with applications to biometricsJian YANG,Jingyu YANG,David ZHANG hHTTp://

9.Dynamic description logic model for data integrationGuoshun HAO,Shilong MA,Yuefei SUI,Jianghua LV

1.Basic research in computer science and software engineering at SKLCSJian ZHANG,Wenhui ZHANG,Naijun ZHAN,Yidong SHEN,Haiming CHEN,Yunquan ZHANG,Yongji WANG,Enhua WU,Hongan WANG,Xueyang ZHU

2.Calculi of meta-variablesMasahiko SATO,Takafumi SAKURAI,Yukiyoshi KAMEYAMA,Atsushi IGARASH 3.Human factors in continuous time-concerned cooperative systems represented by NΣ-labeled calculusTetsuya MIZUTANI,Shigeru IGARASH,Masayuki SHIO,Yasuwo IKEDA

4.Semantics of sub-probabilistic programsYixing CHEN,Hengyang WU

putational origami environment on the webAsem KASEM,Tetsuo IDA

6.On the verification of polynomial system solversChangbo CHEN,Marc MORENO MAZA,Wei PAN,Yuzhen XI

7.Fraction-free matrix factors: new forms for LU and QR factorsWenqin ZHOU,Davidj.JEFFREY

8.An extended EM algorithm for subspace clusteringLifei CHEN,Qingshan JIANG

9.Gibbs artifact reduction for POCS super-resolution image reconstructionChuangbai XIAO,Jing YU,Kaina SU

10.Arnetminer: expertise oriented search using social networksJuanzi LI,Jie TANG,Jing ZHANG,Qiong LUO,Yunhao LIU,Mingcai HONG

11.ID-based deniable ring authentication with constant-size signatureLingling WANG,Guoyin ZHANG,Chunguang MA

上一篇:自动识别技术与应用 下一篇:中国自动识别技术