Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Science and Technology
1000-9000
2007 Issue 6
human gait recognition based on kernel pca using projections
Murat Ekinci Murat Aykut Computer Vision Lab;Department of Computer Engineering;Karadeniz Technical University;61080 Trabzon;Turkey
..............page:867-876
simulation and visualisation of functional landscapes:effects of the water resource competition between plants
Vincent Le Chevalier~1 Marc Jaeger~2 Xing Mei~3 Paul-Henry Cournède~1 1 Ecole Centrale Paris;Laboratory of Applied Mathematics and Systems;Grande Voie des Vignes 92295 Chatenay-Malabry;France 2 INRIA Futurs;DigiPlante Team;CIRAD AMAP;TA A-51/PS2 35398 Montpellier Cedex 5;France 3 Sino-French Laboratory LIAMA;Institute of Automation;Chinese Academy of Sciences;Beijing 100080;China
..............page:835-845
autocorrelation values of new generalized cyclotomic sequences of order two and length pq
Sheng-Qiang Li~ Zhi-Xiong Chen~3 Xiao-Tong Fu~1 Guo-Zhen Xiao~1 1 National Key Laboratory of ISN;Xidian University;Xi'an 710071;China 2 University of Electronic Science and Technology of ChiTin;Chengdu 610054;China 3 Department of Mathematics;Putian University;Putian 351100.China
..............page:830-834
mining causality for explanation knowledge from text
Chaveevan Pechsiri~1 Asanee Kawtraknl~2 1 Faculty of Information Technology;Dhurakij Pundit University;Bangkok.Thailand 2 Department of Computer Engineering.Kasetsart University;Bangkok;Thailand
..............page:877-889
a differential evolution approach for protein folding using a lattice model
Heitor Silverio Lopes Reginaldo Bitello Bioinformatics Laboratory;Federal University of Technology-Paraná;Av.7 de setembro;3165 80230-901 Curitiba;Brazil
..............page:904-908
generating combinations by three basic operations
Yongxi Cheng Department of Computer Science;Tsinghua University;Beijing 100084;China
..............page:909-913
an improved heapsort algorithm with nlogn-0.788928n comparisons in the worst case
Xiao-Dong Wang Ying-Jie Wu College of Mathematics and Computer Science;Fuzhou University;Fuzhou 350002;China
..............page:898-903
fiducial marker based on projective invariant for augmented reality
Yu Li Yong-Tian Wang Yue Liu School of Information Science and Technology;Beijing Institute of Technology;Beijing 100081;China
..............page:890-897
a fast ambient occlusion method for real-time plant rendering
Jun Teng~1 Marc Jaeger~2 Bao-Gang Hu~1 1 LIAMA/NLPR;Institute of Automation;Chinese Academy of Sciences;Beijing 100080;China 2 INRIA-Futurs;DigiPlante Team;CIRAD AMAP;Montpellier;France
..............page:859-866
short group signatures without random oracles
Bo Qin Qian-Hong Wu~3 Willy Susilo~3 Yi Mu~3 Yu-Min Wang~1 Zheng-Tao Jiang~4 1 National Key Laboratory of Integrated Service Networks;Xidian University;Xi'an 710071;China 2 Department of Mathematics;School of Science;Xi'an University of Technology;Xi'an 710048;China 3 Center for Information Security Research.School of Information Technology and Computer Science University of Wollongong;NSW;Australia 4 School of Computer Science and Technology;Beihang University;Beijing 100083;China
..............page:805-821
wavelet based image authentication and recovery
Rafiullah Chamlaw~1 Asifullah Khan~ Adnan Idris~2 1 Pakistan Institute of Engineering and Applied Sciences ;Nilore;Islamabad;Pakistan 2 A JK University;Rawalakot;Azad Jammu and Kashmir;Pakistan
..............page:795-804
simple reconstruction of tree branches from a single range image
Zhang-Lin Cheng~ Xiao-Peng Zhang~ Bao-Quan Chen~3 1 Sino-French Laboratory LLAMA;Institute of Automation;Chinese Academy of Sciences;Beijing 100080;China 2 National Laboratory of Pattern Recognition;Institute of Automation;Chinese Academy of Sciences Beijing 100080;China 3 Digital Technology Center;University of Minnesota;Minneapolis;MN 55455;U.S.A.
..............page:846-858
revocable ring signature
Dennis Y.W.Liu~1 Joseph K.Liu~2 Yi Mu~3 Willy Susilo~3 Duncan S.Wong~1 1 Department of Computer Science;City University of Hong Kong;Hong Kong;China 2 Institute for Infocomm Research;21 Heng Mui Keng Terrace;Singapore 119613 3 Centre for Computer and Information Security Research;School of Computer Science and Software Engineering University of Wollongong;Wollongong;NSW 2522;Australia
..............page:785-794
information for authors
..............page:921
a protocol for a private set-operation
Rong-Hua Li~ Chuan-Kun Wu~1 1 State Key Laboratory of Information Securitg;Institute of Software.Chinese Academy of Sciences Beijing 100080 China 2 Graduate University of Chinese Academy of Sciences.Beijing 100049;China
..............page:822-829