New Methodologies for Parallel Architecture
Dong-Rui Fan;Member;CCF;IEEE;Xiao-Wei Li;and Guo-Jie Li;Fellow;CCF Key Laboratory of Computer System and Architecture;Institute of Computing Technology;Chinese Academy of Sciences Beijing 100190;China
..............page:578-587
..............page:625-631
Aggressive Complex Event Processing with Confidence over Out-of-Order Streams
Chuan-Wen Li 1;Student Member;CCF;Member;ACM;Yu Gu 1;Member;CCF;ACM Ge Yu 1;Senior Member;CCF;Member;ACM;IEEE;and Bonghee Hong 2;Member;ACM;IEEE1 College of Information Science and Engineering;Northeastern University;Shenyang 110004;China 2 Department of Computer Science and Engineering;Pusan National University;Busan;Korea
..............page:685-696
..............page:722-731
DHC:Distributed,Hierarchical Clustering in Sensor Networks
Xiu-Li Ma1;2;Hai-Feng Hu1;2;Shuang-Feng Li5;Hong-Mei Xiao1;2;Qiong Luo4;Dong-Qing Yang1;3;Member;CCF;and Shi-Wei Tang1;2;Senior Member;CCF1School of Electronics Engineering and Computer Science;Peking University;Beijing 100871;China2Key Laboratory of Machine Perception;Ministry of Education;Beijing 100871;China3Key Laboratory of High Confidence Software Technologies;Ministry of EducationBeijing 100871;China4Department of Computer Science and Engineering;Hong Kong University of Science and TechnologyClear Water Bay;Kowloon;Hong Kong;China5Google China;Beijing 100871;China.
..............page:643-662
..............page:632-635
..............page:636-642
..............page:744-750
Bootstrapping Object Coreferencing on the Semantic Web
Wei Hu 1;2;Yu-Zhong Qu 1;2;Senior Member;CCF;and Xing-Zhi Sun 3 1 State Key Laboratory for Novel Software Technology;Nanjing University;Nanjing 210093;China 2 Department of Computer Science and Technology;Nanjing University;Nanjing 210093;China 3 IBM Research — China;Beijing 100193;China
..............page:663-675
Provably Secure Role-Based Encryption with Revocation Mechanism
Yan Zhu 1;2;Member;CCF;Hong-Xin Hu 3;Gail-Joon Ahn 3;Senior Member;ACM;IEEE Huai-Xi Wang 4;and Shan-Biao Wang 4 1 Institute of Computer Science and Technology;Peking University;Beijing 100871;China 2 Beijing Key Laboratory of Internet Security Technology;Peking University;Beijing 100871;China 3 School of Computing;Informatics and Decision Systems Engineering;Arizona State University;Tempe;AZ 85287;U.S.A.4 School of Mathematical Sciences;Peking University;Beijing 100871;China
..............page:697-710
..............page:616-624
Guided Structure-Aware Review Summarization
Feng Jin;Min-Lie Huang;and Xiao-Yan Zhu;Member;CCF State Key Laboratory of Intelligent Technology and Systems;Tsinghua National Laboratory for Information Science and Technology;Department of Computer Science and Technology;Tsinghua University;Beijing 100084;China
..............page:676-684
..............page:711-721
..............page:569-577
Preface
Xiao-Ming Li;Professor;Department of Computer Science and Technology;Peking University Beijing 100871;China Xiaodong Zhang;Robert M.Critchfield Professor;Department of Computer Science and Engineering The Ohio State University;U.S.A.
..............page:567-568
..............page:732-743
..............page:600-615
..............page:588-599