Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Science and Technology
1000-9000
2011 Issue 4
New Methodologies for Parallel Architecture
Dong-Rui Fan;Member;CCF;IEEE;Xiao-Wei Li;and Guo-Jie Li;Fellow;CCF Key Laboratory of Computer System and Architecture;Institute of Computing Technology;Chinese Academy of Sciences Beijing 100190;China
..............page:578-587
Possibilities for Healthcare Computing
Peter Szolovits Computer Science and Artificial Intelligence Laboratory;Massachusetts Institute of Technology;Cambridge Massachusetts;U.S.A.
..............page:625-631
Aggressive Complex Event Processing with Confidence over Out-of-Order Streams
Chuan-Wen Li 1;Student Member;CCF;Member;ACM;Yu Gu 1;Member;CCF;ACM Ge Yu 1;Senior Member;CCF;Member;ACM;IEEE;and Bonghee Hong 2;Member;ACM;IEEE1 College of Information Science and Engineering;Northeastern University;Shenyang 110004;China 2 Department of Computer Science and Engineering;Pusan National University;Busan;Korea
..............page:685-696
Differential Attack on Five Rounds of the SC2000 Block Cipher
Ji-Qiang Lv Department of Computer Science;Ecole Normale Superieure;45 Rue d’Ulm;Paris 75005;France
..............page:722-731
DHC:Distributed,Hierarchical Clustering in Sensor Networks
Xiu-Li Ma1;2;Hai-Feng Hu1;2;Shuang-Feng Li5;Hong-Mei Xiao1;2;Qiong Luo4;Dong-Qing Yang1;3;Member;CCF;and Shi-Wei Tang1;2;Senior Member;CCF1School of Electronics Engineering and Computer Science;Peking University;Beijing 100871;China2Key Laboratory of Machine Perception;Ministry of Education;Beijing 100871;China3Key Laboratory of High Confidence Software Technologies;Ministry of EducationBeijing 100871;China4Department of Computer Science and Engineering;Hong Kong University of Science and TechnologyClear Water Bay;Kowloon;Hong Kong;China5Google China;Beijing 100871;China.
..............page:643-662
Overview of Center for Domain-Specific Computing
Jason Cong Center for Domain-Specific Computing;University of California;Los Angeles;U.S.A.
..............page:632-635
The Challenges of Multidisciplinary Education in Computer Science
Fred S.Roberts DIMACS Center;Rutgers University;Jersey;New Brunswick;NJ;U.S.A.
..............page:636-642
Impossible Differential Attacks on 13-Round CLEFIA-128
Hamid Mala;Mohammad Dakhilalian;and Mohsen Shakiba Cryptography and System Security Research Laboratory;Department of Electrical and Computer Engineering Isfahan University of Technology;Isfahan;Iran
..............page:744-750
Bootstrapping Object Coreferencing on the Semantic Web
Wei Hu 1;2;Yu-Zhong Qu 1;2;Senior Member;CCF;and Xing-Zhi Sun 3 1 State Key Laboratory for Novel Software Technology;Nanjing University;Nanjing 210093;China 2 Department of Computer Science and Technology;Nanjing University;Nanjing 210093;China 3 IBM Research — China;Beijing 100193;China
..............page:663-675
INFORMATION FOR AUTHORS
..............page:751
Provably Secure Role-Based Encryption with Revocation Mechanism
Yan Zhu 1;2;Member;CCF;Hong-Xin Hu 3;Gail-Joon Ahn 3;Senior Member;ACM;IEEE Huai-Xi Wang 4;and Shan-Biao Wang 4 1 Institute of Computer Science and Technology;Peking University;Beijing 100871;China 2 Beijing Key Laboratory of Internet Security Technology;Peking University;Beijing 100871;China 3 School of Computing;Informatics and Decision Systems Engineering;Arizona State University;Tempe;AZ 85287;U.S.A.4 School of Mathematical Sciences;Peking University;Beijing 100871;China
..............page:697-710
Three New Concepts of Future Computer Science
Zhi-Wei Xu Dan-Dan Tu Institute of Computing Technology;Chinese Academy of Sciences;Beijing 100190;China
..............page:616-624
Guided Structure-Aware Review Summarization
Feng Jin;Min-Lie Huang;and Xiao-Yan Zhu;Member;CCF State Key Laboratory of Intelligent Technology and Systems;Tsinghua National Laboratory for Information Science and Technology;Department of Computer Science and Technology;Tsinghua University;Beijing 100084;China
..............page:676-684
Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs
Seleviawati Tarmizi;Prakash Veeraraghavan;and Somnath Ghosh Department of Computer Science and Computer Engineering;La Trobe University;Victoria;Australia
..............page:711-721
Understanding Science Through the Computational Lens
Richard M.Karp Department of Electrical Engineering and Computer Sciences;University of California;Berkeley;CA 94720-1776;U.S.A.
..............page:569-577
Preface
Xiao-Ming Li;Professor;Department of Computer Science and Technology;Peking University Beijing 100871;China Xiaodong Zhang;Robert M.Critchfield Professor;Department of Computer Science and Engineering The Ohio State University;U.S.A.
..............page:567-568
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
Xiao-Ming Deng and Yan Xiong School of Computer Science and Technology;University of Science and Technology of China;Hefei 230027;China
..............page:732-743
A Programming Language Approach to Internet-Based Virtual Computing Environment
Ji Wang;Senior Member;CCF;Member;IEEE;Rui Shen;Student Member;IEEE and Huai-Min Wang;Senior Member;CCF;Member;IEEE National Laboratory for Parallel and Distributed Processing;School of Computer;National University of Defense Technology Changsha 410073;China
..............page:600-615
Internetware:An Emerging Software Paradigm for Internet Computing
Hong Mei;Fellow;CCF;and Xuan-Zhe Liu;Member;CCF Key Laboratory of High Confidence Software Technologies ;Ministry of Education;Beijing 100871;China School of Electronics Engineering and Computer Science;Peking University;Beijing 100871;China
..............page:588-599