Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9190-2
Yehu Shen
{"title":"Efficient normalized cross correlation calculation method for stereo vision based robot navigation","authors":"Yehu Shen","doi":"10.1007/s11704-011-9190-2","DOIUrl":"https://doi.org/10.1007/s11704-011-9190-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"227-235"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9190-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9180-4
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei
{"title":"Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI","authors":"Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei","doi":"10.1007/s11704-011-9180-4","DOIUrl":"https://doi.org/10.1007/s11704-011-9180-4","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"23 1","pages":"169-180"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9180-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52661064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9134-x
Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang, Jie Tian
{"title":"Fingerprint segmentation based on an AdaBoost classifier","authors":"Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang, Jie Tian","doi":"10.1007/s11704-011-9134-x","DOIUrl":"https://doi.org/10.1007/s11704-011-9134-x","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"148-157"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9134-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9158-2
Wenfeng Yang, Yu-pu Hu
{"title":"A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions","authors":"Wenfeng Yang, Yu-pu Hu","doi":"10.1007/s11704-011-9158-2","DOIUrl":"https://doi.org/10.1007/s11704-011-9158-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"158-162"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9158-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-0033-y
Lan Li, W. Xiao
{"title":"Psu: a novel low-latency constant-degree overlay network","authors":"Lan Li, W. Xiao","doi":"10.1007/s11704-011-0033-y","DOIUrl":"https://doi.org/10.1007/s11704-011-0033-y","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"250-258"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-0033-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52658141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9181-3
Yansong Zhang, Shan Wang, Jiaheng Lu
{"title":"Improving performance by creating a native join-index for OLAP","authors":"Yansong Zhang, Shan Wang, Jiaheng Lu","doi":"10.1007/s11704-011-9181-3","DOIUrl":"https://doi.org/10.1007/s11704-011-9181-3","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"236-249"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9181-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52661176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-010-0145-9
Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu
{"title":"Individual difference of artificial emotion applied to a service robot","authors":"Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu","doi":"10.1007/s11704-010-0145-9","DOIUrl":"https://doi.org/10.1007/s11704-010-0145-9","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"216-226"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0145-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52655983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9163-5
D. Hu, Qiaoliang Li
{"title":"A simple fingerprinting scheme for large user groups","authors":"D. Hu, Qiaoliang Li","doi":"10.1007/s11704-011-9163-5","DOIUrl":"https://doi.org/10.1007/s11704-011-9163-5","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"163-168"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9163-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-01DOI: 10.1007/s11704-011-9307-7
Bailing Liu, Feng Xiao, Ke Deng
{"title":"Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation","authors":"Bailing Liu, Feng Xiao, Ke Deng","doi":"10.1007/s11704-011-9307-7","DOIUrl":"https://doi.org/10.1007/s11704-011-9307-7","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"135-147"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9307-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-01DOI: 10.1007/s11704-010-0074-7
Jia Wen, C. Li, Z. Xiong
{"title":"Behavior pattern extraction by trajectory analysis","authors":"Jia Wen, C. Li, Z. Xiong","doi":"10.1007/s11704-010-0074-7","DOIUrl":"https://doi.org/10.1007/s11704-010-0074-7","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"37-44"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0074-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52655000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}