Pub Date : 2010-08-12DOI: 10.1007/s11704-010-0365-z
Jiqiang Liu, Xun Chen, Zhen Han
{"title":"Full and partial deniability for authentication schemes","authors":"Jiqiang Liu, Xun Chen, Zhen Han","doi":"10.1007/s11704-010-0365-z","DOIUrl":"https://doi.org/10.1007/s11704-010-0365-z","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"14 1","pages":"516-521"},"PeriodicalIF":0.0,"publicationDate":"2010-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0365-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52656340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-08-10DOI: 10.1007/s11704-010-0387-6
An Lu, Wenbin Fang, Chang Xu, S. Cheung, Yu Liu
{"title":"Data-driven testing methodology for RFID systems","authors":"An Lu, Wenbin Fang, Chang Xu, S. Cheung, Yu Liu","doi":"10.1007/s11704-010-0387-6","DOIUrl":"https://doi.org/10.1007/s11704-010-0387-6","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"354-364"},"PeriodicalIF":0.0,"publicationDate":"2010-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0387-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52656998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-05DOI: 10.1007/s11704-010-0501-9
W. Ching, Ho-Yin Leung, Zhenyu Wu, Hao Jiang
{"title":"Modeling default risk via a hidden Markov model of multiple sequences","authors":"W. Ching, Ho-Yin Leung, Zhenyu Wu, Hao Jiang","doi":"10.1007/s11704-010-0501-9","DOIUrl":"https://doi.org/10.1007/s11704-010-0501-9","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"8 1","pages":"187-195"},"PeriodicalIF":0.0,"publicationDate":"2010-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0501-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52657270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-05DOI: 10.1007/s11704-010-0502-8
Shuo Bai, Shouyang Wang, Lean Yu, Aoying Zhou
{"title":"Financial information processing and development of emerging financial markets","authors":"Shuo Bai, Shouyang Wang, Lean Yu, Aoying Zhou","doi":"10.1007/s11704-010-0502-8","DOIUrl":"https://doi.org/10.1007/s11704-010-0502-8","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"185-186"},"PeriodicalIF":0.0,"publicationDate":"2010-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0502-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52657394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-05DOI: 10.1007/s11704-010-0508-2
Lean Yu, Shouyang Wang, K. Lai
{"title":"Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship management","authors":"Lean Yu, Shouyang Wang, K. Lai","doi":"10.1007/s11704-010-0508-2","DOIUrl":"https://doi.org/10.1007/s11704-010-0508-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"196-203"},"PeriodicalIF":0.0,"publicationDate":"2010-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0508-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52657446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-05DOI: 10.1007/s11704-009-0063-x
Xixiang Lv, Hui Li
{"title":"ID-based authenticated group key agreement from bilinear maps","authors":"Xixiang Lv, Hui Li","doi":"10.1007/s11704-009-0063-x","DOIUrl":"https://doi.org/10.1007/s11704-009-0063-x","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"302-307"},"PeriodicalIF":0.0,"publicationDate":"2010-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-009-0063-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52652866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-05DOI: 10.1007/s11704-010-0503-7
Xiujuan Zhao, Jianming Shi
{"title":"Evaluation of mutual funds using multi-dimensional information","authors":"Xiujuan Zhao, Jianming Shi","doi":"10.1007/s11704-010-0503-7","DOIUrl":"https://doi.org/10.1007/s11704-010-0503-7","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"237-253"},"PeriodicalIF":0.0,"publicationDate":"2010-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0503-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52657404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-24DOI: 10.1007/s11704-010-0026-2
Zhiying Liu, D. Parnas, B. T. Widemann
{"title":"Documenting and verifying systems assembled from components","authors":"Zhiying Liu, D. Parnas, B. T. Widemann","doi":"10.1007/s11704-010-0026-2","DOIUrl":"https://doi.org/10.1007/s11704-010-0026-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"151-161"},"PeriodicalIF":0.0,"publicationDate":"2010-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0026-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52654758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-22DOI: 10.1007/s11704-010-0505-5
Ling Zhang, E. Altman, J. Yen
{"title":"Corporate financial distress diagnosis model and application in credit rating for listing firms in China","authors":"Ling Zhang, E. Altman, J. Yen","doi":"10.1007/s11704-010-0505-5","DOIUrl":"https://doi.org/10.1007/s11704-010-0505-5","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"220-236"},"PeriodicalIF":0.0,"publicationDate":"2010-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0505-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52657419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-17DOI: 10.1007/s11704-010-0154-8
M. Marin, Temur Kutsia
{"title":"On the computation of quotients and factors of regular languages","authors":"M. Marin, Temur Kutsia","doi":"10.1007/s11704-010-0154-8","DOIUrl":"https://doi.org/10.1007/s11704-010-0154-8","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"4 1","pages":"173-184"},"PeriodicalIF":0.0,"publicationDate":"2010-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0154-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52656207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}