Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    The human-computer dialogue management of FCAD system

    This paper describes the dialogue management of FCAD’s user interface through introducing FCAD’s data-driven user interface model which eases the creation, modification, analyzing, and testing of it.

    Fuyan Zhang, Shijie Cai, Shu Wang, Ruding Ge in Journal of Computer Science and Technology (1988)

  2. No Access

    Article

    A non-blocking locking method and performance evaluation on network of workstations

    A network of workstation (NOW) can act as a single and scalable powerful computer by building a parallel and distributed computing platform on top of it. WAKASHI is such a platform system that supports persist...

    Ge Yu, Guoren Wang, Huaiyuan Zheng in Journal of Computer Science and Technology (2001)

  3. No Access

    Article

    Performance evaluation of a parallel cascade semijoin algorithm for computing path expressions in object database systems

    With the emerging of new applications, especially in Web, such as E-Commerce, Digital Library and DNA Bank, object database systems show their stronger functions than other kinds of database systems due to the...

    Guoren Wang, Ge Yu in Journal of Computer Science and Technology (2002)

  4. No Access

    Article

    Managing very large document collections using semantics

    In this paper, a system is presented where documents are no longer identified by their file names. Instead, a document is represented by its semantics in terms ofdescriptor andcontent vector. Thedescriptor of a d...

    GuoRen Wang, HongJun Lu, Ge Yu, Bin YuBao in Journal of Computer Science and Technology (2003)

  5. No Access

    Article

    RPE query processing and optimization techniques for XML databases

    Anextent join to compute path expressions containing parent-children and ancestor-descendent operations and two path expression optimization rules,path-shortening andpath-complementing, are presented in this pape...

    Guo-Ren Wang, Bing Sun, Jian-Hua Lv, Ge Yu in Journal of Computer Science and Technology (2004)

  6. No Access

    Article

    An Improved Algorithm for Finding the Closest Pair of Points

    As early as in 1975, Shamos and Hoey first gave an O(n lg n)-time divide-and-conquer algorithm (SH algorithm in short) for the problem of finding the closest pair of points. In one process of combination, the Euc...

    Qi Ge, Hai-Tao Wang, Hong Zhu in Journal of Computer Science and Technology (2006)

  7. No Access

    Article

    Parallel Error Detection for Leading Zero Anticipation

    The algorithm and its implementation of the leading zero anticipation (LZA) are very vital for the performance of a high-speed floating-point adder in today’s state of art microprocessor design. Unfortunately,...

    Ge Zhang, Wei-Wu Hu, Zi-Chu Qi in Journal of Computer Science and Technology (2006)

  8. No Access

    Article

    Continually Answering Constraint k-NN Queries in Unstructured P2P Systems

    We consider the problem of efficiently computing distributed geographical k-NN queries in an unstructured peer-to-peer (P2P) system, in which each peer is managed by an individual organization and can only commun...

    Bin Wang, **ao-Chun Yang, Guo-Ren Wang, Ge Yu in Journal of Computer Science and Technology (2008)

  9. No Access

    Article

    Holistically Stream-based Processing Xtwig Queries

    Unlike a twig query, an Xtwig query contains some selection predicates with reverse axes which are either ancestor or parent. To evaluate such queries in the stream-based context, some rewriting rules have been p...

    Guoren Wang, Bo Ning, Ge Yu in World Wide Web (2008)

  10. No Access

    Article

    Summarizing Vocabularies in the Global Semantic Web

    In the Semantic Web, vocabularies are defined and shared among knowledge workers to describe linked data for scientific, industrial or daily life usage. With the rapid growth of online vocabularies, there is a...

    **ang Zhang, Gong Cheng, Wei-Yi Ge in Journal of Computer Science and Technology (2009)

  11. No Access

    Article

    Combining Local Scoring and Global Aggregation to Rank Entities for Deep Web Queries

    With the rapid growth of Web databases, it is necessary to extract and integrate large-scale data available in Deep Web automatically. But current Web search engines conduct page-level ranking, which are becom...

    Yue Kou, De-Rong Shen, Ge Yu, Tie-Zheng Nie in Journal of Computer Science and Technology (2009)

  12. No Access

    Article

    Outlier Detection over Sliding Windows for Probabilistic Data Streams

    Outlier detection is a very useful technique in many applications, where data is generally uncertain and could be described using probability. While having been studied intensively in the field of deterministi...

    Bin Wang, **ao-Chun Yang, Guo-Ren Wang, Ge Yu in Journal of Computer Science and Technology (2010)

  13. No Access

    Article

    Dynamic Damage Recovery for Web Databases

    In the web context, there is an urgent need for a self-healing database system which has the ability to automatically locate and undo a set of transactions that are corrupted by malicious attacks. The metrics ...

    Hong Zhu, Ge Fu, Yu-Cai Feng, Kevin Lü in Journal of Computer Science and Technology (2010)

  14. No Access

    Article

    Extracting common emotions from blogs based on fine-grained sentiment clustering

    Recently, blogs have emerged as the major platform for people to express their feelings and sentiments in the age of Web 2.0. The common emotions, which reflect people’s collective and overall sentiments, are ...

    Shi Feng, Daling Wang, Ge Yu, Wei Gao, Kam-Fai Wong in Knowledge and Information Systems (2011)

  15. No Access

    Article

    Aggressive Complex Event Processing with Confidence over Out-of-Order Streams

    In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but a...

    Chuan-Wen Li, Yu Gu, Ge Yu, Bonghee Hong in Journal of Computer Science and Technology (2011)

  16. No Access

    Article

    An Efficient Method for Cleaning Dirty-Events over Uncertain Data in WSNs

    Event detection in wireless sensor networks (WSNs) has attracted much attention due to its importance in many applications. The erroneous abnormal data generated during event detection are prone to lead to fal...

    Mo Chen, Ge Yu, Yu Gu, Zi-** Jia in Journal of Computer Science and Technology (2011)

  17. No Access

    Article

    A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

    This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RF...

    Wooseok Ryu, Bonghee Hong, Joonho Kwon, Ge Yu in Journal of Computer Science and Technology (2012)

  18. Article

    Special issue: best papers of APWeb 2010

    Wook-Shin Han, Divesh Srivastava, Ge Yu in World Wide Web (2012)

  19. No Access

    Article

    High-performance short sequence alignment with GPU acceleration

    Sequence alignment is a fundamental task for computational genomics research. We develop G-Aligner, which adopts the GPU as a hardware accelerator to speed up the sequence alignment process. A leading CPU-base...

    Mian Lu, Yuwei Tan, Ge Bai, Qiong Luo in Distributed and Parallel Databases (2012)

  20. No Access

    Article

    Query Intent Disambiguation of Keyword-Based Semantic Entity Search in Dataspaces

    Keyword query has attracted much research attention due to its simplicity and wide applications. The inherent ambiguity of keyword query is prone to unsatisfied query results. Moreover some existing techniques...

    Dan Yang, De-Rong Shen, Ge Yu, Yue Kou in Journal of Computer Science and Technology (2013)

previous disabled Page of 5