default search action
Journal of Computer Science and Technology, Volume 34
Volume 34, Number 1, January 2019
- Su Song, Ke Liu, Zhiyong Liu:
Preface. 1-2 - Wessam Elhefnawy, Min Li, Jianxin Wang, Yaohang Li:
Decoding the Structural Keywords in Protein Structure Universe. 3-15 - Lin Wu, Min Li, Jianxin Wang, Fang-Xiang Wu:
Controllability and Its Applications to Biological Networks. 16-34 - Zhe Liu, Cheng-Jian Qiu, Yu-Qing Song, Xiaohong Liu, Juan Wang, Victor S. Sheng:
Texture Feature Extraction from Thyroid MR Imaging Using High-Order Derived Mean CLBP. 35-46 - Yifan Wu, Fan Yang, Yong Xu, Haibin Ling:
Privacy-Protective-GAN for Privacy Preserving Face De-Identification. 47-60 - Wenguo Liu, Lingfang Zeng, Dan Feng, Kenneth B. Kent:
ROCO: Using a Solid State Drive Cache to Improve the Performance of a Host-Aware Shingled Magnetic Recording Drive. 61-76 - Min Li, Chao Yang, Qiao Sun, Wenjing Ma, Wenlong Cao, Yulong Ao:
Enabling Highly Efficient k-Means Computations on the SW26010 Many-Core Processor of Sunway TaihuLight. 77-93 - Yang Hong, Yang Zheng, Fan Yang, Binyu Zang, Haibing Guan, Haibo Chen:
Scaling out NUMA-Aware Applications with RDMA-Based Distributed Shared Memory. 94-112 - Ziqi Fan, Dongchul Park:
Extending SSD Lifespan with Comprehensive Non-Volatile Memory-Based Write Buffers. 113-132 - Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi:
Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management. 133-154 - Yuting Qiang, Yanwei Fu, Xiao Yu, Yanwen Guo, Zhi-Hua Zhou, Leonid Sigal:
Learning to Generate Posters of Scientific Papers by Probabilistic Graphical Models. 155-169 - Yuliang Ma, Ye Yuan, Feida Zhu, Guoren Wang, Jing Xiao, Jianzong Wang:
Who Should Be Invited to My Party: A Size-Constrained k-Core Problem in Social Networks. 170-184 - Shuaibing Lu, Jie Wu, Huanyang Zheng, Zhiyi Fang:
On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model. 185-206 - Jianjun Zheng, Akbar Siami Namin:
A Survey on the Moving Target Defense Strategies: An Architectural Perspective. 207-233 - Jingya Zhou, Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng:
A Cost-Efficient Approach to Storing Users' Data for Online Social Networks. 234-252
Volume 34, Number 2, March 2019
- Su Song, Ke Liu, Zhiyong Liu:
Preface. 253-255 - Masoud Zadghorban Lifkooee, Celong Liu, Yongqing Liang, Yimin Zhu, Xin Li:
Real-Time Avatar Pose Transfer and Motion Generation Using Locally Encoded Laplacian Offsets. 256-271 - Lei Cui, Youyang Qu, Mohammad Reza Nosouhi, Shui Yu, Jianwei Niu, Gang Xie:
Improving Data Utility Through Game Theory in Personalized Differential Privacy. 272-286 - Mengqi Zeng, Bin Yao, Zhi-Jie Wang, Yanyan Shen, Feifei Li, Jianfeng Zhang, Hao Lin, Minyi Guo:
CATIRI: An Efficient Method for Content-and-Text Based Image Retrieval. 287-304 - Dong-Di Zhao, Fan Li, Kashif Sharif, Guang-Min Xia, Yu Wang:
Space Efficient Quantization for Deep Convolutional Neural Networks. 305-317 - Feng Zhou, Haomin Zhou, Zhihua Yang, Lihua Yang:
A 2-Stage Strategy for Non-Stationary Signal Prediction and Recovery Using Iterative Filtering and Neural Network. 318-338 - Chuangyi Gui, Long Zheng, Bingsheng He, Cheng Liu, Xinyu Chen, Xiaofei Liao, Hai Jin:
A Survey on Graph Processing Accelerators: Challenges and Opportunities. 339-371 - Weibei Fan, Jianxi Fan, Cheng-Kuan Lin, Yan Wang, Yuejuan Han, Ruchuan Wang:
Optimally Embedding 3-Ary n-Cubes into Grids. 372-387 - Jinoh Kim, Alex Sim:
A New Approach to Multivariate Network Traffic Analysis. 388-402 - Zhiguo Wan, Robert H. Deng, David Lee, Ying Li:
MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains. 403-415 - Bo Guo, Young-Woo Kwon, Myoungkyu Song:
Decomposing Composite Changes for Code Review and Regression Test Selection in Evolving Software. 416-436 - Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
On Identifying and Explaining Similarities in Android Apps. 437-455 - Song Liu, Yuanzhen Cui, Nianjun Zou, Wenhao Zhu, Dong Zhang, Weiguo Wu:
Revisiting the Parallel Strategy for DOACROSS Loops. 456-475 - Xiang-Chu Feng, Chen-ping Zhao, Silong Peng, Xiyuan Hu, Zhao-Wei Ouyang:
Plug-and-Play Based Optimization Algorithm for New Crime Density Estimation. 476-493 - Amichai Painsky, Saharon Rosset:
Lossless Compression of Random Forests. 494-506
Volume 34, Number 3, May 2019
- Shi-Min Hu, Hongbo Fu, Marcus A. Magnor:
Preface. 507-508 - Tailing Yuan, Zhe Zhu, Kun Xu, Cheng-Jun Li, Tai-Jiang Mu, Shi-Min Hu:
A Large Chinese Text Dataset in the Wild. 509-521 - Shuai Li, Zheng Fang, Wenfeng Song, Aimin Hao, Hong Qin:
Bidirectional Optimization Coupled Lightweight Networks for Efficient and Robust Multi-Person 2D Pose Estimation. 522-536 - Na Ding, Yepeng Liu, Lin-Wei Fan, Caiming Zhang:
Single Image Super-Resolution via Dynamic Lightweight Database with Local-Feature Based Interpolation. 537-549 - Mengke Yuan, Longquan Dai, Dong-Ming Yan, Liqiang Zhang, Jun Xiao, Xiaopeng Zhang:
Fast and Error-Bounded Space-Variant Bilateral Filtering. 550-568 - De-Wang Li, Linjing Lai, Hua Huang:
Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map. 569-580 - Bo Ren, Jia-Cheng Wu, Ya-Lei Lv, Ming-Ming Cheng, Shao-Ping Lu:
Geometry-Aware ICP for Scene Reconstruction from RGB-D Camera. 581-593 - Song-Hai Zhang, Shao-Kui Zhang, Yuan Liang, Peter Hall:
A Survey of 3D Indoor Scene Synthesis. 594-608 - Risheng Liu, Caisheng Mao, Zhihui Wang, Haojie Li:
Blind Image Deblurring via Adaptive Optimization with Flexible Sparse Structure Control. 609-621 - Han Liu, Hang Du, Dan Zeng, Qi Tian:
Cloud Detection Using Super Pixel Classification and Semantic Segmentation. 622-633 - Xinchen Liu, Huadong Ma, Shuangqun Li:
PVSS: A Progressive Vehicle Search System for Video Surveillance Networks. 634-644 - Jiang Rong, Tao Qin, Bo An:
Competitive Cloud Pricing for Long-Term Revenue Maximization. 645-656 - Dawei Cheng, Yi Tu, Zhen-Wei Ma, Zhibin Niu, Liqing Zhang:
BHONEM: Binary High-Order Network Embedding Methods for Networked-Guarantee Loans. 657-669 - Mingzhe Zhang, Yunzhan Gong, Yawen Wang, Dahai Jin:
Unit Test Data Generation for C Using Rule-Directed Symbolic Execution. 670-689 - Peng Zhao, Chen Ding, Lei Liu, Jiping Yu, Wentao Han, Xiaobing Feng:
Cacheap: Portable and Collaborative I/O Optimization for Graph Processing. 690-706
Volume 34, Number 4, July 2019
- Xiaofang Zhou, Jiajie Xu:
Preface. 707-708 - Jianqiu Xu, Ralf Hartmut Güting, Yu Zheng, Ouri Wolfson:
Moving Objects with Transportation Modes: A Survey. 709-726 - Na Ta, Guoliang Li, Jun Hu, Jianhua Feng:
Location and Trajectory Identification from Microblogs. 727-746 - Junhua Fang, Pengpeng Zhao, An Liu, Zhixu Li, Lei Zhao:
Scalable and Adaptive Joins for Trajectory Data in Distributed Stream System. 747-761 - Hong Fang, Bo Zhao, Xiaowang Zhang, Xuanxing Yang:
A United Framework for Large-Scale Resource Description Framework Stream Processing. 762-774 - Lihua Yin, Huiwen Liu:
Searching Activity Trajectories with Semantics. 775-794 - Hong-Cheu Liu, Jixue Liu:
On the Expressive Power of Logics on Constraint Databases with Complex Objects. 795-817 - Hongfei Xu, Yu Gu, Jianzhong Qi, Jiayuan He, Ge Yu:
Diversifying Top-k Routes with Spatial Constraints. 818-838 - Ze-Wei Chen, Hang Lei, Maolin Yang, Yong Liao, Jiali Yu:
Improved Task and Resource Partitioning Under the Resource-Oriented Partitioned Scheduling. 839-853 - Quoc Le, Ahmed Amer, JoAnne Holliday:
RAID 4SMR: RAID Array with Shingled Magnetic Recording Disk for Mass Storage Systems. 854-868 - Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
Edge Computing Based Applications in Vehicular Environments: Comparative Study and Main Issues. 869-886 - Mansoor Davoodi, Esmaeil Delfaraz, Sajjad Ghobadi, Mahtab Masoori:
Algorithms for Handoff Minimization in Wireless Networks. 887-900 - Zipeng Zhang, Ming Fu, Xin-Yu Feng:
A Lightweight Dynamic Enforcement of Privacy Protection for Android. 901-923 - Robail Yasrab:
SRNET: A Shallow Skip Connection Based Convolutional Neural Network Design for Resolving Singularities. 924-938
Volume 34, Number 5, September 2019
- Tao Xie, Jun Wei, Chang Xu, Zhi Jin, Xiaoxing Ma:
Preface. 939-941 - Shengqu Xi, Yuan Yao, Xusheng Xiao, Feng Xu, Jian Lu:
Bug Triaging Based on Tossing Sequence Modeling. 942-956 - Wei Chen, Jiahong Zhou, Jiaxin Zhu, Guoquan Wu, Jun Wei:
Semi-Supervised Learning Based Tag Recommendation for Docker Repositories. 957-971 - Lingyun Situ, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li:
Automatic Detection and Repair Recommendation for Missing Checks. 972-992 - Chunyang Ling, Yanzhen Zou, Zeqi Lin, Bing Xie:
Graph Embedding Based API Graph Search and Recommendation. 993-1006 - Haibo Ye, Xuansong Li, Li Sheng, Kai Dong:
CBSC: A Crowdsensing System for Automatic Calibrating of Barometers. 1007-1019 - Xiang Chen, Dun Zhang, Zhanqi Cui, Qing Gu, Xiaolin Ju:
DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy. 1020-1038 - Zhou Xu, Shuai Pang, Tao Zhang, Xiapu Luo, Jin Liu, Yutian Tang, Xiao Yu, Lei Xue:
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning. 1039-1062 - Mohammed Alqmase, Mohammad R. Alshayeb, Lahouari Ghouti:
Threshold Extraction Framework for Software Metrics. 1063-1078 - Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. 1079-1095 - Han Lin, Mingfan Li, Chengfan Jia, Junnan Liu, Hong An:
Degree-of-Node Task Scheduling of Fine-Grained Parallel Programs on Heterogeneous Systems. 1096-1108 - Wenwu Yang, Jing Hua, Kun-Yang Yao:
CR-Morph: Controllable Rigid Morphing for 2D Animation. 1109-1122 - Xin Yang, Dawei Wang, Wenbo Hu, Lijing Zhao, Baocai Yin, Qiang Zhang, Xiaopeng Wei, Hongbo Fu:
DEMC: A Deep Dual-Encoder Network for Denoising Monte Carlo Rendering. 1123-1135 - Jie Xiao, Zhanhui Shi, Jianhui Jiang, Xu-Hua Yang, Yujiao Huang, Haigen Hu:
A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm. 1136-1151 - Dawei Wang, Wan-Qiu Cui, Biao Qin:
CK-Modes Clustering Algorithm Based on Node Cohesion in Labeled Property Graph. 1152-1166
Volume 34, Number 6, November 2019
- Rui Ren, Jiechao Cheng, Xiwen He, Lei Wang, Jianfeng Zhan, Wanling Gao, Chunjie Luo:
HybridTune: Spatio-Temporal Performance Data Correlation for Performance Diagnosis of Big Data Systems. 1167-1184 - Jiuru Gao, Wei Chen, Jia-Jie Xu, An Liu, Zhixu Li, Hongzhi Yin, Lei Zhao:
An Efficient Framework for Multiple Subgraph Pattern Matching Models. 1185-1202 - Anzhen Zhang, Jian-Zhong Li, Hong Gao:
Interval Estimation for Aggregate Queries on Incomplete Data. 1203-1216 - Chunyang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xintian Chen:
Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism. 1217-1229 - Pengfei Wang, Yongfeng Zhang, Shuzi Niu, Jiafeng Guo:
Modeling Temporal Dynamics of Users' Purchase Behaviors for Next Basket Prediction. 1230-1240 - Momodou L. Sanyang, Ata Kabán:
Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles. 1241-1257 - Zhi-Guang Pan, Chuhua Xian, Shuo Jin, Guiqing Li:
Progressive Furniture Model Decimation with Texture Preservation. 1258-1268 - Xinggang Wang, Jiasi Wang, Peng Tang, Wenyu Liu:
Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection. 1269-1278 - Xiaowu Li, Zhinan Wu, Feng Pan, Juan Liang, Jiafeng Zhang, Linke Hou:
A Geometric Strategy Algorithm for Orthogonal Projection onto a Parametric Surface. 1279-1293 - Mohan Zhang, Jinhui Yu, Kang Zhang, Junsong Zhang:
Artistic Augmentation of Photographs with Droplets. 1294-1306 - Chengzhang Zhu, Rong Hu, Beiji Zou, Rongchang Zhao, Changlong Chen, Yalong Xiao:
Automatic Diabetic Retinopathy Screening via Cascaded Framework Based on Image- and Lesion-Level Features Fusion. 1307-1318 - Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava:
Security Attacks in Named Data Networking: A Review and Research Directions. 1319-1350 - Chong Wang, Nasro Min-Allah, Bei Guan, Yuqi Lin, Jingzheng Wu, Yongji Wang:
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion. 1351-1365 - Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. 1366-1379 - JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 1380-1383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.