default search action
Journal of Computer Science and Technology, Volume 37
Volume 37, Number 1, February 2022
- Tao Xie, Shengchao Qin, Wenhui Zhang, Jun Sun, Lei Bu, Ge Li:
Preface. 1-3 - Inès Mouakher, Fatma Dhaou, J. Christian Attiogbé:
Event-Based Semantics of UML 2.X Concurrent Sequence Diagrams for Formal Verification. 4-28 - Jia-Ming Zhang, Zhanqi Cui, Xiang Chen, Huanhuan Wu, Liwei Zheng, Jian-Bin Liu:
DeltaFuzz: Historical Version Information Guided Fuzz Testing. 29-49 - Zelin Zhao, Di Huang, Xiaoxing Ma:
TOAST: Automated Testing of Object Transformers in Dynamic Software Updates. 50-66 - Queping Kong, Zi-Yan Wang, Yuan Huang, Xiangping Chen, Xiao-Cong Zhou, Zibin Zheng, Gang Huang:
Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts. 67-82 - Jin-Chi Chen, Yi Qin, Huiyan Wang, Chang Xu:
Simulation Might Change Your Results: A Comparison of Context-Aware System Input Validation in Simulated and Physical Environments. 83-105 - Wenhua Yang, Minxue Pan, Yu Zhou, Zhiqiu Huang:
Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems. 106-127 - Hongrong Ouyang, Heng-Feng Wei, Haixiang Li, Anqun Pan, Yu Huang:
Checking Causal Consistency of MongoDB. 128-146 - Jun Ma, Qingwei Sun, Chang Xu, XianPing Tao:
GridDroid - An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface. 147-181 - Zijie Huang, Zhiqing Shao, Guisheng Fan, Huiqun Yu, Xingguang Yang, Kang Yang:
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics. 182-206 - Ning Bao, Yunpeng Chai, Xiao Qin, Chuanwen Wang:
MacroTrend: A Write-Efficient Cache Algorithm for NVM-Based Read Cache. 207-230 - Jianzhe Zhao, Xing-Wei Wang, Keming Mao, Chen-Xi Huang, Yu-Kai Su, Yu-Chen Li:
Correlated Differential Privacy of Multiparty Data Release in Machine Learning. 231-251 - Xiao-Wei Feng, Xiang-Yu Kong, Chuan He, Donghui Xu:
On the Discrete-Time Dynamics of Cross-Coupled Hebbian Algorithm. 252-265 - Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, Liusheng Huang:
A Blockchain-Based Protocol for Malicious Price Discrimination. 266-276
Volume 37, Number 2, April 2022
- Xiaozheng Xie, Jianwei Niu, Xuefeng Liu, Qingfeng Li, Yong Wang, Jie Han, Shaojie Tang:
DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images. 277-294 - Xin Tan, Longyin Zhang, Guo-Dong Zhou:
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context. 295-308 - Junfeng Fan, Mei-Ling Wang, Changliang Li, Zi-Qiang Zhu, Lu Mao:
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling. 309-319 - Xinfeng Wang, Xiang Zhou, Jiahua Rao, Zhu-Jin Zhang, Yue-Dong Yang:
Imputing DNA Methylation by Transferred Learning Based Neural Network. 320-329 - Xin Zhang, Siyuan Lu, Shui-Hua Wang, Xiang Yu, Su-Jing Wang, Lun Yao, Yi Pan, Yu-Dong Zhang:
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture. 330-343 - Ibrahim S. Alsukayti:
Quality of Service Support in RPL Networks: Standing State and Future Prospects. 344-368 - William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Differential Privacy via a Truncated and Normalized Laplace Mechanism. 369-388 - Yong-Hao Long, Yan-Cheng Chen, Xiangping Chen, Xiaohong Shi, Fan Zhou:
Test-Driven Feature Extraction of Web Components. 389-404 - Gen Zhang, Peng-Fei Wang, Tai Yue, Xiangdong Kong, Xu Zhou, Kai Lu:
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference. 405-422 - GeunYong Kim, Joon-Young Paik, Yeong-Cheol Kim, Eun-Sun Cho:
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis. 423-442 - Louis Cianciullo, Hossein Ghodosi:
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. 443-458 - Ying Guo, Zhen-Fu Cao, Xiaolei Dong:
Generalized Goldwasser and Micali's Type Cryptosystem. 459-467 - Jinyu Gu, Hao Li, Yubin Xia, Haibo Chen, Chenggang Qin, Zheng-Yu He:
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures. 468-486 - Yusuf Fatihu Hamza, Hongwei Lin:
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation. 487-504
Volume 37, Number 3, June 2022
- Min-Ling Zhang, Xiu-Shen Wei, Gao Huang:
Preface. 505-506 - Peng-Fei Fang, Xian Li, Yang Yan, Shuai Zhang, Qiyue Kang, Xiao-Fei Li, Zhen-Zhong Lan:
Connecting the Dots in Self-Supervised Learning: A Brief Survey for Beginners. 507-526 - Pengfei Sun, Yawen Ouyang, Dingjie Song, Xin-Yu Dai:
Self-Supervised Task Augmentation for Few-Shot Intent Detection. 527-538 - Fan Liu, Delong Chen, Ruizhi Zhou, Sai Yang, Feng Xu:
Self-Supervised Music Motion Synchronization Learning for Music-Driven Conducting Motion Generation. 539-558 - Shi-Min Hu, Paul L. Rosin, Tian-Jia Shao:
Preface. 559-560 - Yijun Li, Frank Steinicke, Miao Wang:
A Comprehensive Review of Redirected Walking Techniques: Taxonomy, Methods, and Future Directions. 561-583 - Hanli Zhao, Kaijie Shi, Xiaogang Jin, Ming-Liang Xu, Hui Huang, Wanglong Lu, Ying Liu:
Probability-Based Channel Pruning for Depthwise Separable Convolutional Networks. 584-600 - HuaPeng Wei, Yingying Deng, Fan Tang, Xingjia Pan, Weiming Dong:
A Comparative Study of CNN- and Transformer-Based Visual Style Transfer. 601-614 - Zheng Chen, Xiao-Nan Fang, Song-Hai Zhang:
Local Homography Estimation on User-Specified Textureless Regions. 615-625 - Xin Feng, Hao-Ming Wu, Yi-Hao Yin, Li-Bin Lan:
CGTracker: Center Graph Network for One-Stage Multi-Pedestrian-Object Detection and Tracking. 626-640 - Yu-Jie Liu, Wen-Bin Shao, Xiao-Rui Sun:
Learn Robust Pedestrian Representation Within Minimal Modality Discrepancy for Visible-Infrared Person Re-Identification. 641-651 - Yan Tao, Yi-Teng Zhang, Xue-Jin Chen:
Element-Arrangement Context Network for Facade Parsing. 652-665 - Yu-Ping Wang, Sen-Wei Xie, Li-Hui Wang, Hongjin Xu, Satoshi Tabata, Masatoshi Ishikawa:
ARSlice: Head-Mounted Display Augmented with Dynamic Tracking and Projection. 666-679 - Tianni Xu, Haifeng Sun, Di Zhang, Xiao-Ming Zhou, Xiufeng Sui, Sa Wang, Qun Huang, Yungang Bao:
NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains. 680-698 - Rongyu Cao, Yixuan Cao, Ganbin Zhou, Ping Luo:
Extracting Variable-Depth Logical Document Hierarchy from Long Documents: Method, Evaluation, and Application. 699-718 - Xiaolong Yang, Xiaohong Jia, Yuan Liang, Lubin Fan:
6D Object Pose Estimation in Cluttered Scenes from RGB Images. 719-730 - Xiao-Rui Chen, Min Tang, Cheng Li, Dinesh Manocha, Ruofeng Tong:
BADF: Bounding Volume Hierarchies Centric Adaptive Distance Field Computation for Deformable Objects on GPUs. 731-740
Volume 37, Number 4, July 2022
- Jia-Feng Guo, Yiqing Zhou:
Preface. 741-742 - Yixiao Gao, Chen Tian, Wei Chen, Duo-Xing Li, Jian Yan, Yuan-Yuan Gong, Bing-Quan Wang, Tao Wu, Lei Han, Fa-Zhi Qi, Shan Zeng, Wan-Chun Dou, Gui-Hai Chen:
Analyzing and Optimizing Packet Corruption in RDMA Network. 743-762 - Jiaqing Dong, Zehao He, Yuan-Yuan Gong, Peiwen Yu, Chen Tian, Wan-Chun Dou, Guihai Chen, Nai Xia, Hao-Ran Guan:
SMART: Speedup Job Completion Time by Scheduling Reduce Tasks. 763-778 - Yi Wang, Yi-Xue Liu, Shunjia Zhu, Xiaofeng Gao, Chen Tian:
Approximation Designs for Energy Harvesting Relay Deployment in Wireless Sensor Networks. 779-796 - Hui Yu, Xinyu Jiang, Jin Zhao, Hao Qi, Yu Zhang, Xiaofei Liao, Haikun Liu, Fubing Mao, Hai Jin:
Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach. 797-813 - Zhijing Wu, Yiqun Liu, Jiaxin Mao, Min Zhang, Shaoping Ma:
Leveraging Document-Level and Query-Level Passage Cumulative Gain for Document Ranking. 814-838 - Xuanbo Huang, Kaiping Xue, Yitao Xing, Dingwen Hu, Ruidong Li, Qibin Sun:
An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking. 839-851 - Yubin Duan, Ning Wang, Jie Wu:
Accelerating DAG-Style Job Execution via Optimizing Resource Pipeline Scheduling. 852-868 - Abdalaziz Sawwan, Jie Wu:
Energy-Efficient Minimum Mobile Charger Coverage for Wireless Sensor Networks. 869-887 - Yi Qin, Qin Hu, Dongxiao Yu, Xiuzhen Cheng:
Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks. 888-905 - Linfeng Shen, Yuchi Chen, Jiangchuan Liu:
Gaze-Assisted Viewport Control for 360° Video on Smartphone. 906-918 - En Wang, Han Wang, Pengmin Dong, Yuanbo Xu, Yongjian Yang:
Distributed Game-Theoretical D2D-Enabled Task Offloading in Mobile Edge Computing. 919-941 - Yujing Feng, De-Jian Li, Xu Tan, Xiaochun Ye, Dongrui Fan, Wenming Li, Da Wang, Hao Zhang, Zhimin Tang:
Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism. 942-959 - Hao Liao, Qi-Xin Liu, Ze-cheng Huang, Ke-Zhong Lu, Chi Ho Yeung, Yi-Cheng Zhang:
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks. 960-974 - Bushra Alhijawi, Ghazi Al-Naymat:
Novel Positive Multi-Layer Graph Based Method for Collaborative Filtering Recommender Systems. 975-990 - Meng-Xin Chen, Xiaodong Zhu, Hao Zhang, Zhen Liu, Yuan-Ning Liu:
SMRI: A New Method for siRNA Design for COVID-19 Therapy. 991-1002
Volume 37, Number 5, October 2022
- Guoliang Li, Nan Tang, Chengliang Chai:
Preface. 1003-1004 - Jian Chen, Kai-Qi Zhang, Tian Ren, Zhenqing Wu, Hong Gao:
GAM: A GPU-Accelerated Algorithm for MaxRS Queries in Road Networks. 1005-1025 - She Sun, Shuai Ma, Jinghe Song, Wen-Hai Yue, Xuelian Lin, Tiejun Ma:
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing. 1026-1048 - Shuai Han, Mingxia Liu, Jian-Zhong Li:
Efficient Partitioning Method for Optimizing the Compression on Array Data. 1049-1067 - Chun-Xue Zhu, Longlong Lin, Pingpeng Yuan, Hai Jin:
Discovering Cohesive Temporal Subgraphs with Temporal Density Aware Exploration. 1068-1085 - Yue Kou, Dong Li, Derong Shen, Tiezheng Nie, Ge Yu:
Incremental User Identification Across Social Networks Based on User-Guider Similarity Index. 1086-1104 - Tianyu Zhao, Man Zeng, Jianhua Feng:
An Exercise Collection Auto-Assembling Framework with Knowledge Tracing and Reinforcement Learning. 1105-1117 - Jiawei He, Wenjun Jiang, Guo-Bang Chen, Yuquan Le, Xiaofei Ding:
Enhancing N-Gram Based Metrics with Semantics for Better Evaluation of Abstractive Text Summarization. 1118-1133 - Xiaoqing Deng, Bolin Chen, Weiqi Luo, Da Luo:
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling. 1134-1145 - Xiabing Zhou, Zhong-Qing Wang, Xing-Wei Liang, Min Zhang, Guodong Zhou:
Neural Emotion Detection via Personal Attributes. 1146-1160 - Xugang Wu, Huijun Wu, Xu Zhou, Xiang Zhao, Kai Lu:
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training. 1161-1175 - Jiuchen Shi, Xiaoqing Cai, Wenli Zheng, Quan Chen, Deze Zeng, Tatsuhiro Tsuchiya, Minyi Guo:
Reliability and Incentive of Performance Assessment for Decentralized Clouds. 1176-1199 - Xiu Ma, Huaxiao Liu, Guang-Li Li, Lei Liu:
FlexPDA: A Flexible Programming Framework for Deep Learning Accelerators. 1200-1220 - Ziyuan Hu, Pengbo Bo, Cai-Ming Zhang:
Quasi-Developable B-Spline Surface Design with Control Rulings. 1221-1238 - Jia Chen, Peng Wang, Fan Qiao, Shi-Qing Du, Wei Wang:
PLQ: An Efficient Approach to Processing Pattern-Based Log Queries. 1239-1254
Volume 37, Number 6, December 2022
- Xiaobing Chen, Hao Qi, Shaohui Peng, Yimin Zhuang, Tian Zhi, Yunji Chen:
Tetris: A Heuristic Static Memory Management Framework for Uniform Memory Multicore Neural Network Accelerators. 1255-1270 - Le-Le Li, Jiang-Yi Liu, Jianping Fan, Xuehai Qian, Kai Hwang, Yeh-Ching Chung, Zhibin Yu:
SOCA-DOM: A Mobile System-on-Chip Array System for Analyzing Big Data on the Move. 1271-1289 - Yi-Fan Zhang, Lei Sun, Qiang Cao:
TLP-LDPC: Three-Level Parallel FPGA Architecture for Fast Prototyping of LDPC Decoder Using High-Level Synthesis. 1290-1306 - Yuanhu Cheng, Libo Huang, Yi-Jun Cui, Sheng Ma, Yongwen Wang, Bingcai Sui:
RV16: An Ultra-Low-Cost Embedded RISC-V Processor Core. 1307-1319 - Xueqin Chang, Cheng-Yang Luo, Han-Lin Yu, Xin-Wei Cai, Lu Chen, Qing Liu, Yunjun Gao:
Answering Non-Answer Questions on Reverse Top-k Geo-Social Keyword Queries. 1320-1336 - Yuan Li, Jie Dai, Xiaolin Fan, Yu-Hai Zhao, Guoren Wang:
I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks. 1337-1355 - Tong Ding, Ning Liu, Zhongmin Yan, Lei Liu, Li-zhen Cui:
An Efficient Reinforcement Learning Game Framework for UAV-Enabled Wireless Sensor Network Data Collection. 1356-1368 - Dong Li, Zhi-Lei Lei, Baoyan Song, Wanting Ji, Yue Kou:
Neural Attentional Relation Extraction with Dual Dependency Trees. 1369-1381 - Tao Huang, Su-Yun Zhao, Hong Chen, Yi-Xuan Liu:
Improving Parameter Estimation and Defensive Ability of Latent Dirichlet Allocation Model Training Under Rényi Differential Privacy. 1382-1397 - Hongjie Guo, Jianzhong Li, Hong Gao:
Minimum Epsilon-Kernel Computation for Large-Scale Data Processing. 1398-1411 - Yu-Qian Zhu, Jia-Ying Deng, Jiachen Pu, Peng Wang, Shen Liang, Wei Wang:
ML-Parser: An Efficient and Accurate Online Log Parser. 1412-1426 - Lan-Fang Dong, Han-Chao Liu, Xinming Zhang:
Synthetic Data Generation and Shuffled Multi-Round Training Based Offline Handwritten Mathematical Expression Recognition. 1427-1443 - Ming-Min Shao, Wen-Jun Jiang, Jie Wu, Yu-Qing Shi, Tak-Shing Yum, Ji Zhang:
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest. 1444-1463 - Jian-Fu Zhu, Zhongkai Hao, Qi Liu, Yu Yin, Chengqiang Lu, Zhenya Huang, En-Hong Chen:
Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm. 1464-1477 - Cheng-Li Peng, Jia-Yi Ma:
Real-Time Semantic Segmentation via an Efficient Multi-Column Network. 1478-1491 - Bo Yi, Xingwei Wang, Min Huang, Qiang He:
A QoS Based Reliable Routing Mechanism for Service Customization. 1492-1508 - JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 1509-1513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.