


default search action
Journal of Computer Science and Technology, Volume 34
Volume 34, Number 1, January 2019
- Su Song, Ke Liu, Zhiyong Liu:

Preface. 1-2 - Wessam Elhefnawy, Min Li, Jianxin Wang, Yaohang Li:

Decoding the Structural Keywords in Protein Structure Universe. 3-15 - Lin Wu, Min Li, Jianxin Wang, Fang-Xiang Wu

:
Controllability and Its Applications to Biological Networks. 16-34 - Zhe Liu, Cheng-Jian Qiu, Yu-Qing Song, Xiaohong Liu, Juan Wang, Victor S. Sheng:

Texture Feature Extraction from Thyroid MR Imaging Using High-Order Derived Mean CLBP. 35-46 - Yifan Wu, Fan Yang, Yong Xu, Haibin Ling:

Privacy-Protective-GAN for Privacy Preserving Face De-Identification. 47-60 - Wenguo Liu, Lingfang Zeng

, Dan Feng, Kenneth B. Kent
:
ROCO: Using a Solid State Drive Cache to Improve the Performance of a Host-Aware Shingled Magnetic Recording Drive. 61-76 - Min Li, Chao Yang, Qiao Sun, Wenjing Ma, Wenlong Cao, Yulong Ao:

Enabling Highly Efficient k-Means Computations on the SW26010 Many-Core Processor of Sunway TaihuLight. 77-93 - Yang Hong, Yang Zheng, Fan Yang, Binyu Zang, Haibing Guan, Haibo Chen:

Scaling out NUMA-Aware Applications with RDMA-Based Distributed Shared Memory. 94-112 - Ziqi Fan, Dongchul Park:

Extending SSD Lifespan with Comprehensive Non-Volatile Memory-Based Write Buffers. 113-132 - Fateh Boucenna, Omar Nouali, Samir Kechid

, M. Tahar Kechadi
:
Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management. 133-154 - Yuting Qiang, Yanwei Fu

, Xiao Yu, Yanwen Guo, Zhi-Hua Zhou, Leonid Sigal:
Learning to Generate Posters of Scientific Papers by Probabilistic Graphical Models. 155-169 - Yuliang Ma, Ye Yuan, Feida Zhu

, Guoren Wang, Jing Xiao, Jianzong Wang
:
Who Should Be Invited to My Party: A Size-Constrained k-Core Problem in Social Networks. 170-184 - Shuaibing Lu, Jie Wu, Huanyang Zheng, Zhiyi Fang:

On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model. 185-206 - Jianjun Zheng, Akbar Siami Namin:

A Survey on the Moving Target Defense Strategies: An Architectural Perspective. 207-233 - Jingya Zhou, Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng:

A Cost-Efficient Approach to Storing Users' Data for Online Social Networks. 234-252
Volume 34, Number 2, March 2019
- Su Song, Ke Liu, Zhiyong Liu:

Preface. 253-255 - Masoud Zadghorban Lifkooee, Celong Liu, Yongqing Liang

, Yimin Zhu
, Xin Li
:
Real-Time Avatar Pose Transfer and Motion Generation Using Locally Encoded Laplacian Offsets. 256-271 - Lei Cui, Youyang Qu

, Mohammad Reza Nosouhi
, Shui Yu
, Jianwei Niu
, Gang Xie:
Improving Data Utility Through Game Theory in Personalized Differential Privacy. 272-286 - Mengqi Zeng, Bin Yao, Zhi-Jie Wang, Yanyan Shen, Feifei Li, Jianfeng Zhang, Hao Lin, Minyi Guo:

CATIRI: An Efficient Method for Content-and-Text Based Image Retrieval. 287-304 - Dong-Di Zhao, Fan Li, Kashif Sharif

, Guang-Min Xia, Yu Wang
:
Space Efficient Quantization for Deep Convolutional Neural Networks. 305-317 - Feng Zhou, Haomin Zhou, Zhihua Yang, Lihua Yang:

A 2-Stage Strategy for Non-Stationary Signal Prediction and Recovery Using Iterative Filtering and Neural Network. 318-338 - Chuangyi Gui, Long Zheng, Bingsheng He

, Cheng Liu
, Xinyu Chen, Xiaofei Liao, Hai Jin:
A Survey on Graph Processing Accelerators: Challenges and Opportunities. 339-371 - Weibei Fan, Jianxi Fan, Cheng-Kuan Lin, Yan Wang, Yuejuan Han, Ruchuan Wang:

Optimally Embedding 3-Ary n-Cubes into Grids. 372-387 - Jinoh Kim, Alex Sim

:
A New Approach to Multivariate Network Traffic Analysis. 388-402 - Zhiguo Wan, Robert H. Deng

, David Lee, Ying Li:
MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains. 403-415 - Bo Guo, Young-Woo Kwon

, Myoungkyu Song:
Decomposing Composite Changes for Code Review and Regression Test Selection in Evolving Software. 416-436 - Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein

:
On Identifying and Explaining Similarities in Android Apps. 437-455 - Song Liu, Yuanzhen Cui, Nianjun Zou, Wenhao Zhu, Dong Zhang, Weiguo Wu:

Revisiting the Parallel Strategy for DOACROSS Loops. 456-475 - Xiang-Chu Feng, Chen-ping Zhao, Silong Peng, Xiyuan Hu

, Zhao-Wei Ouyang:
Plug-and-Play Based Optimization Algorithm for New Crime Density Estimation. 476-493 - Amichai Painsky, Saharon Rosset:

Lossless Compression of Random Forests. 494-506
Volume 34, Number 3, May 2019
- Shi-Min Hu, Hongbo Fu, Marcus A. Magnor

:
Preface. 507-508 - Tailing Yuan

, Zhe Zhu, Kun Xu, Cheng-Jun Li, Tai-Jiang Mu
, Shi-Min Hu:
A Large Chinese Text Dataset in the Wild. 509-521 - Shuai Li, Zheng Fang, Wenfeng Song, Aimin Hao, Hong Qin:

Bidirectional Optimization Coupled Lightweight Networks for Efficient and Robust Multi-Person 2D Pose Estimation. 522-536 - Na Ding, Yepeng Liu

, Lin-Wei Fan
, Caiming Zhang:
Single Image Super-Resolution via Dynamic Lightweight Database with Local-Feature Based Interpolation. 537-549 - Mengke Yuan

, Longquan Dai, Dong-Ming Yan
, Liqiang Zhang, Jun Xiao, Xiaopeng Zhang:
Fast and Error-Bounded Space-Variant Bilateral Filtering. 550-568 - De-Wang Li

, Linjing Lai, Hua Huang
:
Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map. 569-580 - Bo Ren

, Jia-Cheng Wu, Ya-Lei Lv, Ming-Ming Cheng
, Shao-Ping Lu:
Geometry-Aware ICP for Scene Reconstruction from RGB-D Camera. 581-593 - Song-Hai Zhang, Shao-Kui Zhang, Yuan Liang, Peter Hall

:
A Survey of 3D Indoor Scene Synthesis. 594-608 - Risheng Liu

, Caisheng Mao, Zhihui Wang, Haojie Li:
Blind Image Deblurring via Adaptive Optimization with Flexible Sparse Structure Control. 609-621 - Han Liu, Hang Du, Dan Zeng, Qi Tian:

Cloud Detection Using Super Pixel Classification and Semantic Segmentation. 622-633 - Xinchen Liu, Huadong Ma, Shuangqun Li:

PVSS: A Progressive Vehicle Search System for Video Surveillance Networks. 634-644 - Jiang Rong, Tao Qin

, Bo An:
Competitive Cloud Pricing for Long-Term Revenue Maximization. 645-656 - Dawei Cheng, Yi Tu, Zhen-Wei Ma, Zhibin Niu

, Liqing Zhang:
BHONEM: Binary High-Order Network Embedding Methods for Networked-Guarantee Loans. 657-669 - Mingzhe Zhang, Yunzhan Gong, Yawen Wang, Dahai Jin:

Unit Test Data Generation for C Using Rule-Directed Symbolic Execution. 670-689 - Peng Zhao, Chen Ding, Lei Liu, Jiping Yu, Wentao Han, Xiaobing Feng:

Cacheap: Portable and Collaborative I/O Optimization for Graph Processing. 690-706
Volume 34, Number 4, July 2019
- Xiaofang Zhou, Jiajie Xu:

Preface. 707-708 - Jianqiu Xu, Ralf Hartmut Güting, Yu Zheng, Ouri Wolfson

:
Moving Objects with Transportation Modes: A Survey. 709-726 - Na Ta, Guoliang Li, Jun Hu, Jianhua Feng:

Location and Trajectory Identification from Microblogs. 727-746 - Junhua Fang

, Pengpeng Zhao, An Liu, Zhixu Li, Lei Zhao:
Scalable and Adaptive Joins for Trajectory Data in Distributed Stream System. 747-761 - Hong Fang, Bo Zhao

, Xiaowang Zhang
, Xuanxing Yang:
A United Framework for Large-Scale Resource Description Framework Stream Processing. 762-774 - Lihua Yin

, Huiwen Liu:
Searching Activity Trajectories with Semantics. 775-794 - Hong-Cheu Liu, Jixue Liu

:
On the Expressive Power of Logics on Constraint Databases with Complex Objects. 795-817 - Hongfei Xu, Yu Gu, Jianzhong Qi

, Jiayuan He
, Ge Yu:
Diversifying Top-k Routes with Spatial Constraints. 818-838 - Ze-Wei Chen

, Hang Lei, Maolin Yang, Yong Liao, Jiali Yu:
Improved Task and Resource Partitioning Under the Resource-Oriented Partitioned Scheduling. 839-853 - Quoc Le, Ahmed Amer, JoAnne Holliday:

RAID 4SMR: RAID Array with Shingled Magnetic Recording Disk for Mass Storage Systems. 854-868 - Léo Mendiboure

, Mohamed Aymen Chalouf, Francine Krief:
Edge Computing Based Applications in Vehicular Environments: Comparative Study and Main Issues. 869-886 - Mansoor Davoodi, Esmaeil Delfaraz, Sajjad Ghobadi

, Mahtab Masoori:
Algorithms for Handoff Minimization in Wireless Networks. 887-900 - Zipeng Zhang, Ming Fu, Xin-Yu Feng:

A Lightweight Dynamic Enforcement of Privacy Protection for Android. 901-923 - Robail Yasrab

:
SRNET: A Shallow Skip Connection Based Convolutional Neural Network Design for Resolving Singularities. 924-938
Volume 34, Number 5, September 2019
- Tao Xie, Jun Wei, Chang Xu, Zhi Jin, Xiaoxing Ma:

Preface. 939-941 - Shengqu Xi, Yuan Yao, Xusheng Xiao

, Feng Xu, Jian Lu:
Bug Triaging Based on Tossing Sequence Modeling. 942-956 - Wei Chen, Jiahong Zhou

, Jiaxin Zhu, Guoquan Wu, Jun Wei:
Semi-Supervised Learning Based Tag Recommendation for Docker Repositories. 957-971 - Lingyun Situ, Linzhang Wang, Yang Liu

, Bing Mao, Xuandong Li:
Automatic Detection and Repair Recommendation for Missing Checks. 972-992 - Chunyang Ling, Yanzhen Zou, Zeqi Lin, Bing Xie:

Graph Embedding Based API Graph Search and Recommendation. 993-1006 - Haibo Ye, Xuansong Li, Li Sheng, Kai Dong:

CBSC: A Crowdsensing System for Automatic Calibrating of Barometers. 1007-1019 - Xiang Chen, Dun Zhang, Zhanqi Cui, Qing Gu, Xiaolin Ju

:
DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy. 1020-1038 - Zhou Xu, Shuai Pang, Tao Zhang

, Xiapu Luo, Jin Liu, Yutian Tang
, Xiao Yu, Lei Xue
:
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning. 1039-1062 - Mohammed Alqmase, Mohammad R. Alshayeb, Lahouari Ghouti:

Threshold Extraction Framework for Software Metrics. 1063-1078 - Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang

, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. 1079-1095 - Han Lin, Mingfan Li, Chengfan Jia

, Junnan Liu, Hong An:
Degree-of-Node Task Scheduling of Fine-Grained Parallel Programs on Heterogeneous Systems. 1096-1108 - Wenwu Yang, Jing Hua, Kun-Yang Yao:

CR-Morph: Controllable Rigid Morphing for 2D Animation. 1109-1122 - Xin Yang, Dawei Wang, Wenbo Hu, Lijing Zhao, Baocai Yin, Qiang Zhang

, Xiaopeng Wei, Hongbo Fu:
DEMC: A Deep Dual-Encoder Network for Denoising Monte Carlo Rendering. 1123-1135 - Jie Xiao, Zhanhui Shi

, Jianhui Jiang, Xu-Hua Yang, Yujiao Huang, Haigen Hu:
A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm. 1136-1151 - Dawei Wang, Wan-Qiu Cui, Biao Qin:

CK-Modes Clustering Algorithm Based on Node Cohesion in Labeled Property Graph. 1152-1166
Volume 34, Number 6, November 2019
- Rui Ren, Jiechao Cheng, Xiwen He, Lei Wang, Jianfeng Zhan, Wanling Gao, Chunjie Luo:

HybridTune: Spatio-Temporal Performance Data Correlation for Performance Diagnosis of Big Data Systems. 1167-1184 - Jiuru Gao, Wei Chen, Jia-Jie Xu, An Liu, Zhixu Li, Hongzhi Yin

, Lei Zhao:
An Efficient Framework for Multiple Subgraph Pattern Matching Models. 1185-1202 - Anzhen Zhang, Jian-Zhong Li, Hong Gao:

Interval Estimation for Aggregate Queries on Incomplete Data. 1203-1216 - Chunyang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xintian Chen:

Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism. 1217-1229 - Pengfei Wang

, Yongfeng Zhang, Shuzi Niu, Jiafeng Guo:
Modeling Temporal Dynamics of Users' Purchase Behaviors for Next Basket Prediction. 1230-1240 - Momodou L. Sanyang, Ata Kabán:

Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles. 1241-1257 - Zhi-Guang Pan, Chuhua Xian, Shuo Jin, Guiqing Li:

Progressive Furniture Model Decimation with Texture Preservation. 1258-1268 - Xinggang Wang

, Jiasi Wang, Peng Tang, Wenyu Liu:
Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection. 1269-1278 - Xiaowu Li, Zhinan Wu, Feng Pan, Juan Liang, Jiafeng Zhang

, Linke Hou
:
A Geometric Strategy Algorithm for Orthogonal Projection onto a Parametric Surface. 1279-1293 - Mohan Zhang, Jinhui Yu, Kang Zhang, Junsong Zhang:

Artistic Augmentation of Photographs with Droplets. 1294-1306 - Chengzhang Zhu, Rong Hu, Beiji Zou, Rongchang Zhao, Changlong Chen, Yalong Xiao:

Automatic Diabetic Retinopathy Screening via Cascaded Framework Based on Image- and Lesion-Level Features Fusion. 1307-1318 - Naveen Kumar

, Ashutosh Kumar Singh
, Abdul Aleem
, Shashank Srivastava
:
Security Attacks in Named Data Networking: A Review and Research Directions. 1319-1350 - Chong Wang, Nasro Min-Allah

, Bei Guan, Yuqi Lin, Jingzheng Wu, Yongji Wang:
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion. 1351-1365 - Ge Wu, Jianchang Lai, Fuchun Guo

, Willy Susilo
, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. 1366-1379 - JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 1380-1383


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














