


default search action
Frontiers of Computer Science, Volume 13
Volume 13, Number 1, February 2019
- Thomas G. Dietterich:

Robust artificial intelligence and robust human organizations. 1-3 - Jinjian Wu, Guangming Shi, Weisi Lin:

Survey of visual just noticeable difference estimation. 4-15 - Chu Li, Dan Feng, Yu Hua, Fang Wang:

A high-performance and endurable SSD cache for parity-based RAID. 16-34 - Xuchao Xie, Liquan Xiao

, Dengping Wei, Qiong Li, Zhenlong Song, Xiongzi Ge:
Pinpointing and scheduling access conflicts to improve internal resource utilization in solid-state drives. 35-50 - Kazuhiro Ogata:

A divide & conquer approach to liveness model checking under fairness & anti-fairness assumptions. 51-72 - Xuepeng Fan, Xiaofei Liao, Hai Jin:

FunctionFlow: coordinating parallel tasks. 73-85 - Yi Chu

, Chuan Luo, Shaowei Cai
, Haihang You:
Empirical investigation of stochastic local search for maximum satisfiability. 86-98 - Xiangyu Guo, Wei Wang:

Towards making co-training suffer less from insufficient views. 99-105 - Shan Zhong, Quan Liu, Zongzhang Zhang, Qiming Fu:

Efficient reinforcement learning in continuous state and action spaces with Dyna and policy approximation. 106-126 - Qingying Sun, Zhongqing Wang, Shoushan Li, Qiaoming Zhu, Guodong Zhou

:
Stance detection via sentiment information and neural network model. 127-138 - Changlong Wang, Zhiyong Feng, Xiaowang Zhang

, Xin Wang, Guozheng Rao
, Daoxun Fu:
ComR: a combined OWL reasoner for ontology classification. 139-156 - Chao Kong

, Ming Gao, Chen Xu, Yunbin Fu, Weining Qian, Aoying Zhou:
EnAli: entity alignment across multiple heterogeneous data sources. 157-169 - Yaru Xian, Jun Xiao, Ying Wang:

A fast registration algorithm of rock point cloud based on spherical projection and feature extraction. 170-182 - Rizwan Ahmed Khan

, Alexandre Meyer
, Hubert Konik, Saïda Bouakaz:
Saliency-based framework for facial expression recognition. 183-198 - Haijun Wang, Hongjuan Ge:

Visual tracking using discriminative representation with ℓ2 regularization. 199-211 - Xiaohua Shi

, Hongtao Lu:
Community detection in scientific collaborative network with bayesian matrix learning. 212-214 - Weibang Li, Ling Li, Zhanhuai Li, Mengtian Cui

:
Statistical relational learning based automatic data cleaning. 215-217
Volume 13, Number 2, April 2019
- Zhi-Hua Zhou:

Launch of the Excellent Young Computer Scientists Forum. 219 - Sa Wang, Yiwen Shao, Yungang Bao:

Practices of backuping homomorphically encrypted databases. 220-230 - Min Gao

, Bin Ling, Linda Yang
, Junhao Wen, Qingyu Xiong, Shun Li:
From similarity perspective: a robust collaborative filtering approach for service recommendations. 231-246 - Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:

DFTracker: detecting double-fetch bugs by multi-taint parallel tracking. 247-263 - Shichen Zou, Junyu Lin, Huiqiang Wang, Hongwu Lv, Guangsheng Feng:

An effective method for service components selection based on micro-canonical annealing considering dependability assurance. 264-279 - Hao Shao:

Query by diverse committee in transfer active learning. 280-291 - Anna Zhu, Seiichi Uchida:

Scene word recognition from pieces to whole. 292-301 - Miaogen Ling, Xin Geng:

Soft video parsing by label distribution learning. 302-317 - Kun Su, Gongping Yang

, Lu Yang, Peng Su, Yilong Yin:
Non-negative locality-constrained vocabulary tree for finger vein image retrieval. 318-332 - Zhengdong Xia, Tianming Bu, Wen-Hui Gong:

Optimal bundles for sponsored search auctions via bracketing scheme. 333-342 - Xingshen Song, Yuexiang Yang, Yu Jiang, Kun Jiang:

Optimizing partitioning strategies for faster inverted index compression. 343-356 - Thu-Lan Dam, Kenli Li, Philippe Fournier-Viger

, Quang-Huy Duong
:
CLS-Miner: efficient and effective closed high-utility itemset mining. 357-381 - Ning Wang, Yu Gu, Jia Xu, Fangfang Li, Ge Yu:

Differentially private high-dimensional data publication via grouping and truncating techniques. 382-395 - Yu Hong, Kai Wang, Weiyi Ge, Yingying Qiu, Guodong Zhou

:
Cursor momentum for fascination measurement. 396-412 - Siyuan Tang, Bei Hua:

Increasing multicast transmission rate with localized multipath in software-defined networks. 413-425 - Gaoqi He, Qi Chen, Dongxu Jiang, Yubo Yuan, Xingjian Lu:

Physical-barrier detection based collective motion analysis. 426-436 - Jinglian Liu, Daling Wang, Shi Feng, Yifei Zhang, Weiji Zhao:

Learning distributed representations for community search using node embedding. 437-439 - Peng Xu, Xu Liu, Huafeng Cao, Zhongbao Zhang:

An efficient energy aware virtual network migration based on genetic algorithm. 440-442
Volume 13, Number 3, June 2019
- Jin Huang, Jiong Chen, Weiwei Xu

, Hujun Bao:
A survey on fast simulation of elastic objects. 443-459 - Satoshi Miyazawa

, Xuan Song, Tianqi Xia, Ryosuke Shibasaki, Hodaka Kaneda:
Integrating GPS trajectory and topics from Twitter stream for human mobility estimation. 460-470 - Chunjie Zhou, Xiaoling Wang, Zhiwang Zhang, Zhenxing Zhang, Haiping Qu:

The time model for event processing in internet of things. 471-488 - Lin Wang, Depei Qian, Rui Wang, Zhongzhi Luan, Hailong Yang, Huaxiang Zhang:

A novel index system describing program runtime characteristics for workload consolidation. 489-499 - Mei Li

, Hongjun Zhang, Yanjun Wu, Chen Zhao:
Prefetch-aware fingerprint cache management for data deduplication systems. 500-515 - Jing Liu, Tengfei Li

, Zuohua Ding, Yuqing Qian, Haiying Sun, Jifeng He:
AADL+: a simulation-based methodology for cyber-physical systems. 516-538 - Xinqiao Lv, Wei Xiao, Yu Zhang, Xiaofei Liao, Hai Jin, Qiang-Sheng Hua:

An effective framework for asynchronous incremental graph processing. 539-551 - Weibo Yang, Liangjun Ke:

An improved fireworks algorithm for the capacitated vehicle routing problem. 552-564 - Wenhao Zheng, Hong-Yu Zhou

, Ming Li, Jianxin Wu:
CodeAttention: translating source code to comments by exploiting the code constructs. 565-578 - Chong Shang, Haizhou Ai, Yi Yang:

Crowd counting via learning perspective for multi-scale multi-view Web images. 579-587 - Lihua Wu, Qinghua Shang, Yupeng Sun, Xu Bai:

A self-adaptive correction method for perspective distortions of image. 588-598 - Meysam Vakili, Neda Jahangiri, Mohsen Sharifi

:
Cloud service selection using cloud service brokers: approaches and challenges. 599-617 - Bo Yuan, Xiaolei Zhou, Xiaoqiang Teng, Deke Guo:

Enabling entity discovery in indoor commercial environments without pre-deployed infrastructure. 618-636 - Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu:

Fingerprinting Android malware families. 637-646 - Zhigang Zhang, Xiaodong Qi, Yilin Wang, Cheqing Jin, Jiali Mao, Aoying Zhou:

Distributed top-k similarity query on big trajectory streams. 647-664 - Bo Wang, Chongyi Li

:
A visual hierarchical framework based model for underwater image enhancement. 665-667
Volume 13, Number 4, August 2019
- Yufeng Li, De-Ming Liang:

Safe semi-supervised learning: a brief introduction. 669-676 - Thierry Gautier, Clément Guy, Alexandre Honorat, Paul Le Guernic, Jean-Pierre Talpin, Loïc Besnard:

Polychronous automata and their use for formal validation of AADL models. 677-697 - Kai Hu, Zhangbo Duan, Jiye Wang, Lingchao Gao, Lihong Shang:

Template-based AADL automatic code generation. 698-714 - Zhibin Yang, Jean-Paul Bodeveix, Mamoun Filali:

Towards a simple and safe Objective Caml compiling framework for the synchronous language SIGNAL. 715-734 - Farid Feyzi

, Saeed Parsa
:
Inforence: effective fault localization based on information-theoretic analysis and statistical causal inference. 735-759 - Tao Zhu, Huiqi Hu, Weining Qian, Huan Zhou, Aoying Zhou:

Fault-tolerant precise data access on distributed log-structured merge-tree. 760-777 - Huaizu Jiang, Ming-Ming Cheng

, Shijie Li, Ali Borji, Jingdong Wang
:
Joint salient object detection and existence prediction. 778-788 - Jie Zhang, Xiaowei Zhao, Meina Kan, Shiguang Shan

, Xiujuan Chai, Xilin Chen:
Locality-constrained framework for face alignment. 789-801 - Ratha Pech, Dong Hao, Hong Cheng, Tao Zhou

:
Enhancing subspace clustering based on dynamic prediction. 802-812 - Hui Xue, Sen Li, Xiaohong Chen, Yunyun Wang:

A maximum margin clustering algorithm based on indefinite kernels. 813-827 - Ying Jiang, Shichao Liu, Thomas Ehrhard:

A fully abstract semantics for value-passing CCS for trees. 828-849 - Xiaodong Meng, Chentao Wu, Minyi Guo, Long Zheng, Jingyu Zhang:

PAM: an efficient power-aware multilevel cache policy to reduce energy consumption of storage systems. 850-863 - Wen Liu, Tuqian Zhang, Yanming Shen, Peng Wang:

Fast correlation coefficient estimation algorithm for HBase-based massive time series data. 864-878 - Momeng Liu, Yupu Hu:

Universally composable oblivious transfer from ideal lattice. 879-906 - Shenyi Qian, Daiyi Li

, Tong Sun, Bin Yu:
Detection of common wound infection bacteria based on FAIMS technology. 907-909
Volume 13, Number 5, October 2019
- Lihong Li:

A perspective on off-policy evaluation in reinforcement learning. 911-912 - Linjun Mei, Dan Feng, Lingfang Zeng

, Jianxi Chen, Jingning Liu:
Exploiting flash memory characteristics to improve performance of RAIS storage systems. 913-928 - Libing Wu

, Lei Nie
, Samee U. Khan
, Osman Khalid, Dan Wu:
A V2I communication-based pipeline model for adaptive urban traffic light scheduling. 929-942 - Xin Chen, He Jiang, Zhenyu Chen, Tieke He, Liming Nie:

Automatic test report augmentation to assist crowdsourced testing. 943-959 - Zhuo Wang

, Qun Chen, Bo Suo, Wei Pan, Zhanhuai Li:
Reducing partition skew on MapReduce: an incremental allocation approach. 960-975 - Shuai Zhang

, Xinjun Mao, Fu Hou, Peini Liu
:
A field-based service management and discovery method in multiple clouds context. 976-995 - Xu-Ying Liu, Sheng-Tao Wang, Min-Ling Zhang

:
Transfer synthetic over-sampling for class-imbalance learning with limited minority class data. 996-1009 - Ying Li

, Xiangwei Kong, Haiyan Fu
, Qi Tian:
Contextual modeling on auxiliary points for robust image reranking. 1010-1022 - Weinan Zhang, Ting Liu, Qingyu Yin, Yu Zhang

:
Neural recovery machine for Chinese dropped pronoun. 1023-1033 - Yudong Qin, Deke Guo, Lailong Luo, Geyao Cheng, Zeliu Ding:

Design and optimization of VLC based small-world data centers. 1034-1047 - Fei Wang, Tieyun Qian

, Bin Liu, Zhiyong Peng:
Patent expanded retrieval via word embedding under composite-domain perspectives. 1048-1061 - Zhefan Zhong, Xin Lin, Liang He, Jing Yang:

Answering why-not questions on KNN queries. 1062-1071 - Chengcheng Yu, Fan Xia, Weining Qian, Aoying Zhou:

A parallel data generator for efficiently generating "realistic" social streams. 1072-1101 - Zhenxue He, Limin Xiao, Fei Gu, Li Ruan, Zhisheng Huo, Mingzhe Li, Mingfa Zhu, Longbing Zhang, Rui Liu, Xiang Wang:

EDOA: an efficient delay optimization approach for mixed-polarity Reed-Muller logic circuits under the unit delay model. 1102-1115 - Kang Li, Fazhi He, Haiping Yu, Xiao Chen:

A parallel and robust object tracking approach synthesizing adaptive Bayesian learning and improved incremental subspace learning. 1116-1135 - Xuan Li, Jin Li, Siu-Ming Yiu, Chongzhi Gao, Jinbo Xiong:

Privacy-preserving edge-assisted image retrieval and classification in IoT. 1136-1147 - Yongyi Yan, Jumei Yue, Zhumu Fu, Zengqiang Chen:

Algebraic criteria for finite automata understanding of regular language. 1148-1150
Volume 13, Number 6, December 2019
- Libo Feng

, Hui Zhang, Wei-Tek Tsai, Simeng Sun:
System architecture for high-performance permissioned blockchains. 1151-1165 - Lian Yu, Wei-Tek Tsai:

State synchronization in process-oriented chaincode. 1166-1181 - Yan Zhu

, Khaled Riad
, Ruiqi Guo, Guohua Gan, Rongquan Feng:
New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. 1182-1197 - Yu Zhang, Yuxing Han, Jiangtao Wen:

SMER: a secure method of exchanging resources in heterogeneous internet of things. 1198-1209 - Tianyong Wu, Xi Deng, Jun Yan, Jian Zhang:

Analyses for specific defects in android applications: a survey. 1210-1227 - Juan Chen, Wenhao Zhou, Yong Dong, Zhiyuan Wang, Chen Cui, Feihao Wu, Enqiang Zhou, Yuhua Tang:

Analyzing time-dimension communication characterizations for representative scientific applications on supercomputer systems. 1228-1242 - Liang Sun, Hongwei Ge, Wenjing Kang:

Non-negative matrix factorization based modeling and training algorithm for multi-label learning. 1243-1254 - Jia He, Fuzhen Zhuang, Yanchi Liu, Qing He, Fen Lin:

Bayesian dual neural networks for recommendation. 1255-1265 - Yu Hong, Siyuan Ding, Yang Xu, Xiaoxia Jiang, Yu Wang, Jianmin Yao, Qiaoming Zhu, Guodong Zhou

:
Focus-sensitive relation disambiguation for implicit discourse relation detection. 1266-1281 - Ningnan Zhou, Xiao Zhang, Shan Wang:

Timestamp reassignment: taming transaction abort for serializable snapshot isolation. 1282-1295 - Kai Li, Guangyi Lv, Zhefeng Wang, Qi Liu, Enhong Chen

, Lisheng Qiao:
Understanding the mechanism of social tie in the propagation process of social network with communication channel. 1296-1308 - Wenjie Liu, Zhanhuai Li:

An efficient parallel algorithm of N-hop neighborhoods on graphs in distributed environment. 1309-1325 - Xin Yang, Tangli Xue, Hongcheng Luo, Jiabin Guo:

Fast and accurate visual odometry from a monocular camera. 1326-1336 - Gaochang Wu

, Yipeng Li, Yuanhao Huang, Yebin Liu:
Joint view synthesis and disparity refinement for stereo matching. 1337-1352 - Pawan Kumar

, Ravins Dohare
:
A neighborhood proximity based algorithm for overlapping community structure detection in weighted networks. 1353-1355 - Yanwen Xie, Dan Feng, Fang Wang, Lingling Zhang:

Non-sequential striping encoder from replication to erasure coding for distributed storage system. 1356-1358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














