


default search action
Journal of Computer Science and Technology, Volume 33
Volume 33, Number 1, January 2018
- Jinhua Tao, Zidong Du, Qi Guo, Huiying Lan

, Lei Zhang, Shengyuan Zhou, Lingjie Xu, Cong Liu, Hai-Feng Liu, Shan Tang, Allen Rush, Willian Chen, Shaoli Liu, Yunji Chen
, Tianshi Chen:
BenchIP: Benchmarking Intelligence Processors. 1-23 - Rui-Tao Liu, Zuoning Chen:

A Large-Scale Study of Failures on Petascale Supercomputers. 24-41 - Xueyan Wang, Qiang Zhou, Yici Cai, Gang Qu:

Spear and Shield: Evolution of Integrated Circuit Camouflaging. 42-57 - Jian Liu, Yunpeng Chai, Xiao Qin

, Yao-Hong Liu:
Endurable SSD-Based Read Cache for Improving the Performance of Selective Restore from Deduplication Systems. 58-78 - Dongchul Park, Weiping He, David H. C. Du:

Hot Data Identification with Multiple Bloom Filters: Block-Level Decision vs I/O Request-Level Decision. 79-97 - Yutao Liu, Dong Du

, Yubin Xia, Haibo Chen, Binyu Zang, Zhenkai Liang
:
SplitPass: A Mutually Distrusting Two-Party Password Manager. 98-115 - Xu Tan, Xiaochun Ye, Xiaowei Shen, Yuanchao Xu, Da Wang, Lunkai Zhang, Wenming Li, Dongrui Fan

, Zhimin Tang:
A Pipelining Loop Optimization Method for Dataflow Architecture. 116-130 - Faqiang Sun, Guihai Yan, Xin He, Huawei Li

, Yinhe Han:
CPicker: Leveraging Performance-Equivalent Configurations to Improve Data Center Energy Efficiency. 131-144 - Xu Tan, Xiaowei Shen, Xiaochun Ye, Da Wang, Dongrui Fan

, Lunkai Zhang, Wenming Li, Zhimin Zhang, Zhimin Tang:
A Non-Stop Double Buffering Mechanism for Dataflow Architecture. 145-157 - Li-Jing Wang, Yong-Qiang Lv, Ilya Moiseenko, Dongsheng Wang:

A Dataflow-Oriented Programming Interface for Named Data Networking. 158-168 - Chen Feng, Chundian Li, Rui Li:

Indexing Techniques of Distributed Ordered Tables: A Survey and Analysis. 169-189 - Rong Wang, Tianlei Hu, Gang Chen:

Where Do Local Experts Go? Evaluating User Geo-Topical Similarity for Top-N Place Recommendation. 190-206 - Junli Zhao

, Zhongke Wu, Zhenkuan Pan, Fuqing Duan, Jin-Hua Li, Zhi-Han Lv
, Kang Wang, Yu-Cong Chen:
3D Face Similarity Measure by Fréchet Distances of Geodesics. 207-222 - Kang Li, Fazhi He, Haiping Yu:

Robust Visual Tracking Based on Convolutional Features with Illumination and Occlusion Handing. 223-236 - Mohamed Maher Ben Ismail, Ouiem Bchir:

Erratum to: Automatic Fall Detection Using Membership Based Histogram Descriptors. 237
Volume 33, Number 2, March 2018
- Zhimin Gao, Lei Xu

, Lin Chen
, Xi Zhao, Yang Lu, Weidong Shi:
CoC: A Unified Distributed Ledger Based Supply Chain Management System. 237-248 - Seilendria A. Hadiwardoyo

, Subhadeep Patra
, Carlos T. Calafate
, Juan-Carlos Cano, Pietro Manzoni:
An Intelligent Transportation System Application for Smartphones Based on Vehicle Position Advertising and Route Sharing in Vehicular Ad-Hoc Networks. 249-262 - Nour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche

:
A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles. 263-276 - Yang Li, Zhiping Cai, Hong Xu

:
LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks. 277-285 - Mehdi Azaouzi

, Lotfi Ben Romdhane
:
An Efficient Two-Phase Model for Computing Influential Nodes in Social Networks Using Social Actions. 286-304 - Geng Lin, Jian Guan:

A Binary Particle Swarm Optimization for the Minimum Weight Dominating Set Problem. 305-322 - Jizhao Zhu, Yantao Jia, Jun Xu

, Jianzhong Qiao, Xueqi Cheng:
Modeling the Correlations of Relations for Knowledge Graph Embedding. 323-334 - Qian Wang, Youdong Ding:

A Novel Fine-Grained Method for Vehicle Type Recognition Based on the Locally Enhanced PCANet Neural Network. 335-350 - Pengpeng Chen, Hailong Sun, Yili Fang, Jinpeng Huai:

Collusion-Proof Result Inference in Crowdsourcing. 351-365 - Anzhen Zhang, Jian-Zhong Li, Hong Gao, Yu-Biao Chen, Heng-Zhao Ma, Mohamed Jaward Bah:

CrowdOLA: Online Aggregation on Duplicate Data Powered by Crowdsourcing. 366-379 - Shengmin Xu, Guomin Yang

, Yi Mu:
A New Revocable and Re-Delegable Proxy Signature and Its Application. 380-399 - Xi Wang, Jianxi Fan, Cheng-Kuan Lin, Jingya Zhou, Zhao Liu:

BCDC: A High-Performance, Server-Centric Data Center Network. 400-416 - Sunghun Jo, Yuna Jeong, Sungkil Lee

:
GPU-Driven Scalable Parser for OBJ Models. 417-428
Volume 33, Number 3, May 2018
- Shi-Min Hu, Cewu Lu, Ariel Shamir:

Preface. 429-430 - Bo Ren

, Xu-Yun Yang, Ming C. Lin, Nils Thuerey
, Matthias Teschner, Chen-Feng Li
:
Visual Simulation of Multiple Fluids in Computer Graphics: A State-of-the-Art Report. 431-451 - Feng-Yu Li, Changbo Wang, Hong Qin, Hongyan Quan:

Augmented Flow Simulation Based on Tight Coupling Between Video Reconstruction and Eulerian Models. 452-462 - Chen-Xu Zhang, Xiaowu Chen, Hong-Yu Wu, Bin Zhou:

Modeling Garment Seam from a Single Image. 463-474 - Xiaoqun Wu, Hai-Sheng Li

, Jian Cao, Qiang Cai:
Geometry of Motion for Video Shakiness Detection. 475-486 - Zhifeng Xie, Yu-Chen Guo, Shu-Han Zhang, Wen-Jun Zhang, Lizhuang Ma:

Multi-Exposure Motion Estimation Based on Deep Convolutional Networks. 487-501 - Guang-Hao Ma, Mingli Zhang, Xue-Mei Li, Cai-ming Zhang:

Image Smoothing Based on Image Decomposition and Sparse High Frequency Gradient. 502-510 - Huai-Yu Li, Wei-Ming Dong, Bao-Gang Hu

:
Facial Image Attributes Transformation via Conditional Recycle Generative Adversarial Networks. 511-521 - Yu-Jie Liu

, Yong-Biao Gao, Ling-Yan Bian, Wen-Ya Wang, Zongmin Li:
How to Wear Beautifully? Clothing Pair Recommendation. 522-530 - Wen-Guang Chen, Xueming Si:

Preface. 531-532 - Meng-Jun Qin, Yunlei Zhao, Zhoujun Ma:

Practical Constant-Size Ring Signature. 533-541 - Rui Yuan, Yubin Xia, Haibo Chen, Binyu Zang, Jan Xie:

ShadowEth: Private Smart Contract on Public Blockchain. 542-556 - Baokun Zheng, Liehuang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yandong Li, Jing Yang:

Scalable and Privacy-Preserving Data Sharing Based on Blockchain. 557-567 - Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang

, Jianwei Liu, Zhenyu Guan:
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin. 568-586 - Kai Lu, Peng-Fei Wang, Gen Li, Xu Zhou:

Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory. 587-602 - Xi Yang, Gul Jabeen, Ping Luo, Xiaoling Zhu, Mei-Hua Liu

:
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework. 603-620
Volume 33, Number 4, July 2018
- Xiaofang Zhou

, Hongzhi Yin
:
Preface. 621-624 - Xianzhi Wang

, Chaoran Huang, Lina Yao, Boualem Benatallah
, Manqing Dong
:
A Survey on Expert Recommendation in Community Question Answering. 625-653 - Defu Lian

, Qi Liu:
Jointly Recommending Library Books and Predicting Academic Performance: A Mutual Reinforcement Perspective. 654-667 - Lin Yue, Xiaoxin Sun, Wenzhu Gao, Guo-Zhong Feng, Bangzuo Zhang:

Multiple Auxiliary Information Based Deep Model for Collaborative Filtering. 668-681 - Lei Guo

, Yufei Wen, Xinhua Wang:
Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks. 682-696 - Yanxia Xu, Wei Chen, Jia-Jie Xu, Zhixu Li, Guanfeng Liu

, Lei Zhao:
Discovering Functional Organized Point of Interest Groups for Spatial Keyword Recommendation. 697-710 - Fei-Fei Kou, Junping Du, Cong-Xian Yang, Yan-Song Shi, Wan-Qiu Cui, MeiYu Liang, Yue Geng:

Hashtag Recommendation Based on Multi-Features of Microblogs. 711-726 - Pengpeng Zhao, Haifeng Zhu, Yanchi Liu, Ziting Zhou, Zhixu Li, Jia-Jie Xu, Lei Zhao, Victor S. Sheng:

A Generative Model Approach for Geo-Social Group Recommendation. 727-738 - Qi Liu, Hongke Zhao, Le Wu, Zhi Li, En-Hong Chen:

Illuminating Recommendation by Understanding the Explicit Item Relations. 739-755 - Tieke He, Hao Lian, Zemin Qin, Zhenyu Chen, Bin Luo:

PTM: A Topic Model for the Inferring of the Penalty. 756-767 - Yueyue Chen, Pin Lv, Deke Guo, Tongqing Zhou, Ming Xu:

A Survey on Task and Participant Matching in Mobile Crowd Sensing. 768-791 - Guo-Wei Wang, Jindou Zhang, Jing Li:

Complete Your Mobility: Linking Trajectories Across Heterogeneous Mobility Data Sources. 792-806 - Xin Xu, Jiaheng Lu

, Wei Wang:
Hierarchical Clustering of Complex Symbolic Data and Application for Emitter Identification. 807-822 - José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado

, Héctor Zatarain-Aceves
:
A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem. 823-837 - Beiji Zou, Yun-Di Guo, Qi He

, Ping-Bo Ouyang, Ke Liu, Zailiang Chen:
3D Filtering by Block Matching and Convolutional Neural Network for Image Denoising. 838-848 - Guochen Cai, Kyungmi Lee, Ickjai Lee:

Mining Semantic Trajectory Patterns from Geo-Tagged Data. 849-862 - Hongxing Qin, Jinlong He, Meng-Hui Wang, Yu Dai

, Zhi-Yong Ran:
A Gradient-Domain Based Geometry Processing Framework for Point Clouds. 863-872
Volume 33, Number 5, September 2018
- Tao Xie, He Jiang, Ge Li, Tianyu Wo, Rahul Pandita, Chang Xu, Lihua Xu:

Preface. 873-875 - Li Zhang, Jia-Hao Tian, Jing Jiang, Yi-Jun Liu, Meng-Yuan Pu, Tao Yue:

Empirical Research in Software Engineering - A Literature Survey. 876-899 - Xuansong Li

, XianPing Tao, Wei Song, Kai Dong:
AocML: A Domain-Specific Language for Model-Driven Development of Activity-Oriented Context-Aware Applications. 900-917 - Gianna Reggio, Maurizio Leotta

, Filippo Ricca, Diego Clerissi:
DUSM: A Method for Requirements Specification and Refinement Based on Disciplined Use Cases and Screen Mockups. 918-939 - João Fabrício Filho

, Luis Gustavo Araujo Rodriguez, Anderson Faustino da Silva:
Yet Another Intelligent Code-Generating System: A Flexible and Low-Cost Solution. 940-965 - Yinglin Zhao, Jianlei Yang, Weisheng Zhao, Aida Todri-Sanial

, Yuanqing Cheng:
Power Supply Noise Aware Task Scheduling on Homogeneous 3D MPSoCs Considering the Thermal Constraint. 966-983 - Shiqi Lian, Ying Wang

, Yinhe Han:
DimRouter: A Multi-Mode Router Architecture for Higher Energy-Proportionality of On-Chip Networks. 984-997 - Shan Jiang, Ning Xu, Xueyan Wang, Qiang Zhou:

An Efficient Technique to Reverse Engineer Minterm Protection Based Camouflaged Circuit. 998-1006 - Yang Li, Wen-Zhuo Song

, Bo Yang:
Stochastic Variational Inference-Based Parallel and Online Supervised Topic Model for Large-Scale Text Processing. 1007-1022 - Jizhou Luo, Shengfei Shi, Guang Yang, Hongzhi Wang, Jian-Zhong Li:

O2iJoin: An Efficient Index-Based Algorithm for Overlap Interval Join. 1023-1038 - Bohan Li, Anman Zhang, Wei Zheng, Shuo Wan, Xiaolin Qin, Xue Li

, Hai-Lian Yin:
GRIP: A Group Recommender Based on Interactive Preference Model. 1039-1055 - Tong Shen, Da-Fang Zhang, Gaogang Xie, Xinyi Zhang:

Optimizing Multi-Dimensional Packet Classification for Multi-Core Systems. 1056-1071 - Shouwan Gao, Pengpeng Chen, Xu Yang, Qiang Niu:

Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols. 1072-1085 - Xian-Hua Zeng, Bang-Gui Liu, Meng Zhou:

Understanding and Generating Ultrasound Image Description. 1086-1100
Volume 33, Number 6, November 2018
- En Wang, Wei-Shih Yang, Yongjian Yang, Jie Wu, Wenbin Liu:

An Efficient Message Dissemination Scheme for Minimizing Delivery Delay in Delay Tolerant Networks. 1101-1124 - Hongliang Li, Jie Wu, Zhen Jiang, Xiang Li, Xiaohui Wei:

A Task Allocation Method for Stream Processing with Recovery Latency Constraint. 1125-1139 - Quanqing Xu, Weiya Xi, Khai Leong Yong, Chao Jin

:
CRL: Efficient Concurrent Regeneration Codes with Local Reconstruction in Geo-Distributed Storage Systems. 1140-1151 - Xiaodong Dong, Sheng Chen, Laiping Zhao, Xiaobo Zhou, Heng Qi, Keqiu Li:

More Requests, Less Cost: Uncertain Inter-Datacenter Traffic Transmission with Multi-Tier Pricing. 1152-1163 - Hao-Ren Wang, Juan Lei, Ao Li, Yihong Wu:

A Geometry-Based Point Cloud Reduction Method for Mobile Augmented Reality System. 1164-1177 - Guoguang Du, Congli Yin, Mingquan Zhou, Zhongke Wu, Yachun Fan, Fuqing Duan, Pengbo Zhou:

Isometric 3D Shape Partial Matching Using GD-DNA. 1178-1191 - Jesús Alonso, Robert Joan-Arinyo:

Back-to-Front Ordering of Triangles in Digital Terrain Models over Regular Grids. 1192-1203 - Saisai Gong, Wei Hu, Weiyi Ge, Yuzhong Qu:

Modeling Topic-Based Human Expertise for Crowd Entity Resolution. 1204-1218 - Tieyun Qian

, Bei Liu, Liang Hong, Zhenni You:
Time and Location Aware Points of Interest Recommendation in Location-Based Social Networks. 1219-1230 - Rong Wang

, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. 1231-1242 - Qiqi Lai, Bo Yang, Yong Yu

, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. 1243-1260 - Ping Zhang, Honggang Hu:

Generalized Tweakable Even-Mansour Cipher and Its Applications. 1261-1277 - Aakash Ahmad

, Claus Pahl
, Ahmed B. Altamimi
, Abdulrahman Alreshidi:
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures. 1278-1306 - Hanen Ameur, Salma Jamoussi

, Abdelmajid Ben Hamadou:
A New Method for Sentiment Analysis Using Contextual Auto-Encoders. 1307-1319 - Rim Mahouachi

:
Search-Based Cost-Effective Software Remodularization. 1320-1336 - JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. 1337-1340


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














