JCST - volume 33 - 2018 论文列表 |
点击这里查看 Journal of Computer Science and Technology 的JCR分区、影响因子等信息 |
Search-Based Cost-Effective Software Remodularization. A New Method for Sentiment Analysis Using Contextual Auto-Encoders.
Hanen Ameur Salma Jamoussi Abdelmajid Ben Hamadou
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures.Aakash Ahmad Claus Pahl Ahmed B. Altamimi Abdulrahman Alreshidi
Generalized Tweakable Even-Mansour Cipher and Its Applications. Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.Qiqi Lai Bo Yang Yong Yu Zhe Xia Yanwei Zhou Yuan Chen
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.Rong Wang Yan Zhu Tung-Shou Chen Chin-Chen Chang
Time and Location Aware Points of Interest Recommendation in Location-Based Social Networks.Tieyun Qian Bei Liu Liang Hong Zhenni You
Modeling Topic-Based Human Expertise for Crowd Entity Resolution.Saisai Gong Wei Hu Weiyi Ge Yuzhong Qu
Back-to-Front Ordering of Triangles in Digital Terrain Models over Regular Grids.Jesús Alonso Robert Joan-Arinyo
Isometric 3D Shape Partial Matching Using GD-DNA.Guoguang Du Congli Yin Mingquan Zhou Zhongke Wu Yachun Fan Fuqing Duan Pengbo Zhou
A Geometry-Based Point Cloud Reduction Method for Mobile Augmented Reality System.Hao-Ren Wang Juan Lei Ao Li Yi-Hong Wu
More Requests, Less Cost: Uncertain Inter-Datacenter Traffic Transmission with Multi-Tier Pricing.Xiaodong Dong Sheng Chen Laiping Zhao Xiaobo Zhou Heng Qi Keqiu Li
CRL: Efficient Concurrent Regeneration Codes with Local Reconstruction in Geo-Distributed Storage Systems.Quanqing Xu Weiya Xi Khai Leong Yong Chao Jin
A Task Allocation Method for Stream Processing with Recovery Latency Constraint. An Efficient Message Dissemination Scheme for Minimizing Delivery Delay in Delay Tolerant Networks.Xian-Hua Zeng Bang-Gui Liu Meng Zhou
Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols.Shouwan Gao Pengpeng Chen Xu Yang Qiang Niu
Optimizing Multi-Dimensional Packet Classification for Multi-Core Systems.Tong Shen Da-Fang Zhang Gaogang Xie Xin-Yi Zhang
GRIP: A Group Recommender Based on Interactive Preference Model.Bohan Li Anman Zhang Wei Zheng Shuo Wan Xiaolin Qin Xue Li Hai-Lian Yin
O2iJoin: An Efficient Index-Based Algorithm for Overlap Interval Join.Jizhou Luo Shengfei Shi Guang Yang Hong-Zhi Wang Jian-Zhong Li
Stochastic Variational Inference-Based Parallel and Online Supervised Topic Model for Large-Scale Text Processing. An Efficient Technique to Reverse Engineer Minterm Protection Based Camouflaged Circuit.Shan Jiang Ning Xu Xueyan Wang Qiang Zhou
DimRouter: A Multi-Mode Router Architecture for Higher Energy-Proportionality of On-Chip Networks.Shiqi Lian Ying Wang Yinhe Han
Power Supply Noise Aware Task Scheduling on Homogeneous 3D MPSoCs Considering the Thermal Constraint.Ying-Lin Zhao Jianlei Yang Weisheng Zhao Aida Todri-Sanial Yuanqing Cheng
Yet Another Intelligent Code-Generating System: A Flexible and Low-Cost Solution.João Fabrício Filho Luis Gustavo Araujo Rodriguez Anderson Faustino da Silva
DUSM: A Method for Requirements Specification and Refinement Based on Disciplined Use Cases and Screen Mockups.Gianna Reggio Maurizio Leotta Filippo Ricca Diego Clerissi
AocML: A Domain-Specific Language for Model-Driven Development of Activity-Oriented Context-Aware Applications.Xuansong Li XianPing Tao Wei Song Kai Dong
Empirical Research in Software Engineering - A Literature Survey.Li Zhang Jia-Hao Tian Jing Jiang Yi-Jun Liu Meng-Yuan Pu Tao Yue
Preface.Tao Xie He Jiang Ge Li Tianyu Wo Rahul Pandita Chang Xu Lihua Xu
Hongxing Qin Jinlong He Meng-Hui Wang Yu Dai Zhi-Yong Ran
Mining Semantic Trajectory Patterns from Geo-Tagged Data.Guochen Cai Kyungmi Lee Ickjai Lee
3D Filtering by Block Matching and Convolutional Neural Network for Image Denoising.Beiji Zou Yun-Di Guo Qi He Ping-Bo Ouyang Ke Liu Zailiang Chen
A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem.José Alberto Fernández-Zepeda Daniel Brubeck-Salcedo Daniel Fajardo-Delgado Héctor Zatarain-Aceves
Hierarchical Clustering of Complex Symbolic Data and Application for Emitter Identification. Complete Your Mobility: Linking Trajectories Across Heterogeneous Mobility Data Sources.Guo-Wei Wang Jindou Zhang Jing Li
A Survey on Task and Participant Matching in Mobile Crowd Sensing.Yueyue Chen Pin Lv Deke Guo Tongqing Zhou Ming Xu
PTM: A Topic Model for the Inferring of the Penalty.Tieke He Hao Lian Zemin Qin Zhenyu Chen Bin Luo
Illuminating Recommendation by Understanding the Explicit Item Relations.Qi Liu Hongke Zhao Le Wu Zhi Li En-Hong Chen
A Generative Model Approach for Geo-Social Group Recommendation.Pengpeng Zhao Haifeng Zhu Yanchi Liu Ziting Zhou Zhixu Li Jia-Jie Xu Lei Zhao Victor S. Sheng
Hashtag Recommendation Based on Multi-Features of Microblogs.Fei-Fei Kou Junping Du Cong-Xian Yang Yan-Song Shi Wan-Qiu Cui MeiYu Liang Yue Geng
Discovering Functional Organized Point of Interest Groups for Spatial Keyword Recommendation.Yanxia Xu Wei Chen Jia-Jie Xu Zhixu Li Guanfeng Liu Lei Zhao
Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks. Multiple Auxiliary Information Based Deep Model for Collaborative Filtering.Lin Yue Xiaoxin Sun Wenzhu Gao Guo-Zhong Feng Bangzuo Zhang
Jointly Recommending Library Books and Predicting Academic Performance: A Mutual Reinforcement Perspective. A Survey on Expert Recommendation in Community Question Answering.Xianzhi Wang Chaoran Huang Lina Yao Boualem Benatallah Manqing Dong
Preface.Xi Yang Gul Jabeen Ping Luo Xiao-Ling Zhu Mei-Hua Liu
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory.Kai Lu Peng-Fei Wang Gen Li Xu Zhou
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.Mingming Wang Qianhong Wu Bo Qin Qin Wang Jianwei Liu Zhenyu Guan
Scalable and Privacy-Preserving Data Sharing Based on Blockchain.Bao-Kun Zheng Liehuang Zhu Meng Shen Feng Gao Chuan Zhang Yan-Dong Li Jing Yang
ShadowEth: Private Smart Contract on Public Blockchain.Rui Yuan Yubin Xia Haibo Chen Binyu Zang Jan Xie
Practical Constant-Size Ring Signature.Meng-Jun Qin Yunlei Zhao Zhoujun Ma
Preface. How to Wear Beautifully? Clothing Pair Recommendation.Yu-Jie Liu Yong-Biao Gao Ling-Yan Bian Wen-Ya Wang Zong-Min Li
Facial Image Attributes Transformation via Conditional Recycle Generative Adversarial Networks.Huai-Yu Li Wei-Ming Dong Bao-Gang Hu
Image Smoothing Based on Image Decomposition and Sparse High Frequency Gradient.Guang-Hao Ma Mingli Zhang Xue-Mei Li Cai-Ming Zhang
Multi-Exposure Motion Estimation Based on Deep Convolutional Networks.Zhifeng Xie Yu-Chen Guo Shu-Han Zhang Wen-Jun Zhang Lizhuang Ma
Geometry of Motion for Video Shakiness Detection.Xiaoqun Wu Hai-Sheng Li Jian Cao Qiang Cai
Modeling Garment Seam from a Single Image.Chen-Xu Zhang Xiaowu Chen Hong-Yu Wu Bin Zhou
Augmented Flow Simulation Based on Tight Coupling Between Video Reconstruction and Eulerian Models.Feng-Yu Li Changbo Wang Hong Qin Hongyan Quan
Visual Simulation of Multiple Fluids in Computer Graphics: A State-of-the-Art Report.Bo Ren Xu-Yun Yang Ming C. Lin Nils Thuerey Matthias Teschner Chen-Feng Li
Preface.Sunghun Jo Yuna Jeong Sungkil Lee
BCDC: A High-Performance, Server-Centric Data Center Network.Xi Wang Jianxi Fan Cheng-Kuan Lin Jingya Zhou Zhao Liu
A New Revocable and Re-Delegable Proxy Signature and Its Application. CrowdOLA: Online Aggregation on Duplicate Data Powered by Crowdsourcing.Anzhen Zhang Jian-Zhong Li Hong Gao Yu-Biao Chen Heng-Zhao Ma Mohamed Jaward Bah
Collusion-Proof Result Inference in Crowdsourcing.Pengpeng Chen Hailong Sun Yili Fang Jinpeng Huai
A Novel Fine-Grained Method for Vehicle Type Recognition Based on the Locally Enhanced PCANet Neural Network. Modeling the Correlations of Relations for Knowledge Graph Embedding.Jizhao Zhu Yantao Jia Jun Xu Jianzhong Qiao Xueqi Cheng
A Binary Particle Swarm Optimization for the Minimum Weight Dominating Set Problem. An Efficient Two-Phase Model for Computing Influential Nodes in Social Networks Using Social Actions.Mehdi Azaouzi Lotfi Ben Romdhane
LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks. A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles.Nour El Houda Bahloul Saadi Boudjit Marwen Abdennebi Djallel Eddine Boubiche
An Intelligent Transportation System Application for Smartphones Based on Vehicle Position Advertising and Route Sharing in Vehicular Ad-Hoc Networks.Seilendria A. Hadiwardoyo Subhadeep Patra Carlos T. Calafate Juan-Carlos Cano Pietro Manzoni
CoC: A Unified Distributed Ledger Based Supply Chain Management System.Mohamed Maher Ben Ismail Ouiem Bchir
Robust Visual Tracking Based on Convolutional Features with Illumination and Occlusion Handing. 3D Face Similarity Measure by Fréchet Distances of Geodesics.Junli Zhao Zhongke Wu Zhen-Kuan Pan Fuqing Duan Jin-Hua Li Zhi-Han Lv Kang Wang Yu-Cong Chen
Where Do Local Experts Go? Evaluating User Geo-Topical Similarity for Top-N Place Recommendation.Rong Wang Tianlei Hu Gang Chen
Indexing Techniques of Distributed Ordered Tables: A Survey and Analysis. A Dataflow-Oriented Programming Interface for Named Data Networking.Li-Jing Wang Yong-Qiang Lv Ilya Moiseenko Dongsheng Wang
A Non-Stop Double Buffering Mechanism for Dataflow Architecture.Xu Tan Xiaowei Shen Xiaochun Ye Da Wang Dongrui Fan Lunkai Zhang Wenming Li Zhimin Zhang Zhimin Tang
CPicker: Leveraging Performance-Equivalent Configurations to Improve Data Center Energy Efficiency.Faqiang Sun Guihai Yan Xin He Huawei Li Yinhe Han
A Pipelining Loop Optimization Method for Dataflow Architecture.Xu Tan Xiaochun Ye Xiaowei Shen Yuanchao Xu Da Wang Lunkai Zhang Wenming Li Dongrui Fan Zhimin Tang
SplitPass: A Mutually Distrusting Two-Party Password Manager.Yutao Liu Dong Du Yubin Xia Haibo Chen Binyu Zang Zhenkai Liang
Hot Data Identification with Multiple Bloom Filters: Block-Level Decision vs I/O Request-Level Decision.Dongchul Park Weiping He David H. C. Du
Endurable SSD-Based Read Cache for Improving the Performance of Selective Restore from Deduplication Systems.Jian Liu Yunpeng Chai Xiao Qin Yao-Hong Liu
Spear and Shield: Evolution of Integrated Circuit Camouflaging.Xueyan Wang Qiang Zhou Yici Cai Gang Qu
A Large-Scale Study of Failures on Petascale Supercomputers. BenchIP: Benchmarking Intelligence Processors.Jinhua Tao Zidong Du Qi Guo Huiying Lan Lei Zhang Shengyuan Zhou Ling-Jie Xu Cong Liu Hai-Feng Liu Shan Tang Allen Rush Willian Chen Shaoli Liu Yunji Chen Tianshi Chen