FCS - volume 14 - 2020 论文列表 |
点击这里查看 Frontiers of Computer Science 的JCR分区、影响因子等信息 |
Fan Liu Xiaomin Ji Gang Hu Jing Gao
PopFlow: a novel flow management scheme for SDN switch of multiple flow tables based on flow popularity.Cheng Wang Kyung Tae Kim Hee Yong Youn
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.Je Sen Teh Weijian Teng Azman Samsudin Jiageng Chen
Properties of the satisfiability threshold of the strictly d-regular random (3, 2s)-SAT problem. The impact of information dissemination on purchasing behavior in social e-commerce environment.Junjie Lv Tong Wang Hao Wang Jianye Yu Yuanzhuo Wang
Estimating posterior inference quality of the relational infinite latent feature model for overlapping community detection.Qiancheng Yu Zhiwen Yu Zhu Wang Xiaofeng Wang YongZhi Wang
Text-enhanced network representation learning.Yu Zhu Zhonglin Ye Haixing Zhao Ke Zhang
New phase transitions for formulas in Łukasiewicz logic.Mohamed El Halaby Areeg Abdalla
PSO-ACSC: a large-scale evolutionary algorithm for image matting.Yihui Liang Han Huang Zhaoquan Cai
Machine learning after the deep learning revolution. Extreme vocabulary learning.Hanze Dong Zhenfeng Sun Yanwei Fu Shi Zhong Zhengjun Zhang Yu-Gang Jiang
An enhanced authentication protocol for client server environment.Muhammad Asad Saleem Shafiq Ahmed Khalid Mahmood Saru Kumari Hu Xiong
Matching user identities across social networks with limited profile data.Ildar Nurgaliev Qiang Qu Seyed Mojtaba Hosseini Bamakan Muhammad Muzammal
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.Xiaochen Liu Chunhe Xia Tianbo Wang Li Zhong Xiaojian Li
Guaranteeing the response deadline for general aggregation trees.Jiangfan Li Chendie Yao Junxu Xia Deke Guo
Use of sparse correlations for assessing financial markets.Xin Li Guyu Hu Yuhuan Zhou Zhisong Pan
Prototyping federated learning on edge computing systems.Jianlei Yang Yixiao Duan Tong Qiao Huanyu Zhou Jingyuan Wang Weisheng Zhao
Yaopeng Liu Hao Peng Jianxin Li Yangqiu Song Xiong Li
Solving quantified constraint satisfaction problems with value selection rules.Jian Gao Jinyan Wang Kuixian Wu Rong Chen
An efficient GPU-based parallel tabu search algorithm for hardware/software co-design.Neng Hou Fazhi He Yi Zhou Yilin Chen
Efficient private multi-party numerical records matching.Shumin Han Derong Shen Tiezheng Nie Yue Kou Ge Yu
Probabilistic robust regression with adaptive weights - a case study on face recognition.Jin Li Quan Chen Jingwen Leng Weinan Zhang Minyi Guo
Multi-task MIML learning for pre-course student performance prediction.Yuling Ma Chaoran Cui Jun Yu Jie Guo Gongping Yang Yilong Yin
Example-based web page recoloring method.Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo
Improving students' programming quality with the continuous inspection process: a social coding perspective.Yao Lu Xinjun Mao Tao Wang Gang Yin Zude Li
Advance on large scale near-duplicate video retrieval.Ling Shen Richang Hong Yanbin Hao
An adaptive strategy for statistics collecting in distributed database.Jin-Tao Gao Wenjie Liu Zhanhuai Li
A framework for cloned vehicle detection.Minxi Li Jiali Mao Xiaodong Qi Cheqing Jin
EMSC: a joint multicast routing, scheduling, and call admission control in multi-radio multi-channel WMNs. Multi-task regression learning for survival analysis via prior information guided transductive matrix completion.Lei Chen Kai Shao Xianzhong Long Lingsheng Wang
Entity-related paths modeling for knowledge base completion.Fangfang Liu Yan Shen Tienan Zhang Honghao Gao
Understanding urban structures and crowd dynamics leveraging large-scale vehicle mobility data.Zhihan Jiang Yan Liu Xiaoliang Fan Cheng Wang Jonathan Li Longbiao Chen
Adam revisited: a weighted past gradients perspective.Hui Zhong Zaiyi Chen Chuan Qin Zai Huang Vincent W. Zheng Tong Xu Enhong Chen
Benchmarking on intensive transaction processing.Yanbin Wang Zhuhong You Liping Li Zhan-Heng Chen
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.Enhong Chen Yan Zhu Changlu Lin Kewei Lv
A topology and risk-aware access control framework for cyber-physical space.Yan Cao Zhiqiu Huang Yaoshen Yu Changbo Ke Zihao Wang
Practical continuous leakage-resilient CCA secure identity-based encryption. Multipath affinage stacked - hourglass networks for human pose estimation.Guoguang Hua Lihong Li Shiguang Liu
A new fragments allocating method for join query in distributed database.Jin-Tao Gao Zhanhuai Li Wenjie Liu Zhijun Guo Yantao Yue
Diversification on big data in query processing.Meifan Zhang Hongzhi Wang Jianzhong Li Hong Gao
Plover: parallel logging for replication systems.Huan Zhou Jinwei Guo Huiqi Hu Weining Qian Xuan Zhou Aoying Zhou
Proactive eviction of flow entry for SDN based on hidden Markov model. An efficient multipath routing schema in multi-homing scenario based on protocol-oblivious forwarding.Pufang Ma Jiali You Jinlin Wang
Low-rank representation based robust face recognition by two-dimensional whitening reconstruction.Shuo Feng Changpeng Wang Hong Shu Tingyu Zhang
A novel classifier for multivariate instance using graph class signatures.Parnika N. Paranjape Meera M. Dhabu Parag S. Deshpande
Adaptive sparse and dense hybrid representation with nonconvex optimization.Xuejun Wang Feilong Cao Wenjian Wang
Extracting a justification for OWL ontologies by critical axioms.Yuxin Ye Xianji Cui Dantong Ouyang
A revisit to MacKay algorithm and its application to deep network compression. Bayesian compressive principal component analysis. Efficient FPGA-based graph processing with hybrid pull-push computational model.Tun Li Wanwei Liu Xinrui Guo Ji Wang
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.Yudi Zhang Debiao He Mingwu Zhang Kim-Kwang Raymond Choo
Partition pruning for range query on distributed log-structured merge-tree.Chenchen Huang Huiqi Hu Xing Wei Weining Qian Aoying Zhou
Most similar maximal clique query on large graphs.Yun Peng Yitong Xu Huawei Zhao Zhizheng Zhou Huimin Han
TPII: tracking personally identifiable information via user behaviors in HTTP traffic. Personalized query suggestion diversification in information retrieval.Wanyu Chen Fei Cai Honghui Chen Maarten de Rijke
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services.Jiaxun Hua Yu Liu Yibin Shen Xiuxia Tian Yifeng Luo Cheqing Jin
Varna-based optimization: a novel method for capacitated controller placement problem in SDN.Ashutosh Kumar Singh Saurabh Maurya Shashank Srivastava
Perspectives on search strategies in automated test input generation.Yang Cao Yanyan Jiang Chang Xu Jun Ma Xiaoxing Ma
Evaluating and improving the interpretability of item embeddings using item-tag relevance information.Tao Lian Lin Du Mingfu Zhao Chaoran Cui Zhumin Chen Jun Ma
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.Yongzhong He Endalew Elsabeth Alem Wei Wang
Connection models for the Internet-of-Things.Kangli He Holger Hermanns Hengyang Wu Yixiang Chen
Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language.Muhammad Aminur Rahaman Mahmood Jasim Md. Haider Ali Md. Hasanuzzaman
A correlative denoising autoencoder to model social influence for top-N recommender system.Yiteng Pan Fazhi He Haiping Yu
TRAP: trace runtime analysis of properties. Transparent partial page migration between CPU and GPU.Shahid Akbar Maqsood Hayat Muhammad Iqbal Muhammad Tahir
A survey of autoencoder-based recommender systems.Guijuan Zhang Yang Liu Xiaoning Jin
Real-time visual tracking using complementary kernel support correlation filters.Zhenyang Su Jing Li Jun Chang Bo Du Yafu Xiao
A unified latent variable model for contrastive opinion mining.Ebuka Ibeke Chenghua Lin Adam Wyner Mohamad Hardyman Barawi
Meta-path-based outlier detection in heterogeneous information network. Sichuan dialect speech recognition with deep LSTM network.Wangyang Ying Lei Zhang Hongli Deng
Enjoy the most beautiful scene now: a memetic algorithm to solve two-fold time-dependent arc orienteering problem.Chao Chen Liping Gao Xuefeng Xie Zhu Wang
A primal perspective for indefinite kernel SVM problem.Hui Xue Haiming Xu Xiaohong Chen Yunyun Wang
Real-time manifold regularized context-aware correlation tracking.Jiaqing Fan Huihui Song Kaihua Zhang Qingshan Liu Fei Yan Wei Lian
NEXT: a neural network framework for next POI recommendation.Zhiqian Zhang Chenliang Li Zhiyong Wu Aixin Sun Dengpan Ye Xiangyang Luo
Abnormal event detection via the analysis of multi-frame optical flow information.Tian Wang Meina Qiao Aichun Zhu Guangcun Shan Hichem Snoussi
Graph-ranking collective Chinese entity linking algorithm.Tao Xie Bin Wu Bingjing Jia Bai Wang
Leveraging proficiency and preference for online Karaoke recommendation.Ming He Hao Guo Guangyi Lv Le Wu Yong Ge Enhong Chen Haiping Ma
Optimized high order product quantization for approximate nearest neighbors search. A survey on ensemble learning.(Withdrawn)
Erratum to: Cuckoo search with varied scaling factor.
Lijin Wang Yilong Yin Yiwen Zhong
Erratum to: Relative manifold based semi-supervised dimensionality reduction.Xianfa Cai Guihua Wen Jia Wei Zhiwen Yu
Answering range-based reverse kNN and why-not reverse kNN queries. New multi-objective approach for dynamic risk-driven intrusion responses. Dynamic data auditing scheme for big data storage.Xingyue Chen Tao Shang Feng Zhang Jianwei Liu Zhenyu Guan
HGeoHashBase: an optimized storage model of spatial objects for location-based services.Jingwei Zhang Chao Yang Qing Yang Yuming Lin Yanchun Zhang
Popular route planning with travel cost estimation from trajectories.Huiping Liu Cheqing Jin Aoying Zhou
A survey of uncertain data management.Lingli Li Hongzhi Wang Jianzhong Li Hong Gao
AAMcon: an adaptively distributed SDN controller in data center networks.Waixi Liu Yu Wang Jie Zhang Hongjian Liao Zhong-Wei Liang Xiaochu Liu
Uncertain multicast under dynamic behaviors.Yudong Qin Deke Guo Zhiyao Hu Bangbang Ren
A verification framework for spatio-temporal consistency language with CCSL as a specification language.Yuanrui Zhang Frédéric Mallet Yixiang Chen
Automatic façade recovery from single nighttime image.Yi Zhou Qichuan Geng Zhong Zhou Wei Wu
A syntactic path-based hybrid neural network for negation scope detection.Lydia Lazib Bing Qin Yanyan Zhao Weinan Zhang Ting Liu
Ordinal factorization machine with hierarchical sparsity.Shaocheng Guo Songcan Chen Qing Tian
Towards functional verifying a family of systemC TLMs. SLA-driven container consolidation with usage prediction for green cloud computing.Jialei Liu Shangguang Wang Ao Zhou Jinliang Xu Fangchun Yang
Computer comparisons in the presence of performance variation.Samuel Irving Bin Li Shaoming Chen Lu Peng Weihua Zhang Lide Duan
Compiler testing: a systematic literature analysis.