FCS - volume 15 - 2021 论文列表 |
点击这里查看 Frontiers of Computer Science 的JCR分区、影响因子等信息 |
Jiping Zheng Qi Dong Xianhong Qiu Xingnan Huang
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query.Chenchen Huang Huiqi Hu Xuecheng Qi Xuan Zhou Aoying Zhou
Brain tumor localization and segmentation using mask RCNN.Momina Masood Tahira Nazir Marriam Nawaz Ali Javed Munwar Iqbal Awais Mehmood
BIC-based node order learning for improving Bayesian network structure learning.Yali Lv Junzhong Miao Jiye Liang Ling Chen Yuhua Qian
Derivative-free reinforcement learning: a review. User-level failure detection and auto-recovery of parallel programs in HPC systems.Guozhen Zhang Yi Liu Hailong Yang Jun Xu Depei Qian
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services.Yan Xu Ming Wang Hong Zhong Sheng Zhong
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks.Kaushal A. Shah Devesh Jinwala
Heterogeneous-attributes enhancement deep framework for network embedding.Lisheng Qiao Fan Zhang Xiaohui Huang Kai Li Enhong Chen
Wi-Fi based non-invasive detection of indoor wandering using LSTM model.Qiang Lin Yusheng Hao Caihong Liu
An algorithm for solving satisfiability problem based on the structural information of formulas.Zaijun Zhang Daoyun Xu Jincheng Zhou
Adaptive watermark generation mechanism based on time series prediction for stream processing.Yang Song Yunchun Li Hailong Yang Jun Xu Zerong Luan Wei Li
Experience report: investigating bug fixes in machine learning frameworks/libraries.Xiaobing Sun Tianchi Zhou Rongcun Wang Yucong Duan Lili Bo Jianming Chang
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm.Zaheer Ullah Khan Dechang Pi Shuanglong Yao Asif Nawaz Farman Ali Shaukat Ali
Image smog restoration using oblique gradient profile prior and energy minimization. WaveLines: towards effective visualization and analysis of stability in power grid simulation.Tianye Zhang Qi Wang Liwen Lin Jiazhi Xia Xiwang Xu Yanhao Huang Xiaonan Luo Wenting Zheng Wei Chen
Feidiao Yang Wei Chen Jialin Zhang Xiaoming Sun
Siamese single object tracking algorithm with natural language prior.Qianli Zhou Rong Wang Jinze Li Naiqian Tian Wenjin Zhang
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games.Li Zhang Yuxuan Chen Wei Wang Ziliang Han Shijian Li Zhijie Pan Gang Pan
Parallel exploration via negatively correlated search.Peng Yang Qi Yang Ke Tang Xin Yao
WOBTree: a write-optimized B+-tree for non-volatile memory.Haitao Wang Zhanhuai Li Xiao Zhang Xiaonan Zhao Song Jiang
A quality status encoding scheme for PCB-based products in IoT-enabled remanufacturing. Multi-affect(ed): improving recommendation with similarity-enhanced user reliability and influence propagation.Lele Huang Huifang Ma Xiangchun He Liang Chang
MiTAR: a study on human activity recognition based on NLP with microscopic perspective.Huichao Men Botao Wang Gang Wu
HSAEP: a new platform to evaluate hybrid simulation algorithms.Wei Guo Xiaoxu Duan Chen Zeng Ping Shao
Model learning: a survey of foundations, tools and applications.Shahbaz Ali Hailong Sun Yongwang Zhao
DP-UserPro: differentially private user profile construction and publication.Zheng Huo Ping He Lisha Hu Huanyu Zhao
A semi-transparent selective undo algorithm for multi-user collaborative editors.Weiwei Cai Fazhi He Xiao Lv Yuan Cheng
Variant quantifiers in L3-valued first-order logic. A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds.Yao Qin Hua Wang Shanwen Yi Xiaole Li Linbo Zhai
ABDKS: attribute-based encryption with dynamic keyword search in fog computing.Fei Meng Leixiao Cheng Mingqiang Wang
An improved multi-objective evolutionary algorithm for computation offloading in the multi-cloudlet environment. Sememe knowledge computation: a review of recent advances in application and expansion of sememe knowledge bases. Compositional metric learning for multi-label classification.Yue Gao Zihang Song Han Zhang Sean Fuller Andrew Lambert Zhinong Ying Petri Mähönen Yonina C. Eldar Shuguang Cui Mark D. Plumbley Clive Parini Arumugam Nallanathan
Performance analysis of ASR system in hybrid DNN-HMM framework using a PWL euclidean activation function.Anirban Dutta Ashishkumar Prabhakar Gudmalwar Ch. V. Rama Rao
A systematic study on the role of SentiWordNet in opinion mining.Mujtaba Husnain Malik Muhammad Saad Missen Nadeem Akhtar Mickaël Coustaty Shahzad Mumtaz V. B. Surya Prasath
On the analysis of ant colony optimization for the maximum independent set problem.Xiaoyun Xia Xue Peng Weizhi Liao
Rich-text document styling restoration via reinforcement learning.Hongwei Li Yingpeng Hu Yixuan Cao Ganbin Zhou Ping Luo
Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt.Dongjin Yu Lin Wang Xin Chen Jie Chen
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering. An efficient indexing structure for multi-dimensional range query.Shanshan Chen Guiping Zhou Xingdi An
Efficient k-dominant skyline query over incomplete data using MapReduce.Linlin Ding Shu Wang Baoyan Song
VColor*: a practical approach for coloring large graphs.Yun Peng Xin Lin Byron Choi Bingsheng He
Unpaired image to image transformation via informative coupled generative adversarial networks. Find truth in the hands of the few: acquiring specific knowledge with crowdsourcing.Yixuan Cao Dian Chen Zhengqi Xu Hongwei Li Ping Luo
DOF: a generic approach of domain ontology fuzzification. An integrated pipeline model for biomedical entity alignment.Yu Hu Tiezheng Nie Derong Shen Yue Kou Ge Yu
Resource abstraction and data placement for distributed hybrid memory pool.Tingting Chen Haikun Liu Xiaofei Liao Hai Jin
Physical layer authentication for automotive cyber physical systems based on modified HB protocol.Ahmer Khan Jadoon Jing Li Licheng Wang
A survey of Intel SGX and its applications.Wei Zheng Ying Wu Xiaoxue Wu Chen Feng Yulei Sui Xiapu Luo Yajin Zhou
A novel DNA-inspired encryption strategy for concealing cloud storage.Abhishek Majumdar Arpita Biswas Atanu Majumder Sandeep Kumar Sood Krishna Lal Baishnab
Tile selection method based on error minimization for photomosaic image creation.Hongbo Zhang Xin Gao Jixiang Du Qing Lei Lijie Yang
Detecting differential transcript usage across multiple conditions for RNA-seq data based on the smoothed LDA model.Jing Li Xuejun Liu Daoqiang Zhang
Practical age estimation using deep label distribution learning.Huiying Zhang Yu Zhang Xin Geng
Fine-grained management of I/O optimizations based on workload characteristics.Bing Wei Limin Xiao Bingyu Zhou Guangjun Qin Baicheng Yan Zhisheng Huo
The mass, fake news, and cognition security.Yubao Liu Zitong Chen Ada Wai-Chee Fu Raymond Chi-Wing Wong Genan Dai
Accurate and efficient follower log repair for Raft-replicated database systems.Jinwei Guo Peng Cai Weining Qian Aoying Zhou
Attention based simplified deep residual network for citywide crowd flows prediction.Genan Dai Xiaoyang Hu Youming Ge Zhiqing Ning Yubao Liu
An evaluation and query algorithm for the influence of spatial location based on RkNN. Hierarchical data replication strategy to improve performance in cloud computing.Najme Mansouri Mohammad Masoud Javidi Behnam Mohammad Hasani Zade
Task assignment for social-oriented crowdsourcing.Gang Wu Zhiyong Chen Jia Liu Donghong Han Baiyou Qiao
Evolutionary selection for regression test cases based on diversity.Baoying Ma Li Wan Nianmin Yao Shuping Fan Yan Zhang
Migration of existing software systems to mobile computing platforms: a systematic mapping study.Ibrahim Alseadoon Aakash Ahmad Adel Alkhalil Khalid Sultan
Predicting protein subchloroplast locations: the 10th anniversary. Simple index based symmetric searchable encryption with result verifiability. A novel chaotic butterfly network topology based block scrambling and crown graph based bit-wise diffusion for image encryption. On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries.Nilesh Chakraborty Samrat Mondal
Ethereum smart contract security research: survey and future research opportunities.Zeli Wang Hai Jin Weiqi Dai Kim-Kwang Raymond Choo Deqing Zou
A proactive secret sharing scheme based on Chinese remainder theorem.Keju Meng Fuyou Miao Yu Ning Wenchao Huang Yan Xiong Chin-Chen Chang
DFD-Net: lung cancer detection from denoised CT scan image using deep learning.Worku Jifara Sori Feng Jiang Arero W. Godana Shaohui Liu Gelmecha Demissie Jobir
iMass: an approximate adaptive clustering algorithm for dynamic data using probability based dissimilarity.Panthadeep Bhattacharjee Pinaki Mitra
An automated framework for advertisement detection and removal from sports videos using audio-visual cues.Abeer Toheed Ali Javed Aun Irtaza Hassan Dawood Hussain Dawood Ahmed S. Alfakeeh
Integrating heterogeneous thesauruses for Chinese synonyms.Jianbing Zhang Peng Wu Yingjie Zhang Shujian Huang Xinyu Dai Jiajun Chen
Zhiyun Zheng Ke Ruan Mengyao Yu Xingjin Zhang Ning Wang Dun Li
Information retrieval: a view from the Chinese IR community.Zhumin Chen Xueqi Cheng Shoubin Dong Zhicheng Dou Jiafeng Guo Xuanjing Huang Yanyan Lan Chenliang Li Ru Li Tie-Yan Liu Yiqun Liu Jun Ma Bing Qin Mingwen Wang Ji-Rong Wen Jun Xu Min Zhang Peng Zhang Qi Zhang
Fingerprint matching, spoof and liveness detection: classification and literature review.Syed Farooq Ali Muhammad Aamir Khan Ahmed Sohail Aslam
Mathematical model and simulated annealing algorithm for Chinese high school timetabling problems under the new curriculum innovation.Xingxing Hao Jing Liu Yutong Zhang Gustaph Sanga
A survey of density based clustering algorithms.Panthadeep Bhattacharjee Pinaki Mitra
Entity set expansion in knowledge graph: a heterogeneous information network perspective.Chuan Shi Jiayu Ding Xiaohuan Cao Linmei Hu Bin Wu Xiaoli Li
Where to go? Predicting next location in IoT environment.Hao Lin Guannan Liu Fengzhi Li Yuan Zuo
A framework based on sparse representation model for time series prediction in smart city.Zhiyong Yu Xiangping Zheng Fangwan Huang Wenzhong Guo Lin Sun Zhiwen Yu
Biologically inspired visual computing: the state of the art.Wangli Hao Ian Max Andolina Wei Wang Zhaoxiang Zhang
Software debugging analysis based on developer behavior data.Bo Yang Qian Yu Huai Liu Yuze He Chao Liu
Evaluating the usage of fault localization in automated program repair: an empirical study.Deheng Yang Yuhua Qi Xiaoguang Mao Yan Lei
Proactive planning of bandwidth resource using simulation-based what-if predictions for Web services in the cloud.Jianpeng Hu Linpeng Huang Tianqi Sun Ying Fan Wenqiang Hu Hao Zhong
Determining node duty cycle using Q-learning and linear regression for WSN.Han Yao Huang Kyung Tae Kim Hee Yong Youn
Pointwise manifold regularization for semi-supervised learning.Yunyun Wang Jiao Han Yating Shen Hui Xue
Improving neural sentence alignment with word translation. SSDBA: the stretch shrink distance based algorithm for link prediction in social networks.