Journal: Frontiers of Computer Science in China

Volume 10, Issue 6

965 -- 967Lionel M. Ni, Haoyu Tan, Jiang Xiao. Rethinking big data in a networked world
968 -- 984Fan Wu, Yang Gui, Zhibo Wang, Xiaofeng Gao, Guihai Chen. A survey on barrier coverage with sensors
985 -- 999Chao Ding, Ligang Liu. A survey of sketch based modeling systems
1000 -- 1011Chengliang Wang, Ya-Yun Peng, Debraj De, Wen-Zhan Song. DPHK: real-time distributed predicted data collecting based on activity pattern knowledge mined from trajectories in smart environments
1012 -- 1025Lamia Sadeg-Belkacem, Zineb Habbas, Wassila Aggoune-Mtalaa. Adaptive genetic algorithms guided by decomposition for PCSPs: application to frequency assignment problems
1026 -- 1038Ruifeng Xu, Lin Gui, Qin Lu, Shuai Wang, Jian Xu. Incorporating multi-kernel function and Internet verification for Chinese person name disambiguation
1039 -- 1051Bowei Zou, Guodong Zhou, Qiaoming Zhu. Research on Chinese negation and speculation: corpus annotation and identification
1052 -- 1066Tao Jiang, Zhanhuai Li, Xuequn Shang, Bolin Chen, Weibang Li, Zhilei Yin. Constrained query of order-preserving submatrix in gene expression data
1067 -- 1081Cheqing Jin, Yangxin Kong, Qiangqiang Kang, Weining Qian, Aoying Zhou. Benchmarking in-memory database
1082 -- 1102Sarab Al Muhaideb, Mohamed El-bachir Menai. Impact of preprocessing on medical data classification
1103 -- 1117Michael Henke, Winfried Kurth, Gerhard H. Buck-Sorlin. FSPM-P: towards a general functional-structural plant model for robust and comprehensive model development
1118 -- 1129Qicong Wang, Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Rongrong Ji, Yunqi Lei. Face recognition by decision fusion of two-dimensional linear discriminant analysis and local binary pattern
1130 -- 1141Changda Wang, Yulin Yuan, Lei Huang. Base communication model of IP covert timing channels
1142 -- 1157Li Lin, Jian Hu, Jian-biao Zhang. Packet: a privacy-aware access control policy composition method for services composition in cloud environments

Volume 10, Issue 5

767 -- 768Ruqian Lu. A peep at knowledge science in a categorical prospect
769 -- 777Dan Hao, Lu Zhang 0023, Hong Mei. Test-case prioritization: achievements and challenges
778 -- 796Weimin Tan, Bo Yan. A survey on high coherence visual media retargeting: recent advances and applications
797 -- 811Wenhao Zhou, Juan Chen, Chen Cui, Qian Wang, Dezun Dong, Yuhua Tang. Detailed and clock-driven simulation for HPC interconnection network
812 -- 831Xiaobing Sun, Xin Peng, Bin Li, Bixin Li, Wanzhi Wen. IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra
832 -- 844Feifei Zhang, Yongbin Yu, Qirong Mao, Jianping Gou, Yongzhao Zhan. Pose-robust feature learning for facial expression recognition
845 -- 855Nengneng Gao, Sheng-Jun Huang, Songcan Chen. Multi-label active learning by model guided distribution matching
856 -- 869Yanyan Zhang, Jianchun Zhang, Zhisong Pan, Daoqiang Zhang. Multi-view dimensionality reduction via canonical random correlation analysis
870 -- 888Jiankun He, Xishun Zhao. Reasoning about actions with loops via Hoare logic
889 -- 907Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao. The power of comments: fostering social interactions in microblog networks
908 -- 924Xi Li, Pengfei Zhang, Rui Chu, Huaimin Wang. Optimizing guest swapping using elastic and transparent memory provisioning on virtualization platform
925 -- 935Najme Mansouri. Adaptive data replication strategy in cloud computing for performance improvement
936 -- 950Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Wanyu Zang, Meng Yu. Energy efficient approximate self-adaptive data collection in wireless sensor networks
951 -- 964Wen Zhou, Dan Feng, Yu Hua, Jingning Liu, Fangting Huang, Yu Chen, Shuangwu Zhang. Prober: exploiting sequential characteristics in buffer for improving SSDs write performance

Volume 10, Issue 4

589 -- 590Zhi-Hua Zhou. Learnware: on the future of machine learning
591 -- 601Yue Wu, Chao Lu, Yunji Chen. A survey of routing algorithm for mesh Network-on-Chip
602 -- 611Rongrong Ji, Donglin Cao, Yiyi Zhou, Fuhai Chen. Survey of visual sentiment prediction for social media analysis
612 -- 630Junha Lee, Dae-Kyoo Kim, Suntae Kim, Sooyong Park. Decomposing class responsibilities using distance-based method similarity
631 -- 643Xiaofang Qi, Jun He, Peng Wang, Huayang Zhou. Variable strength combinatorial testing of concurrent programs
644 -- 656Wenmei Liu, Hui Liu. Major motivations for extract method refactorings: analysis based on interviews and change histories
657 -- 672Samir Zeghlache, Djamel Saigaa, Kamel Kara. Fault tolerant control based on neural network interval type-2 fuzzy sliding mode controller for octorotor UAV
673 -- 688Xin Xu, Wei Wang, Jianhong Wang. A three-way incremental-learning algorithm for radar emitter identification
689 -- 701Kang Li, Fazhi He, Xiao Chen. Real-time object tracking via compressive feature selection
702 -- 716Wayne Xin Zhao, Ji-Rong Wen, Xiaoming Li. Generating timeline summaries with social media attention
717 -- 725Cungen Cao, Yuefei Sui, Zaiyue Zhang. The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
726 -- 740Zongzhang Zhang, Qi-ming Fu, Xiaofang Zhang, Quan Liu. Reasoning and predicting POMDP planning complexity via covering numbers
741 -- 754Hao Wang, Zhen Liu, Zhe Liu, Duncan S. Wong. Identity-based aggregate signcryption in the standard model from multilinear maps
755 -- 766Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar. Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset

Volume 10, Issue 3

387 -- 398Shuai Ma, Jia Li, Chunming Hu, Xuelian Lin, Jinpeng Huai. Big graph search: challenges and techniques
399 -- 417Minghe Yu, Guoliang Li, Dong Deng, Jianhua Feng. String similarity search and join: a survey
418 -- 432M. Tamer Özsu. A survey of RDF data management systems
433 -- 446Xueliang Liu, Meng Wang, Benoit Huet. Event analysis in social multimedia: a survey
447 -- 461Haibao Chen, Song Wu, Hai Jin, Wenguang Chen, Jidong Zhai, Yingwei Luo, Xiaolin Wang. A survey of cloud resource management for complex engineering applications
462 -- 476Wuyang Ju, Jianxin Li, Weiren Yu, Richong Zhang. iGraph: an incremental data processing system for dynamic graph
477 -- 487Chaofeng Sha, Keqiang Wang, Dell Zhang, Xiaoling Wang, Aoying Zhou. Optimizing top-k retrieval: submodularity analysis and search strategies
488 -- 503Lizhen Wang, Jun Han, Hongmei Chen, Junli Lu. Top-k probabilistic prevalent co-location mining in spatially uncertain data sets
504 -- 517Najam Nazar, He Jiang, Guojun Gao, Tao Zhang, Xiaochen Li, Zhilei Ren. Source code fragment summarization with small-scale crowdsourcing based features
518 -- 531Yuan Su, Xi Zhang, Lixin Liu, Shouyou Song, Binxing Fang. Understanding information interactions in diffusion: an evolutionary game-theoretic perspective
532 -- 542Xingbo Wu, Xiang Long, Lei Wang. FlexPoll: adaptive event polling for network-intensive applications
543 -- 558Bailing Liu, Yanhui Li, Bing Zeng, Chao Lei. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment
559 -- 573Chuang Lin, Min Yao, Yin Li. Joint study on VMs deployment, assignment and migration in geographically distributed data centers
574 -- 587Xian Li, Rui Wang, Zhongzhi Luan, Yi Liu, Depei Qian. Coordinating workload balancing and power switching in renewable energy powered data center

Volume 10, Issue 2

201 -- 215Kai Yu, Lu Chen, Kai Sun, Qizhe Xie, Su Zhu. Evolvable dialogue state tracking for statistical dialogue management
216 -- 232Yong-Jin Liu, Minjing Yu, Qiu-Fang Fu, Wenfeng Chen, Ye Liu, Lexing Xie. Cognitive mechanism related to line drawings and its applications in intelligent process of visual media: a survey
233 -- 245Qingliang Chen, Kaile Su, Abdul Sattar, Xiangyu Luo, Aixiang Chen. A first-order coalition logic for BDI-agents
246 -- 269Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian. Improving differential evolution with a new selection method of parents for mutation
270 -- 280Richong Zhang, Han Bao, Hailong Sun, Yanghao Wang, Xudong Liu. Recommender systems based on ranking performance optimization
281 -- 291Zhaoman Zhong, Zong-tian Liu, Yun Hu, Cunhua Li. Efficient multi-event monitoring using built-in search engines
292 -- 301Lu Yu, Jun Xie, Songcan Chen, Lei Zhu. Generating labeled samples for hyperspectral image classification using correlation of spectral bands
302 -- 316Dakun Liu, Xiaoyang Tan. Max-margin non-negative matrix factorization with flexible spatial constraints based on factor analysis
317 -- 329Yue Wang, Hongzhi Wang, Jianzhong Li, Hong Gao. Efficient graph similarity join for information integration on graphs
330 -- 352Mei Bai, Junchang Xin, Guoren Wang, Roger Zimmermann, Xite Wang. Skyline-join query processing in distributed databases
353 -- 369Yueting Zhuang, Yaoguang Wang, Jian Shao, Ling Chen, Weiming Lu, Jianling Sun, Baogang Wei, Jiangqin Wu. D-Ocean: an unstructured data management system for data ocean environment
370 -- 386Xiao Pan, Weizhang Chen, Lei Wu, Chunhui Piao, Zhaojun Hu. Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services

Volume 10, Issue 1

1 -- 0Zhi-Hua Zhou. Launch of the NSFC Excellent Young Scholars Forum
2 -- 18Zhaoning Zhang, Dongsheng Li, Kui Wu. Large-scale virtual machines provisioning in clouds: challenges and approaches
19 -- 36Yingying Zhu, Cong Yao, Xiang Bai. Scene text detection and recognition: recent advances and future trends
37 -- 53Zhibin Yang, Jean-Paul Bodeveix, Mamoun Filali, Kai Hu, Yongwang Zhao, Dianfu Ma. Towards a verified compiler prototype for the synchronous language SIGNAL
54 -- 81Yang Zhang, Xinyu Feng. An operational happens-before memory model
82 -- 95Dingding Li, Xiaofei Liao, Hai Jin, Yong Tang, Gansen Zhao. Writeback throttling in a virtualized system with SCM
96 -- 112Yi Zheng, Qi Liu, Enhong Chen, Yong Ge, J. Leon Zhao. Exploiting multi-channels deep convolutional neural networks for multivariate time series classification
113 -- 123Yinglong Zhang, Cuiping Li, Chengwang Xie, Hong Chen. Accuracy estimation of link-based similarity measures and its application
124 -- 135Dong Liu, Quanyuan Wu, Weihong Han, Bin Zhou. Sockpuppet gang detection on social media sites
136 -- 146Han Xue, Bing Qin, Ting Liu, Shen Liu. Topic hierarchy construction from heterogeneous evidence
147 -- 156Xuan Dong, Jiangtao Wen. Low lighting image enhancement using local maximum color value prior
157 -- 166Sio Kei Im, Mohammad Mahdi Ghandi. Improved rate-distortion optimized video coding using non-integer bit estimation and multiple Lambda search
167 -- 188Ahmad Ali, Abdul Jalil, Jianwei Niu, Xiaoke Zhao, Saima Rathore, Javed Ahmed, Muhammad Aksam Iftikhar. Visual object tracking - classical and contemporary approaches
189 -- 200Juanjuan Zhao, Guo-hua Ji, XiaoHong Han, Yan Qiang, Xiaolei Liao. An automated pulmonary parenchyma segmentation method based on an improved region growing algorithmin PET-CT imaging