1167 | -- | 1184 | Rui Ren, Jiechao Cheng, Xiwen He, Lei Wang 0004, Jianfeng Zhan, Wanling Gao, Chunjie Luo. HybridTune: Spatio-Temporal Performance Data Correlation for Performance Diagnosis of Big Data Systems |
1185 | -- | 1202 | Jiuru Gao, Wei Chen, Jia-Jie Xu, An Liu 0002, Zhixu Li, Hongzhi Yin, Lei Zhao 0001. An Efficient Framework for Multiple Subgraph Pattern Matching Models |
1203 | -- | 1216 | Anzhen Zhang, Jian-Zhong Li, Hong Gao. Interval Estimation for Aggregate Queries on Incomplete Data |
1217 | -- | 1229 | Chunyang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xintian Chen. Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism |
1230 | -- | 1240 | Pengfei Wang, Yongfeng Zhang, Shuzi Niu, Jiafeng Guo. Modeling Temporal Dynamics of Users' Purchase Behaviors for Next Basket Prediction |
1241 | -- | 1257 | Momodou L. Sanyang, Ata Kabán. Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles |
1258 | -- | 1268 | Zhi-Guang Pan, Chuhua Xian, Shuo Jin, Guiqing Li. Progressive Furniture Model Decimation with Texture Preservation |
1269 | -- | 1278 | Xinggang Wang, Jiasi Wang, Peng Tang, Wenyu Liu. Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection |
1279 | -- | 1293 | Xiaowu Li, Zhinan Wu, Feng Pan, Juan Liang, Jiafeng Zhang, Linke Hou. A Geometric Strategy Algorithm for Orthogonal Projection onto a Parametric Surface |
1294 | -- | 1306 | Mohan Zhang, Jinhui Yu, Kang Zhang, Junsong Zhang. Artistic Augmentation of Photographs with Droplets |
1307 | -- | 1318 | Chengzhang Zhu, Rong Hu, Beiji Zou, Rongchang Zhao, Changlong Chen, Yalong Xiao. Automatic Diabetic Retinopathy Screening via Cascaded Framework Based on Image- and Lesion-Level Features Fusion |
1319 | -- | 1350 | Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava. Security Attacks in Named Data Networking: A Review and Research Directions |
1351 | -- | 1365 | Chong Wang, Nasro Min-Allah, Bei Guan, Yuqi Lin, JingZheng Wu, Yongji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion |
1366 | -- | 1379 | Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions |
1380 | -- | 1383 | . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY |