Journal: J. Comput. Sci. Technol.

Volume 34, Issue 6

1167 -- 1184Rui Ren, Jiechao Cheng, Xiwen He, Lei Wang 0004, Jianfeng Zhan, Wanling Gao, Chunjie Luo. HybridTune: Spatio-Temporal Performance Data Correlation for Performance Diagnosis of Big Data Systems
1185 -- 1202Jiuru Gao, Wei Chen, Jia-Jie Xu, An Liu 0002, Zhixu Li, Hongzhi Yin, Lei Zhao 0001. An Efficient Framework for Multiple Subgraph Pattern Matching Models
1203 -- 1216Anzhen Zhang, Jian-Zhong Li, Hong Gao. Interval Estimation for Aggregate Queries on Incomplete Data
1217 -- 1229Chunyang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xintian Chen. Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism
1230 -- 1240Pengfei Wang, Yongfeng Zhang, Shuzi Niu, Jiafeng Guo. Modeling Temporal Dynamics of Users' Purchase Behaviors for Next Basket Prediction
1241 -- 1257Momodou L. Sanyang, Ata Kabán. Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles
1258 -- 1268Zhi-Guang Pan, Chuhua Xian, Shuo Jin, Guiqing Li. Progressive Furniture Model Decimation with Texture Preservation
1269 -- 1278Xinggang Wang, Jiasi Wang, Peng Tang, Wenyu Liu. Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection
1279 -- 1293Xiaowu Li, Zhinan Wu, Feng Pan, Juan Liang, Jiafeng Zhang, Linke Hou. A Geometric Strategy Algorithm for Orthogonal Projection onto a Parametric Surface
1294 -- 1306Mohan Zhang, Jinhui Yu, Kang Zhang, Junsong Zhang. Artistic Augmentation of Photographs with Droplets
1307 -- 1318Chengzhang Zhu, Rong Hu, Beiji Zou, Rongchang Zhao, Changlong Chen, Yalong Xiao. Automatic Diabetic Retinopathy Screening via Cascaded Framework Based on Image- and Lesion-Level Features Fusion
1319 -- 1350Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava. Security Attacks in Named Data Networking: A Review and Research Directions
1351 -- 1365Chong Wang, Nasro Min-Allah, Bei Guan, Yuqi Lin, JingZheng Wu, Yongji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion
1366 -- 1379Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
1380 -- 1383. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY