Journal: J. Comput. Sci. Technol.

Volume 40, Issue 3

605 -- 606Xiao-Wei Li, Xiaofei Liao. Preface
607 -- 620Zhi-Wei Xu, Zi-Shu Yu, Feng-Zhi Li, Yao Zhang 0010. Hypertasking: From Information Web to Computing Utility
621 -- 636Feng Jiang, Huai-Min Wang, Peichang Shi, Xiang Fu 0002, Liaoliao Feng, Rui Li, Moheng Lin. An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing
637 -- 653Xiaohui Peng 0002, Yi-Xuan Sun, Zhenghui Zhang, Yi-Fan Wang. DSparse: A Distributed Training Method for Edge Clusters Based on Sparse Update
654 -- 670Yiting Chen 0009, Lailong Luo, Deke Guo, Qian He. Carbon-Aware Energy Cost Optimization of Data Analytics Across Geo-Distributed Data Centers
671 -- 685Xiaohui Wei 0002, Shiyu Tong, Zhongao Sun, Xiang Li, Hengshan Yue. ResCheckpointer: Building Program Error Resilience-Aware Checkpointing Mechanism for HPC Systems
686 -- 700Wei-Ming Chang, Jing-Yi Li, Lin Chen, Xu Chen 0004. DiffTSN: Scheduling Mixed Flows in Time-Sensitive Networks with Diffusion-Based Method
701 -- 730Shuo Quan, Shen Gao, Jian-Song Zhang, Jie Wu. Virtualization, Cloudification, and Service Orientation of Network: A Systematic Review
731 -- 747Dongyu Cao, Hao Yin, Bixin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum
748 -- 765Xinyan Zhang, Dan Feng 0001, Zhipeng Tan, Yanwen Xie, Shaofeng Zhao, Ya-Yuan Wei. LWCM: A Lookahead-Window Constrained Model for Disk Failure Prediction in Large Data Centers
766 -- 779Jiangnan Cui, Yang Gao, Qiu Wang, Xuan Li, Ke-Ren Xu, Zhen-Yu Huang, Jingsong Zhang, Chunman Zuo. Advanced Cross-Graph Cycle Attention Model for Dissecting Complex Structures in Mass Spectrometry Imaging
780 -- 791Shuyu Guo, Lan Huang 0002, Yu-Hao Mu, Tian Bai 0002. Unsupervised Adversarial Domain Adaptation with Hierarchical Semantic Consistency for Cross-Modal Nuclei Detection
792 -- 804Yaoyu Wang, Xiaohua Wan, Cheng Chen, Fa Zhang 0001, Xuefeng Cui. Central Feature Network Enables Accurate Detection of Both Small and Large Particles in Cryo-Electron Tomography
805 -- 820Yuchu Fang, Wenzhong Li, Yao Zeng, Qingning Lu, Sanglu Lu. Pushing to the Limit: An Attention-Based Dual-Prune Approach for Highly-Compacted CNN Filter Pruning
821 -- 834Nankai Lin, Hongyan Wu, Sihui Fu, Shengyi Jiang, Ai-Min Yang 0002. A Chinese Spelling Check Method Based on Reverse Contrastive Learning
835 -- 854Lin Zhu, Qiang-Sheng Hua, Hai Jin 0001. Joint-Communication Optimal Matrix Multiplication with Asymmetric Memories
855 -- 869Chong Zhang, Zitong Su, Min Li, Huiyuan Li, Wenjing Ma, Leisheng Li. Optimization of Generalized Eigensolver for Dense Symmetric Matrices on AMD GPU
870 -- 886Gabriel H. Tolosa, Pablo Lavallén, Esteban A. Ríssola. Caching Document Identifiers to Speedup Query Processing in Search Servers
887 -- 903Xiao Chen, Letian Sha, Fu Xiao 0001, Jiaye Pan, Jiankuo Dong. AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery
904 -- 920Shiyu Shen, Hong Zhang, Feng He, Zhichuang Liang, Jieyu Zheng, Hanyu Wei, Yang Wang 0050, Zhenfeng Zhang, Yunlei Zhao. OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice
921 -- 938Ming Wan, Geng Wang, Shi-Feng Sun 0001, Dawu Gu, Gongyu Shi. Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-Grained Data Sharing