Journal: J. Comput. Sci. Technol.

Volume 28, Issue 6

929 -- 931Xiaofeng Meng, Fusheng Wang. Preface
932 -- 947Ticiana L. Coelho da Silva, Mario A. Nascimento, José Antônio Fernandes de Macêdo, Flávio R. C. Sousa, Javam C. Machado. Non-Intrusive Elastic Query Processing in the Cloud
948 -- 961Peng Xiao, Zhigang Hu, Yanping Zhang. An Energy-Aware Heuristic Scheduling for Data-Intensive Workflows in Virtualized Datacenters
962 -- 972Mingdong Zhu, Derong Shen, Yue Kou, Tiezheng Nie, Ge Yu. A Framework for Supporting Tree-Like Indexes on the Chord Overlay
973 -- 988Yingjie Shi, Xiaofeng Meng, Fusheng Wang, Yantao Gan. HEDC++: An Extended Histogram Estimator for Data in the Cloud
989 -- 1011Yuxiang Wang, Junzhou Luo, Aibo Song, Fang Dong. Partition-Based Online Aggregation with Shared Sampling in the Cloud
1012 -- 1024Yinjin Fu, Nong Xiao, Xiangke Liao, Fang Liu. Application-Aware Client-Side Data Reduction and Encryption of Personal Data in Cloud Backup Services
1025 -- 1044Youngjae Kim, Aayush Gupta, Bhuvan Urgaonkar. A Temporal Locality-Aware Page-Mapped Flash Translation Layer
1045 -- 1053Yinhe Han, Cheng Liu, Hang Lu, Wen-Bo Li, Lei Zhang, Xiao-Wei Li. RevivePath: Resilient Network-on-Chip Design Through Data Path Salvaging of Router
1054 -- 1062Lun-Yao Wang, Zhufei Chu, Yinshui Xia. Low Power State Assignment Algorithm for FSMs Considering Peak Current Optimization
1063 -- 1084Zhaopeng Li, Yu Zhang, Yiyun Chen. A Shape Graph Logic and A Shape System
1085 -- 1096Jian-Hua Gao. Clausal Presentation of Theories in Deduction Modulo
1097 -- 1105Yanfang Ma, Min Zhang. The Infinite Evolution Mechanism of ϵ-Bisimilarity
1106 -- 1116Guo-Dong Zhou, Pei-Feng Li. Improving Syntactic Parsing of Chinese with Empty Element Recovery
1117 -- 1126Hong-ling Wang, Guo-Dong Zhou. Semantic Role Labeling of Chinese Nominal Predicates with Dependency-Driven Constituent Parse Tree Structure
1127 -- 1130. CONTENTS

Volume 28, Issue 5

749 -- 750Shi-Min Hu, Daniel Thalmann, Ruo-feng Tong. Preface
751 -- 761Yanhui Xiao, Zhenfeng Zhu, Yao Zhao, Yunchao Wei. Class-Driven Non-Negative Matrix Factorization for Image Representation
762 -- 775Yu Zang, Hua Huang 0001, Chen-Feng Li. Stroke Style Analysis for Painterly Rendering
776 -- 787Wen Qu, Kaisong Song, Yifei Zhang, Shi Feng, Daling Wang, Ge Yu. A Novel Approach Based on Multi-View Content Analysis and Semi-Supervised Enrichment for Movie Recommendation
788 -- 796Chengde Zhang, Xiao Wu, Mei-Ling Shyu, Qiang Peng. A Novel Web Video Event Mining Framework with the Integration of Correlation and Co-Occurrence Information
797 -- 809Yu-Xin Ma, Jia-Yi Xu, Dichao Peng, Ting Zhang, Cheng-Zhe Jin, Hua-Min Qu, Wei Chen, Qunsheng Peng. A Visual Analysis Approach for Community Detection of Multi-Context Mobile Social Networks
810 -- 817Jin-Kai Zhang, Cui-xia Ma, Yong-Jin Liu, Qiu-Fang Fu, Xiaolan Fu. Collaborative Interaction for Videos on Mobile Devices Based on Sketch Gestures
818 -- 826Li-Wei Liu, Hai-Zhou Ai. Learning Structure Models with Context Information for Visual Tracking
827 -- 835Bei-Bei Liu, Yan-lin Weng, Jian-Nan Wang, Yi-Ying Tong. Orientation Field Guided Texture Synthesis
836 -- 851Zhenbao Liu, Shuhui Bu, Kun Zhou, Shu-Ming Gao, Junwei Han, Jun Wu. A Survey on Partial Retrieval of 3D Shapes
852 -- 867Guo-Dao Sun, Ying-Cai Wu, Rong-Hua Liang, Shi-Xia Liu. A Survey of Visual Analytics Techniques and Applications: State-of-the-Art Research and Future Challenges
868 -- 889Mario Garza-Fabre, Eduardo Rodriguez-Tello, Gregorio Toscano Pulido. Comparative Analysis of Different Evaluation Functions for Protein Structure Prediction Under the HP Model
890 -- 906Nan Wang, Haizhou Ai, Feng Tang. Who Blocks Who: Simultaneous Segmentation of Occluded Objects
907 -- 918Jia-Jun Zhang, Fei-Fei Zhai, Cheng-Qing Zong. A Substitution-Translation-Restoration Framework for Handling Unknown Words in Statistical Machine Translation
919 -- 929Hao-Peng Lei, Xiao-Nan Luo, Shu-Jin Lin, Jian-Qiang Sheng. Automatic 3D Shape Co-Segmentation Using Spectral Graph Method

Volume 28, Issue 4

583 -- 584Jinho Kim, Sang-Wook Kim, Sanghyun Park, Haixun Wang. Preface
585 -- 596Hyeong-Il Kim, Jae-Woo Chang. k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks
597 -- 604Heemin Park, Young-Jun Lee, Jinseok Chae, Wonik Choi. Online Approach for Spatio-Temporal Trajectory Data Reduction for Portable Devices
605 -- 615Jaehoon Choi, Jaewoo Kang, Jinseung Lee, Chihwan Song, Qingsong Jin, Sunwon Lee, Jinsun Uh. Mining Botnets and Their Evolution Patterns
616 -- 624Xiangliang Zhang, Tak Man Desmond Lee, Georgios Pitsilis. Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
625 -- 635Hao Wang, Chaokun Wang, Ya-Jun Xu, Yuanchi Ning. Dominant Skyline Query Processing over Multiple Time Series
636 -- 646Jooil Lee, Yanhua Jin, Won Suk Lee. SUBic: A Scalable Unsupervised Framework for Discovering High Quality Biclusters
647 -- 656Woo-Cheol Kim, Sanghyun Park, Jung-Im Won. CORE: Common Region Extension Based Multiple Protein Structure Alignment for Producing Multiple Solution
657 -- 670Jie Yan, Guangming Tan, Ninghui Sun. Optimizing Parallel S n Sweeps on Unstructured Grids for Multi-Core Clusters
671 -- 681Ning Xu, Yuchun Ma, Jia Liu, Shou-Chun Tao. Thermal-Aware Post Layout Voltage-Island Generation for 3D ICs
682 -- 688Bin Xiao, Yifu Zhang, Yan-Ping Gao, Liang Yang, Dong-Mei Wu, Bao-Xia Fan. A Robust and Power-Efficient SoC Implementation in 65 nm
689 -- 719Liangjun Zang, Cong Cao, Yanan Cao, Yuming Wu, Cungen Cao. A Survey of Commonsense Knowledge Acquisition
720 -- 731Concha Bielza, Juan A. Fernández del Pozo, Pedro Larrañaga. Parameter Control of Genetic Algorithms by Learning and Simulation of Bayesian Networks - A Case Study for the Optimal Ordering of Tables
732 -- 742Jing Xu, Wen Tao Zhu. A Generic Framework for Anonymous Authentication in Mobile Networks
743 -- 748Aijun Ge, Xin-Yi Huang, Cheng Chen, Chuangui Ma, Rui Zhang 0002. Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism

Volume 28, Issue 3

401 -- 402. Preface
403 -- 411Chengwen Xing, Haichuan Ding, Guang-Hua Yang, Shaodan Ma, Zesong Fei. Outage Analysis of Opportunistic Cooperative Ad Hoc Networks with Randomly Located Nodes
412 -- 419Xin Su, Jie Zeng, Liping Rong, Yujun Kuang. Investigation on Key Technologies in Large-Scale MIMO
420 -- 428Xiaofeng Tao, Yan-Zhao Hou, Kai-Dong Wang, Hai-Yang He, Y. Jay Guo. GPP-Based Soft Base Station Designing and Optimization
429 -- 436Yi Huang, Chao Tang, Hong-Liang Duan, Yiqing Zhou, Manli Qian, Liang Huang. Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform
437 -- 444Wenyu Li, Xiang Zhang, Shucong Jia, Xin-Yu Gu, Lin Zhang 0013, Xiaoyu Duan, Jiaru Lin. A Novel Dynamic Adjusting Algorithm for Load Balancing and Handover Co-Optimization in LTE SON
445 -- 453Juan Han, Chao Tang, Qiu-Ju Wang, Ziyuan Zhu, Shan Tang. Simplified MMSE Detectors for Turbo Receiver in BICM MIMO Systems
454 -- 467Wen-Yong Zhao, Shao-Lin Chen, Yuan Zheng, Si-Long Peng. Lighting Estimation of a Convex Lambertian Object Using Redundant Spherical Harmonic Frames
468 -- 478Lifeng He, Yuyan Chao, Kenji Suzuki. An Algorithm for Connected-Component Labeling, Hole Labeling and Euler Number Computing
479 -- 489Jun-Fa Liu, Wen-Jing He, Tao Chen, Yi-Qiang Chen. Manifold Constrained Transfer of Facial Geometric Knowledge for 3D Caricature Reconstruction
490 -- 498Guofu Xie, Xin Sun, Wencheng Wang. Interactive Depth-of-Field Rendering with Secondary Rays
499 -- 507Youngjun Kim, Dongjune Chang, Jungsik Kim, Se Hyung Park. Gallbladder Removal Simulation for Laparoscopic Surgery Training: A Hybrid Modeling Method
508 -- 524Andrés Ortiz, Julio Ortega, Antonio F. Díaz, Alberto Prieto. Affinity-Based Network Interfaces for Efficient Communication on Multicore Architectures
525 -- 539Peyman Teymoori, Nasser Yazdani. Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
540 -- 552ZhiHui Lv, Lijiang Chen, Jie Wu 0003, Da Deng 0002, Sijia Huang, Yi Huang. PROSE: Proactive, Selective CDN Participation for P2P Streaming
553 -- 563Hua-Zheng Du, Na Xia, Jianguo Jiang, Lina Xu, Rong Zheng. A Monte Carlo Enhanced PSO Algorithm for Optimal QoM in Multi-Channel Wireless Networks
564 -- 573Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Yan-Jie Wei. An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks
574 -- 582Pei-Yan Yuan, Hua-Dong Ma, Peng-Rui Duan. Impact of Strangers on Opportunistic Routing Performance

Volume 28, Issue 2

217 -- 231Liya Liu, Osman Hasan, Sofiène Tahar. Formal Reasoning About Finite-State Discrete-Time Markov Chains in HOL
232 -- 246Mohamed El-bachir Menai, Tasniem Nasser Al-Yahya. A Taxonomy of Exact Methods for Partial Max-SAT
247 -- 254Wensheng Guo, Guowu Yang, William N. N. Hung, Xiaoyu Song. Complete Boolean Satisfiability Solving Algorithms Based on Local Search
255 -- 266François Anton, Darka Mioc, Marcelo Santos. Exact Computation of the Topology and Geometric Invariants of the Voronoi Diagram of Spheres in 3D
267 -- 277Gill Barequet, Matthew Dickerson, David Eppstein, David Hodorkovsky, Kira Vyatkina. On 2-Site Voronoi Diagrams Under Geometric Distance Functions
278 -- 284Mei-Xia Qu, Jun-Feng Luan, Da-Ming Zhu, Meng Du. On the Toggling-Branching Recurrence of Computability Logic
285 -- 299Irfan Ahmad, Sabri A. Mahmoud. Arabic Bank Check Processing: State of the Art
300 -- 310Wei Luo, Marcus Gallagher, Janet Wiles. Parameter-Free Search of Time-Series Discord
311 -- 321Kiatichai Treerattanapitak, Chuleerat Jaruskulchai. Possibilistic Exponential Fuzzy Clustering
322 -- 328Mathu Soothana S. Kumar Retna Swami, Muneeswaran Karuppiah. Optimal Feature Extraction Using Greedy Approach for Random Image Components and Subspace Approach in Face Recognition
329 -- 342Hong-Wei Tang, Jian-Nong Cao, Xue-Feng Liu, Cai-Xia Sun. SR-MAC: A Low Latency MAC Protocol for Multi-Packet Transmissions in Wireless Sensor Networks
343 -- 356Kun Xie, Jiannong Cao, Jigang Wen. Optimal Relay Assignment and Power Allocation for Cooperative Communications
357 -- 365Chollette C. Chude-Olisah, Uche A. K. Chude-Okonkwo, Kamalrulnizam A. Bakar, Ghazali Sulong. Fuzzy-Based Dynamic Distributed Queue Scheduling for Packet Switched Networks
366 -- 381Junfeng Zhou, Guoxiang Lan, Ziyang Chen, Xian Tang. Fast Smallest Lowest Common Ancestor Computation Based on Stable Match
382 -- 393Dan Yang, Derong Shen, Ge Yu, Yue Kou, Tiezheng Nie. Query Intent Disambiguation of Keyword-Based Semantic Entity Search in Dataspaces
394 -- 400Joo Hyuk Jeon, Jihwan Song, Jeong Eun Kwon, Yoon-Joon Lee, Man Ho Park, Myoung-Ho Kim. An Efficient and Spam-Robust Proximity Measure Between Communication Entities

Volume 28, Issue 1

1 -- 2Erik R. Altman, Weisong Shi. Preface
3 -- 13Jie Tang, Pollawat Thanarungroj, Chen Liu, Shaoshan Liu, Zhimin Gu, Jean-Luc Gaudiot. Pinned OS/Services: A Case Study of XML Parsing on Intel SCC
14 -- 27Zhiguang Chen, Nong Xiao, Fang Liu, Yimo Du. Reorder Write Sequence by Hetero-Buffer to Extend SSD's Lifespan
28 -- 41Yimo Du, Nong Xiao, Fang Liu, Zhiguang Chen. CSWL: Cross-SSD Wear-Leveling Method in SSD-Based RAID Systems for System Endurance and Performance
42 -- 53Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Lian-Sheng Tan. Power Adjusting Algorithm: A New Cross-Layer Power Saving Mechanism for Mobile Ad-Hoc Networks
54 -- 71Xiaohang Wang, Peng Liu 0016, Mei Yang, Maurizio Palesi, Yingtao Jiang, Michael C. Huang. Energy Efficient Run-Time Incremental Mapping for 3-D Networks-on-Chip
72 -- 89Carlos Teijeiro, Guillermo L. Taboada, Juan Touriño, Ramon Doallo, José Carlos Mouriño, Damián A. Mallón, Brian Wibecan. Design and Implementation of an Extended Collectives Library for Unified Parallel C
90 -- 105Yan Li, Yunquan Zhang, Yi-Qun Liu, Guoping Long, Haipeng Jia. MPFFT: An Auto-Tuning FFT Library for OpenCL GPUs
106 -- 118Lei Zhao, Jiwen Yang. Resources Snapshot Model for Concurrent Transactions in Multi-Core Processors
119 -- 128Yuan-Qing Cheng, Lei Zhang, Yin-He Han, Xiao-Wei Li. TSV Minimization for Circuit - Partitioned 3D SoC Test Wrapper Design
129 -- 143Gao-Li Wang. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD
144 -- 151Adrian Atanasiu. A New Batch Verifying Scheme for Identifying Illegal Signatures
152 -- 158Bo Yang 0003, Yong Yu, Chung-Huang Yang. A Secure Scalar Product Protocol Against Malicious Adversaries
159 -- 164Shusheng Liu, Zheng Gong, Libin Wang. Cryptanalysis of Reduced-Round DASH
165 -- 187Qiliang Yang, Jian Lu, XianPing Tao, Xiaoxing Ma, Jianchun Xing, Wei Song. Fuzzy Self-Adaptation of Mission-Critical Software Under Uncertainty
188 -- 202Yu Zhou, Luciano Baresi, Matteo Rossi. Towards a Formal Semantics for UML/MARTE State Machines Based on Hierarchical Timed Automata
203 -- 216Yang Liu, Huaikou Miao, Hongwei Zeng, Yan Ma, Pan Liu. Nondeterministic Probabilistic Petri Net - A New Method to Study Qualitative and Quantitative Behaviors of System