Journal: J. Comput. Sci. Technol.

Volume 34, Issue 6

1167 -- 1184Rui Ren, Jiechao Cheng, Xiwen He, Lei Wang 0004, Jianfeng Zhan, Wanling Gao, Chunjie Luo. HybridTune: Spatio-Temporal Performance Data Correlation for Performance Diagnosis of Big Data Systems
1185 -- 1202Jiuru Gao, Wei Chen, Jia-Jie Xu, An Liu 0002, Zhixu Li, Hongzhi Yin, Lei Zhao 0001. An Efficient Framework for Multiple Subgraph Pattern Matching Models
1203 -- 1216Anzhen Zhang, Jian-Zhong Li, Hong Gao. Interval Estimation for Aggregate Queries on Incomplete Data
1217 -- 1229Chunyang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xintian Chen. Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism
1230 -- 1240Pengfei Wang, Yongfeng Zhang, Shuzi Niu, Jiafeng Guo. Modeling Temporal Dynamics of Users' Purchase Behaviors for Next Basket Prediction
1241 -- 1257Momodou L. Sanyang, Ata Kabán. Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles
1258 -- 1268Zhi-Guang Pan, Chuhua Xian, Shuo Jin, Guiqing Li. Progressive Furniture Model Decimation with Texture Preservation
1269 -- 1278Xinggang Wang, Jiasi Wang, Peng Tang, Wenyu Liu. Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection
1279 -- 1293Xiaowu Li, Zhinan Wu, Feng Pan, Juan Liang, Jiafeng Zhang, Linke Hou. A Geometric Strategy Algorithm for Orthogonal Projection onto a Parametric Surface
1294 -- 1306Mohan Zhang, Jinhui Yu, Kang Zhang, Junsong Zhang. Artistic Augmentation of Photographs with Droplets
1307 -- 1318Chengzhang Zhu, Rong Hu, Beiji Zou, Rongchang Zhao, Changlong Chen, Yalong Xiao. Automatic Diabetic Retinopathy Screening via Cascaded Framework Based on Image- and Lesion-Level Features Fusion
1319 -- 1350Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava. Security Attacks in Named Data Networking: A Review and Research Directions
1351 -- 1365Chong Wang, Nasro Min-Allah, Bei Guan, Yuqi Lin, JingZheng Wu, Yongji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion
1366 -- 1379Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions
1380 -- 1383. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY

Volume 34, Issue 5

939 -- 941Tao Xie 0001, Jun Wei 0001, Chang Xu 0001, Zhi Jin, Xiaoxing Ma. Preface
942 -- 956Shengqu Xi, Yuan Yao 0001, Xusheng Xiao, Feng Xu 0007, Jian Lu 0001. Bug Triaging Based on Tossing Sequence Modeling
957 -- 971Wei Chen 0018, Jiahong Zhou, Jiaxin Zhu, Guoquan Wu, Jun Wei 0001. Semi-Supervised Learning Based Tag Recommendation for Docker Repositories
972 -- 992Lingyun Situ, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li. Automatic Detection and Repair Recommendation for Missing Checks
993 -- 1006Chunyang Ling, Yanzhen Zou, Zeqi Lin, Bing Xie. Graph Embedding Based API Graph Search and Recommendation
1007 -- 1019Haibo Ye, Xuansong Li, Li Sheng, Kai Dong. CBSC: A Crowdsensing System for Automatic Calibrating of Barometers
1020 -- 1038Xiang Chen 0005, Dun Zhang, Zhanqi Cui, Qing Gu, Xiaolin Ju. DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy
1039 -- 1062Zhou Xu, Shuai Pang, Tao Zhang 0001, Xiapu Luo, Jin Liu, Yutian Tang, Xiao Yu, Lei Xue. Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning
1063 -- 1078Mohammed Alqmase, Mohammad Alshayeb, Lahouari Ghouti. Threshold Extraction Framework for Software Metrics
1079 -- 1095Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang, Xiangjun Lu, Zheng Guo 0001, Hai-Ning Lu. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks
1096 -- 1108Han Lin, Mingfan Li, Chengfan Jia, Junnan Liu, Hong An. Degree-of-Node Task Scheduling of Fine-Grained Parallel Programs on Heterogeneous Systems
1109 -- 1122Wen-Wu Yang, Jing Hua, Kun-Yang Yao. CR-Morph: Controllable Rigid Morphing for 2D Animation
1123 -- 1135Xin Yang 0011, Dawei Wang, Wenbo Hu, Lijing Zhao, Baocai Yin, Qiang Zhang 0008, Xiaopeng Wei, Hongbo Fu. DEMC: A Deep Dual-Encoder Network for Denoising Monte Carlo Rendering
1136 -- 1151Jie Xiao, Zhanhui Shi, Jianhui Jiang, Xuhua Yang, Yujiao Huang, Haigen Hu. A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm
1152 -- 1166Dawei Wang, Wan-Qiu Cui, Biao Qin. CK-Modes Clustering Algorithm Based on Node Cohesion in Labeled Property Graph

Volume 34, Issue 4

707 -- 708Xiaofang Zhou, Jiajie Xu. Preface
709 -- 726Jianqiu Xu, Ralf Hartmut Güting, Yu Zheng, Ouri Wolfson. Moving Objects with Transportation Modes: A Survey
727 -- 746Na Ta, Guoliang Li 0001, Jun Hu, Jianhua Feng. Location and Trajectory Identification from Microblogs
747 -- 761Junhua Fang, Pengpeng Zhao, An Liu 0002, Zhixu Li, Lei Zhao 0001. Scalable and Adaptive Joins for Trajectory Data in Distributed Stream System
762 -- 774Hong Fang, Bo Zhao, Xiaowang Zhang, Xuanxing Yang. A United Framework for Large-Scale Resource Description Framework Stream Processing
775 -- 794Lihua Yin, Huiwen Liu. Searching Activity Trajectories with Semantics
795 -- 817Hong-Cheu Liu, Jixue Liu. On the Expressive Power of Logics on Constraint Databases with Complex Objects
818 -- 838Hongfei Xu, Yu Gu 0002, Jianzhong Qi 0001, Jiayuan He, Ge Yu 0001. Diversifying Top-k Routes with Spatial Constraints
839 -- 853Ze-Wei Chen, Hang Lei, Maolin Yang, Yong Liao, Jiali Yu. Improved Task and Resource Partitioning Under the Resource-Oriented Partitioned Scheduling
854 -- 868Quoc Le, Ahmed Amer, JoAnne Holliday. RAID 4SMR: RAID Array with Shingled Magnetic Recording Disk for Mass Storage Systems
869 -- 886Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief. Edge Computing Based Applications in Vehicular Environments: Comparative Study and Main Issues
887 -- 900Mansoor Davoodi, Esmaeil Delfaraz, Sajjad Ghobadi, Mahtab Masoori. Algorithms for Handoff Minimization in Wireless Networks
901 -- 923Zipeng Zhang, Ming Fu, Xinyu Feng. A Lightweight Dynamic Enforcement of Privacy Protection for Android
924 -- 938Robail Yasrab. SRNET: A Shallow Skip Connection Based Convolutional Neural Network Design for Resolving Singularities

Volume 34, Issue 3

507 -- 508Shi-Min Hu, Hongbo Fu, Marcus A. Magnor. Preface
509 -- 521Tai-Ling Yuan, Zhe Zhu, Kun Xu, Cheng-Jun Li, Tai-Jiang Mu, Shi-Min Hu. A Large Chinese Text Dataset in the Wild
522 -- 536Shuai Li 0001, Zheng Fang, Wenfeng Song, Aimin Hao, Hong Qin. Bidirectional Optimization Coupled Lightweight Networks for Efficient and Robust Multi-Person 2D Pose Estimation
537 -- 549Na Ding, Ye-Peng Liu, Lin-Wei Fan, Caiming Zhang. Single Image Super-Resolution via Dynamic Lightweight Database with Local-Feature Based Interpolation
550 -- 568Mengke Yuan, Longquan Dai, Dong-Ming Yan, Li-Qiang Zhang, Jun Xiao, Xiao-Peng Zhang. Fast and Error-Bounded Space-Variant Bilateral Filtering
569 -- 580De-Wang Li, Lin-Jing Lai, Hua Huang. Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map
581 -- 593Bo Ren, Jia-Cheng Wu, Ya-Lei Lv, Ming-Ming Cheng, Shao-Ping Lu. Geometry-Aware ICP for Scene Reconstruction from RGB-D Camera
594 -- 608Song-Hai Zhang, Shaokui Zhang, Yuan Liang, Peter Hall. A Survey of 3D Indoor Scene Synthesis
609 -- 621Ri-Sheng Liu, Caisheng Mao, Zhi-Hui Wang, Haojie Li. Blind Image Deblurring via Adaptive Optimization with Flexible Sparse Structure Control
622 -- 633Han Liu, Hang Du, Dan Zeng, Qi Tian 0001. Cloud Detection Using Super Pixel Classification and Semantic Segmentation
634 -- 644Xinchen Liu, Huadong Ma, Shuangqun Li. PVSS: A Progressive Vehicle Search System for Video Surveillance Networks
645 -- 656Jiang Rong, Tao Qin, Bo An. Competitive Cloud Pricing for Long-Term Revenue Maximization
657 -- 669Dawei Cheng, Yi Tu, Zhen-Wei Ma, Zhibin Niu, Liqing Zhang 0001. BHONEM: Binary High-Order Network Embedding Methods for Networked-Guarantee Loans
670 -- 689Ming-Zhe Zhang, Yun-Zhan Gong, Ya Wen Wang, Da-Hai Jin. Unit Test Data Generation for C Using Rule-Directed Symbolic Execution
690 -- 706Peng Zhao, Chen Ding, Lei Liu, Jiping Yu, Wentao Han, Xiaobing Feng 0002. Cacheap: Portable and Collaborative I/O Optimization for Graph Processing

Volume 34, Issue 2

253 -- 255Su Song, Ke Liu, Zhi-Yong Liu. Preface
256 -- 271Masoud Zadghorban Lifkooee, Celong Liu, YongQing Liang, Yimin Zhu, Xin Li. Real-Time Avatar Pose Transfer and Motion Generation Using Locally Encoded Laplacian Offsets
272 -- 286Lei Cui, Youyang Qu, Mohammad Reza Nosouhi, Shui Yu, Jianwei Niu 0002, Gang Xie. Improving Data Utility Through Game Theory in Personalized Differential Privacy
287 -- 304Mengqi Zeng, Bin Yao 0002, Zhi-jie Wang, Yanyan Shen, Feifei Li 0001, Jianfeng Zhang, Hao Lin, Minyi Guo. CATIRI: An Efficient Method for Content-and-Text Based Image Retrieval
305 -- 317Dong-Di Zhao, Fan Li 0001, Kashif Sharif, Guang-Min Xia, Yu Wang. Space Efficient Quantization for Deep Convolutional Neural Networks
318 -- 338Feng Zhou, Haomin Zhou, Zhihua Yang, Lihua Yang. A 2-Stage Strategy for Non-Stationary Signal Prediction and Recovery Using Iterative Filtering and Neural Network
339 -- 371Chuangyi Gui, Long Zheng 0003, Bingsheng He, Cheng Liu, Xinyu Chen, Xiaofei Liao, Hai Jin 0001. A Survey on Graph Processing Accelerators: Challenges and Opportunities
372 -- 387Weibei Fan, Jianxi Fan, Cheng-Kuan Lin, Yan Wang, Yuejuan Han, Ruchuan Wang. Optimally Embedding 3-Ary n-Cubes into Grids
388 -- 402Jinoh Kim, Alex Sim. A New Approach to Multivariate Network Traffic Analysis
403 -- 415Zhiguo Wan, Robert H. Deng, David Lee, Ying Li. MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains
416 -- 436Bo Guo, Young-Woo Kwon, Myoungkyu Song. Decomposing Composite Changes for Code Review and Regression Test Selection in Evolving Software
437 -- 455Li Li, Tegawendé F. Bissyandé, Hao-Yu Wang, Jacques Klein. On Identifying and Explaining Similarities in Android Apps
456 -- 475Song Liu, Yuanzhen Cui, Nianjun Zou, Wen-Hao Zhu, Dong Zhang, Weiguo Wu. Revisiting the Parallel Strategy for DOACROSS Loops
476 -- 493Xiang-chu Feng, Chen-ping Zhao, Silong Peng, Xiyuan Hu, Zhao-Wei Ouyang. Plug-and-Play Based Optimization Algorithm for New Crime Density Estimation
494 -- 506Amichai Painsky, Saharon Rosset. Lossless Compression of Random Forests

Volume 34, Issue 1

1 -- 2Su Song, Ke Liu, Zhi-Yong Liu. Preface
3 -- 15Wessam Elhefnawy, Min Li 0007, Jianxin Wang, Yaohang Li. Decoding the Structural Keywords in Protein Structure Universe
16 -- 34Lin Wu, Min Li 0007, Jianxin Wang, Fang-Xiang Wu. Controllability and Its Applications to Biological Networks
35 -- 46Zhe Liu 0004, Cheng-Jian Qiu, Yu-Qing Song, Xiao-Hong Liu, Juan Wang, Victor S. Sheng. Texture Feature Extraction from Thyroid MR Imaging Using High-Order Derived Mean CLBP
47 -- 60Yifan Wu, Fan Yang, Yong Xu, Haibin Ling. Privacy-Protective-GAN for Privacy Preserving Face De-Identification
61 -- 76Wenguo Liu 0004, Lingfang Zeng, Dan Feng 0001, Kenneth B. Kent. ROCO: Using a Solid State Drive Cache to Improve the Performance of a Host-Aware Shingled Magnetic Recording Drive
77 -- 93Min Li, Chao Yang 0002, Qiao Sun, Wenjing Ma, Wenlong Cao, Yulong Ao. Enabling Highly Efficient k-Means Computations on the SW26010 Many-Core Processor of Sunway TaihuLight
94 -- 112Yang Hong, Yang Zheng, Fan Yang, Binyu Zang, Haibing Guan, Haibo Chen. Scaling out NUMA-Aware Applications with RDMA-Based Distributed Shared Memory
113 -- 132Ziqi Fan, Dongchul Park. Extending SSD Lifespan with Comprehensive Non-Volatile Memory-Based Write Buffers
133 -- 154Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management
155 -- 169Yuting Qiang, Yanwei Fu, Xiao Yu, Yanwen Guo, Zhi-Hua Zhou, Leonid Sigal. Learning to Generate Posters of Scientific Papers by Probabilistic Graphical Models
170 -- 184Yuliang Ma, Ye Yuan 0001, Feida Zhu, Guoren Wang, Jing Xiao, Jianzong Wang. Who Should Be Invited to My Party: A Size-Constrained k-Core Problem in Social Networks
185 -- 206Shuaibing Lu, Jie Wu 0001, Huanyang Zheng, Zhiyi Fang. On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model
207 -- 233Jianjun Zheng, Akbar Siami Namin. A Survey on the Moving Target Defense Strategies: An Architectural Perspective
234 -- 252Jingya Zhou, Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng. A Cost-Efficient Approach to Storing Users' Data for Online Social Networks