Abstract is missing.
- On a Coexisting Scheme for Multiple Flows in Multi-radio Multi-channel Wireless Mesh NetworksZhanmao Cao, Qisong Huang, Chase Q. Wu, Wenkang Kong, Aiqin Hou. 3-11 [doi]
- Non-linear K-Barrier Coverage in Mobile Sensor NetworkZijing Ma, Shuangjuan Li, Longkun Guo, Guohua Wang. 12-23 [doi]
- Interrupt Responsive Spinlock Mechanism Based on MCS for Multi-core RTOSJingqiu Zheng, Jiali Bian, Jian Kuang 0002. 24-34 [doi]
- A Novel Speedup Evaluation for Multicore Architecture Based Topology of On-Chip MemoryXiaojun Wang 0005, Feng Shi, Hong Zhang. 35-47 [doi]
- Improving the Performance of Collective Communication for the On-Chip NetworkSlo-Li Chu, Wen-Chih Ho, Yi-Jie Jiang. 48-57 [doi]
- A Survey of Multicast Communication in Optical Network-on-Chip (ONoC)Wen Yang, Yawen Chen, Zhiyi Huang 0001, Haibo Zhang 0001, Huaxi Gu, Cui Yu. 58-70 [doi]
- Virtual Network Embedding Based on Core and Coritivity of GraphJie Yang, Chenggui Zhao. 71-82 [doi]
- Non-time-Sharing Full-Duplex SWIPT Relay System with Energy Access PointYening Zhou, Taoshen Li, Zhe Wang, Jin Ye. 83-97 [doi]
- Recent Developments in Content Delivery Network: A SurveyJiaming Zhao, Pingjia Liang, Weiming Liufu, Zhengping Fan. 98-106 [doi]
- Weighted Mean Deviation Similarity Index for Objective Omnidirectional Video Quality AssessmentMengzhen Zhong, Junhao Chen, Yuzhen Niu. 109-117 [doi]
- Tire X-ray Image Defects Detection Based on Adaptive Thresholding MethodYuxiang Zhang, Naijie Gu, Xiaoci Zhang, Chuanwen Lin. 118-129 [doi]
- Halftone Image Reconstruction Based on SLIC Superpixel AlgorithmXinhong Zhang, Boyan Zhang, Fan Zhang 0028. 130-139 [doi]
- Study on the Method of Extracting Diabetes History from Unstructured Chinese Electronic Medical RecordChengzhi Niu, Xiaofan Zhao. 140-146 [doi]
- Deep Residual Optimization for Stereoscopic Image Color CorrectionYuanyuan Fan, Pengyu Liu, Yuzhen Niu. 147-158 [doi]
- Old Man Fall Detection Based on Surveillance Video Object TrackingZhao Qiu, Xiaoquan Liang, Qiaoqiao Chen, Xiangsheng Huang, Yiping Wang. 159-167 [doi]
- Electric Bicycle Violation Automatic Detection in Unconstrained ScenariosZhao Qiu, Qiaoqiao Chen, Xiangsheng Huang, Xiaoquan Liang. 168-174 [doi]
- Building a Lightweight Container-Based Experimental Platform for HPC EducationZelong Wang, Di Wu 0001, Zhenxiao Luo, Yunfei Du. 175-183 [doi]
- Automatic Generation and Assessment of Student Assignments for Parallel Programming LearningZhenxiao Luo, Zelong Wang, Di Wu, Xiaojun Hei, Yunfei Du. 184-194 [doi]
- 2: A Hybrid and Scalable Metadata Management Method in Distributed File SystemsYiduo Wang, Youxu Chen, Xinyang Shao, Jinzhong Chen, Liu Yuan, Yinlong Xu. 195-206 [doi]
- Heuristic Load Scheduling Algorithm for Stateful Cloud BPM EngineHaotian Zhang, Yang Yu, Maolin Pan. 209-220 [doi]
- An Improved Heuristic-Dynamic Programming Algorithm for Rectangular Cutting ProblemAihua Yin, Chong Chen, Dongping Hu, Jianghai Huang, Fan Yang. 221-233 [doi]
- Constrained Optimization via Quantum Genetic Algorithm for Task Scheduling ProblemZihan Yan, Hong Shen, Huiming Huang, Zexi Deng. 234-248 [doi]
- A Method of Business Process Bottleneck DetectionJiexuan Chen, Yang Yu, Maolin Pan. 249-261 [doi]
- Optimized Layout of the Soil Moisture Sensor in Tea Plantations Based on Improved Dijkstra AlgorithmManman Zhang, Wu Zhang, Xun Hong, Yifan Song, Yuan Rao, Yujia Gao, Yunyun Sun. 262-274 [doi]
- Efficient Algorithms for Constrained Clustering with Side InformationZhendong Hao, Longkun Guo, Pei-yao, Peihuang Huang, Huihong Peng. 275-286 [doi]
- Multi-objective Scheduling of Logistics UAVs Based on Simulated AnnealingYixuan Li, Xiaoxiang Yuan, Jie Zhu, Haiping Huang, Min Wu. 287-298 [doi]
- IFME: Influence Function Based Model Explanation for Black Box Decision SystemsBenbo Zha, Hong Shen. 299-310 [doi]
- GPU-Accelerated Parallel Aligning Long Reads with High Error Rate Using Enhanced Sparse Suffix ArrayHao Wei, Cheng Zhong, Danyang Chen, Meng-Xiao Yin, Jinxiong Zhang. 311-319 [doi]
- An Improved Algorithm for Building Suffix Array in External MemoryYi Wu 0011, Bin Lao, Xinghui Ma, Ge Nong. 320-330 [doi]
- In-Place Suffix Sorting on a Multicore Computer with Better DesignJing Yi Xie, Bin Lao, Ge Nong. 331-342 [doi]
- Any Privacy Risk if Nobody's Personal Information Being Collected?Tingting Feng, Xiaoyu Li, Yuchun Guo, Ti Wang, Shan Yang, Zhongyan Du. 345-356 [doi]
- Blockchain-Based Access Control Schemes for Medical Image Analysis SystemTonglai Liu, Jigang Wu, Xinpeng Zhang, Zhihao Peng, Jingyi Li. 357-367 [doi]
- Research on DDoS Abnormal Traffic Detection Under SDN NetworkZhaohui Ma, Jialiang Huang. 368-379 [doi]
- An Efficient Group Signature Based Digital Currency SystemHaibo Tian, Peiran Luo, Yinxue Su. 380-392 [doi]
- Detecting Anomalies in Cluster System Using Hybrid Deep Learning ModelChuming Xiao, Jiaming Huang, Weigang Wu. 393-404 [doi]
- Customs-Based Blockchain Solution for Exportation ProtectionHussam Juma, Khaled Shaalan, Ibrahim Kamel. 405-416 [doi]
- Customs-Based Distributed Risk Assessment MethodHussam Juma, Khaled Shaalan, Ibrahim Kamel. 417-429 [doi]
- Pufferfish Privacy Mechanism Based on Multi-dimensional Markov Chain Model for Correlated Categorical Data SequencesZhicheng Xi, Yingpeng Sang, Hanrui Zhong, Yongchun Zhang. 430-439 [doi]
- Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on CloudYongchun Zhang, Yingpeng Sang, Zhicheng Xi, Hanrui Zhong. 440-451 [doi]
- Secure Multi-Party Computation on Blockchain: An OverviewHanrui Zhong, Yingpeng Sang, Yongchun Zhang, Zhicheng Xi. 452-460 [doi]
- A Survey of Privacy-Preserving Techniques on Trajectory DataSongyuan Li, Hong Shen 0001, Yingpeng Sang. 461-476 [doi]
- Minimizing Off-Chip Memory Access for Deep Convolutional Neural Network TrainingJijun Wang, Hongliang Li. 479-491 [doi]
- Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient ComputingBao-Feng, Peixin He, Yunyao Li, Junfeng Wu, Peng Li, Haichang Yao, Yimu Ji, Chao Min, Jiekui Zhang, Youtao Li, Peizhuang Wang, Yong Shi, Jing He 0004, Hui Zheng, Yang Wang. 492-506 [doi]
- Barrage Video Recommendation Method Based on Convolutional Recursive Neural NetworkSiyuan Ma, Ping He. 507-518 [doi]
- A Pipelining Strategy for Accelerating Convolutional Networks on ARM ProcessorsXin Zhou, Rongchun Li, Peng Zhang 0035, Yuntao Liu, Yong Dou. 519-530 [doi]
- Prediction Model of Suspect Number Based on Deep LearningChuyue Zhang, Manchun Cai, Xiaofan Zhao, Luzhe Cao, Dawei Wang. 531-540 [doi]
- A Sequence-to-Sequence Transformer Premised Temporal Convolutional Network for Chinese Word SegmentationWei Jiang, Yuan Wang, Yan Tang. 541-552 [doi]