Abstract is missing.
- Blood Leukocyte Object Detection According to Model Parameter-Transfer and Deformable ConvolutionKaizhi Chen, Wencheng Wei, Shangping Zhong, Longkun Guo. 1-16 [doi]
- Heterogeneous Software Effort Estimation via Cascaded Adversarial Auto-EncoderFumin Qi, Xiao-Yuan Jing, Xiaoke Zhu, Xiaodong Jia, Li Cheng, Yichuan Dong, Ziseng Fang, Fei Ma, Shengzhong Feng. 17-29 [doi]
- A Novel Distributed Reinforcement Learning Method for Classical Chinese Poetry GenerationLiangliang Ma, Hong Shen 0001, Shangsong Liang. 30-42 [doi]
- Memory Access Optimization of High-Order CFD Stencil Computations on GPUShengxiang Wang, Zhuoqian Li, Yonggang Che. 43-56 [doi]
- The Dataflow Runtime Environment of DFCJing Zhang, Jinrong Li, Zheng Du, Jiwu Shu, Qiuming Luo. 57-69 [doi]
- Adaptive Tensor-Train Decomposition for Neural Network CompressionYanwei Zheng, Yang Zhou, Zengrui Zhao, Dongxiao Yu. 70-81 [doi]
- Development of a UAV Path Planning Approach for Multi-building Inspection with Minimal CostShiwei Lin, Xiaoying Kong, Jack Wang 0006, Ang Liu, Gengfa Fang, Yunlong Han. 82-93 [doi]
- Construction of Completely Independent Spanning Tree Based on Vertex DegreeNingning Liu, Yujie Zhang, Weibei Fan. 94-103 [doi]
- Distributed Algorithm for Truss Maintenance in Dynamic GraphsQi Luo, Dongxiao Yu, Hao Sheng, Jiguo Yu, Xiuzhen Cheng. 104-115 [doi]
- Short-Term Load Forecasting Based on CNN-BiLSTM with Bayesian Optimization and Attention MechanismKai Miao, Qiang Hua, Huifeng Shi. 116-128 [doi]
- On the Non-ergodic Convergence Rate of the Directed Nonsmooth Composite OptimizationYichuan Dong, Zhuo-Xu Cui, Yong Zhang, Shengzhong Feng. 129-140 [doi]
- 6D Pose Estimation Based on the Adaptive Weight of RGB-D FeatureGengshen Zhang, Li Ning, Liangbing Feng. 141-153 [doi]
- Blockchain-Based Secure Outsourcing of Fully Homomorphic Encryption Using Hidden Ideal LatticeMingYang Song, Yingpeng Sang, Yuying Zeng, Shunchao Luo. 154-165 [doi]
- Multiple Projections Learning for Dimensional ReductionLin Jiang, Xiaozhao Fang, Na Han. 166-171 [doi]
- Preventing DDoS Attacks on Bitcoin Memory Pool by the Dynamic Fee Threshold MechanismShunchao Luo, Yingpeng Sang, MingYang Song, Yuying Zeng. 172-184 [doi]
- The Compiler of DFC: A Source Code Converter that Transform the Dataflow Code to the Multi-threaded C CodeZheng Du, Jing Zhang, Jinrong Li, Haixin Du, Jiwu Shu, Qiuming Luo. 185-197 [doi]
- Online Learning-Based Co-task Dispatching with Function Configuration in Edge ComputingWanli Cao, Haisheng Tan, Zhenhua Han, Shuokang Han, Mingxia Li, Xiangyang Li 0001. 198-209 [doi]
- System-Level FPGA Routing for Logic Verification with Time-Division MultiplexingLong Sun, Longkun Guo, Peihuang Huang. 210-218 [doi]
- Protein Interresidue Contact Prediction Based on Deep Learning and Massive Features from Multi-sequence AlignmentHuiling Zhang, Hao Wu, Hing-Fung Ting, Yanjie Wei. 219-228 [doi]
- See Fine Color from the Rough Black-and-WhiteJingjing Wu, Li Ning 0001, Chan Zhou. 229-240 [doi]
- Data Aggregation Aware Routing for Distributed TrainingZhaohong Chen, Xin Long, Yalan Wu, Long Chen 0006, Jigang Wu, Shuangyin Liu. 241-250 [doi]
- A New Integer Programming Model for the File Transfer Scheduling ProblemJingwen Yang, Jiaxin Li, Xin Han. 251-263 [doi]
- Approximation Algorithms for the General Cluster Routing ProblemLongkun Guo, Bin Xing, Peihuang Huang, Xiaoyan Zhang. 264-273 [doi]
- Maximizing Group Coverage in Social NetworksYuting Zhong, Longkun Guo, Peihuang Huang. 274-284 [doi]
- LightLayers: Parameter Efficient Dense and Convolutional Layers for Image ClassificationDebesh Jha, Anis Yazidi, Michael A. Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen. 285-296 [doi]
- The Hybrid Navigation Method in Face of Dynamic ObstaclesKaidong Zhao, Li Ning. 297-303 [doi]
- A Relaxed Balanced Lock-Free Binary Search TreeManish Singh, Lindsay Groves, Alex Potanin. 304-317 [doi]
- A Dynamic Parameter Tuning Method for High Performance SpMMBin Qi, Kazuhiko Komatsu, Masayuki Sato 0001, Hiroaki Kobayashi. 318-329 [doi]
- Data Caching Based Transfer Optimization in Large Scale NetworksXinxin Han, Guichen Gao, Yang Wang, Hing-Fung Ting, Yong Zhang. 330-340 [doi]
- Second-Order Convolutional Neural Network Based on Cholesky Compression StrategyYan Li, Jing Zhang, Qiang Hua. 341-352 [doi]
- Submodular Maximization with Bounded Marginal ValuesRuiqi Yang, Suixiang Gao, Changjun Wang, Dongmei Zhang. 353-361 [doi]
- A Streaming Model for Monotone Lattice Submodular Maximization with a Cardinality ConstraintZhenning Zhang, Longkun Guo, Linyang Wang, Juan Zou. 362-370 [doi]
- The Prize-Collecting k-Steiner Tree ProblemLu Han, Changjun Wang, Dachuan Xu, Dongmei Zhang. 371-378 [doi]
- Optimal Algorithm of Isolated Toughness for Interval GraphsFengwei Li, Qingfang Ye, Hajo Broersma, Xiaoyan Zhang. 379-388 [doi]
- Graceful Performance Degradation in Apache StormMohammadReza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari. 389-400 [doi]