Journal of Computer Science and Technology
Quick Search in JCST
 Advanced Search 
      Home | PrePrint | SiteMap | Contact Us | FAQ
 
Indexed by   SCIE, EI ...
Bimonthly    Since 1986
   
   ABOUT JCST            
   JCST GUIDELINE      
   SEARCH JCST  
   PUBLISHED ISSUES  
   SUBSCRIBE TO JCST  
   DOWNLOADS  

Google
 
   

JCST Papers Published in 2015~2016

 

Computer Architecture and Systems (36)

Artificial Intelligence and Pattern Recognition (46)

Computer Graphics and Multimedia (30)

Data Management and Data Mining (65)

Software Systems (19)

Computer Networks and Distributed Computing (34)

Theory and Algorithms (18)

Emerging Areas (1)

 

Computer Architecture and Systems

1

Survey

A Survey of Phase Change Memory Systems

Xia, Fei; Jiang, De-Jun; Xiong, Jin; Sun, Ning-Hui

2015, 30(1): 121-144, DOI: 10.1007/s11390-015-1509-2.

2

Highly Optimized Code Generation for Stencil Codes with Computation Reuse for GPUs

Ma, Wen-Jing; Gao, Kan; Long, Guo-Ping

2016, 31(6): 1262-1274, DOI: 10.1007/s11390-016-1696-5.

3

Reducing the Upper Bound Delay by Optimizing Bank-to-Core Mapping

Zhang, Ji-Zan; Gu, Zhi-Min; Zhang, Ming-Quan

2016, 31(6): 1179-1193, DOI: 10.1007/s11390-016-1691-x.

4

Enhanced Userspace and In-Kernel Trace Filtering for Production Systems

Sharma, Suchakrapani Datt; Dagenais, Michel

2016, 31(6): 1161-1178, DOI: 10.1007/s11390-016-1690-y.

5

Reducing Synchronization Cost for Single-Level Store in Mobile Systems

Xu, Yuan-Chao; Wan, Hu; Qiu, Ke-Ni; Li, Tao; Zhang, Wei-Gong

2016, 31(4): 836-848, DOI: 10.1007/s11390-016-1666-y.

6

A Data Deduplication Framework of Disk Images with Adaptive Block Skipping

Zhou, Bing; Wen, Jiang-Tao

2016, 31(4): 820-835, DOI: 10.1007/s11390-016-1665-z.

7

Improving Metadata Caching Efficiency for Data Deduplication via In-RAM Metadata Utilization

Zhou, Bing; Wen, Jiang-Tao

2016, 31(4): 805-819, DOI: 10.1007/s11390-016-1664-0.

8

Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient Faults

Cui, Xiao-Tong; Wu, Kai-Jie; Wei, Tong-Quan; Sha, Edwin Hsing-Mean

2016, 31(2): 267-283, DOI: 10.1007/s11390-016-1626-6.

9

Wide Operational Range Processor Power Delivery Design for Both Super-Threshold Voltage and Near-Threshold Voltage Computing

He, Xin; Yan, Gui-Hai; Han, Yin-He; Li, Xiao-Wei

2016, 31(2): 253-266, DOI: 10.1007/s11390-016-1625-7.

10

Pragma Directed Shared Memory Centric Optimizations on GPUs

Li, Jing; Liu, Lei; Wu, Yuan; Liu, Xiang-Hua; Gao, Yi; Feng, Xiao-Bing; Wu, Cheng-Yong

2016, 31(2): 235-252, DOI: 10.1007/s11390-016-1624-8.

11

A Unified Buffering Management with Set Divisible Cache for PCM Main Memory

Bian, Mei-Ying; Yoon, Su-Kyung; Kim, Jeong-Geun; Nam, Sangjae; Kim, Shin-Dug

2016, 31(1): 137-146, DOI: 10.1007/s11390-016-1617-7.

12

Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function

Zhang, Ji-Liang; Wu, Qiang; Ding, Yi-Peng; Lv, Yong-Qiang; Zhou, Qiang; Xia, Zhi-Hua; Sun, Xing-Ming; Wang, Xing-Wei

2016, 31(1): 124-136, DOI: 10.1007/s11390-016-1616-8.

13

Metcalfe's Law and Network Quality: An Extension of Zhang et al.

Van Hove, Leo

2016, 31(1): 117-123, DOI: 10.1007/s11390-016-1615-9.

14

Optimizations for High Performance Network Virtualization

Zhou, Fan-Fu; Ma, Ru-Hui; Li, Jian; Chen, Li-Xia; Qiu, Wei-Dong; Guan, Hai-Bing

2016, 31(1): 107-116, DOI: 10.1007/s11390-016-1614-x.

15

Modular Timing Constraints for Delay-Insensitive Systems

Park, Hoon; He, Anping; Roncken, Marly; Song, Xiaoyu; Sutherland, Ivan

2016, 31(1): 77-106, DOI: 10.1007/s11390-016-1613-y.

16

Modelling Spiking Neural Network from the Architecture Evaluation Perspective

Ji, Yu; Zhang, You-Hui; Zheng, Wei-Min

2016, 31(1): 50-59, DOI: 10.1007/s11390-016-1611-0.

17

Performance-Centric Optimization for Racetrack Memory Based Register File on GPUs

Liang, Yun; Wang, Shuo

2016, 31(1): 36-49, DOI: 10.1007/s11390-016-1610-1.

18

BACH: A Bandwidth-Aware Hybrid Cache Hierarchy Design with Nonvolatile Memories

Zhao, Jishen; Xu, Cong; Zhang, Tao; Xie, Yuan

2016, 31(1): 20-35, DOI: 10.1007/s11390-016-1609-7.

19

Technological Exploration of RRAM Crossbar Array for Matrix-Vector Multiplication

Xia, Lixue; Gu, Peng; Li, Boxun; Tang, Tianqi; Yin, Xiling; Huangfu, Wenqin; Yu, Shimeng; Cao, Yu; Wang, Yu; Yang, Huazhong

2016, 31(1): 3-19, DOI: 10.1007/s11390-016-1608-8.

20

Design-Rule-Aware Congestion Model with Explicit Modeling of Vias and Local Pin Access Paths

Qi, Zhong-Dong; Cai, Yi-Ci; Zhou, Qiang

2015, 30(3): 614-628, DOI: 10.1007/s11390-015-1515-4.

21

Register Clustering Methodology for Low Power Clock Tree Synthesis

Deng, Chao; Cai, Yi-Ci; Zhou, Qiang

2015, 30(2): 391-403, DOI: 10.1007/s11390-015-1531-4.

22

Fatman: Building Reliable Archival Storage Based on Low-Cost Volunteer Resources

Qin, An; Hu, Dian-Ming; Liu, Jun; Yang, Wen-Jun; Tan, Dai

2015, 30(2): 273-282, DOI: 10.1007/s11390-015-1521-6.

23

High Performance Interconnect Network for Tianhe System

Liao, Xiang-Ke; Pang, Zheng-Bin; Wang, Ke-Fei; Lu, Yu-Tong; Xie, Min; Xia, Jun; Dong, De-Zun; Suo, Guang

2015, 30(2): 259-272, DOI: 10.1007/s11390-015-1520-7.

24

Software-Defined Cluster

Nie, Hua; Yang, Xiao-Jun; Liu, Tao-Ying

2015, 30(2): 252-258, DOI: 10.1007/s11390-015-1519-0.

25

Tencent and Facebook Data Validate Metcalfe's Law

Zhang, Xing-Zhou; Liu, Jing-Jie; Xu, Zhi-Wei

2015, 30(2): 246-251, DOI: 10.1007/s11390-015-1518-1.

26

Reevaluating Data Stall Time with the Consideration of Data Access Concurrency

Liu, Yu-Hang; Sun, Xian-He

2015, 30(2): 227-245, DOI: 10.1007/s11390-015-1517-2.

27

Cooperative Computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture

Zheng, Fang; Li, Hong-Liang; Lv, Hui; Guo, Feng; Xu, Xiao-Hong; Xie, Xiang-Hui

2015, 30(1): 145-162, DOI: 10.1007/s11390-015-1510-9.

28

Improving the Performance and Energy Efficiency of Phase Change Memory Systems

Wang, Qi; Li, Jia-Rui; Wang, Dong-Hui

2015, 30(1): 110-120, DOI: 10.1007/s11390-015-1508-3.

29

Adapting Memory Hierarchies for Emerging Datacenter Interconnects

Jiang, Tao; Hou, Rui; Dong, Jian-Bo; Chai, Lin; McKee, Sally A.; Tian, Bin; Zhang, Li-Xin; Sun, Ning-Hui

2015, 30(1): 97-109, DOI: 10.1007/s11390-015-1507-4.

30

CRAIS: A Crossbar-Based Interconnection Scheme on FPGA for Big Data

Wang, Chao; Li, Xi; Zhou, Xue-Hai

2015, 30(1): 84-96, DOI: 10.1007/s11390-015-1506-5.

31

Exploring Heterogeneous NoC Design Space in Heterogeneous GPU-CPU Architectures

Fang, Juan; Leng, Zhen-Yu; Liu, Si-Tong; Yao, Zhi-Cheng; Sui, Xiu-Feng

2015, 30(1): 74-83, DOI: 10.1007/s11390-015-1505-6.

32

System-Enforced Deterministic Streaming for Efficient Pipeline Parallelism

Zhang, Yu; Li, Zhao-Peng; Cao, Hui-Fang

2015, 30(1): 57-73, DOI: 10.1007/s11390-015-1504-7.

33

An Efficient and Flexible Deterministic Framework for Multithreaded Programs

Lu, Kai; Zhou, Xu; Wang, Xiao-Ping; Bergan, Tom; Chen, Chen

2015, 30(1): 42-56, DOI: 10.1007/s11390-015-1503-8.

34

Using Memory in the Right Way to Accelerate Big Data Processing

Yan, Dong; Yin, Xu-Sen; Lian, Cheng; Zhong, Xiang; Zhou, Xin; Wu, Gan-Sha

2015, 30(1): 30-41, DOI: 10.1007/s11390-015-1502-9.

35

Bipartite-Oriented Distributed Graph Partitioning for Big Learning

Chen, Rong; Shi, Jia-Xin; Chen, Hai-Bo; Zang, Bin-Yu

2015, 30(1): 20-29, DOI: 10.1007/s11390-015-1501-x.

36

CUDA-NP: Realizing Nested Thread-Level Parallelism in GPGPU Applications

Yang, Yi; Li, Chao; Zhou, Huiyang

2015, 30(1): 3-19, DOI: 10.1007/s11390-015-1500-y.

TOP

 

Artificial Intelligence and Pattern Recognition

1

Survey

Subgroup Discovery Algorithms: A Survey and Empirical Evaluation

Helal, Sumyea

2016, 31(3): 561-576, DOI: 10.1007/s11390-016-1647-1.

2

A Tensor Neural Network with Layerwise Pretraining: Towards Effective Answer Retrieval

Bao, Xin-Qi; Wu, Yun-Fang

2016, 31(6): 1151-1160, DOI: 10.1007/s11390-016-1689-4.

3

Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games

Liu, Yang; Zhang, Guo-Fu; Su, Zhao-Pin; Yue, Feng; Jiang, Jian-Guo

2016, 31(6): 1136-1150, DOI: 10.1007/s11390-016-1688-5.

4

UiLog: Improving Log-Based Fault Diagnosis by Log Analysis

Zou, De-Qing; Qin, Hao; Jin, Hai

2016, 31(5): 1038-1052, DOI: 10.1007/s11390-016-1678-7.

5

Budget Allocation for Maximizing Viral Advertising in Social Networks

Zhang, Bo-Lei; Qian, Zhu-Zhong; Li, Wen-Zhong; Tang, Bin; Lu, Sang-; Fu, Xiaoming

2016, 31(4): 759-775, DOI: 10.1007/s11390-016-1661-3.

6

Web News Extraction via Tag Path Feature Fusion Using DS Theory

Wu, Gong-Qing; Li, Lei; Li, Li; Wu, Xindong

2016, 31(4): 661-672, DOI: 10.1007/s11390-016-1655-1.

7

Learning Better Word Embedding by Asymmetric Low-Rank Projection of Knowledge Graph

Tian, Fei; Gao, Bin; Chen, En-Hong; Liu, Tie-Yan

2016, 31(3): 624-634, DOI: 10.1007/s11390-016-1651-5.

8

A Hybrid Method of Domain Lexicon Construction for Opinion Targets Extraction Using Syntax and Semantics

Liao, Chun; Feng, Chong; Yang, Sen; Huang, He-Yan

2016, 31(3): 595-603, DOI: 10.1007/s11390-016-1649-z.

9

Trinity: Walking on a User-Object-Tag Heterogeneous Network for Personalised Recommendations

Gan, Ming-Xin; Sun, Lily; Jiang, Rui

2016, 31(3): 577-594, DOI: 10.1007/s11390-016-1648-0.

10

Texture Repairing by Unified Low Rank Optimization

Liang, Xiao; Ren, Xiang; Zhang, Zhengdong; Ma, Yi

2016, 31(3): 525-546, DOI: 10.1007/s11390-016-1645-3.

11

A Modified Fuzzy C-Means Algorithm for Brain MR Image Segmentation and Bias Field Correction

Deng, Wen-Qian; Li, Xue-Mei; Gao, Xifeng; Zhang, Cai-Ming

2016, 31(3): 501-511, DOI: 10.1007/s11390-016-1643-5.

12

Multi-Task Learning for Food Identification and Analysis with Deep Convolutional Neural Networks

Zhang, Xi-Jin; Lu, Yi-Fan; Zhang, Song-Hai

2016, 31(3): 489-500, DOI: 10.1007/s11390-016-1642-6.

13

A Linear Approach for Depth and Colour Camera Calibration Using Hybrid Parameters

Cheng, Ke-Li; Ju, Xuan; Tong, Ruo-Feng; Tang, Min; Chang, Jian; Zhang, Jian-Jun

2016, 31(3): 479-488, DOI: 10.1007/s11390-016-1641-7.

14

View-Aware Image Object Compositing and Synthesis from Multiple Sources

Chen, Xiang; Xu, Wei-Wei; Yeung, Sai-Kit; Zhou, Kun

2016, 31(3): 463-478, DOI: 10.1007/s11390-016-1640-8.

15

Tuning the Learning Rate for Stochastic Variational Inference

Li, Xi-Ming; Ouyang, Ji-Hong

2016, 31(2): 428-436, DOI: 10.1007/s11390-016-1636-4.

16

A Parallel Genetic Algorithm Based on Spark for Pairwise Test Suite Generation

Qi, Rong-Zhi; Wang, Zhi-Jian; Li, Shui-Yan

2016, 31(2): 417-427, DOI: 10.1007/s11390-016-1635-5.

17

A Parallel Markov Cerebrovascular Segmentation Algorithm Based on Statistical Model

Cao, Rong-Fei; Wang, Xing-Ce; Wu, Zhong-Ke; Zhou, Ming-Quan; Liu, Xin-Yu

2016, 31(2): 400-416, DOI: 10.1007/s11390-016-1634-6.

18

A Novel Spatial Pooling Strategy for Image Quality Assessment

Li, Qiaohong; Fang, Yu-Ming; Xu, Jing-Tao

2016, 31(2): 225-234, DOI: 10.1007/s11390-016-1623-9.

19

Adaptive Photon Mapping Based on Gradient

Kang, Chun-Meng; Wang, Lu; Xu, Yan-Ning; Meng, Xiang-Xu; Song, Yuan-Jie

2016, 31(1): 217-224, DOI: 10.1007/s11390-016-1622-x.

20

Modelling Spiking Neural Network from the Architecture Evaluation Perspective

Ji, Yu; Zhang, You-Hui; Zheng, Wei-Min

2016, 31(1): 50-59, DOI: 10.1007/s11390-016-1611-0.

21

SEIP: System for Efficient Image Processing on Distributed Platform

Liu, Tao; Liu, Yi; Li, Qin; Wang, Xiang-Rong; Gao, Fei; Zhu, Yan-Chao; Qian De-Pei

2015, 30(6): 1215-1232, DOI: 10.1007/s11390-015-1595-1.

22

From Interest to Location: Neighbor-Based Friend Recommendation in Social Media

Zhu, Jin-Qi; Lu, Li; Ma, Chun-Mei

2015, 30(6): 1188-1200, DOI: 10.1007/s11390-015-1593-3.

23

Discovering Family Groups in Passenger Social Networks

Wan, Huai-Yu; Wang, Zhi-Wei; Lin, You-Fang; Jia, Xu-Guang; Zhou, Yuan-Wei

2015, 30(5): 1141-1153, DOI: 10.1007/s11390-015-1589-z.

24

Microblog Sentiment Analysis with Emoticon Space Model

Jiang, Fei; Liu, Yi-Qun; Luan, Huan-Bo; Sun, Jia-Shen; Zhu, Xuan; Zhang, Min; Ma, Shao-Ping

2015, 30(5): 1120-1129, DOI: 10.1007/s11390-015-1587-1.

25

Clustering Context-Dependent Opinion Target Words in Chinese Product Reviews

Zhang, Yu; Liu, Miao; Xia, Hai-Xia

2015, 30(5): 1109-1119, DOI: 10.1007/s11390-015-1586-2.

26

Anomaly Detection in Microblogging via Co-Clustering

Yang, Wu; Shen, Guo-Wei; Wang, Wei; Gong, Liang-Yi; Yu, Miao; Dong, Guo-Zhong

2015, 30(5): 1097-1108, DOI: 10.1007/s11390-015-1585-3.

27

Detecting Marionette Microblog Users for Improved Information Credibility

Wu, Xian; Fan, Wei; Gao, Jing; Feng, Zi-Ming; Yu, Yong

2015, 30(5): 1082-1096, DOI: 10.1007/s11390-015-1584-4.

28

iBole: A Hybrid Multi-Layer Architecture for Doctor Recommendation in Medical Social Networks

Gong, Ji-Bing; Wang, Li-Li; Sun, Sheng-Tao; Peng, Si-Wei

2015, 30(5): 1073-1081, DOI: 10.1007/s11390-015-1583-5.

29

Tag Correspondence Model for User Tag Suggestion

Tu, Cun-Chao; Liu, Zhi-Yuan; Sun, Mao-Song

2015, 30(5): 1063-1072, DOI: 10.1007/s11390-015-1582-6.

30

Mining Intention-Related Products on Online Q&A Community

Duan, Jun-Wen; Chen, Yi-Heng; Liu, Ting; Ding, Xiao

2015, 30(5): 1054-1062, DOI: 10.1007/s11390-015-1581-7.

31

Social Trust Aware Item Recommendation for Implicit Feedback

Guo, Lei; Ma, Jun; Jiang, Hao-Ran; Chen, Zhu-Min; Xing, Chang-Ming

2015, 30(5): 1039-1053, DOI: 10.1007/s11390-015-1580-8.

32

Multi-Factor Duplicate Question Detection in Stack Overflow

Zhang, Yun; Lo, David; Xia, Xin; Sun, Jian-Ling

2015, 30(5): 981-997, DOI: 10.1007/s11390-015-1576-4.

33

When Factorization Meets Heterogeneous Latent Topics: An Interpretable Cross-Site Recommendation Framework

Xin, Xin; Lin, Chin-Yew; Wei, Xiao-Chi; Huang, He-Yan

2015, 30(4): 917-932, DOI: 10.1007/s11390-015-1570-x.

34

Leveraging Large Data with Weak Supervision for Joint Feature and Opinion Word Extraction

Fang, Lei; Liu, Biao; Huang, Min-Lie

2015, 30(4): 903-916, DOI: 10.1007/s11390-015-1569-3.

35

Learning to Predict Links by Integrating Structure and Interaction Information in Microblogs

Jia, Yan-Tao; Wang, Yuan-Zhuo; Cheng, Xue-Qi

2015, 30(4): 829-842, DOI: 10.1007/s11390-015-1563-9.

36

The Best Answers? Think Twice: Identifying Commercial Campagins in the CQA Forums

Chen, Cheng; Wu, Kui; Srinivasan, Venkatesh; Kesav, Bharadwaj R.

2015, 30(4): 810-828, DOI: 10.1007/s11390-015-1562-x.

37

A Structure Learning Algorithm for Bayesian Network Using Prior Knowledge

Xu, Jun-Gang; Zhao, Yue; Chen, Jian; Han, Chao

2015, 30(4): 713-724, DOI: 10.1007/s11390-015-1556-8.

38

A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks

Guo, Linke; Zhang, Chi; Fang, Yuguang; Lin, Phone

2015, 30(3): 578-597, DOI: 10.1007/s11390-015-1547-9.

39

Enlarging Image by Constrained Least Square Approach with Shape Preserving

Zhang, Fan; Zhang, Xin; Qin, Xue-Ying; Zhang, Cai-Ming

2015, 30(3): 489-498, DOI: 10.1007/s11390-015-1539-9.

40

Structure-Aware Nonlocal Optimization Framework for Image Colorization

Zhao, Han-Li; Nie, Gui-Zhi; Li, Xu-Jie; Jin, Xiao-Gang; Pan, Zhi-Geng

2015, 30(3): 478-488, DOI: 10.1007/s11390-015-1538-x.

41

PhotoPrev: Unifying Context and Content Cues to Enhance Personal Photo Revisitation

Jin, Li; Liu, Gang-Li; Zhao, Liang; Feng, Ling

2015, 30(3): 453-466, DOI: 10.1007/s11390-015-1536-z.

42

Raw Trajectory Rectification via Scene-Free Splitting and Stitching

Guo, Chun-Chao; Hu, Xiao-Jun; Lai, Jian-Huang; Shi, Shi-Chang; Chen, Shi-Zhe

2015, 30(2): 364-372, DOI: 10.1007/s11390-015-1529-y.

43

Robust Video Text Detection with Morphological Filtering Enhanced MSER

Zhuge, Yun-Zhi; Lu, Hu-Chuan

2015, 30(2): 353-363, DOI: 10.1007/s11390-015-1528-z.

44

RGB-D Hand-Held Object Recognition Based on Heterogeneous Feature Fusion

Lv, Xiong; Jiang, Shu-Qiang; Herranz, Luis; Wang, Shuang

2015, 30(2): 340-352, DOI: 10.1007/s11390-015-1527-0.

45

VFM: Visual Feedback Model for Robust Object Recognition

Wang, Chong; Huang, Kai-Qi

2015, 30(2): 325-339, DOI: 10.1007/s11390-015-1526-1.

46

Global Optimization for Advertisement Selection in Sponsored Search

Cui, Qing; Bai, Feng-Shan; Gao, Bin; Liu, Tie-Yan

2015, 30(2): 295-310, DOI: 10.1007/s11390-015-1523-4.


TOP

 

Computer Graphics and Multimedia

1

Survey

A Survey of Visual Analytic Pipelines

Wang, Xu-Meng; Zhang, Tian-Ye; Ma, Yu-Xin; Xia, Jing; Chen, Wei

2016, 31(4): 787-804, DOI: 10.1007/s11390-016-1663-1.

2

Survey

Survey on Discrete Surface Ricci Flow

Zhang, Min; Zeng, Wei; Guo, Ren; Luo, Feng; Gu, Xianfeng David

2015, 30(3): 598-613, DOI: 10.1007/s11390-015-1548-8.

3

Survey

A Survey of Blue-Noise Sampling and Its Applications

Yan, Dong-Ming; Guo, Jian-Wei; Wang, Bin; Zhang, Xiao-Peng; Wonka, Peter

2015, 30(3): 439-452, DOI: 10.1007/s11390-015-1535-0.

4

Survey

SRAM-Based FPGA Systems for Safety-Critical Applications: A Survey on Design Standards and Proposed Methodologies

Bernardeschi, Cinzia; Cassano, Luca; Domenici, Andrea

2015, 30(2): 373-390, DOI: 10.1007/s11390-015-1530-5.

5

CPA-VoD: Cloud and Peer-Assisted Video on Demand System for Mobile Devices

Cheng, Lei-Gen; Cui, Laizhong; Jiang, Yong

2016, 31(6): 1087-1095, DOI: 10.1007/s11390-016-1684-9.

6

Variance Analysis and Adaptive Sampling for Indirect Light Path Reuse

Qin, Hao; Sun, Xin; Yan, Jun; Hou, Qi-Ming; Ren, Zhong; Zhou, Kun

2016, 31(3): 547-560, DOI: 10.1007/s11390-016-1646-2.

7

Texture Repairing by Unified Low Rank Optimization

Liang, Xiao; Ren, Xiang; Zhang, Zhengdong; Ma, Yi

2016, 31(3): 525-546, DOI: 10.1007/s11390-016-1645-3.

8

Nonlinear Dimensionality Reduction by Local Orthogonality Preserving Alignment

Lin, Tong; Liu, Yao; Wang, Bo; Wang, Li-Wei; Zha, Hong-Bin

2016, 31(3): 512-524, DOI: 10.1007/s11390-016-1644-4.

9

A Modified Fuzzy C-Means Algorithm for Brain MR Image Segmentation and Bias Field Correction

Deng, Wen-Qian; Li, Xue-Mei; Gao, Xifeng; Zhang, Cai-Ming

2016, 31(3): 501-511, DOI: 10.1007/s11390-016-1643-5.

10

A Linear Approach for Depth and Colour Camera Calibration Using Hybrid Parameters

Cheng, Ke-Li; Ju, Xuan; Tong, Ruo-Feng; Tang, Min; Chang, Jian; Zhang, Jian-Jun

2016, 31(3): 479-488, DOI: 10.1007/s11390-016-1641-7.

11

View-Aware Image Object Compositing and Synthesis from Multiple Sources

Chen, Xiang; Xu, Wei-Wei; Yeung, Sai-Kit; Zhou, Kun

2016, 31(3): 463-478, DOI: 10.1007/s11390-016-1640-8.

12

Improving Shape from Shading with Interactive Tabu Search

Wu, Jing; Rosin, Paul L.; Sun, Xianfang; Martin, Ralph R.

2016, 31(3): 450-462, DOI: 10.1007/s11390-016-1639-1.

13

Skeleton-Sectional Structural Analysis for 3D Printing

Xu, Wen-Peng; Li, Wei; Liu, Li-Gang

2016, 31(3): 439-449, DOI: 10.1007/s11390-016-1638-2.

14

A Parallel Markov Cerebrovascular Segmentation Algorithm Based on Statistical Model

Cao, Rong-Fei; Wang, Xing-Ce; Wu, Zhong-Ke; Zhou, Ming-Quan; Liu, Xin-Yu

2016, 31(2): 400-416, DOI: 10.1007/s11390-016-1634-6.

15

A Novel Spatial Pooling Strategy for Image Quality Assessment

Li, Qiaohong; Fang, Yu-Ming; Xu, Jing-Tao

2016, 31(2): 225-234, DOI: 10.1007/s11390-016-1623-9.

16

Adaptive Photon Mapping Based on Gradient

Kang, Chun-Meng; Wang, Lu; Xu, Yan-Ning; Meng, Xiang-Xu; Song, Yuan-Jie

2016, 31(1): 217-224, DOI: 10.1007/s11390-016-1622-x.

17

3D Ear Shape Matching Using Joint alpha-Entropy

Sun, Xiao-Peng; Li, Si-Hui; Han, Feng; Wei, Xiao-Peng

2015, 30(3): 565-577, DOI: 10.1007/s11390-015-1546-x.

18

Stretch-Minimizing Volumetric Parameterization

Jin, Yao; Qian, Gui-Ping; Zhao, Jie-Yi; Chang, Jian; Tong, Ruo-Feng; Zhang, Jianjun

2015, 30(3): 553-564, DOI: 10.1007/s11390-015-1545-y.

19

Spectral Animation Compression

Wang, Chao; Liu, Yang; Guo, Xiaohu; Zhong, Zichun; Le, Binh; Deng, Zhigang

2015, 30(3): 540-552, DOI: 10.1007/s11390-015-1544-z.

20

Monocular Video Guided Garment Simulation

Li, Fa-Ming; Chen, Xiao-Wu; Zhou, Bin; Lu, Fei-Xiang; Guo, Kan; Fu, Qiang

2015, 30(3): 528-539, DOI: 10.1007/s11390-015-1543-0.

21

Coherent Photon Mapping on the Intel MIC Architecture

Kang, Chun-Meng; Wang, Lu; Wang, Pei; Xu, Yan-Ning; Meng, Xiang-Xu

2015, 30(3): 519-527, DOI: 10.1007/s11390-015-1542-1.

22

GPU Accelerated Real-Time Collision Handling in Virtual Disassembly

Du, Peng; Zhao, Jie-Yi; Pan, Wan-Bin; Wang, Yi-Gang

2015, 30(3): 511-518, DOI: 10.1007/s11390-015-1541-2.

23

Facial Similarity Learning with Humans in the Loop

Cao, Chong; Ai, Hai-Zhou

2015, 30(3): 499-510, DOI: 10.1007/s11390-015-1540-3.

24

Enlarging Image by Constrained Least Square Approach with Shape Preserving

Zhang, Fan; Zhang, Xin; Qin, Xue-Ying; Zhang, Cai-Ming

2015, 30(3): 489-498, DOI: 10.1007/s11390-015-1539-9.

25

Structure-Aware Nonlocal Optimization Framework for Image Colorization

Zhao, Han-Li; Nie, Gui-Zhi; Li, Xu-Jie; Jin, Xiao-Gang; Pan, Zhi-Geng

2015, 30(3): 478-488, DOI: 10.1007/s11390-015-1538-x.

26

Efficient Video Cutout by Paint Selection

Zhang, Yun; Tang, Yan-Long; Cheng, Ke-Li

2015, 30(3): 467-477, DOI: 10.1007/s11390-015-1537-y.

27

Raw Trajectory Rectification via Scene-Free Splitting and Stitching

Guo, Chun-Chao; Hu, Xiao-Jun; Lai, Jian-Huang; Shi, Shi-Chang; Chen, Shi-Zhe

2015, 30(2): 364-372, DOI: 10.1007/s11390-015-1529-y.

28

Robust Video Text Detection with Morphological Filtering Enhanced MSER

Zhuge, Yun-Zhi; Lu, Hu-Chuan

2015, 30(2): 353-363, DOI: 10.1007/s11390-015-1528-z.

29

RGB-D Hand-Held Object Recognition Based on Heterogeneous Feature Fusion

Lv, Xiong; Jiang, Shu-Qiang; Herranz, Luis; Wang, Shuang

2015, 30(2): 340-352, DOI: 10.1007/s11390-015-1527-0.

30

VFM: Visual Feedback Model for Robust Object Recognition

Wang, Chong; Huang, Kai-Qi

2015, 30(2): 325-339, DOI: 10.1007/s11390-015-1526-1.

TOP

 

Data Management and Data Mining

1

Survey

Survey of Large-Scale Data Management Systems for Big Data Applications

Wu, Lengdong; Yuan, Liyan; You, Jiahuai

2015, 30(1): 163-183, DOI: 10.1007/s11390-015-1511-8.

2

An Efficient Approach of Processing Multiple Continuous Queries

Liu, Wen; Shen, Yan-Ming; Wang, Peng

2016, 31(6): 1212-1227, DOI: 10.1007/s11390-016-1693-8.

3

Efficient Metric All-k-Nearest-Neighbor Search on Datasets Without Any Index

Zhang, Hai-Da; Xing, Zhi-Hao; Chen, Lu;  Gao, Yun-Jun

2016, 31(6): 1194-1211, DOI: 10.1007/s11390-016-1692-9.

4

Topological Features Based Entity Disambiguation

Sun, Chen-Chen; Shen, De-Rong; Kou, Yue; Nie, Tie-Zheng; Yu, Ge

2016, 31(5): 1053-1068, DOI: 10.1007/s11390-016-1679-6.

5

HUITWU: An Efficient Algorithm for High-Utility Itemset Mining in Transaction Databases

Guo, Shi-Ming; Gao, Hong

2016, 31(4): 776-786, DOI: 10.1007/s11390-016-1662-2.

6

Content-Related Repairing of Inconsistencies in Distributed Data

Du, Yue-Feng; Shen, De-Rong; Nie, Tie-Zheng; Kou, Yue; Yu, Ge

2016, 31(4): 741-758, DOI: 10.1007/s11390-016-1660-4.

7

Determining the Real Data Completeness of a Relational Dataset

Liu, Yong-Nan; Li, Jian-Zhong; Zou, Zhao-Nian

2016, 31(4): 720-740, DOI: 10.1007/s11390-016-1659-x.

8

Keyword Query over Error-Tolerant Knowledge Bases

Cheng, Yu-Rong; Yuan, Ye; Li, Jia-Yu; Chen, Lei; Wang, Guo-Ren

2016, 31(4): 702-719, DOI: 10.1007/s11390-016-1658-y.

9

Efficient Set-Correlation Operator Inside Databases

Gao, Fei; Song, Shao-Xu; Chen, Lei; Wang, Jian-Min

2016, 31(4): 683-701, DOI: 10.1007/s11390-016-1657-z.

10

Online Feature Selection of Class Imbalance via PA Algorithm

Han, Chao; Tan, Yun-Kun; Zhu, Jin-Hui; Guo, Yong; Chen, Jian; Wu, Qing-Yao

2016, 31(4): 673-682, DOI: 10.1007/s11390-016-1656-0.

11

Web News Extraction via Tag Path Feature Fusion Using DS Theory

Wu, Gong-Qing; Li, Lei; Li, Li; Wu, Xindong

2016, 31(4): 661-672, DOI: 10.1007/s11390-016-1655-1.

12

Mining Object Similarity for Predicting Next Locations

Chen, Meng; Yu, Xiaohui; Liu, Yang

2016, 31(4): 649-660, DOI: 10.1007/s11390-016-1654-2.

13

Dynamic Shortest Path Monitoring in Spatial Networks

Shang, Shuo; Chen, Lisi; Wei, Zhe-; Guo, Dan-Huai; Wen, Ji-Rong

2016, 31(4): 637-648, DOI: 10.1007/s11390-016-1653-3.

14

Trinity: Walking on a User-Object-Tag Heterogeneous Network for Personalised Recommendations

Gan, Ming-Xin; Sun, Lily; Jiang, Rui

2016, 31(3): 577-594, DOI: 10.1007/s11390-016-1648-0.

15

Tuning the Learning Rate for Stochastic Variational Inference

Li, Xi-Ming; Ouyang, Ji-Hong

2016, 31(2): 428-436, DOI: 10.1007/s11390-016-1636-4.

16

Answering Reachability Queries on Incrementally Updated Graphs by Hierarchical Labeling Schema

Wong, Tak-Lam

2016, 31(2): 381-399, DOI: 10.1007/s11390-016-1633-7.

17

Content-Based Publish/Subscribe System for Web Syndication

Hmedeh, Zeinab; Kourdounakis, Harry; Christophides, Vassilis; du Mouza, Cedric; Scholl, Michel; Travers, Nicolas

2016, 31(2): 359-380, DOI: 10.1007/s11390-016-1632-8.

18

Identify Congested Links Based on Enlarged State Space

Pan, Sheng-Li; Zhang, Zhi-Yong; Zhou, Ying-Jie; Qian, Feng; Hu, Guang-Min

2016, 31(2): 350-358, DOI: 10.1007/s11390-016-1631-9.

19

RiMOM-IM: A Novel Iterative Framework for Instance Matching

Shao, Chao; Hu, Lin-Mei; Li, Juan-Zi; Wang, Zhi-Chun; Chung, Tonglee; Xia, Jun-Bo

2016, 31(1): 185-197, DOI: 10.1007/s11390-016-1620-z.

20

Context-Based Moving Object Trajectory Uncertainty Reduction and Ranking in Road Network

Dai, Jian; Ding, Zhi-Ming; Xu, Jia-Jie

2016, 31(1): 167-184, DOI: 10.1007/s11390-016-1619-5.

21

AS-Index: A Structure for String Search Using n-Grams and Algebraic Signatures

Constantin, Camelia; du Mouza, Cedric; Litwin, Witold; Rigaux, Philippe; Schwarz, Thomas

2016, 31(1): 147-166, DOI: 10.1007/s11390-016-1618-6.

22

An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

Wang, Xi-Te; Shen, De-Rong; Bai, Mei; Nie, Tie-Zheng; Kou, Yue; Yu, Ge

2015, 30(6): 1233-1248, DOI: 10.1007/s11390-015-1596-0.

23

Enhancing Telco Service Quality with Big Data Enabled Churn Analysis: Infrastructure, Model, and Deployment

Li, Hui; Wu, Di; Li, Gao-Xiang; Ke, Yi-Hao Ke; Liu, Wen-Jie; Zheng, Yuan-Huan; Lin, Xiao-La

2015, 30(6): 1201-1214, DOI: 10.1007/s11390-015-1594-2.

24

From Interest to Location: Neighbor-Based Friend Recommendation in Social Media

Zhu, Jin-Qi; Lu, Li; Ma, Chun-Mei

2015, 30(6): 1188-1200, DOI: 10.1007/s11390-015-1593-3.

25

Quantifying the Influence of Websites Based on Online Collective Attention Flow

Li, Yong; Zhang, Jiang; Meng, Xiao-Feng; Wang, Chang-Qing

2015, 30(6): 1175-1187, DOI: 10.1007/s11390-015-1592-4.

26

Towards Cost-Effective Cloud Downloading with Tencent Big Data

Li, Zhen-Hua; Liu, Gang; Ji, Zhi-Yuan; Zimmermann, Roger

2015, 30(6): 1163-1174, DOI: 10.1007/s11390-015-1591-5.

27

Discovering Family Groups in Passenger Social Networks

Wan, Huai-Yu; Wang, Zhi-Wei; Lin, You-Fang; Jia, Xu-Guang; Zhou, Yuan-Wei

2015, 30(5): 1141-1153, DOI: 10.1007/s11390-015-1589-z.

28

Towards Better Understanding of App Functions

Tong, Yong-Xin; She, Jieying; Chen, Lei

2015, 30(5): 1130-1140, DOI: 10.1007/s11390-015-1588-0.

29

Microblog Sentiment Analysis with Emoticon Space Model

Jiang, Fei; Liu, Yi-Qun; Luan, Huan-Bo; Sun, Jia-Shen; Zhu, Xuan; Zhang, Min; Ma, Shao-Ping

2015, 30(5): 1120-1129, DOI: 10.1007/s11390-015-1587-1.

30

Clustering Context-Dependent Opinion Target Words in Chinese Product Reviews

Zhang, Yu; Liu, Miao; Xia, Hai-Xia

2015, 30(5): 1109-1119, DOI: 10.1007/s11390-015-1586-2.

31

Anomaly Detection in Microblogging via Co-Clustering

Yang, Wu; Shen, Guo-Wei; Wang, Wei; Gong, Liang-Yi; Yu, Miao; Dong, Guo-Zhong

2015, 30(5): 1097-1108, DOI: 10.1007/s11390-015-1585-3.

32

Detecting Marionette Microblog Users for Improved Information Credibility

Wu, Xian; Fan, Wei; Gao, Jing; Feng, Zi-Ming; Yu, Yong

2015, 30(5): 1082-1096, DOI: 10.1007/s11390-015-1584-4.

33

iBole: A Hybrid Multi-Layer Architecture for Doctor Recommendation in Medical Social Networks

Gong, Ji-Bing; Wang, Li-Li; Sun, Sheng-Tao; Peng, Si-Wei

2015, 30(5): 1073-1081, DOI: 10.1007/s11390-015-1583-5.

34

Tag Correspondence Model for User Tag Suggestion

Tu, Cun-Chao; Liu, Zhi-Yuan; Sun, Mao-Song

2015, 30(5): 1063-1072, DOI: 10.1007/s11390-015-1582-6.

35

Mining Intention-Related Products on Online Q&A Community

Duan, Jun-Wen; Chen, Yi-Heng; Liu, Ting; Ding, Xiao

2015, 30(5): 1054-1062, DOI: 10.1007/s11390-015-1581-7.

36

Social Trust Aware Item Recommendation for Implicit Feedback

Guo, Lei; Ma, Jun; Jiang, Hao-Ran; Chen, Zhu-Min; Xing, Chang-Ming

2015, 30(5): 1039-1053, DOI: 10.1007/s11390-015-1580-8.

37

Tag Combine: Recommending Tags to Contents in Software Information Sites

Wang, Xin-Yu; Xia, Xin; Lo, David

2015, 30(5): 1017-1035, DOI: 10.1007/s11390-015-1578-2.

38

Multi-Factor Duplicate Question Detection in Stack Overflow

Zhang, Yun; Lo, David; Xia, Xin; Sun, Jian-Ling

2015, 30(5): 981-997, DOI: 10.1007/s11390-015-1576-4.

39

A Hybrid Instance Selection Using Nearest-Neighbor for Cross-Project Defect Prediction

Ryu, Duksan; Jang, Jong-In; Baik, Jongmoon

2015, 30(5): 969-980, DOI: 10.1007/s11390-015-1575-5.

40

Detecting Android Malware Using Clone Detection

Chen, Jian; Alalfi, Manar H.; Dean, Thomas R.; Zou, Ying

2015, 30(5): 942-956, DOI: 10.1007/s11390-015-1573-7.

41

When Factorization Meets Heterogeneous Latent Topics: An Interpretable Cross-Site Recommendation Framework

Xin, Xin; Lin, Chin-Yew; Wei, Xiao-Chi; Huang, He-Yan

2015, 30(4): 917-932, DOI: 10.1007/s11390-015-1570-x.

42

Leveraging Large Data with Weak Supervision for Joint Feature and Opinion Word Extraction

Fang, Lei; Liu, Biao; Huang, Min-Lie

2015, 30(4): 903-916, DOI: 10.1007/s11390-015-1569-3.

43

Search Result Diversification Based on Query Facets

Hu, Sha; Dou, Zhi-Cheng; Wang, Xiao-Jie; Wen, Ji-Rong

2015, 30(4): 888-901, DOI: 10.1007/s11390-015-1567-5.

44

Classifying Uncertain and Evolving Data Streams with Distributed Extreme Learning Machine

Han, Dong-Hong; Zhang, Xin; Wang, Guo-Ren

2015, 30(4): 874-887, DOI: 10.1007/s11390-015-1566-6.

45

Enhancing Time Series Clustering by Incorporating Multiple Distance Measures with Semi-Supervised Learning

Zhou, Jing; Zhu, Shan-Feng; Huang, Xiaodi; Zhang, Yanchun

2015, 30(4): 859-873, DOI: 10.1007/s11390-015-1565-7.

46

Research on Trust Prediction from a Sociological Perspective

Wang, Ying; Wang, Xin; Zuo, Wan-Li

2015, 30(4): 843-858, DOI: 10.1007/s11390-015-1564-8.

47

Learning to Predict Links by Integrating Structure and Interaction Information in Microblogs

Jia, Yan-Tao; Wang, Yuan-Zhuo; Cheng, Xue-Qi

2015, 30(4): 829-842, DOI: 10.1007/s11390-015-1563-9.

48

The Best Answers? Think Twice: Identifying Commercial Campagins in the CQA Forums

Chen, Cheng; Wu, Kui; Srinivasan, Venkatesh; Kesav, Bharadwaj R.

2015, 30(4): 810-828, DOI: 10.1007/s11390-015-1562-x.

49

Zip: An Algorithm Based on Loser Tree for Common Contacts Searching in Large Graphs

Tang, Hong; Mu, Shuai; Huang, Jin; Zhu, Jia; Chen, Jian; Ding, Rui

2015, 30(4): 799-809, DOI: 10.1007/s11390-015-1561-y.

50

On Efficient Aggregate Nearest Neighbor Query Processing in Road Networks

Sun, Wei-Wei; Chen, Chu-Nan; Zhu, Liang; Gao, Yun-Jun; Jing, Yi-Nan; Li, Qing

2015, 30(4): 781-798, DOI: 10.1007/s11390-015-1560-z.

51

Threshold-Based Shortest Path Query over Large Correlated Uncertain Graphs

Cheng, Yu-Rong; Yuan, Ye; Chen, Lei; Wang, Guo-Ren

2015, 30(4): 762-780, DOI: 10.1007/s11390-015-1559-5.

52

Trip Oriented Search on Activity Trajectory

Chen, Wei; Zhao, Lei; Xu, Jia-Jie; Liu, Guan-Feng; Zheng, Kai; Zhou, Xiaofang

2015, 30(4): 745-761, DOI: 10.1007/s11390-015-1558-6.

53

VID Join: Mapping Trajectories to Points of Interest to Support Location-Based Services

Shang, Shuo; Xie, Kexin; Zheng, Kai; Liu, Jiajun; Wen, Ji-Rong

2015, 30(4): 725-744, DOI: 10.1007/s11390-015-1557-7.

54

A Structure Learning Algorithm for Bayesian Network Using Prior Knowledge

Xu, Jun-Gang; Zhao, Yue; Chen, Jian; Han, Chao

2015, 30(4): 713-724, DOI: 10.1007/s11390-015-1556-8.

55

Mining Frequent Itemsets in Correlated Uncertain Databases

Tong, Yong-Xin; Chen, Lei; She, Jieying

2015, 30(4): 696-712, DOI: 10.1007/s11390-015-1555-9.

56

HAG: An Energy-Proportional Data Storage Scheme for Disk Array Systems

Jin, Pei-Quan; Xie, Xike; Jensen, Christian S.; Jin, Yong; Yue, Li-Hua

2015, 30(4): 679-695, DOI: 10.1007/s11390-015-1554-x.

57

Hetero-DB: Next Generation High-Performance Database Systems by Best Utilizing Heterogeneous Computing and Storage Resources

Zhang, Kai; Chen, Feng; Ding, Xiaoning; Huai, Yin; Lee, Rubao; Luo, Tian; Wang, Kaibo; Yuan, Yuan; Zhang, Xiaodong

2015, 30(4): 657-678, DOI: 10.1007/s11390-015-1553-y.

58

A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks

Guo, Linke; Zhang, Chi; Fang, Yuguang; Lin, Phone

2015, 30(3): 578-597, DOI: 10.1007/s11390-015-1547-9.

59

A New ETL Approach Based on Data Virtualization

Guo, Shu-Sheng; Yuan, Zi-Mu; Sun, Ao-Bing; Yue, Qiang

2015, 30(2): 311-323, DOI: 10.1007/s11390-015-1524-3.

60

Global Optimization for Advertisement Selection in Sponsored Search

Cui, Qing; Bai, Feng-Shan; Gao, Bin; Liu, Tie-Yan

2015, 30(2): 295-310, DOI: 10.1007/s11390-015-1523-4.

61

Accelerating Iterative Big Data Computing Through MPI

Liang, Fan; Lu, Xiaoyi

2015, 30(2): 283-294, DOI: 10.1007/s11390-015-1522-5.

62

A Clustering Algorithm for Planning the Integration Process of a Large Number of Conceptual Schemas

Batini, Carlo; Bonizzoni, Paola; Comerio, Marco; Dondi, Riccardo; Pirola, Yuri; Salandra, Francesco

2015, 30(1): 214-224, DOI: 10.1007/s11390-015-1514-5.

63

Review Authorship Attribution in a Similarity Space

Qian, Tie-Yun; Liu, Bing; Li, Qing; Si, Jianfeng

2015, 30(1): 200-213, DOI: 10.1007/s11390-015-1513-6.

64

Social Influence Study in Online Networks: A Three-Level Review

Li, Hui; Cui, Jiang-Tao; Ma, Jian-Feng

2015, 30(1): 184-199, DOI: 10.1007/s11390-015-1512-7.

65

Bipartite-Oriented Distributed Graph Partitioning for Big Learning

Chen, Rong; Shi, Jia-Xin; Chen, Hai-Bo; Zang, Bin-Yu

2015, 30(1): 20-29, DOI: 10.1007/s11390-015-1501-x.

TOP

 

Software Systems

1

Survey

Summarizing Software Artifacts: A Literature Review

Nazar, Najam; Hu, Yan; Jiang, He

2016, 31(5): 883-909, DOI: 10.1007/s11390-016-1671-1.

2

Survey

Debugging Concurrent Software: Advances and Challenges

Huang, Jeff; Zhang, Charles

2016, 31(5): 861-868, DOI: 10.1007/s11390-016-1669-8.

3

Survey

Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems

Xiao, Xusheng; Lou, Jian-Guang; Lu, Shan; Shepherd, David C.; Peng, Xin; Wang, Qian-Xiang

2016, 31(5): 851-860, DOI: 10.1007/s11390-016-1668-9.

4

Survey

Roundtable: Research Opportunities and Challenges for Emerging Software Systems

Zhang, Xiangyu; Zhang, Dongmei; Le Traon, Yves; Wang, Qing; Zhang, Lu

2015, 30(5): 935-941, DOI: 10.1007/s11390-015-1572-8.

5

A Script-Based Prototyping Framework to Boost Agile-UX Developments

Mateo Navarro, Pedro Luis; Martínez Pérez, Gregorio; Sevilla Ruiz, Diego

2016, 31(6): 1246-1261, DOI: 10.1007/s11390-016-1695-6.

6

Enhanced Userspace and In-Kernel Trace Filtering for Production Systems

Sharma, Suchakrapani Datt; Dagenais, Michel

2016, 31(6): 1161-1178, DOI: 10.1007/s11390-016-1690-y.

7

A Feature Model Based Framework for Refactoring Software Product Line Architecture

Tanhaei, Mohammad; Habibi, Jafar; Mirian-Hosseinabadi, Seyed-Hassan

2016, 31(5): 951-986, DOI: 10.1007/s11390-016-1674-y.

8

Critical Success Factors to Improve the Game Development Process from a Developer's Perspective

Aleem, Saiqa; Capretz, Luiz Fernando; Ahmed, Faheem

2016, 31(5): 925-950, DOI: 10.1007/s11390-016-1673-z.

9

What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts

Yang, Xin-Li; Lo, David; Xia, Xin; Wan, Zhi-Yuan; Sun, Jian-Ling

2016, 31(5): 910-924, DOI: 10.1007/s11390-016-1672-0.

10

Prioritizing Test Cases for Memory Leaks in Android Applications

Qian, Ju; Zhou, Di

2016, 31(5): 869-882, DOI: 10.1007/s11390-016-1670-2.

11

A Parallel Genetic Algorithm Based on Spark for Pairwise Test Suite Generation

Qi, Rong-Zhi; Wang, Zhi-Jian; Li, Shui-Yan

2016, 31(2): 417-427, DOI: 10.1007/s11390-016-1635-5.

12

Optimization Strategies Oriented to Loop Characteristics in Software Thread Level Speculation Systems

Shen, Li; Xu, Fan; Wang, Zhi-Ying

2016, 31(1): 60-76, DOI: 10.1007/s11390-016-1612-z.

13

Tag Combine: Recommending Tags to Contents in Software Information Sites

Wang, Xin-Yu; Xia, Xin; Lo, David

2015, 30(5): 1017-1035, DOI: 10.1007/s11390-015-1578-2.

14

CoreDevRec: Automatic Core Member Recommendation for Contribution Evaluation

Jiang, Jing; He, Jia-Huan; Chen, Xue-Yuan

2015, 30(5): 998-1016, DOI: 10.1007/s11390-015-1577-3.

15

Multi-Factor Duplicate Question Detection in Stack Overflow

Zhang, Yun; Lo, David; Xia, Xin; Sun, Jian-Ling

2015, 30(5): 981-997, DOI: 10.1007/s11390-015-1576-4.

16

A Hybrid Instance Selection Using Nearest-Neighbor for Cross-Project Defect Prediction

Ryu, Duksan; Jang, Jong-In; Baik, Jongmoon

2015, 30(5): 969-980, DOI: 10.1007/s11390-015-1575-5.

17

Balancing Frequencies and Fault Detection in the In-Parameter-Order Algorithm

Gao, Shi-Wei; Lv, Jiang-Hua; Du, Bing-Lei; Colbourn, Charles J.; Ma, Shi-Long

2015, 30(5): 957-968, DOI: 10.1007/s11390-015-1574-6.

18

Detecting Android Malware Using Clone Detection

Chen, Jian; Alalfi, Manar H.; Dean, Thomas R.; Zou, Ying

2015, 30(5): 942-956, DOI: 10.1007/s11390-015-1573-7.

19

An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms

Nadeem, Farrukh; Qaiser, Rizwan

2015, 30(3): 639-654, DOI: 10.1007/s11390-015-1550-1.

TOP

 

Computer Networks and Distributed Computing

1

Survey

Survey on Simulation for Mobile Ad-Hoc Communication for Disaster Scenarios

Rosas, Erika; Hidalgo, Nicolas; Gil-Costa, Veronica; Bonacic, Carolina; Marin, Mauricio; Senger, Hermes; Arantes, Luciana; Marcondes, Cesar; Marin, Olivier

2016, 31(2): 326-349, DOI: 10.1007/s11390-016-1630-x.

2

Survey

A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges

Liu, Zhe; Seo, Hwajeong; Kim, Howon

2016, 31(2): 284-299, DOI: 10.1007/s11390-016-1627-5.

3

A Buffer Scheduling Method Based on Message Priority in Delay Tolerant Networks

Wang, En; Yang, Yong-Jian; Wu, Jie; Liu, Wen-Bin

2016, 31(6): 1228-1245, DOI: 10.1007/s11390-016-1694-7.

4

Semi-Homogenous Generalization:Improving Homogenous Generalization for Privacy Preservation in Cloud Computing

He, Xian-Mang; Wang, Xiaoyang Sean; Li, Dong; Hao, Yan-Ni

2016, 31(6): 1124-1135, DOI: 10.1007/s11390-016-1687-6.

5

Combined Cloud: A Mixture of Voluntary Cloud and Reserved Instance Marketplace

Shen, Wei; Dou, Wan-Chun; Wu, Fan; Tang, Shaojie; Ni, Qiang

2016, 31(6): 1110-1123, DOI: 10.1007/s11390-016-1686-7.

6

Interference-Limited Device-to-Device Multi-User Cooperation Scheme for Optimization of Edge Networking

Huang, Hong-Cheng; Zhang, Jie; Zhang, Zu-Fan; Xiong, Zhong-Yang

2016, 31(6): 1096-1109, DOI: 10.1007/s11390-016-1685-8.

7

CPA-VoD: Cloud and Peer-Assisted Video on Demand System for Mobile Devices

Cheng, Lei-Gen; Cui, Laizhong; Jiang, Yong

2016, 31(6): 1087-1095, DOI: 10.1007/s11390-016-1684-9.

8

Edge Video CDN: A Wi-Fi Content Hotspot Solution

Hu, Wen; Wang, Zhi; Ma, Ming; Sun, Li-Feng

2016, 31(6): 1072-1086, DOI: 10.1007/s11390-016-1683-x.

9

UiLog: Improving Log-Based Fault Diagnosis by Log Analysis

Zou, De-Qing; Qin, Hao; Jin, Hai

2016, 31(5): 1038-1052, DOI: 10.1007/s11390-016-1678-7.

10

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group

Wang, Xiao-Fen; Mu, Yi; Chen, Rongmao; Zhang, Xiao-Song

2016, 31(5): 1012-1027, DOI: 10.1007/s11390-016-1676-9.

11

Reducing Synchronization Cost for Single-Level Store in Mobile Systems

Xu, Yuan-Chao; Wan, Hu; Qiu, Ke-Ni; Li, Tao; Zhang, Wei-Gong

2016, 31(4): 836-848, DOI: 10.1007/s11390-016-1666-y.

12

A Data Deduplication Framework of Disk Images with Adaptive Block Skipping

Zhou, Bing; Wen, Jiang-Tao

2016, 31(4): 820-835, DOI: 10.1007/s11390-016-1665-z.

13

Improving Metadata Caching Efficiency for Data Deduplication via In-RAM Metadata Utilization

Zhou, Bing; Wen, Jiang-Tao

2016, 31(4): 805-819, DOI: 10.1007/s11390-016-1664-0.

14

Metadata Feedback and Utilization for Data Deduplication Across WAN

Zhou, Bing; Wen, Jiang-Tao

2016, 31(3): 604-623, DOI: 10.1007/s11390-016-1650-6.

15

Identify Congested Links Based on Enlarged State Space

Pan, Sheng-Li; Zhang, Zhi-Yong; Zhou, Ying-Jie; Qian, Feng; Hu, Guang-Min

2016, 31(2): 350-358, DOI: 10.1007/s11390-016-1631-9.

16

Utilizing Probabilistic Linear Equations in Cube Attacks

Yao, Yuan; Zhang, Bin; Wu, Wen-Ling

2016, 31(2): 317-325, DOI: 10.1007/s11390-016-1629-3.

17

Context-Based Moving Object Trajectory Uncertainty Reduction and Ranking in Road Network

Dai, Jian; Ding, Zhi-Ming; Xu, Jia-Jie

2016, 31(1): 167-184, DOI: 10.1007/s11390-016-1619-5.

18

Cognitive Power Management in Wireless Sensor Networks

Tabatabaei, Seyed Mehdi; Hakami, Vesal; Dehghan, Mehdi

2015, 30(6): 1306-1317, DOI: 10.1007/s11390-015-1600-8.

19

Throughput Optimization in Cognitive Radio Networks Ensembling Physical Layer Measurement

Zhao, Yan-Chao; Wu, Jie; Li, Wen-Zhong; Lu, Sang-Lu

2015, 30(6): 1290-1305, DOI: 10.1007/s11390-015-1599-x.

20

A Family of Stable Multipath Dual Congestion Control Algorithms

Liu, Ying; Liu, Hong-Ying; Xu, Ke; Shen, Meng

2015, 30(6): 1274-1289, DOI: 10.1007/s11390-015-1598-y.

21

Infrastructure-Free Floor Localization Through Crowdsourcing

Ye, Hai-Bo; Gu, Tao; Tao, Xian-Ping; Lv, Jian

2015, 30(6): 1249-1273, DOI: 10.1007/s11390-015-1597-z.

22

SEIP: System for Efficient Image Processing on Distributed Platform

Liu, Tao; Liu, Yi; Li, Qin; Wang, Xiang-Rong; Gao, Fei; Zhu, Yan-Chao; Qian De-Pei

2015, 30(6): 1215-1232, DOI: 10.1007/s11390-015-1595-1.

23

Enhancing Telco Service Quality with Big Data Enabled Churn Analysis: Infrastructure, Model, and Deployment

Li, Hui; Wu, Di; Li, Gao-Xiang; Ke, Yi-Hao Ke; Liu, Wen-Jie; Zheng, Yuan-Huan; Lin, Xiao-La

2015, 30(6): 1201-1214, DOI: 10.1007/s11390-015-1594-2.

24

From Interest to Location: Neighbor-Based Friend Recommendation in Social Media

Zhu, Jin-Qi; Lu, Li; Ma, Chun-Mei

2015, 30(6): 1188-1200, DOI: 10.1007/s11390-015-1593-3.

25

Quantifying the Influence of Websites Based on Online Collective Attention Flow

Li, Yong; Zhang, Jiang; Meng, Xiao-Feng; Wang, Chang-Qing

2015, 30(6): 1175-1187, DOI: 10.1007/s11390-015-1592-4.

26

Towards Cost-Effective Cloud Downloading with Tencent Big Data

Li, Zhen-Hua; Liu, Gang; Ji, Zhi-Yuan; Zimmermann, Roger

2015, 30(6): 1163-1174, DOI: 10.1007/s11390-015-1591-5.

27

An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms

Nadeem, Farrukh; Qaiser, Rizwan

2015, 30(3): 639-654, DOI: 10.1007/s11390-015-1550-1.

28

Service-Oriented Resource Allocation in Clouds: Pursuing Flexibility and Efficiency

Zhang, Sheng; Qian, Zhu-Zhong; Wu, Jie; Lu, Sang-Lu

2015, 30(2): 421-436, DOI: 10.1007/s11390-015-1533-2.

29

Provisioning of Inter-Domain QoS-Aware Services

Matos, Fernando; Matos, Alexandre; Simoes, Paulo; Monteiro, Edmundo

2015, 30(2): 404-420, DOI: 10.1007/s11390-015-1532-3.

30

Accelerating Iterative Big Data Computing Through MPI

Liang, Fan; Lu, Xiaoyi

2015, 30(2): 283-294, DOI: 10.1007/s11390-015-1522-5.

31

Fatman: Building Reliable Archival Storage Based on Low-Cost Volunteer Resources

Qin, An; Hu, Dian-Ming; Liu, Jun; Yang, Wen-Jun; Tan, Dai

2015, 30(2): 273-282, DOI: 10.1007/s11390-015-1521-6.

32

Software-Defined Cluster

Nie, Hua; Yang, Xiao-Jun; Liu, Tao-Ying

2015, 30(2): 252-258, DOI: 10.1007/s11390-015-1519-0.

33

Adapting Memory Hierarchies for Emerging Datacenter Interconnects

Jiang, Tao; Hou, Rui; Dong, Jian-Bo; Chai, Lin; McKee, Sally A.; Tian, Bin; Zhang, Li-Xin; Sun, Ning-Hui

2015, 30(1): 97-109, DOI: 10.1007/s11390-015-1507-4.

34

CRAIS: A Crossbar-Based Interconnection Scheme on FPGA for Big Data

Wang, Chao; Li, Xi; Zhou, Xue-Hai

2015, 30(1): 84-96, DOI: 10.1007/s11390-015-1506-5.

TOP

 

Theory and Algorithms

1

Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games

Liu, Yang; Zhang, Guo-Fu; Su, Zhao-Pin; Yue, Feng; Jiang, Jian-Guo

2016, 31(6): 1136-1150, DOI: 10.1007/s11390-016-1688-5.

2

Semi-Homogenous Generalization:Improving Homogenous Generalization for Privacy Preservation in Cloud Computing

He, Xian-Mang; Wang, Xiaoyang Sean; Li, Dong; Hao, Yan-Ni

2016, 31(6): 1124-1135, DOI: 10.1007/s11390-016-1687-6.

3

Tolerating Permanent State Transition Faults in Asynchronous Sequential Machines

Yang, Jung-Min

2016, 31(5): 1028-1037, DOI: 10.1007/s11390-016-1677-8.

4

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group

Wang, Xiao-Fen; Mu, Yi; Chen, Rongmao; Zhang, Xiao-Song

2016, 31(5): 1012-1027, DOI: 10.1007/s11390-016-1676-9.

5

An Efficient Approach for Solving Optimization over Linear Arithmetic Constraints

Chen, Li; Wu, Jing-Zheng; Lv, Yin-Run; Wang, Yong-Ji

2016, 31(5): 987-1011, DOI: 10.1007/s11390-016-1675-x.

6

Answering Reachability Queries on Incrementally Updated Graphs by Hierarchical Labeling Schema

Wong, Tak-Lam

2016, 31(2): 381-399, DOI: 10.1007/s11390-016-1633-7.

7

Utilizing Probabilistic Linear Equations in Cube Attacks

Yao, Yuan; Zhang, Bin; Wu, Wen-Ling

2016, 31(2): 317-325, DOI: 10.1007/s11390-016-1629-3.

8

Complete Proof Systems for Amortised Probabilistic Bisimulations

Xu, Li-Li; Lin, Hui-Min

2016, 31(2): 300-316, DOI: 10.1007/s11390-016-1628-4.

9

Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient Faults

Cui, Xiao-Tong; Wu, Kai-Jie; Wei, Tong-Quan; Sha, Edwin Hsing-Mean

2016, 31(2): 267-283, DOI: 10.1007/s11390-016-1626-6.

10

A Game-Based Approach for PCTL* Stochastic Model Checking with Evidence

Liu, Yang; Li, Xuan-Dong; Ma, Yan

2016, 31(1): 198-216, DOI: 10.1007/s11390-016-1621-y.

11

AS-Index: A Structure for String Search Using n-Grams and Algebraic Signatures

Constantin, Camelia; du Mouza, Cedric; Litwin, Witold; Rigaux, Philippe; Schwarz, Thomas

2016, 31(1): 147-166, DOI: 10.1007/s11390-016-1618-6.

12

Modular Timing Constraints for Delay-Insensitive Systems

Park, Hoon; He, Anping; Roncken, Marly; Song, Xiaoyu; Sutherland, Ivan

2016, 31(1): 77-106, DOI: 10.1007/s11390-016-1613-y.

13

Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle

Tian, Cheng-Liang; Wei, Wei; Lin, Dong-Dai

2015, 30(6): 1370-1377, DOI: 10.1007/s11390-015-1604-4.

14

Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON

Yu, Xiao-Li; Wu, Wen-Ling; Shi, Zhen-Qing; Zhang, Jian; Zhang, Lei; Wang, Yan-Feng

2015, 30(6): 1358-1369, DOI: 10.1007/s11390-015-1603-5.

15

Understanding Sybil Groups in the Wild

Jiang, Jing; Shan, Zi-Fei; Wang, Xiao; Zhang, Li; Dai, Ya-Fei

2015, 30(6): 1344-1357, DOI: 10.1007/s11390-015-1602-6.

16

Privacy Petri Net and Privacy Leak Software

Fan, Le-Jun; Wang, Yuan-Zhuo; Li, Jing-Yuan; Cheng, Xue-Qi; Lin, Chuang

2015, 30(6): 1318-1343, DOI: 10.1007/s11390-015-1601-7.

17

Constructing Edge-Colored Graph for Heterogeneous Networks

Hou, Rui; Wu, Ji-Gang; Chen, Yawen; Zhang, Haibo; Sui, Xiu-Feng

2015, 30(5): 1154-1160, DOI: 10.1007/s11390-015-1551-0.

18

Fast Level-Set-Based Inverse Lithography Algorithm for Process Robustness Improvement and Its Application

Geng, Zhen; Shi, Zheng; Yan, Xiao-Lang; Luo, Kai-Sheng; Pan, Wei-Wei

2015, 30(3): 629-638, DOI: 10.1007/s11390-015-1549-7.

TOP

 

Emerging Areas

1

Modelling Spiking Neural Network from the Architecture Evaluation Perspective

Ji, Yu; Zhang, You-Hui; Zheng, Wei-Min

2016, 31(1): 50-59, DOI: 10.1007/s11390-016-1611-0.

 

Copyright © 2006 JCST! All rights reserved Editorial Office
Journal of Computer Science and Technology Institute of Computing Technology Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Support by Beijing Magtech Co.ltd  E-mail:support@magtech.com.cn