We use cookies to improve your experience with our site.

Preface
Xiao-Wei Li, Xiao-Fei Liao
2025, 40(3): 605-606. DOI: 10.1007/s11390-025-0001-x
Abstract
Hypertasking: From Information Web to Computing Utility
Zhi-Wei Xu, Zi-Shu Yu, Feng-Zhi Li, Yao Zhang
2025, 40(3): 607-620. DOI: 10.1007/s11390-025-5126-4
Abstract
An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing
Feng Jiang, Huai-Min Wang, Pei-Chang Shi, Xiang Fu, Liao-Liao Feng, Rui Li, Mo-Heng Lin
2025, 40(3): 621-636. DOI: 10.1007/s11390-025-4733-4
Abstract
DSparse: A Distributed Training Method for Edge Clusters Based on Sparse Update
Xiao-Hui Peng, Yi-Xuan Sun, Zheng-Hui Zhang, Yi-Fan Wang
2025, 40(3): 637-653. DOI: 10.1007/s11390-025-4821-5
Abstract
Carbon-Aware Energy Cost Optimization of Data Analytics Across Geo-Distributed Data Centers
Yi-Ting Chen, Lai-Long Luo, De-Ke Guo, Qian He
2025, 40(3): 654-670. DOI: 10.1007/s11390-025-4636-4
Abstract
ResCheckpointer: Building Program Error Resilience-Aware Checkpointing Mechanism for HPC Systems
Xiao-Hui Wei, Shi-Yu Tong, Zhong-Ao Sun, Xiang Li, Heng-Shan Yue
2025, 40(3): 671-685. DOI: 10.1007/s11390-025-4634-6
Abstract
DiffTSN: Scheduling Mixed Flows in Time-Sensitive Networks with Diffusion-Based Method
Wei-Ming Chang, Jing-Yi Li, Lin Chen, Xu Chen
2025, 40(3): 686-700. DOI: 10.1007/s11390-025-4632-8
Abstract
Virtualization, Cloudification, and Service Orientation of Network: A Systematic Review
Shuo Quan, Shen Gao, Jian-Song Zhang, Jie Wu
2025, 40(3): 701-730. DOI: 10.1007/s11390-024-4817-6
Abstract
A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum
Dong-Yu Cao, Hao Yin, Bi-Xin Li
2025, 40(3): 731-747. DOI: 10.1007/s11390-024-3843-8
Abstract
LWCM: A Lookahead-Window Constrained Model for Disk Failure Prediction in Large Data Centers
Xin-Yan Zhang, Dan Feng, Zhi-Peng Tan, Yan-Wen Xie, Shao-Feng Zhao, Ya-Yuan Wei
2025, 40(3): 748-765. DOI: 10.1007/s11390-025-3850-4
Abstract
Advanced Cross-Graph Cycle Attention Model for Dissecting Complex Structures in Mass Spectrometry Imaging
Jiang-Nan Cui, Yang Gao, Qiu Wang, Xuan Li, Ke-Ren Xu, Zhen-Yu Huang, Jing-Song Zhang, Chun-Man Zuo
2025, 40(3): 766-779. DOI: 10.1007/s11390-025-4342-2
Abstract
Unsupervised Adversarial Domain Adaptation with Hierarchical Semantic Consistency for Cross-Modal Nuclei Detection
Shu-Yu Guo, Lan Huang, Yu-Hao Mu, Tian Bai
2025, 40(3): 780-791. DOI: 10.1007/s11390-025-4324-4
Abstract
Central Feature Network Enables Accurate Detection of Both Small and Large Particles in Cryo-Electron Tomography
Yao-Yu Wang, Xiao-Hua Wan, Cheng Chen, Fa Zhang, Xue-Feng Cui
2025, 40(3): 792-804. DOI: 10.1007/s11390-025-4816-2
Abstract
Pushing to the Limit: An Attention-Based Dual-Prune Approach for Highly-Compacted CNN Filter Pruning
Yu-Chu Fang, Wen-Zhong Li, Yao Zeng, Qing-Ning Lu, Sang-Lu Lu
2025, 40(3): 805-820. DOI: 10.1007/s11390-024-3536-3
Abstract
A Chinese Spelling Check Method Based on Reverse Contrastive Learning
Nan-Kai Lin, Hong-Yan Wu, Si-Hui Fu, Sheng-Yi Jiang, Ai-Min Yang
2025, 40(3): 821-834. DOI: 10.1007/s11390-025-3956-8
Abstract
Joint-Communication Optimal Matrix Multiplication with Asymmetric Memories
Lin Zhu, Qiang-Sheng Hua, Hai Jin
2025, 40(3): 835-854. DOI: 10.1007/s11390-023-3489-y
Abstract
Optimization of Generalized Eigensolver for Dense Symmetric Matrices on AMD GPU
Chong Zhang, Zi-Tong Su, Min Li, Hui-Yuan Li, Wen-Jing Ma, Lei-Sheng Li
2025, 40(3): 855-869. DOI: 10.1007/s11390-024-3673-8
Abstract
Caching Document Identifiers to Speedup Query Processing in Search Servers
Gabriel H. Tolosa, Pablo Lavallén, Esteban A Ríssola
2025, 40(3): 870-886. DOI: 10.1007/s11390-024-3040-9
Abstract
AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery
Xiao Chen, Le-Tian Sha, Fu Xiao, Jia-Ye Pan, Jian-Kuo Dong
2025, 40(3): 887-903. DOI: 10.1007/s11390-025-4497-x
Abstract
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice
Shi-Yu Shen, Hong Zhang, Feng He, Zhi-Chuang Liang, Jie-Yu Zheng, Han-Yu Wei, Yang Wang, Zhen-Feng Zhang, Yun-Lei Zhao
2025, 40(3): 904-920. DOI: 10.1007/s11390-024-3517-6
Abstract
Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-Grained Data Sharing
Ming Wan, Geng Wang, Shi-Feng Sun, Da-Wu Gu, Gong-Yu Shi
2025, 40(3): 921-938. DOI: 10.1007/s11390-024-3670-y
Abstract