


default search action
Frontiers of Computer Science, Volume 11
Volume 11, Number 1, February 2017
- Yu Zheng:

Urban computing: enabling urban intelligence with big data. 1-3 - Dan Li, Songtao Wang, Konglin Zhu, Shutao Xia:

A survey of network update in SDN. 4-12 - Jian-Hao Luo, Wang Zhou, Jianxin Wu:

Image categorization with resource constraints: introduction, challenges and advances. 13-26 - Wanli Dong, Yunpeng Wang, Haiyang Yu:

An identification model of urban critical links with macroscopic fundamental diagram theory. 27-37 - Longbiao Chen

, Xiaojuan Ma
, Thi Mai Trang Nguyen, Gang Pan, Jérémie Jakubowicz:
Understanding bike trip patterns leveraging bike sharing system open data. 38-48 - Jiangtao Wang

, Yasha Wang, Daqing Zhang, Leye Wang, Chao Chen, Jae Woong Lee, Yuanduo He:
Real-time and generic queue time estimation based on mobile crowdsensing. 49-60 - Chao Chen, Xia Chen, Zhu Wang

, Yasha Wang, Daqing Zhang:
ScenicPlanner: planning scenic travel routes leveraging heterogeneous user-generated digital footprints. 61-74 - Jian Liu

, Huanqing Dong, Junwei Zhang, Zhenjun Liu, Lu Xu:
HWM: a hybrid workload migration mechanism of metadata server cluster in data center. 75-87 - Yu Tang, Hailong Sun, Xu Wang, Xudong Liu:

An efficient and highly available framework of data recency enhancement for eventually consistent data stores. 88-104 - Ruihong Lin, Yuhui Deng

:
Allocating workload to minimize the power consumption of data centers. 105-118 - Jingsong Shan, Yinjin Fu, Guiqiang Ni, Jianxin Luo, Zhaofeng Wu:

Fast counting the cardinality of flows for big traffic over sliding windows. 119-129 - Qi Zhu, Bo Wu, Xipeng Shen

, Kai Shen, Li Shen, Zhiying Wang:
Understanding co-run performance on CPU-GPU integrated processors: observations, insights, directions. 130-146 - Chenchen Sun, Derong Shen, Yue Kou, Tiezheng Nie, Ge Yu:

A genetic algorithm based entity resolution approach with active learning. 147-159 - Qiang Lu, Zhicheng Cui, Yixin Chen, Xiaoping Chen:

Extracting optimal actionable plans from additive tree models. 160-173
Volume 11, Number 2, April 2017
- Hao Zhu, Yongming Nie, Tao Yue, Xun Cao:

The role of prior in image based 3D modeling: a survey. 175-191 - Junhua Lu, Wei Chen, Yuxin Ma, Junming Ke, Zongzhuang Li, Fan Zhang, Ross Maciejewski:

Recent progress and trends in predictive visual analytics. 192-207 - Xin Liu, Meina Kan, Wanglong Wu, Shiguang Shan

, Xilin Chen:
VIPLFaceNet: an open source deep face recognition SDK. 208-218 - Kai Chen, Guiguang Ding, Jungong Han:

Attribute-based supervised deep learning model for action recognition. 219-229 - Nan Ren, Junping Du, Suguo Zhu, Linghui Li, Dan Fan, JangMyung Lee:

Robust visual tracking based on scale invariance and deep learning. 230-242 - Wei Shao

, Yi Ding, Hong-Bin Shen, Daoqiang Zhang:
Deep model-based feature extraction for predicting protein subcellular localizations from bio-images. 243-252 - Ge Song, Xiaoyang Tan:

Hierarchical deep hashing for image retrieval. 253-265 - Hao Zheng, Xin Geng:

Facial expression recognition via weighted group sparsity. 266-275 - Le-le Cao

, Fuchun Sun, Hongbo Li, Wen-bing Huang:
Advancing the incremental fusion of robotic sensory features using online multi-kernel extreme learning machine. 276-289 - Shijian Luo, Yi Hu, Yuxiao Zhou:

Factors attracting Chinese Generation Y in the smartphone application marketplace. 290-306 - Chuitian Rong

, Yasin N. Silva, Chunqing Li:
String similarity join with different similarity thresholds based on novel indexing techniques. 307-319 - Lyes Abada

, Saliha Aouat
:
Improved shape from shading without initial information. 320-331 - Yue Xie, Ye Yuan, Xiang Chen, Changxi Zheng, Kun Zhou:

Continuous optimization of interior carving in 3D fabrication. 332-346 - Yu Han, Guozhu Jia:

Optimizing product manufacturability in 3D printing. 347-357
Volume 11, Number 3, June 2017
- Bing Liu:

Lifelong machine learning: a paradigm for continuous learning. 359-361 - Maoguo Gong, Xiangming Jiang

, Hao Li
:
Optimization methods for regularization-based ill-posed problems: a survey and a multi-objective framework. 362-391 - Jinyu Chen, Shihua Zhang:

Integrative cancer genomics: models, algorithms and analysis. 392-406 - Lei Xie, Jhing-Fa Wang:

Introduction to special section on advances of orange technologies. 407 - Zhong-Hua Fu:

Constrained minimum power combination for broadband beamformer design in the STFT domain. 408-418 - Yougen Yuan, Lei Xie, Zhong-Hua Fu, Ming Xu, Qi Cong:

Sound image externalization for headphone based real-time 3D audio. 419-428 - Yang-Yen Ou, Ta-Wen Kuan, Anand Paul

, Jhing-Fa Wang, An-Chao Tsai:
Spoken dialog summarization system with HAPPINESS/SUFFERING factor recognition. 429-443 - Sedigheh Khoshnevis

, Fereidoon Shams:
Automating identification of services and their variability for product lines using NSGA-II. 444-464 - Qiong Zuo, Meiyi Xie, Guanqiu Qi

, Hong Zhu
:
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service. 465-484 - Zhiyi Ma:

An approach to improve the quality of object-oriented models from novice modelers through project practice. 485-498 - Lijun Wu, Kaile Su

, Yabiao Han, Jingyu Chen, Xiangyu Lu:
Reasoning about knowledge, belief and certainty in hierarchical multi-agent systems. 499-510 - Shaha T. Al-Otaibi, Mourad Ykhlef

:
Hybrid immunizing solution for job recommender system. 511-527 - Yang Bo, Chunhe Xia, Zhigang Zhang, Xinzheng Lu:

On the satisfiability of authorization requirements in business process. 528-540 - Yuan Li, Yuhai Zhao, Guoren Wang, Xiaofeng Zhu, Xiang Zhang, Zhanghui Wang, Jun Pang:

Finding susceptible and protective interaction patterns in large-scale genetic association study. 541-554
Volume 11, Number 4, August 2017
- Jian Sun

, Jie Chen:
A survey on Lyapunov-based methods for stability of linear time-delay systems. 555-567 - Jing Liu

, Mingxing Zhou, Shuai Wang
, Penghui Liu:
A comparative study of network robustness measures. 568-584 - Yongwang Zhao, Zhibin Yang

, Dianfu Ma:
A survey on formal specification and verification of separation kernels. 585-607 - Guoliang Chen, Rui Mao, Kezhong Lu:

A parallel computing framework for big data. 608-621 - Cui Huang, Dakun Zhang, Guozhi Song:

A novel mapping algorithm for three-dimensional network on chip based on quantum-behaved particle swarm optimization. 622-631 - Junge Zhang, Kaiqi Huang, Tieniu Tan, Zhaoxiang Zhang:

Local structured representation for generic object detection. 632-648 - Le Dong, Ning Feng, Mengdie Mao, Ling He, Jingjing Wang:

E-GrabCut: an economic method of iterative video object extraction. 649-660 - Hui Dou, Yong Qi:

An online electricity cost budgeting algorithm for maximizing green energy usage across data centers. 661-674 - Menghan Li, Dan Pei

, Xiaoping Zhang, Beichuan Zhang, Ke Xu:
Interest-suppression-based NDN live video broadcasting over wireless LAN. 675-687 - Yuefeng Du, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu:

Discovering context-aware conditional functional dependencies. 688-701 - Wendi Ji, Xiaoling Wang, Feida Zhu

:
Time-aware conversion prediction. 702-716 - Sudipta Roy

, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction. 717-727 - Zhenxue He, Limin Xiao, Fei Gu, Tongsheng Xia, Shubin Su, Zhisheng Huo, Rong Zhang, Longbing Zhang, Li Ruan, Xiang Wang:

An efficient and fast polarity optimization approach for mixed polarity Reed-Muller logic circuits. 728-742
Volume 11, Number 5, October 2017
- Kun Zhou:

Computer Graphics 2.0: towards end-user-generated contents. 743-745 - Zhen Li, Yuqing Wang, Tian Zhi, Tianshi Chen:

A survey of neural network accelerators. 746-761 - Xiaobing Wang, Cong Tian, Zhenhua Duan, Liang Zhao:

MSVL: a typed language for temporal logic programming. 762-785 - Houkui Zhou

, Huimin Yu, Roland Hu:
Topic evolution based on the probabilistic topic model: a review. 786-802 - Donggang Cao, Lianghuan Kang, Hanglong Zhan, Hong Mei:

Towards application-level elasticity on shared cluster: an actor-based approach. 803-820 - Tao Wu, Qiusong Yang, Yeping He:

A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one. 821-835 - Qian Li

, Gang Li
, Wenjia Niu, Yanan Cao, Liang Chang, Jianlong Tan, Li Guo:
Boosting imbalanced data learning with Wiener process oversampling. 836-851 - Wayne Xin Zhao, Chen Liu, Ji-Rong Wen, Xiaoming Li:

Ranking and tagging bursty features in text streams with context language models. 852-862 - Yansheng Du

, Zhihua Chen, Changqing Zhang, Xiaochun Cao:
Research on axial bearing capacity of rectangular concrete-filled steel tubular columns based on artificial neural networks. 863-873 - Yongyi Yan, Zengqiang Chen, Jumei Yue:

Algebraic state space approach to model and control combined automata. 874-886 - Wei Li, Yuefei Sui:

The B4-valued propositional logic with unary logical connectives ~1 / ~2 /¬. 887-894 - Cheqing Jin, Jie Chen, Huiping Liu:

MapReduce-based entity matching with multiple blocking functions. 895-911 - Rui Liu, Wenge Rong, Yuanxin Ouyang, Zhang Xiong:

A hierarchical similarity based job recommendation service framework for university students. 912-922
Volume 11, Number 6, December 2017
- Yiqun Liu, Chao Wang

, Min Zhang, Shaoping Ma:
User behavior modeling for better Web search ranking. 923-936 - Shasha Fu, Jianbin Qiu, Wenqiang Ji:

Non-fragile control of fuzzy affine dynamic systems via piecewise Lyapunov functions. 937-947 - Ernst-Erich Doberkat:

Using coalgebras and the Giry monad for interpreting game logics - a tutorial. 948-970 - Xiaofang Qi, Zhenliang Jiang:

Precise slicing of interprocedural concurrent programs. 971-986 - Xuansong Li, Xianping Tao, Jian Lu:

Towards a programming framework for activity-oriented context-aware applications. 987-1006 - Yaxin Yu, Yuhai Zhao, Ge Yu, Guoren Wang:

Mining coterie patterns from Instagram photo trajectories for recommending popular travel routes. 1007-1022 - Le Dong, Wenpu Dong, Ning Feng, Mengdie Mao, Long Chen, Gaipeng Kong:

Color space quantization-based clustering for image retrieval. 1023-1035 - Quanjun Yin, Long Qin, Yong Peng, Wei Duan:

Learning real-time search on c-space GVDs. 1036-1049 - Bartlomiej Placzek:

Decision-aware data suppression in wireless sensor networks for target tracking applications. 1050-1060 - Jun Zhang, Jiangtao Wen, Yuxing Han:

TCP-ACC: performance and analysis of an active congestion control algorithm for heterogeneous networks. 1061-1074 - Xiaohui Guo, Chunming Hu, Richong Zhang, Jinpeng Huai:

A probabilistic framework of preference discovery from folksonomy corpus. 1075-1084 - Zhongqing Wang, Shoushan Li, Guodong Zhou

:
Personal summarization from profile networks. 1085-1097 - Lip Yee Por

, Chin Soon Ku
, Amanul Islam
, Tan Fong Ang
:
Graphical password: prevent shoulder-surfing attack using digraph substitution rules. 1098-1108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














