Skip to main content

and
  1. No Access

    Article

    Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective

    Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...

    **ao-Fei Liao 廖小飞, Wen-Ju Zhao 赵文举 in Journal of Computer Science and Technology (2024)

  2. No Access

    Article

    RV16: An Ultra-Low-Cost Embedded RISC-V Processor Core

    Embedded and Internet of Things (IoT) devices have extremely strict requirements on the area and power consumption of the processor because of the limitation on its working environment. To reduce the overhead ...

    Yuan-Hu Cheng, Li-Bo Huang, Yi-Jun Cui in Journal of Computer Science and Technology (2022)

  3. Article

    Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm

    Generating molecules with desired properties is an important task in chemistry and pharmacy. An efficient method may have a positive impact on finding drugs to treat diseases like COVID-19. Data mining and art...

    Jian-Fu Zhu, Zhong-Kai Hao, Qi Liu, Yu Yin in Journal of Computer Science and Technology (2022)

  4. No Access

    Article

    Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks

    Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for research...

    Hao Liao, Qi-**n Liu, Ze-Cheng Huang in Journal of Computer Science and Technology (2022)

  5. No Access

    Article

    EmotionMap: Visual Analysis of Video Emotional Content on a Map

    Emotion plays a crucial role in gratifying users’ needs during their experience of movies and TV series, and may be underutilized as a framework for exploring video content and analysis. In this paper, we pres...

    Cui-**a Ma, Jian-Cheng Song, Qian Zhu in Journal of Computer Science and Technology (2020)

  6. No Access

    Article

    Interference-Limited Device-to-Device Multi-User Cooperation Scheme for Optimization of Edge Networking

    Device-to-device (D2D) communication is an emerging technology for improving cellular networks, which plays an important role in realizing Internet of Things (IoT). The spectrum efficiency, energy efficiency a...

    Hong-Cheng Huang, Jie Zhang, Zu-Fan Zhang in Journal of Computer Science and Technology (2016)

  7. No Access

    Article

    On construction of a distributed data storage system in cloud

    In the past, people have focused on cluster computing and grid computing. Now, however, this focus has shifted to cloud computing. Irrespective of what techniques are used, there are always storage requirement...

    Chao-Tung Yang, Wen-Chung Shih, Chih-Lin Huang, Fuu-Cheng Jiang in Computing (2016)

  8. No Access

    Article

    MIMS: Towards a Message Interface Based Memory System

    The decades-old synchronous memory bus interface has restricted many innovations in the memory system, which is facing various challenges (or walls) in the era of multi-core and big data. In this paper, we arg...

    Li-Cheng Chen, Ming-Yu Chen, Yuan Ruan in Journal of Computer Science and Technology (2014)

  9. No Access

    Article

    SWIP Prediction: Complexity-Effective Indirect-Branch Prediction Using Pointers

    Predicting indirect-branch targets has become a performance bottleneck for many applications. Previous high-performance indirect-branch predictors usually require significant hardware storage or additional com...

    Zi-Chao **e, Dong Tong, Ming-Kai Huang in Journal of Computer Science and Technology (2012)

  10. No Access

    Article

    A Semantic Searching Scheme in Heterogeneous Unstructured P2P Networks

    Semantic-based searching in peer-to-peer (P2P) networks has drawn significant attention recently. A number of semantic searching schemes, such as GES proposed by Zhu Y et al., employ search models in Information ...

    Jun-Cheng Huang, **u-Qi Li, Jie Wu in Journal of Computer Science and Technology (2011)

  11. No Access

    Article

    Free Appearance-Editing with Improved Poisson Image Cloning

    In this paper, we present a new edit tool for the user to conveniently preserve or freely edit the object appearance during seamless image composition. We observe that though Poisson image editing is effective...

    **ao-Hui Bie, Hao-Da Huang, Wen-Cheng Wang in Journal of Computer Science and Technology (2011)

  12. No Access

    Article

    Accelerated Parallel Texture Optimization

    Texture optimization is a texture synthesis method that can efficiently reproduce various features of exemplar textures. However, its slow synthesis speed limits its usage in many interactive or real time appl...

    Hao-Da Huang, **n Tong, Wen-Cheng Wang in Journal of Computer Science and Technology (2007)

  13. No Access

    Article

    Dynamic Fuzzy Controlled RWA Algorithm for IP/GMPLS over WDM Networks

    This paper proposes a dynamic RWA scheme using fuzzy logic control on IP/GMPLS over WDM networks to achieve the best quality of network transmission. The proposed algorithm dynamically allocates network resour...

    I-Shyan Hwang, I-Feng Huang, Shin-Cheng Yu in Journal of Computer Science and Technology (2005)