Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A computation offloading strategy for multi-access edge computing based on DQUIC protocol

    Computation offloading can efficiently expand edge resources and is widely used to perform computing-intensive and delay-sensitive tasks. The inability of existing offloading strategies to pay attention to bot...

    Peng Yang, Ruochen Ma, Meng Yi, Yifan Zhang, Bing Li in The Journal of Supercomputing (2024)

  2. No Access

    Article

    Perception data fusion-based computation offloading in cooperative vehicle infrastructure systems

    With the rapid advancement of intelligent transportation systems, cooperative vehicle infrastructure systems emerge as a vital frontier for development. Real-time mutual fusion of perception data is a crucial ...

    Ruizhi Wu, Bo Li, Peng Hou, Fen Hou in The Journal of Supercomputing (2024)

  3. No Access

    Article

    SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene

    Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limi...

    Rui Zhong, Ende Peng, Ziqiang Li, Qing Ai, Tao Han in The Journal of Supercomputing (2024)

  4. No Access

    Article

    Graph neural news recommendation based on multi-view representation learning

    Accurate news representation is of crucial importance in personalized news recommendation. Most of existing news recommendation model lack comprehensiveness because they do not consider the higher-order struct...

    **aohong Li, Ruihong Li, Qixuan Peng, ** Yao in The Journal of Supercomputing (2024)

  5. No Access

    Article

    Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks

    With the improvement in communication network density, inter-cell interference has become severe. Due to the blurring of boundaries, cell-free networks are considered as a solution. However, it faces some chal...

    Hongtai Yao, Zewen Li, Yong **, Zhentao Hu, Qinglan Peng in The Journal of Supercomputing (2024)

  6. No Access

    Article

    MWformer: a novel low computational cost image restoration algorithm

    The development of the Internet of Things has led to a surge in edge devices. The image detection algorithm, one of the commonly used algorithms in edge computing, is affected by environments such as weather, ...

    **g Liao, Cheng Peng, Lei Jiang, Yihua Ma, Wei Liang in The Journal of Supercomputing (2024)

  7. No Access

    Article

    A fault-tolerant scheduling algorithm that minimizes the number of replicas in heterogeneous service-oriented cloud computing systems

    The service-oriented heterogeneous cloud computing system offers paid computing services through its powerful processors. However, task execution failures caused by processors can diminish application reliabil...

    Fang Liu, Kejie Hu, **g He, Wei Hu, Heyuan Li, Min Peng in The Journal of Supercomputing (2024)

  8. No Access

    Article

    AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture

    Due to the large computational requirements of object detection algorithms, high-resolution remote sensing vehicle detection always involves numerous small objects, high level of background complexity, and cha...

    Shou-Bin Wang, Zi-Meng Gao, Deng-Hui **, Shu-Ming Gong in The Journal of Supercomputing (2024)

  9. No Access

    Article

    Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning

    Recent breakthroughs in artificial intelligence and deep neural networks (DNNs) have produced an explosive demand for computing platforms equipped with customized domain-specific accelerators. However, DNN acc...

    Peng Li, Cheng Che, Rui Hou in The Journal of Supercomputing (2024)

  10. No Access

    Article

    Spatial-guided informative semantic joint transformer for single-image deraining

    Single-image deraining is of great significance for image recognition and analysis. However, the majority of current methods face challenges such as incomplete removal of tiny rain streaks, blurred restoration...

    Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li in The Journal of Supercomputing (2024)

  11. No Access

    Article

    An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing

    With the rise of Internet of Things (IoT) technology, fog computing has emerged as a promising solution for low-latency and real-time applications. As a highly virtualized platform, fog computing provides comp...

    Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, **aogang Xu in The Journal of Supercomputing (2024)

  12. No Access

    Article

    SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing

    Semantic relatedness is one of the most significant aspects of natural language processing. It has been identified as a critical technology for develo** intelligent systems like Siri, Microsoft Ice, Cortana,...

    Xu Gu, **aoliang Chen, Peng Lu, **ang Lan, **anyong Li in The Journal of Supercomputing (2024)

  13. No Access

    Article

    Dual graph neural network for overlap** community detection

    Community detection has long been designed to find communities with different structures in various networks. It is now widely believed that these communities often overlap with each other. However, due to the...

    **aohong Li, Qixuan Peng, Ruihong Li, Huifang Ma in The Journal of Supercomputing (2024)

  14. No Access

    Article

    DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition

    Machines can be equipped with the capability of identifying human emotions through conversation, thus enabling them to empathize with natural persons when they speak to them. The emergence of chatbots and inte...

    Junyuan Ding, **aoliang Chen, Peng Lu, Zaiyan Yang in The Journal of Supercomputing (2023)

  15. No Access

    Article

    Graph-enhanced multi-answer summarization under question-driven guidance

    Multi-answer summarization for question-based queries in community Q&A requires comprehensive and in-depth analysis of lengthy and extensive information to generate concise and comprehensive answer summarizati...

    Bing Li, Peng Yang, Zhongjian Hu, Yuankang Sun, Meng Yi in The Journal of Supercomputing (2023)

  16. Article

    Open Access

    Cell tracking with multifeature fusion

    Cell tracking is currently a powerful tool in a variety of biomedical research topics. Most cell tracking algorithms follow the tracking by detection paradigm. Detection is critical for subsequent tracking. Un...

    Fei Wang, Huawei Li, Wanli Yang, Shidong **, Peng Gao in The Journal of Supercomputing (2023)

  17. No Access

    Article

    Data Security Aware and Effective Task Offloading Strategy in Mobile Edge Computing

    With the research and development of 5G technology, emerging markets such as Wise Information Technology of med, smart transportation and industrial Internet are gradually growing, which not only provide conve...

    Zhao Tong, Bilan Liu, **g Mei, Jiake Wang, **n Peng, Keqin Li in Journal of Grid Computing (2023)

  18. No Access

    Article

    Row-based hierarchical graph network for multi-hop question answering over textual and tabular data

    Multi-hop Question Answering over heterogeneous data is a challenging task in Natural Language Processing(NLP), which aims to find the answer among heterogeneous data sources and reasoning chains. When facing ...

    Peng Yang, Wenjun Li, Guangzhen Zhao, **anyu Zha in The Journal of Supercomputing (2023)

  19. Article

    Rumor detection driven by graph attention capsule network on dynamic propagation structures

    Rumor detection aims to judge the authenticity of posts on social media (such as Weibo and Twitter), which can effectively prevent the spread of rumors. While many recent rumor detection methods based on graph...

    Peng Yang, Juncheng Leng, Guangzhen Zhao, Wenjun Li in The Journal of Supercomputing (2023)

  20. No Access

    Article

    Int-Monitor: a model triggered hardware trojan in deep learning accelerators

    Deep learning accelerators have domain-specific architectures, this special memory hierarchy and working mode could bring about new crucial security vulnerabilities. Neural network reuse PE resources layer by ...

    Peng Li, Rui Hou in The Journal of Supercomputing (2023)

previous disabled Page of 2