Skip to main content

previous disabled Page of 110
and
  1. No Access

    Article

    Indexing spatiotemporal trajectory data streams on key-value storage

    In a trajectory management system, moving objects are typically equipped with GPS devices to report their locations to a data store. Given the potentially high frequency of location updates by multiple moving ...

    **aofei Zhao, Kam-Yiu Lam, Tei-Wei Kuo in Computing (2024)

  2. No Access

    Article

    Community anomaly detection in attribute networks based on refining context

    With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection,...

    Yonghui Lin, Li Xu, Wei Lin, Jiayin Li in Computing (2024)

  3. No Access

    Article

    An improved indicator-based two-archive algorithm for many-objective optimization problems

    The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and...

    Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang in Computing (2024)

  4. No Access

    Article

    Computational Approaches for Traditional Chinese Painting: From the “Six Principles of Painting” Perspective

    Traditional Chinese painting (TCP) is an invaluable cultural heritage resource and a unique visual art style. In recent years, there has been a growing emphasis on the digitalization of TCP for cultural preser...

    Wei Zhang 张 玮, Jian-Wei Zhang 张建伟 in Journal of Computer Science and Technology (2024)

  5. No Access

    Article

    TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things

    With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tamper...

    Hui **e, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu in Computing (2024)

  6. No Access

    Article

    Identity-Preserving Adversarial Training for Robust Network Embedding

    Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g., node classification and link prediction. Unfortunately, exis...

    Ke-Ting Cen, Hua-Wei Shen, Qi Cao in Journal of Computer Science and Technology (2024)

  7. No Access

    Article

    An Online Algorithm Based on Replication for Using Spot Instances in IaaS Clouds

    Infrastructure-as-a-Service (IaaS) cloud platforms offer resources with diverse buying options. Users can run an instance on the on-demand market which is stable but expensive or on the spot market with a sign...

    Zhi-Wei Xu, Li Pan, Shi-Jun Liu in Journal of Computer Science and Technology (2024)

  8. No Access

    Article

    SMEC: Scene Mining for E-Commerce

    Scene-based recommendation has proven its usefulness in E-commerce, by recommending commodities based on a given scene. However, scenes are typically unknown in advance, which necessitates scene discovery for ...

    Gang Wang, **ang Li, Zi-Yi Guo, Da-Wei Yin in Journal of Computer Science and Technology (2024)

  9. No Access

    Article

    Community-Preserving Social Graph Release with Node Differential Privacy

    The goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an important global pattern of nodes, is a crucial data utility...

    Sen Zhang, Wei-Wei Ni, Nan Fu in Journal of Computer Science and Technology (2023)

  10. No Access

    Article

    Shapelet Based Two-Step Time Series Positive and Unlabeled Learning

    In the last decade, there has been significant progress in time series classification. However, in real-world industrial settings, it is expensive and difficult to obtain high-quality labeled data. Therefore, ...

    Han-Bo Zhang, Peng Wang, Ming-Ming Zhang in Journal of Computer Science and Technology (2023)

  11. No Access

    Article

    Motion-Inspired Real-Time Garment Synthesis with Temporal-Consistency

    Synthesizing garment dynamics according to body motions is a vital technique in computer graphics. Physics-based simulation depends on an accurate model of the law of kinetics of cloth, which is time-consuming...

    Yu-Kun Wei, Min Shi, Wen-Ke Feng in Journal of Computer Science and Technology (2023)

  12. No Access

    Article

    A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs

    This paper first presents a high-efficient and accurate coupled meshless algorithm for solving the multi-dimensional Gross–Pitaevskii equation (GPE) in unbounded domain, which is implemented on CUDA-program-ba...

    Tao Jiang, **ang-Yang Wei, Yue Li, Deng-Shan Wang, **-Yun Yuan in Computing (2023)

  13. No Access

    Article

    A framework for data anomaly detection based on iterative optimization in IoT systems

    With the advent of 5 G, the Internet of Things (IoT) makes many basic applications possible. In IoT applications, sensors are widely deployed to collect various data. Due to the dynamic nature of the wireless ...

    Zhongmin Wang, Zhihao Wei, Cong Gao, Yan** Chen, Fengwei Wang in Computing (2023)

  14. No Access

    Article

    Path-Based Multicast Routing for Network-on-Chip of the Neuromorphic Processor

    Network-on-Chip (NoC) is widely adopted in neuromorphic processors to support communication between neurons in spiking neural networks (SNNs). However, SNNs generate enormous spiking packets due to the one-to-...

    Zi-Yang Kang, Shi-Ming Li, Shi-Ying Wang in Journal of Computer Science and Technology (2023)

  15. Article

    Disaggregated Datacenters for Future Cloud Computing

    Zhi-Wei Xu in Journal of Computer Science and Technology (2023)

  16. No Access

    Article

    Dalea: A Persistent Multi-Level Extendible Hashing with Improved Tail Performance

    Persistent memory (PM) promises byte-addressability, large capacity, and durability. Main memory systems, such as key-value stores and in-memory databases, benefit from such features of PM. Due to the great po...

    Zi-Wei **ong, De-Jun Jiang, ** **ong in Journal of Computer Science and Technology (2023)

  17. No Access

    Article

    Signed directed attention network

    Network embedding has facilitated lots of network analytical tasks by representing nodes as low-dimensional vectors. As an extension of convolutional neural networks from Euclidean data to irregular data, Grap...

    Yong Wu, Binjun Wang, Wei Li, Wenmao Liu in Computing (2023)

  18. No Access

    Article

    Combining unsupervised and supervised classification for customer value discovery in the telecom industry: a deep learning approach

    Customer behaviour analysis in a telecom market is a challenging task in the customer relationship management area. In this paper, we propose a customer behaviour recognition model that combines unsupervised c...

    Yang Zhao, Zhen Shao, Wei Zhao, Jun Han, Qingru Zheng, Ran **g in Computing (2023)

  19. No Access

    Article

    Joint Participant Selection and Learning Optimization for Federated Learning of Multiple Models in Edge Cloud

    To overcome the limitations of long latency and privacy concerns from cloud computing, edge computing along with distributed machine learning such as federated learning (FL), has gained much attention and popu...

    **nliang Wei, Jiyao Liu, Yu Wang in Journal of Computer Science and Technology (2023)

  20. No Access

    Article

    Context-Aware Semantic Type Identification for Relational Attributes

    Identifying semantic types for attributes in relations, known as attribute semantic type (AST) identification, plays an important role in many data analysis tasks, such as data cleaning, schema matching, and k...

    Yue Ding, Yu-He Guo, Wei Lu, Hai-**ang Li in Journal of Computer Science and Technology (2023)

previous disabled Page of 110