Skip to main content

previous disabled Page of 23
and
  1. No Access

    Article

    Online Nonstop Task Management for Storm-Based Distributed Stream Processing Engines

    Most distributed stream processing engines (DSPEs) do not support online task management and cannot adapt to time-varying data flows. Recently, some studies have proposed online task deployment algorithms to s...

    Zhou Zhang, Pei-Quan **, **-Ke **e in Journal of Computer Science and Technology (2024)

  2. No Access

    Article

    Characterization of Exact One-Query Quantum Algorithms for Partial Boolean Functions

    The query model (or black-box model) has attracted much attention from the communities of both classical and quantum computing. Usually, quantum advantages are revealed by presenting a quantum algorithm that h...

    Ze-Kun Ye, Lv-Zhou Li in Journal of Computer Science and Technology (2023)

  3. No Access

    Article

    Reinvent Cloud Software Stacks for Resource Disaggregation

    Due to the unprecedented development of low-latency interconnect technology, building large-scale disaggregated architecture is drawing more and more attention from both industry and academia. Resource disaggr...

    Chen-** Wang, Yi-Zhou Shan, Peng-Fei Zuo in Journal of Computer Science and Technology (2023)

  4. No Access

    Article

    Chinese Named Entity Recognition Augmented with Lexicon Memory

    Inspired by the concept of content-addressable retrieval from cognitive science, we propose a novel fragmentbased Chinese named entity recognition (NER) model augmented with a lexicon-based memory in which bot...

    Yi Zhou, **ao-Qing Zheng, Xuan-**g Huang in Journal of Computer Science and Technology (2023)

  5. No Access

    Article

    Top-down Text-Level Discourse Rhetorical Structure Parsing with Bidirectional Representation Learning

    Early studies on discourse rhetorical structure parsing mainly adopt bottom-up approaches, limiting the parsing process to local information. Although current top-down parsers can better capture global informa...

    Long-Yin Zhang, **n Tan, Fang Kong in Journal of Computer Science and Technology (2023)

  6. No Access

    Article

    Improving BERT Fine-Tuning via Self-Ensemble and Self-Distillation

    Fine-tuning pre-trained language models like BERT have become an effective way in natural language processing (NLP) and yield state-of-the-art results on many downstream tasks. Recent studies on adapting BERT ...

    Yi-Ge Xu, **-Peng Qiu, Li-Gao Zhou in Journal of Computer Science and Technology (2023)

  7. No Access

    Article

    Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center

    Load balancing is vital for the efficient and long-term operation of cloud data centers. With virtualization, post (reactive) migration of virtual machines (VMs) after allocation is the traditional way for loa...

    Wen-Hong Tian, Min-**an Xu, Guang-Yao Zhou in Journal of Computer Science and Technology (2023)

  8. No Access

    Article

    Query Authentication Using Intel SGX for Blockchain Light Clients

    Due to limited computing and storage resources, light clients and full nodes coexist in a typical blockchain system. Any query from light clients must be forwarded to full nodes for execution, and light client...

    Qi-Feng Shao, Zhao Zhang, Che-Qing ** in Journal of Computer Science and Technology (2023)

  9. No Access

    Article

    Facebook and Tencent Data Fit a Cube Law Better than Metcalfe’s Law

    Metcalfe ’s law states that the value of a network grows as the square of the number of its users (Vn2), which was validated by actual data of Facebook and Tencent in 2013–2015. Since then, the users and the v...

    **ng-Zhou Zhang, Zhi-Wei Xu in Journal of Computer Science and Technology (2023)

  10. No Access

    Article

    Neural Emotion Detection via Personal Attributes

    There has been a recent line of work to automatically detect the emotions of posts in social media. In literature, studies treat posts independently and detect their emotions separately. Different from previou...

    **a-Bing Zhou, Zhong-Qing Wang in Journal of Computer Science and Technology (2022)

  11. No Access

    Article

    Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training

    Graph neural networks (GNNs) have achieved significant success in graph representation learning. Nevertheless, the recent work indicates that current GNNs are vulnerable to adversarial perturbations, in partic...

    Xu-Gang Wu, Hui-Jun Wu, Xu Zhou, **ang Zhao in Journal of Computer Science and Technology (2022)

  12. No Access

    Article

    Preface

    Jia-Feng Guo, Yi-Qing Zhou in Journal of Computer Science and Technology (2022)

  13. No Access

    Article

    NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains

    With the advent of virtualization techniques and software-defined networking (SDN), network function virtualization (NFV) shifts network functions (NFs) from hardware implementations to software appliances, be...

    Tian-Ni Xu, Hai-Feng Sun, Di Zhang in Journal of Computer Science and Technology (2022)

  14. No Access

    Article

    Extracting Variable-Depth Logical Document Hierarchy from Long Documents: Method, Evaluation, and Application

    In this paper, we study the problem of extracting variable-depth “logical document hierarchy” from long documents, namely organizing the recognized “physical document objects” into hierarchical structures. The...

    Rong-Yu Cao, Yi-Xuan Cao, Gan-Bin Zhou in Journal of Computer Science and Technology (2022)

  15. No Access

    Article

    Self-Supervised Music Motion Synchronization Learning for Music-Driven Conducting Motion Generation

    The correlation between music and human motion has attracted widespread research attention. Although recent studies have successfully generated motion for singers, dancers, and musicians, few have explored mot...

    Fan Liu, De-Long Chen, Rui-Zhi Zhou, Sai Yang in Journal of Computer Science and Technology (2022)

  16. No Access

    Article

    Test-Driven Feature Extraction of Web Components

    With the growing requirements of web applications, web components are developed to package the implementation of commonly-used features for reuse. In some cases, the developer may want to reuse some features w...

    Yong-Hao Long, Yan-Cheng Chen in Journal of Computer Science and Technology (2022)

  17. No Access

    Article

    ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference

    Grey-box fuzzing is an effective technology to detect software vulnerabilities, such as memory corruption. Previous fuzzers in detecting memory corruption bugs either use heavy-weight analysis, or use techniqu...

    Gen Zhang, Peng-Fei Wang, Tai Yue in Journal of Computer Science and Technology (2022)

  18. No Access

    Article

    Imputing DNA Methylation by Transferred Learning Based Neural Network

    DNA methylation is one important epigenetic type to play a vital role in many diseases including cancers. With the development of the high-throughput sequencing technology, there is much progress to disclose t...

    **n-Feng Wang, **ang Zhou, Jia-Hua Rao in Journal of Computer Science and Technology (2022)

  19. No Access

    Article

    Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context

    Document-level machine translation (MT) remains challenging due to its difficulty in efficiently using document-level global context for translation. In this paper, we propose a hierarchical model to learn the...

    **n Tan, Long-Yin Zhang, Guo-Dong Zhou in Journal of Computer Science and Technology (2022)

  20. No Access

    Article

    Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems

    Self-adaptive systems are able to adjust their behaviour in response to environmental condition changes and are widely deployed as Internetwares. Considered as a promising way to handle the ever-growing comple...

    Wen-Hua Yang, Min-Xue Pan, Yu Zhou in Journal of Computer Science and Technology (2022)

previous disabled Page of 23