Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Survey of Non-Volatile Main Memory File Systems

    Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...

    Ying Wang, Wen-Qing Jia, De-Jun Jiang in Journal of Computer Science and Technology (2023)

  2. No Access

    Article

    Swarm Intelligence Research: From Bio-inspired Single-population Swarm Intelligence to Human-machine Hybrid Swarm Intelligence

    Swarm intelligence has become a hot research field of artificial intelligence. Considering the importance of swarm intelligence for the future development of artificial intelligence, we discuss and analyze swa...

    Guo-Yin Wang, Dong-Dong Cheng, De-You **a, Hai-Huan Jiang in Machine Intelligence Research (2023)

  3. No Access

    Article

    Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism

    The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...

    Yu-**g Feng, De-Jian Li, Xu Tan in Journal of Computer Science and Technology (2022)

  4. Article

    Preface

    Yi Pan, De-Shuang Huang, Jian-**n Wang in Journal of Computer Science and Technology (2021)

  5. No Access

    Article

    Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser

    We built a Tm:Ho co-doped fiber laser using a Ti3C2 MXene material as a saturable absorber (SA). The formation of vector solitons (VSs) and noise-like pulses (NLPs) was observed. The SA was prepared by drip** a...

    Shuai Wang 王帅, Lei Li **雷, Yu-feng Song 宋宇峰 in Frontiers of Information Technology & Elec… (2021)

  6. No Access

    Article

    Energy-efficient power amplifiers and linearization techniques for massive MIMO transmitters: a review

    Highly efficient power amplifiers (PAs) and associated linearization techniques have been developed to accommodate the explosive growth in the data transmission rate and application of massive multiple input m...

    **n Liu, Guan-sheng Lv, De-han Wang in Frontiers of Information Technology & Elec… (2020)

  7. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  8. No Access

    Article

    Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories

    Cabled seafloor observatories play an important role in ocean exploration for its long-term, real-time, and in-situ observation characteristics. In establishing a permanent, reliable, and robust seafloor obser...

    Zhi-feng Zhang, Yan-hu Chen, De-jun Li in Frontiers of Information Technology & Elec… (2018)

  9. No Access

    Article

    Underwater video transceiver designs based on channel state information and video content

    Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive tr...

    Rong-xin Zhang, **ao-li Ma, De-qing Wang in Frontiers of Information Technology & Elec… (2018)

  10. No Access

    Article

    Cross-lingual implicit discourse relation recognition with co-training

    A lack of labeled corpora obstructs the research progress on implicit discourse relation recognition (DRR) for Chinese, while there are some available discourse corpora in other languages, such as English. In ...

    Yao-jie Lu, Mu Xu, Chang-xing Wu in Frontiers of Information Technology & Elec… (2018)

  11. No Access

    Article

    An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks

    In the field of vehicular wireless sensor networks-based structural health monitoring, the structural damage identification is achieved by two structural features, namely natural frequencies and mode shapes. T...

    Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, De-Sheng Fu in The Journal of Supercomputing (2018)

  12. No Access

    Article

    Cryptanalysis of an identity-based public auditing protocol for cloud storage

    Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cl...

    Li-bing Wu, **g Wang, De-biao He in Frontiers of Information Technology & Elec… (2017)

  13. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  14. No Access

    Article

    A modified simulated annealing algorithm and an excessive area model for floorplanning using fixed-outline constraints

    Outline-free floorplanning focuses on area and wirelength reductions, which are usually meaningless, since they can hardly satisfy modern design requirements. We concentrate on a more difficult and useful issu...

    De-xuan Zou, Gai-ge Wang, Gai Pan in Frontiers of Information Technology & Elec… (2016)

  15. No Access

    Article

    Intelligent computing budget allocation for on-road trajectory planning based on candidate curves

    In this paper, on-road trajectory planning is solved by introducing intelligent computing budget allocation (ICBA) into a candidate-curve-based planning algorithm, namely, ordinal-optimization-based differenti...

    **ao-xin Fu, Yong-heng Jiang, De-xian Huang in Frontiers of Information Technology & Elec… (2016)

  16. No Access

    Article

    Extracting hand articulations from monocular depth images using curvature scale space descriptors

    We propose a framework of hand articulation detection from a monocular depth image using curvature scale space (CSS) descriptors. We extract the hand contour from an input depth image, and obtain the fingertip...

    Shao-fan Wang, Chun Li, De-hui Kong in Frontiers of Information Technology & Elec… (2016)

  17. No Access

    Article

    Develo** a power monitoring and protection system for the junction boxes of an experimental seafloor observatory network

    A power monitoring and protection system based on an embedded processor was designed for the junction boxes (JBs) of an experimental seafloor observatory network in China. The system exhibits high reliability,...

    Jun Wang, De-jun Li, Can-jun Yang in Frontiers of Information Technology & Elec… (2015)

  18. No Access

    Article

    An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

    The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...

    **-Te Wang, De-Rong Shen, Mei Bai in Journal of Computer Science and Technology (2015)

  19. No Access

    Article

    SEIP: System for Efficient Image Processing on Distributed Platform

    Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...

    Tao Liu, Yi Liu, Qin Li, **ang-Rong Wang in Journal of Computer Science and Technology (2015)

  20. Article

    Feature selection and feature learning for high-dimensional batch reinforcement learning: A survey

    Tremendous amount of data are being generated and saved in many complex engineering and social systems every day. It is significant and feasible to utilize the big data to make better decisions by machine lear...

    De-Rong Liu, Hong-Liang Li, Ding Wang in International Journal of Automation and Computing (2015)

previous disabled Page of 2