Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Survey of Non-Volatile Main Memory File Systems

    Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...

    Ying Wang, Wen-Qing Jia, De-Jun Jiang in Journal of Computer Science and Technology (2023)

  2. No Access

    Article

    Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism

    The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...

    Yu-**g Feng, De-Jian Li, Xu Tan in Journal of Computer Science and Technology (2022)

  3. Article

    Preface

    Yi Pan, De-Shuang Huang, Jian-**n Wang in Journal of Computer Science and Technology (2021)

  4. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    26th International Conference, DASFAA 2021, Taipei, Taiwan, April 11–14, 2021, Proceedings, Part I

    Christian S. Jensen, Ee-Peng Lim in Lecture Notes in Computer Science (2021)

  5. No Access

    Article

    Image fuzzy enhancement algorithm based on contourlet transform domain

    In order to solve the problems of low contrast, global darkness and noise amplification in some hyperspectral and remote-sensing images, a new image fuzzy enhancement method based on contourlet transform (CT) ...

    Yun-hu Huang, De-wang Chen in Multimedia Tools and Applications (2020)

  6. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  7. No Access

    Article

    A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

    With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...

    Cheng-Ta Huang, Li-Chiun Lin, De-En Sun in Multimedia Tools and Applications (2019)

  8. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  9. No Access

    Article

    A new method to estimate ages of facial image for large database

    As a common consensus that the appearances of different persons with the same age diverge widely, we have an opinion that the estimated result of a facial image should be a dynamic range or discrete candidate ...

    Ye-Wang Chen, De-He Lai, Han Qi, Jiong-Liang Wang in Multimedia Tools and Applications (2016)

  10. No Access

    Article

    An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

    The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...

    **-Te Wang, De-Rong Shen, Mei Bai in Journal of Computer Science and Technology (2015)

  11. No Access

    Article

    SEIP: System for Efficient Image Processing on Distributed Platform

    Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...

    Tao Liu, Yi Liu, Qin Li, **ang-Rong Wang in Journal of Computer Science and Technology (2015)

  12. No Access

    Article

    High Performance Interconnect Network for Tianhe System

    In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software fe...

    **ang-Ke Liao, Zheng-Bin Pang, Ke-Fei Wang in Journal of Computer Science and Technology (2015)

  13. No Access

    Article

    Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters

    Designing eco-friendly system has been at the forefront of computing research. Faced with a growing concern about the server energy expenditure and the climate change, both industry and academia start to show ...

    Chao Li, Rui Wang, Yang Hu, Rui** Zhou in Journal of Computer Science and Technology (2014)

  14. No Access

    Article

    An application oriented and shape feature based multi-touch gesture description and recognition method

    In order to customize multi-touch gestures for different applications, and facilitate multi-touch gesture recognition, an application oriented and shape feature based multi-touch gesture description and recogn...

    De-xin Wang, Zhi-hui **ong, Mao-jun Zhang in Multimedia Tools and Applications (2012)

  15. No Access

    Article

    A robust content based audio watermarking using UDWT and invariant histogram

    Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work...

    Hong-ying Yang, De-wang Bao, **ang-yang Wang in Multimedia Tools and Applications (2012)

  16. No Access

    Article

    Personalized Tag Recommendation Using Social Influence

    Tag recommendation encourages users to add more tags in bridging the semantic gap between human concept and the features of media object, which provides a feasible solution for content-based multimedia informa...

    Jun Hu, Bing Wang, Yu Liu, De-Yi Li in Journal of Computer Science and Technology (2012)

  17. No Access

    Article

    A multi-touch platform based on four corner cameras and methods for accurately locating contact points

    This paper presents a low-cost and scalable multi-touch platform which uses four cameras to reduce occlusion. Three methods are provided for locating contact points on this platform, including the lookup table...

    De-xin Wang, Qing-bao Liu, Mao-jun Zhang in Multimedia Tools and Applications (2011)

  18. No Access

    Chapter and Conference Paper

    A Scheduling Method of Maintenance Work Based on Dynamic Priority

    The scheduling problem of maintenance work on the equipment support station influences the support efficiency, especially for a station which repairs a large number of failed items from more than one subordina...

    Ying-wu Peng, De-jun Mao, Wei-yi Chen, Rui Wang in Applied Informatics and Communication (2011)

  19. No Access

    Article

    Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network

    A dynamic threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class’s CAC thresholds are solved through establishing a ...

    Jian-Hui Huang, De-Pei Qian, Sheng-Ling Wang in Journal of Computer Science and Technology (2007)

  20. No Access

    Article

    Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard

    In this paper, a Context-based 2D Variable Length Coding (C2DVLC) method for coding the transformed residuals in AVS video coding standard is presented. One feature in C2DVLC is the usage of multiple 2D-VLC ta...

    Qiang Wang, De-Bin Zhao, Wen Gao in Journal of Computer Science and Technology (2006)

previous disabled Page of 2