Skip to main content

and
  1. No Access

    Article

    Some modifications of the parallel Halley iteration method and their convergence

    In this paper we derive five kinds of algorithms for simultaneously finding the zeros of a complex polynomial. The convergence and the convergence rate with higher order are obtained. The algorithms are numeri...

    Prof. De-ren Wang, Yu-jiang Wu in Computing (1987)

  2. No Access

    Article

    Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard

    In this paper, a Context-based 2D Variable Length Coding (C2DVLC) method for coding the transformed residuals in AVS video coding standard is presented. One feature in C2DVLC is the usage of multiple 2D-VLC ta...

    Qiang Wang, De-Bin Zhao, Wen Gao in Journal of Computer Science and Technology (2006)

  3. No Access

    Article

    Performance Comparison of AVS and H.264/AVC Video Coding Standards

    A new audio and video compression standard of China, known as advanced Audio Video coding Standard (AVS), is emerging. This standard provides a technical solution for many applications within the information i...

    **n-Fu Wang, De-Bin Zhao in Journal of Computer Science and Technology (2006)

  4. No Access

    Article

    Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network

    A dynamic threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class’s CAC thresholds are solved through establishing a ...

    Jian-Hui Huang, De-Pei Qian, Sheng-Ling Wang in Journal of Computer Science and Technology (2007)

  5. No Access

    Article

    Personalized Tag Recommendation Using Social Influence

    Tag recommendation encourages users to add more tags in bridging the semantic gap between human concept and the features of media object, which provides a feasible solution for content-based multimedia informa...

    Jun Hu, Bing Wang, Yu Liu, De-Yi Li in Journal of Computer Science and Technology (2012)

  6. No Access

    Article

    Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters

    Designing eco-friendly system has been at the forefront of computing research. Faced with a growing concern about the server energy expenditure and the climate change, both industry and academia start to show ...

    Chao Li, Rui Wang, Yang Hu, Rui** Zhou in Journal of Computer Science and Technology (2014)

  7. No Access

    Article

    High Performance Interconnect Network for Tianhe System

    In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software fe...

    **ang-Ke Liao, Zheng-Bin Pang, Ke-Fei Wang in Journal of Computer Science and Technology (2015)

  8. No Access

    Article

    An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

    The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...

    **-Te Wang, De-Rong Shen, Mei Bai in Journal of Computer Science and Technology (2015)

  9. No Access

    Article

    SEIP: System for Efficient Image Processing on Distributed Platform

    Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...

    Tao Liu, Yi Liu, Qin Li, **ang-Rong Wang in Journal of Computer Science and Technology (2015)

  10. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  11. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  12. Article

    Preface

    Yi Pan, De-Shuang Huang, Jian-**n Wang in Journal of Computer Science and Technology (2021)

  13. No Access

    Article

    Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism

    The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...

    Yu-**g Feng, De-Jian Li, Xu Tan in Journal of Computer Science and Technology (2022)

  14. No Access

    Article

    A Survey of Non-Volatile Main Memory File Systems

    Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...

    Ying Wang, Wen-Qing Jia, De-Jun Jiang in Journal of Computer Science and Technology (2023)