2095-2228

Frontiers of Computer Science (FCS) - April 2015, issue 2 论文列表

本期论文列表
Structural information aware deep semi-supervised recurrent neural network for sentiment analysis

Learning with privileged information using Bayesian networks

Understanding taxi drivers’ routing choices from spatial and social traces

Product-oriented review summarization and scoring

Efficient query processing framework for big data warehouse: an almost join-free approach

A model-driven approach to semi-structured database design

Efficient subtree results computation for XML keyword queries

Discovering admissible Web services with uncertain QoS

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

Cloud authorization: exploring techniques and approach towards effective access control framework

Virtual machine selection and placement for dynamic consolidation in Cloud computing environment

A high order collaboration and real time formal model for automatic testing of safety critical systems

Efficient approach of translating LTL formulae into Büchi automata

Understanding and identifying latent data races cross-thread interleaving

Runtime model based approach to IoT application development

Software crowdsourcing for developing Software-as-a-Service

Exploiting write power asymmetry to improve phase change memory system performance

XGRouter: high-quality global router in X-architecture with particle swarm optimization

Active transfer learning of matching query results across multiple sources

Combining long-term and short-term user interest for personalized hashtag recommendation

Cuckoo search with varied scaling factor

Basic theorem as representation of heterogeneous concept lattices

Identification of cytokine via an improved genetic algorithm

Detecting differential expression from RNA-seq data with expression measurement uncertainty

A survey on software defined networking and its applications

Hierarchical caches in content-centric networks: modeling and analysis

Compound graph based hybrid data center topologies

A cost-effective scheme supporting adaptive service migration in cloud data center

Recommend trustworthy services using interval numbers of four parameters via cloud model for potential users

Adaptive and scalable load balancing for metadata server cluster in cloud-scale file systems

RDF partitioning for scalable SPARQL query processing

Equivalence checking between SLM and TLM using coverage directed simulation

BIFER: a biphasic trace filter approach to scalable prediction of concurrency errors

Distribution of action movements (DAM): a descriptor for human action recognition

Non-intrusive sleep pattern recognition with ubiquitous sensing in elderly assistive environment

Video structural description technology for the new generation video surveillance systems

3D object retrieval based on histogram of local orientation using one-shot score support vector machine

Generalized interface automata with multicast synchronization

Integrating behavior analysis into architectural modeling

Melton: a practical and precise memory leak detection tool for C programs

Algorithms for tractable compliance problems

A complete coalition logic of temporal knowledge for multi-agent systems

Timed-pNets: a communication behavioural semantic model for distributed systems

A new fragment re-allocation strategy for NoSQL database systems

SAMES: deadline-constraint scheduling in MapReduce

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment

Scalable protocol for cross-domain group password-based authenticated key exchange

Semantic theories of programs with nested interrupts

A novel strategy for automatic test data generation using soft computing technique

Verifying specifications with associated attributes in graph transformation systems

Hybrid fusion and interpolation algorithm with near-infrared image

Efficient image representation for object recognition via pivots selection

A hybrid biometric identification framework for high security applications

Pedestrian detection algorithm based on video sequences and laser point cloud

Extracting viewer interests for automated bookmarking in video-on-demand services

Memory bandwidth optimization of SpMV on GPGPUs

A balanced decomposition approach to real-time visualization of large vector maps in CyberGIS

Irradiance regression for efficient final gathering in global illumination

A hierarchical ontology context model for work-based learning

A sequential model of bargaining in logic programming

Research on self-adaptive decision-making mechanism for competition strategies in robot soccer

State of the art and prospects of structured sensing matrices in compressed sensing

Character recognition based on non-linear multi-projection profiles measure

Camera array calibration for light field acquisition

A novel adaptive image zooming scheme via weighted least-squares estimation

A statistical learning based image denoising approach

Adaptive segmentation based on multi-classification model for dermoscopy images

A pixel-based outlier-free motion estimation algorithm for scalable video quality enhancement

Fast approximate matching of binary codes with distinctive bits

Effects of smartphone icon background shapes and figure/background area ratios on visual search performance and user preferences

A new encryption scheme for surveillance videos

The optimal information rate for graph access structures of nine participants

Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model

Mathematical and computational approaches to epidemic modeling: a comprehensive review