当前期刊: Journal of Computer Science and Technology Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • User Account Linkage Across Multiple Platforms with Location Data
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Wei Chen, Weiqing Wang, Hongzhi Yin, Jun-Hua Fang, Lei Zhao

    Linking user accounts belonging to the same user across different platforms with location data has received significant attention, due to the popularization of GPS-enabled devices and the wide range of applications benefiting from user account linkage (e.g., cross-platform user profiling and recommendation). Different from most existing studies which only focus on user account linkage across two platforms

    更新日期:2020-07-28
  • ATLRec: An Attentional Adversarial Transfer Learning Network for Cross-Domain Recommendation
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Ying Li, Jia-Jie Xu, Peng-Peng Zhao, Jun-Hua Fang, Wei Chen, Lei Zhao

    Entity linking is a new technique in recommender systems to link users’ interaction behaviors in different domains, for the purpose of improving the performance of the recommendation task. Linking-based cross-domain recommendation aims to alleviate the data sparse problem by utilizing the domain-sharable knowledge from auxiliary domains. However, existing methods fail to prevent domain-specific features

    更新日期:2020-07-28
  • Feature Selection for Malware Detection on the Android Platform Based on Differences of IDF Values
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Gökçer Peynirci, Mete Eminağaoğlu, Korhan Karabulut

    Android is the mobile operating system most frequently targeted by malware in the smartphone ecosystem, with a market share significantly higher than its competitors and a much larger total number of applications. Detection of malware before being published on official or unofficial application markets is critically important due to the typical end users’ widespread security inadequacy. In this paper

    更新日期:2020-07-28
  • Window Detection in Facades Using Heatmap Fusion
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Chuan-Kang Li, Hong-Xin Zhang, Jia-Xin Liu, Yuan-Qing Zhang, Shan-Chen Zou, Yu-Tong Fang

    Window detection is a key component in many graphics and vision applications related to 3D city modeling and scene visualization. We present a novel approach for learning to recognize windows in a colored facade image. Rather than predicting bounding boxes or performing facade segmentation, our system locates keypoints of windows, and learns keypoint relationships to group them together into windows

    更新日期:2020-07-28
  • Color Image Super-Resolution and Enhancement with Inter-Channel Details at Trivial Cost
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Chuang-Ye Zhang, Yan Niu, Tie-Ru Wu, Xi-Ming Li

    Image super-resolution is essential for a variety of applications such as medical imaging, surveillance imaging, and satellite imaging, among others. Traditionally, the most popular color image super-resolution is performed in each color channel independently. In this paper, we show that the super-resolution quality can be further enhanced by exploiting the cross-channel correlation. Inspired by the

    更新日期:2020-07-28
  • Towards Accurate Bit Error Simulation in Wireless Sensor Networks Including Environmental Influences
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Sven Pullwitt, Robert Hartung, Ulf Kulau, Lars Wolf

    Simulation is a common technique for the evaluation of new approaches and protocols in networked systems and provides many benefits. However, it is also well known that the relevance of the simulation results for real-world applications depends on the various models which are used within the simulation, e.g., for the characteristics of the radio communication. In this paper, we introduce the Extended

    更新日期:2020-07-28
  • A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Zachary P. Languell, Qijun Gu

    The Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging multi-UAV collision avoidance algorithms. The lack of security features in ADS-B leaves any processes dependent upon the information vulnerable to a variety of threats from compromised and dishonest UAVs. This could result in substantial

    更新日期:2020-07-28
  • Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Maryam Zarezadeh, Hamid Mala, Homa Khajeh

    In software-defined networking (SDN), controllers are sinks of information such as network topology collected from switches. Organizations often like to protect their internal network topology and keep their network policies private. We borrow techniques from secure multi-party computation (SMC) to preserve the privacy of policies of SDN controllers about status of routers. On the other hand, the number

    更新日期:2020-07-28
  • A Survey on Blocking Technology of Entity Resolution
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Bo-Han Li, Yi Liu, An-Man Zhang, Wen-Huan Wang, Shuo Wan

    Entity resolution (ER) is a significant task in data integration, which aims to detect all entity profiles that correspond to the same real-world entity. Due to its inherently quadratic complexity, blocking was proposed to ameliorate ER, and it offers an approximate solution which clusters similar entity profiles into blocks so that it suffices to perform pairwise comparisons inside each block in order

    更新日期:2020-07-28
  • Active Learning Query Strategies for Classification, Regression, and Clustering: A Survey
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Punit Kumar, Atul Gupta

    Generally, data is available abundantly in unlabeled form, and its annotation requires some cost. The labeling, as well as learning cost, can be minimized by learning with the minimum labeled data instances. Active learning (AL), learns from a few labeled data instances with the additional facility of querying the labels of instances from an expert annotator or oracle. The active learner uses an instance

    更新日期:2020-07-28
  • Enriching Context Information for Entity Linking with Web Data
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Yi-Ting Wang, Jie Shen, Zhi-Xu Li, Qiang Yang, An Liu, Peng-Peng Zhao, Jia-Jie Xu, Lei Zhao, Xun-Jie Yang

    Entity linking (EL) is the task of determining the identity of textual entity mentions given a predefined knowledge base (KB). Plenty of existing efforts have been made on this task using either “local” information (contextual information of the mention in the text), or “global” information (relations among candidate entities). However, either local or global information might be insufficient especially

    更新日期:2020-07-28
  • DEM: Deep Entity Matching Across Heterogeneous Information Networks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Chao Kong, Bao-Xiang Chen, Li-Ping Zhang

    Heterogeneous information networks, which consist of multi-typed vertices representing objects and multi-typed edges representing relations between objects, are ubiquitous in the real world. In this paper, we study the problem of entity matching for heterogeneous information networks based on distributed network embedding and multi-layer perceptron with a highway network, and we propose a new method

    更新日期:2020-07-28
  • Cognition-Driven Traffic Simulation for Unstructured Road Networks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Hua Wang, Xiao-Yu He, Liu-Yang Chen, Jun-Ru Yin, Li Han, Hui Liang, Fu-Bao Zhu, Rui-Jie Zhu, Zhi-Min Gao, Ming-Liang Xu

    Dynamic changes of traffic features in unstructured road networks challenge the scene-cognitive abilities of drivers, which brings various heterogeneous traffic behaviors. Modeling traffic with these heterogeneous behaviors would have significant impact on realistic traffic simulation. Most existing traffic methods generate traffic behaviors by adjusting parameters and cannot describe those heterogeneous

    更新日期:2020-07-28
  • Data Security and Privacy in Bitcoin System: A Survey
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-07-27
    Lie-Huang Zhu, Bao-Kun Zheng, Meng Shen, Feng Gao, Hong-Yu Li, Ke-Xin Shi

    To date, bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia. Bitcoin is an electronic payment system based on cryptography rather than on credit. Regardless of whether people are in the same city or country, bitcoin can be sent by any one person to any other person when they reach an agreement. The market

    更新日期:2020-07-28
  • Automatic Video Segmentation Based on Information Centroid and Optimized SaliencyCut
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Hui-Si Wu, Meng-Shu Liu, Lu-Lu Yin, Ping Li, Zhen-Kun Wen, Hon-Cheng Wong

    We propose an automatic video segmentation method based on an optimized SaliencyCut equipped with information centroid (IC) detection according to level balance principle in physical theory. Unlike the existing methods, the image information of another dimension is provided by the IC to enhance the video segmentation accuracy. Specifically, our IC is implemented based on the information-level balance

    更新日期:2020-05-29
  • Lane Detection: A Survey with New Results
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Dun Liang, Yuan-Chen Guo, Shao-Kui Zhang, Tai-Jiang Mu, Xiaolei Huang

    Lane detection is essential for many aspects of autonomous driving, such as lane-based navigation and high-definition (HD) map modeling. Although lane detection is challenging especially with complex road conditions, considerable progress has been witnessed in this area in the past several years. In this survey, we review recent visual-based lane detection datasets and methods. For datasets, we categorize

    更新日期:2020-05-29
  • Deploy Efficiency Driven k -Barrier Construction Scheme Based on Target Circle in Directional Sensor Network
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Xing-Gang Fan, Zhi-Cong Che, Feng-Dan Hu, Tao Liu, Jin-Shan Xu, Xiao-Long Zhou

    With the increasing demand for security, building strong barrier coverage in directional sensor networks is important for effectively detecting un-authorized intrusions. In this paper, we propose an efficient scheme to form the strong barrier coverage by adding the mobile nodes one by one into the barrier. We first present the concept of target circle which determines the appropriate residence region

    更新日期:2020-05-29
  • Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Yubin Duan, Guo-Ju Gao, Ming-Jun Xiao, Jie Wu

    With the quick development of the sharing economy, ride-hailing services have been increasingly popular worldwide. Although the service provides convenience for users, one concern from the public is whether the location privacy of passengers would be protected. Service providers (SPs) such as Didi and Uber need to acquire passenger and driver locations before they could successfully dispatch passenger

    更新日期:2020-05-29
  • A Survey on Performance Optimization of High-Level Synthesis Tools
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Lan Huang, Da-Lin Li, Kang-Ping Wang, Teng Gao, Adriano Tavares

    Field-programmable gate arrays (FPGAs) have recently evolved as a valuable component of the heterogeneous computing. The register transfer level (RTL) design flows demand the designers to be experienced in hardware, resulting in a possible failure of time-to-market. High-level synthesis (HLS) permits designers to work at a higher level of abstraction through synthesizing high-level language programs

    更新日期:2020-05-29
  • A Comprehensive Pipeline for Complex Text-to-Image Synthesis
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Fei Fang, Fei Luo, Hong-Pan Zhang, Hua-Jian Zhou, Alix L. H. Chow, Chun-Xia Xiao

    Synthesizing a complex scene image with multiple objects and background according to text description is a challenging problem. It needs to solve several difficult tasks across the fields of natural language processing and computer vision. We model it as a combination of semantic entity recognition, object retrieval and recombination, and objects’ status optimization. To reach a satisfactory result

    更新日期:2020-05-29
  • Next POI Recommendation Based on Location Interest Mining with Recurrent Neural Networks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Ming Chen, Wen-Zhong Li, Lin Qian, Sang-Lu Lu, Dao-Xu Chen

    In mobile social networks, next point-of-interest (POI) recommendation is a very important function that can provide personalized location-based services for mobile users. In this paper, we propose a recurrent neural network (RNN)-based next POI recommendation approach that considers both the location interests of similar users and contextual information (such as time, current location, and friends’

    更新日期:2020-05-29
  • Data-Driven Approaches for Spatio-Temporal Analysis: A Survey of the State-of-the-Arts
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Monidipa Das, Soumya K. Ghosh

    With the advancement of telecommunications, sensor networks, crowd sourcing, and remote sensing technology in present days, there has been a tremendous growth in the volume of data having both spatial and temporal references. This huge volume of available spatio-temporal (ST) data along with the recent development of machine learning and computational intelligence techniques has incited the current

    更新日期:2020-05-29
  • Reference Image Guided Super-Resolution via Progressive Channel Attention Networks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Huan-Jing Yue, Sheng Shen, Jing-Yu Yang, Hao-Feng Hu, Yan-Fang Chen

    In recent years, the convolutional neural networks (CNNs) for single image super-resolution (SISR) are becoming more and more complex, and it is more challenging to improve the SISR performance. In contrast, the reference image guided super-resolution (RefSR) is an effective strategy to boost the SR (super-resolution) performance. In RefSR, the introduced high-resolution (HR) references can facilitate

    更新日期:2020-05-29
  • Distinguishing Computer-Generated Images from Natural Images Using Channel and Pixel Correlation
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Rui-Song Zhang, Wei-Ze Quan, Lu-Bin Fan, Li-Ming Hu, Dong-Ming Yan

    With the recent tremendous advances of computer graphics rendering and image editing technologies, computergenerated fake images, which in general do not reflect what happens in the reality, can now easily deceive the inspection of human visual system. In this work, we propose a convolutional neural network (CNN)-based model to distinguish computergenerated (CG) images from natural images (NIs) with

    更新日期:2020-05-29
  • Word-Pair Relevance Modeling with Multi-View Neural Attention Mechanism for Sentence Alignment
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Ying Ding, Jun-Hui Li, Zheng-Xian Gong, Guo-Dong Zhou

    Sentence alignment provides multi-lingual or cross-lingual natural language processing (NLP) applications with high-quality parallel sentence pairs. Normally, an aligned sentence pair contains multiple aligned words, which intuitively play different roles during sentence alignment. Inspired by this intuition, we propose to deal with the problem of sentence alignment by exploring the semantic interactionship

    更新日期:2020-05-29
  • Two-Stream Temporal Convolutional Networks for Skeleton-Based Human Action Recognition
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Jin-Gong Jia, Yuan-Feng Zhou, Xing-Wei Hao, Feng Li, Christian Desrosiers, Cai-Ming Zhang

    With the growing popularity of somatosensory interaction devices, human action recognition is becoming attractive in many application scenarios. Skeleton-based action recognition is effective because the skeleton can represent the position and the structure of key points of the human body. In this paper, we leverage spatiotemporal vectors between skeleton sequences as input feature representation of

    更新日期:2020-05-29
  • Denoising Stochastic Progressive Photon Mapping Renderings Using a Multi-Residual Network
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Zheng Zeng, Lu Wang, Bei-Bei Wang, Chun-Meng Kang, Yan-Ning Xu

    Stochastic progressive photon mapping (SPPM) is one of the important global illumination methods in computer graphics. It can simulate caustics and specular-diffuse-specular lighting effects efficiently. However, as a biased method, it always suffers from both bias and variance with limited iterations, and the bias and the variance bring multi-scale noises into SPPM renderings. Recent learning-based

    更新日期:2020-05-29
  • EmotionMap: Visual Analysis of Video Emotional Content on a Map
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-05-29
    Cui-Xia Ma, Jian-Cheng Song, Qian Zhu, Kevin Maher, Ze-Yuan Huang, Hong-An Wang

    Emotion plays a crucial role in gratifying users’ needs during their experience of movies and TV series, and may be underutilized as a framework for exploring video content and analysis. In this paper, we present EmotionMap, a novel way of presenting emotion for daily users in 2D geography, fusing spatio-temporal information with emotional data. The interface is composed of novel visualization elements

    更新日期:2020-05-29
  • Efficient Multiagent Policy Optimization Based on Weighted Estimators in Stochastic Cooperative Environments
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yan Zheng, Jian-Ye Hao, Zong-Zhang Zhang, Zhao-Peng Meng, Xiao-Tian Hao

    Multiagent deep reinforcement learning (MA-DRL) has received increasingly wide attention. Most of the existing MA-DRL algorithms, however, are still inefficient when faced with the non-stationarity due to agents changing behavior consistently in stochastic environments. This paper extends the weighted double estimator to multiagent domains and proposes an MA-DRL framework, named Weighted Double Deep

    更新日期:2020-03-27
  • IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yang-Yang Zhao, Ming-Yu Chen, Yu-Hang Liu, Zong-Hao Yang, Xiao-Jing Zhu, Zong-Hui Hong, Yun-Ge Guo

    In recent years many security attacks occur when malicious codes abuse in-process memory resources. Due to the increasing complexity, an application program may call third-party code which cannot be controlled by programmers but may contain security vulnerabilities. As a result, the users have the risk of suffering information leakage and control flow hijacking. However, current solutions like Intel

    更新日期:2020-03-27
  • A Machine Learning Framework with Feature Selection for Floorplan Acceleration in IC Physical Design
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Shu-Zheng Zhang, Zhen-Yu Zhao, Chao-Chao Feng, Lei Wang

    Floorplan is an important process whose quality determines the timing closure in integrated circuit (IC) physical design. And generating a floorplan with satisfying timing result is time-consuming because much time is spent on the generation-evaluation iteration. Applying machine learning to the floorplan stage is a potential method to accelerate the floorplan iteration. However, there exist two challenges

    更新日期:2020-03-27
  • Huge Page Friendly Virtualized Memory Management
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Sai Sha, Jing-Yuan Hu, Ying-Wei Luo, Xiao-Lin Wang, Zhenlin Wang

    With the rapid increase of memory consumption by applications running on cloud data centers, we need more efficient memory management in a virtualized environment. Exploiting huge pages becomes more critical for a virtual machine’s performance when it runs large working set size programs. Programs with large working set sizes are more sensitive to memory allocation, which requires us to quickly adjust

    更新日期:2020-03-27
  • Sequential Recommendation via Cross-Domain Novelty Seeking Trait Mining
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Fu-Zhen Zhuang, Ying-Min Zhou, Hao-Chao Ying, Fu-Zheng Zhang, Xiang Ao, Xing Xie, Qing He, Hui Xiong

    Transfer learning has attracted a large amount of interest and research in last decades, and some effort has been made to build more precise recommendation systems. Most previous transfer recommendation systems assume that the target domain shares the same/similar rating patterns with the auxiliary source domain, which is used to improve the recommendation performance. However, almost all existing

    更新日期:2020-03-27
  • MPI-RCDD: A Framework for MPI Runtime Communication Deadlock Detection
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Hong-Mei Wei, Jian Gao, Peng Qing, Kang Yu, Yan-Fei Fang, Ming-Lu Li

    The message passing interface (MPI) has become a de facto standard for programming models of high-performance computing, but its rich and flexible interface semantics makes the program easy to generate communication deadlock, which seriously affects the usability of the system. However, the existing detection tools for MPI communication deadlock are not scalable enough to adapt to the continuous expansion

    更新日期:2020-03-27
  • SIES: A Novel Implementation of Spiking Convolutional Neural Network Inference Engine on Field-Programmable Gate Array
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Shu-Quan Wang, Lei Wang, Yu Deng, Zhi-Jie Yang, Sha-Sha Guo, Zi-Yang Kang, Yu-Feng Guo, Wei-Xia Xu

    Neuromorphic computing is considered to be the future of machine learning, and it provides a new way of cognitive computing. Inspired by the excellent performance of spiking neural networks (SNNs) on the fields of low-power consumption and parallel computing, many groups tried to simulate the SNN with the hardware platform. However, the efficiency of training SNNs with neuromorphic algorithms is not

    更新日期:2020-03-27
  • You Are How You Behave – Spatiotemporal Representation Learning for College Student Academic Achievement
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Xiao-Lin Li, Li Ma, Xiang-Dong He, Hui Xiong

    Scholarships are a reflection of academic achievement for college students. The traditional scholarship assignment is strictly based on final grades and cannot recognize students whose performance trend improves or declines during the semester. This paper develops the Trajectory Mining on Clustering for Scholarship Assignment and Academic Warning (TMS) approach to identify the factors that affect the

    更新日期:2020-03-27
  • Exploiting Structural and Temporal Influence for Dynamic Social-Aware Recommendation
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yang Liu, Zhi Li, Wei Huang, Tong Xu, En-Hong Chen

    Recent years have witnessed the rapid development of online social platforms, which effectively support the business intelligence and provide services for massive users. Along this line, large efforts have been made on the social-aware recommendation task, i.e., leveraging social contextual information to improve recommendation performance. Most existing methods have treated social relations in a static

    更新日期:2020-03-27
  • Incremental Multi-Label Learning with Active Queries
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Sheng-Jun Huang, Guo-Xiang Li, Wen-Yu Huang, Shao-Yuan Li

    In multi-label learning, it is rather expensive to label instances since they are simultaneously associated with multiple labels. Therefore, active learning, which reduces the labeling cost by actively querying the labels of the most valuable data, becomes particularly important for multi-label learning. A good multi-label active learning algorithm usually consists of two crucial elements: a reasonable

    更新日期:2020-03-27
  • Semi-Supervised Classification of Data Streams by BIRCH Ensemble and Local Structure Mapping
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yi-Min Wen, Shuai Liu

    Many researchers have applied clustering to handle semi-supervised classification of data streams with concept drifts. However, the generalization ability for each specific concept cannot be steadily improved, and the concept drift detection method without considering the local structural information of data cannot accurately detect concept drifts. This paper proposes to solve these problems by BIRCH

    更新日期:2020-03-27
  • PetroKG: Construction and Application of Knowledge Graph in Upstream Area of PetroChina
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Xiang-Guang Zhou, Ren-Bin Gong, Fu-Geng Shi, Zhe-Feng Wang

    There is a large amount of heterogeneous data distributed in various sources in the upstream of PetroChina. These data can be valuable assets if we can fully use them. Meanwhile, the knowledge graph, as a new emerging technique, provides a way to integrate multi-source heterogeneous data. In this paper, we present one application of the knowledge graph in the upstream of PetroChina. Specifically, we

    更新日期:2020-03-27
  • Bigflow: A General Optimization Layer for Distributed Computing Frameworks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yun-Cong Zhang, Xiao-Yang Wang, Cong Wang, Yao Xu, Jian-Wei Zhang, Xiao-Dong Lin, Guang-Yu Sun, Gong-Lin Zheng, Shan-Hui Yin, Xian-Jin Ye, Li Li, Zhan Song, Dong-Dong Miao

    As data volumes grow rapidly, distributed computations are widely employed in data-centers to provide cheap and efficient methods to process large-scale parallel datasets. Various computation models have been proposed to improve the abstraction of distributed datasets and hide the details of parallelism. However, most of them follow the single-layer partitioning method, which limits developers to express

    更新日期:2020-03-27
  • Interference Analysis of Co-Located Container Workloads: A Perspective from Hardware Performance Counters
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Wen-Yan Chen, Ke-Jiang Ye, Cheng-Zhi Lu, Dong-Dai Zhou, Cheng-Zhong Xu

    Workload characterization is critical for resource management and scheduling. Recently, with the fast development of container technique, more and more cloud service providers like Google and Alibaba adopt containers to provide cloud services, due to the low overheads. However, the characteristics of co-located diverse services (e.g., interactive on-line services, off-line computing services) running

    更新日期:2020-03-27
  • Discrimination-Aware Domain Adversarial Neural Network
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yun-Yun Wang, Jian-Min Gu, Chao Wang, Song-Can Chen, Hui Xue

    The domain adversarial neural network (DANN) methods have been successfully proposed and attracted much attention recently. In DANNs, a discriminator is trained to discriminate the domain labels of features generated by a generator, whereas the generator attempts to confuse it such that the distributions between domains are aligned. As a result, it actually encourages the whole alignment or transfer

    更新日期:2020-03-27
  • Joint Label-Specific Features and Correlation Information for Multi-Label Learning
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Xiu-Yi Jia, Sai-Sai Zhu, Wei-Wei Li

    Multi-label learning deals with the problem where each instance is associated with a set of class labels. In multi-label learning, different labels may have their own inherent characteristics for distinguishing each other, and the correlation information has shown promising strength in improving multi-label learning. In this study, we propose a novel multi-label learning method by simultaneously taking

    更新日期:2020-03-27
  • Finding Communities by Decomposing and Embedding Heterogeneous Information Network
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Yue Kou, De-Rong Shen, Dong Li, Tie-Zheng Nie, Ge Yu

    Community discovery is an important task in social network analysis. However, most existing methods for community discovery rely on the topological structure alone. These methods ignore the rich information available in the content data. In order to solve this issue, in this paper, we present a community discovery method based on heterogeneous information network decomposition and embedding. Unlike

    更新日期:2020-03-27
  • Erratum to: A Framework for Supporting Tree-Like Indexes on the Chord Overlay
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-03-27
    Ming-Dong Zhu, De-Rong Shen, Yue Kou, Tie-Zheng Nie, Ge Yu

    Erratum: Ming-Dong Zhu, De-Rong Shen, Yue Kou, Tie-Zheng Nie, Ge Yu. A Framework for Supporting Tree-Like Indexes on the Chord Overlay. Journal of Computer Science and Technology 2013, 28(6): 962-972. DOI: 10.1007/s11390-013-1391-8.

    更新日期:2020-03-27
  • Mochi: Composing Data Services for High-Performance Computing Environments
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Robert B. Ross, George Amvrosiadis, Philip Carns, Charles D. Cranor, Matthieu Dorier, Kevin Harms, Greg Ganger, Garth Gibson, Samuel K. Gutierrez, Robert Latham, Bob Robey, Dana Robinson, Bradley Settlemyer, Galen Shipman, Shane Snyder, Jerome Soumagne, Qing Zheng

    Technology enhancements and the growing breadth of application workflows running on high-performance computing (HPC) platforms drive the development of new data services that provide high performance on these new platforms, provide capable and productive interfaces and abstractions for a variety of applications, and are readily adapted when new technologies are deployed. The Mochi framework enables

    更新日期:2020-01-17
  • Labeled Network Stack: A High-Concurrency and Low-Tail Latency Cloud Server Framework for Massive IoT Devices
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Wen-Li Zhang, Ke Liu, Yi-Fan Shen, Ya-Zhu Lan, Hui Song, Ming-Yu Chen, Yuan-Fei Chen

    Internet of Things (IoT) applications have massive client connections to cloud servers, and the number of networked IoT devices is remarkably increasing. IoT services require both low-tail latency and high concurrency in datacenters. This study aims to determine whether an order of magnitude improvement is possible in tail latency and concurrency in mainstream systems by proposing a hardware–software

    更新日期:2020-01-17
  • CirroData: Yet Another SQL-on-Hadoop Data Analytics Engine with High Performance
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Zheng-Hao Jin, Haiyang Shi, Ying-Xin Hu, Li Zha, Xiaoyi Lu

    This paper presents CirroData, a high-performance SQL-on-Hadoop system designed for Big Data analytics workloads. As a home-grown enterprise-level online analytical processing (OLAP) system with more than seven-year research and development (R&D) experiences, we share our design details to the community about how to achieve high performance in CirroData. Multiple optimization techniques have been discussed

    更新日期:2020-01-17
  • ExaHDF5: Delivering Efficient Parallel I/O on Exascale Computing Systems
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Suren Byna, M. Scot Breitenfeld, Bin Dong, Quincey Koziol, Elena Pourmal, Dana Robinson, Jerome Soumagne, Houjun Tang, Venkatram Vishwanath, Richard Warren

    Scientific applications at exascale generate and analyze massive amounts of data. A critical requirement of these applications is the capability to access and manage this data efficiently on exascale systems. Parallel I/O, the key technology enables moving data between compute nodes and storage, faces monumental challenges from new applications, memory, and storage architectures considered in the designs

    更新日期:2020-01-17
  • Lessons Learned from Optimizing the Sunway Storage System for Higher Application I/O Performance
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Qi Chen, Kang Chen, Zuo-Ning Chen, Wei Xue, Xu Ji, Bin Yang

    It is hard for applications to make full utilization of the peak bandwidth of the storage system in highperformance computers because of I/O interferences, storage resource misallocations and complex long I/O paths. We performed several studies to bridge this gap in the Sunway storage system, which serves the supercomputer Sunway TaihuLight. To locate these issues and connections between them, an end-to-end

    更新日期:2020-01-17
  • Gfarm/BB — Gfarm File System for Node-Local Burst Buffer
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Osamu Tatebe, Shukuko Moriwake, Yoshihiro Oyama

    Burst buffer has become a major component to meet the I/O performance requirement of HPC bursty traffic. This paper proposes Gfarm/BB that is a file system for a burst buffer efficiently exploiting node-local storage systems. Although node-local storages improve storage performance, they are only available during the job allocation. Gfarm/BB should have better access and metadata performance while

    更新日期:2020-01-17
  • Design and Implementation of the Tianhe-2 Data Storage and Management System
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Yu-Tong Lu, Peng Cheng, Zhi-Guang Chen

    With the convergence of high-performance computing (HPC), big data and artificial intelligence (AI), the HPC community is pushing for “triple use” systems to expedite scientific discoveries. However, supporting these converged applications on HPC systems presents formidable challenges in terms of storage and data management due to the explosive growth of scientific data and the fundamental differences

    更新日期:2020-01-17
  • I/O Acceleration via Multi-Tiered Data Buffering and Prefetching
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Anthony Kougkas, Hariharan Devarajan, Xian-He Sun

    Modern High-Performance Computing (HPC) systems are adding extra layers to the memory and storage hierarchy, named deep memory and storage hierarchy (DMSH), to increase I/O performance. New hardware technologies, such as NVMe and SSD, have been introduced in burst buffer installations to reduce the pressure for external storage and boost the burstiness of modern I/O systems. The DMSH has demonstrated

    更新日期:2020-01-17
  • Ad Hoc File Systems for High-Performance Computing
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    André Brinkmann, Kathryn Mohror, Weikuan Yu, Philip Carns, Toni Cortes, Scott A. Klasky, Alberto Miranda, Franz-Josef Pfreundt, Robert B. Ross, Marc-André Vef

    Storage backends of parallel compute clusters are still based mostly on magnetic disks, while newer and faster storage technologies such as flash-based SSDs or non-volatile random access memory (NVRAM) are deployed within compute nodes. Including these new storage technologies into scientific workflows is unfortunately today a mostly manual task, and most scientists therefore do not take advantage

    更新日期:2020-01-17
  • SmartPipe: Towards Interoperability of Industrial Applications via Computational Reflection
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Su Zhang, Hua-Qian Cai, Yun Ma, Tian-Yue Fan, Ying Zhang, Gang Huang

    With the advancement of new information technologies, a revolution is being taken place to bring the industry into a new era of intelligent manufacturing. One of the key requirements of intelligent manufacturing is the interoperability of industrial applications. However, it is challenging to realize the interoperability for legacy industrial applications due to 1) the deficient semantic information

    更新日期:2020-01-17
  • GekkoFS — A Temporary Burst Buffer File System for HPC Applications
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Marc-André Vef, Nafiseh Moti, Tim Süß, Markus Tacke, Tommaso Tocci, Ramon Nou, Alberto Miranda, Toni Cortes, André Brinkmann

    Many scientific fields increasingly use high-performance computing (HPC) to process and analyze massive amounts of experimental data while storage systems in today’s HPC environments have to cope with new access patterns. These patterns include many metadata operations, small I/O requests, or randomized file I/O, while general-purpose parallel file systems have been optimized for sequential shared

    更新日期:2020-01-17
  • AquaSee: Predict Load and Cooling System Faults of Supercomputers Using Chilled Water Data
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-17
    Yu-Qi Li, Li-Quan Xiao, Jing-Hua Feng, Bin Xu, Jian Zhang

    An analysis of real-world operational data of Tianhe-1A (TH-1A) supercomputer system shows that chilled water data not only can reflect the status of a chiller system but also are related to supercomputer load. This study proposes AquaSee, a method that can predict the load and cooling system faults of supercomputers by using chilled water pressure and temperature data. This method is validated on

    更新日期:2020-01-17
  • A Case for Adaptive Resource Management in Alibaba Datacenter Using Neural Networks
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2020-01-10
    Sa Wang, Yan-Hai Zhu, Shan-Pei Chen, Tian-Ze Wu, Wen-Jie Li, Xu-Sheng Zhan, Hai-Yang Ding, Wei-Song Shi, Yun-Gang Bao

    Both resource efficiency and application QoS have been big concerns of datacenter operators for a long time, but remain to be irreconcilable. High resource utilization increases the risk of resource contention between co-located workload, which makes latency-critical (LC) applications suffer unpredictable, and even unacceptable performance. Plenty of prior work devotes the effort on exploiting effective

    更新日期:2020-01-10
  • An Efficient Framework for Multiple Subgraph Pattern Matching Models
    J. Comput. Sci. Tech. (IF 1.506) Pub Date : 2019-11-22
    Jiu-Ru Gao, Wei Chen, Jia-Jie Xu, An Liu, Zhi-Xu Li, Hongzhi Yin, Lei Zhao

    With the popularity of storing large data graph in cloud, the emergence of subgraph pattern matching on a remote cloud has been inspired. Typically, subgraph pattern matching is defined in terms of subgraph isomorphism, which is an NP-complete problem and sometimes too strict to find useful matches in certain applications. And how to protect the privacy of data graphs in subgraph pattern matching without

    更新日期:2019-11-22
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
3分钟学术视频演讲大赛
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
麻省大学
西北大学
湖南大学
华东师范大学
王要兵
浙江大学
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
陆军军医大学
李霄鹏
廖矿标
试剂库存
down
wechat
bug