0% found this document useful (0 votes)
7 views5 pages

Journal of Computer Science and Technology Volume 37, 2022

This document provides the contents of a journal on computer science and technology. It lists various articles within the journal across different topics such as software engineering, artificial intelligence, computer networks, and more. The document contains many sections and articles.

Uploaded by

erik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Journal of Computer Science and Technology Volume 37, 2022

This document provides the contents of a journal on computer science and technology. It lists various articles within the journal across different topics such as software engineering, artificial intelligence, computer networks, and more. The document contains many sections and articles.

Uploaded by

erik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2022 Contents. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 37(6): 1509–1513 Nov. 2022.

DOI
10.1007/s11390-022-0006-7

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY

Volume 37, 2022


CONTENTS

Number 1

Special Section on Software Systems 2021


Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tao Xie, Shengchao Qin, Wenhui Zhang, Jun Sun, Lei Bu, and Ge Li ( 1 )

Theme: Dependable Software Engineering


Event-Based Semantics of UML 2.X Concurrent Sequence Diagrams for Formal Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Inès Mouakher, Fatma Dhaou, and J. Christian Attiogbé ( 4 )
DeltaFuzz: Historical Version Information Guided Fuzz Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . Jia-Ming Zhang, Zhan-Qi Cui, Xiang Chen, Huan-Huan Wu, Li-Wei Zheng, and Jian-Bin Liu ( 29 )

Theme: Internetware and Beyond


TOAST: Automated Testing of Object Transformers in Dynamic Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ze-Lin Zhao, Di Huang, and Xiao-Xing Ma ( 50 )
Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. Que-Ping Kong, Zi-Yan Wang, Yuan Huang, Xiang-Ping Chen, Xiao-Cong Zhou, Zi-Bin Zheng, and Gang Huang ( 67 )
Simulation Might Change Your Results: A Comparison of Context-Aware System Input Validation in Simulated and Physical
Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jin-Chi Chen, Yi Qin, Hui-Yan Wang, and Chang Xu ( 83 )
Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wen-Hua Yang, Min-Xue Pan, Yu Zhou, and Zhi-Qiu Huang ( 106 )
Checking Causal Consistency of MongoDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hong-Rong Ouyang, Heng-Feng Wei, Hai-Xiang Li, An-Qun Pan, and Yu Huang ( 128 )
GridDroid—An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User
Interface. . . . . . . . . . . . . . . . . . . . . . . ... . . . . . . . . . . . . . . . . . . . . . . . Jun Ma, Qing-Wei Sun, Chang Xu, and Xian-Ping Tao ( 147 )
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics . . . . . .
. . . . . . . . . . . . . . . . . Zi-Jie Huang, Zhi-Qing Shao, Gui-Sheng Fan, Hui-Qun Yu, Xing-Guang Yang, and Kang Yang ( 182 )

Regular Paper
MacroTrend: A Write-Efficient Cache Algorithm for NVM-Based Read Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ning Bao, Yun-Peng Chai, Xiao Qin, and Chuan-Wen Wang ( 207 )
Correlated Differential Privacy of Multiparty Data Release in Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . Jian-Zhe Zhao, Xing-Wei Wang, Ke-Ming Mao, Chen-Xi Huang, Yu-Kai Su, and Yu-Chen Li ( 231 )
On the Discrete-Time Dynamics of Cross-Coupled Hebbian Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiao-Wei Feng, Xiang-Yu Kong, Chuan He, and Dong-Hui Xu ( 252 )
A Blockchain-Based Protocol for Malicious Price Discrimination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, and Liu-Sheng Huang ( 266 )

Number 2

Artificial Intelligence and Pattern Recognition


DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound
Images . . . Xiao-Zheng Xie, Jian-Wei Niu, Xue-Feng Liu, Qing-Feng Li, Yong Wang, Jie Han, and Shaojie Tang ( 277 )
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Tan, Long-Yin Zhang, and Guo-Dong Zhou ( 295 )
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jun-Feng Fan, Mei-Ling Wang, Chang-Liang Li, Zi-Qiang Zhu, and Lu Mao ( 309 )
1510 J. Comput. Sci. & Technol., Nov. 2022, Vol.37, No.6

Imputing DNA Methylation by Transferred Learning Based Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin-Feng Wang, Xiang Zhou, Jia-Hua Rao, Zhu-Jin Zhang, and Yue-Dong Yang ( 320 )
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . Xin Zhang, Siyuan Lu, Shui-Hua Wang, Xiang Yu, Su-Jing Wang, Lun Yao, Yi Pan, and Yu-Dong Zhang ( 330 )

Computer Networks and Distributed Computing

Quality of Service Support in RPL Networks: Standing State and Future Prospects . . . . . . . . . . . . . . . . . Ibrahim S. Alsukayti ( 344 )
Differential Privacy via a Truncated and Normalized Laplace Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . William Croft, Jörg-Rüdiger Sack, and Wei Shi ( 369 )

Software Systems
Test-Driven Feature Extraction of Web Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. . . . . . . . . . . . . . . . . . . . . . . . . . . . Yong-Hao Long, Yan-Cheng Chen, Xiang-Ping Chen, Xiao-Hong Shi, and Fan Zhou ( 389 )
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gen Zhang, Peng-Fei Wang, Tai Yue, Xiang-Dong Kong, Xu Zhou, and Kai Lu ( 405 )

Theory and Algorithms


Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Geun Yong Kim, Joon-Young Paik, Yeongcheol Kim, and Eun-Sun Cho ( 423 )
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Louis Cianciullo and Hossein Ghodosi ( 443 )
Generalized Goldwasser and Micali’s Type Cryptosystem . . . . . . . . . . . . . . . . . . . Ying Guo, Zhen-Fu Cao, and Xiao-Lei Dong ( 459 )

Regular Paper
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jin-Yu Gu, Hao Li, Yu-Bin Xia, Hai-Bo Chen, Cheng-Gang Qin, and Zheng-Yu He ( 468 )
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yusuf Fatihu Hamza and Hong-Wei Lin ( 487 )

Number 3

Special Section on Self-Learning with Deep Neural Networks


Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Min-Ling Zhang, Xiu-Shen Wei, and Gao Huang ( 505 )
Connecting the Dots in Self-Supervised Learning: A Brief Survey for Beginners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . Peng-Fei Fang, Xian Li, Yang Yan, Shuai Zhang, Qi-Yue Kang, Xiao-Fei Li, and Zhen-Zhong Lan ( 507 )
Self-Supervised Task Augmentation for Few-Shot Intent Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Peng-Fei Sun, Ya-Wen Ouyang, Ding-Jie Song, and Xin-Yu Dai ( 527 )
Self-Supervised Music Motion Synchronization Learning for Music-Driven Conducting Motion Generation. . . . . . . . . . . . . . . ..
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fan Liu, De-Long Chen, Rui-Zhi Zhou, Sai Yang, and Feng Xu ( 539 )

Special Section of CVM 2022

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shi-Min Hu, Paul L. Rosin, and Tian-Jia Shao ( 559 )


A Comprehensive Review of Redirected Walking Techniques: Taxonomy, Methods, and Future Directions . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yi-Jun Li, Frank Steinicke, and Miao Wang ( 561 )
Probability-Based Channel Pruning for Depthwise Separable Convolutional Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . Han-Li Zhao, Kai-Jie Shi, Xiao-Gang Jin, Ming-Liang Xu, Hui Huang, Wang-Long Lu, and Ying Liu ( 584 )
A Comparative Study of CNN- and Transformer-Based Visual Style Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hua-Peng Wei, Ying-Ying Deng, Fan Tang, Xing-Jia Pan, and Wei-Ming Dong ( 601 )
Local Homography Estimation on User-Specified Textureless Regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zheng Chen, Xiao-Nan Fang, and Song-Hai Zhang ( 615 )
CGTracker: Center Graph Network for One-Stage Multi-Pedestrian-Object Detection and Tracking . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Feng, Hao-Ming Wu, Yi-Hao Yin, and Li-Bin Lan ( 626 )
Learn Robust Pedestrian Representation Within Minimal Modality Discrepancy for Visible-Infrared Person Re-Identification
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yu-Jie Liu, Wen-Bin Shao, and Xiao-Rui Sun ( 641 )
2022 Contents 1511

Element-Arrangement Context Network for Facade Parsing . . . . . . . . . . . . . . . . . Yan Tao, Yi-Teng Zhang, and Xue-Jin Chen ( 652 )
ARSlice: Head-Mounted Display Augmented with Dynamic Tracking and Projection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. . . . . . . . . . . . . . Yu-Ping Wang, Sen-Wei Xie, Li-Hui Wang, Hongjin Xu, Satoshi Tabata, and Masatoshi Ishikawa ( 666 )

Regular Paper
NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..
. Tian-Ni Xu, Hai-Feng Sun, Di Zhang, Xiao-Ming Zhou, Xiu-Feng Sui, Sa Wang, Qun Huang, and Yun-Gang Bao ( 680 )
Extracting Variable-Depth Logical Document Hierarchy from Long Documents: Method, Evaluation, and Application . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rong-Yu Cao, Yi-Xuan Cao, Gan-Bin Zhou, and Ping Luo ( 699 )
6D Object Pose Estimation in Cluttered Scenes from RGB Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiao-Long Yang, Xiao-Hong Jia, Yuan Liang, and Lu-Bin Fan ( 719 )
BADF: Bounding Volume Hierarchies Centric Adaptive Distance Field Computation for Deformable Objects on GPUs . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiao-Rui Chen, Min Tang, Cheng Li, Dinesh Manocha, and Ruo-Feng Tong ( 731 )

Number 4

Special Section of Xia Peisu Young Scholars Forum 2021

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jia-Feng Guo and Yi-Qing Zhou ( 741 )

Analyzing and Optimizing Packet Corruption in RDMA Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yi-Xiao Gao, Chen Tian, Wei Chen, Duo-Xing Li, Jian Yan,
Yuan-Yuan Gong, Bing-Quan Wang, Tao Wu, Lei Han, Fa-Zhi Qi, Shan Zeng, Wan-Chun Dou, and Gui-Hai Chen ( 743 )

SMART: Speedup Job Completion Time by Scheduling Reduce Tasks . . . . . . . . . . . . . . . . . . . . . . .Jia-Qing Dong, Ze-Hao He,
Yuan-Yuan Gong, Pei-Wen Yu, Chen Tian, Wan-Chun Dou, Gui-Hai Chen, Nai Xia, and Hao-Ran Guan ( 763 )
Approximation Designs for Energy Harvesting Relay Deployment in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yi Wang, Yi-Xue Liu, Shun-Jia Zhu, Xiao-Feng Gao, and Chen Tian ( 779 )
Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . Hui Yu, Xin-Yu Jiang, Jin Zhao, Hao Qi, Yu Zhang, Xiao-Fei Liao, Hai-Kun Liu, Fu-Bing Mao, and Hai Jin ( 797 )
Leveraging Document-Level and Query-Level Passage Cumulative Gain for Document Ranking . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Zhi-Jing Wu, Yi-Qun Liu, Jia-Xin Mao, Min Zhang, and Shao-Ping Ma ( 814 )

Special Section of MASS 2020–2021


An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . Xuan-Bo Huang, Kai-Ping Xue, Yi-Tao Xing, Ding-Wen Hu, Ruidong Li, and Qi-Bin Sun ( 839 )
Accelerating DAG-Style Job Execution via Optimizing Resource Pipeline Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yubin Duan, Ning Wang, and Jie Wu ( 852 )

Energy-Efficient Minimum Mobile Charger Coverage for Wireless Sensor Networks . . . . . . . Abdalaziz Sawwan and Jie Wu ( 869 )
Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yi Qin, Qin Hu, Dong-Xiao Yu, and Xiu-Zhen Cheng ( 888 )

Gaze-Assisted Viewport Control for 360◦ Video on Smartphone . . . . . . . . . Linfeng Shen, Yuchi Chen, and Jiangchuan Liu ( 906 )
Distributed Game-Theoretical D2D-Enabled Task Offloading in Mobile Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . En Wang, Han Wang, Peng-Min Dong, Yuan-Bo Xu, and Yong-Jian Yang ( 919 )

Regular Paper

Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism . . .Yu-Jing Feng,
De-Jian Li, Xu Tan, Xiao-Chun Ye, Dong-Rui Fan, Wen-Ming Li, Da Wang, Hao Zhang, and Zhi-Min Tang ( 942 )
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . Hao Liao, Qi-Xin Liu, Ze-Cheng Huang, Ke-Zhong Lu, Chi Ho Yeung, and Yi-Cheng Zhang ( 960 )
Novel Positive Multi-Layer Graph Based Method for Collaborative Filtering Recommender Systems . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bushra Alhijawi and Ghazi AL-Naymat ( 975 )
SMRI: A New Method for siRNA Design for COVID-19 Therapy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Meng-Xin Chen, Xiao-Dong Zhu, Hao Zhang, Zhen Liu, and Yuan-Ning Liu ( 991 )
1512 J. Comput. Sci. & Technol., Nov. 2022, Vol.37, No.6

Number 5

Special Section on Scalable Data Science


Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guo-Liang Li, Nan Tang, and Cheng-Liang Chai ( 1003 )
GAM: A GPU-Accelerated Algorithm for MaxRS Queries in Road Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jian Chen, Kai-Qi Zhang, Tian Ren, Zhen-Qing Wu, and Hong Gao ( 1005 )
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . She Sun, Shuai Ma, Jing-He Song, Wen-Hai Yue, Xue-Lian Lin, and Tiejun Ma ( 1026 )
Efficient Partitioning Method for Optimizing the Compression on Array Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shuai Han, Xian-Min Liu, and Jian-Zhong Li ( 1049 )
Discovering Cohesive Temporal Subgraphs with Temporal Density Aware Exploration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chun-Xue Zhu, Long-Long Lin, Ping-Peng Yuan, and Hai Jin ( 1068 )
Incremental User Identification Across Social Networks Based on User-Guider Similarity Index. . . . . . . . . . . . . . . . . . . . . . . . . . ..
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yue Kou, Dong Li, De-Rong Shen, Tie-Zheng Nie, and Ge Yu ( 1086 )
An Exercise Collection Auto-Assembling Framework with Knowledge Tracing and Reinforcement Learning . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tian-Yu Zhao, Man Zeng, and Jian-Hua Feng ( 1105 )

Artificial Intelligence and Pattern Recognition


Enhancing N-Gram Based Metrics with Semantics for Better Evaluation of Abstractive Text Summarization . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jia-Wei He, Wen-Jun Jiang, Guo-Bang Chen, Yu-Quan Le, and Xiao-Fei Ding ( 1118 )
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiao-Qing Deng, Bo-Lin Chen, Wei-Qi Luo, and Da Luo ( 1134 )
Neural Emotion Detection via Personal Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . Xia-Bing Zhou, Zhong-Qing Wang, Xing-Wei Liang, Min Zhang, and Guo-Dong Zhou ( 1146 )
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xu-Gang Wu, Hui-Jun Wu, Xu Zhou, Xiang Zhao, and Kai Lu ( 1161 )

Regular Paper
Reliability and Incentive of Performance Assessment for Decentralized Clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . Jiu-Chen Shi, Xiao-Qing Cai, Wen-Li Zheng, Quan Chen, De-Ze Zeng, Tatsuhiro Tsuchiya, and Min-Yi Guo ( 1176 )
FlexPDA: A Flexible Programming Framework for Deep Learning Accelerators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lei Liu, Xiu Ma, Hua-Xiao Liu, Guang-Li Li, and Lei Liu ( 1200 )
Quasi-Developable B-Spline Surface Design with Control Rulings . . . . . . . Zi-Xuan Hu, Peng-Bo Bo, and Cai-Ming Zhang ( 1221 )
PLQ: An Efficient Approach to Processing Pattern-Based Log Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jia Chen, Peng Wang, Fan Qiao, Shi-Qing Du, and Wei Wang ( 1239 )

Number 6

Computer Architecture and Systems


Tetris: A Heuristic Static Memory Management Framework for Uniform Memory Multicore Neural Network Accelerators .
. . . . . . . . . . . . . . . . . . . . . . . . . . Xiao-Bing Chen, Hao Qi, Shao-Hui Peng, Yi-Min Zhuang, Tian Zhi, and Yun-Ji Chen ( 1255 )
SOCA-DOM: A Mobile System-on-Chip Array System for Analyzing Big Data on the Move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . Le-Le Li, Jiang-Yi Liu, Jian-Ping Fan, Xue-Hai Qian, Kai Hwang, Yeh-Ching Chung, and Zhi-Bin Yu ( 1271 )
TLP-LDPC: Three-Level Parallel FPGA Architecture for Fast Prototyping of LDPC Decoder Using High-Level Synthesis.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yi-Fan Zhang, Lei Sun, and Qiang Cao ( 1290 )
RV16: An Ultra-Low-Cost Embedded RISC-V Processor Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . Yuan-Hu Cheng, Li-Bo Huang, Yi-Jun Cui, Sheng Ma, Yong-Wen Wang, and Bing-Cai Sui ( 1307 )

Data Management and Data Mining


Answering Non-Answer Questions on Reverse Top-k Geo-Social Keyword Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . Xue-Qin Chang, Cheng-Yang Luo, Han-Lin Yu, Xin-Wei Cai, Lu Chen, Qing Liu, and Yun-Jun Gao ( 1320 )
I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yuan Li, Jie Dai, Xiao-Lin Fan, Yu-Hai Zhao, and Guo-Ren Wang ( 1337 )
An Efficient Reinforcement Learning Game Framework for UAV-Enabled Wireless Sensor Network Data Collection . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tong Ding, Ning Liu, Zhong-Min Yan, Lei Liu, and Li-Zhen Cui ( 1356 )
2022 Contents 1513

Neural Attentional Relation Extraction with Dual Dependency Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dong Li, Zhi-Lei Lei, Bao-Yan Song, Wan-Ting Ji, and Yue Kou ( 1369 )
Improving Parameter Estimation and Defensive Ability of Latent Dirichlet Allocation Model Training Under Rényi Differ-
ential Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tao Huang, Su-Yun Zhao, Hong Chen, and Yi-Xuan Liu ( 1382 )
Minimum Epsilon-Kernel Computation for Large-Scale Data Processing . . . Hong-Jie Guo, Jian-Zhong Li, and Hong Gao ( 1398 )
ML-Parser: An Efficient and Accurate Online Log Parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . Yu-Qian Zhu, Jia-Ying Deng, Jia-Chen Pu, Peng Wang, Shen Liang, and Wei Wang ( 1412 )

Artificial Intelligence and Pattern Recognition


Synthetic Data Generation and Shuffled Multi-Round Training Based Offline Handwritten Mathematical Expression Recog-
nition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lan-Fang Dong, Han-Chao Liu, and Xin-Ming Zhang ( 1427 )
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . Ming-Min Shao, Wen-Jun Jiang, Jie Wu, Yu-Qing Shi, TakShing Yum, and Ji Zhang ( 1444 )
Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . Jian-Fu Zhu, Zhong-Kai Hao, Qi Liu, Yu Yin, Cheng-Qiang Lu, Zhen-Ya Huang, and En-Hong Chen ( 1464 )
Real-Time Semantic Segmentation via an Efficient Multi-Column Network . . . . . . . . . . . . . . . . Cheng-Li Peng and Jia-Yi Ma ( 1478 )

Computer Networks and Distributed Computing


A QoS Based Reliable Routing Mechanism for Service Customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bo Yi, Xing-Wei Wang, Min Huang, and Qiang He ( 1492 )
2022 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( 1509 )
2022 Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( 1514 )

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy