Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Science and Technology
1000-9000
2014 Issue 6
A General Low-Cost Indirect Branch Prediction Using Target Address Pointers
Zi-Chao Xie;Dong Tong;Ming-Kai Huang;CCF;ACM;Microprocessor Research and Development Center;Peking University;Engineering Research Center of Microprocessor and System;Ministry of Education;Peking University;
..............page:929-946
Retention Benefit Based Intelligent Cache Replacement
Ling-Da Li;Jun-Lin Lu;Xu Cheng;CCF;ACM;Microprocessor Research and Development Center;Peking University;Engineering Research Center of Microprocessor and System;Ministry of Education;School of Electronics Engineering and Computer Science;Peking University;
..............page:947-961
A Static Greedy and Dynamic Adaptive Thread Spawning Approach for Loop-Level Parallelism
Mei-Rong Li;Yin-Liang Zhao;You Tao;Qi-Ming Wang;Department of Computer Science and Technology;School of Electronic and Information Engineering;Xi’an Jiaotong University;IEEE;
..............page:962-975
An Intra-Server Interconnect Fabric for Heterogeneous Computing
Zheng Cao;Xiao-Li Liu;Qiang Li;Xiao-Bing Liu;Zhan Wang;Xue-Jun An;CCF;ACM;State Key Laboratory of Computer Architecture;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:976-988
Memory Efficient Two-Pass 3D FFT Algorithm for Intel Xeon PhiTM Coprocessor
Yi-Qun Liu;Yan Li;Yun-Quan Zhang;Xian-Yi Zhang;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Department of Computer Science and Technology;Tsinghua University;CCF;ACM;IEEE;State Key Laboratory of Computer Architecture;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:989-1002
Improved Blocking Time Analysis and Evaluation for the Multiprocessor Priority Ceiling Protocol
Mao-Lin Yang;Hang Lei;Yong Liao;Furkan Rabee;IEEE;School of Information and Software Engineering;University of Electronic Science and Technology of China;CCF;School of Computer Science and Engineering;University of Electronic Science and Technology of China;
..............page:1003-1013
Feature-Adaptive Rendering of Loop Subdivision Surfaces on Modern GPUs
Yun-Cen Huang;Jie-Qing Feng;Matthias Nie?ner;Yuan-Min Cui;Baoguang Yang;CCF;State Key Laboratory of CAD&CG;Zhejiang University;ACM;Computer Graphics Laboratory;Stanford University;Stanford;CA 94305;U.S.A.;Qualcomm Technologies Incorporation;San Diego;CA 92121;U.S.A.;
..............page:1014-1025
A Two-Step Regularization Framework for Non-Local Means
Zhong-Gui Sun;Song-Can Chen;Li-Shan Qiao;Department of Mathematics Science;Liaocheng University;College of Computer Science and Technology;Nanjing University of Aeronautics & Astronautics;
..............page:1026-1037
A Holistic Approach for Efficient Contour Detection
Hong Cheng;Lin Chen;Department of Mathematics;Shanghai Jiao Tong University;Ministry of Education Key Lab of Scientific and Engineering Computing;Shanghai Jiao Tong University;Institute of Natural Sciences;Shanghai Jiao Tong University;School of Electronic;Information and Electrical Engineering;Shanghai Jiao Tong University;
..............page:1038-1047
Mammogram Enhancement Using Lifting Dyadic Wavelet Transform and Normalized Tsallis Entropy
Muhammad Hussain;Department of Software Engineering;King Saud University;
..............page:1048-1057
Semisupervised Sparse Multilinear Discriminant Analysis
Kai Huang;Li-Qing Zhang;MOE-Microsoft Key Laboratory for Intelligent Computing and Intelligent Systems;Department of Computer Science and Engineering;Shanghai Jiao Tong University;IEEE;
..............page:1058-1071
Merge-Weighted Dynamic Time Warping for Speech Recognition
Xiang-Lilan Zhang;Zhi-Gang Luo;Ming Li;State Key Laboratory of Pathogen and Biosecurity;Beijing Institute of Microbiology and Epidemiology;Science and Technology on Parallel and Distributed Processing Laboratory;School of Computer Science National University of Defense Technology;David R.Cheriton School of Computer Science;University of Waterloo;Waterloo;Ontario N2L 3G1;Canada;ACM;IEEE;
..............page:1072-1082
CPL:Detecting Protein Complexes by Propagating Labels on Protein-Protein Interaction Network
Qi-Guo Dai;Mao-Zu Guo;Xiao-Yan Liu;Zhi-Xia Teng;Chun-Yu Wang;School of Computer Science and Technology;Harbin Institute of Technology;School of Information and Computer Engineering;Northeast Forestry University;
..............page:1083-1093
Complete Bipartite Anonymity for Location Privacy
Kai Dong;Tao Gu;Xian-Ping Tao;Jian Lv;State Key Laboratory for Novel Software Technology;Nanjing University;Institute of Computer Software;Nanjing University;IEEE;ACM;School of Computer Science and Information Technology;RMIT University;Melbourne;Victoria 3001;Australia;CCF;
..............page:1094-1110
Automated Power Control for Virtualized Infrastructures
Yu Wen;Wei-Ping Wang;Li Guo;Dan Meng;Institute of Information Engineering;Chinese Academy of Sciences;CCF;IEEE;
..............page:1111-1122
Improved Linear Attacks on the Chinese Block Cipher Standard
Ming-Jie Liu;Jia-Zhe Chen;Beijing International Center for Mathematical Research;Peking University;China Information Technology Security Evaluation Center;
..............page:1123-1133
Improved Linear Cryptanalysis of CAST-256
Jing-Yuan Zhao;Mei-Qin Wang;Long Wen;Key Laboratory of Cryptologic Technology and Information Security;Ministry of Education;Shandong University;School of Mathematics;Shandong University;
..............page:1134-1139
2014 Author Index
..............page:1144-1147