Search Results - "计算机科学技术学报:英文版"

Refine Results
  1. 1
  2. 2

    What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts by Yang, Xin-Li, Lo, David, Xia, Xin, Wan, Zhi-Yuan, Sun, Jian-Ling

    Published in Journal of computer science and technology (01-09-2016)
    “…Security has always been a popular and critical topic. With the rapid development of information technology, it is always attracting people's attention…”
    Get full text
    Journal Article
  3. 3

    Active Learning Query Strategies for Classification, Regression, and Clustering: A Survey by Kumar, Punit, Gupta, Atul

    Published in Journal of computer science and technology (01-07-2020)
    “…Generally, data is available abundantly in unlabeled form, and its annotation requires some cost. The labeling, as well as learning cost, can be minimized by…”
    Get full text
    Journal Article
  4. 4

    Technological Exploration of RRAM Crossbar Array for Matrix-Vector Multiplication by Xia, Lixue, Gu, Peng, Li, Boxun, Tang, Tianqi, Yin, Xiling, Huangfu, Wenqin, Yu, Shimeng, Cao, Yu, Wang, Yu, Yang, Huazhong

    “…Matrix-vector multiplication is the key operation for many computationally intensive algorithms. The emerging metal oxide resistive switching random access…”
    Get full text
    Journal Article
  5. 5

    A Survey on Blocking Technology of Entity Resolution by Li, Bo-Han, Liu, Yi, Zhang, An-Man, Wang, Wen-Huan, Wan, Shuo

    Published in Journal of computer science and technology (01-07-2020)
    “…Entity resolution (ER) is a significant task in data integration, which aims to detect all entity profiles that correspond to the same real-world entity. Due…”
    Get full text
    Journal Article
  6. 6

    A Large Chinese Text Dataset in the Wild by Yuan, Tai-Ling, Zhu, Zhe, Xu, Kun, Li, Cheng-Jun, Mu, Tai-Jiang, Hu, Shi-Min

    Published in Journal of computer science and technology (01-05-2019)
    “…In this paper, we introduce a very large Chinese text dataset in the wild. While optical character recognition (OCR) in document images is well studied and…”
    Get full text
    Journal Article
  7. 7

    A Hybrid Instance Selection Using Nearest-Neighbor for Cross-Project Defect Prediction by Ryu, Duksan, Jang, Jong-In, Baik, Jongmoon

    Published in Journal of computer science and technology (01-09-2015)
    “…Software defect prediction (SDP) is an active research field in software engineering to identify defect-prone modules. Thanks to SDP, limited testing resources…”
    Get full text
    Journal Article
  8. 8

    Privacy-Protective-GAN for Privacy Preserving Face De-Identification by Wu, Yifan, Yang, Fan, Xu, Yong, Ling, Haibin

    “…Face de-identification has become increasingly important as the image sources are explosively growing and easily accessible. The advance of new face…”
    Get full text
    Journal Article
  9. 9

    Summarizing Software Artifacts: A Literature Review by Nazar, Najam, Hu, Yan, Jiang, He

    Published in Journal of computer science and technology (01-09-2016)
    “…This paper presents a literature review in the field of summarizing software artifacts, focusing on bug reports, source code, mailing lists and developer…”
    Get full text
    Journal Article
  10. 10

    Internet of Things: Objectives and Scientific Challenges by 马华东

    Published in Journal of computer science and technology (01-11-2011)
    “…The Internet of Things (IoT) is aimed at enabling the interconnection and integration of the physical world and the cyber space. It represents the trend of…”
    Get full text
    Journal Article
  11. 11

    A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs by 张吉良 屈钢 吕勇强 周强

    Published in Journal of computer science and technology (01-07-2014)
    “…Silicon physical unclonable function (PUF) is a popular hardware security primitive that exploits the intrinsic variation of IC manufacturing process to…”
    Get full text
    Journal Article
  12. 12

    Effective Query Grouping Strategy in Clouds by Liu, Qin, Guo, Yuhong, Wu, Jie, Wang, Guojun

    Published in Journal of computer science and technology (01-11-2017)
    “…As the demand for the development of cloud computing grows, more and more organizations have outsourced their data and query services to the cloud for…”
    Get full text
    Journal Article
  13. 13

    A Survey on Graph Processing Accelerators: Challenges and Opportunities by Gui, Chuang-Yi, Zheng, Long, He, Bingsheng, Liu, Cheng, Chen, Xin-Yu, Liao, Xiao-Fei, Jin, Hai

    Published in Journal of computer science and technology (01-03-2019)
    “…Graph is a well known data structure to represent the associated relationships in a variety of applications, e.g., data science and machine learning. Despite a…”
    Get full text
    Journal Article
  14. 14

    Intelligent Visual Media Processing: When Graphics Meets Vision by Cheng, Ming-Ming, Hou, Qi-Bin, Zhang, Song-Hai, Rosin, Paul L.

    “…The computer graphics and computer vision communities have been working closely together in recent years and a variety of algorithms and applications have been…”
    Get full text
    Journal Article
  15. 15

    ShadowEth: Private Smart Contract on Public Blockchain by Yuan, Rui, Xia, Yu-Bin, Chen, Hai-Bo, Zang, Bin-Yu, Xie, Jan

    Published in Journal of computer science and technology (01-05-2018)
    “…Blockchain is becoming popular as a distributed and reliable ledger which allows distrustful parties to transact safely without trusting third parties…”
    Get full text
    Journal Article
  16. 16

    A Survey of Visual Analytics Techniques and Applications: State-of-the-Art Research and Future Challenges by Sun, Guo-Dao, Wu, Ying-Cai, Liang, Rong-Hua, Liu, Shi-Xia

    Published in Journal of computer science and technology (01-09-2013)
    “…Visual analytics employs interactive visualizations to integrate users' knowledge and inference capability into numerical/algorithmic data analysis processes…”
    Get full text
    Journal Article
  17. 17

    A Cluster Based Feature Selection Method for Cross-Project Software Defect Prediction by Ni, Chao, Liu, Wang-Shu, Chen, Xiang, Gu, Qing, Chen, Dao-Xu, Huang, Qi-Guo

    Published in Journal of computer science and technology (01-11-2017)
    “…Cross-project defect prediction (CPDP) uses the labeled data from external source software projects to com- pensate the shortage of useful data in the target…”
    Get full text
    Journal Article
  18. 18

    Balanced Quantization: An Effective and Efficient Approach to Quantized Neural Networks by Zhou, Shu-Chang, Wang, Yu-Zhi, Wen, He, He, Qin-Yao, Zou, Yu-Heng

    Published in Journal of computer science and technology (01-07-2017)
    “…Quantized neural networks (QNNs), which use low bitwidth numbers for representing parameters and performing computations, have been proposed to reduce the…”
    Get full text
    Journal Article
  19. 19

    Multi-Factor Duplicate Question Detection in Stack Overflow by 张芸 David Lo 夏鑫 孙建伶

    Published in Journal of computer science and technology (01-09-2015)
    “…Stack Overflow is a popular on-line question and answer site for software developers to share their experience and expertise. Among the numerous questions…”
    Get full text
    Journal Article
  20. 20

    Serendipity in Recommender Systems: A Systematic Literature Review by Ziarani, Reza Jafari, Ravanmehr, Reza

    Published in Journal of computer science and technology (01-04-2021)
    “…A recommender system is employed to accurately recommend items, which are expected to attract the user’s attention. The over-emphasis on the accuracy of the…”
    Get full text
    Journal Article