callback( { "result":{ "query":":facetid:toc:\"db/journals/jcst/jcst29.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"192.55" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"92", "@dc":"92", "@oc":"92", "@id":"43454161", "text":":facetid:toc:db/journals/jcst/jcst29.bht" } }, "hits":{ "@total":"92", "@computed":"92", "@sent":"92", "@first":"0", "hit":[{ "@score":"1", "@id":"3753448", "info":{"authors":{"author":[{"@pid":"46/999-3","text":"Bo Yang 0003"},{"@pid":"119/6383","text":"Xiaoqiong Pang"},{"@pid":"142/9700","text":"Jun-Qiang Du"},{"@pid":"20/4030","text":"Dan Xie"}]},"title":"Effective Error-Tolerant Keyword Search for Secure Cloud Computing.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"81-89","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/0003PDX14","doi":"10.1007/S11390-014-1413-1","ee":"https://doi.org/10.1007/s11390-014-1413-1","url":"https://dblp.org/rec/journals/jcst/0003PDX14"}, "url":"URL#3753448" }, { "@score":"1", "@id":"3753449", "info":{"authors":{"author":[{"@pid":"30/10131","text":"Amineh Amini"},{"@pid":"08/2874","text":"Ying Wah Teh"},{"@pid":"122/2938","text":"Hadi Saboohi"}]},"title":"On Density-Based Data Streams Clustering Algorithms: A Survey.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"116-141","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/AminiTS14","doi":"10.1007/S11390-014-1416-Y","ee":"https://doi.org/10.1007/s11390-014-1416-y","url":"https://dblp.org/rec/journals/jcst/AminiTS14"}, "url":"URL#3753449" }, { "@score":"1", "@id":"3753450", "info":{"authors":{"author":[{"@pid":"73/9076","text":"Fatemeh Azmandian"},{"@pid":"24/5293","text":"Ayse Yilmazer"},{"@pid":"24/6000","text":"Jennifer G. Dy"},{"@pid":"95/6774","text":"Javed A. Aslam"},{"@pid":"k/DavidRKaeli","text":"David R. Kaeli"}]},"title":"Harnessing the Power of GPUs to Speed Up Feature Selection for Outlier Detection.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"408-422","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/AzmandianYDAK14","doi":"10.1007/S11390-014-1439-4","ee":"https://doi.org/10.1007/s11390-014-1439-4","url":"https://dblp.org/rec/journals/jcst/AzmandianYDAK14"}, "url":"URL#3753450" }, { "@score":"1", "@id":"3753451", "info":{"authors":{"author":[{"@pid":"147/1365","text":"Wen-Tao Bao"},{"@pid":"60/7673","text":"Binzhang Fu"},{"@pid":"62/5558","text":"Mingyu Chen 0001"},{"@pid":"52/5615-2","text":"Lixin Zhang 0002"}]},"title":"A High-Performance and Cost-Efficient Interconnection Network for High-Density Servers.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"281-292","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/BaoFCZ14","doi":"10.1007/S11390-014-1430-0","ee":"https://doi.org/10.1007/s11390-014-1430-0","url":"https://dblp.org/rec/journals/jcst/BaoFCZ14"}, "url":"URL#3753451" }, { "@score":"1", "@id":"3753452", "info":{"authors":{"author":[{"@pid":"01/361","text":"Cheng Bo"},{"@pid":"17/11514","text":"Junze Han"},{"@pid":"l/XiangYangLi","text":"Xiangyang Li 0001"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"},{"@pid":"92/6046","text":"Bo Xiao"}]},"title":"SA-MAC: Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"605-617","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/BoHLWX14","doi":"10.1007/S11390-014-1453-6","ee":"https://doi.org/10.1007/s11390-014-1453-6","url":"https://dblp.org/rec/journals/jcst/BoHLWX14"}, "url":"URL#3753452" }, { "@score":"1", "@id":"3753453", "info":{"authors":{"author":[{"@pid":"c/ClaudiaCanali","text":"Claudia Canali"},{"@pid":"l/RiccardoLancellotti","text":"Riccardo Lancellotti"}]},"title":"Improving Scalability of Cloud Monitoring Through PCA-Based Clustering of Virtual Machines.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"38-52","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/CanaliL14","doi":"10.1007/S11390-013-1410-9","ee":"https://doi.org/10.1007/s11390-013-1410-9","url":"https://dblp.org/rec/journals/jcst/CanaliL14"}, "url":"URL#3753453" }, { "@score":"1", "@id":"3753454", "info":{"authors":{"author":[{"@pid":"11/5229","text":"Zheng Cao"},{"@pid":"41/3705-2","text":"Xiao-Li Liu 0002"},{"@pid":"72/872","text":"Qiang Li"},{"@pid":"10/4090","text":"Xiaobing Liu"},{"@pid":"91/6269","text":"Zhan Wang"},{"@pid":"67/7555","text":"Xuejun An"}]},"title":"An Intra-Server Interconnect Fabric for Heterogeneous Computing.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"976-988","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/CaoLLLWA14","doi":"10.1007/S11390-014-1483-0","ee":"https://doi.org/10.1007/s11390-014-1483-0","url":"https://dblp.org/rec/journals/jcst/CaoLLLWA14"}, "url":"URL#3753454" }, { "@score":"1", "@id":"3753455", "info":{"authors":{"author":[{"@pid":"117/5835","text":"Keyan Cao"},{"@pid":"64/146","text":"Guoren Wang"},{"@pid":"60/5399","text":"Donghong Han"},{"@pid":"50/5169","text":"Guohui Ding"},{"@pid":"145/4266","text":"Ai-Xia Wang"},{"@pid":"146/8267","text":"Lingxu Shi"}]},"title":"Continuous Outlier Monitoring on Uncertain Data Streams.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"436-448","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/CaoWHDWS14","doi":"10.1007/S11390-014-1441-X","ee":"https://doi.org/10.1007/s11390-014-1441-x","url":"https://dblp.org/rec/journals/jcst/CaoWHDWS14"}, "url":"URL#3753455" }, { "@score":"1", "@id":"3753456", "info":{"authors":{"author":[{"@pid":"71/9707","text":"Licheng Chen"},{"@pid":"62/5558","text":"Mingyu Chen 0001"},{"@pid":"67/5418","text":"Yuan Ruan"},{"@pid":"89/8378","text":"Yongbing Huang"},{"@pid":"21/11279","text":"Zehan Cui"},{"@pid":"125/2112","text":"Tianyue Lu"},{"@pid":"08/6937","text":"Yungang Bao"}]},"title":"MIMS: Towards a Message Interface Based Memory System.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"255-272","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenCRHCLB14","doi":"10.1007/S11390-014-1428-7","ee":"https://doi.org/10.1007/s11390-014-1428-7","url":"https://dblp.org/rec/journals/jcst/ChenCRHCLB14"}, "url":"URL#3753456" }, { "@score":"1", "@id":"3753457", "info":{"authors":{"author":[{"@pid":"c/JianerChen","text":"Jianer Chen"},{"@pid":"75/6154","text":"Qilong Feng"}]},"title":"On Unknown Small Subsets and Implicit Measures: New Techniques for Parameterized Algorithms.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"870-878","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenF14","doi":"10.1007/S11390-014-1474-1","ee":"https://doi.org/10.1007/s11390-014-1474-1","url":"https://dblp.org/rec/journals/jcst/ChenF14"}, "url":"URL#3753457" }, { "@score":"1", "@id":"3753458", "info":{"authors":{"author":[{"@pid":"c/LiChen19","text":"Li Chen 0019"},{"@pid":"l/BaochunLi","text":"Baochun Li"},{"@pid":"50/3402-1","text":"Bo Li 0001"}]},"title":"Allocating Bandwidth in Datacenter Networks: A Survey.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"910-917","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenLL14","doi":"10.1007/S11390-014-1478-X","ee":"https://doi.org/10.1007/s11390-014-1478-x","url":"https://dblp.org/rec/journals/jcst/ChenLL14"}, "url":"URL#3753458" }, { "@score":"1", "@id":"3753459", "info":{"authors":{"author":[{"@pid":"96/7998","text":"Zhineng Chen"},{"@pid":"30/4265","text":"Chong-Wah Ngo"},{"@pid":"10/4661-31","text":"Wei Zhang 0031"},{"@pid":"75/2820","text":"Juan Cao"},{"@pid":"24/5818","text":"Yu-Gang Jiang"}]},"title":"Name-Face Association in Web Videos: A Large-Scale Dataset, Baselines, and Open Issues.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"785-798","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenNZCJ14","doi":"10.1007/S11390-014-1468-Z","ee":"https://doi.org/10.1007/s11390-014-1468-z","url":"https://dblp.org/rec/journals/jcst/ChenNZCJ14"}, "url":"URL#3753459" }, { "@score":"1", "@id":"3753460", "info":{"authors":{"author":[{"@pid":"27/7017","text":"Peng Chen"},{"@pid":"64/5666-8","text":"Lei Zhang 0008"},{"@pid":"32/2695-1","text":"Yinhe Han 0001"},{"@pid":"48/474","text":"Yunji Chen"}]},"title":"A General-Purpose Many-Accelerator Architecture Based on Dataflow Graph Clustering of Applications.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"239-246","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenZHC14","doi":"10.1007/S11390-014-1426-9","ee":"https://doi.org/10.1007/s11390-014-1426-9","url":"https://dblp.org/rec/journals/jcst/ChenZHC14"}, "url":"URL#3753460" }, { "@score":"1", "@id":"3753461", "info":{"authors":{"author":[{"@pid":"85/5637","text":"Hong Cheng"},{"@pid":"13/3479","text":"Lin Chen"}]},"title":"A Holistic Approach for Efficient Contour Detection.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1038-1047","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChengC14","doi":"10.1007/S11390-014-1488-8","ee":"https://doi.org/10.1007/s11390-014-1488-8","url":"https://dblp.org/rec/journals/jcst/ChengC14"}, "url":"URL#3753461" }, { "@score":"1", "@id":"3753462", "info":{"authors":{"author":[{"@pid":"02/6911","text":"Shung Han Cho"},{"@pid":"142/9869","text":"Kyung Hoon Kim"},{"@pid":"04/697","text":"Sangjin Hong"}]},"title":"Effective Object Identification and Association by Varying Coverage Through RFID Power Control.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"4-20","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ChoKH14","doi":"10.1007/S11390-013-1408-3","ee":"https://doi.org/10.1007/s11390-013-1408-3","url":"https://dblp.org/rec/journals/jcst/ChoKH14"}, "url":"URL#3753462" }, { "@score":"1", "@id":"3753463", "info":{"authors":{"author":[{"@pid":"c/JasonCong","text":"Jason Cong"},{"@pid":"136/7930","text":"Henry Duwe"},{"@pid":"98/4371-2","text":"Rakesh Kumar 0002"},{"@pid":"76/5965","text":"Sen Li"}]},"title":"Better-Than-Worst-Case Design: Progress and Opportunities.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"656-663","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/CongDKL14","doi":"10.1007/S11390-014-1457-2","ee":"https://doi.org/10.1007/s11390-014-1457-2","url":"https://dblp.org/rec/journals/jcst/CongDKL14"}, "url":"URL#3753463" }, { "@score":"1", "@id":"3753464", "info":{"authors":{"author":[{"@pid":"130/1195","text":"Qiguo Dai"},{"@pid":"38/336-1","text":"Mao-Zu Guo 0001"},{"@pid":"55/2775","text":"Xiao-Yan Liu"},{"@pid":"130/1057","text":"Zhixia Teng"},{"@pid":"63/7235","text":"Chunyu Wang"}]},"title":"CPL: Detecting Protein Complexes by Propagating Labels on Protein-Protein Interaction Network.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1083-1093","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DaiGLTW14","doi":"10.1007/S11390-014-1492-Z","ee":"https://doi.org/10.1007/s11390-014-1492-z","url":"https://dblp.org/rec/journals/jcst/DaiGLTW14"}, "url":"URL#3753464" }, { "@score":"1", "@id":"3753465", "info":{"authors":{"author":[{"@pid":"d/ShuiguangDeng","text":"ShuiGuang Deng"},{"@pid":"76/10119","text":"Longtao Huang"},{"@pid":"96/2744-1","text":"Jian Wu 0001"},{"@pid":"54/6252-1","text":"Zhaohui Wu 0001"}]},"title":"Trust-Based Personalized Service Recommendation: A Network Perspective.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"69-80","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DengHWW14","doi":"10.1007/S11390-014-1412-2","ee":"https://doi.org/10.1007/s11390-014-1412-2","url":"https://dblp.org/rec/journals/jcst/DengHWW14"}, "url":"URL#3753465" }, { "@score":"1", "@id":"3753466", "info":{"authors":{"author":[{"@pid":"151/1362","text":"Nem Khan Dim"},{"@pid":"09/1436","text":"Xiangshi Ren"}]},"title":"Designing Motion Gesture Interfaces in Mobile Phones for Blind People.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"812-824","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DimR14","doi":"10.1007/S11390-014-1470-5","ee":"https://doi.org/10.1007/s11390-014-1470-5","url":"https://dblp.org/rec/journals/jcst/DimR14"}, "url":"URL#3753466" }, { "@score":"1", "@id":"3753467", "info":{"authors":{"author":[{"@pid":"83/2822-1","text":"Chen Ding 0001"},{"@pid":"67/9116","text":"Xiaoya Xiang"},{"@pid":"19/9117","text":"Bin Bao"},{"@pid":"14/3727-7","text":"Hao Luo 0007"},{"@pid":"70/4037","text":"Yingwei Luo"},{"@pid":"29/4241-1","text":"Xiaolin Wang 0001"}]},"title":"Performance Metrics and Models for Shared Cache.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"692-712","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DingXBLLW14","doi":"10.1007/S11390-014-1460-7","ee":"https://doi.org/10.1007/s11390-014-1460-7","url":"https://dblp.org/rec/journals/jcst/DingXBLLW14"}, "url":"URL#3753467" }, { "@score":"1", "@id":"3753468", "info":{"authors":{"author":[{"@pid":"88/7785","text":"Kai Dong"},{"@pid":"65/4916","text":"Tao Gu"},{"@pid":"88/484","text":"XianPing Tao"},{"@pid":"38/5132","text":"Jian Lv 0001"}]},"title":"Complete Bipartite Anonymity for Location Privacy.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1094-1110","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DongGTL14","doi":"10.1007/S11390-014-1493-Y","ee":"https://doi.org/10.1007/s11390-014-1493-y","url":"https://dblp.org/rec/journals/jcst/DongGTL14"}, "url":"URL#3753468" }, { "@score":"1", "@id":"3753469", "info":{"authors":{"author":[{"@pid":"77/1277","text":"Fatemeh Dorri"},{"@pid":"71/4226-1","text":"Ali Ghodsi 0001"}]},"title":"Minimizing the Discrepancy Between Source and Target Domains by Learning Adapting Components.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"105-115","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/DorriG14","doi":"10.1007/S11390-014-1415-Z","ee":"https://doi.org/10.1007/s11390-014-1415-z","url":"https://dblp.org/rec/journals/jcst/DorriG14"}, "url":"URL#3753469" }, { "@score":"1", "@id":"3753470", "info":{"authors":{"author":[{"@pid":"94/2372","text":"Wenfei Fan"},{"@pid":"58/1722","text":"Jinpeng Huai"}]},"title":"Querying Big Data: Bridging Theory and Practice.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"849-869","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/FanH14","doi":"10.1007/S11390-014-1473-2","ee":"https://doi.org/10.1007/s11390-014-1473-2","url":"https://dblp.org/rec/journals/jcst/FanH14"}, "url":"URL#3753470" }, { "@score":"1", "@id":"3753471", "info":{"authors":{"author":[{"@pid":"76/8243","text":"Chenglin Fan"},{"@pid":"42/2501-8","text":"Jun Luo 0008"},{"@pid":"25/3415","text":"Wencheng Wang"},{"@pid":"30/289","text":"Farong Zhong"},{"@pid":"z/BinhaiZhu","text":"Binhai Zhu"}]},"title":"On Some Proximity Problems of Colored Sets.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"879-886","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/FanLWZZ14","doi":"10.1007/S11390-014-1475-0","ee":"https://doi.org/10.1007/s11390-014-1475-0","url":"https://dblp.org/rec/journals/jcst/FanLWZZ14"}, "url":"URL#3753471" }, { "@score":"1", "@id":"3753472", "info":{"authors":{"author":[{"@pid":"33/7626","text":"Guangyu Gao"},{"@pid":"29/10531","text":"Hua-Dong Ma"}]},"title":"Movie Scene Recognition Using Panoramic Frame and Representative Feature Patches.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"155-164","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/GaoM14","doi":"10.1007/S11390-014-1418-9","ee":"https://doi.org/10.1007/s11390-014-1418-9","url":"https://dblp.org/rec/journals/jcst/GaoM14"}, "url":"URL#3753472" }, { "@score":"1", "@id":"3753473", "info":{"authors":{"author":[{"@pid":"85/5448","text":"Zheng Gong"},{"@pid":"h/PieterHHartel","text":"Pieter H. Hartel"},{"@pid":"24/3255","text":"Svetla Nikova"},{"@pid":"96/4283","text":"Shaohua Tang"},{"@pid":"63/6089-7","text":"Bo Zhu 0007"}]},"title":"TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"53-68","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/GongHNTZ14","doi":"10.1007/S11390-013-1411-8","ee":"https://doi.org/10.1007/s11390-013-1411-8","url":"https://dblp.org/rec/journals/jcst/GongHNTZ14"}, "url":"URL#3753473" }, { "@score":"1", "@id":"3753474", "info":{"authors":{"author":[{"@pid":"67/7553","text":"Jiangzhou He"},{"@pid":"29/10753","text":"Wen-Guang Chen"},{"@pid":"143/2644","text":"Guang-Ri Chen"},{"@pid":"45/6990","text":"Wei-Min Zheng"},{"@pid":"86/6700","text":"Zhizhong Tang"},{"@pid":"37/9083","text":"Handong Ye"}]},"title":"OpenMDSP: Extending OpenMP to Program Multi-Core DSPs.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"316-331","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HeCCZTY14","doi":"10.1007/S11390-014-1433-X","ee":"https://doi.org/10.1007/s11390-014-1433-x","url":"https://dblp.org/rec/journals/jcst/HeCCZTY14"}, "url":"URL#3753474" }, { "@score":"1", "@id":"3753475", "info":{"authors":{"author":[{"@pid":"89/10696","text":"Shiming He"},{"@pid":"16/2420","text":"Dafang Zhang"},{"@pid":"98/476-1","text":"Kun Xie 0001"},{"@pid":"52/1630","text":"Hong Qiao"},{"@pid":"86/1953","text":"Ji Zhang"}]},"title":"Channel Aware Opportunistic Routing in Multi-Radio Multi-Channel Wireless Mesh Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"487-501","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HeZXQZ14","doi":"10.1007/S11390-014-1444-7","ee":"https://doi.org/10.1007/s11390-014-1444-7","url":"https://dblp.org/rec/journals/jcst/HeZXQZ14"}, "url":"URL#3753475" }, { "@score":"1", "@id":"3753476", "info":{"authors":{"author":[{"@pid":"143/2697","text":"Chen-Da Hou"},{"@pid":"47/4826-8","text":"Dong Li 0008"},{"@pid":"142/9202","text":"Jiefan Qiu"},{"@pid":"125/2282","text":"Hailong Shi"},{"@pid":"51/5556","text":"Li Cui"}]},"title":"SeaHttp: A Resource-Oriented Protocol to Extend REST Style for Web of Things.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"205-215","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HouLQSC14","doi":"10.1007/S11390-014-1423-Z","ee":"https://doi.org/10.1007/s11390-014-1423-z","url":"https://dblp.org/rec/journals/jcst/HouLQSC14"}, "url":"URL#3753476" }, { "@score":"1", "@id":"3753477", "info":{"authors":{"author":[{"@pid":"62/1925","text":"Po Hu"},{"@pid":"47/6668","text":"Minlie Huang"},{"@pid":"50/1222-1","text":"Xiaoyan Zhu 0001"}]},"title":"Exploring the Interactions of Storylines from Informative News Events.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"502-518","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HuHZ14","doi":"10.1007/S11390-014-1445-6","ee":"https://doi.org/10.1007/s11390-014-1445-6","url":"https://dblp.org/rec/journals/jcst/HuHZ14"}, "url":"URL#3753477" }, { "@score":"1", "@id":"3753478", "info":{"authors":{"author":[{"@pid":"154/2585","text":"Yun-Cen Huang"},{"@pid":"88/6214","text":"Jieqing Feng"},{"@pid":"84/8221","text":"Matthias Nießner"},{"@pid":"126/4172","text":"Yuanmin Cui"},{"@pid":"60/7296","text":"Baoguang Yang"}]},"title":"Feature-Adaptive Rendering of Loop Subdivision Surfaces on Modern GPUs.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1014-1025","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HuangFNCY14","doi":"10.1007/S11390-014-1486-X","ee":"https://doi.org/10.1007/s11390-014-1486-x","url":"https://dblp.org/rec/journals/jcst/HuangFNCY14"}, "url":"URL#3753478" }, { "@score":"1", "@id":"3753479", "info":{"authors":{"author":[{"@pid":"86/489-5","text":"Kai Huang 0005"},{"@pid":"20/4627-1","text":"Liqing Zhang 0001"}]},"title":"Semisupervised Sparse Multilinear Discriminant Analysis.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1058-1071","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/HuangZ14","doi":"10.1007/S11390-014-1490-1","ee":"https://doi.org/10.1007/s11390-014-1490-1","url":"https://dblp.org/rec/journals/jcst/HuangZ14"}, "url":"URL#3753479" }, { "@score":"1", "@id":"3753480", "info":{"authors":{"author":{"@pid":"78/3921-1","text":"Muhammad Hussain 0001"}},"title":"Mammogram Enhancement Using Lifting Dyadic Wavelet Transform and Normalized Tsallis Entropy.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1048-1057","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/Hussain14","doi":"10.1007/S11390-014-1489-7","ee":"https://doi.org/10.1007/s11390-014-1489-7","url":"https://dblp.org/rec/journals/jcst/Hussain14"}, "url":"URL#3753480" }, { "@score":"1", "@id":"3753481", "info":{"authors":{"author":[{"@pid":"10/6568","text":"Min-Hee Jang"},{"@pid":"64/5810","text":"Sang-Wook Kim"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"19/6392","text":"Sunju Park"}]},"title":"Accurate Approximation of the Earth Mover's Distance in Linear Time.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"142-154","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/JangKFP14","doi":"10.1007/S11390-014-1417-X","ee":"https://doi.org/10.1007/s11390-014-1417-x","url":"https://dblp.org/rec/journals/jcst/JangKFP14"}, "url":"URL#3753481" }, { "@score":"1", "@id":"3753482", "info":{"authors":{"author":[{"@pid":"71/2992-1","text":"Jia Jia 0001"},{"@pid":"125/2835","text":"Wai-Kim Leung"},{"@pid":"151/1424","text":"Yu-Hao Wu"},{"@pid":"151/1377","text":"Xiu-Long Zhang"},{"@pid":"181/2812-77","text":"Hao Wang 0077"},{"@pid":"13/5576","text":"Lianhong Cai"},{"@pid":"92/3270","text":"Helen M. Meng"}]},"title":"Grading the Severity of Mispronunciations in CAPT Based on Statistical Analysis and Computational Speech Perception.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"751-761","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/JiaLWZWCM14","doi":"10.1007/S11390-014-1465-2","ee":"https://doi.org/10.1007/s11390-014-1465-2","url":"https://dblp.org/rec/journals/jcst/JiaLWZWCM14"}, "url":"URL#3753482" }, { "@score":"1", "@id":"3753483", "info":{"authors":{"author":[{"@pid":"95/11343","text":"Zhiping Jiang"},{"@pid":"10/264","text":"Wei Xi"},{"@pid":"l/XiangYangLi","text":"Xiangyang Li 0001"},{"@pid":"68/3428-1","text":"Shaojie Tang 0001"},{"@pid":"59/4694","text":"Jizhong Zhao"},{"@pid":"96/6606","text":"Jinsong Han"},{"@pid":"40/2555-2","text":"Kun Zhao 0002"},{"@pid":"95/6543-2","text":"Zhi Wang 0002"},{"@pid":"92/6046","text":"Bo Xiao"}]},"title":"Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"589-604","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/JiangXLTZHZWX14","doi":"10.1007/S11390-014-1452-7","ee":"https://doi.org/10.1007/s11390-014-1452-7","url":"https://dblp.org/rec/journals/jcst/JiangXLTZHZWX14"}, "url":"URL#3753483" }, { "@score":"1", "@id":"3753484", "info":{"authors":{"author":[{"@pid":"54/10321","text":"Gilad Katz"},{"@pid":"56/5380","text":"Asaf Shabtai"},{"@pid":"r/LiorRokach","text":"Lior Rokach"},{"@pid":"12/6692","text":"Nir Ofek"}]},"title":"ConfDTree: A Statistical Method for Improving Decision Trees.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"392-407","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/KatzSRO14","doi":"10.1007/S11390-014-1438-5","ee":"https://doi.org/10.1007/s11390-014-1438-5","url":"https://dblp.org/rec/journals/jcst/KatzSRO14"}, "url":"URL#3753484" }, { "@score":"1", "@id":"3753485", "info":{"authors":{"author":[{"@pid":"38/1777","text":"Kibum Kim"},{"@pid":"09/1436","text":"Xiangshi Ren"}]},"title":"Assisting Visually Impaired People to Acquire Targets on a Large Wall-Mounted Display.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"825-836","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/KimR14","doi":"10.1007/S11390-014-1471-4","ee":"https://doi.org/10.1007/s11390-014-1471-4","url":"https://dblp.org/rec/journals/jcst/KimR14"}, "url":"URL#3753485" }, { "@score":"1", "@id":"3753486", "info":{"authors":{"author":[{"@pid":"45/3581","text":"Jung-Tae Lee"},{"@pid":"83/11439","text":"Min-Chul Yang"},{"@pid":"61/4583","text":"Hae-Chang Rim"}]},"title":"Discovering High-Quality Threaded Discussions in Online Forums.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"519-531","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LeeYR14","doi":"10.1007/S11390-014-1446-5","ee":"https://doi.org/10.1007/s11390-014-1446-5","url":"https://dblp.org/rec/journals/jcst/LeeYR14"}, "url":"URL#3753486" }, { "@score":"1", "@id":"3753487", "info":{"authors":{"author":[{"@pid":"118/8955","text":"Lingda Li"},{"@pid":"57/7863","text":"Junlin Lu"},{"@pid":"30/828-1","text":"Xu Cheng 0001"}]},"title":"Retention Benefit Based Intelligent Cache Replacement.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"947-961","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiLC14","doi":"10.1007/S11390-014-1481-2","ee":"https://doi.org/10.1007/s11390-014-1481-2","url":"https://dblp.org/rec/journals/jcst/LiLC14"}, "url":"URL#3753487" }, { "@score":"1", "@id":"3753488", "info":{"authors":{"author":[{"@pid":"96/4282-47","text":"Rui Li 0047"},{"@pid":"62/5693","text":"Kebin Liu"},{"@pid":"l/XiangYangLi","text":"Xiang-Yang Li 0001"},{"@pid":"11/1735-4","text":"Yuan He 0004"},{"@pid":"10/264","text":"Wei Xi"},{"@pid":"95/6543-2","text":"Zhi Wang 0002"},{"@pid":"59/4694","text":"Jizhong Zhao"},{"@pid":"53/2729","text":"Meng Wan"}]},"title":"Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"887-900","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiLLHXWZW14","doi":"10.1007/S11390-014-1476-Z","ee":"https://doi.org/10.1007/s11390-014-1476-z","url":"https://dblp.org/rec/journals/jcst/LiLLHXWZW14"}, "url":"URL#3753488" }, { "@score":"1", "@id":"3753489", "info":{"authors":{"author":[{"@pid":"66/190-9","text":"Chao Li 0009"},{"@pid":"w/RuiWang14","text":"Rui Wang 0014"},{"@pid":"43/4685-1","text":"Yang Hu 0001"},{"@pid":"129/2868","text":"Ruijin Zhou"},{"@pid":"20/2039-6","text":"Ming Liu 0006"},{"@pid":"85/1790","text":"Longjun Liu"},{"@pid":"49/2683","text":"Jingling Yuan"},{"@pid":"75/4601-6","text":"Tao Li 0006"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"618-630","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiWHZLLYLQ14","doi":"10.1007/S11390-014-1454-5","ee":"https://doi.org/10.1007/s11390-014-1454-5","url":"https://dblp.org/rec/journals/jcst/LiWHZLLYLQ14"}, "url":"URL#3753489" }, { "@score":"1", "@id":"3753490", "info":{"authors":{"author":[{"@pid":"134/6154","text":"Meirong Li"},{"@pid":"24/1986","text":"Yinliang Zhao"},{"@pid":"150/4816","text":"You Tao"},{"@pid":"73/2362","text":"Qi-Ming Wang"}]},"title":"A Static Greedy and Dynamic Adaptive Thread Spawning Approach for Loop-Level Parallelism.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"962-975","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiZTW14","doi":"10.1007/S11390-014-1482-1","ee":"https://doi.org/10.1007/s11390-014-1482-1","url":"https://dblp.org/rec/journals/jcst/LiZTW14"}, "url":"URL#3753490" }, { "@score":"1", "@id":"3753491", "info":{"authors":{"author":[{"@pid":"22/562","text":"Xiangke Liao"},{"@pid":"92/2942","text":"Canqun Yang"},{"@pid":"35/1524-1","text":"Tao Tang 0001"},{"@pid":"75/4369","text":"Huizhan Yi"},{"@pid":"90/4225","text":"Feng Wang"},{"@pid":"87/2533","text":"Qiang Wu"},{"@pid":"x/JinglingXue","text":"Jingling Xue"}]},"title":"OpenMC: Towards Simplifying Programming for TianHe Supercomputers.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"532-546","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiaoYTYWWX14","doi":"10.1007/S11390-014-1447-4","ee":"https://doi.org/10.1007/s11390-014-1447-4","url":"https://dblp.org/rec/journals/jcst/LiaoYTYWWX14"}, "url":"URL#3753491" }, { "@score":"1", "@id":"3753492", "info":{"authors":{"author":[{"@pid":"97/9924","text":"Mingjie Liu"},{"@pid":"03/4995","text":"Jiazhe Chen"}]},"title":"Improved Linear Attacks on the Chinese Block Cipher Standard.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1123-1133","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuC14","doi":"10.1007/S11390-014-1495-9","ee":"https://doi.org/10.1007/s11390-014-1495-9","url":"https://dblp.org/rec/journals/jcst/LiuC14"}, "url":"URL#3753492" }, { "@score":"1", "@id":"3753493", "info":{"authors":{"author":[{"@pid":"21/6121-16","text":"Peng Liu 0016"},{"@pid":"66/5168","text":"Lei Fang"},{"@pid":"40/1854","text":"Michael C. Huang 0001"}]},"title":"DEAM: Decoupled, Expressive, Area-Efficient Metadata Cache.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"679-691","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuFH14","doi":"10.1007/S11390-014-1459-0","ee":"https://doi.org/10.1007/s11390-014-1459-0","url":"https://dblp.org/rec/journals/jcst/LiuFH14"}, "url":"URL#3753493" }, { "@score":"1", "@id":"3753494", "info":{"authors":{"author":[{"@pid":"32/2948","text":"Ke Liu"},{"@pid":"16/5205-2","text":"Zhiyong Liu 0002"}]},"title":"Preface.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"547-549","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuL14","doi":"10.1007/S11390-014-1448-3","ee":"https://doi.org/10.1007/s11390-014-1448-3","url":"https://dblp.org/rec/journals/jcst/LiuL14"}, "url":"URL#3753494" }, { "@score":"1", "@id":"3753495", "info":{"authors":{"author":[{"@pid":"32/2948","text":"Ke Liu"},{"@pid":"16/5205-2","text":"Zhiyong Liu 0002"}]},"title":"Preface.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"737-739","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuL14a","doi":"10.1007/S11390-014-1463-4","ee":"https://doi.org/10.1007/s11390-014-1463-4","url":"https://dblp.org/rec/journals/jcst/LiuL14a"}, "url":"URL#3753495" }, { "@score":"1", "@id":"3753496", "info":{"authors":{"author":[{"@pid":"274/1440","text":"Yiqung Liu 0005"},{"@pid":"87/660-5","text":"Yan Li 0005"},{"@pid":"17/6660","text":"Yunquan Zhang"},{"@pid":"63/7449","text":"Xianyi Zhang"}]},"title":"Memory Efficient Two-Pass 3D FFT Algorithm for Intel® Xeon PhiTM Coprocessor.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"989-1002","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuLZZ14","doi":"10.1007/S11390-014-1484-Z","ee":"https://doi.org/10.1007/s11390-014-1484-z","url":"https://dblp.org/rec/journals/jcst/LiuLZZ14"}, "url":"URL#3753496" }, { "@score":"1", "@id":"3753497", "info":{"authors":{"author":[{"@pid":"27/10480","text":"Jingjie Liu"},{"@pid":"03/1496","text":"Lei Nie"}]},"title":"A Functional Sensing Model and a Case Study in Household Electricity Usage Sensing.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"182-193","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuN14","doi":"10.1007/S11390-014-1421-1","ee":"https://doi.org/10.1007/s11390-014-1421-1","url":"https://dblp.org/rec/journals/jcst/LiuN14"}, "url":"URL#3753497" }, { "@score":"1", "@id":"3753498", "info":{"authors":{"author":[{"@pid":"143/2686","text":"Jian-Liang Liu"},{"@pid":"120/1722","text":"Yongle Zhang"},{"@pid":"20/2970","text":"Lin Yang"},{"@pid":"120/1811","text":"Mingyang Guo"},{"@pid":"35/3187","text":"Zhenjun Liu"},{"@pid":"83/4243-1","text":"Lu Xu 0001"}]},"title":"SAC: Exploiting Stable Set Model to Enhance CacheFiles.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"293-302","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuZYGLX14","doi":"10.1007/S11390-014-1431-Z","ee":"https://doi.org/10.1007/s11390-014-1431-z","url":"https://dblp.org/rec/journals/jcst/LiuZYGLX14"}, "url":"URL#3753498" }, { "@score":"1", "@id":"3753499", "info":{"authors":{"author":[{"@pid":"47/5119","text":"Fang Lu"},{"@pid":"97/2112","text":"Huimin Cui"},{"@pid":"w/LeiWang4","text":"Lei Wang 0004"},{"@pid":"21/2715-30","text":"Lei Liu 0030"},{"@pid":"51/3529-2","text":"Chenggang Wu 0002"},{"@pid":"f/XiaobingFeng2","text":"Xiaobing Feng 0002"},{"@pid":"y/PenChungYew","text":"Pen-Chung Yew"}]},"title":"Dynamic I/O-Aware Scheduling for Batch-Mode Applications on Chip Multiprocessor Systems of Cluster Platforms.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"21-37","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LuC0LWFY14","doi":"10.1007/S11390-013-1409-2","ee":"https://doi.org/10.1007/s11390-013-1409-2","url":"https://dblp.org/rec/journals/jcst/LuC0LWFY14"}, "url":"URL#3753499" }, { "@score":"1", "@id":"3753500", "info":{"authors":{"author":[{"@pid":"43/6243","text":"Yong-Qiang Lv 0001"},{"@pid":"43/3182-1","text":"Qiang Zhou 0001"},{"@pid":"09/2775","text":"Yici Cai"},{"@pid":"04/3130","text":"Gang Qu 0001"}]},"title":"Trusted Integrated Circuits: The Problem and Challenges.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"918-928","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/LvZCQ14","doi":"10.1007/S11390-014-1479-9","ee":"https://doi.org/10.1007/s11390-014-1479-9","url":"https://dblp.org/rec/journals/jcst/LvZCQ14"}, "url":"URL#3753500" }, { "@score":"1", "@id":"3753501", "info":{"authors":{"author":[{"@pid":"119/1364-2","text":"Tam V. Nguyen 0002"},{"@pid":"56/8278","text":"Jiashi Feng"},{"@pid":"y/ShuichengYan","text":"Shuicheng Yan"}]},"title":"Seeing Human Weight from a Single RGB-D Image.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"777-784","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/NguyenFY14","doi":"10.1007/S11390-014-1467-0","ee":"https://doi.org/10.1007/s11390-014-1467-0","url":"https://dblp.org/rec/journals/jcst/NguyenFY14"}, "url":"URL#3753501" }, { "@score":"1", "@id":"3753502", "info":{"authors":{"author":[{"@pid":"90/790","text":"Tapio Pahikkala"},{"@pid":"50/4446","text":"Antti Airola"},{"@pid":"68/7056","text":"Fabian Gieseke"},{"@pid":"34/4776","text":"Oliver Kramer 0001"}]},"title":"On Unsupervised Training of Multi-Class Regularized Least-Squares Classifiers.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"90-104","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/PahikkalaAGK14","doi":"10.1007/S11390-014-1414-0","ee":"https://doi.org/10.1007/s11390-014-1414-0","url":"https://dblp.org/rec/journals/jcst/PahikkalaAGK14"}, "url":"URL#3753502" }, { "@score":"1", "@id":"3753503", "info":{"authors":{"author":[{"@pid":"33/8643","text":"Amichai Painsky"},{"@pid":"09/6597","text":"Saharon Rosset"}]},"title":"Optimal Set Cover Formulation for Exclusive Row Biclustering of Gene Expression.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"423-435","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/PainskyR14","doi":"10.1007/S11390-014-1440-Y","ee":"https://doi.org/10.1007/s11390-014-1440-y","url":"https://dblp.org/rec/journals/jcst/PainskyR14"}, "url":"URL#3753503" }, { "@score":"1", "@id":"3753504", "info":{"authors":{"author":{"@pid":"25/965","text":"Kwangjin Park"}},"title":"Efficient Data Access for Location-Dependent Spatial Queries.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"449-469","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/Park14","doi":"10.1007/S11390-014-1442-9","ee":"https://doi.org/10.1007/s11390-014-1442-9","url":"https://dblp.org/rec/journals/jcst/Park14"}, "url":"URL#3753504" }, { "@score":"1", "@id":"3753505", "info":{"authors":{"author":[{"@pid":"124/7182","text":"Mitat Poyraz"},{"@pid":"124/7283","text":"Zeynep Hilal Kilimci"},{"@pid":"85/1397","text":"Murat Can Ganiz"}]},"title":"Higher-Order Smoothing: A Novel Semantic Smoothing Method for Text Classification.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"376-391","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/PoyrazKG14","doi":"10.1007/S11390-014-1437-6","ee":"https://doi.org/10.1007/s11390-014-1437-6","url":"https://dblp.org/rec/journals/jcst/PoyrazKG14"}, "url":"URL#3753505" }, { "@score":"1", "@id":"3753506", "info":{"authors":{"author":[{"@pid":"142/9202","text":"Jiefan Qiu"},{"@pid":"47/4826-8","text":"Dong Li 0008"},{"@pid":"125/2282","text":"Hailong Shi"},{"@pid":"143/2697","text":"Chen-Da Hou"},{"@pid":"51/5556","text":"Li Cui"}]},"title":"EasiSMP: A Resource-Oriented Programming Framework Supporting Runtime Propagation of RESTful Resources.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"194-204","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/QiuLSHC14","doi":"10.1007/S11390-014-1422-0","ee":"https://doi.org/10.1007/s11390-014-1422-0","url":"https://dblp.org/rec/journals/jcst/QiuLSHC14"}, "url":"URL#3753506" }, { "@score":"1", "@id":"3753507", "info":{"authors":{"author":[{"@pid":"82/10167","text":"Rafael Geraldeli Rossi"},{"@pid":"60/5946","text":"Alneu de Andrade Lopes"},{"@pid":"124/7230","text":"Thiago de Paulo Faleiros"},{"@pid":"90/5551","text":"Solange Oliveira Rezende"}]},"title":"Inductive Model Generation for Text Classification Using a Bipartite Heterogeneous Network.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"361-375","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/RossiLFR14","doi":"10.1007/S11390-014-1436-7","ee":"https://doi.org/10.1007/s11390-014-1436-7","url":"https://dblp.org/rec/journals/jcst/RossiLFR14"}, "url":"URL#3753507" }, { "@score":"1", "@id":"3753508", "info":{"authors":{"author":[{"@pid":"61/271","text":"Jana Schmidt"},{"@pid":"k/StefanKramer1","text":"Stefan Kramer 0001"}]},"title":"Online Induction of Probabilistic Real-Time Automata.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"345-360","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/SchmidtK14","doi":"10.1007/S11390-014-1435-8","ee":"https://doi.org/10.1007/s11390-014-1435-8","url":"https://dblp.org/rec/journals/jcst/SchmidtK14"}, "url":"URL#3753508" }, { "@score":"1", "@id":"3753509", "info":{"authors":{"author":[{"@pid":"143/2722","text":"Bing-Qing Shao"},{"@pid":"09/4697-3","text":"Junwei Zhang 0003"},{"@pid":"143/2721","text":"Cai-Ping Zheng"},{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"35/3187","text":"Zhenjun Liu"},{"@pid":"83/4243-1","text":"Lu Xu 0001"}]},"title":"A Non-Forced-Write Atomic Commit Protocol for Cluster File Systems.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"303-315","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ShaoZZZLX14","doi":"10.1007/S11390-014-1432-Y","ee":"https://doi.org/10.1007/s11390-014-1432-y","url":"https://dblp.org/rec/journals/jcst/ShaoZZZLX14"}, "url":"URL#3753509" }, { "@score":"1", "@id":"3753510", "info":{"authors":{"author":[{"@pid":"125/2282","text":"Hailong Shi"},{"@pid":"47/4826-8","text":"Dong Li 0008"},{"@pid":"142/9202","text":"Jiefan Qiu"},{"@pid":"143/2697","text":"Chenda Hou"},{"@pid":"51/5556","text":"Li Cui"}]},"title":"A Task Execution Framework for Cloud-Assisted Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"216-226","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ShiLQHC14","doi":"10.1007/S11390-014-1424-Y","ee":"https://doi.org/10.1007/s11390-014-1424-y","url":"https://dblp.org/rec/journals/jcst/ShiLQHC14"}, "url":"URL#3753510" }, { "@score":"1", "@id":"3753511", "info":{"authors":{"author":[{"@pid":"127/1865","text":"Zhong-Gui Sun"},{"@pid":"60/5111","text":"Songcan Chen"},{"@pid":"41/7382","text":"Li-Shan Qiao"}]},"title":"A Two-Step Regularization Framework for Non-Local Means.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1026-1037","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/SunCQ14","doi":"10.1007/S11390-014-1487-9","ee":"https://doi.org/10.1007/s11390-014-1487-9","url":"https://dblp.org/rec/journals/jcst/SunCQ14"}, "url":"URL#3753511" }, { "@score":"1", "@id":"3753512", "info":{"authors":{"author":[{"@pid":"53/9826","text":"Aditya Wagh"},{"@pid":"129/1135","text":"Yunfei Hou"},{"@pid":"60/6865","text":"Chunming Qiao"},{"@pid":"30/7663","text":"Longfei Zhang"},{"@pid":"25/3528-9","text":"Xu Li 0009"},{"@pid":"117/5085","text":"Adel W. Sadek"},{"@pid":"25/9318","text":"Kevin F. Hulme"},{"@pid":"82/5228","text":"Changxu Wu"},{"@pid":"22/1748","text":"Hongli Xu"},{"@pid":"51/769","text":"Liusheng Huang"}]},"title":"Emerging Applications for Cyber Transportation Systems.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"562-575","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WaghHQZLSHWXH14","doi":"10.1007/S11390-014-1450-9","ee":"https://doi.org/10.1007/s11390-014-1450-9","url":"https://dblp.org/rec/journals/jcst/WaghHQZLSHWXH14"}, "url":"URL#3753512" }, { "@score":"1", "@id":"3753513", "info":{"authors":{"author":[{"@pid":"90/716","text":"Peng-Jun Wan"},{"@pid":"82/4194","text":"Zhiguo Wan"}]},"title":"Maximizing Networking Capacity in Multi-Channel Multi-Radio Wireless Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"901-909","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WanW14","doi":"10.1007/S11390-014-1477-Y","ee":"https://doi.org/10.1007/s11390-014-1477-y","url":"https://dblp.org/rec/journals/jcst/WanW14"}, "url":"URL#3753513" }, { "@score":"1", "@id":"3753514", "info":{"authors":{"author":[{"@pid":"72/6811-50","text":"Bo Wang 0050"},{"@pid":"82/2673","text":"Yingfei Xiong 0001"},{"@pid":"24/5199","text":"Zhenjiang Hu"},{"@pid":"23/2644","text":"Haiyan Zhao"},{"@pid":"10/4661-4","text":"Wei Zhang 0004"},{"@pid":"14/2036","text":"Hong Mei 0001"}]},"title":"Interactive Inconsistency Fixing in Feature Modeling.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"724-736","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WangXHZZM14","doi":"10.1007/S11390-014-1462-5","ee":"https://doi.org/10.1007/s11390-014-1462-5","url":"https://dblp.org/rec/journals/jcst/WangXHZZM14"}, "url":"URL#3753514" }, { "@score":"1", "@id":"3753515", "info":{"authors":{"author":[{"@pid":"94/3104-1","text":"Ying Wang 0001"},{"@pid":"64/5666-8","text":"Lei Zhang 0008"},{"@pid":"32/2695-1","text":"Yinhe Han 0001"},{"@pid":"70/576-1","text":"Huawei Li 0001"}]},"title":"Reinventing Memory System Design for Many-Accelerator Architecture.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"273-280","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WangZHL14","doi":"10.1007/S11390-014-1429-6","ee":"https://doi.org/10.1007/s11390-014-1429-6","url":"https://dblp.org/rec/journals/jcst/WangZHL14"}, "url":"URL#3753515" }, { "@score":"1", "@id":"3753516", "info":{"authors":{"author":[{"@pid":"58/3305","text":"Yu Wen"},{"@pid":"72/4134-5","text":"Weiping Wang 0005"},{"@pid":"02/929-1","text":"Li Guo 0001"},{"@pid":"01/2538","text":"Dan Meng"}]},"title":"Automated Power Control for Virtualized Infrastructures.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1111-1122","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WenWGM14","doi":"10.1007/S11390-014-1494-X","ee":"https://doi.org/10.1007/s11390-014-1494-x","url":"https://dblp.org/rec/journals/jcst/WenWGM14"}, "url":"URL#3753516" }, { "@score":"1", "@id":"3753517", "info":{"authors":{"author":[{"@pid":"08/2939","text":"Long Wen"},{"@pid":"88/158","text":"Meiqin Wang"},{"@pid":"19/8682","text":"Jingyuan Zhao"}]},"title":"Related-Key Impossible Differential Attack on Reduced-Round LBlock.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"165-176","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WenWZ14","doi":"10.1007/S11390-014-1419-8","ee":"https://doi.org/10.1007/s11390-014-1419-8","url":"https://dblp.org/rec/journals/jcst/WenWZ14"}, "url":"URL#3753517" }, { "@score":"1", "@id":"3753518", "info":{"authors":{"author":{"@pid":"w/JieWu1","text":"Jie Wu 0001"}},"title":"Collaborative Mobile Charging and Coverage.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"550-561","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/Wu14","doi":"10.1007/S11390-014-1449-2","ee":"https://doi.org/10.1007/s11390-014-1449-2","url":"https://dblp.org/rec/journals/jcst/Wu14"}, "url":"URL#3753518" }, { "@score":"1", "@id":"3753519", "info":{"authors":{"author":[{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"48/474","text":"Yunji Chen"},{"@pid":"60/419-2","text":"Tianshi Chen 0002"},{"@pid":"67/398-1","text":"Qi Guo 0001"},{"@pid":"64/5666-8","text":"Lei Zhang 0008"}]},"title":"An Elastic Architecture Adaptable to Various Application Scenarios.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"227-238","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WuCCGZ14","doi":"10.1007/S11390-014-1425-X","ee":"https://doi.org/10.1007/s11390-014-1425-x","url":"https://dblp.org/rec/journals/jcst/WuCCGZ14"}, "url":"URL#3753519" }, { "@score":"1", "@id":"3753520", "info":{"authors":{"author":[{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"138/2494","text":"Jipeng Qiang"},{"@pid":"51/1316","text":"Fei Xie"}]},"title":"Pattern Matching with Flexible Wildcards.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"740-750","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/WuQX14","doi":"10.1007/S11390-014-1464-3","ee":"https://doi.org/10.1007/s11390-014-1464-3","url":"https://dblp.org/rec/journals/jcst/WuQX14"}, "url":"URL#3753520" }, { "@score":"1", "@id":"3753521", "info":{"title":"Editorial: Moving Forward to Respond to Rapid Changes of Computer Science and Technology.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"1","year":"2014","type":"Journal Articles","access":"open","key":"journals/jcst/X14","doi":"10.1007/S11390-013-1406-5","ee":"https://doi.org/10.1007/s11390-013-1406-5","url":"https://dblp.org/rec/journals/jcst/X14"}, "url":"URL#3753521" }, { "@score":"1", "@id":"3753522", "info":{"title":"Introduction to the Six Leading Editors.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"1","pages":"2-3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/X14a","doi":"10.1007/S11390-013-1407-4","ee":"https://doi.org/10.1007/s11390-013-1407-4","url":"https://dblp.org/rec/journals/jcst/X14a"}, "url":"URL#3753522" }, { "@score":"1", "@id":"3753523", "info":{"title":"Contents.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1140-1143","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/X14b","doi":"10.1007/S11390-014-1497-7","ee":"https://doi.org/10.1007/s11390-014-1497-7","url":"https://dblp.org/rec/journals/jcst/X14b"}, "url":"URL#3753523" }, { "@score":"1", "@id":"3753524", "info":{"authors":{"author":[{"@pid":"x/TaoXie","text":"Tao Xie 0001"},{"@pid":"z/LuZhang1","text":"Lu Zhang 0023"},{"@pid":"13/9656","text":"Xusheng Xiao"},{"@pid":"82/2673","text":"Yingfei Xiong 0001"},{"@pid":"50/456","text":"Dan Hao 0001"}]},"title":"Cooperative Software Testing and Analysis: Advances and Challenges.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"713-723","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/Xie0XXH14","doi":"10.1007/S11390-014-1461-6","ee":"https://doi.org/10.1007/s11390-014-1461-6","url":"https://dblp.org/rec/journals/jcst/Xie0XXH14"}, "url":"URL#3753524" }, { "@score":"1", "@id":"3753525", "info":{"authors":{"author":[{"@pid":"63/10504","text":"Zichao Xie"},{"@pid":"56/464","text":"Dong Tong 0001"},{"@pid":"96/10504","text":"Mingkai Huang"}]},"title":"A General Low-Cost Indirect Branch Prediction Using Target Address Pointers.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"929-946","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/XieTH14","doi":"10.1007/S11390-014-1480-3","ee":"https://doi.org/10.1007/s11390-014-1480-3","url":"https://dblp.org/rec/journals/jcst/XieTH14"}, "url":"URL#3753525" }, { "@score":"1", "@id":"3753526", "info":{"authors":{"author":{"@pid":"262/0620-2","text":"Zhiwei Xu 0002"}},"title":"Cloud-Sea Computing Systems: Towards Thousand-Fold Improvement in Performance per Watt for the Coming Zettabyte Era.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"177-181","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/Xu14","doi":"10.1007/S11390-014-1420-2","ee":"https://doi.org/10.1007/s11390-014-1420-2","url":"https://dblp.org/rec/journals/jcst/Xu14"}, "url":"URL#3753526" }, { "@score":"1", "@id":"3753527", "info":{"authors":{"author":[{"@pid":"13/8698","text":"Mingliang Xu"},{"@pid":"38/6049-13","text":"Hao Jiang 0013"},{"@pid":"36/3676-1","text":"Xiaogang Jin 0001"},{"@pid":"23/6641","text":"Zhigang Deng"}]},"title":"Crowd Simulation and Its Applications: Recent Advances.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"799-811","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/XuJJD14","doi":"10.1007/S11390-014-1469-Y","ee":"https://doi.org/10.1007/s11390-014-1469-y","url":"https://dblp.org/rec/journals/jcst/XuJJD14"}, "url":"URL#3753527" }, { "@score":"1", "@id":"3753528", "info":{"authors":{"author":[{"@pid":"87/6559-1","text":"Yuanyuan Xu 0001"},{"@pid":"69/2369","text":"Ce Zhu"},{"@pid":"04/1781-3","text":"Lu Yu 0003"}]},"title":"Multipath Routing of Multiple Description Coded Images in Wireless Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"576-588","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/XuZY14","doi":"10.1007/S11390-014-1451-8","ee":"https://doi.org/10.1007/s11390-014-1451-8","url":"https://dblp.org/rec/journals/jcst/XuZY14"}, "url":"URL#3753528" }, { "@score":"1", "@id":"3753529", "info":{"authors":{"author":[{"@pid":"147/7698","text":"Maolin Yang"},{"@pid":"74/5792","text":"Hang Lei"},{"@pid":"69/2622","text":"Yong Liao"},{"@pid":"147/7702","text":"Furkan Rabee"}]},"title":"Improved Blocking Time Analysis and Evaluation for the Multiprocessor Priority Ceiling Protocol.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1003-1013","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/YangLLR14","doi":"10.1007/S11390-014-1485-Y","ee":"https://doi.org/10.1007/s11390-014-1485-y","url":"https://dblp.org/rec/journals/jcst/YangLLR14"}, "url":"URL#3753529" }, { "@score":"1", "@id":"3753530", "info":{"authors":{"author":[{"@pid":"143/2682","text":"Yi-Xiao Yin"},{"@pid":"48/474","text":"Yunji Chen"},{"@pid":"67/398-1","text":"Qi Guo 0001"},{"@pid":"60/419-2","text":"Tianshi Chen 0002"}]},"title":"Prevention from Soft Errors via Architecture Elasticity.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"247-254","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/YinCGC14","doi":"10.1007/S11390-014-1427-8","ee":"https://doi.org/10.1007/s11390-014-1427-8","url":"https://dblp.org/rec/journals/jcst/YinCGC14"}, "url":"URL#3753530" }, { "@score":"1", "@id":"3753531", "info":{"authors":{"author":[{"@pid":"74/2356","text":"Mingxuan Yuan"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"14/2036","text":"Hong Mei 0001"}]},"title":"Protect You More Than Blank: Anti-Learning Sensitive User Information in the Social Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"762-776","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/YuanCYM14","doi":"10.1007/S11390-014-1466-1","ee":"https://doi.org/10.1007/s11390-014-1466-1","url":"https://dblp.org/rec/journals/jcst/YuanCYM14"}, "url":"URL#3753531" }, { "@score":"1", "@id":"3753532", "info":{"authors":{"author":[{"@pid":"118/4755","text":"Xianglilan Zhang"},{"@pid":"02/2039","text":"Zhigang Luo"},{"@pid":"l/MingLi1","text":"Ming Li 0001"}]},"title":"Merge-Weighted Dynamic Time Warping for Speech Recognition.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1072-1082","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhangLL14","doi":"10.1007/S11390-014-1491-0","ee":"https://doi.org/10.1007/s11390-014-1491-0","url":"https://dblp.org/rec/journals/jcst/ZhangLL14"}, "url":"URL#3753532" }, { "@score":"1", "@id":"3753533", "info":{"authors":{"author":[{"@pid":"04/1262-2","text":"Jiliang Zhang 0002"},{"@pid":"04/3130","text":"Gang Qu 0001"},{"@pid":"43/6243","text":"Yong-Qiang Lv 0001"},{"@pid":"43/3182-1","text":"Qiang Zhou 0001"}]},"title":"A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"664-678","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhangQLZ14","doi":"10.1007/S11390-014-1458-1","ee":"https://doi.org/10.1007/s11390-014-1458-1","url":"https://dblp.org/rec/journals/jcst/ZhangQLZ14"}, "url":"URL#3753533" }, { "@score":"1", "@id":"3753534", "info":{"authors":{"author":[{"@pid":"19/8682","text":"Jingyuan Zhao"},{"@pid":"88/158","text":"Meiqin Wang"},{"@pid":"08/2939","text":"Long Wen"}]},"title":"Improved Linear Cryptanalysis of CAST-256.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"6","pages":"1134-1139","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhaoWW14","doi":"10.1007/S11390-014-1496-8","ee":"https://doi.org/10.1007/s11390-014-1496-8","url":"https://dblp.org/rec/journals/jcst/ZhaoWW14"}, "url":"URL#3753534" }, { "@score":"1", "@id":"3753535", "info":{"authors":{"author":[{"@pid":"87/734-1","text":"Lei Zhao 0001"},{"@pid":"152/3142","text":"Yan-Yan Yang"},{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"}]},"title":"Continuous Probabilistic Subspace Skyline Query Processing Using Grid Projections.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"2","pages":"332-344","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhaoYZ14","doi":"10.1007/S11390-014-1434-9","ee":"https://doi.org/10.1007/s11390-014-1434-9","url":"https://dblp.org/rec/journals/jcst/ZhaoYZ14"}, "url":"URL#3753535" }, { "@score":"1", "@id":"3753536", "info":{"authors":{"author":[{"@pid":"98/3341-2","text":"Xiaolong Zheng 0002"},{"@pid":"53/2729","text":"Meng Wan"}]},"title":"A Survey on Data Dissemination in Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"3","pages":"470-486","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhengW14","doi":"10.1007/S11390-014-1443-8","ee":"https://doi.org/10.1007/s11390-014-1443-8","url":"https://dblp.org/rec/journals/jcst/ZhengW14"}, "url":"URL#3753536" }, { "@score":"1", "@id":"3753537", "info":{"authors":{"author":[{"@pid":"13/6395-2","text":"Xiaobo Zhou 0002"},{"@pid":"31/5933","text":"Changjun Jiang"}]},"title":"Autonomic Performance and Power Control on Virtualized Servers: Survey, Practices, and Trends.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"631-645","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhouJ14","doi":"10.1007/S11390-014-1455-4","ee":"https://doi.org/10.1007/s11390-014-1455-4","url":"https://dblp.org/rec/journals/jcst/ZhouJ14"}, "url":"URL#3753537" }, { "@score":"1", "@id":"3753538", "info":{"authors":{"author":[{"@pid":"22/4544","text":"Wengang Zhou"},{"@pid":"59/7017","text":"Houqiang Li"},{"@pid":"30/6535","text":"Yijuan Lu"},{"@pid":"78/1467-1","text":"Qi Tian 0001"}]},"title":"Encoding Spatial Context for Large-Scale Partial-Duplicate Web Image Retrieval.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"5","pages":"837-848","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhouLLT14","doi":"10.1007/S11390-014-1472-3","ee":"https://doi.org/10.1007/s11390-014-1472-3","url":"https://dblp.org/rec/journals/jcst/ZhouLLT14"}, "url":"URL#3753538" }, { "@score":"1", "@id":"3753539", "info":{"authors":{"author":[{"@pid":"161/0802","text":"Minhui Zou"},{"@pid":"97/143","text":"Kun Ma"},{"@pid":"72/6531","text":"Kaijie Wu 0001"},{"@pid":"27/2376","text":"Edwin Hsing-Mean Sha"}]},"title":"Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists.","venue":"J. Comput. Sci. Technol.","volume":"29","number":"4","pages":"646-655","year":"2014","type":"Journal Articles","access":"closed","key":"journals/jcst/ZouMWS14","doi":"10.1007/S11390-014-1456-3","ee":"https://doi.org/10.1007/s11390-014-1456-3","url":"https://dblp.org/rec/journals/jcst/ZouMWS14"}, "url":"URL#3753539" } ] } } } )