Volume 28,Issue 8,2017 Table of Contents
Improved SIMD Vectorization Method in the Presence of Control FlowGAO Wei, LI Ying-Ying, SUN Hui-Hui, LI Yan-Bing and ZHAO Rong-Cai2017,28(8):2046-2063 [Abstract(2402)] [View PDF(3653)1.73 M]Dynamic Taint Tracking Optimization on Just-in-Time CompilationWU Ze-Zhi, CHEN Xing-Yuan, YANG Zhi and DU Xue-Hui2017,28(8):2064-2079 [Abstract(2961)] [View PDF(4048)1.44 M]Hybrid Gesture Interaction Model in the Continuous Interaction SpaceLIU Jie, HUANG Jin, TIAN Feng, HU Wei-Ping, DAI Guo-Zhong and WANG Hong-An2017,28(8):2080-2095 [Abstract(2685)] [View PDF(3722)1.80 M]Knowledge Compilation Algorithm Based on Computing the Intersection for EPCCL TheoriesNIU Dang-Dang, LIU Lei and LÜ Shuai2017,28(8):2096-2112 [Abstract(2441)] [View PDF(3257)1.55 M]Image Set Distance Learning Via Double Sparse RegularizationsLIU Bo, JING Li-Ping and YU Jian2017,28(8):2113-2125 [Abstract(2477)] [View PDF(3267)1.39 M]Incremental Optimization Method for Periodic Query in Data WarehouseKANG Yan-Li, LI Feng and WANG Lei2017,28(8):2126-2147 [Abstract(2503)] [View PDF(3612)2.81 M]Potential Friend Recommendation Algorithm for Obtaining Spatial InformationYU Fei, LI Zhi-Jun, CHE Nan and JIANG Shou-Xu2017,28(8):2148-2160 [Abstract(3772)] [View PDF(3271)3.05 M]Group-Based Method for Influence MaximizationZHANG Ping, WANG Li-Wei, PENG Zhi-Yong, YUE Kun and HUANG Hao2017,28(8):2161-2174 [Abstract(2614)] [View PDF(3245)1.46 M]Constrained Query of Order-Preserving Submatrix Based on Signature and TrieJIANG Tao, LI Zhan-Huai, SHANG Xue-Qun, CHEN Bo-Lin, LI Wei-Bang and YIN Zhi-Lei2017,28(8):2175-2195 [Abstract(2638)] [View PDF(3409)2.48 M]Modular Network Structure for Building Mega-Modular Data CenterLU Fei-Fei, XIE Xiang-Hui, GUO De-Ke and ZHU Gui-Ming2017,28(8):2196-2213 [Abstract(2568)] [View PDF(3337)2.06 M]High Efficiency Algorithm of Fractional Pixel Motion Compensation for HEVCLU Ji-Yuan, LIU Yu-Xi, HOU Fang, HUANG Cheng-Hui and CHAO Hong-Yang2017,28(8):2214-2226 [Abstract(2450)] [View PDF(3542)1.29 M]
分布式云存储:理论、技术、系统专题前言黄宇,吴维刚,赵军平2017,28(8):1927-1928 [Abstract(3579)] [View PDF(4278)204.03 K]Object Placement Algorithm Based on Jump HashNIE Shi-Qiang, WU Wei-Guo, ZHANG Xing-Jun, CAI Yi and XU Zhi-Wei2017,28(8):1929-1939 [Abstract(3703)] [View PDF(4445)2.11 M]Bandwidth-Aware Node Repair Optimization for Distributed Storage System Based on Simple Regenerating CodeDING Shang, TONG Xin, CHEN Yan and YE Bao-Liu2017,28(8):1940-1951 [Abstract(3809)] [View PDF(3884)1.23 M]Adaptive Load Balancing Strategy for File-System Metadata ServiceSHE Chu-Yu, WEN Wu-Shao, XIAO Yang, LIU Yu-Bo and JIA Yin2017,28(8):1952-1967 [Abstract(4183)] [View PDF(4467)1.58 M]Writeback I/O Scheduler Based on Small Synchronous WritesLIU Xing, JIANG Song, WANG Yang, FAN Xiao-Peng and XU Cheng-Zhong2017,28(8):1968-1981 [Abstract(3766)] [View PDF(3855)1.32 M]Self-Adaptive SSD Caching System for Multiobjective Optimization in Virtualization EnvironmentTANG Zhen, WU Heng, WANG Wei, WEI Jun and HUANG Tao2017,28(8):1982-1998 [Abstract(3889)] [View PDF(4387)1.54 M]High-Performance Distributed Storage System for Large-Scale High-Definition Video DataCAO Shun-De, HUA Yu, FENG Dan, SUN Yuan-Yuan and ZUO Peng-Fei2017,28(8):1999-2009 [Abstract(4518)] [View PDF(6642)1.06 M]
Survey of Research on Program Verification via Separation LogicQIN Sheng-Chao, XU Zhi-Wu and MING Zhong2017,28(8):2010-2025 [Abstract(4973)] [View PDF(5623)1.44 M]Survey on Software Binary Code Reuse TechnologiesPENG Guo-Jun, LIANG Yu, ZHANG Huan-Guo and FU Jian-Ming2017,28(8):2026-2045 [Abstract(4502)] [View PDF(7168)2.08 M]