Volume 28,Issue 8,2017 Table of Contents
Improved SIMD Vectorization Method in the Presence of Control FlowGAO Wei, LI Ying-Ying, SUN Hui-Hui, LI Yan-Bing and ZHAO Rong-Cai2017,28(8):2046-2063 [Abstract(2460)] [View PDF(4538)1.73 M]Dynamic Taint Tracking Optimization on Just-in-Time CompilationWU Ze-Zhi, CHEN Xing-Yuan, YANG Zhi and DU Xue-Hui2017,28(8):2064-2079 [Abstract(3041)] [View PDF(4813)1.44 M]Hybrid Gesture Interaction Model in the Continuous Interaction SpaceLIU Jie, HUANG Jin, TIAN Feng, HU Wei-Ping, DAI Guo-Zhong and WANG Hong-An2017,28(8):2080-2095 [Abstract(2806)] [View PDF(4524)1.80 M]Knowledge Compilation Algorithm Based on Computing the Intersection for EPCCL TheoriesNIU Dang-Dang, LIU Lei and LÜ Shuai2017,28(8):2096-2112 [Abstract(2495)] [View PDF(3821)1.55 M]Image Set Distance Learning Via Double Sparse RegularizationsLIU Bo, JING Li-Ping and YU Jian2017,28(8):2113-2125 [Abstract(2544)] [View PDF(3910)1.39 M]Incremental Optimization Method for Periodic Query in Data WarehouseKANG Yan-Li, LI Feng and WANG Lei2017,28(8):2126-2147 [Abstract(2572)] [View PDF(4481)2.81 M]Potential Friend Recommendation Algorithm for Obtaining Spatial InformationYU Fei, LI Zhi-Jun, CHE Nan and JIANG Shou-Xu2017,28(8):2148-2160 [Abstract(3847)] [View PDF(4015)3.05 M]Group-Based Method for Influence MaximizationZHANG Ping, WANG Li-Wei, PENG Zhi-Yong, YUE Kun and HUANG Hao2017,28(8):2161-2174 [Abstract(2684)] [View PDF(3898)1.46 M]Constrained Query of Order-Preserving Submatrix Based on Signature and TrieJIANG Tao, LI Zhan-Huai, SHANG Xue-Qun, CHEN Bo-Lin, LI Wei-Bang and YIN Zhi-Lei2017,28(8):2175-2195 [Abstract(2702)] [View PDF(4502)2.48 M]Modular Network Structure for Building Mega-Modular Data CenterLU Fei-Fei, XIE Xiang-Hui, GUO De-Ke and ZHU Gui-Ming2017,28(8):2196-2213 [Abstract(2621)] [View PDF(4036)2.06 M]High Efficiency Algorithm of Fractional Pixel Motion Compensation for HEVCLU Ji-Yuan, LIU Yu-Xi, HOU Fang, HUANG Cheng-Hui and CHAO Hong-Yang2017,28(8):2214-2226 [Abstract(2521)] [View PDF(4617)1.29 M]
分布式云存储:理论、技术、系统专题前言黄宇,吴维刚,赵军平2017,28(8):1927-1928 [Abstract(3659)] [View PDF(6422)204.03 K]Object Placement Algorithm Based on Jump HashNIE Shi-Qiang, WU Wei-Guo, ZHANG Xing-Jun, CAI Yi and XU Zhi-Wei2017,28(8):1929-1939 [Abstract(3799)] [View PDF(5694)2.11 M]Bandwidth-Aware Node Repair Optimization for Distributed Storage System Based on Simple Regenerating CodeDING Shang, TONG Xin, CHEN Yan and YE Bao-Liu2017,28(8):1940-1951 [Abstract(3893)] [View PDF(5259)1.23 M]Adaptive Load Balancing Strategy for File-System Metadata ServiceSHE Chu-Yu, WEN Wu-Shao, XIAO Yang, LIU Yu-Bo and JIA Yin2017,28(8):1952-1967 [Abstract(4294)] [View PDF(5793)1.58 M]Writeback I/O Scheduler Based on Small Synchronous WritesLIU Xing, JIANG Song, WANG Yang, FAN Xiao-Peng and XU Cheng-Zhong2017,28(8):1968-1981 [Abstract(3847)] [View PDF(5126)1.32 M]Self-Adaptive SSD Caching System for Multiobjective Optimization in Virtualization EnvironmentTANG Zhen, WU Heng, WANG Wei, WEI Jun and HUANG Tao2017,28(8):1982-1998 [Abstract(3976)] [View PDF(5652)1.54 M]High-Performance Distributed Storage System for Large-Scale High-Definition Video DataCAO Shun-De, HUA Yu, FENG Dan, SUN Yuan-Yuan and ZUO Peng-Fei2017,28(8):1999-2009 [Abstract(4642)] [View PDF(8043)1.06 M]
Survey of Research on Program Verification via Separation LogicQIN Sheng-Chao, XU Zhi-Wu and MING Zhong2017,28(8):2010-2025 [Abstract(5105)] [View PDF(7261)1.44 M]Survey on Software Binary Code Reuse TechnologiesPENG Guo-Jun, LIANG Yu, ZHANG Huan-Guo and FU Jian-Ming2017,28(8):2026-2045 [Abstract(4639)] [View PDF(8952)2.08 M]