Frontiers of Computer Science aims to provide a forum for the publication of peer-reviewed papers to promote rapid communication and exchange between computer scientists. The journal publishes research papers and review articles in a wide range of topics, including: architecture, software, artificial intelligence, theoretical computer science, networks and communication, information systems, multimedia and graphics, information security, interdisciplinary, etc. The journal especially encourages papers from new emerging and multidisciplinary areas, as well as papers reflecting the international trends of research and development and on special topics reporting progress made by Chinese computer scientists.
《计算机科学前沿》旨在提供一个发表同行评审论文的论坛,以促进计算机科学家之间的快速沟通和交流。该杂志发表的研究论文和评论文章的主题范围广泛,包括:建筑学、软件、人工智能、理论计算机科学、网络与通信、信息系统、多媒体与图形、信息安全、跨学科等。2该刊特别鼓励发表新兴的多学科领域的论文,以及反映国际研究与发展趋势的论文和报道中国计算机科学家取得进展的专题论文。
A survey on ensemble learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8208-z
NEXT: a neural network framework for next POI recommendation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8011-2
Safe semi-supervised learning: a brief introduction
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8452-2
A correlative denoising autoencoder to model social influence for top-N recommender system
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8123-3
SMER: a secure method of exchanging resources in heterogeneous internet of things
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6524-3
Real-time visual tracking using complementary kernel support correlation filters
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8116-1
Bayesian dual neural networks for recommendation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8049-1
Analyzing time-dimension communication characterizations for representative scientific applications on supercomputer systems
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7239-1
AAMcon: an adaptively distributed SDN controller in data center networks
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7266-6
A perspective on off-policy evaluation in reinforcement learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-9901-7
Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7253-3
An efficient energy aware virtual network migration based on genetic algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8084-6
Real-time manifold regularized context-aware correlation tracking
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8104-y
System architecture for high-performance permissioned blockchains
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6345-4
TPII: tracking personally identifiable information via user behaviors in HTTP traffic
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7451-z
Non-negative matrix factorization based modeling and training algorithm for multi-label learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7452-y
A neighborhood proximity based algorithm for overlapping community structure detection in weighted networks
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8098-0
Abnormal event detection via the analysis of multi-frame optical flow information
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7407-3
Meta-path-based outlier detection in heterogeneous information network
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7289-4
Dynamic data auditing scheme for big data storage
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8117-6
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7342-y
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8106-9
Joint view synthesis and disparity refinement for stereo matching
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8099-4
A primal perspective for indefinite kernel SVM problem
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8148-z
Partition pruning for range query on distributed log-structured merge-tree
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8234-x
Fast and accurate visual odometry from a monocular camera
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6600-8
Algebraic criteria for finite automata understanding of regular language
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-6525-x
Ordinal factorization machine with hierarchical sparsity
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7290-6
An efficient parallel algorithm of N-hop neighborhoods on graphs in distributed environment
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7167-0
Transparent partial page migration between CPU and GPU
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7386-4
Graph-ranking collective Chinese entity linking algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7175-0
New multi-objective approach for dynamic risk-driven intrusion responses
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8175-4
Connection models for the Internet-of-Things
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7395-3
Evaluating and improving the interpretability of item embeddings using item-tag relevance information
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7427-7
Focus-sensitive relation disambiguation for implicit discourse relation detection
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-017-6558-y
Extreme vocabulary learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8249-3
Most similar maximal clique query on large graphs
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7235-0
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8300-4
Software testing without the oracle correctness assumption
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8434-4
Practices of backuping homomorphically encrypted databases
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8394-8
TRAP: trace runtime analysis of properties
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7217-7
Launch of the Excellent Young Computer Scientists Forum
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-9900-8
A unified latent variable model for contrastive opinion mining
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7073-5
State synchronization in process-oriented chaincode
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-017-6484-z
Detection of common wound infection bacteria based on FAIMS technology
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8218-x
Optimized high order product quantization for approximate nearest neighbors search
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7049-5
Personalized query suggestion diversification in information retrieval
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7283-x
Sichuan dialect speech recognition with deep LSTM network
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8030-z
Timestamp reassignment: taming transaction abort for serializable snapshot isolation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7018-z
Answering range-based reverse kNN and why-not reverse kNN queries
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8190-5