Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge Computing.
CoRR, 2024
Data-driven Software-based Power Estimation for Embedded Devices.
CoRR, 2024
CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning.
J. Syst. Archit., September, 2023
A Novel Pipeline Corrosion Monitoring Method Based on Piezoelectric Active Sensing and CNN.
Sensors, January, 2023
Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing.
IEEE Internet Things J., 2023
Deadline-Aware Deep-Recurrent-Q-Network Governor for Smart Energy Saving.
IEEE Trans. Netw. Sci. Eng., 2022
Multi-scale visualization based on sketch interaction for massive surveillance video data.
Pers. Ubiquitous Comput., 2021
A Formal Method for Safety Time Series Simulation of Aerospace.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Impact of Managerial Commitment on Risk Taking with Dynamic Fund Flows.
Manag. Sci., 2019
Anomaly Detection of Target Dynamics Based on Clustering.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks.
Secur. Commun. Networks, 2017
Interactive Animation Editing Based on Sketch Interaction.
Proceedings of the Challenges and Opportunity with Big Data, 2016
Estimation of evapotranspiration over heterogeneous surface based on HJ-1B satellite.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Proceedings of the First International Conference on Foundations of Informatics, 2008
A Novel Derivation Framework For Definite Logic Program.
Proceedings of the First International Conference on Foundations of Informatics, 2008
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007