2025
Dual Class-Aware Contrastive Federated Semi-Supervised Learning.
IEEE Trans. Mob. Comput., February, 2025
Comparative analysis of intelligent connected vehicle industry in China, United States and European Union from technology lifecycle perspective.
Kybernetes, 2025
2024
R&D complementarity and innovation performance - moderating roles of absorptive capacity and government support.
Technol. Anal. Strateg. Manag., December, 2024
Digital economy, government intellectual property protection, and entrepreneurial activity in China.
Technol. Anal. Strateg. Manag., December, 2024
A Secure Medical Information Storage and Sharing Method Based on Multiblockchain Architecture.
IEEE Trans. Comput. Soc. Syst., October, 2024
Enhancing innovation performance of SMEs through open innovation and absorptive capacity: the moderating effect of business model.
Technol. Anal. Strateg. Manag., October, 2024
Intellectual property protection, religious culture and dynamic capabilities of enterprises: evidence from Chinese listed companies.
Technol. Anal. Strateg. Manag., June, 2024
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024
Relation-consistency graph convolutional network for image super-resolution.
Vis. Comput., February, 2024
Robust GEPSVM classifier: An efficient iterative optimization framework.
Inf. Sci., February, 2024
Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing.
ACM Trans. Embed. Comput. Syst., January, 2024
POMF: A Privacy-preserved On-chain Matching Framework.
Future Gener. Comput. Syst., January, 2024
Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data.
IEEE Trans. Netw. Sci. Eng., 2024
Talent Flow in China's Intelligent Connected Vehicle Industry: Evidence From Online Resume Mining.
IEEE Trans. Engineering Management, 2024
Truth: A Blockchain-Aided Secure Reputation System With Genuine Feedbacks.
IEEE Trans. Engineering Management, 2024
An Intelligent Deep Learning Framework for Traffic Flow Imputation and Short-term Prediction Based on Dynamic Features.
Knowl. Based Syst., 2024
Ambidextrous knowledge accumulation, dynamic capability and manufacturing digital transformation in China.
J. Knowl. Manag., 2024
Lightweight verifiable blockchain top-k queries.
Future Gener. Comput. Syst., 2024
Forgetting Through Transforming: Enabling Federated Unlearning via Class-Aware Representation Transformation.
CoRR, 2024
Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations.
CoRR, 2024
Safety Control of Service Robots with LLMs and Embodied Knowledge Graphs.
CoRR, 2024
Saliency-Aware Automatic Buddhas Statue Recognition.
CoRR, 2024
Unveiling camouflaged and partially occluded colorectal polyps: Introducing CPSNet for accurate colon polyp segmentation.
Comput. Biol. Medicine, 2024
How and when domestic and international collaboration networks influence innovation performance of SMEs: evidence from China.
Bus. Process. Manag. J., 2024
Can high-speed railway promote enterprise ambidextrous innovation: a quasi-natural experiment in China.
Bus. Process. Manag. J., 2024
BCFNET: Boundary-Guided Semantic Cross Fusion for Polyp Segmentation.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search.
Proceedings of the Database Systems for Advanced Applications, 2024
2023
FedMCSA: Personalized federated learning via model components self-attention.
Neurocomputing, December, 2023
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023
Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin.
IEEE J. Sel. Areas Commun., November, 2023
Robust generalized canonical correlation analysis.
Appl. Intell., September, 2023
Safety Warning! Decentralised and Automated Incentives for Disqualified Drivers Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., March, 2023
Understanding and defending against White-box membership inference attack in deep learning.
Knowl. Based Syst., 2023
Robot Learning in the Era of Foundation Models: A Survey.
CoRR, 2023
A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023
2022
Secure and Efficient Item Traceability for Cloud-Aided IIoT.
ACM Trans. Sens. Networks, November, 2022
Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., 2022
Robust Least Squares Twin Support Vector Regression With Adaptive FOA and PSO for Short-Term Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2022
Accelerating at the Edge: A Storage-Elastic Blockchain for Latency-Sensitive Vehicular Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2022
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022
ConvLSTM Coupled Economics Indicators Quantitative Trading Decision Model.
Symmetry, 2022
Robust distance metric optimization driven GEPSVM classifier for pattern classification.
Pattern Recognit., 2022
Learning a robust classifier for short-term traffic state prediction.
Knowl. Based Syst., 2022
Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label.
Knowl. Based Syst., 2022
BMP: A blockchain assisted meme prediction method through exploring contextual factors from social networks.
Inf. Sci., 2022
Robust ensemble method for short-term traffic flow prediction.
Future Gener. Comput. Syst., 2022
A patent registration and trading system based on blockchain.
Expert Syst. Appl., 2022
Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A Common Traffic Object Recognition Method Based on Roadside LiDAR.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022
FLMJR: Improving Robustness of Federated Learning via Model Stability.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation.
IEEE Trans. Inf. Forensics Secur., 2021
Image super-resolution via channel attention and spatial graph convolutional network.
Pattern Recognit., 2021
Hierarchical accumulation network with grid attention for image super-resolution.
Knowl. Based Syst., 2021
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding.
Knowl. Based Syst., 2021
An improved algorithm using weighted guided coefficient and union self-adaptive image enhancement for single image haze removal.
IET Image Process., 2021
Selection of the Optimal Number of Topics for LDA Topic Model - Taking Patent Policy Analysis as an Example.
Entropy, 2021
Research on Gender-related Fingerprint Features.
CoRR, 2021
Parameter-Free Attention in fMRI Decoding.
IEEE Access, 2021
Spatial Graph Convolutional Network for Image Super-Resolution.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Oblivious Data Structure for Secure Multiple-Set Membership Testing.
Proceedings of the Web Information Systems and Applications, 2021
2020
Multi-view point cloud registration with adaptive convergence threshold and its application in 3D model retrieval.
Multim. Tools Appl., 2020
Pbsx: A practical private boolean search using Intel SGX.
Inf. Sci., 2020
dCCPI-predictor: A state-aware approach for effectively predicting cross-core performance interference.
Future Gener. Comput. Syst., 2020
Planning Optimal Rejuvenation Policy for Aging Software Systems via a Two-Layer Model.
IEEE Access, 2020
AutoIDL: Automated Imbalanced Data Learning via Collaborative Filtering.
Proceedings of the Knowledge Science, Engineering and Management, 2020
Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
MPTEE: bringing flexible and efficient memory protection to Intel SGX.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Serving at the Edge: A Redactable Blockchain with Fixed Storage.
Proceedings of the Web Information Systems and Applications, 2020
Variable-Length Indistinguishable Binary Tree for Keyword Searching Over Encrypted Data.
Proceedings of the Web Information Systems and Applications, 2020
2019
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment.
IEEE Trans. Serv. Comput., 2019
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Secur. Comput., 2019
LSTM-Based with Deterministic Negative Sampling for API Suggestion.
Int. J. Softw. Eng. Knowl. Eng., 2019
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform.
Future Gener. Comput. Syst., 2019
A gas source localization algorithm based on NLS initial optimization of particle filtering.
Evol. Intell., 2019
Improving Resource Usages of Containers Through Auto-Tuning Container Resource Parameters.
IEEE Access, 2019
3D Fingerprint Gender Classification Using Deep Learning.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019
The Research Reviewed of Edge Network Active Safety Defense Technology.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
2018
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy.
IEEE Trans. Dependable Secur. Comput., 2018
A Self-Training Subspace Clustering Algorithm under Low-Rank Representation for Cancer Classification on Gene Expression Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
Detecting Malware with an Ensemble Method Based on Deep Neural Network.
Secur. Commun. Networks, 2018
LSTM-Based Hierarchical Denoising Network for Android Malware Detection.
Secur. Commun. Networks, 2018
What affects the user stickiness of the mainstream media websites in China?
Electron. Commer. Res. Appl., 2018
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Hybrid Approach for Predicting Aging-Related Failures of Software Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018
Learning API Suggestion via Single LSTM Network with Deterministic Negative Sampling.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
EventDB: A Large-Scale Semi-structured Scientific Data Management System.
Proceedings of the Big Scientific Data Management, 2018
Multi-dimensional Index over a Key-Value Store for Semi-structured Data.
Proceedings of the Big Scientific Data Management, 2018
An Operator Library System for HEP Events Processing Based on Hbase Coprocessor.
Proceedings of the Big Scientific Data Management, 2018
A Distributed Rule Engine for Streaming Big Data.
Proceedings of the Web Information Systems and Applications, 2018
2017
Carbon-Aware Electricity Cost Minimization for Sustainable Data Centers.
IEEE Trans. Sustain. Comput., 2017
InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems.
IEEE Trans. Emerg. Top. Comput., 2017
Nosv: A lightweight nested-virtualization VMM for hosting high performance computing on cloud.
J. Syst. Softw., 2017
基于时变加权马尔科夫链的网络异常检测模型 (Network Anomaly Detection Model Based on Time-varying Weighted Markov Chain).
计算机科学, 2017
一种面向融合泛在网的协同防护体系设计 (Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network).
计算机科学, 2017
电网融合泛在网信息平台设计及安全威胁分析 (Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid).
计算机科学, 2017
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud.
IACR Cryptol. ePrint Arch., 2017
An online electricity cost budgeting algorithm for maximizing green energy usage across data centers.
Frontiers Comput. Sci., 2017
A cost-effective strategy for Cloud system maintenance.
Comput. Electr. Eng., 2017
A Recommendation-Based Parameter Tuning Approach for Hadoop.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017
An algorithm of pose estimation based on conic correspondences.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017
Long short-term memory neural network for network traffic prediction.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
A robust inference algorithm for crowd sourced categorization.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
An accident prediction approach based on XGBoost.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Secure the commodity applications against address exposure attacks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
A High Energy Physical Metadata Directory Structure Based on RAMCloud.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
A two-time-scale load balancing framework for minimizing electricity bills of Internet Data Centers.
Pers. Ubiquitous Comput., 2016
一种基于马尔科夫模型的网络安全风险实时分析方法 (Real Time Analysis Method of Network Security Risk Based on Markov Model).
计算机科学, 2016
一种基于攻防图的网络安全防御策略生成方法 (Improved Network Security Defense Strategy Generation Method Based on Attack-Defense Graph).
计算机科学, 2016
基于冗余消除和属性数值化的XACML策略优化方法 (XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization).
计算机科学, 2016
A Heuristic Time Sharing Policy for Backup Resources in Cloud System.
KSII Trans. Internet Inf. Syst., 2016
Polarity shift detection, elimination and ensemble: A three-stage model for document-level sentiment analysis.
Inf. Process. Manag., 2016
FIRST: Face Identity Recognition in SmarT Bank.
Int. J. Semantic Comput., 2016
Vein point cloud registration algorithm for multi-pose hand vein authentication.
Proceedings of the IEEE International Conference on Identity, 2016
3D feature array involved registration algorithm for multi-pose hand vein authentication.
Proceedings of the International Conference on Biometrics, 2016
Enhancing Data Secrecy with Segmentation Based Isolation.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016
Optimizing Backup Resources in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015
Dual Sentiment Analysis: Considering Two Sides of One Review.
IEEE Trans. Knowl. Data Eng., 2015
PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
IEEE Trans. Computers, 2015
国内第三方Android应用市场安全性的检测 (Detecting Security of Applications in Chinese Third-party Android Market).
计算机科学, 2015
量化粗糙集的单调性属性约简方法 (Approach to Monotonicity Attribute Reduction in Quantitative Rough Set).
计算机科学, 2015
α-Dominance relation and rough sets in interval-valued information systems.
Inf. Sci., 2015
Making Availability as a Service in the Clouds.
CoRR, 2015
CHAOS: Accurate and Realtime Detection of Aging-Oriented Failure Using Entropy.
CoRR, 2015
AppSec: A Safe Execution Environment for Security Sensitive Applications.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
SecPod: a Framework for Virtualization-based Security Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015
Greening Data Centers within Cost Budget.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing.
Proceedings of the International Conference on Identification, 2015
A Novel Approach to Improving Resource Utilization for IaaS.
Proceedings of the 12th Web Information System and Application Conference, 2015
2014
An Automatic Framework for Detecting and Characterizing Performance Degradation of Software Systems.
IEEE Trans. Reliab., 2014
Updating multigranulation rough approximations with increasing of granular structures.
Knowl. Based Syst., 2014
Power-aware optimization for heterogeneous multi-tier clusters.
J. Parallel Distributed Comput., 2014
A WSN Nodes Access Mechanism and Directed Diffusion in Emergency Circumstances.
J. Digit. Inf. Manag., 2014
A Comprehensive Trust Model Based on Reputation and Fuzzy Theory.
J. Comput., 2014
TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud.
J. Comput., 2014
Bio-inspired Mechanism and Model Exploration of Software Aging.
CoRR, 2014
InvarNet-X: A Comprehensive Invariant Based Approach for Performance Diagnosis in Big Data Platform.
Proceedings of the Big Data Benchmarks, Performance Optimization, and Emerging Hardware, 2014
Characterizing Hierarchies on Covering-Based Multigranulation Spaces.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014
Multicost Decision-Theoretic Rough Sets Based on Maximal Consistent Blocks.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014
Proceedings of the Rough Sets and Current Trends in Computing, 2014
Frogeye: Perception of the slightest tag motion.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Multiplexing of Backup VMs Based on Greedy Policy.
Proceedings of the 11th Web Information System and Application Conference, 2014
Granger Causality-Aware Prediction and Diagnosis of Software Degradation.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
2013
TargetATPsite: A template-free method for ATP-binding sites prediction with residue evolution image sparse representation and classifier ensemble.
J. Comput. Chem., 2013
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture.
Frontiers Comput. Sci., 2013
BigDataBench: a Big Data Benchmark Suite from Web Search Engines.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2013
A lightweight VMM on many core for high performance computing.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013
Multi-scale Entropy: One Metric of Software Aging.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Present or Future: Optimal Pricing for Spot Instances.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
CloudRank-V: A Desktop Cloud Benchmark with Complex Workloads.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
An ensemble MIC-based approach for performance diagnosis in big data platform.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Hybrid Power Control and Electricity Cost Management for Distributed Internet Data Centers in Cloud Computing.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
2012
D-Pro: Dynamic Data Center Operations With Demand-Responsive Electricity Prices in Smart Grid.
IEEE Trans. Smart Grid, 2012
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks.
IEEE Trans. Parallel Distributed Syst., 2012
An Advanced Methodology for Measuring and Characterizing Software Aging.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012
Supervised Kernel Self-Organizing Map.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Isolate secure executing environment for a safe cloud.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
2011
Online Estimation of the Approximate Posterior Cramer-Rao Lower Bound for Discrete-Time Nonlinear Filtering.
IEEE Trans. Aerosp. Electron. Syst., 2011
Information Potential Fields Navigation in Wireless <i>Ad-Hoc</i> Sensor Networks.
Sensors, 2011
Tensor Field Model for higher-order information retrieval.
J. Syst. Softw., 2011
A Reference Programming Model for Building Context-Aware Application.
IEICE Trans. Inf. Syst., 2011
A novel heuristic algorithm for QoS-aware end-to-end service composition.
Comput. Commun., 2011
Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011
Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Inter-domain Communication Mechanism Design and Implementation for High Performance.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011
Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011
Dynamic Power Management of Distributed Internet Data Centers in Smart Grid Environment.
Proceedings of the Global Communications Conference, 2011
2010
A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010
An adaptive mode-driven spatiotemporal motion vector prediction for wavelet video coding.
Proceedings of the Visual Communications and Image Processing 2010, 2010
A Text Copy Detection System Based on Complex Event Processing Architecture.
Proceedings of the Towards a Service-Based Internet. ServiceWave 2010 Workshops, 2010
A Novel End-User Oriented Service Composition Model Based on Quotient Space Theory.
Proceedings of the International Conference on Service Sciences, 2010
Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010
Power Management in Heterogeneous Multi-tier Web Clusters.
Proceedings of the 39th International Conference on Parallel Processing, 2010
Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Identification-free batch authentication for RFID tags.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010
Dynamic Projection from Choreography to Orchestration Based on Role Correlation.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
2009
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links.
IEEE Trans. Parallel Distributed Syst., 2009
Joint Throughput Optimization for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2009
Energy Saving Task Scheduling for Heterogeneous CMP System Based on Multi-objective Fuzzy Genetic Algorithm.
Proceedings of the IEEE International Conference on Systems, 2009
A Table-Driven Programming Paradigm for Context-Aware Application Development.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009
A Multi-step Task Allocation Algorithm of Mobile Agent Based on Mobile Ad Hoc Network.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
EUL: An Efficient and Universal Localization Method for Wireless Sensor Network.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
A Mixed Software Rejuvenation Policy for Multiple Degradations Software System.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
Variant rate based cross layer time frame scheduling in wireless sensor networks.
Proceedings of the Wireless Telecommunications Symposium, 2008
A multi-objective hybrid genetic algorithm for energy saving task scheduling in CMP system.
Proceedings of the IEEE International Conference on Systems, 2008
Safety assurance for archeologists using sensor network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008
New Programming Model for Pervasive Computing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
An Improved Heuristic for QoS-Aware Service Composition Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Information Security Risk Assessment Method Based on CORAS Frame.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Designing Simulated Context-Aware Telephone in Pervasive Spaces.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
An Improved Calculus for Secure Dynamic Services Composition.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
SpiG4WSC: A Calculus for Secure Services Composition.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008
A novel formal framework for secure dynamic services composition.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2007
An Offset Algorithm for Conflict Resolution in Context-Aware Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Research on context-aware architecture for personal information privacy protection.
Proceedings of the IEEE International Conference on Systems, 2007
The Research and Design of the Semantic Search Engine Based on Ontology.
Proceedings of the Third International Conference on Semantics, 2007
The Research on Term Field Based Term Co-Occurrence Model.
Proceedings of the Third International Conference on Semantics, 2007
Context-Aware Semantic Web Service Discovery.
Proceedings of the Third International Conference on Semantics, 2007
Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems.
Proceedings of the International Conference on Networking, 2007
Isotope Programming Model: a Kind of Program Model for Context-Aware Application.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Context-Aware Learning Privacy Disclosure Policy from Interaction History.
Proceedings of the Third International Conference on Natural Computation, 2007
Software Aging Forecasting Model of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007
Energy-Aware Scheduling Tasks on Chip Multiprocessor.
Proceedings of the Third International Conference on Natural Computation, 2007
Application Server Aging Prediction Model Based on Wavelet Network with Adaptive Particle Swarm Optimization Algorithm.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007
A Formal Model for Security-Aware dynamic Web Services Composition.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
A Study on Context-aware Privacy Protection for Personal Information.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Forecasting Software Aging of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Fourth International Conference on Autonomic Computing (ICAC'07), 2007
Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Developing an Insulin Pump System Using the SOFL Method.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007
Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Dynamic multicast routing algorithm for delay and delay variation-bounded Steiner tree problem.
Knowl. Based Syst., 2006
Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm.
Proceedings of the Parallel and Distributed Processing and Applications, 2006
Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006
Kernel-SOM Based Visualization of Financial Time Series Forecasting.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Deterministic Packet Marking with Link Signatures for IP Traceback.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
A New Method of Network Data Link Troubleshooting.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
2000
OTMS-A CORBA-Compliant Object Transaction Management System.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000