2025
Hunyuan-Game: Industrial-grade Intelligent Game Creation Model.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, May, 2025
RomanTex: Decoupling 3D-aware Rotary Positional Embedded Multi-Attention Network for Texture Synthesis.
CoRR, March, 2025
Unleashing Vecset Diffusion Model for Fast Shape Generation.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
MaterialMVP: Illumination-Invariant Material Generation via Multi-view PBR Diffusion.
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
Evaluating and Predicting Distorted Human Body Parts for Generated Images.
CoRR, March, 2025
Meta-Learning for Graph Neural Network-Based Power Allocation in LEO Satellite Communications.
IEEE Trans. Veh. Technol., February, 2025
Outsourcing collaboration analysis of multiparty privacy data using the improved Yannakakis.
J. Supercomput., February, 2025
Deep Reinforcement Learning-Based Bidding Strategies for Prosumers Trading in Double Auction-Based Transactive Energy Market.
CoRR, February, 2025
Position: Emergent Machina Sapiens Urge Rethinking Multi-Agent Paradigms.
CoRR, February, 2025
A malware visualization method based on transition probability matrix suitable for imbalanced family classification.
Appl. Intell., February, 2025
Hunyuan3D 2.0: Scaling Diffusion Models for High Resolution Textured 3D Assets Generation.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, January, 2025
BoostStep: Boosting mathematical capability of Large Language Models via improved single-step reasoning.
CoRR, January, 2025
Multi-scale target edge uncertainty-aware consistent segmentation network.
Comput. Electr. Eng., 2025
Imbalanced domain adaptation Net for multi-class Electrocardiography signals classification.
Biomed. Signal Process. Control., 2025
Interpretability adversarial example detection through multi-interpretation aggregation comparison.
Appl. Soft Comput., 2025
AP Selection in Uplink Cell-Free Massive MIMO: An Unsupervised Heterogeneous GNN Approach.
Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), 2025
2024
Hybrid-Task Meta-Learning: A GNN Approach for Scalable and Transferable Bandwidth Allocation.
IEEE Trans. Wirel. Commun., December, 2024
Revisiting the potential value of vital signs in the real-time prediction of mortality risk in intensive care unit patients.
J. Big Data, December, 2024
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.
Clust. Comput., November, 2024
Asymmetric multi-branch GCN for skeleton-based sign language recognition.
Multim. Tools Appl., September, 2024
Rgb-t semantic segmentation based on cross-operational fusion attention in autonomous driving scenario.
Evol. Syst., August, 2024
Tripartite evolutionary game in the process of network attack and defense.
Telecommun. Syst., June, 2024
A psychological evaluation method incorporating noisy label correction mechanism.
Soft Comput., June, 2024
Digital Forensics for Automotive Intelligent Networked Terminal Devices.
IEEE Trans. Veh. Technol., April, 2024
Graph Neural Networks for Quality of Service Improvement in Interference-Limited Ultra-Reliable and Low-Latency Communications.
IEEE Trans. Veh. Technol., March, 2024
Multi-View High Precise 3D Human Body Reconstruction Method for Virtual Fitting.
Int. J. Pattern Recognit. Artif. Intell., January, 2024
Lightweight hybrid model based on MobileNet-v2 and Vision Transformer for human-robot interaction.
Eng. Appl. Artif. Intell., January, 2024
A Two-Stage Personalized Virtual Try-On Framework With Shape Control and Texture Guidance.
IEEE Trans. Multim., 2024
A Tightly Coupled Method for Indoor Vehicle Navigation Based on Smartphone IMU and BLE.
IEEE Trans. Instrum. Meas., 2024
A Mean Field to Capture Asynchronous Irregular Dynamics of Conductance-Based Networks of Adaptive Quadratic Integrate-and-Fire Neuron Models.
Neural Comput., 2024
Hyperspectral Image Classification Based on Atrous Convolution Channel Attention-Aided Dense Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2024
HunyuanVideo: A Systematic Framework For Large Video Generative Models.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Scaling Mesh Generation via Compressive Tokenization.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Tencent Hunyuan3D-1.0: A Unified Framework for Text-to-3D and Image-to-3D Generation.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
IDGen: Item Discrimination Induced Prompt Generation for LLM Evaluation.
CoRR, 2024
Leveraging Machine Learning for Accurate IoT Device Identification in Dynamic Wireless Contexts.
CoRR, 2024
Hunyuan-DiT: A Powerful Multi-Resolution Diffusion Transformer with Fine-Grained Chinese Understanding.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity.
CoRR, 2024
A Multi-Faceted Evaluation Framework for Assessing Synthetic Data Generated by Large Language Models.
CoRR, 2024
Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks.
CoRR, 2024
Hybrid-Task Meta-Learning: A Graph Neural Network Approach for Scalable and Transferable Bandwidth Allocation.
CoRR, 2024
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy.
Comput. Secur., 2024
Condition-based maintenance optimization for multi-equipment batch production system based on stochastic demand.
Comput. Chem. Eng., 2024
Stern Attitude Adjustment Device of a Robotic Sea Lion: Design and Experimentation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2024
Design and Experimentation of a Robotic Sea Lion with Wings-Head-Tail Coordinated Drive.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2024
Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts.
Proceedings of the Provable and Practical Security, 2024
2023
RGB-D indoor semantic segmentation network based on wavelet transform.
Evol. Syst., December, 2023
Global Trends and Future Directions in Agricultural Remote Sensing for Wheat Scab Detection: Insights from a Bibliometric Analysis.
Remote. Sens., July, 2023
Cross-supervision-based equilibrated fusion mechanism of local and global attention for semantic segmentation.
Appl. Intell., May, 2023
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023
FCKDNet: A Feature Condensation Knowledge Distillation Network for Semantic Segmentation.
Entropy, January, 2023
Development of an FBG-Based Wearable Sensor for Simultaneous Respiration and Heartbeat Measurement.
IEEE Trans. Instrum. Meas., 2023
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant.
Neural Process. Lett., 2023
TencentLLMEval: A Hierarchical Evaluation of Real-World Capabilities for Human-Aligned LLMs.
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2023
VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
CoRR, 2023
Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts.
CoRR, 2023
Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain.
CoRR, 2023
A Secure and Cost-Efficient Blockchain Facilitated IoT Software Update Framework.
IEEE Access, 2023
AMICA: Alleviating Misinformation for Chinese Americans.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Graph Neural Network-Based Bandwidth Allocation for Secure Wireless Communications.
Proceedings of the IEEE International Conference on Communications, 2023
VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
Proceedings of the IEEE Global Communications Conference, 2023
A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Group-Oriented Multi-Signature supporting Monotonic Endorse Policies in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2023
iBCTrans: A Practical Blockchain-Based Framework for Cellular Vehicular-To-Everything Networks.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
Editorial: Special Issue "Edge and Fog Computing for Internet of Things Systems".
Sensors, 2022
Author Correction: Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
npj Digit. Medicine, 2022
Heterogeneous information network embedding for user behavior analysis on social media.
Neural Comput. Appl., 2022
A novel transfer learning for recognition of overlapping nano object.
Neural Comput. Appl., 2022
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022
Residential House Occupancy Detection: Trust-Based Scheme Using Economic and Privacy-Aware Sensors.
IEEE Internet Things J., 2022
Lightweight single image deraining algorithm incorporating visual saliency.
IET Image Process., 2022
Pedestrian Detection with Multi-View Convolution Fusion Algorithm.
Entropy, 2022
Interference-Limited Ultra-Reliable and Low-Latency Communications: Graph Neural Networks or Stochastic Geometry?
CoRR, 2022
Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network.
CoRR, 2022
Instant on-demand charging strategy with multiple chargers in wireless rechargeable sensor networks.
Ad Hoc Networks, 2022
Defending Against Co-Residence Attack in Energy-Efficient Cloud: An Optimization Based Real-Time Secure VM Allocation Strategy.
IEEE Access, 2022
Trust-Based Communities for Smart Grid Security and Privacy.
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022
PEMT-CoSim: A Co-Simulation Platform for Packetized Energy Management and Trading in Distributed Energy Systems.
Proceedings of the IEEE International Conference on Communications, 2022
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022
MentalNet: Heterogeneous Graph Representation for Early Depression Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022
Graph Neural Networks for Timely Updates of Short Packets in Interference-Limited Networks.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022
2021
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform.
IEEE Trans. Inf. Forensics Secur., 2021
A Framework for Managing Device Association and Offloading the Transport Layer's Security Overhead of WiFi Device to Access Points.
Sensors, 2021
A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices.
IEEE Internet Things J., 2021
The Impact of DoS Attacks onResource-constrained IoT Devices: A Study on the Mirai Attack.
CoRR, 2021
Heterogeneous Graph Network Embedding for Sentiment Analysis on Social Media.
Cogn. Comput., 2021
DIMNet: Dense implicit function network for 3D human body reconstruction.
Comput. Graph., 2021
Sales mode selection of fresh food supply chain based on blockchain technology under different channel competition.
Comput. Ind. Eng., 2021
A New Topology Control Algorithm in Software Defined Wireless Rechargeable Sensor Networks.
IEEE Access, 2021
An Efficient SDN Architecture for Smart Home Security Accelerated by FPGA.
Proceedings of the 27th IEEE International Symposium on Local and Metropolitan Area Networks, 2021
Understanding COVID-19 Public Sentiment Towards Public Health Policies Using Social Media Data.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021
Is Social Diversity Related to Misinformation Resistance? An Empirical Study on Social Communities.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021
Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic Classification.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Analysis of blizzard process based on big data numerical simulation.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021
2020
Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
npj Digit. Medicine, 2020
Stock closing price prediction based on sentiment analysis and LSTM.
Neural Comput. Appl., 2020
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers.
Neural Comput. Appl., 2020
基于卷积神经网络的压缩感知重构算法优化 (Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network).
计算机科学, 2020
Output feedback control for semi-Markovian jump systems with time-varying delay.
J. Control. Decis., 2020
Gene Expression Profiling of Type 2 Diabetes Mellitus by Bioinformatics Analysis.
Comput. Math. Methods Medicine, 2020
A Real-Time and Adaptive-Learning Malware Detection Method Based on API-Pair Graph.
IEEE Access, 2020
Adaptive Lead Weighted ResNet Trained With Different Duration Signals for Classifying 12-lead ECGs.
Proceedings of the Computing in Cardiology, 2020
SMART: Emerging Activity Recognition with Limited Data for Multi-modal Wearable Sensing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine.
IEEE Trans. Inf. Forensics Secur., 2019
Influence of Managers' Subjective Judgments on Project Abandonment Decision Making.
Int. J. Inf. Technol. Decis. Mak., 2019
Compressed Sensing Image Reconstruction Based on Convolutional Neural Network.
Int. J. Comput. Intell. Syst., 2019
GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019
Thinkey: A Scalable Blockchain Architecture.
CoRR, 2019
Multi-Robot Cooperative Task Allocation With Definite Path-Conflict-Free Handling.
IEEE Access, 2019
An Extensive Game-Based Resource Allocation for Securing D2D Underlay Communications.
IEEE Access, 2019
Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT.
Proceedings of the Network and System Security - 13th International Conference, 2019
A Comprehensive Empirical Analysis of TLS Handshake and Record Layer on IoT Platforms.
Proceedings of the 22nd International ACM Conference on Modeling, 2019
Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device.
Proceedings of the MobiQuitous 2019, 2019
A Linear Model for YUV 4: 2: 0 Chroma Intra Prediction.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019
LSTM for Mobility Based Content Popularity Prediction in Wireless Caching Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Multi-Tenant Base Stations: Algorithms and a Prototype.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Modeling the Views of WeChat Articles by Branching Processes.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
Edge Mining on IoT Devices Using Anomaly Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
2018
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multim., 2018
A security evaluation framework for cloud security auditing.
J. Supercomput., 2018
Robust mode-dependent control for discrete-time singular Markovian jump systems with time-varying delay.
J. Control. Decis., 2018
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems.
Neurocomputing, 2018
Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018
Criteria to evaluate the fidelity of image enhancement by MSRCR.
IET Image Process., 2018
Minimizing Required User Effort for Cold-Start Recommendation by Identifying the Most Important Latent Factors.
IEEE Access, 2018
FriPEL: Friendship Privacy Educational Labware.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Energy Modeling of Cluster System.
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018
Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications.
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018
Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018
Single Frame Super Resolution with Convolutional Neural Network for Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence Attack.
Proceedings of the 2018 International Conference on Computing, 2018
Analyzing the Resource Utilization of AES Encryption on IoT Devices.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property.
IEEE Trans. Inf. Forensics Secur., 2017
Structural and Functional Abnormalities in Children with Attention-Deficit/Hyperactivity Disorder: A Focus on Subgenual Anterior Cingulate Cortex.
Brain Connect., 2017
A novel iterative online rating attack based on market self-exciting property.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Selecting influential and trustworthy neighbors for collaborative filtering recommender systems.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Personalized preference elicitation in recommender systems using matrix factorization.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017
2016
A Web Application For Studying Collusion Attacks Through Friend Search Engine.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Message from the HCSC Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
An Advanced Collusion Attack against User Friendship Privacy in OSNs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015
Online Product Rating Manipulation and Market Performance.
Computer, 2015
2014
Securing Digital Reputation in Online Social Media [Applications Corner].
IEEE Signal Process. Mag., 2014
A centralized trust model approach for cloud computing.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014
2013
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis.
IEEE Trans. Inf. Forensics Secur., 2013
Can reputation manipulation boost app sales in Android market?
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
On Design and Implementation of Neural-Machine Interface for Artificial Legs.
IEEE Trans. Ind. Informatics, 2012
Security of Online Reputation Systems: The evolution of attacks and defenses.
IEEE Signal Process. Mag., 2012
Case learning for CBR-based collision avoidance systems.
Appl. Intell., 2012
2011
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Trust sensor interface for improving reliability of EMG-based user intent recognition.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
2010
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Research on the mobile robot's odor source localization by biomimetics.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
Integrating neuromuscular and cyber systems for neural control of artificial legs.
Proceedings of the ACM/IEEE 1st International Conference on Cyber-Physical Systems, 2010
2009
Case Learning in CBR-Based Agent Systems for Ship Collision Avoidance.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009
2008
Application of the synergetic algorithm on the classification of lymph tissue cells.
Comput. Biol. Medicine, 2008
Multi-agent Planning for Ship Collision Avoidance.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008
A CBR-Based Approach for Ship Collision Avoidance.
Proceedings of the New Frontiers in Applied Artificial Intelligence, 2008
Detection of collusion behaviors in online reputation systems.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008
2007
P. Renard, H. Demougeot-Renard, R. Froidevaux, Editors, , Geostatistics for Environmental Applications, Proceedings of the Fifth European Conference on Geostatistics for Environmental Applications (2006) Springer, New York (480pp., US$169, Hardbound, ISBN: 3-540-26533-3).
Comput. Geosci., 2007
A Multiagent-Based Simulation System for Ship Collision Avoidance.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
2006
Using the Snesim program for multiple-point statistical simulation.
Comput. Geosci., 2006
2005
Scalable supernode selection in peer-to-peer overlay networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005
2004
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004