Dan Meng

Orcid: 0009-0002-9868-5353

According to our database1, Dan Meng authored at least 346 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mapping the fine spatial distribution of global offshore surface seawater mariculture using remote sensing big data.
Int. J. Digit. Earth, December, 2024

EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024

A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks.
ACM Trans. Embed. Comput. Syst., September, 2024

Spatial Distribution and Differentiation Analysis of Coastal Aquaculture in China Based on Remote Sensing Monitoring.
Remote. Sens., May, 2024

Research on image segmentation method based on improved Snake model.
Multim. Tools Appl., February, 2024

An improved method to estimate the similarity between <i>LR</i>-type fuzzy numbers.
Fuzzy Sets Syst., January, 2024

Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Research on the Application of Node Importance Assessment based on HITs Algorithm in Power Grid Planning.
Scalable Comput. Pract. Exp., 2024

Resource-aware Montgomery modular multiplication optimization for digital signal processing.
J. Syst. Archit., 2024

Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs.
CoRR, 2024

The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
CoRR, 2024

LoopAnimate: Loopable Salient Object Animation.
CoRR, 2024

Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption.
CoRR, 2024

Post-Training Attribute Unlearning in Recommender Systems.
CoRR, 2024

A Comprehensive Survey on Process-Oriented Automatic Text Summarization with Exploration of LLM-Based Methods.
CoRR, 2024

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs.
CoRR, 2024

Trinity: A General Purpose FHE Accelerator.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2024

Search Robust and Adaptable Architecture.
Proceedings of the IEEE International Conference on Acoustics, 2024

SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

FakeGuard: Novel Architecture Support for Deepfake Detection Networks.
Proceedings of the Euro-Par 2024: Parallel Processing, 2024

An Evaluation Mechanism of LLM-based Agents on Manipulating APIs.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

KSM: Killer of Spectre and Meltdown Attacks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

A Module Level Security Evaluation Method Based on Model Checking.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

AGNE: Attentional Graph Convolutional Network Embedding for Knowledge Concept Recommendation in MOOCs.
Proceedings of the Web Information Systems and Applications, 2024

2023
Segment Anything Model (SAM) Assisted Remote Sensing Supervision for Mariculture - Using Liaoning Province, China as an Example.
Remote. Sens., December, 2023

A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors.
IEEE Trans. Computers, November, 2023

Comprehensive Assessment of Vulnerability to Storm Surges in Coastal China: Towards a Prefecture-Level Cities Perspective.
Remote. Sens., October, 2023

Scalable Kernel $k$-Means With Randomized Sketching: From Theory to Algorithm.
IEEE Trans. Knowl. Data Eng., September, 2023

A Comparison of Six Forest Mapping Products in Southeast Asia, Aided by Field Validation Data.
Remote. Sens., September, 2023

HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption.
IEEE Trans. Parallel Distributed Syst., April, 2023

Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

Automatic segmentation of ultrasound images using SegNet and local Nakagami distribution fitting model.
Biomed. Signal Process. Control., March, 2023

Hydrangea-Like In<sub>2</sub>O<sub>3</sub>@In<sub>2</sub>S<sub>3</sub> n-n Heterostructures for High-Efficiency TMA Measurement.
IEEE Trans. Instrum. Meas., 2023

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

AttMOT: Improving Multiple-Object Tracking by Introducing Auxiliary Pedestrian Attributes.
CoRR, 2023

fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

Representation-enhanced APT Detection Using Contrastive Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

UltraRE: Enhancing RecEraser for Recommendation Unlearning via Error Decomposition.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Differentially Private Sparse Mapping for Privacy-Preserving Cross Domain Recommendation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Making Users Indistinguishable: Attribute-wise Unlearning in Recommender Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Deep Frame-Point Sequence Consistent Network for Handwriting Trajectory Recovery.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

FedLRS: A Communication-Efficient Federated Learning Framework With Low-Rank and Sparse Decomposition.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs.
Proceedings of the 41st IEEE International Conference on Computer Design, 2023

Backdoor Attack Against Automatic Speaker Verification Models in Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

FedPerturb: Covert Poisoning Attack on Federated Learning via Partial Perturbation.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

The efficacy and safety of acupuncture assisted anesthesia (AAA) for postoperative pain of thoracoscopy: A systematic review and meta-analysis of randomized controlled trials.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Improving Adversarial Robustness via Channel and Depth Compatibility.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

DINE: Dynamic Information Network Embedding for Social Recommendation.
Proceedings of the Web Information Systems and Applications, 2023

GENE: Global Enhanced Graph Neural Network Embedding for Session-Based Recommendation.
Proceedings of the Web Information Systems and Applications, 2023

2022
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks.
Microprocess. Microsystems, March, 2022

Long-Term Impacts of COVID-19 Lockdown on the NO2 Concentrations and Urban Thermal Environment: Evidence from the Five Largest Urban Agglomerations in China.
Remote. Sens., 2022

Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China.
Remote. Sens., 2022

A Field-Data-Aided Comparison of Three 10 m Land Cover Products in Southeast Asia.
Remote. Sens., 2022

CPP: A lightweight memory page management extension to prevent code pointer leakage.
J. Syst. Archit., 2022

Three-way multi-granularity learning towards open topic classification.
Inf. Sci., 2022

Fermatean Fuzzy Schweizer-Sklar Operators and BWM-Entropy-Based Combined Compromise Solution Approach: An Application to Green Supplier Selection.
Entropy, 2022

Mapping China's offshore mariculture based on dense time-series optical and radar data.
Int. J. Digit. Earth, 2022

Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
Cybersecur., 2022

Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations.
CoRR, 2022

When Adversarial Example Attacks Meet Vertical Federated Learning.
Proceedings of the IEEE Smartworld, 2022

t-PSI: Efficient Multi-party Private Set Intersection with Threshold.
Proceedings of the IEEE Smartworld, 2022

Deepro: Provenance-based APT Campaigns Detection via GNN.
Proceedings of the IEEE International Conference on Trust, 2022

TACC: a secure accelerator enclave for AI workloads.
Proceedings of the SYSTOR '22: The 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13, 2022

DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022

Randomized Sketches for Clustering: Fast and Optimal Kernel $k$-Means.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining.
Proceedings of the IEEE Military Communications Conference, 2022

In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

Analysis of DRAM Vulnerability Using Computation Tree Logic.
Proceedings of the IEEE International Conference on Communications, 2022

An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

A Survey of UAV Clustering Algorithm.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

A Survey of Coverage Issues in UAV networks.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

HyBP: Hybrid Isolation-Randomization Secure Branch Predictor.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Conditional address propagation: an efficient defense mechanism against transient execution attacks.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

SAME: Sampling Attack in Multiplex Network Embedding.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

Distributed Randomized Sketching Kernel Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Temporal Knowledge Graph Embedding for Link Prediction.
Proceedings of the Web Information Systems and Applications, 2022

Coreference Resolution with Syntax and Semantics.
Proceedings of the Web Information Systems and Applications, 2022

2021
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection.
IEEE Trans. Very Large Scale Integr. Syst., 2021

Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks.
IEEE Trans. Computers, 2021

Variations in the Effects of Landscape Patterns on the Urban Thermal Environment during Rapid Urbanization (1990-2020) in Megacities.
Remote. Sens., 2021

Spatiotemporal Patterns of Urbanization in the Three Most Developed Urban Agglomerations in China Based on Continuous Nighttime Light Data (2000-2018).
Remote. Sens., 2021

Monitoring Coastline Changes of the Malay Islands Based on Google Earth Engine and Dense Time-Series Remote Sensing Images.
Remote. Sens., 2021

A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor.
J. Comput. Sci. Technol., 2021

DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
CoRR, 2021

Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Binary Neural Network Hashing for Image Retrieval.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

FCEP: A Fast Concolic Execution for Reaching Software Patches.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
Proceedings of the Security and Privacy in Communication Networks, 2021

Towards Heap-Based Memory Corruption Discovery.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

Energy-saving CNN with Clustering Channel Pruning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Fast CNN Inference by Adaptive Sparse Matrix Decomposition.
Proceedings of the International Joint Conference on Neural Networks, 2021

Automatic CNN Compression Based on Hyper-parameter Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Distributed Nyström Kernel Learning with Communications.
Proceedings of the 38th International Conference on Machine Learning, 2021

What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Towards Open World Traffic Classification.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

A Lightweight Isolation Mechanism for Secure Branch Predictors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

ShuffleFL: gradient-preserving federated learning using trusted execution environment.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

2020
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2020

Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory.
IEEE Trans. Neural Networks Learn. Syst., 2020

Efficient Return Address Verification Based on Dislocated Stack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

Distance measures on intuitionistic fuzzy sets based on intuitionistic fuzzy dissimilarity functions.
Soft Comput., 2020

Knowledge Federation: Hierarchy and Unification.
CoRR, 2020

An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Program Slice based Vulnerable Code Clone Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MLTracer: Malicious Logins Detection System via Graph Neural Network.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Malware Detection Based on Term Frequency Analysis of GPRs Features.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A novel network traffic classification approach via discriminative feature learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Deep Unsupervised Hybrid-similarity Hadamard Hashing.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Adaptive Relation Discovery from Focusing Seeds on Large Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Knowledge Federation: A Unified and Hierarchical Privacy-Preserving AI Framework.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

FedMONN: Meta Operation Neural Network for Secure Federated Aggregation.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Zipper Stack: Shadow Stacks Without Shadow.
Proceedings of the Computer Security - ESORICS 2020, 2020

SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

RCecker: a lightweight rule-based mechanism for backward control-flow integrity.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020

DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

Analyzing The Security of The Cache Side Channel Defences With Attack Graphs.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Divide-and-Conquer Learning with Nyström: Optimal Rate and Algorithm.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks.
ACM Trans. Archit. Code Optim., 2019

Some notes on optimal fuzzy reasoning methods.
Inf. Sci., 2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation.
IEEE Access, 2019

Building Trust in Container Environment.
Proceedings of the 18th IEEE International Conference On Trust, 2019

DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

MMNR: A Network Representation Framework Based on Multi-View Motif Fusion.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Research on Method of Venture Capital Guide Fund Selects Sub-fund under Hybrid Multi-attribute Group Decision-making.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features.
Proceedings of the International Joint Conference on Neural Networks, 2019

Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Prototype-Based Malware Traffic Classification with Novelty Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Template-Instance Loss for Offline Handwritten Chinese Character Recognition.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

A Deep Malware Detection Method Based on General-Purpose Register Features.
Proceedings of the Computational Science - ICCS 2019, 2019

Asymmetric Deep Cross-modal Hashing.
Proceedings of the Computational Science - ICCS 2019, 2019

Effective Self Attention Modeling for Aspect Based Sentiment Analysis.
Proceedings of the Computational Science - ICCS 2019, 2019

Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019

Ranking and Sampling in Open-Domain Question Answering.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

CacheGuard: a security-enhanced directory architecture against continuous attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

NPUFort: a secure architecture of DNN accelerator against model inversion attack.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fast and Multilevel Semantic-Preserving Discrete Hashing.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

Community Focusing: Yet Another Query-Dependent Community Detection.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Venice: An Effective Resource Sharing Architecture for Data Center Servers.
ACM Trans. Comput. Syst., 2018

An information-aware visualization for privacy-preserving accelerometer data sharing.
Hum. centric Comput. Inf. Sci., 2018

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters.
Proceedings of the 17th IEEE International Conference On Trust, 2018

TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Efficient Algorithms of Parallel Skyline Join over Data Streams.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

Stateful Forward-Edge CFI Enforcement with Intel MPX.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018

Learning Sentiment-Specific Word Embedding via Global Sentiment Representation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
A personal visual analytics on smartphone usage data.
J. Vis. Lang. Comput., 2017

Retrieving Objects by Partitioning.
IEEE Trans. Big Data, 2017

On the characterizations of fuzzy XNOR connectives.
J. Intell. Fuzzy Syst., 2017

Three constructive methods for the definition of interval-valued fuzzy equivalencies.
Fuzzy Sets Syst., 2017

On the T<sub>L</sub>-transitivity of fuzzy similarity measures.
Fuzzy Sets Syst., 2017

Liver Fibrosis Classification Based on Transfer Learning and FCNet for Ultrasound Images.
IEEE Access, 2017

HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

FPGA-Accelerated for Constrained High Dispersal Network.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

An Information-Aware Privacy-Preserving Accelerometer Data Sharing.
Proceedings of the Data Science, 2017

2016
High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation.
IEEE Trans. Cybern., 2016

An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification.
IEEE ACM Trans. Audio Speech Lang. Process., 2016

Robustness of fuzzy connectives and fuzzy reasoning with respect to general divergence measures.
Fuzzy Sets Syst., 2016

Properties of Raha's similarity-based approximate reasoning method.
Fuzzy Sets Syst., 2016

Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Delta-Generalization: High Accuracy Data Release for Privacy Preserving.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Drought assessment in Beijing-Tianjin-Hebei region in China in recent ten years.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Skyline Join Query Processing over Multiple Relations.
Proceedings of the Database Systems for Advanced Applications, 2016

Automatic fall detection of human in video using combination of features.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Automated human physical function measurement using constrained high dispersal network with SVM-linear.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Facial expression recognition based on LLENet.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

A deep tongue image features analysis model for medical application.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Quantifying the Effect of Sentiment on Topic Evolution in Chinese Microblog.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

A visual analytics approach for exploring individual behaviors in smartphone usage data.
Proceedings of the 2016 IEEE Pacific Visualization Symposium, 2016

2015
An approach of fast data manipulation in HDFS with supplementary mechanisms.
J. Supercomput., 2015

SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation.
IEEE Trans. Image Process., 2015

A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization.
IEEE Trans. Cybern., 2015

An empirical study of morphing on behavior-based network traffic classification.
Secur. Commun. Networks, 2015

Similarity measures of interval-valued fuzzy sets.
J. Intell. Fuzzy Syst., 2015

A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Spectral Clustering for Large-Scale Social Networks via a Pre-Coarsening Sampling based NystrÖm Method.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

A virtual shared metadata storage for HDFS.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Lasso Screening for Object Categories Recognition Using Multi-directional Context Features.
Proceedings of the 10th International Conference on Intelligent Systems and Knowledge Engineering, 2015

MAMS: A Highly Reliable Policy for Metadata Service.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Skyline Query on Anti-correlated Distributions: From the Perspective of Spatial Index.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Lotus: A framework for query optimization based on distributed cache.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

An evaluation and analysis of graph processing frameworks on five key issues.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

A Supervised Parameter Estimation Method of LDA.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

Dynamic adaptive learning algorithm based on two-fuzzy neural-networks.
Neurocomputing, 2014

Online Anomaly Detection by Improved Grammar Compression of Log Sequences.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Continuous similarity join on data streams.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Leveraging Deletion Neighborhoods and Trie for Efficient String Similarity Search and Join.
Proceedings of the Information Retrieval Technology, 2014

2013
Highly reliable message-passing mechanism for cluster file system.
Int. J. Parallel Emergent Distributed Syst., 2013

Formal concept analysis based on the topology for attributes of a formal context.
Inf. Sci., 2013

On weighted unbalanced linguistic aggregation operators in group decision making.
Inf. Sci., 2013

An algorithm for solving optimization problems with fuzzy relational inequality constraints.
Inf. Sci., 2013

Combination of interval set and soft set.
Int. J. Comput. Intell. Syst., 2013

Syntax theory of finite lattice-valued propositional logic.
Sci. China Inf. Sci., 2013

The dynamic change of the urban thermal environment landscape patterns in Beijing from 2003 to 2011.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Influence of urbanization process on urban thermal environment in Beijing.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Analysis of Beijing's urban heat-island under the influence of extrme heat based on HJ-1B data.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

An Adaptive Resource Sharing Platform for Internet Data Center.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

OAMS: A Highly Reliable Metadata Service for Big Data Storage.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Zput: A speedy data uploading approach for the Hadoop Distributed File System.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
Extracting linguistic rules from data sets using fuzzy logic and genetic algorithms.
Neurocomputing, 2012

Triangular norm based graded convex fuzzy sets.
Fuzzy Sets Syst., 2012

A Hardware-Based TCP Stream State Tracking and Reassembly Solution for 10G Backbone Traffic.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

TDWS: A Job Scheduling Algorithm Based on MapReduce.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

On Accuracy of Early Traffic Classification.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

A data locality optimization algorithm for large-scale data processing in Hadoop.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Trends in temperature and extreme temperature over the Beijing-Tianjin-Hebei Metropolitan Region During 1957-2009.
Proceedings of the 20th International Conference on Geoinformatics, 2012

Clover: A Distributed File System of Expandable Metadata Service Derived from HDFS.
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012

An empirical study of morphing on network traffic classification.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Automatic performance debugging of SPMD-style parallel programs.
J. Parallel Distributed Comput., 2011

Soft rough fuzzy sets and soft fuzzy rough sets.
Comput. Math. Appl., 2011

A Runtime Fault Detection Method for HPC Cluster.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

A Load-Aware Data Placement Policy on Cluster File System.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

HR-NET: A Highly Reliable Message-Passing Mechanism for Cluster File System.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Implications of Recovery Schemes for Virtualization Platform.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

Towards quantitative analysis of data intensive computing: a case study of Hadoop.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

2010
Transformer: A New Paradigm for Building Data-Parallel Programming Models.
IEEE Micro, 2010

Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
CoRR, 2010

Scalable Group Management in Large-Scale Virtualized Clusters
CoRR, 2010

LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems
CoRR, 2010

Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2010

A Case Study for SOA System Rejuvenation.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Request Path Driven Model for Performance Fault Diagnoses.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Failure Rules Based Node Resource Provision Policy for Cloud Computing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Impervious surface coverage and their impact on other components of the urban ecosystem in Beijing.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Coordinated Selective Rejuvenation for Distributed Services.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

Virtualizing Modern High-Speed Interconnection Networks with Performance and Scalability.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

Replication-Based Highly Available Metadata Management for Cluster File Systems.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

2009
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms
CoRR, 2009

Multidimensional Analysis of System Logs in Large-scale Cluster Systems
CoRR, 2009

Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2009

Evaluating the Effect of Huge Page on Large Scale Applications.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

HMF: High-available Message-passing Framework for Cluster File System.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Early Experiences with Write-Write Design of NFS over RDMA.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Solo: A Lightweight Virtual Machine.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Study of Thermal Environment based on Remote Sensing in Beijing-capital Zone.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Single-particle 3d reconstruction from cryo-electron microscopy images on GPU.
Proceedings of the 23rd international conference on Supercomputing, 2009

Multiple Virtual Lanes-aware MPI collective communication in multi-core clusters.
Proceedings of the 16th International Conference on High Performance Computing, 2009

Precise request tracing and performance debugging for multi-tier services of black boxes.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

DCR: A fully transparent checkpoint/restart framework for distributed systems.
Proceedings of the 2009 IEEE International Conference on Cluster Computing, August 31, 2009

A Highly Efficient Inter-domain Communication Channel.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Credit Rating Method with Heterogeneous Information.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

A new associative classifier for text categorization.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

HPPNET: A novel network for HPC and its implication for communication software.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Neural Network Model to Predict Initial Return of Chinese SMEs Stock Market Initial Public Offerings.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

PhoenixAccount: A Grid Accounting System for the Distributed Resource Sharing.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

2007
A Novel Technique for Noise Reduction in InSAR Images.
IEEE Geosci. Remote. Sens. Lett., 2007

Dawning4000A high performance computer.
Frontiers Comput. Sci. China, 2007

The design methodology of Phoenix cluster system software stack.
Proceedings of the CHINA HPC 2007, 2007

Theory of commercial application management system and its implementation - AMPS.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

Research on dynamic evolvement of desertification in beijing and its neighboring areas by remote sensing.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

A Strategy-Proof Combinatorial Auction-Based Grid Resource Allocation System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

A layered design methodology of cluster system stack.
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007

2006
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

An Interactive Intelligent Search Engine Model Research Based on User Information Preference.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Easy and reliable cluster management: the self-management experience of Fire Phoenix.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

A proactive fault-detection mechanism in large-scale cluster systems.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Evaluation of the Device Driver Availability in Dawning4000A.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

An Integrated Adaptive Management System for Cluster-based Web Services.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

PhoenixG: A Unified Management Framework for Industrial Information Grid.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

A Failure-Aware Scheduling Strategy in Large-Scale Cluster System.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
A New Way to High Performance NFS for Clusters.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Destructive Transaction: Human-Oriented Cluster System Management Mechanism.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Case Retrieval Model Based on Factor-Structure Connection and lambda-Similarity in Fuzzy Case-Based Reasoning.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Experience Of OS Optimization For Linpack On Dawning4000A.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

An Efficient Metadata Distribution Policy for Cluster File Systems.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

Adaptive Management of a Utility Computing.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

Spare Instance: an Adaptive Mechanism for Managing Cluster Applications.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
SuperNBD: An Efficient Network Storage Software for Cluster.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

2003
Graded consequence relations of lattice-valued propositional logic LP(X).
Proceedings of the IEEE International Conference on Systems, 2003

Multilayered fuzzy clustering method based on distance and density.
Proceedings of the IEEE International Conference on Systems, 2003

Resolution based on six lattice-valued proposition logic LP<sub>6</sub>(X).
Proceedings of the IEEE International Conference on Systems, 2003

Resolution principle based on finite chain lattice-valued proposition logic FCLP(X).
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Design and Performance of the Dawning Cluster File System.
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003

Optimized Implementation of Extendible Hashing to Support Large File System Directory.
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003

2002
A new fuzzy clustering method based on distance and density.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002

alpha-Resolution Principle Based On An Intermediate Element Lattice-Valued Propositional Logic.
Proceedings of the 6th Joint Conference on Information Science, 2002

Semi-User-Level Communication Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

AppManager: A Powerful Service-Based Application Management System for Clusters.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

2001
BCL-3: A High Performance Basic Communication Protocol for Commodity Superserver DAWNING-3000.
J. Comput. Sci. Technol., 2001

Cluster and Grid Superservers: The Dawning Experiences in China.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001


  Loading...