Huadong Dai

According to our database1, Huadong Dai authored at least 34 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Behaviour Tree Verification via a Translation to BIP.
Proceedings of the Formal Aspects of Component Software - 20th International Conference, 2024

LLM-Based Processor Verification: A Case Study for Neuronnorphic Processor.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

2023
Joint Optimization of Trajectory and Image Transmission in Multi-UAV Semantic Communication Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

KURL: A Knowledge-Guided Reinforcement Learning Model for Active Object Tracking.
Proceedings of the Asian Conference on Machine Learning, 2023

2022
Efficient maintenance for maximal bicliques in bipartite graph streams.
World Wide Web, 2022

2021
micROS.BT: An Event-Driven Behavior Tree Framework for Swarm Robots.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
An Actor-based Programming Framework for Swarm Robotic Systems.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

Attentional Fused Temporal Transformation Network for Video Action Recognition.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Rethinking Segmentation Guidance for Weakly Supervised Object Detection.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Efficient Training Techniques for Multi-Agent Reinforcement Learning in Combat Tasks.
IEEE Access, 2019

Person Re-Identification Based on Multi-Parts of Local Feature Network.
IEEE Access, 2019

Multiagent Reinforcement Learning for Swarm Confrontation Environments.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

2018
A research on metric learning in computer vision and pattern recognition.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Loop Detection and Correction of 3D Laser-Based SLAM with Visual Information.
Proceedings of the 31st International Conference on Computer Animation and Social Agents, 2018

Enhanced Visual Loop Closing for Laser-Based SLAM.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

2017
Policy-Customized: A New Abstraction for Building Security as a Service.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Estimating Power Consumption of Servers Using Gaussian Mixture Model.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Research on Linux Trusted Boot Method Based on Reverse Integrity Verification.
Sci. Program., 2016

Developing a trustworthy computing framework for clouds.
Int. J. Embed. Syst., 2016

Shared-Memory Optimizations for Inter-Virtual-Machine Communication.
ACM Comput. Surv., 2016

Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing.
Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016

2015
Complementary Synthesis for Encoder with Flow Control Mechanism.
ACM Trans. Design Autom. Electr. Syst., 2015

An implementation architecture design of LU decomposition in resource-limited system.
Proceedings of the IEEE International Symposium on Systems Engineering, 2015

2014
Cloud-Oriented SAT Solver Based on Obfuscating CNF Formula.
Proceedings of the Web Technologies and Applications, 2014

2013
Scratchpad memory allocation for arrays in permutation graphs.
Sci. China Inf. Sci., 2013

Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
A Lightweight Type Enforcement Access Control Approach with Role Based Authorization.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A fast and transparent communication protocol for co-resident virtual machines.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2010
Enhanced Non-Blocking Buffer: A High Performance Non-Blocking Message Communication Mechanism.
Proceedings of the GCC 2010, 2010

SPOTOS: A Safe Point Detector for Online Patching Commodity OS.
Proceedings of the GCC 2010, 2010

2003
A General Metric of Load Balancing in delta-Range.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

Data Space Fusion Based Approach for Effective Alignment of Computation and Data.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

A Distributed Parallel Resampling Algorithm for Large Images.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...