Ti Zhou

Orcid: 0000-0003-2871-3785

According to our database1, Ti Zhou authored at least 21 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge Computing.
CoRR, 2024

Data-driven Software-based Power Estimation for Embedded Devices.
CoRR, 2024

2023
CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning.
J. Syst. Archit., September, 2023

A Novel Pipeline Corrosion Monitoring Method Based on Piezoelectric Active Sensing and CNN.
Sensors, January, 2023

Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing.
IEEE Internet Things J., 2023

2022
Deadline-Aware Deep-Recurrent-Q-Network Governor for Smart Energy Saving.
IEEE Trans. Netw. Sci. Eng., 2022

2021
Multi-scale visualization based on sketch interaction for massive surveillance video data.
Pers. Ubiquitous Comput., 2021

2020
A Formal Method for Safety Time Series Simulation of Aerospace.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Impact of Managerial Commitment on Risk Taking with Dynamic Fund Flows.
Manag. Sci., 2019

2018
Anomaly Detection of Target Dynamics Based on Clustering.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

2017
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks.
Secur. Commun. Networks, 2017

2016
Interactive Animation Editing Based on Sketch Interaction.
Proceedings of the Challenges and Opportunity with Big Data, 2016

2014
Estimation of evapotranspiration over heterogeneous surface based on HJ-1B satellite.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

2008
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Proceedings of the First International Conference on Foundations of Informatics, 2008

A Novel Derivation Framework For Definite Logic Program.
Proceedings of the First International Conference on Foundations of Informatics, 2008

Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007


  Loading...