Yijing Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Yijing Wang 001 (Tianjin University, Tianjin Key Laboratory of Intelligent Unmanned Swarm Technology and System, Tianjin, China)
- Yijing Wang 002 (Southeast University, Department of Architecture, Nanjing, China)
- Yijing Wang 003 (Central South University, School of Life Sciences, Changsha, China)
- Yijing Wang 004 (Xidian University, Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education, Xi'an, China)
- Yijing Wang 005 (Zhengzhou Foreign Language School, China)
Bibliography
2024
Optimizing NVMe Storage for Large-Scale Deployment: Key Technologies and Strategies in Alibaba Cloud.
IEEE Micro, 2024
Proceedings of the Computational Science - ICCS 2024, 2024
LightPool: A NVMe-oF-based High-performance and Lightweight Storage Pool Architecture for Cloud-Native Distributed Database.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
Hit the Nail on the Head: Parameter-Efficient Multi-task Tuning via Human Language Intervention.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
2023
Sensors, September, 2023
Computational Study of the Fe(II) and α-Ketoglutarate-Dependent Aryloxyalkanoate Dioxygenase (AAD-1) in the Degradation of the Herbicide 2,4-Dichlorophenoxyacetic Acid.
J. Chem. Inf. Model., May, 2023
Circuits Syst. Signal Process., May, 2023
Beyond top-k: knowledge reasoning for multi-answer temporal questions based on revalidation framework.
PeerJ Comput. Sci., 2023
High-performance and Scalable Software-based NVMe Virtualization Mechanism with I/O Queues Passthrough.
CoRR, 2023
BM-Store: A Transparent and High-performance Local Storage Architecture for Bare-metal Clouds Enabling Large-scale Deployment.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023
HyQ: Hybrid I/O Queue Architecture for NVMe over Fabrics to Enable High- Performance Hardware Offloading.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
2022
Polarization, Angle, and Delay Estimation for Tri-Polarized Systems in Multipath Environments.
IEEE Trans. Wirel. Commun., 2022
Bicriteria streaming algorithms to balance gain and cost with cardinality constraint.
J. Comb. Optim., 2022
Mechanism of Sugar Ring Contraction and Closure Catalyzed by UDP-d-apiose/UDP-d-xylose Synthase (UAXS).
J. Chem. Inf. Model., 2022
TERQA: Question answering over knowledge graph considering precise dependencies of temporal information on vectors.
Displays, 2022
Proceedings of the Theory and Applications of Models of Computation, 2022
Maximizing Approximately Non-k-Submodular Monotone Set Function with Matroid Constraint.
Proceedings of the Theory and Applications of Models of Computation, 2022
Proceedings of the 13th Asian Control Conference, 2022
2021
Bicriteria algorithms to balance coverage and cost in team formation under online model.
Theor. Comput. Sci., 2021
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.
Secur. Commun. Networks, 2021
Establishment of a Key Hidden Danger Factor System for Electric Power Personal Casualty Accidents Based on Text Mining.
Inf., 2021
Improved few-shot learning method for transformer fault diagnosis based on approximation space and belief functions.
Expert Syst. Appl., 2021
Prediction on transaction amounts of China's CBEC with improved GM (1, 1) models based on the principle of new information priority.
Electron. Commer. Res., 2021
Asia Pac. J. Oper. Res., 2021
Analysis on the Transmission of International Oil Price to China's Price Index-Based on Granger Causality Network.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Space-Time-Polarization Channel Estimation With a Single Tripole in Multipath Environments.
Proceedings of the 21st International Conference on Communication Technology, 2021
On Maximizing the Difference Between an Approximately Submodular Function and a Linear Function Subject to a Matroid Constraint.
Proceedings of the Combinatorial Optimization and Applications, 2021
2020
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding.
Algorithms, 2020
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
A High-Efficiency and Comprehensive Dynamic Behavior Analysis System for Malware based on Hardware Virtualization.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
POLARDB Meets Computational Storage: Efficiently Support Analytical Workloads in Cloud-Native Relational Database.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020
Proceedings of the Algorithmic Aspects in Information and Management, 2020
2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
The dynamical relationship between capital market and macroeconomy: based on dynamic Bayesian network.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
Can stock markets lead the macroeconomic variables? Dynamic analysis based on TOP method.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
CrowDIY: How to Design and Adapt Collaborative Crowdsourcing Workflows Under Budget Constraints.
Proceedings of the Web Engineering - 19th International Conference, 2019
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019
Proceedings of the ICBBS 2019: 8th International Conference on Bioinformatics and Biomedical Science, 2019
2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018
2003
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the 7th European Control Conference, 2003
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003