Yong Qi

Orcid: 0000-0002-7682-5653

According to our database1, Yong Qi authored at least 235 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Secure Medical Information Storage and Sharing Method Based on Multiblockchain Architecture.
IEEE Trans. Comput. Soc. Syst., October, 2024

Enhancing innovation performance of SMEs through open innovation and absorptive capacity: the moderating effect of business model.
Technol. Anal. Strateg. Manag., October, 2024

Intellectual property protection, religious culture and dynamic capabilities of enterprises: evidence from Chinese listed companies.
Technol. Anal. Strateg. Manag., June, 2024

Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024

Relation-consistency graph convolutional network for image super-resolution.
Vis. Comput., February, 2024

Robust GEPSVM classifier: An efficient iterative optimization framework.
Inf. Sci., February, 2024

Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing.
ACM Trans. Embed. Comput. Syst., January, 2024

POMF: A Privacy-preserved On-chain Matching Framework.
Future Gener. Comput. Syst., January, 2024

Talent Flow in China's Intelligent Connected Vehicle Industry: Evidence From Online Resume Mining.
IEEE Trans. Engineering Management, 2024

Truth: A Blockchain-Aided Secure Reputation System With Genuine Feedbacks.
IEEE Trans. Engineering Management, 2024

An Intelligent Deep Learning Framework for Traffic Flow Imputation and Short-term Prediction Based on Dynamic Features.
Knowl. Based Syst., 2024

Ambidextrous knowledge accumulation, dynamic capability and manufacturing digital transformation in China.
J. Knowl. Manag., 2024

Lightweight verifiable blockchain top-k queries.
Future Gener. Comput. Syst., 2024

Forgetting Through Transforming: Enabling Federated Unlearning via Class-Aware Representation Transformation.
CoRR, 2024

Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations.
CoRR, 2024

Safety Control of Service Robots with LLMs and Embodied Knowledge Graphs.
CoRR, 2024

Saliency-Aware Automatic Buddhas Statue Recognition.
CoRR, 2024

Unveiling camouflaged and partially occluded colorectal polyps: Introducing CPSNet for accurate colon polyp segmentation.
Comput. Biol. Medicine, 2024

How and when domestic and international collaboration networks influence innovation performance of SMEs: evidence from China.
Bus. Process. Manag. J., 2024

Can high-speed railway promote enterprise ambidextrous innovation: a quasi-natural experiment in China.
Bus. Process. Manag. J., 2024

BCFNET: Boundary-Guided Semantic Cross Fusion for Polyp Segmentation.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
FedMCSA: Personalized federated learning via model components self-attention.
Neurocomputing, December, 2023

Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023

Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin.
IEEE J. Sel. Areas Commun., November, 2023

Robust generalized canonical correlation analysis.
Appl. Intell., September, 2023

Safety Warning! Decentralised and Automated Incentives for Disqualified Drivers Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., March, 2023

Understanding and defending against White-box membership inference attack in deep learning.
Knowl. Based Syst., 2023

Robot Learning in the Era of Foundation Models: A Survey.
CoRR, 2023

A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023

2022
Secure and Efficient Item Traceability for Cloud-Aided IIoT.
ACM Trans. Sens. Networks, November, 2022

Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services.
IEEE Trans. Mob. Comput., 2022

Robust Least Squares Twin Support Vector Regression With Adaptive FOA and PSO for Short-Term Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2022

Accelerating at the Edge: A Storage-Elastic Blockchain for Latency-Sensitive Vehicular Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2022

Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022

DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022

ConvLSTM Coupled Economics Indicators Quantitative Trading Decision Model.
Symmetry, 2022

Robust distance metric optimization driven GEPSVM classifier for pattern classification.
Pattern Recognit., 2022

Learning a robust classifier for short-term traffic state prediction.
Knowl. Based Syst., 2022

Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label.
Knowl. Based Syst., 2022

BMP: A blockchain assisted meme prediction method through exploring contextual factors from social networks.
Inf. Sci., 2022

Robust ensemble method for short-term traffic flow prediction.
Future Gener. Comput. Syst., 2022

A patent registration and trading system based on blockchain.
Expert Syst. Appl., 2022

Dual Class-Aware Contrastive Federated Semi-Supervised Learning.
CoRR, 2022

Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Common Traffic Object Recognition Method Based on Roadside LiDAR.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022

FLMJR: Improving Robustness of Federated Learning via Model Stability.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation.
IEEE Trans. Inf. Forensics Secur., 2021

Image super-resolution via channel attention and spatial graph convolutional network.
Pattern Recognit., 2021

Hierarchical accumulation network with grid attention for image super-resolution.
Knowl. Based Syst., 2021

Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding.
Knowl. Based Syst., 2021

An improved algorithm using weighted guided coefficient and union self-adaptive image enhancement for single image haze removal.
IET Image Process., 2021

Selection of the Optimal Number of Topics for LDA Topic Model - Taking Patent Policy Analysis as an Example.
Entropy, 2021

Research on Gender-related Fingerprint Features.
CoRR, 2021

Parameter-Free Attention in fMRI Decoding.
IEEE Access, 2021

Spatial Graph Convolutional Network for Image Super-Resolution.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Oblivious Data Structure for Secure Multiple-Set Membership Testing.
Proceedings of the Web Information Systems and Applications, 2021

2020
Multi-view point cloud registration with adaptive convergence threshold and its application in 3D model retrieval.
Multim. Tools Appl., 2020

Pbsx: A practical private boolean search using Intel SGX.
Inf. Sci., 2020

dCCPI-predictor: A state-aware approach for effectively predicting cross-core performance interference.
Future Gener. Comput. Syst., 2020

Planning Optimal Rejuvenation Policy for Aging Software Systems via a Two-Layer Model.
IEEE Access, 2020

AutoIDL: Automated Imbalanced Data Learning via Collaborative Filtering.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Stochastic Batch Augmentation with An Effective Distilled Dynamic Soft Label Regularizer.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

MPTEE: bringing flexible and efficient memory protection to Intel SGX.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

Serving at the Edge: A Redactable Blockchain with Fixed Storage.
Proceedings of the Web Information Systems and Applications, 2020

Variable-Length Indistinguishable Binary Tree for Keyword Searching Over Encrypted Data.
Proceedings of the Web Information Systems and Applications, 2020

2019
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment.
IEEE Trans. Serv. Comput., 2019

Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Secur. Comput., 2019

LSTM-Based with Deterministic Negative Sampling for API Suggestion.
Int. J. Softw. Eng. Knowl. Eng., 2019

mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform.
Future Gener. Comput. Syst., 2019

A gas source localization algorithm based on NLS initial optimization of particle filtering.
Evol. Intell., 2019

Improving Resource Usages of Containers Through Auto-Tuning Container Resource Parameters.
IEEE Access, 2019

3D Fingerprint Gender Classification Using Deep Learning.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

The Research Reviewed of Edge Network Active Safety Defense Technology.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy.
IEEE Trans. Dependable Secur. Comput., 2018

A Self-Training Subspace Clustering Algorithm under Low-Rank Representation for Cancer Classification on Gene Expression Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Detecting Malware with an Ensemble Method Based on Deep Neural Network.
Secur. Commun. Networks, 2018

LSTM-Based Hierarchical Denoising Network for Android Malware Detection.
Secur. Commun. Networks, 2018

What affects the user stickiness of the mainstream media websites in China?
Electron. Commer. Res. Appl., 2018

Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Hybrid Approach for Predicting Aging-Related Failures of Software Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Learning API Suggestion via Single LSTM Network with Deterministic Negative Sampling.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

EventDB: A Large-Scale Semi-structured Scientific Data Management System.
Proceedings of the Big Scientific Data Management, 2018

Multi-dimensional Index over a Key-Value Store for Semi-structured Data.
Proceedings of the Big Scientific Data Management, 2018

An Operator Library System for HEP Events Processing Based on Hbase Coprocessor.
Proceedings of the Big Scientific Data Management, 2018

A Distributed Rule Engine for Streaming Big Data.
Proceedings of the Web Information Systems and Applications, 2018

2017
Carbon-Aware Electricity Cost Minimization for Sustainable Data Centers.
IEEE Trans. Sustain. Comput., 2017

InvarNet-X: A Black-Box Invariant-Based Approach to Diagnosing Big Data Systems.
IEEE Trans. Emerg. Top. Comput., 2017

Nosv: A lightweight nested-virtualization VMM for hosting high performance computing on cloud.
J. Syst. Softw., 2017

基于时变加权马尔科夫链的网络异常检测模型 (Network Anomaly Detection Model Based on Time-varying Weighted Markov Chain).
计算机科学, 2017

一种面向融合泛在网的协同防护体系设计 (Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network).
计算机科学, 2017

电网融合泛在网信息平台设计及安全威胁分析 (Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid).
计算机科学, 2017

Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud.
IACR Cryptol. ePrint Arch., 2017

An online electricity cost budgeting algorithm for maximizing green energy usage across data centers.
Frontiers Comput. Sci., 2017

A cost-effective strategy for Cloud system maintenance.
Comput. Electr. Eng., 2017

A Recommendation-Based Parameter Tuning Approach for Hadoop.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

An algorithm of pose estimation based on conic correspondences.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Long short-term memory neural network for network traffic prediction.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

A robust inference algorithm for crowd sourced categorization.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

An accident prediction approach based on XGBoost.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

Secure the commodity applications against address exposure attacks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A High Energy Physical Metadata Directory Structure Based on RAMCloud.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A two-time-scale load balancing framework for minimizing electricity bills of Internet Data Centers.
Pers. Ubiquitous Comput., 2016

一种基于马尔科夫模型的网络安全风险实时分析方法 (Real Time Analysis Method of Network Security Risk Based on Markov Model).
计算机科学, 2016

一种基于攻防图的网络安全防御策略生成方法 (Improved Network Security Defense Strategy Generation Method Based on Attack-Defense Graph).
计算机科学, 2016

基于冗余消除和属性数值化的XACML策略优化方法 (XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization).
计算机科学, 2016

A Heuristic Time Sharing Policy for Backup Resources in Cloud System.
KSII Trans. Internet Inf. Syst., 2016

Polarity shift detection, elimination and ensemble: A three-stage model for document-level sentiment analysis.
Inf. Process. Manag., 2016

FIRST: Face Identity Recognition in SmarT Bank.
Int. J. Semantic Comput., 2016

Vein point cloud registration algorithm for multi-pose hand vein authentication.
Proceedings of the IEEE International Conference on Identity, 2016

3D feature array involved registration algorithm for multi-pose hand vein authentication.
Proceedings of the International Conference on Biometrics, 2016

Enhancing Data Secrecy with Segmentation Based Isolation.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

Optimizing Backup Resources in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Dual Sentiment Analysis: Considering Two Sides of One Review.
IEEE Trans. Knowl. Data Eng., 2015

PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
IEEE Trans. Computers, 2015

国内第三方Android应用市场安全性的检测 (Detecting Security of Applications in Chinese Third-party Android Market).
计算机科学, 2015

量化粗糙集的单调性属性约简方法 (Approach to Monotonicity Attribute Reduction in Quantitative Rough Set).
计算机科学, 2015

α-Dominance relation and rough sets in interval-valued information systems.
Inf. Sci., 2015

Making Availability as a Service in the Clouds.
CoRR, 2015

CHAOS: Accurate and Realtime Detection of Aging-Oriented Failure Using Entropy.
CoRR, 2015

AppSec: A Safe Execution Environment for Security Sensitive Applications.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

SecPod: a Framework for Virtualization-based Security Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Greening Data Centers within Cost Budget.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Minimizing Electricity Bills for Geographically Distributed Data Centers with Renewable and Cooling Aware Load Balancing.
Proceedings of the International Conference on Identification, 2015

A Novel Approach to Improving Resource Utilization for IaaS.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
An Automatic Framework for Detecting and Characterizing Performance Degradation of Software Systems.
IEEE Trans. Reliab., 2014

Updating multigranulation rough approximations with increasing of granular structures.
Knowl. Based Syst., 2014

Power-aware optimization for heterogeneous multi-tier clusters.
J. Parallel Distributed Comput., 2014

A WSN Nodes Access Mechanism and Directed Diffusion in Emergency Circumstances.
J. Digit. Inf. Manag., 2014

A Comprehensive Trust Model Based on Reputation and Fuzzy Theory.
J. Comput., 2014

TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud.
J. Comput., 2014

Bio-inspired Mechanism and Model Exploration of Software Aging.
CoRR, 2014

InvarNet-X: A Comprehensive Invariant Based Approach for Performance Diagnosis in Big Data Platform.
Proceedings of the Big Data Benchmarks, Performance Optimization, and Emerging Hardware, 2014

Characterizing Hierarchies on Covering-Based Multigranulation Spaces.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Multicost Decision-Theoretic Rough Sets Based on Maximal Consistent Blocks.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Want More? Pay More!
Proceedings of the Rough Sets and Current Trends in Computing, 2014

Frogeye: Perception of the slightest tag motion.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Multiplexing of Backup VMs Based on Greedy Policy.
Proceedings of the 11th Web Information System and Application Conference, 2014

Granger Causality-Aware Prediction and Diagnosis of Software Degradation.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
TargetATPsite: A template-free method for ATP-binding sites prediction with residue evolution image sparse representation and classifier ensemble.
J. Comput. Chem., 2013

Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture.
Frontiers Comput. Sci., 2013

BigDataBench: a Big Data Benchmark Suite from Web Search Engines.
CoRR, 2013

A lightweight VMM on many core for high performance computing.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

Multi-scale Entropy: One Metric of Software Aging.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Present or Future: Optimal Pricing for Spot Instances.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

CloudRank-V: A Desktop Cloud Benchmark with Complex Workloads.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

An ensemble MIC-based approach for performance diagnosis in big data platform.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Hybrid Power Control and Electricity Cost Management for Distributed Internet Data Centers in Cloud Computing.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
D-Pro: Dynamic Data Center Operations With Demand-Responsive Electricity Prices in Smart Grid.
IEEE Trans. Smart Grid, 2012

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks.
IEEE Trans. Parallel Distributed Syst., 2012

An Advanced Methodology for Measuring and Characterizing Software Aging.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Supervised Kernel Self-Organizing Map.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

A Mobile-Certificate Security Method of Satellite-Earth Integration Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Isolate secure executing environment for a safe cloud.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
Online Estimation of the Approximate Posterior Cramer-Rao Lower Bound for Discrete-Time Nonlinear Filtering.
IEEE Trans. Aerosp. Electron. Syst., 2011

Information Potential Fields Navigation in Wireless <i>Ad-Hoc</i> Sensor Networks.
Sensors, 2011

Tensor Field Model for higher-order information retrieval.
J. Syst. Softw., 2011

A Reference Programming Model for Building Context-Aware Application.
IEICE Trans. Inf. Syst., 2011

A novel heuristic algorithm for QoS-aware end-to-end service composition.
Comput. Commun., 2011

Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Inter-domain Communication Mechanism Design and Implementation for High Performance.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
Proceedings of the International Conference on Parallel Processing, 2011

Dynamic Power Management of Distributed Internet Data Centers in Smart Grid Environment.
Proceedings of the Global Communications Conference, 2011

2010
A Desynchronization Tolerant RFID Private Authentication Protocol.
Proceedings of the Wireless Algorithms, 2010

An adaptive mode-driven spatiotemporal motion vector prediction for wavelet video coding.
Proceedings of the Visual Communications and Image Processing 2010, 2010

A Text Copy Detection System Based on Complex Event Processing Architecture.
Proceedings of the Towards a Service-Based Internet. ServiceWave 2010 Workshops, 2010

A Novel End-User Oriented Service Composition Model Based on Quotient Space Theory.
Proceedings of the International Conference on Service Sciences, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Power Management in Heterogeneous Multi-tier Web Clusters.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Identification-free batch authentication for RFID tags.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Dynamic Projection from Choreography to Orchestration Based on Role Correlation.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links.
IEEE Trans. Parallel Distributed Syst., 2009

Joint Throughput Optimization for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2009

Energy Saving Task Scheduling for Heterogeneous CMP System Based on Multi-objective Fuzzy Genetic Algorithm.
Proceedings of the IEEE International Conference on Systems, 2009

A Table-Driven Programming Paradigm for Context-Aware Application Development.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009

A Multi-step Task Allocation Algorithm of Mobile Agent Based on Mobile Ad Hoc Network.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

EUL: An Efficient and Universal Localization Method for Wireless Sensor Network.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

A Mixed Software Rejuvenation Policy for Multiple Degradations Software System.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Variant rate based cross layer time frame scheduling in wireless sensor networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

A multi-objective hybrid genetic algorithm for energy saving task scheduling in CMP system.
Proceedings of the IEEE International Conference on Systems, 2008

Safety assurance for archeologists using sensor network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

New Programming Model for Pervasive Computing.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

An Improved Heuristic for QoS-Aware Service Composition Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Information Security Risk Assessment Method Based on CORAS Frame.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Designing Simulated Context-Aware Telephone in Pervasive Spaces.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

An Improved Calculus for Secure Dynamic Services Composition.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

SpiG4WSC: A Calculus for Secure Services Composition.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

A novel formal framework for secure dynamic services composition.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
An Offset Algorithm for Conflict Resolution in Context-Aware Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Research on context-aware architecture for personal information privacy protection.
Proceedings of the IEEE International Conference on Systems, 2007

The Research and Design of the Semantic Search Engine Based on Ontology.
Proceedings of the Third International Conference on Semantics, 2007

The Research on Term Field Based Term Co-Occurrence Model.
Proceedings of the Third International Conference on Semantics, 2007

Context-Aware Semantic Web Service Discovery.
Proceedings of the Third International Conference on Semantics, 2007

Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems.
Proceedings of the International Conference on Networking, 2007

Isotope Programming Model: a Kind of Program Model for Context-Aware Application.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Context-Aware Learning Privacy Disclosure Policy from Interaction History.
Proceedings of the Third International Conference on Natural Computation, 2007

Software Aging Forecasting Model of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

Energy-Aware Scheduling Tasks on Chip Multiprocessor.
Proceedings of the Third International Conference on Natural Computation, 2007

Application Server Aging Prediction Model Based on Wavelet Network with Adaptive Particle Swarm Optimization Algorithm.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

A Formal Model for Security-Aware dynamic Web Services Composition.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

A Study on Context-aware Privacy Protection for Personal Information.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Forecasting Software Aging of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the Fourth International Conference on Autonomic Computing (ICAC'07), 2007

Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Developing an Insulin Pump System Using the SOFL Method.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Dynamic multicast routing algorithm for delay and delay variation-bounded Steiner tree problem.
Knowl. Based Syst., 2006

Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Kernel-SOM Based Visualization of Financial Time Series Forecasting.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Deterministic Packet Marking with Link Signatures for IP Traceback.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A New Method of Network Data Link Troubleshooting.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2000
OTMS-A CORBA-Compliant Object Transaction Management System.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...