首页 行业 移动快检食品环境先进材料化工生命科学制药临床 导购 电商 仪器谱 直播 前沿Lab 博客 会议 人才 搜索
计算机与控制工程实验教学示范中心

计算机与控制工程实验教学示范中心

400-6699-117转1000

南开大学计算机与控制工程实验教学中心近年来,在中文核心期刊和SCI/EI检索刊物上,共发表学术论文317篇,其中SCI收录18篇,EI收录262篇。申请或获得24项专利、6项著作权,主持参与各类科研项目48项。

1、发表论文

SCI检索:

(1)          代煜, 张建勋. 基于双路偏振影像分光的立体视觉. 物理学报, Vol.60, No.8(2011):205. (SCI: 00294392400037)

(2)          He L, Xu JD, Yu YT, Liu BX. Optimizing the Path-Points Identification for Data Mules in Mobile WSNs. 4th International Conference on Frontier of Computer Science and Technology, Dec 2009:279-284. (SCI: 00027683850 0041 )

(3)          Tian H, Xu J, Lian KM, Zhang Y. Research on Strong-association Rule Based Web Application Vulnerability Detection. 2nd IEEE International Conference on Computer Science and Information Technology, Vol.2(2009): 237-241. (SCI:000279807800053 )

(4)          Li CL, Yan WR, Ying XK, Sun QL, Chen ZQ. The Design and Implementation of a P2P Live Video Broadcasting System Based on Hybrid Structure. 5th International Conference on Wireless Communications, Networking andMobile Computing, Vol.1-8(2009): 2708-2712. (SCI: 000275789401160 )

(5)          Wu Y, Yang L, Wu GY, Guo JH. An Improved Coded Repetition Scheme for Safety Messaging in VANETs. 5th International Conference on Wireless Communications, Networking and Mobile Computing, Sept 2009: 2874-2877. (SCI: 000275789401200 )

(6)          Dong DF, Wu Y, Wang XF, Hu Z, Wu GY. M-KAD: A Scalable Peer-to-Peer System for Similarity Search in Metric Space. 7th International Conference on Software Engineering Research - Management and Applications, Vol.253(2009): 71-81. (SCI: 000280556400007)

(7)          Yang L, Xu JD, Wu GY, Guo JH. Road Probing: RSU Assisted Data Collection in Vehicular Networks. 5th International Conference on Wireless Communi- cations, Networking and Mobile Computing, Sept 2009:2717-2720. (SCI: 000275789401162)

(8)          He L, Xu JD, Yu YT. Optimize Multiple Mobile Elements Touring in Wireless Sensor Networks. IEEE International Symposium on Parallel and Distributed Processing with Applications, Aug 2009: 317-323. (SCI: 000275653700043 )

(9)          He L, Xu JD, Yu YT, Li M, Zhao WY. Genetic Algorithm based Length Reduction of a Mobile BS Path in WSNs. 8th IEEE/ACIS International Conference on Computer and Information Science, Jun 2009:797-802. (SCI: 000273558200136 )

(10)      Li QC, Bai ZX, Liu JZ, Ma J. Design and Implementation For E-paper Driver. 2nd IEEE International Conference on Computer Science and Information Technology, Aug 2009:187-190. (SCI: 000279807800042 )

(11)      Li QC, Gong XL, Zhang J, Liu Y. A Framework Improving Availability For Consumer Electronics. 2nd IEEE International Conference on Computer Science and Information Technology, Aug 2009:352-356. (SCI: 000279807700 077)

(12)      Zhang J, Li QC, Wang C, Fang J. A Novel Application for Text Watermarking in Digital Reading. International Conference on Artificial Intelligence and Computational Intelligence, Vol.5855, Nov 2009:103-111. (SCI: 000276635400 012 )

(13)      Yuan XJ, Zhang HB, Yang ZY, Wen YL. Understanding the Search Interfaces of the Deep Web Based on Domain Model. 8th IEEE/ACIS International Conference on Computer and Information Science, Jun 2009: 1194-1199. (SCI: 000273558200203 )

(14)      Qi ZY, Xu J, Gong DW, Tian H. Traversing Model Design Based on Strong-association Rule for Web Application Vulnerability Detection. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, Vol.I, Jan 2009:28-31. (SCI: 000265085500005 )

(15)      Kai Wang, Jufeng Yang, Guangshun Shi, Qingren Wang. The asymptotic optimization of pre-edited ANN classifier. Soft Computing, Vol.13, No.12 (2009): 1153-1161. (SCI: 000268257700004 )

(16)      Li Chen, Hong Zhao, Bin Han, Zhipeng Bai. Combined Use of WEPS and Models-3/CMAQ for Simulating Wind Erosion Source Emission and Its Environmental Impact[J]. Science of the Total Environment, SCI二区,5-Year Impact Factor: 3.789.

(17)      Jingwei Li, Jin Li, Zheli Liu, Chunfu Jia. Enabling Efficient and Secure Data Sharing in Cloud Computing[J]. Concurrency and Computation: Practice and Experience. 2013-06 online published. SCI三区,CCF-RANK-C, IF=0.7.

(18)      Jingwei Li, Chunfu Jia, Zheli Liu, et al. Cycle-walking revisited: consistency, security, and efficiency[J]. Security and Communication Networks, 2013. SCI四区, CCF-RANK-C, IF=0.6.

(19)      Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia. Privacy-Preserving Data Utilization in Hybrid Clouds[J]. Future generation computer system, 2013. SCI二区, CCF-RANK-C, IF=1.9.

 

EI检索:

(20)      Zhu, B., et al. Proactive drive failure prediction for large scale storage systems. in 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies, MSST 2013, May 6, 2013 - May 10, 2013. 2013. Long Beach,CA, United states: IEEE Computer Society.

(21)      Guo tianyong,Zhao gengshen,Cheng ruqi et al.Simulation of wind turbine based on Fuzzy-PI control.2009 2nd International Conference on Power Electronics and Intelligent Transportation System,2009,3:130~133.

(22)      Hong Zhao, Jinhua Ni, Liqiang Huang, Lingzhi Kong, Yanan Ding. The Researh on Authority Management of MOSS System. 2012 IEEE International Conference on Computer and Information Science, Safty Engineering, CAISSE 2012,Vol.1110, p137-141.

(23)      Zhang, Y., et al., Research on parallel frequent item mining on multi-core processors. ICIC Express Letters, 2013. 7(7): p. 2069-2074.

(24)      Zhang, H., et al. K hops frequent subgraphs mining for large attribute graph. in 15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013, April 4, 2013 - April 6, 2013. 2013. Sydney, NSW, Australia: Springer Verlag.

(25)      Min Li, Zheli Liu, Jingwei Li, Chunfu Jia. Format-Preserving Encryption for Character Data[J]. Journal of Networks, 7(8), pp 1239-1244, 2012.

(26)      Yuan, X., et al., XML data storage and query optimization in relational database by XPath processing model. Journal of Software, 2013. 8(4): p. 809-816.

(27)      Wang, Y., et al., Finding similar queries based on query representation analysis. 2013: p. 1-28.

(28)      Wang, Y., et al., Supervised rank aggregation based on query similarity for document retrieval. Soft Computing, 2013. 17(3): p. 421-429.

(29)      Wang, S., et al., Clustering of ncRNA based on structural and semantic similarity. Journal of Bionanoscience, 2013. 7(1): p. 20-25.

(30)      Wang, J., et al. The impact of solid state drive on search engine cache management. in 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2013, July 28, 2013 - August 1, 2013. 2013. Dublin, Ireland: Association for Computing Machinery.

(31)      Pu, L., et al. SmartVirtCloud: Virtual cloud assisted application offloading execution at mobile devices' discretion. in 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013, April 7, 2013 - April 10, 2013. 2013. Shanghai, China: Institute of Electrical and Electronics Engineers Inc.

(32)      Lu, M., et al., Rank hash similarity for fast similarity search. Information Processing and Management, 2013. 49(1): p. 158-168.

(33)      Liu, Z., et al. Secure storage and fuzzy query over encrypted databases. in 7th International Conference on Network and System Security, NSS 2013, June 3, 2013 - June 4, 2013. 2013. Madrid, Spain: Springer Verlag.

(34)      Lian, X., X. Yuan, and H. Zhang, Subordinating to the majority: Factoid question answering over CQA sites. Journal of Computational Information Systems, 2013. 9(16): p. 6409-6416.

(35)      Lian, X., et al. Finding similar questions with categorization information and dependency syntactic tree. in 14th International Conference on Web-Age Information Management, WAIM 2013, June 14, 2013 - June 16, 2013. 2013. Beidaihe, China: Springer Verlag.

(36)      Li, Q., et al., Constrained elements based software rejuvenation policy in embedded environment. Journal of Computational Information Systems, 2013. 9(16): p. 6391-6398.

(37)      He, L., J. Pan, and J. Xu, A progressive approach to reducing data collection latency in wireless sensor networks with mobile elements. IEEE Transactions on Mobile Computing, 2013. 12(7): p. 1308-1320.

(38)      Davidson, S.B., et al. Search and result presentation in scientific workflow repositories. in 25th International Conference on Scientific and Statistical Database Management, SSDBM 2013, July 29, 2013 - July 31, 2013. 2013. Baltimore, MD, United states: Association for Computing Machinery.

(39)      Chen, J., et al. Modeling semantic and behavioral relations for query suggestion. in 14th International Conference on Web-Age Information Management, WAIM 2013, June 14, 2013 - June 16, 2013. 2013. Beidaihe,China: Springer Verlag.

(40)      Zhao, C., et al. Core technologies analysis for End-hopping system. in 2011 3rd International Conference on Mechanical and Electronics Engineering, ICMEE 2011, September 23, 2011 - September 25, 2011. 2012.Hefei, China: Trans Tech Publications.

(41)      Zhang, Y., et al. Parallel optimization of frequent algorithm on multi-core processors. in 2012 International Conference on Control Engineering and Communication Technology, ICCECT 2012, December 7, 2012 - December 9, 2012. 2012. Shenyang, Liaoning, China: IEEE Computer Society.

(42)      Zhang, Y., et al. Emotion tagging for comments of online news by meta classification with heterogeneous information sources. in 35th Annual ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2012, August 12, 2012 - August 16, 2012. 2012. Portland, OR, United states: Association for Computing Machinery.

(43)      Zhang, W., et al. Joint optimization of bid and budget allocation in sponsored search. in 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, August 12, 2012 - August 16, 2012. 2012. Beijing, China: Association for Computing Machinery.

(44)      Yuan, A., et al. Handwritten English word recognition based on convolutional neural networks. in 13th International Conference on Frontiers in Handwriting Recognition, ICFHR 2012, September 18, 2012 - September 20, 2012. 2012. Bari, Italy: IEEE Computer Society.

(45)      Yuan, A., et al. Offline handwritten English character recognition based on convolutional neural network. in 10th IAPR International Workshop on Document Analysis Systems, DAS 2012, March 27, 2012 - March 29, 2012. 2012. Gold Coast, QLD, Australia: IEEE Computer Society.

(46)      Yang, T., et al. Structural similarity computation based on extended edge matching method. in 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012, May 29, 2012 - May 31, 2012. 2012. Chongqing, China: IEEE Computer Society.

(47)      Yang, J., et al. A fast adaptive binarization method for complex scene images. in 2012 19th IEEE International Conference on Image Processing, ICIP 2012, September 30, 2012 - October 3, 2012. 2012. Lake Buena Vista,FL, United states.

(48)      Yang, J., et al. An improved binarization method using inter- and intra-block features for natural images. in 2012 19th IEEE International Conference on Image Processing, ICIP 2012, September 30, 2012 - October 3, 2012. 2012. Lake Buena Vista, FL, United states.

(49)      Xu, Y., et al. A queue-length-based detection scheme for urban traffic congestion by VANETs. in 2012 IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, June 28, 2012 - June 30, 2012. 2012. Xiamen, Fujian, China: IEEE Computer Society.

(50)      Xu, G., et al. HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks. in 2012 IEEE 31st International Performance Computing and Communications Conference, IPCCC 2012, December 1, 2012 - December 3, 2012. 2012.Austin, TX, United states: IEEE Computer Society.

(51)      Wen, Y., et al., Searching and ranking XML documents via path constraints. International Journal of Digital Content Technology and its Applications, 2012. 6(1): p. 462-470.

(52)      Wang, Z., et al. Branch obfuscation using code mobility and signal. in 36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012, July 16, 2012 - July 20, 2012. 2012.Izmir, Turkey: IEEE Computer Society.

(53)      Wang, Y., et al. Personalized paper recommendation based on user historical behavior. in 1st CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2012, October 31, 2012 - November 5, 2012. 2012. Beijing, China: Springer Verlag.

(54)      Wang, X., et al. Voting affinity propagation algorithm for clustering XML documents. in 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012, December 29, 2012 - December 31, 2012. 2012. Changchun, China: IEEE Computer Society.

(55)      Tong, J., et al., Correlation-aware prefetching in fault-tolerant distributed object-based file system. Journal of Computational Information Systems, 2012. 8(16): p. 6651-6661.

(56)      Tian, W., et al. Attack model based penetration test for SQL injection vulnerability. in 36th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2012, July 16, 2012 - July 20, 2012. 2012. Izmir, Turkey: IEEE Computer Society.

(57)      Tian, W., et al., Model-driven penetration test of the SQL injection in Web applications. Gaojishu Tongxin/Chinese High Technology Letters, 2012. 22(11): p. 1161-1168.

(58)      Sun, L., et al. An RSU-assisted cluster head selection and backup protocol. in 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, March 26, 2012 - March 29, 2012. 2012. Fukuoka, Japan: IEEE Computer Society.

(59)      Sun, L., et al. Data aggregation and information type in road probing. in International Workshop on Internet of Things, IOT 2012, August 17, 2012 - August 29, 2012. 2012. Changsha, China: Springer Verlag.

(60)      Si, G., et al. An evaluation model for dependability of internet-scale software on basis of bayesian networks. in 36th IEEE Annual International Computer Software and Applications Conference, COMPSAC 2012, July 16, 2012 - July 20, 2012. 2012. Izmir, Turkey: IEEE Computer Society.

(61)      Si, G., et al., A dependability evaluation model for internetware based on Bayesian network. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012. 49(5): p. 1028-1038.

(62)      Pu, L., et al. Measurements study on the I/O performance of virtualized cloud system. in 2012 IEEE 7th International Conference on Networking, Architecture and Storage, NAS 2012, June 28, 2012 - June 30, 2012. 2012.Xiamen, Fujian, China: IEEE Computer Society.

(63)      Ning, H. and X. Shao, Social network-based Semantic web services discovery. International Journal of Digital Content Technology and its Applications, 2012. 6(5): p. 150-159.

(64)      Ma, J., et al. Adaptive pipeline for deduplication. in 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies, MSST 2012, April 16, 2012 - April 20, 2012. 2012. Pacific Grove, CA, United states: IEEE Computer Society.

(65)      Lu, M., et al., Cost-sensitive listwise ranking approach. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012. 49(8): p. 1738-1746.

(66)      Liu, C., et al. TOC structure extraction from OCR-ed books. in Focused Retrieval of Content and Structure - 10th International Workshop of the Initiative for the Evaluation of XML Retrieval, INEX 2011, Revised Selected Papers. 2012. Tiergartenstrasse 17, Heidelberg, D-69121,Germany: Springer Verlag.

(67)      Lin, J., et al. NCCPIS: A co-simulation tool for networked control and cyber-physical system evaluation. in 9th IFIP International Conference on Network and Parallel Computing, NPC 2012, September 6, 2012 - September 8, 2012. 2012. Gwangju, Korea, Republic of: Springer Verlag.

(68)      Lian, X., et al., Only recommend to you: Towards personalized models for question recommendation in community question answering. Journal of Information and Computational Science, 2012. 9(16): p. 4987-4995.

(69)      Li, Q., et al., A dynamic Scheduling Method for Data Services Based on P2P Network in Ubiquitous Computing Environment. International Journal of Digital Content Technology and its Applications, 2012. 6(10): p. 1-11.

(70)      Li, M., et al., Format-preserving encryption for character data. Journal of Networks, 2012. 7(8): p. 1239-1244.

(71)      Li, J., et al. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. in 6th International Conference on Network and System Security, NSS 2012, November 21, 2012 - November 23, 2012. 2012. Wuyishan, Fujian, China: Springer Verlag.

(72)      Li, J., et al. A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud. in 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, September 19, 2012 - September 21, 2012. 2012. Bucharest, Romania: IEEE Computer Society.

(73)      Li, J., et al. Outsourcing encryption of attribute-based encryption with MapReduce. in 14th International Conference on Information and Communications Security, ICICS 2012, October 29, 2012 - October 31, 2012. 2012. Hong Kong, China: Springer Verlag.

(74)      Jiang, H. and X. Shao, Detection of botnet combining flow similarity and stability analysis. Journal of Computational Information Systems, 2012. 8(17): p. 7385-7392.

(75)      Jiang, H. and X. Shao, Detecting P2P botnets by discovering flow dependency in CC traffic. 2012: p. 1-12.

(76)      Jiang, H., Y. Liu, and X. Shao, BotCVD: Visual analysis of DNS traffic for botnet detection. Advances in Information Sciences and Service Sciences, 2012. 4(8): p. 264-273.

(77)      Jia, C., et al. A new integer FPE scheme based on Feistel network. in 2012 2nd International Conference on Electric and Electronics, EEIC 2012, April 21, 2012 - April 22, 2012. 2012. Sanya, China: Springer Verlag.

(78)      Jia, C., et al. Defending P2P networks against malicious worms based on benign worms. in 2012 2nd International Conference on Electric and Electronics, EEIC 2012, April 21, 2012 - April 22, 2012. 2012. Sanya,China: Springer Verlag.

(79)      Hu, X., H. Zhang, and X. Yuan. A compact XML storage scheme supporting efficient path querying. in 14th Asia Pacific Web Technology Conference, APWeb 2012, April 11, 2012 - April 13, 2012. 2012. Kunming, China: Springer Verlag.

(80)      Hu, X., X. Yuan, and H. Zhang, Compression on XML database system. Journal of Computational Information Systems, 2012. 8(11): p. 4475-4483.

(81)      Hu, X., et al. Query XML data in RDBMS. in 9th Web Information Systems and Applications Conference, WISA 2012, November 16, 2012 - November 18, 2012. 2012. Haikou, Hainan, China: IEEE Computer Society.

(82)      He, L., et al. Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks. in IEEE Conference on Computer Communications, INFOCOM 2012, March 25, 2012 - March 30, 2012. 2012.Orlando, FL, United states: Institute of Electrical and Electronics Engineers Inc.

(83)      Guan, Y., et al. XMLVC: An effective model for XML invalidation and automatic correction. in 2012 International Conference on Software Engineering, Knowledge Engineering and Information Engineering, SEKEIE 2012, April 1, 2012 - April 2, 2012. 2012. China: Springer Verlag.

(84)      Fan, B., et al., A novel XML structural similarity calculation method based on structural information content using mapreduce. Journal of Convergence Information Technology, 2012. 7(23): p. 799-810.

(85)      Jingwei Li, Zheli Liu*, Li Xu, et al. An efficient format-preserving encryption mode for practical domains[J]. Wuhan University Journal of Natural Sciences, 17(5), pp 428-434, 2012.

(86)      Cheng, C. and C. Jia. V-shape property for the quadratic JIT schedules with random processing times. in 2012 International Conference on Manufacturing Engineering and Process, ICMEP 2012, April 21, 2012 - April 22, 2012. 2012. Kunming, China: Trans Tech Publications.

(87)      Chen, C., C. Hou, and X. Yuan. Relevance feedback fusion via query expansion. in 2012 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops, WI-IAT 2012, December 4, 2012 - December 7, 2012. 2012. Macau, China: IEEE Computer Society.

(88)      Ahmadi, M., et al. A Partition-based data collection scheme for wireless sensor networks with a mobile sink. in 2012 IEEE International Conference on Communications, ICC 2012, June 10, 2012 - June 15, 2012. 2012. Ottawa,ON, Canada: Institute of Electrical and Electronics Engineers Inc.

(89)      Zhao, Z., et al. CAWRM: A remote mirroring system based on AoDI volume. in 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, DSN-W 2011, June 27, 2011 - June 30, 2011. 2011. Hong Kong, China: IEEE Computer Society.

(90)      Zhao, C., C. Jia, and K. Lin. Technique and application of End-hopping in network defense. in 2010 1st ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, CDEE 2010, October 23, 2010 - October 24, 2010. 2011. Qinhuangdao, Hebei, China: IEEE Computer Society.

(91)      Zhang, Z., et al., A digital rights management solution of TD-SCDMA library service. International Journal of Digital Content Technology and its Applications, 2011. 5(9): p. 344-351.

(92)      Zhang, X., et al., A novel method for measuring similarity of XML documents based on extended adjacency matrix. Journal of Computational Information Systems, 2011. 7(7): p. 2555-2565.

(93)      Zhang, L., et al. XML micro benchmark framework based on algebra analysis. in 2011 International Conference on Computer Science and Service System, CSSS 2011, June 27, 2011 - June 29, 2011. 2011. Nanjing,China: IEEE Computer Society.

(94)      Zhang, F., et al. Fast lists intersection with Bloom filter using graphics processing units. in 26th Annual ACM Symposium on Applied Computing, SAC 2011, March 21, 2011 - March 24, 2011. 2011. TaiChung,Taiwan: Association for Computing Machinery.

(95)      Yu, Z., J. Xu, and Y. Wu. Extending the reach of infrastructure by utilizing node mobility. in 10th International Conference on Mobile and Ubiquitous Multimedia, MUM'11, December 7, 2011 - December 9, 2011. 2011.Beijing, China: Association for Computing Machinery.

(96)      Yu, Z., L. Jiao, and J. Liu. Optimization design of ADRC for oxygen content in flue gas based on chaos particle swarm optimization algorithm. in 2011 International Conference on Electronic and Mechanical Engineering and Information Technology, EMEIT 2011, August 12, 2011 - August 14, 2011. 2011. Harbin, China: IEEE Computer Society.

(97)      Yang, J., et al. A real-time command system based on hand gesture recognition. in 2011 7th International Conference on Natural Computation, ICNC 2011, July 26, 2011 - July 28, 2011. 2011. Shanghai, China: IEEE Computer Society.

(98)      Yang, J., et al. A novel method for recognition of handwritten chemical symbols based on MQDF. in 4th International Congress on Image and Signal Processing, CISP 2011, October 15, 2011 - October 17, 2011. 2011.Shanghai, China: IEEE Computer Society.

(99)      Xu, Y., et al. Multi-hop broadcast for data transmission of traffic congestion detection. in 10th International Conference on Mobile and Ubiquitous Multimedia, MUM'11, December 7, 2011 - December 9, 2011. 2011.Beijing, China: Association for Computing Machinery.

(100)  Xie, G., et al. hUBI: An optimized hybrid mapping scheme for NAND flash-based SSDs. in 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, November 16, 2011 - November 18, 2011. 2011. Changsha, China: IEEE Computer Society.

(101)  Wen, S., H. Zhang, and Y. Zhang. A construction and implementation of high performance embedded database. in 2nd Annual Conference on Electrical and Control Engineering, ICECE 2011, September 16, 2011 - September 18, 2011. 2011. Yichang, China: IEEE Computer Society.

(102)  Wang, Z., et al. Linear obfuscation to combat symbolic execution. in 16th European Symposium on Research in Computer Security, ESORICS 2011, September 12, 2011 - September 14, 2011. 2011. Leuven, Belgium: Springer Verlag.

(103)  Wang, Y., et al., A multiple query dependent ranking SVM aggregation algorithm. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011. 48(4): p. 558-566.

(104)  Si, X., et al. Parallel optimization of queries in XML dataset using GPU. in 2011 4th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011, December 9, 2011 - December 11, 2011. 2011.Tianjin, China: IEEE Computer Society.

(105)  Shi, L., et al., Synchronization strategies of end information hopping for active cyber-defense. ICIC Express Letters, 2011. 5(4 B): p. 1397-1402.

(106)  Lu, Z., et al. User relationship index based on social network community analysis. in 2011 International Conference on Business Management and Electronic Information, BMEI 2011, May 13, 2011 - May 15, 2011. 2011.Guangzhou, China: IEEE Computer Society.

(107)  Liu, X., et al., Defending P2P networks based on benign worms. Journal of Computational Information Systems, 2011. 7(7): p. 2532-2539.

(108)  Liu, J. and Y. Zhang. A caculation method discussion of vertical bearing capacity on end post-grouted drilled piles. in 1st International Conference on Civil Engineering, Architecture and Building Materials, CEABM 2011, June 18, 2011 - June 20, 2011. 2011. Haikou, China: Trans Tech Publications.

(109)  Liu, J. and Y. Huang. Semi-supervised training for conditional random fields with pseudo auxiliary task. in 2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011, July 10, 2011 - July 13, 2011. 2011. Guilin, Guangxi, China: IEEE Computer Society.

(110)  Liu, J., et al. Learning conditional random fields with latent sparse features for acronym expansion finding. in 20th ACM Conference on Information and Knowledge Management, CIKM'11, October 24, 2011 - October 28, 2011. 2011. Glasgow, United kingdom: Association for Computing Machinery.

(111)  Liu, J., et al. Expansion finding for given acronyms using conditional random fields. in 12th International Conference on Web-Age Information Management, WAIM 2011, September 14, 2011 - September 16, 2011. 2011.Wuhan, China: Springer Verlag.

(112)  Liu, C., Z. Wang, and C. Jia, A model of malware passive propagation on the WWW. Journal of Computational Information Systems, 2011. 7(7): p. 2593-2600.

(113)  Jia, C., et al., Branch obfuscation: an efficient binary code obfuscation to impede symbolic execution. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011. 48(11): p. 2111-2119.

(114)  Huo, W. and X. Shao, A fuzzy associative classification method based on multi-objective evolutionary algorithm. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011. 48(4): p. 567-575.

(115)  Hu, X., et al. Efficient processing of XML path queries based on BI index. in 2011 International Conference on Mechanical Engineering, Industry and Manufacturing Engineering, MEIME2011, July 23, 2011 - July 24, 2011. 2011. Beijing, China: Trans Tech Publications.

(116)  He, L., et al. Adaptive mobility-assisted data collection in wireless sensor networks. in 2011 International Conference on Wireless Communications and Signal Processing, WCSP 2011, November 9, 2011 - November 11, 2011. 2011. Nanjing, China: IEEE Computer Society.

(117)  He, L., J. Pan, and J. Xu. Analysis on data collection with multiple mobile elements in wireless sensor networks. in 54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011, December 5, 2011 - December 9, 2011. 2011. Houston, TX,United states: Institute of Electrical and Electronics Engineers Inc.

(118)  He, L., J. Pan, and J. Xu. An on-demand data collection scheme for wireless sensor networks with mobile elements. in 2011 IEEE International Conference on Communications, ICC 2011, June 5, 2011 - June 9, 2011. 2011. Kyoto, Japan: Institute of Electrical and Electronics Engineers Inc.

(119)  He, L., J. Pan, and J. Xu. Reducing data collection latency in Wireless sensor networks with mobile elements. in 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011, April 10, 2011 - April 15, 2011. 2011. Shanghai, China: IEEE Computer Society.

(120)  Guo, L., Z. Zhou, and J. Xu. The implementation of cluster-based traffic simulation system. in 2011 4th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011, December 9, 2011 - December 11, 2011. 2011. Tianjin, China: IEEE Computer Society.

(121)  Fu, L., et al. A fuzzy classification method based on feature selection algorithm in malicious script code detection. in 2011 International Conference on System Science, Engineering Design and Manufacturing Informatization, ICSEM 2011, October 22, 2011 - October 23, 2011. 2011.Guiyang, China: IEEE Computer Society.

(122)  Feng, S., et al. The analysis on monitoring data and finite element simulation of the deep foundation pit in Tianjin. in 1st International Conference on Civil Engineering, Architecture and Building Materials, CEABM 2011, June 18, 2011 - June 20, 2011. 2011. Haikou, China: Trans Tech Publications.

(123)  Deng, H., et al. Accelerating the near non-bonded force computation in Desmond with graphic processing units. in 2011 International Conference on Parallel Processing Workshops, ICPPW 2011, September 13, 2011 - September 16, 2011. 2011. Taipei City, Taiwan: Institute of Electrical and Electronics Engineers Inc.

(124)  Chang, H., et al. Top-k queries processing with uncertain data on graphics processing units. in 2011 4th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011, December 9, 2011 - December 11, 2011. 2011. Tianjin, China: IEEE Computer Society.

(125)  Cao, R., et al. AoDI: An allocation-on-demand incremental volume based on LVM. in 26th Annual ACM Symposium on Applied Computing, SAC 2011, March 21, 2011 - March 24, 2011. 2011. TaiChung, Taiwan: Association for Computing Machinery.

(126)  Ao, N., et al., Efficient parallel lists intersection and index compression algorithms using graphics processing units. Proceedings of the VLDB Endowment, 2011. 4(8): p. 470-481.

(127)  Zhou, J., G. Wang, and X. Liu. A new hybrid parallel algorithm for MrBayes. in 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010, May 21, 2010 - May 23, 2010. 2010.Busan, Korea, Republic of: Springer Verlag.

(128)  Zhao, L., et al. Segmentation of connected symbols in online handwritten chemical formulas. in 2010 International Conference on System Science, Engineering Design and Manufacturing Informatization, ICSEM 2010, November 12, 2010 - November 14, 2010. 2010. Yichang, China: IEEE Computer Society.

(129)  Zhang, Y., G. Shi, and K. Wang. A SVM-HMM based online classifier for handwritten chemical symbols. in 2010 20th International Conference on Pattern Recognition, ICPR 2010, August 23, 2010 - August 26, 2010. 2010.Istanbul, Turkey: Institute of Electrical and Electronics Engineers Inc.

(130)  Zhang, W., et al. Cluster features of bluetooth mobile phone virus and research on strategies of control prevention. in 2010 International Conference on Computational Intelligence and Security, CIS 2010, December 11, 2010 - December 14, 2010. 2010. Nanning, China: IEEE Computer Society.

(131)  Zhang, T., Z. Li, and P. Shi. Statistical analysis against improved BPCS steganography. in 2010 IEEE International Conference on Advanced Computer Control, ICACC 2010, March 27, 2010 - March 29, 2010. 2010. 445 Hoes Lane- P.O.Box 1331, Piscataway, NJ 08855-1331, United States: IEEE Computer Society.

(132)  Zhang, L., G. Bai, and C. Xuan. A new methodology of online handwritten English character segmentation based on rules. in 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, October 29, 2010 - October 31, 2010. 2010. Xiamen, China: IEEE Computer Society.

(133)  Zhang, J., et al. A novel DRM for service provider in digital reading. in 2nd International Conference on Information Engineering and Computer Science, ICIECS 2010, December 25, 2010 - December 26, 2010. 2010. Wuhan,China: IEEE Computer Society.

(134)  Yang, J., K. Wang, and G. Shi. Structure-based recognition of handwritten chemical operators. in 2010 8th World Congress on Intelligent Control and Automation, WCICA 2010, July 7, 2010 - July 9, 2010. 2010. Jinan, China: Institute of Electrical and Electronics Engineers Inc.

(135)  Xu, Y., et al. Data collection for the detection of urban traffic congestion by VANETs. in 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, December 6, 2010 - December 10, 2010. 2010.Hangzhou, China: IEEE Computer Society.

(136)  Xie, T., G. Bai, and H. Lang. A novel distributed clustering algorithm based on OCSVM. in 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, October 29, 2010 - October 31, 2010. 2010. Xiamen, China: IEEE Computer Society.

(137)  Wu, D., et al. Efficient lists intersection by CPU-GPU cooperative computing. in 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010, April 19, 2010 - April 23, 2010. 2010. Atlanta, GA, United states: IEEE Computer Society.

(138)  Wei, J., S. Wang, and G. Wang. 1-vs-others rough decision forest. in 5th International Conference on Rough Set and Knowledge Technology, RSKT 2010, October 15, 2010 - October 17, 2010. 2010. Beijing, China: Springer Verlag.

(139)  Wang, S., G. Wang, and X. Liu. Results of NBJLM for OAEI2010. in 5th International Workshop on Ontology Matching, OM-2010 - Collocated with the 9th International Semantic Web Conference, ISWC, November 7, 2010 - November 7, 2010. 2010. Shanghai, China: Sun SITE Central Europe CEUR-WS.

(140)  Wang, S., et al. A new structured Peer-to-Peer architecture based on physical distance. in 16th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2010, December 8, 2010 - December 10, 2010. 2010. Shanghai, China: IEEE Computer Society.

(141)  Wang, C., et al. Effective keyword search for High Frequency LCAs over XML documents. in 2nd International Conference on Information Science and Engineering, ICISE2010, December 4, 2010 - December 6, 2010. 2010.Hangzhou, China: IEEE Computer Society.

(142)  Sun, B., et al. Incremental validation of XML document based on simplified XML element sequence pattern. in 7th Web Information Systems and Applications Conference, WISA 2010, 5th Workshop on Semantic Web and Ontology, SWON 2010, 4th Workshop on Electronic Government Technology and Application, EGTA 2010, August 20, 2010 - August 22, 2010. 2010. Hohhot,China: IEEE Computer Society.

(143)  Sui, J., et al. A correlation-aware prefetching strategy for object-based file system. in 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010, May 21, 2010 - May 23, 2010. 2010. Busan, Korea, Republic of: Springer Verlag.

(144)  Song, Y., et al. A remote mirroring architecture with adaptively cooperative pipelining. in 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010, May 21, 2010 - May 23, 2010. 2010. Busan, Korea, Republic of: Springer Verlag.

(145)  Si, G., et al. An evaluation framework for XML engine on RDBMS. in 2nd International Workshop on Database Technology and Applications, DBTA2010, November 27, 2010 - November 28, 2010. 2010. Wuhan, China: IEEE Computer Society.

(146)  Shi, S., et al. Corpus-based semantic class mining: Distributional vs. pattern-based approaches. in 23rd International Conference on Computational Linguistics, Coling 2010, August 23, 2010 - August 27, 2010. 2010. Beijing, China: Tsinghua University Press.

(147)  Shi, P., Z. Li, and T. Zhang. A technique of improved steganography text based on chaos and BPCS. in 2010 IEEE International Conference on Advanced Computer Control, ICACC 2010, March 27, 2010 - March 29, 2010. 2010. 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States: IEEE Computer Society.

(148)  Shi, G., L. Zhao, and W. Dai. Research on the method of pen gestures design and recognition for human-computer interaction. in 2010 Chinese Conference on Pattern Recognition, CCPR 2010, October 21, 2010 - October 23, 2010. 2010. Chongqing, China: IEEE Computer Society.

(149)  Shi, G. and Y. Zhang. An improved SVM-HMM based classifier for online recognition of handwritten chemical symbols. in 2010 Chinese Conference on Pattern Recognition, CCPR 2010, October 21, 2010 - October 23, 2010. 2010. Chongqing, China: IEEE Computer Society.

(150)  Ning, H. and X. Shao. Personalized query system based on heterogeneous data sources. in 2nd International Conference on Information Engineering and Computer Science, ICIECS 2010, December 25, 2010 - December 26, 2010. 2010. Wuhan, China: IEEE Computer Society.

(151)  Ma, L., et al. Towards fast de-duplication using low energy coprocessor. in 5th IEEE International Conference on Networking, Architecture and Storage, NAS 2010, July 15, 2010 - July 17, 2010. 2010. Macau, China: IEEE Computer Society.

(152)  Lu, M., et al. Order preserved cost-sensitive listwise approach in learning to rank. in 6th Asia Information Retrieval Societies Conference, AIRS 2010, December 1, 2010 - December 3, 2010. 2010. Taipei, Taiwan: Springer Verlag.

(153)  Liu, Z., et al. Format-preserving encryption for datetime. in 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, October 29, 2010 - October 31, 2010. 2010. Xiamen,China: IEEE Computer Society.

(154)  Liu, X., et al. Analysis of the influence factors to remote replication system. in 5th International Conference on Future Information Technology, FutureTech 2010, May 20, 2010 - May 24, 2010. 2010. Busan, Korea, Republic of: IEEE Computer Society.

(155)  Lin, W., et al. DRC:An efficient dynamic region code for XML. in 2nd International Conference on Information Science and Engineering, ICISE2010, December 4, 2010 - December 6, 2010. 2010. Hangzhou, China: IEEE Computer Society.

(156)  Lin, S., et al., T-code: 3-Erasure longest lowest-density MDS codes. IEEE Journal on Selected Areas in Communications, 2010. 28(2): p. 289-296.

(157)  Li, Q. and Z. Dong. Research of collaborative filtering algorithm based on the probabilistic clustering model. in 5th International Conference on Computer Science and Education, ICCSE 2010, August 24, 2010 - August 27, 2010. 2010. Hefei, China: IEEE Computer Society.

(158)  Li, G. and G. Shi. Procedural modeling of urban road network. in 2010 International Forum on Information Technology and Applications, IFITA 2010, July 16, 2010 - July 18, 2010. 2010. Kunming, China: IEEE Computer Society.

(159)  Jia, C., et al. Worm containment based on double-neighbor lists in P2P overlay networks. in 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, December 17, 2010 - December 19, 2010. 2010. Beijing, China: IEEE Computer Society.

(160)  He, L., et al. Evaluating on-demand data collection with mobile elements in wireless sensor networks. in 2010 IEEE 72nd Vehicular Technology Conference Fall, VTC2010-Fall, September 6, 2010 - September 9, 2010. 2010. Ottawa, ON, Canada: Institute of Electrical and Electronics Engineers Inc.

(161)  He, L., B. Yu, and J. Xu. LQATC: Link quality assured topology control algorithm in sensor networks. in 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, September 23, 2010 - September 25, 2010. 2010. Chengdu, China: IEEE Computer Society.

(162)  He, L., et al. Optimize the data collection path in WSNs based on the neighbor count of path points. in 2010 International Conference on Communications and Mobile Computing, CMC 2010, April 12, 2010 - April 14, 2010. 2010. Shenzhen, China: IEEE Computer Society.

(163)  Hao, S., et al. Extraction of the soil vibration signal based on Hilbert transform. in 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010, July 16, 2010 - July 18, 2010. 2010.Beijing, China: IEEE Computer Society.

(164)  Guo, Y., et al. An improved parallel MEMS processing-level simulation implementation using graphic processing unit. in 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010, May 21, 2010 - May 23, 2010. 2010. Busan, Korea, Republic of: Springer Verlag.

(165)  Zhao, L., et al. Linking broken characters in online handwritten chemical formulas. in 2009 International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2009, August 26, 2009 - August 27, 2009. 2009. Hangzhou, Zhejiang, China: IEEE Computer Society.

(166)  Zhang, Z., Z. Zhao, and G. Bai. 3D representative face and clustering based illumination estimation for face recognition and expression recognition. in 6th International Symposium on Neural Networks, ISNN 2009, May 26, 2009 - May 29, 2009. 2009. Wuhan, China: Springer Verlag.

(167)  Zhang, L., et al., A secondary index structure in distributed data table. Journal of Computational Information Systems, 2009. 5(3): p. 1529-1536.

(168)  Zhang, H.-C., J. Tian, and J. Xu, The design and implementation of distributed system for self-similar network traffic simulation. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009. 37(SUPPL.): p. 31-35+30.

(169)  Zhang, H. and X. Yuan. Schemas extraction for XML documents by XML element sequence patterns. in 1st International Conference on Information Science and Engineering, ICISE2009, December 26, 2009 - December 28, 2009. 2009. Nanjing, China: IEEE Computer Society.

(170)  Zhang, F., et al. An improved parallel implementation of 3D DRIE simulation on GPU. in 10th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2009, December 14, 2009 - December 16, 2009. 2009. Kaohsiung, Taiwan: IEEE Computer Society.

(171)  Zhang, C., et al. Approximating scheduling machines with capacity constraints. in 3rd International Frontiers of Algorithmics Workshop, FAW 2009, June 20, 2009 - June 23, 2009. 2009. Hefei, China: Springer Verlag.

(172)  Yuan, X., et al. Understanding the search interfaces of the deep web based on domain model. in 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009, June 1, 2009 - June 3, 2009. 2009. Shanghai, China: IEEE Computer Society.

(173)  Yuan, X., et al. A native XML storage scheme seamlessly integrated with relational databases. in 1st International Conference on Information Science and Engineering, ICISE2009, December 26, 2009 - December 28, 2009. 2009. Nanjing, China: IEEE Computer Society.

(174)  Yuan, K., H. Zhang, and Z. Li. An improved AES algorithm based on chaos. in 1st International Conference on Multimedia Information Networking and Security, MINES 2009, November 17, 2009 - November 20, 2009. 2009. Hubei,China: IEEE Computer Society.

(175)  Yang, L., et al. Road probing: RSU assisted data collection in vehicular networks. in 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, September 24, 2009 - September 26, 2009. 2009. Beijing, China: IEEE Computer Society.

(176)  Yang, J., et al. A novel method of minutiae filtering based on line feature extraction. in 2009 International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2009, August 26, 2009 - August 27, 2009. 2009. Hangzhou, Zhejiang, China: IEEE Computer Society.

(177)  Yan, H., et al. Identification of damaging activities for perimeter security. in 2009 International Conference on Signal Processing Systems, ICSPS 2009, May 15, 2009 - May 17, 2009. 2009. Singapore, Singapore: IEEE Computer Society.

(178)  Yan, H., et al. Oil pipeline safety monitoring method based on vibration signal analysis and recognition. in 2009 WRI Global Congress on Intelligent Systems, GCIS 2009, May 19, 2009 - May 21, 2009. 2009.Xiamen, China: IEEE Computer Society.

(179)  Xu, W., et al. A new service description, matching and selection mechanism for pervasive computing. in 6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009, August 14, 2009 - August 16, 2009. 2009. Tianjin, China: IEEE Computer Society.

(180)  Xu, J., et al. IBFS: A search algorithm based on index scheme in unstructured P2P network. in 1st International Workshop on Education Technology and Computer Science, ETCS 2009, March 7, 2009 - March 8, 2009. 2009. Wuhan, Hubei, China: Inst. of Elec. and Elec. Eng. Computer Society.

(181)  Xu, G., et al. Network measurement based redundancy model and maintenance in dynamic P2P storage systems. in 2009 IEEE 28th International Performance Computing and Communications Conference, IPCCC 2009, December 14, 2009 - December 16, 2009. 2009. Scottsdale, AZ, United states: IEEE Computer Society.

(182)  Wu, Y., G. Wu, and J. Xu. Research on internet storage service model and protocol based IPv6. in 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009, March 31, 2009 - April 2, 2009. 2009.Los Angeles, CA, United states: IEEE Computer Society.

(183)  Wu, D., et al. A batched GPU algorithm for set intersection. in 10th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2009, December 14, 2009 - December 16, 2009. 2009. Kaohsiung,Taiwan: IEEE Computer Society.

(184)  Wang, Y., et al. A query-level active sampling approach for learning to rank. in 2009 International Conference on Machine Learning and Cybernetics, July 12, 2009 - July 15, 2009. 2009. Baoding, China: IEEE Computer Society.

(185)  Wang, X., G. Shi, and J. Yang. The understanding and structure analyzing for online handwritten chemical formulas. in ICDAR2009 - 10th International Conference on Document Analysis and Recognition, July 26, 2009 - July 29, 2009. 2009. Barcelona, Spain: IEEE Computer Society.

(186)  Wang, T., et al. The images encryption algorithm based on the multi-chaotic systems. in 1st International Conference on Multimedia Information Networking and Security, MINES 2009, November 17, 2009 - November 20, 2009. 2009. Hubei, China: IEEE Computer Society.

(187)  Wang, K., et al. The asymptotic optimization of pre-edited ANN classifier. in Special issue on ICNC-FSKD2008;Guest Editors: Liang Zhao, Maozu Guo, Lipo Wang. 2009. Tiergartenstrasse 17, Heidelberg, D-69121,Germany: Springer Verlag.

(188)  Wang, G., et al. In-memory checkpointing for MPI programs by XOR-based double-erasure codes. in 16th European Parallel Virtual Machine and Message Passing Interface Users' Group Meeting, EuroPVM/MPI, September 7, 2009 - September 10, 2009. 2009. Espoo, Finland: Springer Verlag.

(189)  Wang, G., et al. Representing X-Code using latin squares

进入实验室博客

相关实验室