Chenxi Wang

According to our database1, Chenxi Wang authored at least 45 papers between 1996 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




DELTA: A DEep learning based Language Technology plAtform.
CoRR, 2019

CoRide: Joint Order Dispatching and Fleet Management for Multi-Scale Ride-Hailing Platforms.
CoRR, 2019

Efficient Ridesharing Order Dispatching with Mean Field Multi-Agent Reinforcement Learning.
CoRR, 2019

Feature selection for multi-label learning with missing labels.
Appl. Intell., 2019

Recursive Bayesian-Based Approach for Online Automatic Identification of Generalized Electric Load Models in a Multi-Model Framework.
IEEE Access, 2019

Efficient Ridesharing Order Dispatching with Mean Field Multi-Agent Reinforcement Learning.
Proceedings of the World Wide Web Conference, 2019

Panthera: holistic memory management for big data processing over hybrid memories.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Deep Reinforcement Learning for Ride-sharing Dispatching and Repositioning.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture.
The Journal of Supercomputing, 2018

Online Multi-label Group Feature Selection.
Knowl.-Based Syst., 2018

Attribute reduction for multi-label learning with fuzzy rough set.
Knowl.-Based Syst., 2018

An Attribute Reduction Algorithm Based on the Maximum Dependency and Minimum Redundancy of Attribute.
Proceedings of the 14th International Conference on Natural Computation, 2018

The classification of imbalanced large data sets based on MapReduce and ensemble of ELM classifiers.
Int. J. Machine Learning & Cybernetics, 2017

Influence of linear and nonlinear aerodynamic models on parameter identification for aircraft.
Proceedings of the International Conference on Control, 2017

A Novel Hybrid Error Criterion-Based Active Control Method for on-Line Milling Vibration Suppression with Piezoelectric Actuators and Sensors.
Sensors, 2016

Efficient Management for Hybrid Memory in Managed Language Runtime.
Proceedings of the Network and Parallel Computing, 2016

On the Effect of Fronthaul Latency on ARQ in C-RAN Systems.
CoRR, 2015

Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

Automatic Correspondence Finding for Chinese Characters Using Graph Matching.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Investigation of fluorine containing plasma activation for room-temperature bonding of Si-based materials.
Microelectronics Reliability, 2012

Nanoadhesion layer for enhanced Si-Si and Si-SiN wafer bonding.
Microelectronics Reliability, 2012

A Polyhedral Modeling Based Source-to-Source Code Optimization Framework for GPGPU.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Evaluating the potential of graphics processors for high performance embedded computing.
Proceedings of the Design, Automation and Test in Europe, 2011

Epidemic thresholds in real networks.
ACM Trans. Inf. Syst. Secur., 2008

Self-optimizing distributed trees.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Target Recognition Method of Multi-radar.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

SWorD - A Simple Worm Detection Scheme.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

M2: Multicasting Mixes for Efficient and Anonymous Communication.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Adaptive Detection of Local Scanners.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

Undergraduate embedded system education at Carnegie Mellon.
ACM Trans. Embedded Comput. Syst., 2005

Distributed Construction of a Fault-Tolerant Network from a Tree.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Empirical Analysis of Rate Limiting Mechanisms.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Censorship Resistance Revisited.
Proceedings of the Information Hiding, 7th International Workshop, 2005

A study of mass-mailing worms.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

Dynamic Quarantine of Internet Worms.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Modeling the effects of timing parameters on virus propagation.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Verifiable Secret Redistribution for Archive System.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Protection of Software-Based Survivability Mechanisms.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

On Computer Viral Infection and the Effect of Immunization.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

A new model of security for metasystems.
Future Generation Comp. Syst., 1999

Towards a Scalable PKI for Electronic Commerce Systems.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

A new model of security for distributed systems.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996