Chuan Tang

According to our database1, Chuan Tang authored at least 25 papers between 2011 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
CWLP: coordinated warp scheduling and locality-protected cache allocation on GPUs.
Frontiers of IT & EE, 2018

Locality-protected cache allocation scheme with low overhead on GPUs.
IET Computers & Digital Techniques, 2018

Locality based warp scheduling in GPGPUs.
Future Generation Comp. Syst., 2018

2017
A Flexible Divide-and-Conquer MPSoC Architecture for MIMO Interference Cancellation.
IEEE Trans. VLSI Syst., 2017

Hardware Architecture Based on Parallel Tiled QRD Algorithm for Future MIMO Systems.
IEEE Trans. VLSI Syst., 2017

A Novel Architecture to Eliminate Bottlenecks in a Parallel Tiled QRD Algorithm for Future MIMO Systems.
IEEE Trans. on Circuits and Systems, 2017

Approximate iteration detection with iterative refinement in massive MIMO systems.
IET Communications, 2017

2016
QR decomposition architecture using the iteration look-ahead modified Gram-Schmidt algorithm.
IET Circuits, Devices & Systems, 2016

High Precision Low Complexity Matrix Inversion Based on Newton Iteration for Data Detection in the Massive MIMO.
IEEE Communications Letters, 2016

QRD Architecture Using the Modified ILMGS Algorithm for MIMO Systems.
Proceedings of the Wireless Internet - 9th International Conference, 2016

DroidContext: Identifying Malicious Mobile Privacy Leak Using Context.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Architecture of Parallel Tiled QRD Algorithm for MIMO-OFDM Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Optimization of Two Bottleneck Programs in SAR System on GPGPU.
Proceedings of the Computer Engineering and Technology - 20th CCF Conference, 2016

2015
Channel Estimation in Massive MIMO: Algorithm and Hardware.
Proceedings of the Computer Engineering and Technology - 19th CCF Conference, 2015

A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015

Memory Access Analysis of Many-core System with Abundant Bandwidth.
Proceedings of the IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2015

2014
A multi-level network analysis of web-citations among the world's universities.
Scientometrics, 2014

Determine the Inflow Performance Relationship of Water Producing Gas Well Using Multiobjective Optimization Method.
J. Applied Mathematics, 2014

PeerSorter: Classifying Generic P2P Traffic in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Design of a comprehensive virtual machine monitoring system.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Detecting P2P bots by mining the regional periodicity.
Journal of Zhejiang University - Science C, 2013

Pressure Transient Analysis of Dual Fractal Reservoir.
J. Applied Mathematics, 2013

A Lightweight Design of Malware Behavior Representation.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Niche Improved Particle Swarm Optimization on Geometric Constraint Solving.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011


  Loading...