Chuan Tang

According to our database1, Chuan Tang
  • authored at least 20 papers between 2011 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Locality based warp scheduling in GPGPUs.
Future Generation Comp. Syst., 2018

2017
A Flexible Divide-and-Conquer MPSoC Architecture for MIMO Interference Cancellation.
IEEE Trans. VLSI Syst., 2017

Hardware Architecture Based on Parallel Tiled QRD Algorithm for Future MIMO Systems.
IEEE Trans. VLSI Syst., 2017

A Novel Architecture to Eliminate Bottlenecks in a Parallel Tiled QRD Algorithm for Future MIMO Systems.
IEEE Trans. on Circuits and Systems, 2017

Approximate iteration detection with iterative refinement in massive MIMO systems.
IET Communications, 2017

2016
QR decomposition architecture using the iteration look-ahead modified Gram-Schmidt algorithm.
IET Circuits, Devices & Systems, 2016

High Precision Low Complexity Matrix Inversion Based on Newton Iteration for Data Detection in the Massive MIMO.
IEEE Communications Letters, 2016

DroidContext: Identifying Malicious Mobile Privacy Leak Using Context.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Architecture of Parallel Tiled QRD Algorithm for MIMO-OFDM Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015

Memory Access Analysis of Many-core System with Abundant Bandwidth.
Proceedings of the IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2015

2014
A multi-level network analysis of web-citations among the world's universities.
Scientometrics, 2014

Determine the Inflow Performance Relationship of Water Producing Gas Well Using Multiobjective Optimization Method.
J. Applied Mathematics, 2014

PeerSorter: Classifying Generic P2P Traffic in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Design of a comprehensive virtual machine monitoring system.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Detecting P2P bots by mining the regional periodicity.
Journal of Zhejiang University - Science C, 2013

Pressure Transient Analysis of Dual Fractal Reservoir.
J. Applied Mathematics, 2013

A Lightweight Design of Malware Behavior Representation.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Niche Improved Particle Swarm Optimization on Geometric Constraint Solving.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011


  Loading...