Dan Meng
Orcid: 0009-0002-9868-5353Affiliations:
- Chinese Academy of Sciences (CAS), Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), China
- University of Chinese Academy of Sciences (UCAS), School of Cyber Security, China
According to our database1,
Dan Meng
authored at least 248 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Cybersecur., December, 2025
An Efficient Speculative Federated Tree Learning System With a Lightweight NN-Based Predictor.
IEEE Trans. Parallel Distributed Syst., August, 2025
CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning.
CoRR, August, 2025
FineGCP: Fine-grained dependency graph community partitioning for attack investigation.
Comput. Secur., 2025
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the MultiMedia Modeling, 2025
Proceedings of the MultiMedia Modeling, 2025
Proceedings of the 52nd Annual International Symposium on Computer Architecture, 2025
Proceedings of the 52nd Annual International Symposium on Computer Architecture, 2025
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head Attention.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025
Jack of All Trades, Master of None: PMP-Guided Adaptive Multi-Teacher Distillation with Meta-Learning.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
LoRATEE: A Secure and Efficient Inference Framework for Multi-Tenant LoRA LLMs Based on TEE.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2025
ET-Former: Robust Transformer-Based Representation for Encrypted Traffic Classification.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator.
Proceedings of the 22nd ACM International Conference on Computing Frontiers, 2025
Proceedings of the 30th Asia and South Pacific Design Automation Conference, 2025
2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks.
ACM Trans. Embed. Comput. Syst., September, 2024
IEEE Trans. Inf. Forensics Secur., 2024
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2024
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
CoRR, 2024
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption.
CoRR, 2024
Proceedings of the 23rd IEEE International Conference on Trust, 2024
MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Analyzing Cache Timing-based Side Channel Vulnerability through Cache Line Composition.
Proceedings of the IEEE Military Communications Conference, 2024
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy.
Proceedings of the IEEE International Performance, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
Proceedings of the Euro-Par 2024: Parallel Processing, 2024
EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
IEEE Trans. Computers, November, 2023
IEEE Trans. Knowl. Data Eng., September, 2023
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption.
IEEE Trans. Parallel Distributed Syst., April, 2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the 41st IEEE International Conference on Computer Design, 2023
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks.
Microprocess. Microsystems, March, 2022
J. Syst. Archit., 2022
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
Cybersecur., 2022
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations.
CoRR, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the SYSTOR '22: The 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE Military Communications Conference, 2022
In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022
Conditional address propagation: an efficient defense mechanism against transient execution attacks.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Very Large Scale Integr. Syst., 2021
IEEE Trans. Computers, 2021
J. Comput. Sci. Technol., 2021
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
ShuffleFL: gradient-preserving federated learning using trusted execution environment.
Proceedings of the CF '21: Computing Frontiers Conference, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Neural Networks Learn. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the 20th IEEE International Conference on Data Mining, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
ACM Trans. Archit. Code Optim., 2019
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 30th British Machine Vision Conference 2019, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
ACM Trans. Comput. Syst., 2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters.
Proceedings of the 17th IEEE International Conference On Trust, 2018
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
2016
High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation.
IEEE Trans. Cybern., 2016
IEEE ACM Trans. Audio Speech Lang. Process., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the International Conference on Computational Science 2016, 2016
TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Database Systems for Advanced Applications, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
J. Supercomput., 2015
SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation.
IEEE Trans. Image Process., 2015
A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization.
IEEE Trans. Cybern., 2015
Secur. Commun. Networks, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Spectral Clustering for Large-Scale Social Networks via a Pre-Coarsening Sampling based NystrÖm Method.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the 10th IEEE International Conference on Networking, 2015
Proceedings of the 44th International Conference on Parallel Processing, 2015
Skyline Query on Anti-correlated Distributions: From the Perspective of Spatial Index.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
J. Comput. Sci. Technol., 2014
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes.
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
Leveraging Deletion Neighborhoods and Trie for Efficient String Similarity Search and Join.
Proceedings of the Information Retrieval Technology, 2014
2013
Int. J. Parallel Emergent Distributed Syst., 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013
2012
A Hardware-Based TCP Stream State Tracking and Reassembly Solution for 10G Backbone Traffic.
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing.
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
2011
J. Parallel Distributed Comput., 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 8th International Conference on Autonomic Computing, 2011
2010
IEEE Micro, 2010
CoRR, 2010
CoRR, 2010
A Case Study for SOA System Rejuvenation.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
2009
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms
CoRR, 2009
CoRR, 2009
Proceedings of the 23rd international conference on Supercomputing, 2009
Precise request tracing and performance debugging for multi-tier services of black boxes.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
2007
Proceedings of the CHINA HPC 2007, 2007
Theory of commercial application management system and its implementation - AMPS.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007
2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Easy and reliable cluster management: the self-management experience of Fire Phoenix.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005
2003
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003
2002
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
2001
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001