Dianwei Han

According to our database1, Dianwei Han authored at least 12 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Parallel DBSCAN Algorithm Using a Data Partitioning Strategy with Spark Implementation.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
A Novel Scalable DBSCAN Algorithm with Spark.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

2013
A parallel strategy for predicting the secondary structure of polycistronic microRNAs.
Int. J. Bioinform. Res. Appl., 2013

2012
MicroRNAfold: pre-microRNA secondary structure prediction based on modified NCM model with thermodynamics-based scoring strategy.
Int. J. Data Min. Bioinform., 2012

2010
A Parallel Algorithm for Predicting the Secondary Structure of Polycistronic MicroRNAs.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

2009
A novel method for MicroRNA secondary structure prediction using a bottom-up algorithm.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
The relationship between the features of sparse matrix and the matrix solving status.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

An online condition number query system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
A comparison of two algorithms for predicting the condition number.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007

Simultaneous Pattern and Data Hiding in Unsupervised Learning.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
Singular value decomposition based data distortion strategy for privacy protection.
Knowl. Inf. Syst., 2006

2005
Data Distortion for Privacy Protection in a Terrorist Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005


  Loading...