Dongdai Zhou

Orcid: 0000-0002-2338-5164

According to our database1, Dongdai Zhou authored at least 29 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Modeling Balanced Explicit and Implicit Relations with Contrastive Learning for Knowledge Concept Recommendation in MOOCs.
CoRR, 2024

2021
Joint resource allocation for emotional 5G IoT systems using deep reinforcement learning.
Int. J. Mach. Learn. Cybern., 2021

2020
Interference Analysis of Co-Located Container Workloads: A Perspective from Hardware Performance Counters.
J. Comput. Sci. Technol., 2020

2019
A Decision Function Based Smart Charging and Discharging Strategy for Electric Vehicle in Smart Grid.
Mob. Networks Appl., 2019

A non-group parallel frequent pattern mining algorithm based on conditional patterns.
Frontiers Inf. Technol. Electron. Eng., 2019

Incremental Association Rule Mining Based on Matrix Compression for Edge Computing.
IEEE Access, 2019

Energy-Efficient Joint Resource Allocation Algorithms for MEC-Enabled Emotional Computing in Urban Communities.
IEEE Access, 2019

Joint Trajectory-Task-Cache Optimization in UAV-Enabled Mobile Edge Networks for Cyber-Physical System.
IEEE Access, 2019

2018
MapSense: Mitigating Inconsistent WiFi Signals Using Signal Patterns and Pathway Map for Indoor Positioning.
IEEE Internet Things J., 2018

2017
An affinity analysis based CIM-to-PIM transformation.
Multiagent Grid Syst., 2017

Emergency Travel Plan Generation Based on Cybernetics.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Content-Based Phishing Email Detection Method.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Executable Domain-Specific Modelling Based on Domain Spaces.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Real-Time Dynamic Pricing Algorithm for Smart Grid With Unstable Energy Providers and Malicious Users.
IEEE Internet Things J., 2016

An adaptive load balancing application for software-defined enterprise WLANs.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
An elastic resource allocation algorithm enabling wireless network virtualization.
Wirel. Commun. Mob. Comput., 2015

E-learning-Oriented Software Architecture Design and Case Study.
Int. J. Emerg. Technol. Learn., 2015

Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream.
Ad Hoc Networks, 2015

2014
Fair and Efficient Spectrum Resource Allocation and Admission Control for Multi-user and Multi-relay Cellular Networks.
Wirel. Pers. Commun., 2014

2013
Optimal power control for wireless cooperative relay networks: a cooperative game theoretic approach.
Int. J. Commun. Syst., 2013

2012
The Study of Item Selection Method in CAT.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

2010
A service composition approach based on sequence mining for migrating e-learning legacy system to SOA.
Int. J. Autom. Comput., 2010

The Content Balancing Method for Item Selection in CAT.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

A Model-Driven Architecture Approach for Developing E-Learning Platform.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

A SOA Based Approach to User-Oriented System Migration.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2008
The improvement and implementation in the algorithm of finding maximal motifs in DNA sequences.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

The Design of Software Architecture for E-Learning Platforms.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2008

2005
An Agent Based Education Resource Purvey System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2003
Data Securing through Rule-Driven Mobile Agents and IPsec.
Proceedings of the Advances in Web-Age Information Management, 2003


  Loading...