Fei Xu

According to our database1, Fei Xu authored at least 217 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Flexible Wireless Dielectric Sensor for Noninvasive Fluid Monitoring.
Sensors, 2020

TiDB: A Raft-based HTAP Database.
Proc. VLDB Endow., 2020

Spiking Neural P Systems with Communication on Request and Polarizations.
Int. J. Unconv. Comput., 2020

Simplified and yet Turing universal spiking neural P systems with polarizations optimized by anti-spikes.
Neurocomputing, 2020

Hierarchical clustering on metric lattice.
Int. J. Intell. Inf. Database Syst., 2020

Fuzzy Interval Number K-Means Clustering for Region Division of Pork Market.
Int. J. Decis. Support Syst. Technol., 2020

Spiking Neural P Systems with Polarizations and Rules on Synapses.
Complex., 2020

Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme.
Comput. Networks, 2020

Affine-periodic solutions for higher order differential equations.
Appl. Math. Lett., 2020

Fuzzy C-Means on Metric Lattice.
Autom. Control. Comput. Sci., 2020

E-LAS: Design and Analysis of Completion-Time Agnostic Scheduling for Distributed Deep Learning Cluster.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

2019
Cost-Effective Cloud Server Provisioning for Predictable Performance of Big Data Analytics.
IEEE Trans. Parallel Distributed Syst., 2019

Another Look at Looking Time: Surprise as Rational Statistical Inference.
Top. Cogn. Sci., 2019

Nonlinear Thermoacoustic Imaging Based on Temperature-Dependent Thermoelastic Response.
IEEE Trans. Medical Imaging, 2019

Cell-like spiking neural P systems with evolution rules.
Soft Comput., 2019

Influence of Spatial Inhomogeneity of Detector Temporal Responses on the Spectral Fidelity in Continuous Wave Cavity Ringdown Spectroscopy.
Sensors, 2019

基于高斯扩散模型的垃圾焚烧废气排放可视化 (Visualization of Solid Waste Incineration Exhaust Emissions Based on Gaussian Diffusion Model).
计算机科学, 2019

基于博弈论的云资源调度算法 (Cloud Resource Scheduling Algorithm Based on Game Theory).
计算机科学, 2019

Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities.
Int. J. Grid Util. Comput., 2019

The Computational Power of Cell-like P Systems with Symport/Antiport Rules and Promoters.
Fundam. Informaticae, 2019

Communication P Systems with Channel States Working in Flat Maximally Parallel Manner.
Fundam. Informaticae, 2019

Breast Anatomy Enriched Tumor Saliency Estimation.
CoRR, 2019

Tumor Saliency Estimation for Breast Ultrasound Images via Breast Anatomy Modeling.
CoRR, 2019

Sequential Spiking Neural P Systems with Local Scheduled Synapses without Delay.
Complex., 2019

Intraventricular blood flow with a fully dynamic mitral valve model.
Comput. Biol. Medicine, 2019

Threshold dynamics of an age-space structured SIR model on heterogeneous environment.
Appl. Math. Lett., 2019

The Computational Approach for the Basic Reproduction Number of Epidemic Models on Complex Networks.
IEEE Access, 2019

Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge Computing.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Cynthia: Cost-Efficient Cloud Resource Provisioning for Predictable Distributed Deep Neural Network Training.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Stage Delay Scheduling: Speeding up DAG-style Data Analytics Jobs with Resource Interleaving.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Content Extraction from Lecture Video via Speaker Action Classification Based on Pose Information.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Effects of Numerical Integration on DLM/FD Method for Solving Interface Problems with Body-Unfitted Meshes.
Proceedings of the Computational Science - ICCS 2019, 2019

Interference and Topology-Aware VM Live Migrations in Software-Defined Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Advanced Hazard Analysis and Risk Assessment in the ISO 26262 Functional Safety Standard Using Rigorous Simulation.
Proceedings of the Cyber Physical Systems. Model-Based Design - 9th International Workshop, 2019

Study of Key Technological Performance Parameters of Carbon-Fiber Infrared Heating Cage.
Proceedings of the Communications, Signal Processing, and Systems, 2019

Chinese Children Learning Higher-Order Generalizations through Free Play: The Influence of Parenting Style.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

Learning the Proportional Nature of Probability from Feedback.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

Leveraging Thinking to Facilitate Causal Learning from Intervention.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

Comparison of Chinese and Western Categorization: Based on Bayesian Model.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

The Impact of Speech Complexity on Preschooler Attention, Speaker Preference, and Learning.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

A Fast Low-Rank Matrix Factorization Method for Dynamic Magnetic Resonance Imaging Restoration.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2018
Optimal Power Allocation in an Amplify-and-Forward Untrusted Relay Network with Imperfect Channel State Information.
Wirel. Pers. Commun., 2018

Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network.
IEEE Trans. Inf. Forensics Secur., 2018

Automatic breast ultrasound image segmentation: A survey.
Pattern Recognit., 2018

Real-time localization in wireless sensor network with multimedia applications.
Multim. Tools Appl., 2018

基于SOM聚类的垃圾处理方式可视化分析方法 (Visual Analysis Method of Garbage Disposal Modes Based on Self-organizing Maps Clustering).
计算机科学, 2018

Global stability of two SIS epidemic mean-field models on complex networks: Lyapunov functional approach.
J. Frankl. Inst., 2018

Systematic analysis and integrative discovery of active-site subpocket-specific dehydroquinate synthase inhibitors combating antibiotic-resistant <i>Staphylococcus aureus</i> infection.
J. Bioinform. Comput. Biol., 2018

A small universal spiking neural P system with communication on request.
Neurocomputing, 2018

Knowledge graph construction with structure and parameter learning for indoor scene design.
Comput. Vis. Media, 2018

A Benchmark for Breast Ultrasound Image Segmentation (BUSIS).
CoRR, 2018

Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network.
IEEE Access, 2018

A General Testing Framework Based on Veins for Securing VANET Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2018

Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

A Hybrid Framework for Tumor Saliency Estimation.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Resource Utilization Analysis of Alibaba Cloud.
Proceedings of the Intelligent Computing Theories and Application, 2018

eBrowser: Making Human-Mobile Web Interactions Energy Efficient with Event Rate Learning.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Whole Number Bias in Children's Probability Judgments.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

Children's Causal Interventions Combine Discrimination and Confirmation.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

The 'Goldilocks Effect' in Preschoolers' Attention to Spoken Language.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

Learning as program induction.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

Grounding Compositional Hypothesis Generation in Specific Instances.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

<i>SKIN+</i>: Fabricating Soft Fluidic User Interfaces for Enhancing On-Skin Experiences and Interactions.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

On Languages Generated by Context-Free Matrix Insertion-Deletion Systems with Exo-Operations.
Proceedings of the Enjoying Natural Computing, 2018

2017
A network attack forensic platform against HTTP evasive behavior.
J. Supercomput., 2017

Design, analysis, and testing of a motor-driven capsule robot based on a sliding clamper.
Robotica, 2017

UFalloc: Towards Utility Max-min Fairness of Bandwidth Allocation for Applications in Datacenter Networks.
Mob. Networks Appl., 2017

Multi-Dimensional Bloom Filter: Design and Evaluation.
IEICE Trans. Inf. Syst., 2017

Spiking Neural P Systems with Rules on Synapses Working in Sum Spikes Consumption Strategy.
Fundam. Informaticae, 2017

Dynamics of virus infection models with density-dependent diffusion.
Comput. Math. Appl., 2017

Game-theoretic Evolutionary Algorithm Based on Behavioral Expectation and its Performance Analysis.
Appl. Artif. Intell., 2017

Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error.
Proceedings of the 26th Wireless and Optical Communication Conference, 2017

A novel beamforming to improve secrecy rate in a DAJ based untrusted relay network.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Optimal Power Allocation to Increase Secure Energy Efficiency in a Two-Way Relay Network.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Real Time Network File Similarity Detection Based on Approximate Matching.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Design for Network File Forensics System Based on Approximate Matching.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

iSpot: Achieving Predictable Performance for Big Data Analytics with Cloud Transient Servers.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Identifying malware with HTTP content type inconsistency via header-payload comparison.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Auto-identification of background traffic based on autonomous periodic interaction.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Is Play Better Than Direct Instruction? Learning About Causal Systems through Play.
Proceedings of the 39th Annual Meeting of the Cognitive Science Society, 2017

Inferring Intentional Agents From Violation of Randomness.
Proceedings of the 39th Annual Meeting of the Cognitive Science Society, 2017

An investigation on electronic nose diagnosis of liver cancer.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Motion Deblurring Based on Convolutional Neural Network.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2017

Cell-Like P Systems with Symport/Antiport Rules and Promoters.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2017

Attention Based LSTM for Target Dependent Sentiment Classification.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

Detecting Review Spammer Groups.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Analysis of the Chaotic Characteristics of Human Colonic Activities and Comparison of Healthy Participants to Costive Subjects.
IEEE J. Biomed. Health Informatics, 2016

Neutro-Connectedness Cut.
IEEE Trans. Image Process., 2016

Heterogeneity and Interference-Aware Virtual Machine Provisioning for Predictable Performance in the Cloud.
IEEE Trans. Computers, 2016

Developing a first course on cyber-physical systems.
SIGBED Rev., 2016

Incremental Computation of Common Windowed Holistic Aggregates.
Proc. VLDB Endow., 2016

基于改进人工势场法的机器人避障及路径规划研究 (Research on Robot Obstacle Avoidance and Path Planning Based on Improved Artificial Potential Field Method).
计算机科学, 2016

Attribute reductions and concept lattices in interval-valued intuitionistic fuzzy rough set theory: Construction and properties.
J. Intell. Fuzzy Syst., 2016

Quantifying Different Tactile Sensations Evoked by Cutaneous Electrical Stimulation Using Electroencephalography Features.
Int. J. Neural Syst., 2016

A Distance-Based Maximum Likelihood Estimation Method for Sensor Localization in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Class of Integer Order and Fractional Order Hyperchaotic Systems via the Chen System.
Int. J. Bifurc. Chaos, 2016

Large scale water entry simulation with smoothed particle hydrodynamics on single- and multi-GPU systems.
Comput. Phys. Commun., 2016

Anti-jamming techniques based on digital multi-beam and robust mode control.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

Unsupervised saliency estimation based on robust hypotheses.
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

Discovering Author Interest Evolution in Topic Modeling.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix.
Proceedings of the Network and System Security - 10th International Conference, 2016

Automated extraction of image-based endmember bundles of impervious layer using iterative classification strategy.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

EISeg: Effective interactive segmentation.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Chaos and wavelet based colonic motility analysis for subjects with constipation.
Proceedings of the 12th International Conference on Natural Computation, 2016

Flipping a first course on cyber-physical systems: an experience report.
Proceedings of the 2016 Workshop on Embedded and Cyber-Physical Systems Education, 2016

Curiosity and Its Influence on Children's Memory.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Probability Prediction in Children with ASD.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Active control of study leads to improved episodic memory in children.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Do Simple Probability Judgments Rely on Integer Approximation?
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Active Overhearing: Development in Preschoolers' Skill at 'Listening in' to Naturalistic Overheard Speech.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Active learning: Cognitive development, education, and computational models.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Interest Profiling for Security Monitoring and Forensic Investigation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Low-Power Wireless Electronic Capsule for Long-Term Gastrointestinal Monitoring.
J. Medical Syst., 2015

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst., 2015

A Series of New Chaotic Attractors via Switched Linear Integer Order and Fractional Order Differential Equations.
Int. J. Bifurc. Chaos, 2015

An algorithm for Left Atrial Thrombi detection using Transesophageal Echocardiography.
CoRR, 2015

S-asymptotically ω-positive periodic solutions for a class of neutral fractional differential equations.
Appl. Math. Comput., 2015

On Improving User Response Times in Tableau.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015


A Privacy-Preserving Encryption Scheme for an Internet Realname Registration System.
Proceedings of the Advances in Digital Forensics XI, 2015

Profiling and Tracking a Cyberlocker Link Sharer in a Public Web Forum.
Proceedings of the Advances in Digital Forensics XI, 2015

A saliency model for automated tumor detection in breast ultrasound images.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

An algorithm based on LBPV and MIL for left atrial thrombi detection using transesophageal echocardiography.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Interference Avoidance Function Research of Spread Spectrum System Using Composite Sequence.
Proceedings of the Genetic and Evolutionary Computing, 2015

When Software Defined Networks Meet Fault Tolerance: A Survey.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Using Rigorous Simulation to Support ISO 26262 Hazard Analysis and Risk Assessment.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

QRToken: Unifying Authentication Framework to Protect User Online Identity.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Achieving Application-Level Utility Max-Min Fairness of Bandwidth Allocation in Datacenter Networks.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Toddlers Learn with Facilitated Play, Not Free Play.
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

Children Learn Better When They Select Their Own Data.
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

Children search for information as efficiently as adults, but seek additional confirmatory evidence.
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

Children and adults differ in their strategies for social learning.
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

Can children balance the size of a majority with the quality of their information?
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

2014
iAware: Making Live Migration of Virtual Machines Interference-Aware in the Cloud.
IEEE Trans. Computers, 2014

A Wireless Capsule System With ASIC for Monitoring the Physiological Signals of the Human Gastrointestinal Tract.
IEEE Trans. Biomed. Circuits Syst., 2014

Managing Performance Overhead of Virtual Machines in Cloud Computing: A Survey, State of the Art, and Future Directions.
Proc. IEEE, 2014

The Generation of a Series of Multiwing Chaotic Attractors Using Integer and Fractional Order Differential Equation Systems.
Int. J. Bifurc. Chaos, 2014

Integer and Fractional Order Multiwing Chaotic Attractors via the Chen System and the Lü System with Switching Controls.
Int. J. Bifurc. Chaos, 2014

Disease Control through Voluntary Vaccination Decisions Based on the Smoothed Best Response.
Comput. Math. Methods Medicine, 2014

Winnowing Double Structure for Wildcard Query in Payload Attribution.
Proceedings of the Information Security - 17th International Conference, 2014

A practical real-time authentication system with Identity Tracking based on mouse dynamics.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Web User Profiling Based on Browsing Behavior Analysis.
Proceedings of the Advances in Digital Forensics X, 2014

Application of parallel fuzzy PID controller in the combined grinding's weighing bin system.
Proceedings of the IEEE International Conference on Information and Automation, 2014

Acquiring Inductive Constraints from Self-Generated Evidence.
Proceedings of the 36th Annual Meeting of the Cognitive Science Society, 2014

A bayesian belief network for data leakage investigation.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

Colonic peristalsis signal extraction and energy analysis based on wavelet analysis.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

Detecting Insider Threat Based on Document Access Behavior Analysis.
Proceedings of the Web Technologies and Applications, 2014

2013
Synchronization and stabilization of Multi-scroll Integer and fractional Order Chaotic attractors Generated using trigonometric Functions.
Int. J. Bifurc. Chaos, 2013

A Coordinated Scheduling Scheme for HSDPA.
IEICE Trans. Commun., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Three-Dimensional Evaluation Model for Network Management System.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Infants' Early Understanding of Coincidences.
Proceedings of the 35th Annual Meeting of the Cognitive Science Society, 2013

When does the majority rule? Preschoolers' trust in majority informants varies by task domain.
Proceedings of the 35th Annual Meeting of the Cognitive Science Society, 2013

Boosting MapReduce with Network-Aware Task Assignment.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Design of an Automatic Rotatory Chair Prototype for BPPV Treatment.
Proceedings of the Social Robotics - 4th International Conference, 2012

Dual role model for question recommendation in community question answering.
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012

Provably-Efficient Job Scheduling for Energy and Fairness in Geographically Distributed Data Centers.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

An implementation of AES algorithm Based on FPGA.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Question-answer topic model for question retrieval in community question answering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

A Category-integrated Language Model for Question Retrieval in Community Question Answering.
Proceedings of the Information Retrieval Technology, 2012

A Cost-Effective Service Composition Method for Mass Customized QoS Requirements.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
The monte carlo database system: Stochastic analysis close to the data.
ACM Trans. Database Syst., 2011

EMG Classification for Application in Hierarchical FES System for Lower Limb Movement Control.
Proceedings of the Intelligent Robotics and Applications - 4th International Conference, 2011

Enhancing the Reliability of SIP Service in Large-Scale P2P-SIP Networks.
Proceedings of the Advances in Grid and Pervasive Computing - 6th International Conference, 2011

Learning individual words and learning about words simultaneously.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

Acquiring Word Learning Biases.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

Young Toddlers' Understanding of Graded Preferences.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

The emergence of probabilistic reasoning in very young infants.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

Correlation Factor Analysis of FEA Model Simplification Methods of Printed Circuit Board.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
MCDB-R: Risk Analysis in the Database.
Proc. VLDB Endow., 2010

Integrating Physical Constraints in Statistical Inference by 11-Month-Old Infants.
Cogn. Sci., 2010

Heterogeneous Multi-layer Wireless Networking for Mobile CPS.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Structures and information acquisition algorithms for three-dimensional flexible tactile sensor.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Surrogate ranking for very expensive similarity queries.
Proceedings of the 26th International Conference on Data Engineering, 2010

Defect Identification by Sensor Network Under Uncertainties.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Turbo-Charging Estimate Convergence in DBO.
Proc. VLDB Endow., 2009

A distributed decision-making mechanism for wireless P2P networks.
J. Commun. Networks, 2009

Global Analysis on n-scroll Chaotic attractors of Modified Chua's Circuit.
Int. J. Bifurc. Chaos, 2009

Global Stabilization and Synchronization of n-scroll Chaotic attractors in a Modified Chua's Circuit with Hyperbolic Tangent Function.
Int. J. Bifurc. Chaos, 2009

Exact solution for nonlinear Schrödinger equation by He's frequency formulation.
Comput. Math. Appl., 2009

Evaluation of two-dimensional ZK-MEW equation using the Exp-function method.
Comput. Math. Appl., 2009

Nonlinearity as a sensitive informative marker in the ENSO model.
Comput. Math. Appl., 2009

Divergence (Runge Phenomenon) for least-squares polynomial approximation on an equispaced grid and Mock-Chebyshev subset interpolation.
Appl. Math. Comput., 2009

E = MC<sup>3</sup>: managing uncertain enterprise data in a cluster-computing environment.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Structural design and simulation research of a novel three-dimensional force tactile sensor.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Individuation, Identification and Object Discovery.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Power Peer-Based Reputation Scheme for Mobile P2P Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

A Group-Based Reputation Mechanism for Mobile P2P Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A Method for Privacy Protection in Location Based Services.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Confidence bounds for sampling-based group by estimates.
ACM Trans. Database Syst., 2008

Contention Resolution - A New Approach to Versatile Subexpressions Sharing in Multiple Constant Multiplications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

An Enhanced Trust Model Based on Reputation for P2P Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

The DBO database system.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

MCDB: a monte carlo approach to managing uncertain data.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

A rational model of preference learning and choice prediction by children.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

An ideal observer model of infant object perception.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

A New Decision-Making Approach for C2C Electronic Trade.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Design of Low-Complexity FIR Filters Based on Signed-Powers-of-Two Coefficients With Reusable Common Subexpressions.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007

Linking Visual Attention and Number Processing in the Brain: The Role of the Temporo-parietal Junction in Small and Large Symbolic and Nonsymbolic Number Comparison.
J. Cogn. Neurosci., 2007

Hamming weight pyramid - A new insight into canonical signed digit representation and its applications.
Comput. Electr. Eng., 2007

Randomized Algorithms for Data Reconciliation in Wide Area Aggregate Query Processing.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Unified Modeling and Analysis based on Petri nets and Pi calculus.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

A Workflow Verification Method Based on Calculus.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Collaboration Business Processes Modeling Based on Petri Nets and Pi Calculus.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

2006
A Common Phenomenon in Chaotic Systems Linked by Time Delay.
Int. J. Bifurc. Chaos, 2006

Absolute Stability of Hopfield Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A new integrated approach to the design of low-complexity FIR filters.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
Contention resolution algorithm for common subexpression elimination in digital filter design.
IEEE Trans. Circuits Syst. II Express Briefs, 2005

I/sup 2/CRA: contention resolution algorithm for intra- and inter-coefficient common subexpression elimination.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
A new contention resolution algorithm for the design of minimal logic depth multiplierless filters.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

HWP: a new insight into canonical signed digit.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A Risk Identification Method of Virtual Enterprise.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Efficient algorithms for common subexpression elimination in digital filter design.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
TMSS: A Task Management and Scheduler System in Cluster for Remote Computing Service.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003


  Loading...