Feng Xie

According to our database1, Feng Xie authored at least 113 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Justification of Prandtl Ansatz for MHD Boundary Layer.
SIAM J. Math. Analysis, 2019

RGB-D image saliency detection from 3D perspective.
Multimedia Tools Appl., 2019

Research on the pixel-based and object-oriented methods of urban feature extraction with GF-2 remote-sensing images.
CoRR, 2019

Multiple scattering using machine learning.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2019

Truthful Mechanism Design of Reversed Auction on Cloud Computing.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

2018
Multiple scattering from distributions of specular v-grooves.
ACM Trans. Graph., 2018

Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis.
IEEE Trans. Information Forensics and Security, 2018

Global-in-Time Stability of 2D MHD Boundary Layer in the Prandtl-Hartmann Regime.
SIAM J. Math. Analysis, 2018

Hyperspectral Features of Oil-Polluted Sea Ice and the Response to the Contamination Area Fraction.
Sensors, 2018

Sequences with Low-Discrepancy Blue-Noise 2-D Projections.
Comput. Graph. Forum, 2018

Embedded Software Fault Prediction Based on Back Propagation Neural Network.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Co-saliency Detection for RGBD Images Based on Multi-constraint Superpixels Matching and Co-cellular Automata.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Predicting Freezing of WebRTC Videos in WiFi Networks.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Physically based shading in theory and practice.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2017

DreamWorks fabric shading model: from artist friendly to physically plausible.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2017

An efficient kurtosis-based causal discovery method for linear non-Gaussian acyclic data.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Vectorized production path tracing.
Proceedings of High Performance Graphics, 2017

2016
A Novel Test Method for Metallic CNTs in CNFET-Based SRAMs.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2016

Learning patterns of states from multi-channel time series using genetic programming.
Soft Comput., 2016

The system of knowledge management using web based learning and education technology.
Comput. Syst. Sci. Eng., 2016

Stability of Dynamic Quantized UAV Airborne System with Packet Losses and Time-Varying Delay.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Recognizing Visual Attention Allocation Patterns Using Gaze Behaviors.
Proceedings of the Social Computing, 2016

Selective Redundant Transmissions for Real-Time Video Streaming over Multi-Interface Wireless Terminals.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Design and Evaluation of a WiFi-Direct Based LTE Cooperative Video Streaming System.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Local Well-Posedness of Prandtl Equations for Compressible Flow in Two Space Variables.
SIAM J. Math. Analysis, 2015

Nonrelativistic Limit of the Compressible Navier-Stokes-Fourier-P1 Approximation Model Arising in Radiation Hydrodynamics.
SIAM J. Math. Analysis, 2015

A link prediction approach for item recommendation with complex number.
Knowl.-Based Syst., 2015

Semantic Based Annotation for Surveillance Big Data Using Domain Knowledge.
IJCINI, 2015

Cell and user virtualization for ultra dense network.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Jump test for metallic CNTs in CNFET-based SRAM.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Item Similarity Learning Methods for Collaborative Filtering Recommender Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Adaptive subcarrier-distribution algorithm for routing and spectrum allocation in OFDM-based elastic optical networks.
Photonic Network Communications, 2014

Grey Forecast model for accurate recommendation in presence of data sparsity and correlation.
Knowl.-Based Syst., 2014

Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
IJDSN, 2014

A Real-Time Detecting Algorithm for Tracking Community Structure of Dynamic Networks.
CoRR, 2014

A Link Prediction Approach for Item Recommendation with Complex Number.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

Importance sampling for a microcylinder based cloth bsdf.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2014

Learning Patterns of States in Time Series by Genetic Programming.
Proceedings of the Simulated Evolution and Learning - 10th International Conference, 2014

Genetic Programming for Channel Selection from Multi-stream Sensor Data with Application on Learning Risky Driving Behaviours.
Proceedings of the Simulated Evolution and Learning - 10th International Conference, 2014

How Overlapping Community Structure Affects Epidemic Spreading in Complex Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014

Genetic programming based activity recognition on a smartphone sensory data benchmark.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
A Note on Lower Bounds for Colourful Simplicial Depth.
Symmetry, 2013

A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks.
CoRR, 2013

Mobile relay in LTE-advanced systems.
IEEE Communications Magazine, 2013

3DScapeCS: application of three dimensional, parallel, dynamic network visualization in Cytoscape.
BMC Bioinformatics, 2013

Evolving PCB visual inspection programs using genetic programming.
Proceedings of the 28th International Conference on Image and Vision Computing New Zealand, 2013

Security Testing Methods and Techniques of Industrial Control Devices.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Using information theory to measure call site information of system call in anomaly detection.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Human Action Recognition from Multi-Sensor Stream Data by Genetic Programming.
Proceedings of the Applications of Evolutionary Computation - 16th European Conference, 2013

Detecting PCB component placement defects by genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Activity recognition by smartphone based multi-channel sensors with genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Sensor-based activity recognition with improved GP-based classifier.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Learning Risky Driver Behaviours from Multi-Channel Data Streams Using Genetic Programming.
Proceedings of the AI 2013: Advances in Artificial Intelligence, 2013

2012
Computational Lower Bounds for Colourful Simplicial Depth
CoRR, 2012

ISHair: Importance Sampling for Hair Scattering.
Comput. Graph. Forum, 2012

ISHair: importance sampling for hair scattering.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2012

Designated Verifier Signature Scheme over Circulant Matrices.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A New Detection Algorithm of Moving Objects Based on Human Morphology.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

High Speed Traffic Archiving System for Flow Granularity Storage and Querying.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Event detection in time series by genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

Evolving frame splitters by Genetic Programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

A risk management framework for cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Evolving Event Detectors in Multi-channel Sensor Data.
Proceedings of the AI 2012: Advances in Artificial Intelligence, 2012

Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Learning Time Series Patterns by Genetic Programming.
Proceedings of the Thirty-Fifth Australasian Computer Science Conference, 2012

2011
Singular Limit to Strong Contact Discontinuity for a 1D Compressible Radiation Hydrodynamics Model.
SIAM J. Math. Analysis, 2011

More Colourful Simplices.
Discrete & Computational Geometry, 2011

Evolving automatic frame splitters.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Small Octahedral Systems.
Proceedings of the 23rd Annual Canadian Conference on Computational Geometry, 2011

2010
Design and Implementation of Highway Management System Based WebGIS.
JNW, 2010

On the generalized Berge sorting conjecture.
J. Discrete Algorithms, 2010

K-way min-max cut for image clustering and junk images filtering from Google images.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Sparse Bayesian learning mechanism for research of audible noise in UHV transmission project.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Massively Parallel Constraint Programming for Supercomputers: Challenges and Initial Results.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 2010

2009
Topological evolution of surface transportation networks.
Computers, Environment and Urban Systems, 2009

Privacy Aware Engineering: A Case Study.
JSW, 2009

Stabilization of Nonholonomic Robot Formations: A First-state Contractive Model Predictive Control Approach.
CIT, 2009

Trust and Privacy in Dissemination Control.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Diameter and Curvature: Intriguing Analogies.
Electronic Notes in Discrete Mathematics, 2008

Global existence and asymptotic behavior of weak solutions to the 1D compressible Navier-Stokes equations with degenerate viscosity coefficient.
Asymptotic Analysis, 2008

A Study of Consumer Trust Formation in Electronic-Commerce.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Configurable Web Service Performance Testing Framework.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

A New Approach to Network Anomaly Attack Detection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Soft Shadows by Ray Tracing Multilayer Transparent Shadow Maps.
Proceedings of the Eurographics Symposium on Rendering Techniques, Grenoble, France, 2007, 2007

A Training Oriented Driving Simulator.
Proceedings of the Entertainment Computing, 2007

2006
The impact of loss recovery on congestion control for reliable multicast.
IEEE/ACM Trans. Netw., 2006

Study on nominee selection for multicast congestion control.
Computer Communications, 2006

The persistence of canards in 3-D singularly perturbed systems with two fast variables.
Asymptotic Analysis, 2006

Detecting Novel Network Attacks with a Data Field.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Using Data Field to Analyze Network Intrusions.
Proceedings of the Information Security Practice and Experience, 2006

Optimizing Caching Policy for Loss Recovery in Reliable Multicast.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Clustering and Classification Based Anomaly Detection.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

Network Anomalous Attack Detection Based on Clustering and Classifier.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Estimating Illumination Parameters in Real Space with Application to Image Relighting.
Proceedings of the Computer Vision, 2006

2005
Canard Phenomena in Oscillations of a Surface Oxidation Reaction.
J. Nonlinear Science, 2005

Registering multiple range images based on distance metric of surface-to-surface.
Science in China Series F: Information Sciences, 2005

Estimating illumination parameters in real space with application to image relighting.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

The effects of NAK-based loss recovery mechanism on window-based multicast congestion control.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Steady-state analysis of a split-connection scheme for internet access through a wireless terminal.
IEEE/ACM Trans. Netw., 2004

Buffer management for local loss recovery of reliable multicast.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Evaluation of a Split-Connection Mobile Transport Protocol.
Wireless Networks, 2003

Joint local loss recovery and congestion control for reliable multicast.
Proceedings of the Global Telecommunications Conference, 2003

2001
A Face Verification Algorithm Integrating Geometrical and Template Features.
Proceedings of the Advances in Multimedia Information Processing, 2001

Kinetic Collision Detection: Algorithms and Experiments.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001

1999
Adaptive Hierarchical Visibility in a Tiled Architecture.
Proceedings of the 1999 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, 1999


  Loading...