Futian Wang

Orcid: 0000-0003-4181-8485

According to our database1, Futian Wang authored at least 46 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SHADE: Speaker-History-Aware Dialog Generation Through Contrastive and Prompt Learning.
IEEE Trans. Comput. Soc. Syst., April, 2024

2023
Siamese transformer RGBT tracking.
Appl. Intell., November, 2023

Prototype-based Cross-Modal Object Tracking.
CoRR, 2023

Scenario-oriented repetitive project scheduling optimization.
Comput. Aided Civ. Infrastructure Eng., 2023

Multi-Request Data Cache Optimization Strategy in Edge Computing.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

Generic Skeleton Object Detection Framework with Gradient Maps.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

2022
RGBT Tracking via Noise-Robust Cross-Modal Ranking.
IEEE Trans. Neural Networks Learn. Syst., 2022

Electrical Thermal Image Semantic Segmentation: Large-Scale Dataset and Baseline.
IEEE Trans. Instrum. Meas., 2022

Group role assignment strategies in microservices team based on E-CARGO model.
Knowl. Based Syst., 2022

VOCs Leakage Detection Based on Weak Temporal Attention Asymmetric 3D Convolution.
Proceedings of the International Conference on Advanced Robotics and Mechatronics , 2022

2021
DLA+: A Light Aggregation Network for Object Classification and Detection.
Int. J. Autom. Comput., 2021

VTAAN: Visual Tracking with Attentive Adversarial Network.
Cogn. Comput., 2021

Progressive Fusion Network for Safety Protection Detection.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2020
Fault tolerating multi-tenant service-based systems with dynamic quality.
Knowl. Based Syst., 2020

Code Smell Detection Based on Multi-dimensional Software Data and Complex Networks.
Proceedings of the Data Science, 2020

Combining Network Analysis with Structural Matching for Design Pattern Detection.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows.
IEEE Trans. Serv. Comput., 2019

An efficient temporal verification algorithm for intersectant constraints in scientific workflow.
Int. J. High Perform. Comput. Netw., 2019

A Novel Method for Thermal Image Based Electrical-Equipment Detection.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

Cost Optimization Strategy for Long-Term Storage of Scientific Workflow.
Proceedings of the Data Science, 2019

Cost-Effective Edge Server Placement in Edge Computing.
Proceedings of the ICSCC 2019: 5th International Conference on Systems, 2019

A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows.
Proceedings of the Data Science - 6th International Conference, 2019

Deep Adaptive Fusion Network for High Performance RGBT Tracking.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Service recommendation based on quotient space granularity analysis and covering algorithm on Spark.
Knowl. Based Syst., 2018

Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization.
Int. J. Comput. Intell. Syst., 2018

A sufficient and necessary temporal violation handling point selection strategy in cloud workflow.
Future Gener. Comput. Syst., 2018

Resource Leveling Based on Line of Balance and Constraint Programming.
Comput. Aided Civ. Infrastructure Eng., 2018

Scheduling Optimization of Linear Schedule with Constraint Programming.
Comput. Aided Civ. Infrastructure Eng., 2018

Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Sliding-window based Propagation-aware Temporal Verification for Monitoring Parallel Cloud Business Workflows.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
A server selection strategy about cloud workflow based on QoS constraint.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Extracting Software Security Concerns of Problem Frames Based on a Mapping Study.
Proceedings of the 24th Asia-Pacific Software Engineering Conference Workshops, 2017

What is the Further Evidence about UML? - A Systematic Literature Review.
Proceedings of the 24th Asia-Pacific Software Engineering Conference Workshops, 2017

A novel strategy for efficient temporal verification with intersectant situation in scientific workflow.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Workflow temporal verification for monitoring parallel business processes.
J. Softw. Evol. Process., 2016

Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems.
Sci. China Inf. Sci., 2015

Optimizing the Alignment of Inspection Data from Track Geometry Cars.
Comput. Aided Civ. Infrastructure Eng., 2015

An Epidemic Model Based Temporal Violation Prediction Strategy for Large Batch of Parallel Business Cloud Workflows.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
Temporal Verification for Business Cloud Workflows: Open Research Issues.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Throughput based temporal verification for monitoring large batch of parallel processes.
Proceedings of the International Conference on Software and Systems Process 2014, 2014

Logistics scheduling based on cloud business workflows.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

2011
A Novel Description Method for Track Irregularity Evolution.
Int. J. Comput. Intell. Syst., 2011


  Loading...