Guohua Liu

According to our database1, Guohua Liu authored at least 68 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network.
Wireless Networks, 2018

Microsphere rapid positioning and contour evaluation in a microvisual environment.
J. Electronic Imaging, 2018

Finding Group-Based Skyline over a Data Stream in the Sensor Network.
Information, 2018

Bandwidth enhancement of three-device Doherty power amplifier based on symmetric devices.
IEICE Electronic Express, 2018

Highly Sensing Characteristics of Gold Nanorings Based on DDA Analysis.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

Serialization of Lifecycles in ACBP Model as Regular Expressions.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Community-Based Matrix Factorization Model for Recommendation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Matching Algorithm of Composite Service Based on Indexing Mechanism in BPM.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Multi-dimensional Regression for Colour Prediction in Pad Dyeing.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Temporal Collaborative Filtering Algorithm Based on Purchase Cycle.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Distributed sampling rate allocation for data quality maximization in rechargeable sensor networks.
J. Network and Computer Applications, 2017

Top-k keyword search with recursive semantics in relational databases.
IJCSE, 2017

A Doherty power amplifier with extended efficiency and bandwidth.
IEICE Electronic Express, 2017

A hybrid index for temporal big data.
Future Generation Comp. Syst., 2017

Virtual network embedding with pre-transformation and incentive convergence mechanism.
Concurrency and Computation: Practice and Experience, 2017

A GRADE Requirements Engineering Management Model Based on the Co-creation of Value.
Proceedings of the Learning Technology for Education Challenges, 2017

Change detection in hyperspectral imagery based on spectrally-spatially regularized low-rank matrix decomposition.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Querying big data from a database perspective.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Incomplete relation revision method based on template.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Fiber image classification using convolutional neural networks.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Anomaly detection methods for bankruptcy prediction.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Finding Compositional Skyline Based on Sharing Strategy.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

3D Matrix-Based Visualization System of Association Rules.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
One Cloud Computing Node In One IP.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

Delay-Constrained Least-Energy-Consumption Multicast Routing Based on Heuristic Genetic Algorithm in Unreliable Wireless Networks.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2015
Design and fabrication of ultra-wideband power amplifier based on GaN HEMT.
IEICE Electronic Express, 2015

A Novel Method for Virtual Network Embedding with Incentive Convergence Mechanism.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Solution to Global Minimization of Polynomials by Backward Differential Flow.
J. Optimization Theory and Applications, 2014

On Box Constrained Concave Quadratic Optimization.
J. Optimization Theory and Applications, 2014

Solution to optimal control by canonical differential equation.
Int. J. Control, 2014

Complexity of Constructing FSM Model of Artifact Lifecycle.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Maximum-Lifetime Least-Cost Multicasting in MANETs based on Heuristic Genetic Algorithm.
Proceedings of the Intelligent Systems and Applications, 2014

The Kernel of Lab Intelligent Management System in University.
Proceedings of the Enterprise Systems Conference, 2014

Diversifying Results of Top-k Querys over Bounded Regions.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Multi-user Preferences Based Top-k Query Processing Algorithm.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Verification of Artifact Lifecycle Model.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

On Modeling and Querying of Text Corpora.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Relating weight constraint and aggregate programs: Semantics and representation.
TPLP, 2013

Fabrication of stable silver nanoparticles through a green approach.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Introducing Real Variables and Integer Objective Functions to Answer Set Programming.
Proceedings of the Declarative Programming and Knowledge Management, 2013

2012
Answer Set Programming via Mixed Integer Programming.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Thirteenth International Conference, 2012

Finding the Provenance of k-anonymous Data and Adding It to Association-rule Mining.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Level Mapping Induced Loop Formulas for Weight Constraint and Aggregate Logic Programs.
Fundam. Inform., 2011

Strong Equivalence of Logic Programs with Abstract Constraint Atoms.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2011

ARHCI: use input and output of eyes to interact with things.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Similarity Matching over Uncertain Time Series.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Modeling the Uncertain Data in the K-anonymity Privacy Protection Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

The Classification of k-anonymity Data.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Level Mapping Induced Loop Formulas for Weight Constraint and Aggregate Logic Programs.
Fundam. Inform., 2010

ESM: An Extended Schema Matching Method between Database Schemas.
Proceedings of the International Conference on E-Business and E-Government, 2010

Negative ESD robustness of a novel anti-ESD TGFPTD SOI LDMOS.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
Level Mapping Induced Loop Formulas for Weight Constraint and Aggregate Programs.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2009

Automated Realization of Business Workflow Specification.
Proceedings of the Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops, 2009

Creating the Cryptograph Index by Query Frequencies in DAS Models.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
The Study of Enhancing Authenticity of Cloth Surface Intersection Processing.
Proceedings of the PACIIA 2008, 2008

Lparse Programs Revisited: Semantics and Representation of Aggregates.
Proceedings of the Logic Programming, 24th International Conference, 2008

K-MSD-WGT: A Local Recoding Algorithm Capturing Attribute Preferences.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Loop Formulas for Logic Programs with Arbitrary Constraint Atoms.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
Logic Programs with Abstract Constraints: Representaton, Disjunction and Complexities.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2007

On the Effectiveness of Looking Ahead in Search for Answer Sets.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2007

Adaptive Lookahead for Answer Set Computation.
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), 2007

2006
Research on Multiple Queries Processing Technology in Wide Area Sensor Databases.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

Research of the Query Technology in Wide Area Sensor Databases.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

2005
Lookahead in Smodels Compared to Local Consistencies in CSP.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2005

2003
A Novel System for Publishing Relational Data in XML Based on ER-DTD Method.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2000
A Graph-Theoretic Approach for Recognizing the User Interpretation without Conflicts.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...