Guowei Wu

Orcid: 0000-0002-3929-3598

According to our database1, Guowei Wu authored at least 178 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Utility-aware Privacy Perturbation for Training Data.
ACM Trans. Knowl. Discov. Data, May, 2024

A Handwriting Recognition System With WiFi.
IEEE Trans. Mob. Comput., April, 2024

Wi-Rotate: An Instantaneous Angular Speed Measurement System Using WiFi Signals.
IEEE Trans. Mob. Comput., January, 2024

Maximizing Charging Efficiency With Fresnel Zones.
IEEE Trans. Mob. Comput., January, 2024

More Modalities Mean Better: Vessel Target Recognition and Localization Through Symbiotic Transformer and Multiview Regression.
IEEE Trans. Geosci. Remote. Sens., 2024

Enhancing multi-cloud service deployment with SkyCap: A loss-aware coordinator in sky computing.
Ad Hoc Networks, 2024

2023
Maximizing Energy Efficiency of Period-Area Coverage With a UAV for Wireless Rechargeable Sensor Networks.
IEEE/ACM Trans. Netw., August, 2023

Stable Service Caching in MECs of Hierarchical Service Markets With Uncertain Request Rates.
IEEE Trans. Mob. Comput., July, 2023

Robust Wireless Rechargeable Sensor Networks.
IEEE/ACM Trans. Netw., June, 2023

Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., June, 2023

A Contactless Authentication System Based on WiFi CSI.
ACM Trans. Sens. Networks, May, 2023

Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET.
IEEE Trans. Dependable Secur. Comput., 2023

The Power of Fragmentation: A Hierarchical Transformer Model for Structural Segmentation in Symbolic Music Generation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

An efficient caching security approach for content-centric mobile networks in internet of things systems.
Secur. Priv., 2023

GNN4FR: A Lossless GNN-based Federated Recommendation Framework.
CoRR, 2023

More Perspectives Mean Better: Underwater Target Recognition and Localization with Multimodal Data via Symbiotic Transformer and Multiview Regression.
CoRR, 2023

Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network.
Comput. Secur., 2023

Energy-Efficient Utility Function-Based Channel Resource Allocation and Power Control for D2D Clusters With NOMA Enablement in Cellular Networks.
IEEE Access, 2023

Research on the Routing Method of Swarm Network Based on Moth Search Link Distance and Residual Energy Weights.
IEEE Access, 2023

Charging Dynamic Sensors through Online Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Optimizing The Access Control System for IOTA Tangle: A Game-Theoretic Perspective.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022

Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs.
IEEE/ACM Trans. Netw., 2022

A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing.
IEEE Trans. Intell. Transp. Syst., 2022

Privacy Preservation for Trajectory Publication Based on Differential Privacy.
ACM Trans. Intell. Syst. Technol., 2022

Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network.
IEEE Trans. Dependable Secur. Comput., 2022

Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs.
IEEE Trans. Commun., 2022

The Power of Reuse: A Multi-Scale Transformer Model for Structural Dynamic Segmentation in Symbolic Music Generation.
CoRR, 2022

A Distributed Simulator of Mobile Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

WiLCA: Accelerating Contactless Authentication with Limited Data.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Subset Selection for Hybrid Task Scheduling with General Cost Constraints.
Proceedings of the IEEE INFOCOM 2022, 2022

MDoC: Compromising WRSNs through Denial of Charge by Mobile Charger.
Proceedings of the IEEE INFOCOM 2022, 2022

Precise Wireless Charging in Complicated Environments.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Are You Really Charging Me?
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

GAN-based Differential Privacy Trajectory Data Publishing with Sensitive Label.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Energy-Aware Inference Offloading for DNN-Driven Applications in Mobile Edge Clouds.
IEEE Trans. Parallel Distributed Syst., 2021

Minimizing Charging Delay for Directional Charging.
IEEE/ACM Trans. Netw., 2021

Cooperative Caching in Vehicular Content Centric Network Based on Social Attributes and Mobility.
IEEE Trans. Mob. Comput., 2021

NFV-Enabled IoT Service Provisioning in Mobile Edge Clouds.
IEEE Trans. Mob. Comput., 2021

Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking.
IEEE Trans. Dependable Secur. Comput., 2021

Sensitive Label Privacy Preservation with Anatomization for Data Publishing.
IEEE Trans. Dependable Secur. Comput., 2021

Affinity-Aware VNF Placement in Mobile Edge Clouds via Leveraging GPUs.
IEEE Trans. Computers, 2021

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021

Shrimp: a robust underwater visible light communication system.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Recycling Wasted Energy for Mobile Charging.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

New Dynamic Switch Migration Technique Based on Deep Q-learning.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

Trust-Aware Service Chaining in Mobile Edge Clouds with VNF Sharing.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Efficient Algorithms for Delay-Aware NFV-Enabled Multicasting in Mobile Edge Clouds With Resource Sharing.
IEEE Trans. Parallel Distributed Syst., 2020

QoS-Aware VNF Placement and Service Chaining for IoT Applications in Multi-Tier Mobile Edge Networks.
ACM Trans. Sens. Networks, 2020

Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Enabling Multicast Slices in Edge Networks.
IEEE Internet Things J., 2020

Fault tolerant placement of stateful VNFs and dynamic fault recovery in cloud networks.
Comput. Networks, 2020

Learn to Optimize: Adaptive VNF Provisioning in Mobile Edge Clouds.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Maximizing Charging Utility with Obstacles through Fresnel Diffraction Model.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Cooperative Game for Multiple Chargers with Dynamic Network Topology.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

Learning for Exception: Dynamic Service Caching in 5G-Enabled MECs with Bursty User Demands.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

To Cache or Not to Cache: Stable Service Caching in Mobile Edge-Clouds of a Service Market.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

WiWrite: An Accurate Device-Free Handwriting Recognition System with COTS WiFi.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Learning-based Online Query Evaluation for Big Data Analytics in Mobile Edge Clouds.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Efficient Latency Bound Analysis for Data Chains of Real-Time Tasks in Multiprocessor Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019

Battlefield situation awareness and networking based on agent distributed computing.
Phys. Commun., 2019

Execution allowance based fixed priority scheduling for probabilistic real-time systems.
J. Syst. Softw., 2019

Workload-aware harmonic partitioned scheduling for fixed-priority probabilistic real-time tasks on multiprocessors.
J. Syst. Archit., 2019

Internet of things delay application driven measurement and optimization technology in edge computing environment.
J. Intell. Fuzzy Syst., 2019

Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Commun. Syst., 2019

Double warning thresholds for preemptive charging scheduling in Wireless Rechargeable Sensor Networks.
Comput. Networks, 2019

When Wireless Charging Meets Fresnel Zones: Even Obstacles Can Enhance Charging Efficiency.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

NFV-Enabled Multicasting in Mobile Edge Clouds with Resource Sharing.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Near Optimal Charging Scheduling for 3-D Wireless Rechargeable Sensor Networks with Energy Constraints.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

False-Locality Attack Detection Using CNN in Named Data Networking.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Workload-Aware Harmonic Partitioned Scheduling of Periodic Real-Time Tasks with Constrained Deadlines.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks.
IEEE Trans. Veh. Technol., 2018

GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Veh. Technol., 2018

TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018

OPPC: An Optimal Path Planning Charging Scheme Based on Schedulability Evaluation for WRSNs.
ACM Trans. Embed. Comput. Syst., 2018

Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems.
IEEE Syst. J., 2018

The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs.
Sensors, 2018

Broadcast tree construction framework in tactile internet via dynamic algorithm.
J. Syst. Softw., 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
J. Syst. Softw., 2018

ESLD: An efficient and secure link discovery scheme for software-defined networking.
Int. J. Commun. Syst., 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Commun. Syst., 2018

CFR: A cooperative link failure recovery scheme in software-defined networks.
Int. J. Commun. Syst., 2018

MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

WiAU: An Accurate Device-Free Authentication System with ResNet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

DoS Mitigation Mechanism Based on Non-Cooperative Repeated Game for SDN.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

The Community Characteristic Based Controller Deployment Strategy for SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

Workload-aware harmonic partitioned scheduling for probabilistic real-time systems.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
P<sup>2</sup>S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Veh. Technol., 2017

A probabilistic mix-critical task scheduling algorithm for wireless networked control system.
Int. J. High Perform. Comput. Netw., 2017

Probabilistic energy-aware scheduling for wireless networked control systems.
Comput. Syst. Sci. Eng., 2017

Preserving the Relationship Privacy of the published social-network data based on Compressive Sensing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

2016
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Secur. Commun. Networks, 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
J. Syst. Softw., 2016

GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
J. Syst. Softw., 2016

一种无线网络控制系统的时空实时任务调度算法 (Real Time Scheduling Algorithm for Temporal and Spatial Tasks in Wireless Networked Control Systems).
计算机科学, 2016

TADP: Enabling temporal and distantial priority scheduling for on-demand charging architecture in wireless rechargeable sensor Networks.
J. Syst. Archit., 2016

Differential Privacy Preserving in Big Data Analytics for Connected Health.
J. Medical Syst., 2016

A low-cost node capture attack algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2016

An anonymous authentication scheme in data-link layer for VANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2016

A differential privacy protection scheme for sensitive big data in body sensor networks.
Ann. des Télécommunications, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

Pollution Attack Resistance Dissemination in VANETs Based on Network Coding.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Maximizing destructiveness of node capture attack in wireless sensor networks.
J. Supercomput., 2015

GTRF: A Game Theory Approach for Regulating Node Behavior in Real-Time Wireless Sensor Networks.
Sensors, 2015

Algorithm and Theory for Robust Wireless Sensor Networks 2014.
Int. J. Distributed Sens. Networks, 2015

Probabilistic response-time analysis for real-time systems in body area sensor networks.
Int. J. Commun. Syst., 2015

Protecting source-location privacy based on multirings in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Protecting location privacy and query privacy: a combined clustering approach.
Concurr. Comput. Pract. Exp., 2015

A-CACHE: An anchor-based public key caching scheme in large wireless networks.
Comput. Networks, 2015

A Trust Routing for Multimedia Social Networks.
Comput. J., 2015

Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

EDP: A Wireless Network Control System Energy-Efficient Real-Time Task Scheduling Algorithm.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
A dynamic trust model exploiting the time slice in WSNs.
Soft Comput., 2014

Human mobility in opportunistic networks: Characteristics, models and prediction methods.
J. Netw. Comput. Appl., 2014

SOS: a secure social-aware credit-based stimulating mechanism for BikeNet.
Int. J. Ad Hoc Ubiquitous Comput., 2014

An efficient wormhole attack detection method in wireless sensor networks.
Comput. Sci. Inf. Syst., 2014

Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration.
Comput. J., 2014

2013
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach.
J. Supercomput., 2013

A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Secur. Commun. Networks, 2013

Protecting the sink location privacy in wireless sensor networks.
Pers. Ubiquitous Comput., 2013

A sensitive data aggregation scheme for body sensor networks based on data hiding.
Pers. Ubiquitous Comput., 2013

Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set.
Mob. Networks Appl., 2013

A Fuzzy-based Trust Management in WSNs.
J. Internet Serv. Inf. Secur., 2013

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

An Energy-Aware Multi-Core Scheduler based on Generalized Tit-For-Tat Cooperative Game.
J. Comput., 2012

A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks.
J. Comput., 2012

A Clustering K-Anonymity Scheme for Location Privacy Preservation.
IEICE Trans. Inf. Syst., 2012

A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks
CoRR, 2012

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Life cycle management method for smart grid asset with real option theory.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Risk-based life cycle cost analysis method for transmission systems.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Location Anonymity Based on Fake Queries in Continuous Location-Based Services.
Proceedings of the Seventh International Conference on Availability, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks.
J. Softw., 2011

A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems.
Inf. Technol. Control., 2011

A Biometric Key Establishment Protocol for Body Area Networks.
Int. J. Distributed Sens. Networks, 2011

A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Tree-based Multicast Key Management in ubiquitous computing environment.
Int. J. Ad Hoc Ubiquitous Comput., 2011

ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications.
IET Commun., 2011

A packet buffer evaluation method exploiting queueing theory for wireless sensor networks.
Comput. Sci. Inf. Syst., 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

2010
An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks.
Sensors, 2010

Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks.
Sensors, 2010

Temperature-aware task scheduling algorithm for soft real-time multi-core systems.
J. Syst. Softw., 2010

Decentralized Inter-User Interference Suppression in Body Sensor Networks with Non-cooperative Game
CoRR, 2010

An inter-domain authentication scheme for pervasive computing environment.
Comput. Math. Appl., 2010

An ECG-Based Signal Key Establishment Protocol in Body Area Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

GTFTTS: A Generalized Tit-for-Tat Based Corporative Game for Temperature-Aware Task Scheduling in Multi-core Systems.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Task Allocation and Migration Algorithm for Temperature-Constrained Real-Time Multi-Core Systems.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Group-Based Mobile Agent Routing Protocol for Multitype Wireless Sensor Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

iCare: A Mobile Health Monitoring System for the Elderly.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Leakage-Aware Reallocation for Periodic Real-Time Tasks on Multicore Processors.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
An Improved Method for Induction Motor Constant Current Soft-Starting Using Fuzzy-Control.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2007
A Graph-Theory Algorithm for WCET Estimation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2004
A New WCET Estimation Algorithm Based on Instruction Cache and Prefetching Combined Model.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

2003
A novel frequency domain watermarking algorithm with resistance to geometric distortions and copy attack.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Optimal Detection of Transform Domain Additive Watermark by Using Low Density Diversity.
Proceedings of the Digital Watermarking, First International Workshop, 2002


  Loading...