Jia Xu

According to our database1, Jia Xu
  • authored at least 196 papers between 1990 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Frameworks for Privacy-Preserving Mobile Crowdsensing Incentive Mechanisms.
IEEE Trans. Mob. Comput., 2018

Soil Moisture Retrieval From SMAP: A Validation and Error Analysis Study Using Ground-Based Observations Over the Little Washita Watershed.
IEEE Trans. Geoscience and Remote Sensing, 2018

Soil Moisture Mapping from Satellites: An Intercomparison of SMAP, SMOS, FY3B, AMSR2, and ESA CCI over Two Dense Network Regions at Different Spatial Scales.
Remote Sensing, 2018

Estimating the crisis information coverage model in the internet communities.
Kybernetes, 2018

Semi-supervised multi-graph classification using optimal feature selection and extreme learning machine.
Neurocomputing, 2018

Learning to See in the Dark.
CoRR, 2018

Achieving adaptive broadcasting performance tradeoff for energy-critical sensor networks: A bottom-up approach.
Computer Networks, 2018

Online Incentive Mechanism for Mobile Crowdsourcing Based on Two-Tiered Social Crowdsourcing Architecture.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Vine Copula-Based Asymmetry and Tail Dependence Modeling.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Virtually Isolated Network: A Hybrid Network to Achieve High Level Security.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Incentivize maximum continuous time interval coverage under budget constraint in mobile crowd sensing.
Wireless Networks, 2017

Wind Turbine Gearbox Failure Identification With Deep Neural Networks.
IEEE Trans. Industrial Informatics, 2017

Efficient Data Collection in Widely Distributed Wireless Sensor Networks with Time Window and Precedence Constraints.
Sensors, 2017

Satellite-Derived Spatiotemporal Variations in Evapotranspiration over Northeast China during 1982-2010.
Remote Sensing, 2017

MODIS-Based Estimation of Terrestrial Latent Heat Flux over North America Using Three Machine Learning Algorithms.
Remote Sensing, 2017

Surface Motion and Structural Instability Monitoring of Ming Dynasty City Walls by Two-Step Tomo-PSInSAR Approach in Nanjing City, China.
Remote Sensing, 2017

FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing.
J. Comput. Sci. Technol., 2017

Differentially Private Event Histogram Publication on Sequences over Graphs.
J. Comput. Sci. Technol., 2017

Vehicle scheduling based on variable trip times with expected on-time performance.
ITOR, 2017

Parallel multi-graph classification using extreme learning machine and MapReduce.
Neurocomputing, 2017

Geo-Hazard Detection and Monitoring Using SAR and Optical Images in a Snow-Covered Area: The Menyuan (China) Test Site.
ISPRS Int. J. Geo-Information, 2017

A New Functional Encryption for Multidimensional Range Query.
IACR Cryptology ePrint Archive, 2017

Fast Image Processing with Fully-Convolutional Networks.
CoRR, 2017

A proof of Hilbert's theorem on ternary quartic forms with the ladder technique.
CoRR, 2017

Accurate Optical Flow via Direct Cost Volume Processing.
CoRR, 2017

Network module-based model in the differential expression analysis for RNA-seq.
Bioinformatics, 2017

Hunter MT: A Course for Young Researchers in WMT17.
Proceedings of the Second Conference on Machine Translation, 2017

Towards Efficient Multimedia Data Disseminating in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

The approach of SWIM data sharing based on multi-dimensional data encryption.
Proceedings of the 25th International Conference on Software, 2017

Parallelization of Conjunctive Query Answering over Ontologies.
Proceedings of the Information Management and Big Data, 2017

Parallelization of Query Processing over Expressive Ontologies.
Proceedings of the 4th Annual International Symposium on Information Management and Big Data, 2017

Incentivizing the Biased Requesters: Truthful Task Assignment Mechanisms in Crowdsourcing.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Mobile Crowd Sensing via Online Communities: Incentive Mechanisms for Multiple Cooperative Tasks.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Delay updating in Software-Defined Datacenter networks.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Topology calibration in data centers.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Fast Image Processing with Fully-Convolutional Networks.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Effects of respiration depth on human body radar cross section Using 2.4GHz continuous wave radar.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Copula-Based High Dimensional Cross-Market Dependence Modeling.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

Accurate Optical Flow via Direct Cost Volume Processing.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

Efficient Online Model Adaptation by Incremental Simplex Tableau.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

Caching-Aware Techniques for Query Workload Partitioning in Parallel Search Engines.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
CATS: Cooperative Allocation of Tasks and Scheduling of Sampling Intervals for Maximizing Data Sharing in WSNs.
TOSN, 2016

CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.
Sensors, 2016

ODMBP: Behavior Forwarding for Multiple Property Destinations in Mobile Social Networks.
Mobile Information Systems, 2016

Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks.
J. Sensors, 2016

Public transit planning and scheduling based on AVL data in China.
ITOR, 2016

Network learning via multi-agent inverse transportation problems.
CoRR, 2016

Optimistic optimization for model predictive control of max-plus linear systems.
Automatica, 2016

Receding-horizon control for max-plus linear systems with discrete actions using optimistic planning.
Proceedings of the 13th International Workshop on Discrete Event Systems, 2016

Explore K-Anycast information dissemination in mobile opportunistic networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Cyber and Physical Access Control in Legacy System Using Passwords.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

TaxiCast: Efficient Broadcasting of Multimedia Advertisements in Vehicular Ad-Hoc Networks.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

On the Power and Limits of Distance-Based Learning.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Efficient similarity join based on Earth Mover's Distance using MapReduce.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Infrared Image Recognition of Bushing Type Cable Terminal Based on Radon and Fourier-Mellin Transform and BP Neural Network.
Proceedings of the Fuzzy Systems and Data Mining II, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

Synchrosqueezing an effective method for analyzing Doppler radar physiological signals.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Wrist-worn heartbeat monitoring system based on bio-impedance analysis.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

DI-DAP: An Efficient Disaster Information Delivery and Analysis Platform in Disaster Management.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Enhancing TPM Security by Integrating SRAM PUFs Technology.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

EMD-DSJoin: Efficient Similarity Join Over Probabilistic Data Streams Based on Earth Mover's Distance.
Proceedings of the Web Technologies and Applications, 2016

Mining user interests from social media by fusing textual and visual features.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

Model predictive control for continuous piecewise affine systems using optimistic optimization.
Proceedings of the 2016 American Control Conference, 2016

Limited Intervention Collaborative Decision Making of MAV-UAV Team Based on VFCM.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Incentive Mechanisms for Time Window Dependent Tasks in Mobile Crowdsensing.
IEEE Trans. Wireless Communications, 2015

Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce.
IEEE Trans. Knowl. Data Eng., 2015

Data-Driven Wind Turbine Power Generation Performance Monitoring.
IEEE Trans. Industrial Electronics, 2015

Online scheduling with equal processing times and machine eligibility constraints.
Theor. Comput. Sci., 2015

On Subgradient Projectors.
SIAM Journal on Optimization, 2015

Improving schedulability and energy efficiency for window-constrained real-time systems with reliability requirement.
Journal of Systems Architecture - Embedded Systems Design, 2015

Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation.
J. Sensors, 2015

On the Finite Convergence of a Projected Cutter Method.
J. Optimization Theory and Applications, 2015

Public engagement with firms on social media in China.
J. Information Science, 2015

Designing Constrained Trajectory Based on Maximizing Energy Reduction in Large-Scale Wireless Sensor Networks.
IJDSN, 2015

Cyber and Physical Access Control in Legacy System Using Passwords.
IACR Cryptology ePrint Archive, 2015

Phrase Based Language Model For Statistical Machine Translation.
CoRR, 2015

A Chaotic Particle Swarm Optimization-Based Heuristic for Market-Oriented Task-Level Scheduling in Cloud Workflow Systems.
Comp. Int. and Neurosc., 2015

Joint number and DOA estimation via the eigen-beam mCapon method for closely spaced sources.
SCIENCE CHINA Information Sciences, 2015

Extreme learning machines: new trends and applications.
SCIENCE CHINA Information Sciences, 2015

Graduate enrollment prediction by an Error Back Propagation algorithm based on the Multi-Experiential Particle Swarm Optimization.
Proceedings of the 11th International Conference on Natural Computation, 2015

Manifold-valued Dirichlet Processes.
Proceedings of the 32nd International Conference on Machine Learning, 2015

Estimation of physiological sub-millimeter displacement with CW Doppler radar.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Document similarity analysis via involving both explicit and implicit semantic couplings.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Learning to segment under various forms of weak supervision.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015

Gaze-enabled egocentric video summarization via constrained submodular maximization.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015

2014
Design of micro-optics array to realize two dimensional perfect shuffle transform.
Optical Switching and Networking, 2014

The Security Evaluation of ATM Information System Based on Bayesian Regularization.
JSW, 2014

Efficient Multicast Routing on BCube-Based Data Centers.
TIIS, 2014

Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptology ePrint Archive, 2014

A Successive Resultant Projection for Cylindrical Algebraic Decomposition.
CoRR, 2014

Converting Instance Checking to Subsumption: A Rethink for Object Queries over Practical Ontologies.
CoRR, 2014

Optimizing the most specific concept method for efficient instance checking.
Proceedings of the 23rd International World Wide Web Conference, 2014

Model Predictive Control for Max-Plus-Linear Systems Via Optimistic Optimization.
Proceedings of the 12th International Workshop on Discrete Event Systems, 2014

Data folding: A new data soft destruction algorithm.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Efficient Graph Similarity Join with Scalable Prefix-Filtering Using MapReduce.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Mirror Data to the Ceiling: A New Completely Wireless Data Center.
Proceedings of the Frontiers in Internet Technologies, 2014

Joint Visual and Textual Mining on Social Media.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Spectral Clustering with a Convex Regularizer on Millions of Images.
Proceedings of the Computer Vision - ECCV 2014, 2014

Tell Me What You See and I Will Show You Where It Is.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

Query Lattice for Translation Retrieval.
Proceedings of the COLING 2014, 2014

An ant colony optimization method to detect communities in social networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

A dynamic taint tracking based method to detect sensitive information leaking.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
Proceedings of the Applied Cryptography and Network Security, 2014

Converting Instance Checking to Subsumption: A Rethink for Object Queries over Practical Ontologies.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Bagging by Design (on the Suboptimality of Bagging).
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Differentially private histogram publication.
VLDB J., 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

Finite-time stability of nonlinear switched impulsive systems.
Int. J. Systems Science, 2013

Optimal Joint Expected Delay Forwarding in Delay Tolerant Networks.
IJDSN, 2013

A Data Transmission Scheme Based on Time-Evolving Meeting Probability for Opportunistic Social Network.
IJDSN, 2013

A Sociability-Based Spray and Forward Scheme for Opportunistic Network.
IJDSN, 2013

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
IACR Cryptology ePrint Archive, 2013

Extract ABox Modules for Efficient Ontology Querying
CoRR, 2013

Existence and nonexistence of positive solutions for nonlocal problems with inhomogeneous strong Allee effect.
Applied Mathematics and Computation, 2013

Salient object detection in image sequences via spatial-temporal cue.
Proceedings of the 2013 Visual Communications and Image Processing, 2013

A Comprehensive Access Control System for Scientific Applications.
Proceedings of the Network and System Security - 7th International Conference, 2013

CRIS - Computational research infrastructure for science.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

GOSUS: Grassmannian Online Subspace Updates with Structured-Sparsity.
Proceedings of the IEEE International Conference on Computer Vision, 2013

Incorporating User Interaction and Topological Constraints within Contour Completion via Discrete Calculus.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Efficient and effective similarity search over probabilistic data based on Earth Mover's Distance.
VLDB J., 2012

Finite-time filtering for discrete-time linear impulsive systems.
Signal Processing, 2012

Multicast Service-Oriented Virtual Network Embedding in Wireless Mesh Networks.
IEEE Communications Letters, 2012

The expansion of real forms on the simplex and applications
CoRR, 2012

Global structure of positive solutions for superlinear second-order periodic boundary value problems.
Applied Mathematics and Computation, 2012

Adaptive Update Workload Reduction for Moving Objects in Road Networks.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

Improving schedulability and energy performance for weakly hard real-time systems.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Differentially Private Histogram Publication.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

EUDEMON: A System for Online Video Frame Copy Detection by Earth Mover's Distance.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Improvement of LEACH protocol for WSN.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

An improved iterative channel estimation based LTE Downlink.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Analyzing the Subspace Structure of Related Images: Concurrent Segmentation of Image Sets.
Proceedings of the Computer Vision - ECCV 2012, 2012

Energy-Efficient Multi-hop Routing Algorithm Based on LEACH.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Survey on Event Processing for CPS.
Proceedings of the Advances in Wireless Sensor Networks, 2012

Random walks based multi-image segmentation: Quasiconvexity results and GPU-based solutions.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

Towards efficient proofs of retrievability.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

A New Balancing Type of Wireless Sensor Network Routing Algorithm.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Towards Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2011

Practically Efficient Proof of Retrievability in Cloud Storage.
IACR Cryptology ePrint Archive, 2011

Secure Cloud Storage with Encrypted Data using File-Based Authentication.
IACR Cryptology ePrint Archive, 2011

Practically Efficient Verifiable Delegation of Polynomial and its Applications.
IACR Cryptology ePrint Archive, 2011

Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage.
IACR Cryptology ePrint Archive, 2011

A Majorization Order on Monomials and Termination of a Successive Difference Substitution Algorithm
CoRR, 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

Bifurcation techniques and positive solutions of discrete Lidstone boundary value problems.
Applied Mathematics and Computation, 2011

DFKI Hybrid Machine Translation System for WMT 2011 - On the Integration of SMT and RBMT.
Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011

A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Enhancing Chinese Word Segmentation Using Unlabeled Data.
Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, 2011

The application research of parametric design in de-airing pug press.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Sequence segmentation for statistical machine translation.
PhD thesis, 2010

Efficient and Effective Similarity Search over Probabilistic Data based on Earth Mover's Distance.
PVLDB, 2010

Authenticating Aggregate Range Queries over Multidimensional Dataset.
IACR Cryptology ePrint Archive, 2010

A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem.
IACR Cryptology ePrint Archive, 2010

Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset.
IACR Cryptology ePrint Archive, 2010

A complete algorithm for determining copositive matrices
CoRR, 2010

Model and analysis of path compression for mobile Ad Hoc networks.
Computers & Electrical Engineering, 2010

Bifurcation from interval and positive solutions for second order periodic boundary value problems.
Applied Mathematics and Computation, 2010

Further Experiments with Shallow Hybrid MT Systems.
Proceedings of the Joint Fifth Workshop on Statistical Machine Translation and MetricsMATR, 2010

A chameleon encryption scheme resistant to known-plaintext attack.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
On Directed Transitive Signature.
IACR Cryptology ePrint Archive, 2009

Short Redactable Signatures Using Random Trees.
IACR Cryptology ePrint Archive, 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

Research on the Maintenance Decision-Making of Cement Concrete Pavement Based on Preventive Maintenance.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Short Redactable Signatures Using Random Trees.
Proceedings of the Topics in Cryptology, 2009

Application on Rotor Vibration Control of SMA Model Based on Multivariate Statistical Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Improved Identification of Differentially Expressed Genes Using Pareto Gene Pruning.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2008
Remote Integrity Check with Dishonest Storage Server.
IACR Cryptology ePrint Archive, 2008

An adaptive clustering routing transition protocol in ad hoc networks.
Computer Communications, 2008

Modeling and Service Capability Evaluation for RFID Complex Event Processing.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Nonlinear Dynamic Characteristics of Traffic Flow based on Continuous Car-following Model with Nonintegral Exponent.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Research on Optimal Control of Vehicle Vibration Based on Semi-Active Suspension System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Optimizing Mechanism for a Polymorphic Tracked Robot.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Remote Integrity Check with Dishonest Storage Server.
Proceedings of the Computer Security, 2008

Bayesian Semi-Supervised Chinese Word Segmentation for Statistical Machine Translation.
Proceedings of the COLING 2008, 2008

Phrase Table Training for Precision and Recall: What Makes a Good Phrase and a Good Phrase Pair?
Proceedings of the ACL 2008, 2008

2007
A software architecture for real-time embedded systems based on pre-run-time scheduling.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Partitioning Parallel Documents Using Binary Segmentation.
Proceedings of the Proceedings on the Workshop on Statistical Machine Translation, 2006

Error Analysis of Statistical Machine Translation Output.
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006

HOPI: A Novel High Order Parametric Interpolation in 2D.
Proceedings of the Eurographics 2006, 2006

2005
Chinese Question Answering using the DLT System at NTCIR 2005.
Proceedings of the Fifth NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2005

The RWTH phrase-based statistical machine translation system.
Proceedings of the 2005 International Workshop on Spoken Language Translation, 2005

Integrated Chinese word segmentation in statistical machine translation.
Proceedings of the 2005 International Workshop on Spoken Language Translation, 2005

2004
Understanding Aspects via Implicit Invocation.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Do We Need Chinese Word Segmentation for Statistical Machine Translation?
Proceedings of the Third Workshop on Chinese Language Processing, 2004

2003
On Inspection and Verification of Software with Timing Requirements.
IEEE Trans. Software Eng., 2003

Making Software Timing Properties Easier to Inspect and Verify.
IEEE Software, 2003

2000
Priority Scheduling Versus Pre-Run-Time Scheduling.
Real-Time Systems, 2000

1993
Correction to "On Satisfying Timing Constraints in Hard-Real-Time Systems''.
IEEE Trans. Software Eng., 1993

On Satisfying Timing Constraints in Hard-Real-Time Systems.
IEEE Trans. Software Eng., 1993

Multiprocessor Scheduling of Processes with Release Times, Deadlines, Precedence, and Exclusion Relations.
IEEE Trans. Software Eng., 1993

1990
Scheduling Processes with Release Times, Deadlines, Precedence, and Exclusion Relations.
IEEE Trans. Software Eng., 1990


  Loading...