Jianmin Chen

According to our database1, Jianmin Chen authored at least 19 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Robust collaborative filtering based on non-negative matrix factorization and R1-norm.
Knowl.-Based Syst., 2017

2016
Block thresholding image denoising with dual-tree complex wavelet transform.
Journal of Intelligent and Fuzzy Systems, 2016


2015
Data-driven subspace-based distributed control and its algorithmic convergence.
Proceedings of the 2015 5th Australian Control Conference (AUCC), Gold Coast, 2015

2014
Model-Free Predictive H Control for Grid-Connected Solar Power Generation Systems.
IEEE Trans. Contr. Sys. Techn., 2014

Dynamic spectrum access with packet size adaptation and residual energy balancing for energy-constrained cognitive radio sensor networks.
J. Network and Computer Applications, 2014

A Dynamic Architecture for Mobility Management in Hierarchical Mobile IPv6.
JCP, 2014

2013
A Novel Stream Video Integrity Method.
JCP, 2013

Guided Region-Based GPU Scheduling: Utilizing Multi-thread Parallelism to Hide Memory Latency.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

2012
Primary user behavior estimation with adaptive length of the sample sequence.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Residual energy aware channel assignment in cognitive radio sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Architecture comparisons between Nvidia and ATI GPUs: Computation parallelism and data communications.
Proceedings of the 2011 IEEE International Symposium on Workload Characterization, 2011

Tree structured analysis on GPU power study.
Proceedings of the IEEE 29th International Conference on Computer Design, 2011

Statistical GPU power analysis using tree-based methods.
Proceedings of the 2011 International Green Computing Conference and Workshops, 2011

2010
Weak execution ordering - exploiting iterative methods on many-core GPUs.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2010

2009
cooperative anonymity authentication in vehicular networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

TopDown-KACA: An efficient local-recoding algorithm for k-anonymity.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Ewap: Using Symbolic Execution to Exploit Windows Applications.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Wetrp: A Platform for Recording of Windows Program Execution Traces.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...