Kai Shi

Affiliations:
  • Tianjin University, Department of Computer Science, China


According to our database1, Kai Shi authored at least 16 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Improving Address Clustering in Bitcoin by Proposing Heuristics.
IEEE Trans. Netw. Serv. Manag., December, 2022

2018
Optimal decision for a fuzzy supply chain with shrinkage under VaR criterion.
J. Intell. Fuzzy Syst., 2018

PM-RAD: An Efficient Restore Algorithm in Deduplication by Pattern Matching.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Loop Invariant Generation for Non-monotone Loop Structures.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2016
Extremal graphic model in optimizing fractional repetition codes for efficient storage repair.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reliability Analysis for Software Cluster Systems Based on Proportional Hazard Model.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Enhanced TCP for Optimizing Channel Utilization in Dynamic Spectrum Access Networks.
Int. J. Grid High Perform. Comput., 2015

A Scenario-Based Reliability Analysis Approach for Component-Based Software.
IEICE Trans. Inf. Syst., 2015

2014
A fuzzy waiting time contract for patient's public health care.
J. Intell. Fuzzy Syst., 2014

2013
New pattern erasure codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

2009
A Principal-Agent Method to Prevent Selfish MAC Layer Behavior in Wireless Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Receiver Centric Fuzzy Logic Congestion Control for TCP Throughput Improvement over Wireless Networks.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
RCP throughput modeling and performance improvement.
Proceedings of the 2008 Spring Simulation Multiconference, 2008


  Loading...