Lei Fan

Orcid: 0000-0001-9784-5453

Affiliations:
  • Xidian University, School of Computer Science and Technology, Xi'an, China


According to our database1, Lei Fan authored at least 24 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimizing data regeneration and storage with data dependency for cloud scientific workflow systems.
Expert Syst. Appl., March, 2024

Decomposition based cross-parallel multiobjective genetic programming for symbolic regression.
Appl. Soft Comput., 2024

2022
DSoP (1.0).
Dataset, August, 2022

Dataset, June, 2022

The access of this version is closed. The new version can be accessed via https://doi.org/10.5281/zenodo.6650873.
Dataset, June, 2022

Parallelization of multi-trajectory calculation based on Runge-Kutta method.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

Towards task parallelizing in scientific workflow systems.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2016
Improved CTT-SP Algorithm with Critical Path Method for Massive Data Storage in Scientific Workflow Systems.
Int. J. Pattern Recognit. Artif. Intell., 2016

An improved uniform design-based genetic algorithm for multi-objective bilevel convex programming.
Int. J. Comput. Sci. Eng., 2016

A Hybrid Evolutionary Algorithm Based on Dominated Clustering for Constrained Bi-Objective Optimization Problems.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

PSO Based Multiobjective Reliable Optimization Model for Cloud Storage.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Multiobjective bilevel optimization for production-distribution planning problems using hybrid genetic algorithm.
Integr. Comput. Aided Eng., 2014

A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
A new discrete filled function method for finding global minimizer of the integer programming.
Appl. Math. Comput., 2013

An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2011
A filled function method with one parameter for unconstrained global optimization.
Appl. Math. Comput., 2011

Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Grid Independent Task Scheduling Multi-Objective Optimization Model and Genetic Algorithm.
J. Comput., 2010

A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization Problems.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A smoothing evolutionary algorithm based on square search and filled function for global optimization.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary Algorithm.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated Clustering.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...