Li Zhuang

According to our database1, Li Zhuang authored at least 26 papers between 1994 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Efficient sparse matrix-vector multiplication using cache oblivious extension quadtree storage format.
Future Generation Comp. Syst., 2016

Binary auto encoding feature for multi-sensor image matching.
Proceedings of the 2016 Fourth International Conference on Ubiquitous Positioning, 2016

2014
Rex: replication at the speed of multi-core.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
A Stochastic Knapsack Queuing Model for Capacity Planning in TD-SCDMA System.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Towards better CPU power management on multicore smartphones.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

Failure Recovery: When the Cure Is Worse Than the Disease.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

2011
Enabling Security in Cloud Storage SLAs with CloudProof.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

COSC: Combine Optimized Sparse Matrix-Vector Multiplication for CSR Format.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

2010
Nectar: Automatic Management of Data and Computation in Datacenters.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

2009
Mobile Learning Applied Research Based on 3G Technology.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

The Systemic Research on the Enterprise Production Planning with Guarantee Period Based on Wagner-Whitin Algorithm.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

2008
Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2007
Injecting Heterogeneity Through Protocol Randomization.
I. J. Network Security, 2007

2006
A Hybrid Handwritten Chinese Address Recognition Approach.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Movie review mining and summarization.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

2005
Cashmere: Resilient Anonymous Routing.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

An OCR Post-processing Approach Based on Multi-knowledge.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Keyboard acoustic emanations revisited.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A Chinese OCR spelling check approach based on statistical language models.
Proceedings of the IEEE International Conference on Systems, 2004

Dynamic Negotiation for Real-Time Manufacturing Execution.
Proceedings of the ICEIS 2004, 2004

2003
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

2002
Video Based Face Recognition By Support Vector Machines.
Proceedings of the 6th Joint Conference on Information Science, 2002

Detection and tracking of facial features under a complex background.
Proceedings of the Human Vision and Electronic Imaging VII, 2002

1996
Acceptance Instant Distributions in Product-Form Closed Queueing Networks with Blocking.
Perform. Eval., 1996

1994
Approximate mean value performance analysis of cyclic queueing networks with production blocking.
Queueing Syst., 1994


  Loading...