Li Zhuang

According to our database1, Li Zhuang authored at least 26 papers between 1994 and 2016.

Collaborative distances:



In proceedings 
PhD thesis 




Efficient sparse matrix-vector multiplication using cache oblivious extension quadtree storage format.
Future Generation Comp. Syst., 2016

Binary auto encoding feature for multi-sensor image matching.
Proceedings of the 2016 Fourth International Conference on Ubiquitous Positioning, 2016

Rex: replication at the speed of multi-core.
Proceedings of the Ninth Eurosys Conference 2014, 2014

A Stochastic Knapsack Queuing Model for Capacity Planning in TD-SCDMA System.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Towards better CPU power management on multicore smartphones.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

Failure Recovery: When the Cure Is Worse Than the Disease.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Enabling Security in Cloud Storage SLAs with CloudProof.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

COSC: Combine Optimized Sparse Matrix-Vector Multiplication for CSR Format.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

Nectar: Automatic Management of Data and Computation in Datacenters.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Mobile Learning Applied Research Based on 3G Technology.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

The Systemic Research on the Enterprise Production Planning with Guarantee Period Based on Wagner-Whitin Algorithm.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Injecting Heterogeneity Through Protocol Randomization.
I. J. Network Security, 2007

A Hybrid Handwritten Chinese Address Recognition Approach.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Movie review mining and summarization.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Cashmere: Resilient Anonymous Routing.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

An OCR Post-processing Approach Based on Multi-knowledge.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Keyboard acoustic emanations revisited.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

A Chinese OCR spelling check approach based on statistical language models.
Proceedings of the IEEE International Conference on Systems, 2004

Dynamic Negotiation for Real-Time Manufacturing Execution.
Proceedings of the ICEIS 2004, 2004

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

Video Based Face Recognition By Support Vector Machines.
Proceedings of the 6th Joint Conference on Information Science, 2002

Detection and tracking of facial features under a complex background.
Proceedings of the Human Vision and Electronic Imaging VII, 2002

Acceptance Instant Distributions in Product-Form Closed Queueing Networks with Blocking.
Perform. Eval., 1996

Approximate mean value performance analysis of cyclic queueing networks with production blocking.
Queueing Syst., 1994