Lifeng Wang

According to our database1, Lifeng Wang authored at least 46 papers between 1992 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 




An efficient method based on the second kind Chebyshev wavelets for solving variable-order fractional convection diffusion equations.
Int. J. Comput. Math., 2018

An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm.
IEEE Access, 2018

Distributed data possession provable in cloud.
Distributed and Parallel Databases, 2017

A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft.
J. Network and Computer Applications, 2016

Informative gene selection and the direct classification of tumors based on relative simplicity.
BMC Bioinformatics, 2016

A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Peacock: Learning Long-Tail Topic Features for Industrial Applications.
ACM TIST, 2015

Legendre wavelets method for solving fractional integro-differential equations.
Int. J. Comput. Math., 2015

Accelerating BigBench on Hadoop.
Proceedings of the Big Data Benchmarking, 2015

Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Haar wavelet method for solving fractional partial differential equations numerically.
Applied Mathematics and Computation, 2014

A Novel Trustworthiness Measurement Model for Cloud Service.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system.
Proceedings of the IEEE Computers, 2014

A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints.
Proceedings of the IEEE Computers, 2014

A Trustworthiness Evaluation Framework in Cloud Computing for Service Selection.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Evaluation of e-commerce system trustworthiness using multi-criteria analysis.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2014

Utilizing term proximity for blog post retrieval.
JASIST, 2013

Numerical Solutions of Fractional Integrodifferential Equations of Bratu Type by Using CAS Wavelets.
J. Applied Mathematics, 2013

A Dual-Cycle Architecture in Cognitive M2M Wireless Networks.
IJDSN, 2013

Effective capacity of MIMO MRC system with constant and variable power loading.
Proceedings of the 13th Canadian Workshop on Information Theory, 2013

Service-Oriented Radio Architecture: A Novel M2M Network Architecture for Cognitive Radio Systems.
IJDSN, 2012

A Novel Dynamic Spectrum Management and Sharing Approach for the Secondary Networks.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

An embedding theorem of hypersemigroups in terms of fuzzy sets.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Symbol Error Rate Analysis of MIMO Dual-Hop Amplify-and-Forward Relaying Systems with Transmit and Receive Beamforming.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

An innovative simulation environment for cross-domain policy enforcement.
Simulation Modelling Practice and Theory, 2011

Chaotic differential evolution algorithm based on mixed method for large-scale industrial processes of fuzzy model.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Regularization Method Combined with Parameter Competitive Criterion for Model-Plant Performance Matching of Aircraft Engine.
Proceedings of the Information Computing and Applications, 2011

A general algorithm for uplink opportunistic interference alignment in cellular network.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

A Speed-Adaptive Media Encryption Scheme for Real-Time Recording and Playback System.
EURASIP J. Wireless Comm. and Networking, 2010

New Cluster Detection Based on Multi-Representation Index Tree Text Clustering.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Model-driven simulation for cross-domain policy enforcement.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Research on Differential Evolution Algorithm Based on Interaction Balance Method for Large-Scale Industrial Processes of Fuzzy Model.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

Dynamic Policy Conflict Analysis in Operational Intensive Trust Services for Cross-Domain Federations.
Proceedings of the First International Conference on Intensive Applications and Services, 2009

An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

Generalized minimum-norm perspective shadow maps.
Journal of Visualization and Computer Animation, 2008

Multi-resolution parametric synthesis of manipulative dynamic textures.
Journal of Visualization and Computer Animation, 2008

Interactive Fur Shaping and Rendering Using Nonuniform-Layered Textures.
IEEE Computer Graphics and Applications, 2008

Group SCAD regression analysis for microarray time course gene expression data.
Bioinformatics, 2007

Theory to Practice: Generalized Minimum-Norm Perspective Shadow Maps for Anti-aliased Shadow Rendering in 3D Computer Games.
Proceedings of the Entertainment Computing, 2007

A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

On L_1-Norm Multi-class Support Vector Machines.
Proceedings of the Fifth International Conference on Machine Learning and Applications, 2006

Envisioning Yuan Ming Yuan (Garden of Perfect Brightness).
IEEE Computer Graphics and Applications, 2000

Discretizing continuous neural networks using a polarization learning rule.
Pattern Recognition, 1997

Modelling the Garden of Perfect Brightness.
Comput. Graph. Forum, 1997

Interpolation using the fast discrete sine transform.
Signal Processing, 1992