Lihua Wu

According to our database1, Lihua Wu authored at least 35 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Parametric multi-soliton solutions of a generalized Harry-Dym type equation.
Appl. Math. Lett., 2021

2020
A method of automatically generating initial parameters for large-scale belief rule base.
Knowl. Based Syst., 2020

2019
A self-adaptive correction method for perspective distortions of image.
Frontiers Comput. Sci., 2019

Soliton solutions to the Novikov equation and a negative flow of the Novikov hierarchy.
Appl. Math. Lett., 2019

Optimization path for total factor carbon productivity in Beijing-Tianjin-Hebei.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

2018
Data-Driven Cell Zooming for Large-Scale Mobile Networks.
IEEE Trans. Netw. Serv. Manag., 2018

2017
Darboux transformation and explicit solutions to the generalized TD equation.
Appl. Math. Lett., 2017

2016
SDN-Based Application Framework for Wireless Sensor and Actor Networks.
IEEE Access, 2016

User interest acquisition by adding home and work related contexts on mobile big data analysis.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
TDOCP: A two-dimensional optimization integrating channel assignment and power control for large-scale WLANs with dense users.
Ad Hoc Networks, 2015

Understanding Access Stability and Mobility Patterns of Mobile Internet Users.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Algebro-geometric Quasi-periodic Solutions to the Three-Wave Resonant Interaction Hierarchy.
SIAM J. Math. Anal., 2014

Long tail and small world characteristic of mobile internet traffic dynamics.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

2013
Quasi-periodic Solutions of the Kaup-Kupershmidt Hierarchy.
J. Nonlinear Sci., 2013

The full positive flows of Manakov hierarchy, Hamiltonian structures and conservation laws.
Appl. Math. Comput., 2013

2012
Characterizations of one-way general quantum finite automata.
Theor. Comput. Sci., 2012

Entropy, Similarity Measure, Inclusion Measure of Intuitionistic Fuzzy Sets and Their Relationships.
Int. J. Comput. Intell. Syst., 2012

Automata theory based on complete residuated lattice-valued logic: Turing machines.
Fuzzy Sets Syst., 2012

A practical approach to topic detection based on credible association rule mining.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

Information Entropy, Similarity Measure and Inclusion Measure of Intuitionistic Fuzzy Sets.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
PRIS at TREC 2011 Legal Track Discovery Based on Relevant Feedback.
Proceedings of The Twentieth Text REtrieval Conference, 2011

Immune Gravitation Inspired Optimization Algorithm.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Qualitative Modeling for Parallel Software System Reliability Evaluation.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

Research of the Computer Virus Evolution Model Based on Immune Genetic Algorithm.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Automata theory based on complete residuated lattice-valued logic: Reduction and minimization.
Fuzzy Sets Syst., 2010

A new super-extension of the KdV hierarchy.
Appl. Math. Lett., 2010

Immunity-Based Model for Malicious Code Detection.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
On mathematical theory of the duality computers.
Quantum Inf. Process., 2009

A Novel MHC-Inspired Approach for Malicious Code Detection.
Proceedings of the Software Engineering Research, 2009

MHC-inspired Antibody Clone Algorithm for Multimodal Function Optimization.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

A Personalized Intelligent Web Retrieval System Based on the Knowledge-Base Concept and Latent Semantic Indexing Model.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

2007
Observation Reduction for Strong Plans.
Proceedings of the IJCAI 2007, 2007


  Loading...