Qi He

According to our database1, Qi He
  • authored at least 98 papers between 1998 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Multiplicative Update of Auto-Regressive Gains for Codebook-Based Speech Enhancement.
IEEE/ACM Trans. Audio, Speech & Language Processing, 2017

A Multi-Objective Partition Method for Marine Sensor Networks Based on Degree of Event Correlation.
Sensors, 2017

Another pedagogy for pure-integer Gomory.
RAIRO - Operations Research, 2017

Compressive Channel Estimation and Multi-user Detection in C-RAN.
CoRR, 2017

NEMO: Next Career Move Prediction with Contextual Embedding.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Robust Optimization for Energy Efficiency in Multicast Downlink C-RAN.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Multi-objective balanced partitioning method for marine sensor network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

DeepEddy: A simple deep architecture for mesoscale oceanic eddy detection in SAR images.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Compressive channel estimation and multi-user detection in C-RAN.
Proceedings of the IEEE International Conference on Communications, 2017

2016
It takes two to tango: Exploring social tie development with both online and offline interactions.
Statistical Analysis and Data Mining, 2016

An iteratively reweighted method for recovery of block-sparse signal with unknown block partition.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Multiplicative update of AR gains in codebook-driven speech enhancement.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Scene Classification in High Resolution Remotely Sensed Images Based on PCANet.
Proceedings of the Web Technologies and Applications, 2016

2015
Tweet Segmentation and Its Application to Named Entity Recognition.
IEEE Trans. Knowl. Data Eng., 2015

System Identification Under Regular, Binary, and Quantized Observations: Moderate Deviations Error Bounds.
IEEE Trans. Automat. Contr., 2015

Minimization of ℓ1-2 for Compressed Sensing.
SIAM J. Scientific Computing, 2015

Computing Sparse Representation in a Highly Coherent Dictionary Based on Difference of L1 and L2.
J. Sci. Comput., 2015

Mining strong relevance between heterogeneous entities from unstructured biomedical data.
Data Min. Knowl. Discov., 2015

Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

Personalizing LinkedIn Feed.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Codebook-based speech enhancement using Markov process and speech-presence probability.
Proceedings of the INTERSPEECH 2015, 2015

Research on Data Calibration Model for the Working State Detection About Traffic Sound Barrier.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

A gain-adaptive parallel HMM for speech enhancement.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Task Trail: An Effective Segmentation of User Search Behavior.
IEEE Trans. Knowl. Data Eng., 2014

Introduction to the Special Issue on Linking Social Granularity and Functions.
ACM TIST, 2014

Using priced timed automaton to analyse the energy consumption in cloud computing environment.
Cluster Computing, 2014

Large deviations for multi-scale Markovian switching systems with a small diffusion.
Asymptotic Analysis, 2014

It Takes Two to Tango: Exploring Social Tie Development with Both Online and Offline Interactions.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Activity ranking in LinkedIn feed.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Distributed Graph Summarization.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Sociality-Aware Access Point Selection in Enterprise Wireless LANs.
IEEE Trans. Parallel Distrib. Syst., 2013

Exploiting hybrid contexts for Tweet segmentation.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Moderate Deviations Analysis for System Identification under Regular and Binary Observations.
Proceedings of the SIAM Conference on Control and its Applications, 2013

Detecting Runtime Business Process Compliance with Artifact Lifecycles.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

A randomly perturbed infomax algorithm for blind source separation.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Real-time urban traffic information estimation with a limited number of surveillance cameras.
Frontiers of Computer Science, 2012

Prospective Client Driven Technology Recommendation.
Proceedings of the 2012 Annual SRII Global Conference, San Jose, CA, USA, July 24-27, 2012, 2012

TwiNER: named entity recognition in targeted twitter stream.
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012

Event-based social networks: linking the online and offline social worlds.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Recognizing Valid Artifacts in Business Processes.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

A scalable approach for performing proximal search for verbose patent search queries.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Large Deviations for Two-Time-Scale Systems Driven by Nonhomogeneous Markov Chains and Associated Optimal Control Problems.
SIAM J. Control and Optimization, 2011

Invariant density, Lapunov exponent, and almost sure stability of Markovian-regime-switching linear systems.
J. Systems Science & Complexity, 2011

Citation recommendation without author supervision.
Proceedings of the Forth International Conference on Web Search and Web Data Mining, 2011

Design of Adaptive Controller for Micro Reactor Temperature Control.
Proceedings of the Advances in Computer Science, 2011

Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Evolution of Node Behavior in Link Prediction.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Keep It Simple with Time: A Reexamination of Probabilistic Topic Detection Models.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

Context-aware citation recommendation.
Proceedings of the 19th International Conference on World Wide Web, 2010

TwitterRank: finding topic-sensitive influential twitterers.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

What Do People Want in Microblogs? Measuring Interestingness of Hashtags in Twitter.
Proceedings of the ICDM 2010, 2010

Communication motifs: a tool to characterize social communications.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Boosting social network connectivity with link revival.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Web Query Recommendation via Sequential Query Prediction.
Proceedings of the 25th International Conference on Data Engineering, 2009

Creating the Cryptograph Index by Query Frequencies in DAS Models.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Preserving FDs in K-Anonymization by K-MSDs and Association Generalization.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Detecting topic evolution in scientific literature: how can citations help?
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Modeling Anticipatory Event Transitions.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Context-aware query suggestion by mining click-through and session data.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

2007
Anticipatory event detection via classification.
Inf. Syst. E-Business Management, 2007

On the predictability of large transfer TCP throughput.
Computer Networks, 2007

Analyzing feature trajectories for event detection.
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007

Bursty Feature Representation for Clustering Text Streams.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

Modeling Anticipatory Event Transitions.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Anticipatory Event Detection for Bursty Events.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Using Burstiness to Improve Clustering of Topics in News Streams.
Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
Location Privacy Protection in Mobile Wireless Networks.
Proceedings of the Handbook of Mobile Middleware., 2006

A secure incentive architecture for ad hoc networks.
Wireless Communications and Mobile Computing, 2006

A Methodology for the Optimal Configuration of TCP Traffic in Network Simulations under Link Load Constraints.
Simulation, 2006

Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme.
EURASIP J. Wireless Comm. and Networking, 2006

An ontology based approach to the integration of entity-relationship schemas.
Data Knowl. Eng., 2006

IQ-Services: network-aware middleware for interactive large-data applications.
Concurrency and Computation: Practice and Experience, 2006

A new dependable exchange protocol.
Computer Communications, 2006

Anticipatory Event Detection via Sentence Classification.
Proceedings of the IEEE International Conference on Systems, 2006

A Model for Anticipatory Event Detection.
Proceedings of the Conceptual Modeling, 2006

2005
The Design and Evaluation of Advanced TCP-based Services over an Evolving Internet.
PhD thesis, 2005

Dynamic Host-Group/Multi-Destination Routing for Multicast Sessions.
Telecommunication Systems, 2005

An information extraction engine for web discussion forums.
Proceedings of the 14th international conference on World Wide Web, 2005

Prediction of TCP throughput: formula-based and history-based methods.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

On the predictability of large transfer TCP throughput.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Abuse-Free Item Exchange.
Proceedings of the Computational Science and Its Applications, 2005

Dependable Transaction for Electronic Commerce.
Proceedings of the Computational Science and Its Applications, 2005

A Methodology for the Optimal Configuration of TCP Traffic in Network Simulations under Link Load Constraints.
Proceedings of the Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 2005

2004
Exploiting the predictability of TCP steady-state to speed up network simulation.
Perform. Eval., 2004

SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

IQ-services: network-aware middleware for interactive large-data applications.
Proceedings of the 2nd Workshop on Middleware for Grid Computing, 2004

Resolving Schematic Discrepancy in the Integration of Entity-Relationship Schemas.
Proceedings of the Conceptual Modeling, 2004

Extending and inferring functional dependencies in schema transformation.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems.
Proceedings of the 11th International Workshop on Modeling, 2003

Dynamic host-group/multidestination routing for multicast sessions.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

A Novel System for Publishing Relational Data in XML Based on ER-DTD Method.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
Exploiting the Predictability of TCP's Steady-State Behavior to Speed Up Network Simulation.
Proceedings of the 10th International Workshop on Modeling, 2002

IQ-RUDP: Coordinating Application Adaptation with Network Transport.
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002

A Practical Study on Security of Agent-Based Ubiquitous Computing.
Proceedings of the Trust, 2002

2000
SMP Scalability Comparisons of Linux Kernels 2.2.14 and 2.3.99.
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000

1998
Personal Security Agent: KQML-Based PKI.
Agents, 1998

A Solution to Open Standard of PKI.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...