Xiang Fu

According to our database1, Xiang Fu authored at least 74 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Curvature Bag of Words Model for Shape Recognition.
IEEE Access, 2019

LS4BUCC: A Low Overhead Storage Architecture for Blockchain Based Unmanned Collaborative Cognition System.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

eQASM: An Executable Quantum Instruction Set Architecture.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019

2018
Video.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

A Microarchitecture for a Superconducting Quantum Processor.
IEEE Micro, 2018

Image Completion Based on Structure Reconstruction and Constraint.
JSW, 2018

Line Matching Method Based on Related Points and Geometric Constraints.
JCP, 2018

PoPF: A Consensus Algorithm for JCLedger.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

2017
Dynamic LLR scheme based on EM algorithm for LDPC decoding in NAND flash memory.
IEICE Electronic Express, 2017

Image segmentation using contour, surface, and depth cues.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Corporation Architecture for Multiple Cloud Service Providers in JointCloud Computing.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

JCLedger: A Blockchain Based Distributed Ledger for JointCloud Computing.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

QX: A high-performance quantum computer simulation platform.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

The engineering challenges in quantum computing.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Exploring confusing scene classes for the places dataset: Insights and solutions.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
On detecting environment sensitivity using slicing.
Theor. Comput. Sci., 2016

LINK-REPORT: Outcome Analysis of Informal Learning at Scale.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

A heterogeneous quantum computer architecture.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Hierarchical Supervoxel Graph for Interactive Video Object Representation and Segmentation.
Proceedings of the Computer Vision - ACCV 2016, 2016

2015
WISEngineering: Achieving Scalability and Extensibility in Massive Online Learning.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

A Consistent Hashing Based Data Redistribution Algorithm.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015

Robust Image Segmentation Using Contour-Guided Color Palettes.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

2013
Simple linear string constraints.
Formal Asp. Comput., 2013

Extended clique models: A new matching strategy for fingerprint recognition.
Proceedings of the International Conference on Biometrics, 2013

2012
Testable Path Selection and Grouping for Faster Than At-Speed Testing.
IEEE Trans. VLSI Syst., 2012

Complex Gaussian Mixture Model for fingerprint minutiae.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Face recognition with illumination distinction description.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Spectral correspondence method for fingerprint minutia matching.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Hierarchical bag-of-words model for joint multi-view object representation and classification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
A Line Segments Matching Method based on Epipolar-line Constraint and Line Segment Features.
JSW, 2011

Short-term scheduling of cascade reservoirs using an immune algorithm-based particle swarm optimization.
Computers & Mathematics with Applications, 2011

A novel fingerprint matching algorithm using Minutiae Phase Difference Feature.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
A neural network approach for solving linear bilevel programming problem.
Knowl.-Based Syst., 2010

A Novel Shape Representation and Retrieval Algorithm: Distance Autocorrelogram.
JSW, 2010

Local Features Based Image Sequence Retrieval.
JCP, 2010

Testable Critical Path Selection Considering Process Variation.
IEICE Transactions, 2010

Relational Constraint Driven Test Case Synthesis for Web Applications
Proceedings of the Proceedings Fourth International Workshop on Testing, 2010

Conformance Verification of Privacy Policies.
Proceedings of the Web Services and Formal Methods - 7th International Workshop, 2010

A String Constraint Solver for Detecting Web Application Vulnerability.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Modeling Regular Replacement for String Constraint Solving.
Proceedings of the Second NASA Formal Methods Symposium, 2010

BAUT: A Bayesian Driven Tutoring System.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

On Selection of Testable Paths with Specified Lengths for Faster-Than-At-Speed Testing.
Proceedings of the 19th IEEE Asian Test Symposium, 2010

2009
A Tool for Choreography Analysis Using Collaboration Diagrams.
Proceedings of the IEEE International Conference on Web Services, 2009

2008
Choreography Modeling and Analysis with Collaboration Diagrams.
IEEE Data Eng. Bull., 2008

APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

SAFELI: SQL injection scanner using symbolic execution.
Proceedings of the 2008 Workshop on Testing, 2008

Framework for Distributed Video Surveillance in Heterogeneous Environment.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Image Noise Removal via Wavelet Transform and r/K-PSO.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Localized random access scan: Towards low area and routing overhead.
Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008

Robust test generation for power supply noise induced path delay faults.
Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008

The automated web application testing (AWAT) system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Race condition in Ajax-based web application.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Towards a Theory of Web Service Choreographies.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

An Analysis Tool for Execution of BPEL Services.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Analyzing Conversations: Realizability, Synchronizability, and Verification.
Proceedings of the Test and Analysis of Web Services, 2007

Specification of Realizable Service Conversations Using Collaboration Diagrams.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007

The design-for-testability features of a general purpose microprocessor.
Proceedings of the 2007 IEEE International Test Conference, 2007

Image Noise Removal via Hierarchical Subbands Shrinkage Modified by Particle Swarm Optimization.
Proceedings of the Third International Conference on Natural Computation, 2007

A Static Analysis Framework For Detecting SQL Injection Vulnerabilities.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Analyzing Conversations of Web Services.
IEEE Internet Computing, 2006

2005
Synchronizability of Conversations among Web Services.
IEEE Trans. Software Eng., 2005

Design for verification for asynchronously communicating Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Web Service Interactions: Analysis and Design.
Proceedings of the ICWS 2005 Second International Workshop on Semantic and Dynamic Web Processes, 2005

2004
Analysis of interacting BPEL web services.
Proceedings of the 13th international conference on World Wide Web, 2004

Model checking XML manipulating software.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

Realizability of Conversation Protocols With Message Contents.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

WSAT: A Tool for Formal Analysis of Web Services.
Proceedings of the Computer Aided Verification, 16th International Conference, 2004

Tools for Automated Verification of Web Services.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

2003
Conversation specification: a new approach to design and analysis of e-service composition.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services.
Proceedings of the Implementation and Application of Automata, 2003

2002
Formal Verification of e-Services and Workflows.
Proceedings of the Web Services, 2002

2001
Verification of Vortex Workflows.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001

1999
Signaling in ATM networks; by R. Onvural, R. Cherukuri (Eds.).
Computer Communications, 1999

Broadband Access Network; by L.A. Ims.
Computer Communications, 1999


  Loading...