Xiangke Liao

According to our database1, Xiangke Liao authored at least 137 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Resource stealing: a resource multiplexing method for mix workloads in cloud system.
The Journal of Supercomputing, 2019

SketchDLC: A Sketch on Distributed Deep Learning Communication via Trace Capturing.
TACO, 2019

SCP: Shared Cache Partitioning for High-Performance GEMM.
TACO, 2019

New concept to improve cooperation in dynamic complex network.
Neurocomputing, 2019

LCCFS: a lightweight distributed file system for cloud computing without journaling and metadata services.
SCIENCE CHINA Information Sciences, 2019

DeepHiR: improving high-radix router throughput with deep hybrid memory buffer microarchitecture.
Proceedings of the ACM International Conference on Supercomputing, 2019

2018
Do You Really Know How to Configure Your Software? Configuration Constraints in Source Code May Help.
IEEE Trans. Reliability, 2018

ConfVD: System Reactions Analysis and Evaluation Through Misconfiguration Injection.
IEEE Trans. Reliability, 2018

RoB-Router : A Reorder Buffer Enabled Low Latency Network-on-Chip Router.
IEEE Trans. Parallel Distrib. Syst., 2018

mSNP: A Massively Parallel Algorithm for Large-Scale SNP Detection.
IEEE Trans. Parallel Distrib. Syst., 2018

A Parallel Multiclassification Algorithm for Big Data Using an Extreme Learning Machine.
IEEE Trans. Neural Netw. Learning Syst., 2018

Moving from exascale to zettascale computing: challenges and techniques.
Frontiers of IT & EE, 2018

cmFSM: a scalable CPU-MIC coordinated drug-finding tool by frequent subgraph mining.
BMC Bioinformatics, 2018

Efficient computation of motif discovery on Intel Many Integrated Core (MIC) Architecture.
BMC Bioinformatics, 2018

ConfigFile++: Automatic comment enhancement for misconfiguration prevention.
Proceedings of the 2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation, 2018

SMARTLOG: Place error log statement by deep understanding of log intention.
Proceedings of the 25th International Conference on Software Analysis, 2018

TZDKS: A New TrustZone-Based Dual-Criticality System with Balanced Performance.
Proceedings of the 24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2018

MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Eca-Router : On Achieving Endpoint Congestion Aware Switch Allocation in the On-Chip Network.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

Relax: Automatic Contention Detection and Resolution for Configuration Related Performance Tuning.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Energy-efficient NoC with multi-granularity power optimization.
The Journal of Supercomputing, 2017

Multiple Sequence Alignment Based on a Suffix Tree and Center-Star Strategy: A Linear Method for Multiple Nucleotide Sequence Alignment on Spark Parallel Framework.
Journal of Computational Biology, 2017

On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks.
Complexity, 2017

Automatic Type Inference for Proactive Misconfiguration Prevention.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Boosting the precision of virtual call integrity protection with partial pointer analysis for C++.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

An Efficient Label Routing on High-Radix Interconnection Networks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

IdenEH: Identify error-handling code snippets in large-scale software.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

Easier Said Than Done: Diagnosing Misconfiguration via Configuration Constraints Analysis: A Study of the Variance of Configuration Constraints in Source Code.
Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, 2017

ConfTest: Generating Comprehensive Misconfiguration for System Reaction Ability Evaluation.
Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, 2017

Automatic generation of fast BLAS3-GEMM: a portable compiler approach.
Proceedings of the 2017 International Symposium on Code Generation and Optimization, 2017

mD3DOCKxb: An Ultra-Scalable CPU-MIC Coordinated Virtual Screening Framework.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

A novel algorithm for detecting co-evolutionary domains in protein and nucleotide sequences.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Exploiting contention and congestion aware switch allocation in network-on-chips.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
An Efficient GPU Implementation of Inclusion-Based Pointer Analysis.
IEEE Trans. Parallel Distrib. Syst., 2016

REDU: reducing redundancy and duplication for multi-failure recovery in erasure-coded storages.
The Journal of Supercomputing, 2016

New fast divide-and-conquer algorithms for the symmetric tridiagonal eigenvalue problem.
Numerical Lin. Alg. with Applic., 2016

Joint flow routing-scheduling for energy efficient software defined data center networks: A prototype of energy-aware network management platform.
J. Network and Computer Applications, 2016

Developing the Cloud-integrated data replication framework in decentralized online social networks.
J. Comput. Syst. Sci., 2016

623 Tflop/s HPCG run on Tianhe-2: Leveraging millions of hybrid cores.
IJHPCA, 2016

Scaling up Hartree-Fock calculations on Tianhe-2.
IJHPCA, 2016

Developing a trustworthy computing framework for clouds.
IJES, 2016

An improved divide-and-conquer algorithm for the banded matrices with narrow bandwidths.
Computers & Mathematics with Applications, 2016

ConfMapper: Automated Variable Finding for Configuration Items in Source Code.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Galaxyfly: A Novel Family of Flexible-Radix Low-Diameter Topologies for Large-Scales Interconnection Networks.
Proceedings of the 2016 International Conference on Supercomputing, 2016

RegTT: Accelerating Tree Traversals on GPUs by Exploiting Regularities.
Proceedings of the 45th International Conference on Parallel Processing, 2016

CCAS: Contention and congestion aware switch allocation for network-on-chips.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

RoB-Router: Low Latency Network-on-Chip Router Microarchitecture Using Reorder Buffer.
Proceedings of the 24th IEEE Annual Symposium on High-Performance Interconnects, 2016

CareDedup: Cache-Aware Deduplication for Reading Performance Optimization in Primary Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

mAMBER: A CPU/MIC collaborated parallel framework for AMBER on Tianhe-2 supercomputer.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Towards Efficient Influence Maximization for Evolving Social Networks.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Performance Optimization for Managing Massive Numbers of Small Files in Distributed File Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Analyzing and Boosting the Data Availability in Decentralized Online Social Networks.
Int. J. Web Service Res., 2015

High Performance Interconnect Network for Tianhe System.
J. Comput. Sci. Technol., 2015

Towards simulation of subcellular calcium dynamics at nanometre resolution.
IJHPCA, 2015

Evaluating vector data type usage in OpenCL kernels.
Concurrency and Computation: Practice and Experience, 2015

A semantic enhanced Power Budget Calculator for distributed computing using IEEE 802.3az.
Cluster Computing, 2015

HeMatch: A redundancy layout placement scheme for erasure-coded storages in practical heterogeneous failure patterns.
SCIENCE CHINA Information Sciences, 2015

Enhancement of cooperation between file systems and applications - on VFS extensions for optimized performance.
SCIENCE CHINA Information Sciences, 2015

An Efficient Clique-Based Algorithm of Compute Nodes Allocation for In-memory Checkpoint System.
Proceedings of the High Performance Computing - 30th International Conference, 2015

Large-Scale Neo-Heterogeneous Programming and Optimization of SNP Detection on Tianhe-2.
Proceedings of the High Performance Computing - 30th International Conference, 2015

Chameleon: Adaptive energy-efficient heterogeneous network-on-chip.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

HVCRouter: Energy Efficient Network-on-Chip Router with Heterogeneous Virtual Channels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Aggregation Encoding: Reducing Network Traffic for Big Data Erasure-Coded Storages.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

The Challenge of Scaling Genome Big Data Analysis Software on TH-2 Supercomputer.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Know by a handful the whole sack: efficient sampling for top-k influential user identification in large graphs.
World Wide Web, 2014

IMGPU: GPU-Accelerated Influence Maximization in Large-Scale Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

OpenMC: Towards Simplifying Programming for TianHe Supercomputers.
J. Comput. Sci. Technol., 2014

Leach: an automatic learning cache for inline primary deduplication system.
Frontiers Comput. Sci., 2014

MilkyWay-2 supercomputer: system and application.
Frontiers Comput. Sci., 2014

MilkyWay-2: back to the world Top 1.
Frontiers Comput. Sci., 2014

PathZip: A lightweight scheme for tracing packet path in wireless sensor networks.
Computer Networks, 2014

A fast and stable algorithm for downdating the singular value decomposition.
Computers & Mathematics with Applications, 2014

Petascale High Order Dynamic Rupture Earthquake Simulations on Heterogeneous Supercomputers.
Proceedings of the International Conference for High Performance Computing, 2014

mBWA: A Massively Parallel Sequence Reads Aligner.
Proceedings of the 8th International Conference on Practical Applications of Computational Biology & Bioinformatics, 2014

SkewControl: Gini Out of the Bottle.
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014

Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Modelling and Predicting the Data Availability in Decentralized Online Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

FLYER: Fine-grained landmark based greedy geographic routing under uncertain locations.
Proceedings of the IEEE International Conference on Communications, 2014

Evaluation of approaches for power estimation in a computing cluster.
Proceedings of the International Green Computing Conference, 2014

Aggregation Decoding for Multi-failure Recovery in Erasure-Coded Storage.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Cadros: The Cloud-Assisted Data Replication in Decentralized Online Social Networks.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Fine-Grained Location-Free Planarization in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Accurate, Validated and Fast Evaluation of Bézier Tensor Product Surfaces.
Reliable Computing, 2013

Application-Aware Client-Side Data Reduction and Encryption of Personal Data in Cloud Backup Services.
J. Comput. Sci. Technol., 2013

Accurate evaluation of the k-th derivative of a polynomial and its application.
J. Computational Applied Mathematics, 2013

The architecture and traffic management of wireless collaborated hybrid data center network.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

CareDedup: cache-aware deduplication for reading performance optimization in primary storage.
Proceedings of the Proceedings Demo & Poster Track of ACM/IFIP/USENIX International Middleware Conference, 2013

Fine-Grained Landmark Based Greedy Geographic Routing with Guaranteed Delivery Under Uncertain Locations.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Risk Intelligence: Profiting from Uncertainty in Data Processing System.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

NR-MPI: A Non-stop and Fault Resilient MPI.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

iFlatLFS: Performance optimization for accessing massive small files.
Proceedings of the 20th Annual International Conference on High Performance Computing, 2013

EKB: Semantic Information System for Energy-Aware Monitoring in Distributed Infrastructures.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

Rededup: Data Reallocation for Reading Performance Optimization in Deduplication System.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

G-Paradex: GPU-Based Parallel Indexing for Fast Data Deduplication.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches.
IEEE Trans. Computers, 2012

MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks.
IJDSN, 2012

A scalable code dissemination protocol in heterogeneous wireless sensor networks.
SCIENCE CHINA Information Sciences, 2012

In-time estimation for influence maximization in large-scale social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

PathZip: Packet path tracing in wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

2011
Edge Self-Monitoring for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2011

Sweep Coverage with Mobile Sensors.
IEEE Trans. Mob. Comput., 2011

Incremental manifold learning by spectral embedding methods.
Pattern Recognition Letters, 2011

Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks.
J. Inf. Sci. Eng., 2011

The TianHe-1A Supercomputer: Its Hardware and Software.
J. Comput. Sci. Technol., 2011

IGAOR and multisplitting IGAOR methods for linear complementarity problems.
J. Computational Applied Mathematics, 2011

A PTS-PGATS based approach for data-intensive scheduling in data grids.
Frontiers Comput. Sci. China, 2011

Accurate evaluation of a polynomial in Chebyshev form.
Applied Mathematics and Computation, 2011

Fine-grained location-free planarization in wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

eStor: Energy efficient and resilient data center storage.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
TH-1: China's first petaflop supercomputer.
Frontiers Comput. Sci. China, 2010

Exploring the practicability of mobile sensors in complex environment surveillance.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Efficient and fine-grained sharing of encrypted files.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Estimation of a Population Size in Large-Scale Wireless Sensor Networks.
J. Comput. Sci. Technol., 2009

A new fourth-order iterative method for finding multiple roots of nonlinear equations.
Applied Mathematics and Computation, 2009

Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
Self-monitoring for sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Using cable-based mobile sensors to assist environment surveillance.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Barrier Coverage with Mobile Sensors.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

Sweep coverage with mobile sensors.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Using Cable-Based Mobile Sensors to Assist Environment Surveillance.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2007
Credit based Fairness Control in Wireless Sensor Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Integrated Network Management, 2007

Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
Path Selection of Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

Feedback Control with Prediction for Thread Allocation in Pipeline Architecture Web Server.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Research on Control Flags-based Weighted Authentication Trustworthiness Model.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Dynamic Thread Management in Kernel Pipeline Web Server.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Integrating network QoS with end system performance in kernel pipeline WEB server.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2004
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...