Yonggen Gu

According to our database1, Yonggen Gu authored at least 21 papers between 2002 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order Tensors.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
An online greedy allocation of VMs with non-increasing reservations in clouds.
The Journal of Supercomputing, 2016

A preemptive truthful VMs allocation online mechanism in private cloud.
J. Comput. Science, 2016

2014
Online Mechanism Design for VMs Allocation in Private Cloud.
Proceedings of the Network and Parallel Computing, 2014

2013
Minimum-maximum local structure information for feature selection.
Pattern Recognition Letters, 2013

Game Analysis of Workload Factoring with the Hybrid Cloud.
Proceedings of the First International Symposium on Computing and Networking, 2013

Game Theoretic Analysis of Workload Factoring in Federation of Clouds.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2011
A Game Theoretic Model and Tree Analysis Method for Fair Exchange Protocols.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

2009
Measuring Anonymity.
Proceedings of the Information Security Practice and Experience, 2009

Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus.
Proceedings of the Computational Science and Its Applications, 2009

Knowledge Aware Bisimulation and Anonymity.
Proceedings of the Computational Science, 2009

2008
An Open Approach for the Applied Pi Calculus.
JSW, 2008

2005
A Simple Process Calculus for the analysis of Security Protocols.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Generic Model for Analyzing Security Protocols.
Proceedings of the Computer Network Security, 2005

A Generic Model for Symbolic Analyzing Security Protocols.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Parallel Computing Method Of Valuing For Multi-Asset European Option.
International Journal of Information Technology and Decision Making, 2004

Analyzing iKP Security in Applied Pi Calculus.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Analyzing an Agent-Based Selective Information Retrieval.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Parallel Computing Method of Valuing for Multi-asset European Option.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
A Novel Numerical Approach of Computing American Option.
Int. J. Found. Comput. Sci., 2002

A new numerical method on American option pricing.
Science in China Series F: Information Sciences, 2002


  Loading...