Yuanyuan Zhou

According to our database1, Yuanyuan Zhou authored at least 75 papers between 2002 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2013, "For contributions to software reliability and quality.".

IEEE Fellow

IEEE Fellow 2015, "For contributions to scalable algorithms and tools for computer reliability".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Geospatial Object Detection via Deconvolutional Region Proposal Network.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2019

Rotational Objects Recognition and Angle Estimation via Kernel-Mapping CNN.
IEEE Access, 2019

In Processing Fault Detection of Machinery Based on Instantaneous Phase Signal.
IEEE Access, 2019

Lightweight Two-dimensional Routing Mechanism Based on Agent Calculation.
Proceedings of the 2019 International Conference on Computer, 2019

2018
Fiber Bragg Grating-Based Triaxial Force Sensor With Parallel Flexure Hinges.
IEEE Trans. Industrial Electronics, 2018

A new approach to fuzzy group decision making with trapezoidal fuzzy preference relations by using compatibility measure.
Neural Computing and Applications, 2018

The Effect of Reviewer Similarity Network and Interaction in Online Video Platform.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Dual-Way Guided Depth Image Inpainting with RGBD Image Pairs.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

2017
Design and Analysis of a Mutual Inductance Coupling-Based Microdeformation Sensor.
IEEE Trans. Instrumentation and Measurement, 2017

A group decision making approach for trapezoidal fuzzy preference relations with compatibility measure.
Soft Comput., 2017

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
IACR Cryptology ePrint Archive, 2017

Development of an image-guided surgical robot for bone tumor resection.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

A S shape continuum robot with a single actuation structured by NiTi slices.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

The Demand Effect of Product Similarity Network.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Passive decoy-state quantum key distribution with orbital angular momentum and pulse position modulation.
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017

The Game of Twenty Questions: Do You Know Where to Log?
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
ATLAS: A real-space finite-difference implementation of orbital-free density functional theory.
Computer Physics Communications, 2016

Analysis on the force propagation of the tendon-sheath actuation in dexterous surgical robots.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

2015
Some ILOWA operators and their applications to group decision making with additive linguistic preference relations.
Journal of Intelligent and Fuzzy Systems, 2015

Some 2-tuple linguistic generalized power aggregation operators and their applications to multiple attribute group decision making.
Journal of Intelligent and Fuzzy Systems, 2015

NSF expedition on variability-aware software: Recent results and contributions.
it - Information Technology, 2015

A cross-helical tendons actuated dexterous continuum manipulator.
Proceedings of the 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015

Performance Profiling of VMs on NUMA Multicore Platform by Inspecting the Uncore Data Flow.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Adolescent Mouse Takes on An Active Transcriptomic Expression During Postnatal Cerebral Development.
Genomics, Proteomics & Bioinformatics, 2014

A Comprehensive Transcriptomic Analysis of Infant and Adult Mouse Ovary.
Genomics, Proteomics & Bioinformatics, 2014

Inverse kinematics based point-tracking strategy of master-slave robotic catheter intervention.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Understanding the Data Traffic of Uncore in Westmere NUMA Architecture.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Characteristic Analysis of Operating Systems for Large Scale Hierarchical NUMA System.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

Optimization of Uncore Data Flow on NUMA Platform.
Proceedings of the Network and Parallel Computing, 2014

Android low entropy demystified.
Proceedings of the IEEE International Conference on Communications, 2014

2013
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptology ePrint Archive, 2013

An in-depth study of LTE: effect of network protocol and application behavior on performance.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Analyzing the Characteristics of Memory Subsystem on Two Different 8-Way NUMA Architectures.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.
Proceedings of the Financial Cryptography and Data Security, 2013

A novel dynamic cardiac simulator utilizing pneumatic artificial muscle.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Improving Software Diagnosability via Log Enhancement.
ACM Trans. Comput. Syst., 2012

A Study of Reusing Smartphones to Augment Elementary School Education.
IJHCR, 2012

Characterizing logging practices in open-source software.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Some remarks on Euclidean tight designs.
J. Comb. Theory, Ser. A, 2011

Connecting technology with real-world problems - from copy-paste detection to detecting known bugs: (keynote abstract).
Proceedings of the 8th International Working Conference on Mining Software Repositories, 2011

ATDetector: improving the accuracy of a commercial data race detector by identifying address transfer.
Proceedings of the 44rd Annual IEEE/ACM International Symposium on Microarchitecture, 2011

Improving software diagnosability via log enhancement.
Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, 2011

2010
Towards understanding bugs in open source router software.
Computer Communication Review, 2010

Ad Hoc Synchronization Considered Harmful.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Smartphone Evolution and Reuse: Establishing a More Sustainable Model.
Proceedings of the 39th International Conference on Parallel Processing, 2010

A case for smartphone reuse to augment elementary school education.
Proceedings of the International Green Computing Conference 2010, 2010

2009
Memory resource allocation for file system prefetching: from a supply chain management perspective.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

2008
Enhancing Software Product Line Maintenance with Source Code Mining.
Proceedings of the Wireless Algorithms, 2008

AutoISES: Automatically Inferring Security Specification and Detecting Violations.
Proceedings of the 17th USENIX Security Symposium, 2008

CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining.
Proceedings of the SIAM International Conference on Data Mining, 2008

Maintaining software product lines - an industrial practice.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Using likely program invariants to detect hardware errors.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Trace-based microarchitecture-level diagnosis of permanent hardware faults.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Understanding the propagation of hard errors to software and implications for resilient system design.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Cross-component energy management: Joint adaptation of processor and memory.
TACO, 2007

Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks.
Proceedings of IEEE International Conference on Communications, 2007

Energy-efficient Contention-Resilient Medium Access for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

HARD: Hardware-Assisted Lockset-based Race Detection.
Proceedings of the 13st International Conference on High-Performance Computer Architecture (HPCA-13 2007), 2007

Extending Lifetime with Differential Duty Cycles in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks.
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 2006

Maintaining an energy-efficient Bluetooth scatternet.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Scalable Localization in Wireless Sensor Networks.
Proceedings of the High Performance Computing, 2006

2005
Performance directed energy management for main memory and disks.
TOS, 2005

Efficient and flexible architectural support for dynamic monitoring.
TACO, 2005

PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing.
Proceedings of the 38th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-38 2005), 2005

2004
iWatcher: Simple, General Architectural Support for Software Debugging.
IEEE Micro, 2004

Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

iWatcher: Efficient Architectural Support for Software Debugging.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004

Adaptive multi-resource prediction in distributed resource sharing environment.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

Dynamic tracking of page miss ratio curve for memory management.
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, 2004

Performance directed energy management for main memory and disks.
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, 2004

2002
Database Research at the University of Illinois at Urbana-Champaign.
SIGMOD Record, 2002


  Loading...