Zheng Qin

According to our database1, Zheng Qin authored at least 205 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Adversarial Distillation for Efficient Recommendation with External Knowledge.
ACM Trans. Inf. Syst., 2019

HCIC: Hardware-Assisted Control-Flow Integrity Checking.
IEEE Internet of Things Journal, 2019

Personalised service recommendation process based on service clustering.
IJCSE, 2019

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Computers & Security, 2019

Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps.
IEEE Access, 2019

A Novel Approach to Rule Placement in Software-Defined Networks Based on OPTree.
IEEE Access, 2019

A Large-Scale Urban Vehicular Network Framework for IoT in Smart Cities.
IEEE Access, 2019

Spectrum-enhanced Pairwise Learning to Rank.
Proceedings of the World Wide Web Conference, 2019

Personalized Fashion Recommendation with Visual Explanations based on Multimodal Attention Network: Towards Visually Explainable Recommendation.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

Control Architecture of Solar Photovoltaic AC-Bus Microgrid with Battery Storage System.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

URSA: Hybrid Block Storage for Cloud-Scale Virtual Disks.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

Distributed Landmark Selection for Lower Bound Estimation of Distances in Large Graphs.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

FMQO: A Federated RDF System Supporting Multi-query Optimization.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

Dynamic Explainable Recommendation Based on Neural Attentive Models.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements.
IEEE/ACM Trans. Netw., 2018

On-Line Anomaly Detection With High Accuracy.
IEEE/ACM Trans. Netw., 2018

Transfer Hashing: From Shallow to Deep.
IEEE Trans. Neural Netw. Learning Syst., 2018

Frequency Offset-Based Ring Oscillator Physical Unclonable Function.
IEEE Trans. Multi-Scale Computing Systems, 2018

Tailoring reversible data hiding for 3D synthetic images.
Sig. Proc.: Image Comm., 2018

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
Security and Communication Networks, 2018

Multi-focus Image Fusion using Fully Convolutional Two-stream Network for Visual Sensors.
TIIS, 2018

Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecurity, 2018

T2FA: Transparent Two-Factor Authentication.
IEEE Access, 2018

Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018

Merging-and-Evolution Networks for Mobile Vision Applications.
IEEE Access, 2018

An Optimal Pufferfish Privacy Mechanism for Temporally Correlated Trajectories.
IEEE Access, 2018

Aesthetic-based Clothing Recommendation.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Sequential Recommendation with User Memory Networks.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Research on Multi-focus Image Fusion Algorithm Based on Quadtree.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Collision-Free LSTM for Human Trajectory Prediction.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Walkway discovery from large scale crowdsensing: demo abstract.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Walkway discovery from large scale crowdsensing.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Loss Rank Mining: A General Hard Example Mining Method for Real-time Detectors.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Merging and Evolution: Improving Convolutional Neural Networks for Mobile Applications.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Diagonalwise Refactorization: An Efficient Training Method for Depthwise Convolutions.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Collaborative and Attentive Learning for Personalized Image Aesthetic Assessment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Control of Simulated Solar PV Microgrid Operating in Grid-Tied and Islanded Modes.
Proceedings of the IECON 2018, 2018

Deep Tag Recommendation Based on Discrete Tensor Factorization.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Semantic Parsing Based LSTM Model for Intrusion Detection.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Deep Collaborative Filtering Combined with High-Level Feature Generation on Latent Factor Model.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Fd-Mobilenet: Improved Mobilenet with a Fast Downsampling Strategy.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Divide and Conquer for Fast SRLG Disjoint Routing.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Biometric Authentication via Finger Photoplethysmogram.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Bridge Video and Text with Cascade Syntactic Structure.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Gradient-Guided DCNN for Inverse Halftoning and Image Expanding.
Proceedings of the Computer Vision - ACCV 2018, 2018

An Experimental Perspective for Computation-Efficient Neural Networks Training.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018

SC2Net: Sparse LSTMs for Sparse Coding.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Fundamentals of Software Culture
Springer, ISBN: 978-981-13-0700-3, 2018

2017
Data embedding in digital images using critical functions.
Sig. Proc.: Image Comm., 2017

A query privacy-enhanced and secure search scheme over encrypted data in cloud computing.
J. Comput. Syst. Sci., 2017

The Improved Velocity-based Models for Pedestrian Dynamics.
TIIS, 2017

An efficient privacy-preserving compressive data gathering scheme in WSNs.
Inf. Sci., 2017

Answering top-K query combined keywords and structural queries on RDF graphs.
Inf. Syst., 2017

Detection of Composite Operation in Model Management.
IEEE Access, 2017

Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Personalized Key Frame Recommendation.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2017

Network-Aware VM Migration Heuristics for Improving the SLA Violation of Multi-Tier Web Applications in the Cloud.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Semantic R-CNN for Natural Language Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Semantic Sequence Analysis for Human Activity Prediction.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Multi-modality Fusion Network for Action Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Recognizing Emotions Based on Human Actions in Videos.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017

Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A image texture and BP neural network basec malicious files detection technique for cloud storage systems.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Android Malware Detection Using Local Binary Pattern and Principal Component Analysis.
Proceedings of the Data Science, 2017

Intrusion Detection Using Convolutional Neural Networks for Representation Learning.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Job Scheduling without Prior Information in Big Data Processing Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fast Algorithms for Pareto Optimal Group-based Skyline.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Performance Modelling and Cost Effective Execution for Distributed Graph Processing on Configurable VMs.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

A Collaborative Neural Model for Rating Prediction by Leveraging User Reviews and Product Images.
Proceedings of the Information Retrieval Technology, 2017

Probabilistic Local Matrix Factorization Based on User Reviews.
Proceedings of the Information Retrieval Technology, 2017

2016
Transparent three-phase Byzantine fault tolerance for parallel and distributed simulations.
Simulation Modelling Practice and Theory, 2016

A fast transition of linear temporal logic formulae to transition-based Büchi automata.
IJCAT, 2016

Adaptive modelling of non-linear errors-in-variables systems.
IJCAT, 2016

Minimizing datacenter flow completion times with server-based flow scheduling.
Computer Networks, 2016

A Temporal-Spatial Method for Group Detection, Locating and Tracking.
IEEE Access, 2016

HLBPR: A Hybrid Local Bayesian Personal Ranking Method.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Composite-based conflict resolution in merging versions of UML models.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Learning to Rank Features for Recommendation over Multiple Categories.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

An Approach to Rule Placement in Software-Defined Networks.
Proceedings of the 19th ACM International Conference on Modeling, 2016

Transfer Hashing with Privileged Information.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

IRMD: Malware Variant Detection Using Opcode Image Recognition.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-User Location Correlation Protection with Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Topological ordering based iterative TCAM rule compression using bi-partite graphs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm.
Proceedings of the 12th International Conference on Natural Computation, 2016

Recognize human activities from multi-part missing videos.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

A Study on the Individualized Information Service Mode and Its Application in the Manufacturing and Supply Chain.
Proceedings of the Socially Aware Organisations and Technologies. Impact and Challenges, 2016

Human activities prediction by learning combinatorial sparse representations.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs.
IEEE Trans. on Circuits and Systems, 2015

Gradient-based compressive image fusion.
Frontiers of IT & EE, 2015

Degeneralization Algorithm for Generation of Büchi Automata Based on Contented Situation.
J. Applied Mathematics, 2015

TraIL: Pinpoint Trajectory for Indoor Localization.
IJDSN, 2015

Efficient approach of translating LTL formulae into Büchi automata.
Frontiers Comput. Sci., 2015

Beyond HOG: Learning Local Parts for Object Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Integrated QoS-aware Resource Provisioning for Parallel and Distributed Applications.
Proceedings of the 19th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2015

From LTL Formulae to Büchi Automata: A Direct Translation Using On-the-Fly De-Generalization.
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015

2014
A fast feature selection approach based on rough set boundary regions.
Pattern Recognition Letters, 2014

Greedy feature replacement for online value function approximation.
Journal of Zhejiang University - Science C, 2014

Conversion Algorithm of Linear-Time Temporal Logic to Buchi Automata.
JSW, 2014

A Survey on Target Tracking in Well-deployed Wireless Sensor Networks.
JSW, 2014

Precomputed Clustering for Movie Recommendation System in Real Time.
J. Applied Mathematics, 2014

Region-Based Image-Fusion Framework for Compressive Imaging.
J. Applied Mathematics, 2014

EHCM: A Multihop Aided Wireless Routing Protocol Based on Flow Priority in Smart Grid.
IJDSN, 2014

Heuristic Function Negotiation for Markov Decision Process and Its Application in UAV Simulation.
IEICE Transactions, 2014

Multifractal Analysis on the Return Series of Stock Markets Using MF-DFA Method.
Proceedings of the Service Science and Knowledge Innovation, 2014

Hierarchical Parallelization and Runtime Scheduling for Pregel-Like Graph Processing Systems.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

E-Commerce Strategy
Springer, ISBN: 978-3-642-39414-0, 2014

2013
SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference.
IEEE Trans. Information Forensics and Security, 2013

TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Network Syst. Manage., 2013

Positive Macroscopic Approximation for Fast Attribute Reduction.
J. Applied Mathematics, 2013

A new compression algorithm of data provenance based on self-adaptive granularity.
IJCAT, 2013

Comparator and half adder design using complementary resistive switches crossbar.
IEICE Electronic Express, 2013

SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

2012
Towards high performance security policy evaluation.
The Journal of Supercomputing, 2012

The dynamic features of Delicious, Flickr, and YouTube.
JASIST, 2012

A scan disabling-based BAST scheme for test cost and test power reduction.
IEICE Electronic Express, 2012

Rank-directed layout of UML class diagrams.
Proceedings of the First International KDD Workshop on Software Mining, 2012

2011
Clustering feature decision trees for semi-supervised classification from high-speed data streams.
Journal of Zhejiang University - Science C, 2011

Modeling topic and community structure in social tagging: The TTR-LDA-Community model.
JASIST, 2011

TapRouter: an emulating framework to run real applications on simulated mobile ad hoc network.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Visual Recognition Using Density Adaptive Clustering.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

The Lightning Signal Detect Method Based on Random Resonance.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Robust Audio Watermarking Algorithm Based on Audio Binary Halftone Pre-process.
Proceedings of the Advances in Computer Science, 2011

SD-Q: Selective Discount Q Learning Based on New Results of Intertemporal Choice Theory.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

Mining Uncertain Data Streams Using Clustering Feature Decision Trees.
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011

2010
Automatically Affinity Propagation Clustering using Particle Swarm.
JCP, 2010

A multi-scale triangular mapping and its applications in variation scale scrambling.
IJCAT, 2010

Accelerating the bit-split string matching algorithm using Bloom filters.
Computer Communications, 2010

Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A novel hybrid algorithm for the dynamic shortest path problem.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Multi-thread technology based autonomous underwater vehicle.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Community-based topic modeling for social tagging.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Prediction Task Assignment of Multi-UAV Approach Based on Consensus.
Proceedings of the E-business Technology and Strategy - International Conference, 2010

Dynamic Features of Social Tagging Vocabulary: Delicious, Flickr and YouTube.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Vector Graphics for Real-time 3D Rendering.
PhD thesis, 2009

Security Strategy for Mobile Police Information System Using SMS.
Wireless Personal Communications, 2009

Region-based image fusion method using bidimensional empirical mode decomposition.
J. Electronic Imaging, 2009

A PK-SIM card based end-to-end security framework for SMS.
Computer Standards & Interfaces, 2009

An Approach to Distribute Replicas among Decentralized Tuple Space Nodes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Fuzzy-Based Multi-domain Collaborative Evaluation.
Proceedings of the International Forum on Information Technology and Applications, 2009

Audio Watermarking Pre-process Algorithm.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

The Application Research of e-Government Procurement in China Based on Business Component Framework.
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009

Variable Dimension Space Audio Scrambling Algorithm Against MP3 Compression.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

Towards Linda-Based Decentralized Collaborative Applications by an Architecture Approach.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A powerful relevance feedback mechanism for content-based 3D model retrieval.
Multimedia Tools Appl., 2008

Interacting Multiple Model Particle-type Filtering Approaches to Ground Target Tracking.
JCP, 2008

An overview of content-based three-dimensional model retrieval methods.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Precise vector textures for real-time 3D rendering.
Proceedings of the 2008 Symposium on Interactive 3D Graphics, 2008

Police Security Communication over Public Cellular Network Infrastructure.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

A PSO-based subtractive clustering technique for designing RBF neural networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Content based 3D model retrieval: A survey.
Proceedings of the International Workshop on Content-Based Multimedia Indexing, 2008

2007
Similarity measures between intuitionistic fuzzy (vague) sets: A comparative analysis.
Pattern Recognition Letters, 2007

Center particle swarm optimization.
Neurocomputing, 2007

Automatic Semantic Web Service Composition via Agent Intention Execution in AgentSpeak.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

An IMMUPF method for ground target tracking.
Proceedings of the IEEE International Conference on Systems, 2007

Risk Identification Model Based on Group Support System (GSS).
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Specifying and Verifying Cases Retrieval System Combining Event B and Spin.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Automatic Combination of Feature Descriptors for Effective 3D Shape Retrieval.
Proceedings of the Computer Vision/Computer Graphics Collaboration Techniques, 2007

MADE: A Composite Visual-Based 3D Shape Descriptor.
Proceedings of the Computer Vision/Computer Graphics Collaboration Techniques, 2007

Stratified helix information of medial-axis-points matching for 3D model retrieval.
Proceedings of the 9th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2007

PROLOG for the Implementation of Student Module in ICAIP system.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Research on Structure Learning of Dynamic Bayesian Networks by Particle Swarm Optimization.
Proceedings of the First IEEE Symposium on Artificial Life, 2007

A Multi-agent Supported Adaptive Mobile Collaborative Service Platform.
Proceedings of the Third International Conference on Natural Computation, 2007

Population Forecasting Model Based on Wavelet Least Squares Support Vectors Machines.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007

Knowledge Mass and Automation Reasoning System in Type II Topological Logic CT II.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Learning Bayesian Network Structures with Discrete Particle Swarm Optimization Algorithm.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

An Approach to Optimize Local Trust Algorithm in SureMsg Service.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

A Trustworthy Email System Based on Instant Messaging.
Proceedings of the Business Information Systems, 10th International Conference, 2007

2006
KIR : A New Algorithm to Improve the Fairness of TCP Congestion Avoidance.
Journal of Computer Research and Development, 2006

Real-time texture-mapped vector glyphs.
Proceedings of the 2006 Symposium on Interactive 3D Graphics, 2006

Dimensionality Reduction for Evolving RBF Networks with Particle Swarms.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Training RBF Neural Networks with PSO and Improved Subtractive Clustering Algorithms.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Adaptive Inertia Weight Particle Swarm Optimization.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

FTT Algorithm of Web Pageviews for Personalized Recommendation.
Proceedings of the Semantic Web, 2006

Adaptive Mobile Cooperation Model Based on Context Awareness.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Neural Network based on Dynamic Tunneling Technique for Weather Forecast.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Design of a New Classifier Simulator.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005

Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Negatively Correlated Neural Network Ensemble with Multi-population Particle Swarm Optimization.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Novel Image Fusion Method Based on SGNN.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Modified Particle Swarm Optimizer for Tracking Dynamic Systems.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Combining Classifiers with Particle Swarms.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Modeling and analysis of redundancy in remote monitoring and control systems via petri nets.
Proceedings of the ICINCO 2005, 2005

FPBN: A New Formalism for Evaluating Hybrid Bayesian Networks Using Fuzzy Sets and Partial Least-Squares.
Proceedings of the Advances in Intelligent Computing, 2005

A Dynamic Threshold and Subsection Control TCP Slow-Start Algorithm.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

The Effect of Correlation on the Accuracy of Meta-Learning Approach.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

Evolving RBF Neural Networks for Pattern Classification.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Graphical XQuery Language Using Nested Windows.
Proceedings of the Web Information Systems, 2004

Hybrid particle swarm optimizer with line search.
Proceedings of the IEEE International Conference on Systems, 2004

WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Distributed Load Balancing in Peer-to-Peer Computing.
Proceedings of the Fourth International Conference on Electronic Business, 2004

STS: A Share Taper System for Storage Area Networks.
Proceedings of the Grid and Cooperative Computing, 2004

Feature Selection with Particle Swarms.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Supervisor-student model in particle swarm optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004


  Loading...