学术论文

Year 2018

1.Yun Xiong, Yizhou Zhang, Xiangnan Kong, Yangyong Zhu. NetCycle+: A Framework for Collective Evolution Inference in Dynamic Heterogeneous Networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2018, 30(8), 1547-1560.CCF A

2.Zhang Y, Xiong Y, Kong X, et al. Deep Collective Classification in Heterogeneous Information Networks [C]. WWW, 2018: 399-408.CCF A

3.朱扬勇,熊贇,廖志成,等.数据自治开放模式[J].大数据,20184(2)3-14.

4.沈逸,姚旭,朱扬勇.数据自治开放与治理模式创新[J].大数据,20184(2)14-20.

5.熊贇,朱扬勇.面向数据自治开放的数据盒模型[J].大数据,20184(2)21-30.

6.吴毅坚,陈士壮,葛佳丽,等.数据自治开放的软件开发和运行环境[J].大数据,20184(2)31-41.

7.王智慧,周旭晨,朱云.数据自治开放模式下的隐私保护[J].大数据,20184(2)42-49.

8.黄霖,黎源,汪星辰,等.数据自治开放的加密技术挑战[J].大数据,20184(2)50-62.

9.陈德华,潘乔,王梅,等.数据自治开放应用平台设计与实践[J].大数据,20184(2)63-71.

Year 2017

10.Jiang Q, Peng X, Wang H, et al. Understanding systematic and collaborative code changes by mining evolutionary trajectory patterns[J]. Journal of Software: Evolution & Process, 2017, 29(3): 1840-1861.CCF B

11.Lin Y, Meng G, Xue Y, et al. Mining implicit design templates for actionable code reuse[C]. ASE, 2017:394-404.CCF A

12.Qian W, Peng X, Yu Y, et al.O2O service composition with social collaboration [C]. ASE, 2017: 451-461.CCF A

13.Sun G, Xiong Y, Zhu Y. How the passengers flow in complex metro networks ? [C]. International Conference on Scientific and Statistical Database Management (SSDBM). 2017:23.CCF C

14.Wang J, Peng X, Xing Z, et al. Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process[C]. SCAM, 2017: 61-70.CCF C

15.Wang X, Zhang W, Wang Z, et al. Eunomia: Scaling concurrent search trees under contention using HTM[C]. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), 2017:385-399.CCF A

16.Wei H, Yang C, Yu Q. Efficient graph-based search for object detection[J]. Information Sciences, 2017, 385-386:395-414.CCF B

17.Yu Q, Wei H, Yang C. Local part chamfer matching for shape-based object detection[J]. Pattern Recognition, 2017, 65:82-96.CCF B

18.Zhang W, Ji X, Song B, et al. VarCatcher: A framework for tackling performance variability of parallel workloads on multi-core[J]. IEEE Transactions on Parallel & Distributed Systems, 2017, 28(4):1215-1228.CCF A

19.Zhang Y, Xiong Y, Liu X, et al. Meta-path graphical lasso for learning heterogeneous connectivities[C]. SIAM International Conference on Data Mining (SDM), 2017: .642-650.CCF B

20.Zhang Y, Xiong Y, Kong X, et al. Learning Node Embeddings in Interaction Graphs[C]// ACM on Conference on Information and Knowledge Management. ACM, 2017:397-406.CCF B

21.Zheng J, Peng X, Yang J, et al. CollaDroid: Automatic augmentation of android application with lightweight interactive collaboration[C]. ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW), 2017:2462-2474.CCF A

22.朱扬勇,熊贇.大数据的若干基础研究方向[J.大数据,20173(2):104-114.

Year 2016

23.Chen B, Peng X, Liu Y, et al. Architecture-based behavioral adaptation with generated alternatives and relaxed constraints[J]. IEEE Transactions on Services Computing, 2016, PP(99):1-1.CCF B

24.Chen J, Zhang Q, Huang X. Incorporate group information to enhance network embedding[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2016:1901-1904.CCF B

25.Chen J, Zhang Q, Liu P, et al. Discourse relations detection via a mixed Generative-Discriminative framework[C]. AAAI Conference on Artificial Intelligence (AAAI), 2016:2921-2927.CCF A

26.Chen J, Zhang Q, Liu P, et al. Implicit discourse relation detection via a deep architecture with gated relevance network[C]. Annual Meeting of the Association for Computational Linguistics (ACL), 2016:1726-1735.CCF A

27.Chi M, Plaza A, Benediktsson J, et al. Big data for remote sensing: challenges and opportunities[J]. Proceedings of the IEEE, 2016, 104(11):2207-2219.CCF A

28.Cui W, Xiao Y, Wang W. KBQA: an online template based question answering system over freebase[C]. International Joint Conference on Artificial Intelligence (IJCAI), 2016:4240-4241.CCF A

29.Cui W, Zhou X, Lin H, et al. Verb pattern: a probabilistic semantic representation on verbs[C]. AAAI Conference on Artificial Intelligence (AAAI), 2016:2587-2593.CCF A

30.Fang Z, Han W, Li D, et al. revDroid: Code analysis of the side effects after dynamic permission revocation of android Apps[C]. ACM on Asia Conference on Computer and Communications Security (ASIA CCS), 2016:747-758.CCF A

31.Gong Y, Zhang Q. Hashtag recommendation using attention-based convolutional neural network[C]. International Joint Conference on Artificial Intelligence (IJCAI), 2016:2782-2788.CCF A

32.Han W, Li Z, Yuan L, et al. Regional patterns and vulnerability analysis of Chinese web passwords[J]. IEEE Transactions on Information Forensics & Security, 2016, 11(2):258-272.CCF A

33.He C, Tan Z, Chen Q, et al. Repair diversification: A new approach for data repairing[J]. Information Sciences, 2016, s 346–347:90-105.CCF B

34.He X, Wang X, Li D, et al. Semi-homogenous generalization: Improving homogenous generalization for privacy preservation in cloud computing [J]. 2016, Journal of computer science and technology (JCST). 2016, 31(6): 1124–1135.CCF B

35.Lei J, Bai R, Guo L, et al. Towards a scalable framework for artifact-centric business process management systems[C]. International Conference on Web Information Systems Engineering (WISE), 2016:309-323.CCF C

36.Liao M, Liu X, Gao X, et al. iSim: An efficient integrated similarity based collaborative filtering approach for trust prediction in Service-Oriented social networks[C]. International Conference on Service-Oriented Computing (ICSOC). 2016:501-516.CCF B

37.Lin Y, Peng X, Cai Y, et al. Interactive and guided architectural refactoring with search-based recommendation[C]. ACM SIGSOFT International Symposium on Foundations of Software Engineering (STOC), 2016: 535-546.CCF A

38.Ma J, Sun L, Wang H, et al. Supervised anomaly detection in uncertain pseudoperiodic data streams[C]. ACM Transaction on Internet Technology (TOIT), 2016: 1-20.CCF B

39.Ni M, Zhang Y, Han W, et al. An empirical study on user access control in online social networks[C]. ACM on Symposium on Access Control MODELS and Technologies (SACMAT), 2016:13-23.CCF C

40.Lu Y, Li Y, Song B, et al. Parallelizing image feature extraction algorithms on multi-core platforms[J]. Journal of Parallel and Distributed Computing, 2016, 92(C): 1-14.CCF B

41.Lu Y, Wang X, Zhang W, et al. Performance analysis of multimedia retrieval workloads running on multicores[J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(11):3323-3337.CCF A

42.Peng X, Gu J, Tan T H, et al. Crowd Service: serving the individuals through mobile crowdsourcing and service composition[C]. IEEE/ACM International Conference on Automated Software Engineering (ASE), 2016:214-219.CCF A

43.Qian W, Peng X, Wang H, et al. MobiGoal: flexible achievement of personal goals for mobile users[J]. IEEE Transactions on Services Computing, 2016, PP(99):1-1.CCF B

44.Sun X, Wang H, Xiao Y, et al. Syntactic Parsing of Web Queries[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2016:1787-1796.CCF B

45.Tang Y, Ma P, Kong B, et al. ESAP: A novel approach for Cross-Platform event dissemination trend analysis between social network and search engine[C]. International Conference on Web Information Systems Engineering (WISE), 2016:489-504.CCF C

46.Wang T, Zhao Y. Secure Dynamic SSE via access indistinguishable storage[C]. ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2016:535-546.CCF A

47.Wang X, Ji X, Lu Y, et al. Understanding the architectural characteristics of EDA algorithms[C]. International Conference on Parallel Processing (ICPP), 2016:139-148.CCF B

48.Wei H, Dai Z, Zuo Q. A ganglion-cell-based primary image representation method and its contribution to object recognition[J]. Connection Science, 2016, 28:311-331.CCF C

49.Wei H, Yu Q, Yang C. Shape-based object recognition via evidence accumulation inference[J]. Pattern Recognition Letters, 2016, 77:42-49.CCF C

50.Wu H, Mao J, Sun W, et al. Probabilistic robust route recovery with spatio-temporal dynamics[C]. ACM Knowledge Discovery and Data Mining (SIGKDD), 2016:1915-1924.CCF A

51.Wu H, Sun W, Zheng B. Is only one gps position sufficient to locate you to the road network accurately?[C]. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2016:740-751.CCF A

52.Xu B, Zhang Y, Liang J, et al. Cross-Lingual type inference[C]. International Conference on Database Systems for Advanced Applications (DASFAA), 2016:447-462.CCF B

53.Yan Y, Tan Z, Gao X, et al. STH-Bass: A spatial-temporal heterogeneous bass model to predict single-tweet popularity[C]. Database Systems for Advanced Applications (DASFAA), 2016:18-22.CCF B

54.Yao C, Yung M, Zhao Y. Concurrent knowledge extraction in Public-Key models[J]. Journal of Cryptology, 2016, 29(1):156-219.CCF A

55.Zhang Q, Gong Y, Wu J, et al. Retweet prediction with attention-based deep neural network[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2016:75-84.CCF B

56.Zhang Q, Qian J, Guo Y, et al. Generating abbreviations for Chinese named entities using recurrent neural network with dynamic dictionary[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2016:721-730.CCF B

57.Zhang Q, Wang Y, Gong Y, et al. Keyphrase extraction using deep recurrent neural networks on twitter[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP), 2016:836-845.CCF B

58.Zhang W, Wang H, Lu Y, et al. A loosely-coupled full-system multicore simulation framework[J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(6):1566-1578.CCF A

59.Zhang W, Yu S, Wang H, et al. Hardware support for concurrent detection of multiple concurrency bugs on fused CPU-GPU architectures[J]. IEEE Transactions on Computers, 2016, 65(10):3083-3095.CCF A

60.Zhang Y, Cao J, Gao X, et al. FR-Index: A Multi-dimensional indexing framework for Switch-Centric data centers[C]. Database and Expert Systems Applications (DEXA). 2016:326-334.CCF C

61.Zhang Y, Xiong Y, Kong X, et al. NetCycle: Collective evolution inference in heterogeneous information networks[C]. ACM Knowledge Discovery and Data Mining (SIGKDD), 2016:1365-1374.CCF A

62.Zhao W, Liu H, Dai W, et al. An entropy-based clustering ensemble method to support resource allocation in business process management[J]. Knowledge & Information Systems, 2016, 48(2):305-330.CCF B

63.Zhao W, Wu R, Liu H. Paper recommendation based on the knowledge gap between a researcher's background knowledge and research target[J]. Information Processing & Management, 2016, 52(5):976-988.CCF B

64.Zhao Y. Identity-Concealed authenticated encryption and key exchange[C]. ACM Sigsac Conference on Computer and Communications Security (CCS), 2016:1464-1479.CCF A

Year 2015

65.Chen H, Li Y, Shen J, et al. Online service search based on multi-dimensional semantic service model[C]. International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2015: 171-175.CCF C

66.Chen Q, Tan Z, He C, et al. Repairing functional dependency violations in distributed data[C]. Database Systems for Advanced Applications (DASFAA), 2015:441-457.CCF B

67.Gong Y, Zhang Q, Huang X. Hashtag recommendation using dirichlet process mixture models incorporating types of hashtags[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2015:401-410. CCF B

68.Gong Y, Zhang Q, Sun X, et al. Who Will You @? [J]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:533-542.CCF B

69.Guo Z, Han W, Liu L, et al. SPA: Inviting your friends to help set android apps[C]. ACM Symposium on Access Control MODELS and Technologies (SACMAT), 2015:221-231.CCF C

70.Han W, Zhang Y, Guo Z, et al. Fine-grained business data confidentiality control in cross-organizational tracking[C]. ACM Symposium on Access Control MODELS and Technologies (SACMAT), 2015:135-145.CCF C

71.Jiang Q, Peng X, Wang H, et al. Summarizing evolutionary trajectory by grouping and aggregating relevant code changes[C]. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:361-370.CCF B

72.Jiang S, Shen L, Peng X, et al. Understanding developers' natural language queries with interactive clarification[C]. IEEE, International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:13-22.CCF B

73.Li H, Zhao X, Xing Z, et al. amAssist: In-IDE ambient search of online programming resources[C]. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:390-398.CCF B

74.Li Y, Yang W, Dan W, et al. Keyword-Aware dominant route search for various user preferences[C]. Database Systems for Advanced Applications (DASFAA), 2015: 207-222.CCF B

75.Lin Y, Peng X, Xing Z, et al. Clone-based and interactive recommendation for modifying pasted code[C]. Joint Meeting on Foundations of Software Engineering (FSE), 2015:520-531.CCF A

76.Liu P, Qiu X, Huang X. Learning context-sensitive word embeddings with neural tensor skip-gram model[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1284-1290.CCF A

77.Liu P, Sun W, Zhang J, et al. An automaton-based index scheme supporting twig queries for on-demand XML data broadcast[J]. Journal of Parallel & Distributed Computing, 2015, 86(C):82-97.CCF B

78.Lu Y, Wang X, Zhang W, et al. Characterizing multi-media retrieval applications[C]. International Conference on Parallel Processing (ICPP), 2015:270-279.CCF B

79.Nan Y, Yang M, Yang Z, et al. UIPicker: User-Input privacy identification in mobile applications[C]. USENIX Security Symposium (USENIX Security), 2015:993-1008.CCF A

80.Qian W, Peng X, Chen B, et al. Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems[J]. Requirements Engineering, 2015, 20(3):233-252.CCF B

81.Qiu X, Huang X. Convolutional neural tensor network architecture for community-based question answering[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1305-1311.CCF A

82.Shan Z, Wu H, Sun W, et al. COBWEB: a robust map update system using GPS trajectories[C]. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015:927-937.CCF A

83.Sun J, Xiong Y, Zhu Y, et al. Multi-source information fusion for personalized restaurant recommendation[C]. International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), 2015:983-986.CCF A

84.Sun W, Chen C, Zheng B, et al. Fast optimal aggregate point search for a merged set on road networks[J]. Information Sciences, 2015, 310(C):52-68.CCF B

85.Sun W, Chen C, Zhu L. On efficient aggregate nearest neighbor query processing in road networks[J]. Journal of Computer Science and Technology, 2015, 30(4):2243-2248.CCF B

86.Sun X, Xiao Y, Wang H, et al. On conceptual labeling of a bag of words[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1326-1332.CCF A

87.Wei H. A bio-inspired method for object representation[C]. International Joint Conference on Neural Networks (IJCNN), 2015:1-8.CCF C

88.Wei H, Cheng W. A shape recognition method based on syntax-automaton[C]. IEEE, International Conference on TOOLS with Artificial Intelligence (ICTAI), 2015:784-790.CCF C

89.Wei H, Tang X, Liu H. A genetic algorithm(GA)-based method for the combinatorial optimization in contour formation[J]. Appllied Intelligence, 2015, 43:112-131.CCF C

90.Wei H, Zuo Q. A biologically inspired neurocomputing circuit for image representation[J]. Neurocomputing, 2015, 164:96-111.CCF C

91.Weng D, Wang Y, Gong M, et al. DERF: Distinctive efficient robust features from the biological modeling of the P ganglion cells[J]. IEEE Transactions on image processing, 2015, 24(8):2287-2302.CCF A

92.Weng J, Zhao Y, Deng R H, et al. A note on the security of KHL scheme[J]. Theoretical Computer Science, 2015, 602:1-6.CCF B

93.Xie Z, Jiang L, Ye T, et al. A synthetic minority oversampling method based on local densities in Low-Dimensional space for imbalanced learning[C]. Database Systems for Advanced Applications (DASFAA), 2015:3-18.CCF B

94.Wu Q, Yang W, Chen Z, et al. Research of semantic understanding on target region of interest for fuzzy image[J]. Engineering Applications of Artificial Intelligence, 2015, 37:135-114.CCF C

95.Wu H, Tu C, Sun W, et al. GLUE: a Parameter-Tuning-Free map updating system[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:683-692.CCF B

96.Xie Z, Jiang L, Ye T, et al. MPTM: A topic model for multi-part documents[C]. Database Systems for Advanced Applications (DASFAA), 2015:154-168.CCF B

97.Xiong Y, Zhu Y, Yu P. Top-k similarity join in heterogeneous information networks[J]. IEEE Transactions on Knowledge & Data Engineering, 2015, 27(6):1710-1723.CCF A

98.Yang D, He J, Qin H, et al. A graph-based recommendation across heterogeneous Domains[J]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:463-472.CCF B

99.Yang D, Xiao Y, Song Y, et al. Semantic-based recommendation across heterogeneous domains[C]. IEEE International Conference on Data Mining (ICDM), 2015:1075-1080.CCF B

100.Yang D, Xiao Y, Tong H, et al. An integrated tag recommendation algorithm towards weibo user profiling[C]. Database Systems for Advanced Applications (DASFAA), 2015:353-373.CCF B

101.Yao W, He J, Wang H, et al. Collaborative topic ranking: leveraging item meta-data for sparsity reduction[C]. AAAI Conference on Artificial Intelligence (AAAI), 2015:374-380.CCF A

102.Ye L, Qian K, Zhang L. S-PDH: A CPS service contract framework for composition[C]. International Conference on Service-Oriented Computing (ICSOC), 2015:79-90.CCF B

103.Zhang W, Li J, Li Y, et al. Multilevel phase analysis[J]. ACM Transactions on Embedded Computing Systems, 2015, 14(2):1-29.CCF B

104.Zhou J, Zhu S, Huang X, et al. Enhancing time series clustering by incorporating multiple distance measures with semi-supervised learning[J]. Journal of Computer Science and Technology, 2015, 30(4):859-873.CCF B

105.佘玉轩熊赟.Medas:一个基于Medline的生物医学文献分析系统[J].计算机研究与发展2015(1):102-106.EI.北大核心

106.熊赟朱扬勇.特异群组挖掘:框架与应用[J].大数据2015(2):66-77.

107.杨丽琴康国胜郭立鹏.一种适用于多样性环境的业务流程挖掘方法[J].软件学报201526(3):550-561.EI.北大核心

108.朱扬勇熊赟.大数据是数据、技术还是应用[J].大数据20151(1):71-81.

109.张一舟曾剑平孙婧.OMisy:一个面向股吧数据的观点挖掘系统[J].计算机研究与发展2015(1):123-128.EI.北大核心

Year 2014

110.Chen B, Peng X, Yu Y, et al. Requirements-Driven Self-Optimization of Composite Services using Feedback Control[J]. IEEE Transactions on Services Computing, 2014, 2298866:1-14.CCF B

111.Chan W, Du J, Yang W, et al. Term selection and result reranking for question retrieval by exploiting hierarchical classification[C]. ACM International Conference on Conference on Information and Knowledge Management (CIKM), 2014:141-150.CCF B

112.Chen B, Peng X, Yu Y, et al. Self-adaptation through incremental generative model transformations at runtime[C]. International Conference on Software Engineering (ICSE), 2014:676-687.CCF A

113.Chen B, Peng X, Yu Y, et al. Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation[J]. Journal of Systems & Software, 2014, 90(1):114-127.CCF B

114.Cui W, Xiao Y, Wang H, et al. Local search of communities in large graphs[C]. ACM Conference on Management of Data (SIGMOD), 2014: 991-1002.CCF A

115.Dai Z, Wang H, Zhang W, et al. Hydra: efficient detection of multiple concurrency bugs on fused CPU-GPU architecture[C]. International Conference on Parallel Processing (ICPP), 2014:331-340.CCF B

116.Du J, Chan W, Zhou X. A product aspects identification method by using translation-based language model[C]. International Conference on Pattern Recognition (ICPR), 2014:2790-2795.CCF C

117.Fang Z, Han W, Li Y. Permission based Android security: Issues and countermeasures[J]. Computers & Security, 2014, 43(6):205-218.CCF B

118.Han W, Fang Z, Chen W, et al. Collaborative Policy Administration[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 498-507.CCF A

119.He C, Tan Z, Chen Q, et al. Repair diversification for functional dependency violations[C]. Database Systems for Advanced Applications (DASFAA), 2014:468-482.CCF B

120.Hu H, Zhang M, He Z, et al. Topical presentation of search results on database[C]. Database Systems for Advanced Applications (DASFAA), 2014:343-360.CCF B

121.Li C, Sun J, Xiong Y, et al. An efficient Drug-Target interaction mining algorithm in heterogeneous biological networks[C]. Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2014:65-76.CCF C

122.Li Q, Wang P, Wang W, et al. An efficient K-means clustering algorithm on mapReduce[C]. Database Systems for Advanced Applications (DASFAA), 2014:357-371.CCF B

123.Li Z, Han W, Xu W. A large-scale empirical analysis of Chinese web passwords[C]. Usenix Security Symposium (USENIX Security), 2014:559-574.CCF A

124.Lin Y, Xing Z, Peng X, et al. Clonepedia: summarizing code clones by common syntactic context for software maintenance[C]. IEEE International Conference on Software Maintenance and Evolution (ICSME), 2014:341-350.CCF B

125.Lin Y, Xing Z, Xue Y, et al. Detecting differences across multiple instances of code clones[C]. International Conference on Software Engineering (ICSE), 2014:164-174.CCF A

126.Peng X, Xie Y, Yu Y, et al. Evolving commitments for self-adaptive socio-technical systems[C]. IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2014:98-107.CCF C

127.Qian W, Peng X, Chen B, et al. Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation[C]. IEEE International Requirements Engineering Conference (RE), 2014:113-122.CCF B

128.Sun W, Qin Y, Wu J, et al. Air Indexing for On-Demand XML Data Broadcast[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(6):1371-1381.CCF A

129.Sun Y, Ding X, Lindtner S, et al. Being senior and ICT:a study of seniors using ICT in China[C]. Sigchi Conference on Human Factors in Computing Systems (CHI), 2014:3933-3942.CCF A

130.Wang L, Xiao Y, Shao B, et al. How to partition a billion-node graph[C]. IEEE International Conference on Data Engineering (ICDE), 2014:568-579.CCF A

131.Wei H, Dong Z. Local image descriptor inspired by visual cortex[J]. European Conference on Artificial Intelligence (ECAI), 2014, 263:1125-1126.CCF B

132.Wei H, Dong Z. V4 neural network model for visual saliency and discriminative local representation of shapes[C]. International Joint Conference on Neural Networks (IJCNN), 2014:3420-3427.CCF C

133.Wei H, Lang B, Zuo Q S. An image representation of infrastructure based on non-classical receptive field[J]. Soft Computing, 2014, 18(1):109-123.CCF C

134.Wei H, Tang X. A genetic-algorithm-based explicit description of object contour and its ability to facilitate recognition[J]. IEEE Transactions on Cybernetics, 2014, 45(11):2558-2571.CCF B

135.Wei H, Zuo Q. A bio-inspired early-level image representation and its contribution to object recognition[C]. International Conference on Pattern Recognition (ICPR), 2014:4263-4268.CCF C

136.Xiao J, Wei H. Scale-invariant contour segment context in object detection[J]. Image and Vision Computing, 2014, 32:1055-1066.CCF C

137.Yang D, Xiao Y, Song Y, et al. Tag propagation based recommendation across diverse social media[C]. International Conference on World Wide Web (WWW), 2014:407-408.CCF A

138.Zhang K, Xiao Y, Tong H, et al. WiiCluster: a platform for wikipedia infobox generation[C]. ACM International Conference on Conference on Information and Knowledge Management (CIKM), 2014:2033-2035.CCF B

139.Zhang Y, Yang M, Yang Z, et al. Permission use analysis for vettingundesirable behaviors in Android Apps[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(11):1828-1842.CCF A

140.董瑞志彭鑫赵文耘.一种基于问题框架的软件密集型系统增量需求问题求解方法[J].计算机学报201437(03):551-567.EI.北大核心

141.林日昶陈碧欢彭鑫.支持风险偏好的Web服务动态组合方法[J].中国科学:信息科学2014441:130-141.CCF B

Year 2010

142.汤春蕾董家麒戴东波.一种序列模式的相似性查询算法[J].计算机研究与发展2011(z2):510-517.EI.北大核心

143.戴东波熊赟朱扬勇.基于参考集索引的高效序列相似性查找算法[J].软件学报20104:718-731.EI.北大核心

144.朱扬勇戴东波熊赟.序列数据相似性查询技术研究综述[J].计算机研究与发展20102:264-276.EI.北大核心

145.戴东波汤春蕾邱伯仁.一种优化多重过滤的序列查询算法[J].计算机研究与发展201010:1785-1796.EI.北大核心

146.戴东波汤春蕾熊赟.基于整体和局部相似性的序列聚类算法[J].软件学报20104:702-717.EI.北大核心

Year 2009

147.孙圣力李金玖朱扬勇.高效处理分布式数据流上skyline持续查询算法[J].软件学报20097:1839-1853. DOI:10.3724/SP.J.1001.2009.03340.EI.北大核心

友情链接
联系我们
地址: 中国 上海市浦东新区张衡路825号复旦大学张江校区计算机楼
邮编: 201203
电话: +86-21-51355518 / +86-21-51355100
传真: +86-21-51355100
E-mail: dataology@fudan.edu.cn