实验室首页 |  教师介绍  |  学生简历  |  课题研究  |  成果共享  |  联系方式  |  学术活动 
网包分类 
特征匹配 
流量管理 
策略部署 
系统实现 
其他方向 
 
覆盖网络 
综述文章 
 

其他方向

撰写文章:

[22] Feng Xie, Zhen Chen, Jiaxing Shang, Xiaoping Feng and Jun Li. A Link Prediction Approach for Item Recommendation with Complex Number. Knowledge based Systems, pp148-158, Vol. 81, Jun 2015.

[21] Feng Xie, Zhen Chen, Jiaxing Shang, Wenliang Huang and Jun Li. Item Similarity Learning Methods for Collaborative Filtering Recommender Systems. Proc. of the 29th International Conference on Advanced Information Networking and Applications, 2015.

[20] Feng Xie, Zhen Chen, Jiaxing Shang, Xiaoping Feng, Wenliang Huang and Jun Li. A link prediction approach for item recommendation with complex number. Proc. of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies (WI-IAT), 2014.

[19] Feng Xie, Zhen Chen, Jiaxing Shang and Geoffrey C. Fox. Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation. Knowledge-Based Systems, pp179-190, Vol. 69, Oct 2014.

[18] Colin Scott, Andreas Wundsam, Aurojit Panda, Barath Raghavan, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, H.B. Acharya, Kyriakos Zarifis and Scott Shenker. Troubleshooting SDN Control Software with Minimal Causal Sequences. Proc. of the ACM SIGCOMM, 2014.

[17] Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang and Yibo Xue. Droid-Sec: Deep Learning in Android Malware Detection. Proc. of the ACM SIGCOMM, 2014. (poster)

[16] Zhenlong Yuan, Xiaoxian Chen, Yibo Xue and Yingfei Dong. Cloud-Entry: Elusive Tor Entry Points in Cloud. Proc. of the 35th IEEE Symposium on Security and Privacy, 2014. (poster)

[15] Baohua Yang, Junda Liu, Scott Shenker, Jun Li and Kai Zheng. Keep Forwarding: Towards K-link Failure Resilient Routing. Proc. of the 33th IEEE INFOCOM, 2014.

[14] Xiaoqi Ren, Zhi Liu, Yaxuan Qi, Jun Li and Shanghua Teng. Sampling-based Smoothed Analysis for Network Algorithm Evaluation. Proc. of the IEEE GLOBECOM, 2013.

[13] Feng Xie, Zhen Chen, Hongfeng Xu, Xiwei Feng and Qi Hou. TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing. Tsinghua Science and Technology, pp318-327, Vol. 18, No. 3, Jun 2013.

[11] Yang Gao, Yibo Xue and Jun Li. A Novel Utilization-aware Allocation Method for Multi-Tenant Datacenters. Proc. of the first International Workshop on Resource Management of Cloud Computing (CCRM), 2013.

[10] Feng Xie, Ming Xu and Zhen Chen. RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. Proc. of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012.

[9] Yang Gao, Lu Li, Jingjie Jiang, Baohua Yang, Yibo Xue and Jun Li. SEAL: Hybrid Resource Distribution for Multi-tenant Data Centers. Proc. of the 2nd International Conference on Computer and Management (CAMAN), 2012.

[8] Lingyun Ruan, An'an Luo and Zhen Chen. TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.

[7] Aditya Dhananjay, Hui Zhang, Jinyang Li and Lakshmi Submaranian. Practical, Distributed Channel Assignment and Routing in Dual-radio Mesh Networks. Proc. of ACM SIGCOMM 2009. (poster)

[6] Zongwei Zhou. Security Enhancement Over Ad-hoc AODV Routing Protocol. Proc. of the 4th IASTED Conference on Communication, Network, and Information Security (CNIS), 2007.

[5] Zhiming Zhang, Weirong Jiang and Yibo Xue. A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. Proc. of the 6th International Conference on Networking (ICN), 2007. (Best paper award)

[4] Shenke Qiu, Huaxia Rui and Le Zhang. No-reference Perceptual Quality Assessment for Streaming Video Based on Simple End-to-end Network Measures. Proc. of the 2006 International Conference on Networking and Services (ICNS), 2006.

[3] Weirong Jiang and Chao Zhang. A Portable Real-time Emulator for Testing Multi-Radio MANETs. Proc. of the 14th IEEE Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 2006.

[2] Weirong Jiang. A Lightweight Secure SIP Model for End-to-End Communication. Proc. of the 10th International Symposium on Broadcasting Technology (ISBT), 2005.

[1] Weirong Jiang. Data Structure Optimization of AS_PATH in BGP. Proc. of the 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC), 2005.

 


Copyright© 2004 NSLab. All Rights Reserved