
浏览量:4730
Wei Wang
Professor
点击登录, 查看更多内容

论文共 336 篇
Correction to: Memory-based random walk for multi-query local community detection
Partitioning big graph with respect to arbitrary proportions in a streaming manner.
Transaction-aware SSD Cache Allocation for the Virtualization Environment.
Learning Deep Network Representations with Adversarially Regularized Autoencoders.
CloudInsight: Utilizing a Council of Experts to Predict Future Cloud Application Workloads.
Learning Gender-Neutral Word Embeddings.
EAR: Exploiting Uncontrollable Ambient RF Signals in Heterogeneous Networks for Gesture Recognition.
Aegis: An Interference-Negligible RF Sensing Shield.
On Multi-query Local Community Detection.
Inferring Microbial Communities for City Scale Metagenomics Using Neural Networks.
Gracob: a novel graph-based constant-column biclustering method for mining growth phenotype data.
Sparse regression models for unraveling group and individual associations in eQTL mapping.
Compiler Transformations Meet CPU Clock Modulation and Power Capping.
A method for similarity analysis of power system state
Trusted component model and supporting framework based on adaptive mechanism
Fast and robust group-wise eQTL mapping using sparse graphical models.
Allele-specific copy-number discovery from whole-genome and whole-exome sequencing.
Robust Multi-Network Clustering via Joint Cross-Domain Cluster Alignment
A novel scalability metric about iso-area of performance for parallel computing
Performance research on time-triggered Ethernet based on network calculus.
Total orderings defined on the set of all fuzzy numbers.
A fast restarting particle swarm optimizer
Phase transition Particle Swarm Optimization
Dimensions cooperate by Euclidean metric in Particle Swarm Optimization
Bayesian modeling of haplotype effects in multiparent populations.
Searching Dimension Incomplete Databases
Mining User Interests in Web Logs of an Online News Service Based on Memory Model
Detecting API usage obstacles: A study of iOS and Android developer questions
Flexible and robust co-regularized multi-domain graph clustering
The MSR Cookbook: Mining a decade of research
A Linked-Data Model for Semantic Sensor Streams
Towards reliable self-clustering Mobile Ad Hoc Networks
Metric Learning from Relative Comparisons by Minimizing Squared Residual
Bayesian Cognitive Model in Scheduling Algorithm for Data Intensive Computing
Method of EFPI Fiber Sensor in Partial Discharge Detection
A Novel Approach for Target Detection and Classification Using Canonical Correlation Analysis
Cloud-DLS: Dynamic trusted scheduling for Cloud computing
Hierarchical co-clustering based on entropy splitting
A Hybrid Semantic Matchmaker for IoT Services
Semantics for the Internet of Things: Early Progress and Back to the Future
Dynamic trust evaluation and scheduling framework for cloud computing
XMLSnippet: A Coding Assistant for XML Configuration Snippet Recommendation
Large-scale multimedia data mining using MapReduce framework
Chapter 10: Mining genome-wide genetic markers.
Large-scale multimedia data mining using MapReduce framework
HTreeQA: Using Semi-Perfect Phylogeny Trees in Quantitative Trait Loci Study on Genotype Data.
Clustering with relative constraints
LTS: Discriminative subgraph mining by learning from search history
Systematic search for recipes to generate induced pluripotent stem cells.
Trusted Dynamic Scheduling for Large-Scale Parallel Distributed Systems
A Study of Cloning in the Linux SCSI Drivers
Measuring Opinion Relevance in Latent Topic Space
Proceedings of the 2nd ACM Conference on Bioinformatics, Computational Biology and Biomedicine
Bayesian intelligent semantic mashup for tourism
Tools for efficient epistasis detection in genome-wide association study.
Characterizing multi-threaded applications based on shared-resource contention
TEAM: efficient two-locus epistasis tests in human genome-wide association study.
Amphoteric hyaluronic acid derivative for targeting gene delivery.
Resource-aware secure ECG healthcare monitoring through body sensor networks
Trusted Network Coding in Wireless Ad Hoc Networks
Using evidence based content trust model for spam detection
On the design of next-generation wireless networks