Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Chen, Gang Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 6 reviews    
  Scheduling analysis of imprecise mixed-criticality real-time tasks
Liu D., Guan N., Spasic J., Chen G., Liu S., Stefanov T., Yi W. IEEE Transactions on Computers 67(7): 975-991, 2018.  Type: Article

Many systems have several criticality levels: the safety-critical level, which is a higher criticality level, including all the tasks in which a deadline failure would provoke catastrophic effects on the system or even on humans; and m...
...
Nov 12 2018  
  epiC: an extensible and scalable system for processing big data
Jiang D., Wu S., Chen G., Ooi B., Tan K., Xu J. The VLDB Journal: The International Journal on Very Large Data Bases 25(1): 3-26, 2016.  Type: Article

Addressing the problem of performance while processing big data, the authors propose a new programming model, named epiC, that deals with the problem of data variety, for example when data arrives at the evaluation engine as a mix of s...
...
Sep 27 2016  
  SINGA: putting deep learning in the hands of multimedia users
Wang W., Chen G., Dinh A., Gao J., Ooi B., Tan K., Wang S.  MM 2015 (Proceedings of the 23rd Annual ACM Conference on Multimedia, Brisbane, Australia, Oct 26-30, 2015) 25-34, 2015.  Type: Proceedings

Deep learning is an aspect of machine learning that attempts, through algorithms, to model complex abstractions in data. A research goal is to create architectures to achieve this with masses of uncharacterized data. This research pape...
...
Dec 14 2015  
  Supporting privacy protection in personalized web search
Shou L., Bai H., Chen K., Chen G. IEEE Transactions on Knowledge and Data Engineering 26(2): 453-467, 2014.  Type: Article

Protecting user privacy in profile-based personalized web search (PWS) is a difficult task. In this paper, a user-customizable privacy-preserving search framework (UPS) is proposed. By incorporating a public taxonomy, this approach can...
...
Sep 24 2014  
  Heuristic discovery of role-based trust chains in peer-to-peer networks
Chen K., Hwang K., Chen G. IEEE Transactions on Parallel and Distributed Systems 20(1): 83-96, 2009.  Type: Article

A problem commonly found in the security of peer-to-peer networks--discovering role-based trust chains--is addressed in this paper. It presents an algorithm with search time complexity O(N<...
...
Aug 20 2009  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy