Search
for Author
All Reviews
Chen, Gang
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
6
reviews
Scheduling analysis of imprecise mixed-criticality real-time tasks
Liu D., Guan N., Spasic J., Chen G., Liu S., Stefanov T., Yi W. IEEE Transactions on Computers 67(7): 975-991, 2018. Type: Article
Many systems have several criticality levels: the safety-critical level, which is a higher criticality level, including all the tasks in which a deadline failure would provoke catastrophic effects on the system or even on humans; and m...
...
Nov 12 2018
epiC: an extensible and scalable system for processing big data
Jiang D., Wu S., Chen G., Ooi B., Tan K., Xu J. The VLDB Journal: The International Journal on Very Large Data Bases 25(1): 3-26, 2016. Type: Article
Addressing the problem of performance while processing big data, the authors propose a new programming model, named epiC, that deals with the problem of data variety, for example when data arrives at the evaluation engine as a mix of s...
...
Sep 27 2016
SINGA: putting deep learning in the hands of multimedia users
Wang W., Chen G., Dinh A., Gao J., Ooi B., Tan K., Wang S. MM 2015 (Proceedings of the 23rd Annual ACM Conference on Multimedia, Brisbane, Australia, Oct 26-30, 2015) 25-34, 2015. Type: Proceedings
Deep learning is an aspect of machine learning that attempts, through algorithms, to model complex abstractions in data. A research goal is to create architectures to achieve this with masses of uncharacterized data. This research pape...
...
Dec 14 2015
Supporting privacy protection in personalized web search
Shou L., Bai H., Chen K., Chen G. IEEE Transactions on Knowledge and Data Engineering 26(2): 453-467, 2014. Type: Article
Protecting user privacy in profile-based personalized web search (PWS) is a difficult task. In this paper, a user-customizable privacy-preserving search framework (UPS) is proposed. By incorporating a public taxonomy, this approach can...
...
Sep 24 2014
Heuristic discovery of role-based trust chains in peer-to-peer networks
Chen K., Hwang K., Chen G. IEEE Transactions on Parallel and Distributed Systems 20(1): 83-96, 2009. Type: Article
A problem commonly found in the security of peer-to-peer networks--discovering role-based trust chains--is addressed in this paper. It presents an algorithm with search time complexity
O
(
N<...
...
Aug 20 2009
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy