|
|
|
|
|
Hu, Chenyi
Univ. of Central Arkansas
Conway, Arkansas
|
|
|
|
|
|
|
| Chenyi Hu is a professor of computer science at the University of Central Arkansas, where he also served as the department chairperson for 11 years (2002 to 2013). From 1990 to 2002, he served as a faculty member in the computer and mathematical sciences at the University of Houston-Downtown; in 1999, he received the university’s Faculty Scholarly/Creativity Award. Chenyi’s main research interest is in scientific computing and applications, especially with interval methods. He has published about 100 related articles and book chapters. He is an editor and main contributor of the book Knowledge Processing with Interval and Soft Computing, published by Springer in 2008. His research work has been supported by the US National Science Foundation through grant awards. He has taught various courses, ranging from programming introduction to advanced algorithms. He has also been actively involved in various professional services. For example, as a program evaluator for the ABET Computing Accreditation Commission, he visited and assessed multiple computer science undergraduate degree programs at universities in the US for their ABET accreditation. Chenyi received his PhD from the Department of Mathematics at the University of Louisiana, Lafayette in 1990; an MS degree in mathematics from Southern Illinois University, Edwardsville in 1987; and an undergraduate diploma in applied mathematics from Anhui University, China in 1976. He has been a reviewer for Computing Reviews since 2003. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 34
reviews
|
|
|
|
|
|
|
|
randUTV: a blocked randomized algorithm for computing a rank-revealing UTV factorization Martinsson P., Quintana-Ortí G., Heavner N. ACM Transactions on Mathematical Software 45(1): 1-26, 2019. Type: Article
Matrix singular value decomposition (SVD) has broad applications in both computational linear algebra and data analysis. Robust SVD algorithms and sophisticated software implementations have been available in the literature for decades...
|
Jul 12 2021 |
|
|
|
|
|
|
Rehumanized crowdsourcing: a labeling framework addressing bias and ethics in machine learning Barbosa N., Chen M. CHI 2019 (Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK, May 4-9, 2019) 1-12, 2019. Type: Proceedings
Crowdsourcing is the practice of obtaining information or input into a task from a large number of people, either paid or unpaid, typically via the Internet. With its fast growth, crowdsourcing has produced large volumes of data manual...
|
Jun 1 2021 |
|
|
|
|
|
|
Engineering resilient collective adaptive systems by self-stabilisation Viroli M., Audrito G., Beal J., Damiani F., Pianini D. ACM Transactions on Modeling and Computer Simulation 28(2): 1-28, 2018. Type: Article
Smart cities, together with the Internet of Things (IoT), are becoming reality at an accelerated speed, supported by the fifth generation of mobile technology (5G) and other advances in technology. The supporting networked computationa...
|
Jul 8 2020 |
|
|
|
|
|
|
Data science data governance Kroll J. IEEE Security and Privacy 16(6): 61-70, 2018. Type: Article
Recent advances in machine learning, data analytics, and artificial intelligence (AI) have empowered human beings to automatically make decisions by processing vast amounts of data much more efficiently than ever before. Along with gre...
|
Sep 23 2019 |
|
|
|
|
|
|
A new block matching algorithm based on stochastic fractal search Betka A., Terki N., Toumi A., Hamiane M., Ourchani A. Applied Intelligence 49(3): 1146-1160, 2019. Type: Article
Block matching is an important technique for applications involving motion estimation, such as in video surveillance, TV broadcasting, video games, and so on. To improve the efficiency and effectiveness of block matching algorithms, th...
|
May 8 2019 |
|
|
|
|
|
|
An optimization model for collaborative recommendation using a covariance-based regularizer Lecron F., Fouss F. Data Mining and Knowledge Discovery 32(3): 651-674, 2018. Type: Article
In the era of big data, we are surrounded by recommendation systems that leverage and predict our responses, from daily shopping patterns to political campaigns and even presidential elections. There are various techniques and algorith...
|
Apr 10 2019 |
|
|
|
|
|
|
The secret formula for choosing the right next role Matsudaira K. Communications of the ACM 61(10): 44-46, 2018. Type: Article
Like it or not, tech professionals still very much enjoy great career opportunities. Searching and changing positions, with various motivations, is just a part of life for some tech professionals. Reported in a recent survey, the tech ...
|
Dec 3 2018 |
|
|
|
|
|
|
Distrust seed set propagation algorithm to detect web spam Goh K., Patchmuthu R., Singh A. Journal of Intelligent Information Systems 49(2): 213-235, 2017. Type: Article
The Internet has become an integral part of the infrastructure of modern society. There have been over one billion websites on the web. To locate webpages closely related to one’s interests, people commonly employ handy searc...
|
Dec 28 2017 |
|
|
|
|
|
|
Models and methods for interval-valued cooperative games in economic management Li D., Springer International Publishing, New York, NY, 2016. 137 pp. Type: Book (978-3-319289-96-0)
When R. E. Moore introduced the idea of interval computation in the later 1950s, his motivation was to automatically validate computational results of floating-point operations performed by digital computers. To accomplish the objectiv...
|
Jun 5 2017 |
|
|
|
|
|
|
Decision tree induction with a constrained number of leaf nodes Wu C., Chen Y., Liu Y., Yang X. Applied Intelligence 45(3): 673-685, 2016. Type: Article
Decision trees are broadly applied in machine learning, especially for data-driven decision making. Training with a subset of data, one may build a decision tree to classify other data items. The concept of the decision tree is not har...
|
Dec 6 2016 |
|
|
|
|
|
|
|
|
|
|
|