Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Li, Xin Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 5 reviews    
  Next and next new POI recommendation via latent behavior pattern inference
Li X., Han D., He J., Liao L., Wang M. ACM Transactions on Information Systems 37(4): 1-28, 2019.  Type: Article

The objective of a recommender system is to suggest relevant items or preferences to users. Similar to other recommendations, for example, for products, movies or books, point-of-interest (POI) recommendations can help travelers and tourists find ...
...
Jan 25 2022  
  Dependable visual light-based indoor localization with automatic anomaly detection for location-based service of mobile cyber-physical systems
Liu Y., Chen X., Kadambi D., Bari A., Li X., Hu S., Zhou P. ACM Transactions on Cyber-Physical Systems 3(1): 1-17, 2018.  Type: Article

Indoor localization for mobile devices can employ beacons inserted in known positions in the environment. Light-emitting diodes (LEDs) are becoming popular beacons because of their simplicity; however, using the light for localization ...
...
Jul 2 2021  
  DFM evaluation using IC diagnosis data
Blanton R., Wang F., Xue C., Nag P., Xue Y., Li X. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 36(3): 463-474, 2017.  Type: Article

During the processes of designing and manufacturing integrated circuits, the yield, which is calculated as the percentage of manufactured integrated circuits that pass all of the tests and function properly, is one of the major concern...
...
Apr 27 2018  
  CipherXRay: exposing cryptographic operations and transient secrets from monitored binary execution
Li X., Wang X., Chang W. IEEE Transactions on Dependable and Secure Computing 11(2): 101-114, 2014.  Type: Article

CipherXRay is a new binary analysis framework, which, based on the execution of potentially obfuscated binary executables and one critical assumption, can automatically analyze and identify not only the cryptographic operations, but al...
...
Nov 7 2014  
  An online blog reading system by topic clustering and personalized ranking
Li X., Yan J., Fan W., Liu N., Yan S., Chen Z. ACM Transactions on Internet Technology 9(3): 1-26, 2009.  Type: Article

The authors propose a personalized blog reader (PBR) system that helps bloggers find interesting posts. Their proposal includes an online incremental clustering algorithm that uses blog link and content information, and, for personaliz...
...
Oct 19 2009  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy