Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Explaining Federated Learning Through Concepts in Image Classification

    Federated learning is a machine learning framework that solves the problem of data silos under secure data protection measures and is gradually becoming a machine learning paradigm for future AI development. I...

    Jiaxin Shen, **aoyi Tao, Liangzhi Li in Algorithms and Architectures for Parallel … (2024)

  2. No Access

    Chapter and Conference Paper

    Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing

    Coded computing has proven its efficiency in tolerating stragglers in distributed computing. Workers return the sub-computation results to the master after computing, and the master recovers the final computat...

    Wei Jiang, ** Wang, Lingzhi Li, Dongyang Yu in Algorithms and Architectures for Parallel … (2024)

  3. No Access

    Chapter and Conference Paper

    RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain

    Recently, permissioned blockchain has been extensively explored in various fields, such as asset management, supply chain, healthcare, and many others. Many scholars are dedicated to improving its verifiabilit...

    Dongyang Yu, ** Wang, Lingzhi Li, Wei Jiang in Algorithms and Architectures for Parallel … (2024)

  4. No Access

    Chapter and Conference Paper

    Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations

    Although cross-domain recommender systems (CDRSs) are promising approaches to solving the cold-start problem, most CDRSs require overlapped users, which significantly limits their applications. To remove the o...

    Zhi Li, Daichi Amagata, Yihong Zhang in Advances in Knowledge Discovery and Data M… (2023)

  5. No Access

    Chapter and Conference Paper

    Evaluating the Parallel Execution Schemes of Smart Contract Transactions in Different Blockchains: An Empirical Study

    In order to increase throughput, more and more blockchains begin to provide the ability to execute smart contract transactions in parallel. However, there is currently no research work on evaluating parallel e...

    Jianfeng Shi, Chengzhi Li, Heng Wu in Algorithms and Architectures for Parallel … (2022)

  6. Chapter and Conference Paper

    New Bounds for Maximizing Revenue in Online Dial-a-Ride

    In the Online-Dial-a-Ride Problem (OLDARP) a server travels to serve requests for rides. We consider a variant where each request specifies a source, destination, release time, and revenue that is earned for ...

    Ananya Christman, Christine Chung, Nicholas Jaczko, Tianzhi Li in Combinatorial Algorithms (2020)

  7. No Access

    Chapter and Conference Paper

    Designing, Modeling and Testing of the Flexible Space Probe-Cone Docking and Refueling Mechanism

    According to the requirements of docking and refueling satellites for deep space exploration, the paper presents a docking and refueling mechanism under a weak impact rendezvous and docking conditions. The fle...

    Longfei Huang, Zhi Li, Jianbin Huang, Wenlong Wang in Intelligent Robotics and Applications (2019)

  8. No Access

    Chapter and Conference Paper

    Last-Position Elimination-Based Fireworks Algorithm for Function Optimization

    As rising swarm intelligence, fireworks algorithm (FWA) is designed to search the global optimum by the cooperation between the firework with the best fitness named as core firework (CF) and the other non-CFs

    JunQi Zhang, WeiZhi Li in Advances in Swarm Intelligence (2019)

  9. No Access

    Chapter and Conference Paper

    Conceptual Design of Ejection, Aerostat and Rolling Group Detectors

    Floating exploration in near Mars is a new mode between orbiting detection and landing detection, synthesized with the advantages of orbiter’s global coverage and rover’s high image definition. Rolling explora...

    Qunzhi Li, Chao Ma, Wangjun Zhang, Han Wang in Intelligent Robotics and Applications (2019)

  10. No Access

    Chapter and Conference Paper

    Research on Spatial Target Classification and Recognition Technology Based on Deep Learning

    With the progress of human space technology, mankind stepped into more distant space. Due to the long distance from the earth in deep space exploration, higher requirements were put forward for intelligent cog...

    Yujia Pang, Zhi Li, Bo Meng, Zhimin Zhang in Intelligent Robotics and Applications (2019)

  11. No Access

    Chapter and Conference Paper

    The Design and Implementation of Random Linear Network Coding Based Distributed Storage System in Dynamic Networks

    Nowadays, different end devices with different computation and bandwidth capabilities acquire data from Internet. To improve efficiency of data storage and retrieve, in this paper, we study how to use random l...

    Bin He, ** Wang, **gya Zhou, Kejie Lu in Algorithms and Architectures for Parallel … (2018)

  12. No Access

    Chapter and Conference Paper

    Text Classification Based on ReLU Activation Function of SAE Algorithm

    In order to solve the deep self-coding neural network training process, the Sigmoid function back-propagation gradient is easy to disappear, a method based on ReLU activation function is proposed for training ...

    Jia-le Cui, Shuang Qiu, Ming-yang Jiang in Advances in Neural Networks - ISNN 2017 (2017)

  13. No Access

    Chapter and Conference Paper

    Learning Convolutional Ranking-Score Function by Query Preference Regularization

    Ranking score plays an important role in the system of content-based retrieval. Given a query, the database items are ranked according to the ranking scores in a descending order, and the top-ranked items are ...

    Guohui Zhang, Gaoyuan Liang, Weizhi Li in Intelligent Data Engineering and Automated… (2017)

  14. Chapter and Conference Paper

    A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems

    Nowadays, embedded systems have been widely deployed in numerous applications. Firmwares in embedded systems are typically custom-built to provide a set of very specialized functionalities. They are prone to t...

    Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan in Information and Communications Security (2016)

  15. No Access

    Chapter and Conference Paper

    Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles

    Path inference is an essential component for many location based services. In this paper, we study the problem of inferring vehicle moving paths from noisy and incomplete data captured by GPS devices mounted o...

    Hongtao Wang, Hui Wen, Feng Yi, Zhi Li in Wireless Algorithms, Systems, and Applicat… (2016)

  16. No Access

    Chapter and Conference Paper

    Unfolding the Core Structure of the Reciprocal Graph of a Massive Online Social Network

    Google+ (G+ in short) is a directed online social network where nodes have either reciprocal (bidirectional) edges or parasocial (one-way) edges. As reciprocal edges represent strong social ties, we study the cor...

    Braulio Dumba, Zhi-Li Zhang in Combinatorial Optimization and Applications (2016)

  17. No Access

    Chapter and Conference Paper

    An Inclusion Rule for Vantage Point Tree Range Query Processing

    Similarity search is a common computational task in many applications. Distance-based indexing techniques are proposed to enhance performance for similarity search in metric space. In this paper, we propose an...

    Guohang Zeng, Qiaozhi Li, Huiming Jia, **ngliang Li, Yadi Cai in Human Centered Computing (2015)

  18. No Access

    Chapter and Conference Paper

    A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model

    Topology control is a fundamental problem in wireless sensor networks. Most of the existing results on topology control focused on how to reduce energy consumption, improve the effectiveness of networks, and p...

    Kan Yu, Zhi Li, Qiang Li, Jiguo Yu in Wireless Algorithms, Systems, and Applications (2015)

  19. No Access

    Chapter and Conference Paper

    Fast Genetic Algorithm for Pick-up Path Optimization in the Large Warehouse System

    The order-picking processes of fixed shelves in a warehouse system require high speed and efficiency. In this study, a novel fast genetic algorithm was proposed for constrained multi-objective optimization pro...

    Yongjie Ma, Zhi Li, Wenxia Yun in Advances in Swarm and Computational Intelligence (2015)

  20. No Access

    Chapter and Conference Paper

    Distributed Authentication in the Cloud Computing Environment

    The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to imp...

    Yanzhu Liu, Zhi Li, Yuxia Sun in Algorithms and Architectures for Parallel Processing (2015)

previous disabled Page of 3