Skip to main content

and
  1. Article

    Open Access

    vChecker: an application-level demand-based co-scheduler for improving the performance of parallel jobs in Xen

    Big data analysis requires the speedup of parallel computing. However, in the virtualized systems, the power of parallel computing is not fully exploited due to the limit of current VMM schedulers. Xen, one of...

    Peng Jiang, Ligang He, Shenyuan Ren, Zhiyan Chen, Rui Mao in Wireless Networks (2022)

  2. Article

    Open Access

    Contention-aware prediction for performance impact of task co-running in multicore computers

    In this paper, we investigate the influential factors that impact on the performance when the tasks are co-running on a multicore computers. Further, we propose the machine learning-based prediction framework ...

    Shenyuan Ren, Ligang He, Junyu Li, Zhiyan Chen, Peng Jiang in Wireless Networks (2022)

  3. No Access

    Chapter and Conference Paper

    Control of Pneumatic Artificial Muscles with SNN-based Cerebellar-Like Model

    Soft robotics technologies have gained growing interest in recent years, which allows various applications from manufacturing to human-robot interaction. Pneumatic artificial muscle (PAM), a typical soft actua...

    Hongbo Zhang, Yunshuang Li, Yipin Guo, **nyi Chen, Qinyuan Ren in Social Robotics (2021)

  4. No Access

    Chapter and Conference Paper

    Scheduling DAG Applications for Time Sharing Systems

    When computing the makespan of a DAG, it is typically assumed that the tasks scheduled on the same computing node run in sequence. In reality, however, the tasks may be run in the time sharing manner. Our stud...

    Shenyuan Ren, Ligang He, Junyu Li, Chao Chen in Algorithms and Architectures for Parallel … (2018)

  5. No Access

    Chapter and Conference Paper

    PEM4RFID: Privacy Enhancement Model for RFID Systems

    With the wider application of radio frequency identification (RFID) technology in various vital systems, more and more privacy threats and security flaws have been emerging. Traditional RFID systems only focus...

    Guangquan Xu, Yuanyuan Ren, Bin Liu in Algorithms and Architectures for Parallel … (2015)