Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    An SGX-based execution framework for smart contracts upon permissioned blockchain

    Since consensus protocol and execution mechanism act as two key factors for the overall throughput of blockchain systems, how to execute smart contracts efficiently becomes an emergent bottleneck as many high-...

    Min Fang, Zhao Zhang, Cheqing **, Aoying Zhou in Distributed and Parallel Databases (2024)

  2. No Access

    Chapter and Conference Paper

    A Raft Variant for Permissioned Blockchain

    Many permissioned blockchain systems adopt Raft as one of the consensus protocol options, however, comparing with traditional distributed systems, blockchain system has more nodes which makes Raft faces challe...

    Zheming Ye, **ng Tong, Wei Fan, Zhao Zhang in Database Systems for Advanced Applications (2023)

  3. No Access

    Chapter and Conference Paper

    Dynamic Feature Selection for Structural Image Content Recognition

    Structural image content recognition (SICR) aims to transcribe a two-dimensional structural image (e.g., mathematical expression, chemical formula, or music score) into a token sequence. Existing methods are m...

    Yingnan Fu, Shu Zheng, Wenyuan Cai, Ming Gao, Cheqing ** in MultiMedia Modeling (2023)

  4. No Access

    Article

    On measuring network robustness for weighted networks

    Network robustness measures how well network structure is strong and healthy when it is under attack, such as vertices joining and leaving. It has been widely used in many applications, such as information dif...

    Jianbing Zheng, Ming Gao, Ee-Peng Lim, David Lo in Knowledge and Information Systems (2022)

  5. No Access

    Chapter and Conference Paper

    Enhancing Seq2seq Math Word Problem Solver with Entity Information and Math Knowledge

    Devising an automatic Math Word Problem (MWP) solver has emerged as an important task in recent years. Various applications such as online education and intelligent assistants are expecting better MWP solvers ...

    Lei Li, Dongxiang Zhang, Chengyu Wang in Web Information Systems Engineering – WISE… (2022)

  6. No Access

    Chapter and Conference Paper

    Trajectory Similarity Search with Multi-level Semantics

    With the widespread popularity of intelligent mobile devices, massive trajectory data have been captured by mobile devices. Although trajectory similarity search has been studied for a long time, most existing...

    Jianbing Zheng, Shuai Wang, Cheqing ** in Algorithms and Architectures for Parallel … (2022)

  7. No Access

    Book and Conference Proceedings

    Intelligent Computing and Block Chain

    First BenchCouncil International Federated Conferences, FICC 2020, Qingdao, China, October 30 – November 3, 2020, Revised Selected Papers

    Dr. Wanling Gao, Dr. Kai Hwang in Communications in Computer and Information Science (2021)

  8. No Access

    Chapter and Conference Paper

    SQL-Middleware: Enabling the Blockchain with SQL

    With the development of blockchain, blockchain has a broad prospect as a new type of data management system. However, limited to the data modeling method of blockchain, the usability of blockchain is restricte...

    **ng Tong, Haibo Tang, Nan Jiang, Wei Fan in Database Systems for Advanced Applications (2021)

  9. No Access

    Chapter and Conference Paper

    PEEP: A Parallel Execution Engine for Permissioned Blockchain Systems

    Unlike blockchain systems in public settings, the stricter trust model in permissioned blockchain opens an opportunity for pursuing higher throughput. Recently, as the consensus protocols are developed signifi...

    Zhihao Chen, **aodong Qi, **aofan Du in Database Systems for Advanced Applications (2021)

  10. No Access

    Article

    An enhanced wildcard-based fuzzy searching scheme in encrypted databases

    Under the overwhelming trend in Cloud Computing, Cloud Databases possessing high scalability / high availability / high parallel performance have become a prevalent paradigm of data outsourcing. In considerati...

    Jiaxun Hua, Yu Liu, He Chen, **uxia Tian, Cheqing ** in World Wide Web (2020)

  11. No Access

    Article

    Popular route planning with travel cost estimation from trajectories

    With the increasing number of GPS-equipped vehicles, more and more trajectories are generated continuously, based on which some urban applications become feasible, such as route planning. In general, popular r...

    Hui** Liu, Cheqing **, Aoying Zhou in Frontiers of Computer Science (2020)

  12. No Access

    Article

    A framework for cloned vehicle detection

    Rampant cloned vehicle offenses have caused great damage to transportation management as well as public safety and even the world economy. It necessitates an efficient detection mechanism to identify the vehic...

    Minxi Li, Jiali Mao, **aodong Qi, Cheqing ** in Frontiers of Computer Science (2020)

  13. No Access

    Chapter and Conference Paper

    WTPST: Waiting Time Prediction for Steel Logistical Queuing Trucks

    In the absence of reasonable queuing rules for trucks transporting steel raw materials, the trucks have to wait in long queues inside and outside the steel mill. It necessitates effective waiting time predicti...

    Wei Zhao, Jiali Mao, Shengcheng Cai, Peng Cai in Database Systems for Advanced Applications (2020)

  14. No Access

    Chapter and Conference Paper

    Adaptive Loading Plan Decision Based upon Limited Transport Capacity

    Cargo distribution is one of most critical issues for steel logistics industry, whose core task is to determine cargo loading plan for each truck. Due to cargos far outnumber available transport capacity in st...

    Jiaye Liu, Jiali Mao, Jiajun Liao in Database Systems for Advanced Applications (2020)

  15. No Access

    Chapter and Conference Paper

    Blockchain PG: Enabling Authenticated Query and Trace Query in Database

    Blockchain comes under the spotlight for successfully implementing a tamper-resistant ledger among multiple untrusted participants. The widespread adoption of blockchain in data-intensive applications has led ...

    Qingxing Guo, Sijia Deng, Lei Cai, Yanchao Zhu, Zhao Zhang, Cheqing ** in Web and Big Data (2020)

  16. No Access

    Chapter and Conference Paper

    Authenticated Range Query Using SGX for Blockchain Light Clients

    Due to limited computing and storage resources, light clients and full nodes coexist in a typical blockchain system. Any query from light clients must be forwarded to full nodes for execution, and light client...

    Qifeng Shao, Shuaifeng Pang, Zhao Zhang in Database Systems for Advanced Applications (2020)

  17. No Access

    Chapter and Conference Paper

    AuthQX: Enabling Authenticated Query over Blockchain via Intel SGX

    With the popularization of blockchain technology in traditional industries, though the desire for supporting various authenticated queries becomes more urgent, current blockchain platforms cannot offer suffici...

    Shuaifeng Pang, Qifeng Shao, Zhao Zhang in Database Systems for Advanced Applications (2020)

  18. No Access

    Article

    A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services

    Jiaxun Hua, Yu Liu, Yibin Shen, **uxia Tian, Yifeng Luo in Frontiers of Computer Science (2019)

  19. No Access

    Article

    Distributed top-k similarity query on big trajectory streams

    Recently, big trajectory data streams are generated in distributed environments with the popularity of smartphones and other mobile devices. Distributed top-k similarity query, which finds k trajectories that are...

    Zhigang Zhang, **aodong Qi, Yilin Wang, Cheqing ** in Frontiers of Computer Science (2019)

  20. No Access

    Chapter and Conference Paper

    TCL: Tensor-CNN-LSTM for Travel Time Prediction with Sparse Trajectory Data

    Predicting the travel time of a given path plays an indispensable role in intelligent transportation systems. Although many prior researches have struggled for accurate prediction results, most of them achieve...

    Yibin Shen, Jiaxun Hua, Cheqing ** in Database Systems for Advanced Applications (2019)

previous disabled Page of 3