Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Review of the Electric Vehicle Charging Station Location Problem

    In order to encourage energy conservation and emission reduction, electric vehicles (EV) have gradually become one of the most important emerging strategic industries in many countries. With the gradual maturi...

    Yu Zhang, **angtao Liu, Tianle Zhang in Dependability in Sensor, Cloud, and Big Da… (2019)

  2. No Access

    Chapter and Conference Paper

    Emergency Analysis Based on Affective Computing in Universities Forum

    Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The me...

    Lu Zhang, Xu Wu, **aqing **e, ** Xu, Tianle Zhang in Artificial Intelligence and Security (2019)

  3. No Access

    Chapter and Conference Paper

    An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data

    When the datasets about online public opinion are imbalanced, the classifier is prone to sacrifice the accuracy of minority class to achieve the overall best performance. In order to solve this problem, an onl...

    **ge Dang, Xu Wu, **aqing **e, Tianle Zhang in Artificial Intelligence and Security (2019)

  4. No Access

    Chapter and Conference Paper

    Short Text Topic Recognition and Optimization Method for University Online Community

    The university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post...

    Xu Wu, Haitao Wu, **aqing **e, ** Xu, Tianle Zhang in Artificial Intelligence and Security (2019)

  5. No Access

    Chapter and Conference Paper

    Research on Modeling of Software Automatic Test

    Software testing is important activity in software development life cycle, automatic test can cut down cost of manual testing and to increase reliability of it. Many approaches have been proposed for automatic...

    **cui Yang, Yuyu Yuan, Tianle Zhang in Trustworthy Computing and Services (2015)

  6. No Access

    Chapter and Conference Paper

    Enhanced AllJoyn Network with Centralized Management

    The Internet of things is an exciting vision which promises to connect people with things and things with each other in ways. AllJoyn system is proposed to establish the network at the right moment. The struct...

    Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang in Trustworthy Computing and Services (2015)

  7. No Access

    Chapter and Conference Paper

    Human Mobility Simulation in Smart Energy Grid

    Smart grid is an emerging complex system of systems that continually provide distributed communication service to enable an efficient, optimal, reliable, secure energy transmission and distribution. Rapid grow...

    Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan in Trustworthy Computing and Services (2015)

  8. No Access

    Chapter and Conference Paper

    A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks

    In realistic vehicular communication systems, network connections suffer from dynamic mobility and random operations of independent nodes. End to end fully connected path may never exist. VDTNs (Vehicular Dela...

    Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu in Trustworthy Computing and Services (2013)

  9. No Access

    Chapter and Conference Paper

    A Pervasive Technology Approach to Social Trustworthiness

    Growing awareness of environmental concerns has been reflected on more and more public’s attention on low carbon lifestyles. The awareness and public participation could be further enhanced and encouraged via ...

    Wang Hongqi, Zongwei Luo, Tianle Zhang, Yuyu Yuan in Trustworthy Computing and Services (2013)

  10. No Access

    Chapter and Conference Paper

    Vulnerability Evaluating Based on Attack Graph

    Networked hosts are facing more and more threats due to software vulnerabilities. Every year, there are an increasing number of security vulnerabilities discovered in software. It is impractical that we patch ...

    Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang in Trustworthy Computing and Services (2013)