Hematch: a redundancy layout placement scheme for erasure-coded storages in practical heterogeneous failure patterns J Zhang, SS Li, XK Liao, SL Peng, XD Liu, ZY Jia Science China Information Sciences 58 (6), 1-11, 2015 | 137* | 2015 |
IMGPU: GPU-accelerated influence maximization in large-scale social networks X Liu, M Li, S Li, S Peng, X Liao, X Lu IEEE Transactions on Parallel and Distributed Systems 25 (1), 136-145, 2014 | 74 | 2014 |
SMARTLOG: Place error log statement by deep understanding of log intention Z Jia, S Li, X Liu, X Liao, Y Liu 2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018 | 41 | 2018 |
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks X Liu, X Liao, S Li, S Zheng, B Lin, J Zhang, L Shao, C Huang, L Xiao Complexity 2017, 1-14, 2017 | 22 | 2017 |
Confmapper: Automated variable finding for configuration items in source code S Zhou, X Liu, S Li, W Dong, X Liao, Y Xiong 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 21 | 2016 |
In-time estimation for influence maximization in large-scale social networks X Liu, S Li, X Liao, L Wang, Q Wu Proceedings of the Fifth Workshop on Social Network Systems, 3, 2012 | 16 | 2012 |
Leach: an automatic learning cache for inline primary deduplication system B Lin, S Li, X Liao, J Zhang, X Liu Frontiers of Computer Science 8, 175-183, 2014 | 15 | 2014 |
Detecting Error-Handling Bugs without Error Specification Input Z Jia, S Li, T Yu, X Liao, J Wang, X Liu, Y Liu 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 14 | 2019 |
Do You Really Know How to Configure Your Software? Configuration Constraints in Source Code May Help X Liao, S Zhou, S Li, Z Jia, X Liu, H He IEEE Transactions on Reliability 67 (3), 832-846, 2018 | 12 | 2018 |
一种基于 RBAC 模型的角色管理方法 范小康, 何连跃, 王晓川, 刘晓东, 林彬, 申彤, 宋晓虹 计算机研究与发展 49 (S1), 211-215, 2012 | 12 | 2012 |
PathZip: A lightweight scheme for tracing packet path in wireless sensor networks X Lu, D Dong, X Liao, S Li, X Liu Computer Networks 73, 1-14, 2014 | 11 | 2014 |
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures Z Jia, S Li, T Yu, C Zeng, E Xu, X Liu, J Wang, X Liao 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 10 | 2021 |
The architecture and traffic management of wireless collaborated hybrid data center network H Huang, X Liao, S Li, S Peng, X Liu, B Lin Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 511-512, 2013 | 10 | 2013 |
MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration Testing T Wang, X Liu, S Li, X Liao, W Li, Q Liao 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 9 | 2018 |
Know by a handful the whole sack: efficient sampling for top-k influential user identification in large graphs X Liu, S Li, X Liao, S Peng, L Wang, Z Kong World Wide Web 17, 627-647, 2014 | 9 | 2014 |
Easier Said Than Done: Diagnosing Misconfiguration via Configuration Constraints Analysis: A Study of the Variance of Configuration Constraints in Source Code S Zhou, S Li, X Liu, X Xu, S Zheng, X Liao, Y Xiong Proceedings of the 21st International Conference on Evaluation and …, 2017 | 8 | 2017 |
SEED: Semantic Graph based Deep detection for type-4 clone Z Xue, Z Jiang, C Huang, R Xu, X Huang, L Hu International Conference on Software and Software Reuse, 120-137, 2022 | 6 | 2022 |
ConfInLog: Leveraging Software Logs to Infer Configuration Constraints S Zhou, X Liu, S Li, Z Jia, Y Zhang, T Wang, W Li, X Liao 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC …, 2021 | 6 | 2021 |
Seadown: 一种异构 MapReduce 集群中面向 SLA 的能耗管理方法 林彬, 李姗姗, 廖湘科, 孟令丙, 刘晓东, 黄訸 计算机学报 36 (5), 977-987, 2013 | 6 | 2013 |
The Design and Building of openKylin on RISC-V Architecture W Wang, X Liu, J Yu, J Li, Z Mao, Z Li, C Ding, C Zhang 2022 15th International Conference on Advanced Computer Theory and …, 2022 | 4 | 2022 |