关注
Hai Jin
标题
引用次数
引用次数
年份
Performance and energy modeling for live migration of virtual machines
H Liu, CZ Xu, H Jin, J Gong, X Liao
Proceedings of the 20th ACM International Symposium on High Performance …, 2013
6002013
Vuldeepecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
5872018
Color image segmentation based on mean shift and normalized cuts
W Tao, H Jin, Y Zhang
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37 …, 2007
5022007
Anysee: Peer-to-peer live streaming
X Liao, H Jin, Y Liu, LM Ni, D Deng
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
4762006
Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
F Liu, P Shu, H Jin, L Ding, J Yu, D Niu, B Li
IEEE Wireless communications 20 (3), 14-22, 2013
4502013
Live virtual machine migration with adaptive, memory compression
H Jin, L Deng, S Wu, X Shi, X Pan
2009 IEEE International Conference on Cluster Computing and Workshops, 1-10, 2009
4342009
Live migration of virtual machine based on full system trace and replay
H Liu, H Jin, X Liao, L Hu, C Yu
Proceedings of the 18th ACM international symposium on High performance …, 2009
3582009
Cloudthings: A common architecture for integrating the internet of things with cloud computing
J Zhou, T Leppanen, E Harjula, M Ylianttila, T Ojala, C Yu, H Jin, LT Yang
Proceedings of the 2013 IEEE 17th international conference on computer …, 2013
3392013
A manifesto for future generation cloud computing: Research directions for the next decade
R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ...
ACM computing surveys (CSUR) 51 (5), 1-38, 2018
3072018
Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions
F Xu, F Liu, H Jin, AV Vasilakos
Proceedings of the IEEE 102 (1), 11-31, 2013
3052013
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
P Xu, H Jin, Q Wu, W Wang
IEEE Transactions on computers 62 (11), 2266-2277, 2012
2982012
Sysevr: A framework for using deep learning to detect software vulnerabilities
Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2021
2722021
Computation offloading toward edge computing
L Lin, X Liao, H Jin, P Li
Proceedings of the IEEE 107 (8), 1584-1607, 2019
2622019
RAID-x: A new distributed disk array for I/O-centric cluster computing
K Hwang, H Jin, R Ho
Proceedings the Ninth International Symposium on High-Performance …, 2000
2612000
Leen: Locality/fairness-aware key partitioning for mapreduce in the cloud
S Ibrahim, H Jin, L Lu, S Wu, B He, L Qi
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
2562010
Object segmentation using ant colony optimization algorithm and fuzzy entropy
W Tao, H Jin, L Liu
Pattern Recognition Letters 28 (7), 788-796, 2007
2552007
iAware: Making live migration of virtual machines interference-aware in the cloud
F Xu, F Liu, L Liu, H Jin, B Li, B Li
IEEE Transactions on Computers 63 (12), 3012-3025, 2013
2492013
A compromised-time-cost scheduling algorithm in swindew-c for instance-intensive cost-constrained workflows on a cloud computing platform
K Liu, H Jin, J Chen, X Liu, D Yuan, Y Yang
The International Journal of High Performance Computing Applications 24 (4 …, 2010
2352010
A game-theoretical approach for user allocation in edge computing environment
Q He, G Cui, X Zhang, F Chen, S Deng, H Jin, Y Li, Y Yang
IEEE Transactions on Parallel and Distributed Systems 31 (3), 515-529, 2019
2252019
TripleBit: a fast and compact system for large scale RDF data
P Yuan, P Liu, B Wu, H Jin, W Zhang, L Liu
Proceedings of the VLDB Endowment 6 (7), 517-528, 2013
2232013
系统目前无法执行此操作,请稍后再试。
文章 1–20