Department of Computer Science
Organisational unit: Academic Departments
Research Output
- 2013
- Published
Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection
Meng, Y., Li, W. & Kwok, L.-F., Jun 2013, Network and System Security: 7th International Conference, NSS 2013, Proceedings. Springer Verlag, Vol. 7873 LNCS. p. 40-53 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 27 - Published
Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
Tan, C. W., Chiang, M. & Srikant, R., Jun 2013, In: IEEE/ACM Transactions on Networking. 21, 3, p. 706-719 6257509.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 78 - Published
Fast Algorithms for Dyck-CFL-Reachability with Applications to Alias Analysis
Zhang, Q., Lyu, M.R.-T., YUAN, H. & Su, Z., Jun 2013, In: SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 48, 6, p. 435-446Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 22 - Published
Faster Exact Computation of rSPR Distance
Chen, Z.-Z. & Wang, L., Jun 2013, Frontiers in Algorithmics and Algorithmic Aspects in Information and Management. Fellows, M., Tan, X. & Zhu, B. (eds.). p. 36-47 (Lecture Notes in Computer Science; vol. 7924).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 3 - Published
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
Wang, C., Ren, K., Wang, J. & Wang, Q., Jun 2013, In: IEEE Transactions on Parallel and Distributed Systems. 24, 6, p. 1172-1181 6231624.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 142 - Published
Interactive Partner Control in Close Interactions for Real-Time Applications
HO, E. S. L., CHAN, J. C. P., KOMURA, T. & LEUNG, H., Jun 2013, In: ACM Transactions on Multimedia Computing, Communications and Applications. 9, 3, 21.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 37 - Published
Localized and configurable topology control in lossy wireless sensor networks
Xing, G., Lu, C., Jia, X. & Pless, R., Jun 2013, In: Ad Hoc Networks. 11, 4, p. 1345-1358Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 14 - Published
Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
WANG, C., Zhang, B., Ren, K. & Roveda, J. M., Jun 2013, In: IEEE Transactions on Emerging Topics in Computing. 1, 1, p. 166 - 177Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 95 - Published
SMashQ: Spatial mashup framework for k-NN queries in time-dependent road networks
Zhang, D., Chow, C.-Y., Li, Q., Zhang, X. & Xu, Y., Jun 2013, In: Distributed and Parallel Databases. 31, 2, p. 259-287Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 27 - Published
Visual tracking via locality sensitive histograms
He, S., Yang, Q., Lau, R. W. H., Wang, J. & Yang, M.-H., Jun 2013, In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. p. 2427-2434 6619158.Research output: Journal Publications and Reviews › RGC 22 - Publication in policy or professional journal
Scopus citations: 310 - Published
Workload-efficient deadline and period assignment for maintaining temporal consistency under EDF
Li, J., Xiong, M., Lee, V. C. S., Shu, L. & Li, G., Jun 2013, In: IEEE Transactions on Computers. 62, 6, p. 1255-1268 6171159.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 19 - Published
An efficient B+-tree design for main-memory database systems with strong access locality
Suei, P.-L., Lee, V. C. S., Lo, S.-W. & Kuo, T.-W., 20 May 2013, In: Information Sciences. 232, p. 325-345Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 5 - Published
Efficient processing of requests with network coding in on-demand data broadcast environments
Chen, J., Lee, V. C. S., Liu, K., Ali, G. G. M. N. & Chan, E., 20 May 2013, In: Information Sciences. 232, p. 27-43Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 27 - Published
A conditional proxy broadcast re-encryption scheme supporting timed-release
Liang, K., Huang, Q., Schlegel, R., Wong, D. S. & Tang, C., May 2013, Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Proceedings. Springer Verlag, Vol. 7863 LNCS. p. 132-146 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 34 - Published
A general noise-reduction framework for fault localization of Java programs
Xu, J., Zhang, Z., Chan, W. K., Tse, T. H. & Li, S., May 2013, In: Information and Software Technology. 55, 5, p. 880-896Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 30 - Published
Algorithms to minimize data transfer for code update on wireless sensor network
Hu, J., Xue, C. J., Qiu, M., Tseng, W.-C. & Sha, E.H.-M., May 2013, In: Journal of Signal Processing Systems. 71, 2, p. 143-157Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Anonymous attribute-based encryption supporting efficient decryption test
Zhang, Y., Chen, X., Li, J., Wong, D. S. & Li, H., May 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 511-516Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 117 - Published
Attribute-based fine-grained access control with efficient revocation in cloud storage systems
Yang, K., Jia, X. & Ren, K., May 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 523-528Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 154 - Published
Compiler directed write-mode selection for high performance low power volatile PCM
Li, Q., Jiang, L., Zhang, Y., He, Y. & Xue, C. J., May 2013, In: ACM SIGPLAN Notices. 48, 5, p. 101-110Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 16 - Published
Dimension-adjacent trees and parallel construction of independent spanning trees on crossed cubes
Cheng, B., Fan, J., Jia, X. & Wang, J., May 2013, In: Journal of Parallel and Distributed Computing. 73, 5, p. 641-652Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 35