default search action
Endong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Yue Li, Endong Wang:
Construction of personalized recommendation model for educational video game resources based on knowledge graph. Entertain. Comput. 50: 100660 (2024) - [c17]Feiyu Chen, Cong Xu, Qi Jia, Yihua Wang, Yuhan Liu, Haotian Zhang, Endong Wang:
Egocentric Vehicle Dense Video Captioning. ACM Multimedia 2024: 137-146 - 2023
- [j10]Pengsong Duan, Chen Li, Jie Li, Xianfu Chen, Chao Wang, Endong Wang:
WISDOM: Wi-Fi-Based Contactless Multiuser Activity Recognition. IEEE Internet Things J. 10(2): 1876-1886 (2023) - 2022
- [j9]Pengsong Duan, Chen Li, Bo Zhang, Endong Wang:
WiPD: A Robust Framework for Phase Difference-based Activity Recognition. Mob. Networks Appl. 27(6): 2280-2291 (2022) - [c16]Rengang Li, Baoyu Fan, Xiaochuan Li, Runze Zhang, Zhenhua Guo, Kun Zhao, Yaqian Zhao, Weifeng Gong, Endong Wang:
Towards Further Comprehension on Referring Expression with Rationale. ACM Multimedia 2022: 4336-4344 - [c15]Rengang Li, Cong Xu, Zhenhua Guo, Baoyu Fan, Runze Zhang, Wei Liu, Yaqian Zhao, Weifeng Gong, Endong Wang:
AI-VQA: Visual Question Answering based on Agent Interaction with Interpretability. ACM Multimedia 2022: 5274-5282 - 2021
- [j8]Pengsong Duan, Hao Li, Bo Zhang, Yangjie Cao, Endong Wang:
APFNet: Amplitude-Phase Fusion Network for CSI-Based Action Recognition. Mob. Networks Appl. 26(5): 2024-2034 (2021) - [c14]Li Wang, Baoyu Fan, Zhenhua Guo, Yaqian Zhao, Runze Zhang, Rengang Li, Weifeng Gong, Endong Wang:
Knowledge-Supervised Learning: Knowledge Consensus Constraints for Person Re-Identification. ACM Multimedia 2021: 1866-1874 - [i1]Chen Li, JinZhe Jiang, Yaqian Zhao, RenGang Li, Endong Wang, Xin Zhang, Kun Zhao:
Genetic Algorithm based hyper-parameters optimization for transfer Convolutional Neural Network. CoRR abs/2103.03875 (2021)
2010 – 2019
- 2016
- [j7]Xingjun Zhang, Guofeng Zhu, Endong Wang, Scott Fowler, Xiaoshe Dong:
Data De-Duplication with Adaptive Chunking and Accelerated Modification Identifying. Comput. Informatics 35(3): 586-614 (2016) - [j6]Liang Li, Endong Wang, Xiaoshe Dong, Zhengdong Zhu:
The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems. Comput. J. 59(3): 325-337 (2016) - [j5]Hao Zheng, Xiaoshe Dong, Zhengdong Zhu, Baoke Chen, Xiuxiu Bai, Xingjun Zhang, Endong Wang:
Improving the Reliability of the Operating System Inside a VM. Comput. J. 59(5): 715-740 (2016) - [c13]Wenxiao Shi, Endong Wang, Zheng Li, Zhuo Wang, Shaobo Wang:
A load-balance and interference-aware routing algorithm for multicast in wireless mesh network. ICTC 2016: 206-210 - [c12]Endong Wang, Shaohua Wu, Qing Zhang, Jun Liu, Wenlu Zhang, Zhihong Lin, Yutong Lu, Yunfei Du, Xiaoqian Zhu:
The Gyrokinetic Particle Simulation of Fusion Plasmas on Tianhe-2 Supercomputer. ScalA@SC 2016: 25-32 - 2015
- [j4]Xingjun Zhang, Yan Yang, Endong Wang, Ilsun You, Xiaoshe Dong:
Modelling software fault management with runtime verification. Int. J. Ad Hoc Ubiquitous Comput. 20(1): 26-38 (2015) - [j3]Xiuxiu Bai, Endong Wang, Xiaoshe Dong, Xingjun Zhang:
A scalability prediction approach for multi-threaded applications on manycore processors. J. Supercomput. 71(11): 4072-4094 (2015) - [c11]Qinghua Li, Jilong Qin, Xu Ding, Endong Wang, Weifeng Gong:
An On-chip Interconnection QoS Verification Platform of Processor of Large Data for Architectural Modeling Analysis. ICYCSEE 2015: 439-447 - 2014
- [b1]Endong Wang, Qing Zhang, Bo Shen, Guangyong Zhang, Xiaowei Lu, Qing Wu, Yajuan Wang:
High-Performance Computing on the Intel® Xeon Phi™ - How to Fully Exploit MIC Architectures. Springer 2014, ISBN 978-3-319-06485-7, pp. 1-321 - [j2]Liang Li, Endong Wang, Xingjun Zhang, Kang Yan, Tao Ju, Xiaoshe Dong:
A run-time optimization approach for reducing data movements using locality-aware searching. J. Supercomput. 69(2): 864-886 (2014) - [c10]Endong Wang, Hongwei Wang, Jicheng Chen, Weifeng Gong, Fan Ni:
A Novel Node-to-Set Node-Disjoint Fault-Tolerant Routing Strategy in Hypercube. ACA 2014: 58-67 - [c9]Tao Ju, Xiaoshe Dong, Endong Wang, Liang Li, Zhengdong Zhu:
Parallel Optimization Strategies for MIC Heterogeneous Parallel Systems. PAAP 2014: 104-109 - 2013
- [j1]Xingjun Zhang, Endong Wang, Feilong Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong:
A dual process redundancy approach to transient fault tolerance for ccNUMA architecture. Neurocomputing 122: 50-57 (2013) - [c8]Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Weifeng Gong, Xingjun Zhang:
Chariot: A High Compatible Architecture to Improve Virtual Machine Reliability. NAS 2013: 131-140 - [c7]Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Nan Wu, Xingjun Zhang:
Improving Virtual Machine Reliability with Driver Fault Isolation. SNPD 2013: 239-244 - [c6]Hao Zheng, Endong Wang, Yinfeng Wang, Xingjun Zhang, Baoke Chen, Weiguo Wu, Xiaoshe Dong:
Transparent driver-kernel isolation with VMM intervention. TRIOS@SOSP 2013: 2:1-2:16 - 2012
- [c5]Hao Zheng, Xingjun Zhang, Endong Wang, Nan Wu, Xiaoshe Dong:
Achieving High Reliability on Linux for K2 System. ACIS-ICIS 2012: 107-112 - [c4]Xingjun Zhang, Endong Wang, Feilong Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong:
Transient Fault Tolerance for ccNUMA Architecture. IMIS 2012: 197-202 - 2011
- [c3]Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, Weiqing Dong, Xiaoshe Dong:
KVM-based Detection of Rootkit Attacks. INCoS 2011: 703-708 - [c2]Yan Yang, Xingjun Zhang, Endong Wang, Nan Wu, Xiaoshe Dong:
A Scalable Fault Management Architecture for ccNUMA Server. INCoS 2011: 709-714 - [c1]Xingjun Zhang, Endong Wang, Dong Zhang, Yu Wang, Weiguo Wu, Xiaoshe Dong:
Software-Based Detecting and Recovering from ECC-Memory Faults. INCoS 2011: 715-719
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint