default search action
Cong Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Cong Shi 0001 — University of Michigan, Ann Arbor, MI, USA
- Cong Shi 0002 — Beijing University of Posts and Telecommunications, MOE, Key Laboratory of Universal Wireless Communications, China
- Cong Shi 0003 — Chongqing University, School of Microelectronics and Communication Engineerin, China (and 3 more)
- Cong Shi 0004 — Rutgers University, New Brunswick, NJ, USA (and 1 more)
- Cong Shi 0005 — Georg-August-Universität Göttingen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ling Jiang, Xingyu Chen, Sentao Miao, Cong Shi:
Play it safe or leave the comfort zone? Optimal content strategies for social media influencers on streaming video platforms. Decis. Support Syst. 179: 114148 (2024) - [i6]Leon Frischauf, Otmar Scherzer, Cong Shi:
Quadratic neural networks for solving inverse problems. CoRR abs/2401.09445 (2024) - [i5]Leon Frischauf, Otmar Scherzer, Cong Shi:
Classification with neural networks with quadratic decision functions. CoRR abs/2401.10710 (2024) - 2023
- [j7]Cong Shi, Rui Zhai, Yalin Song, Junyang Yu, Han Li, Yingqi Wang, Longge Wang:
Few-shot Sentiment Analysis Based on Adaptive Prompt Learning and Contrastive Learning. Inf. Technol. Control. 52(4): 1058-1072 (2023) - [j6]Xingyu Chen, Ling Jiang, Sentao Miao, Cong Shi:
Road to micro-celebration: The role of mutation strategy of micro-celebrity in digital media. New Media Soc. 25(12): 3455-3476 (2023) - [c23]Keke Hu, Wenxuan Li, Qianxi Lu, Cong Shi, Bobai Zhao, Yuan Shen:
SRS-based Wideband AoA Estimation Method in 5G New Radio. ICCC 2023: 1-5 - [c22]Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun:
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples. ICCV 2023: 4272-4281 - [c21]Juncheng Dong, Weibin Mo, Zhengling Qi, Cong Shi, Ethan X. Fang, Vahid Tarokh:
PASTA: Pessimistic Assortment Optimization. ICML 2023: 8276-8295 - [i4]Juncheng Dong, Weibin Mo, Zhengling Qi, Cong Shi, Ethan X. Fang, Vahid Tarokh:
PASTA: Pessimistic Assortment Optimization. CoRR abs/2302.03821 (2023) - [i3]Rui Miao, Zhengling Qi, Cong Shi, Lin Lin:
Personalized Pricing with Invalid Instrumental Variables: Identification, Estimation, and Policy Learning. CoRR abs/2302.12670 (2023) - [i2]Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun:
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples. CoRR abs/2307.16361 (2023) - 2022
- [c20]Jingran Chen, Boren Guo, Yang Xu, Tricci So, Cong Shi, Ning Yang, Bowen Xie, Yuxuan Sun, Sheng Zhou:
5GS Assistance for Federated Learning Member Selection in Trajectory Prediction Scenarios. ICCC Workshops 2022: 216-220 - 2021
- [c19]Boyuan Zhang, Qianxi Lu, Cong Shi, Ning Yang, Bingxue Leng, Zhongda Du:
Sidelink Relay in NR and NR Advanced. ICCC Workshops 2021: 358-362 - [i1]Leon Frischauf, Otmar Scherzer, Cong Shi:
Universal approximation properties of shallow quadratic neural networks. CoRR abs/2110.01536 (2021)
2010 – 2019
- 2016
- [c18]Cong Shi, Andreas Bergstrom, Erik Eriksson, Pål K. Frenger, Ali A. Zaidi:
Retransmission Schemes for 5G Radio Interface. GLOBECOM Workshops 2016: 1-6 - 2015
- [j5]Cong Shi, Chen Wang, Guanghui Zheng, Ting Wei:
A new a posteriori parameter choice strategy for the convolution regularization of the space-fractional backward diffusion problem. J. Comput. Appl. Math. 279: 233-248 (2015) - [c17]Cong Shi, Rong Duan:
Multiresolution Mutual Information Method for Social Network Entity Resolution. ICDM Workshops 2015: 240-247 - [c16]Yongde Zhang, Cong Shi, Haiyan Du, Boyang Gu, Yan Yu:
A MRI compatible robot for breast intervention. ROBIO 2015: 2472-2477 - 2014
- [j4]Cong Shi, Chen Wang, Ting Wei:
Numerical solution for an inverse heat source problem by an iterative method. Appl. Math. Comput. 244: 577-597 (2014) - [c15]Xiapu Luo, Lei Xue, Cong Shi, Yuru Shao, Chenxiong Qian, Edmond W. W. Chan:
On Measuring One-Way Path Metrics from a Web Server. ICNP 2014: 203-208 - [c14]Cong Shi, Karim Habak, Pranesh Pandurangan, Mostafa H. Ammar, Mayur Naik, Ellen W. Zegura:
COSMOS: computation offloading as a service for mobile devices. MobiHoc 2014: 287-296 - [c13]Cong Shi, Kaustubh Joshi, Rajesh K. Panta, Mostafa H. Ammar, Ellen W. Zegura:
CoAST: collaborative application-aware scheduling of last-mile cellular traffic. MobiSys 2014: 245-258 - 2013
- [c12]Cong Shi, Haiyong Xie:
Go this way: navigation for better access quality in mobile networks. MobiArch 2013: 41-46 - 2012
- [j3]Cong Shi, Xiapu Luo, Patrick Traynor, Mostafa H. Ammar, Ellen W. Zegura:
ARDEN: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10(6): 918-930 (2012) - [c11]Cong Shi, Vasileios Lakafosis, Mostafa H. Ammar, Ellen W. Zegura:
Serendipity: enabling remote computing among intermittently connected mobile devices. MobiHoc 2012: 145-154 - [c10]Cong Shi, Mostafa H. Ammar, Ellen W. Zegura, Mayur Naik:
Computing in cirrus clouds: the challenge of intermittent connectivity. MCC@SIGCOMM 2012: 23-28 - 2011
- [j2]Yang Chen, Xiao Wang, Cong Shi, Eng Keong Lua, Xiaoming Fu, Beixing Deng, Xing Li:
Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization. IEEE Trans. Netw. Serv. Manag. 8(4): 334-347 (2011) - [c9]Cong Shi, Mostafa H. Ammar, Ellen W. Zegura:
iDTT: Delay Tolerant Data Transfer for P2P File Sharing Systems. GLOBECOM 2011: 1-5 - 2010
- [c8]Yu Sun, Liyi Xiao, Cong Shi:
DSTN sleep transistor sizing with a new approach to estimate the maximum instantaneous current. ISCAS 2010: 3717-3720
2000 – 2009
- 2009
- [c7]Yang Chen, Xiao Wang, Xiaoxiao Song, Eng Keong Lua, Cong Shi, Xiaohan Zhao, Beixing Deng, Xing Li:
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. Networking 2009: 313-325 - 2008
- [j1]Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Yong Yu:
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks. Comput. Commun. 31(2): 318-331 (2008) - [c6]Cong Shi, Dingyi Han, Xinyao Hu, Yong Yu:
A unified model of pollution in P2P networks. IPDPS 2008: 1-12 - 2007
- [c5]Xinyao Hu, Shicong Meng, Cong Shi, Dingyi Han, Yong Yu:
Predicting Query Duplication with Box-Jenkins Models and Its Applications. Peer-to-Peer Computing 2007: 79-86 - 2006
- [c4]Shicong Meng, Cong Shi, Dingyi Han, Xing Zhu, Yong Yu:
A Statistical Study of Today's Gnutella. APWeb 2006: 189-200 - [c3]Shicong Meng, Yifeng Shao, Cong Shi, Dingyi Han, Yong Yu:
Mining and Predicting Duplication over Peer-to-Peer Query Streams. ICDM Workshops 2006: 648-652 - [c2]Cong Shi, Shicong Meng, Yuanjie Liu, Dingyi Han, Yong Yu:
Reinforcement Learning for Query-Oriented Routing Indices in Unstructured Peer-to-Peer Networks. Peer-to-Peer Computing 2006: 267-274 - 2002
- [c1]Cong Shi, Zongwang Li, Dijia Wu, Wentao Song, Hanwen Luo:
Turbo product codes on frequency selective fading channel. VTC Spring 2002: 1233-1236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint