default search action
Xiao Zhong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Yemei Liu, Pei Yang, Yong Pi, Lisha Jiang, Xiao Zhong, Junjun Cheng, Yongzhao Xiang, Jianan Wei, Lin Li, Zhang Yi, Huawei Cai, Zhen Zhao:
Automatic identification of suspicious bone metastatic lesions in bone scintigraphy using convolutional neural network. BMC Medical Imaging 21(1): 131 (2021)
2010 – 2019
- 2019
- [j9]Md Monirul Islam, Xiao Zhong, Zeyi Sun, Haoyi Xiong, Wenqing Hu:
Real-time frequency regulation using aggregated electric vehicles in smart grid. Comput. Ind. Eng. 134: 11-26 (2019) - 2018
- [j8]Md Monirul Islam, Xiao Zhong, Haoyi Xiong, Zeyi Sun:
Optimal scheduling of manufacturing and onsite generation systems in over-generation mitigation oriented electricity demand response program. Comput. Ind. Eng. 115: 381-388 (2018) - 2017
- [j7]Xiao Zhong, David Enke:
Forecasting daily stock market return using dimensionality reduction. Expert Syst. Appl. 67: 126-139 (2017) - [j6]Xiao Zhong, David Enke:
A comprehensive cluster and classification mining procedure for daily stock market return forecasting. Neurocomputing 267: 152-168 (2017) - 2015
- [j5]Yali Wang, Bo Gu, Song Liu, Peng Liu, Xiao Zhong:
Stackelberg Game Modeling of Pricing for Mobile Virtual Network Operators. EAI Endorsed Trans. Future Intell. Educ. Environ. 1(4): e1 (2015) - 2014
- [c14]Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. ACISP 2014: 131-147 - [c13]Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter. ICICS 2014: 132-142 - 2013
- [c12]Kai-qi Zhao, Zhi-yuan Qi, Xiao Zhong:
A new direct torque controller to reduce torque ripple for permanent magnet synchronous motor drives. IECON 2013: 2348-2353 - 2012
- [j4]Mikko Salo, Xiao Zhong:
An Inverse Problem for the p-Laplacian: Boundary Determination. SIAM J. Math. Anal. 44(4): 2474-2495 (2012) - [i1]Xiao Zhong, Mingsheng Wang:
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions. IACR Cryptol. ePrint Arch. 2012: 338 (2012) - 2011
- [j3]Jun Tao, Xiao Zhong, Yifei Lu:
Restrictive mechanism of flow control among non-cooperative Internet users. Sci. China Inf. Sci. 54(1): 12-22 (2011) - [j2]Yuan-sheng Luo, Yong Qi, Di Hou, Lin-feng Shen, Ying Chen, Xiao Zhong:
A novel heuristic algorithm for QoS-aware end-to-end service composition. Comput. Commun. 34(9): 1137-1144 (2011) - 2010
- [j1]Qiming Teng, Haichuan Wang, Xiao Zhong, Peter F. Sweeney, Evelyn Duesterwald:
THOR: A performance analysis tool for Java applications running on multicore systems. IBM J. Res. Dev. 54(5): 4 (2010) - [c11]Bo Dong, Jie Qiu, Qinghua Zheng, Xiao Zhong, Jingwei Li, Ying Li:
A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: A Case Study by PowerPoint Files. IEEE SCC 2010: 65-72 - [c10]Bo Dong, Xiao Zhong, Qinghua Zheng, Lirong Jian, Jian Liu, Jie Qiu, Ying Li:
Correlation Based File Prefetching Approach for Hadoop. CloudCom 2010: 41-48 - [c9]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo Li, Qingsong Yao, Ying Chen, Xiao Zhong:
Utilizing RF Interference to Enable Private Estimation in RFID Systems. ICPADS 2010: 83-90 - [c8]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Yunhao Liu, Ying Chen, Xiao Zhong:
Revisting Tag Collision Problem in RFID Systems. ICPP 2010: 178-187 - [c7]Peijian Wang, Yong Qi, Xue Liu, Ying Chen, Xiao Zhong:
Power Management in Heterogeneous Multi-tier Web Clusters. ICPP 2010: 385-394 - [c6]Haichuan Wang, Qiming Teng, Xiao Zhong, Peter F. Sweeney:
Using the middle tier to understand cross-tier delay in a multi-tier application. IPDPS 2010: 1-9 - [c5]Qingsong Yao, Yong Qi, Ying Chen, Xiao Zhong:
A Desynchronization Tolerant RFID Private Authentication Protocol. WASA 2010: 120-124
2000 – 2009
- 2009
- [c4]Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. COMPSAC (1) 2009: 240-245 - [c3]Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:
A Mixed Software Rejuvenation Policy for Multiple Degradations Software System. HPCC 2009: 376-383 - [c2]Haichuan Wang, Qiming Teng, Xiao Zhong, Peter F. Sweeney:
Understanding cross-tier delay of multi-tier application using selective invocation context extraction. Middleware (Companion) 2009: 34 - 2008
- [c1]Qiming Teng, Xiao Zhong, Ying Li, Ying Chen:
Performance Implications of Next-Generation Multi-processing Platforms on e-Business Server Applications. ICEBE 2008: 37-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint