default search action
Hong Zhu 0004
Person information
- affiliation: East China Normal University, College of Software, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China
- affiliation: Fudan University, Department of Computer Science and Engineering, Shanghai, China
Other persons with the same name
- Hong Zhu — disambiguation page
- Hong Zhu 0001 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Hong Zhu 0002 — Oxford Brookes University, School of Engineering, Computing and Mathematics, Oxford, UK (and 2 more)
- Hong Zhu 0003 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Hong Zhu 0005 — Xuzhou Medical University, School of Medical Information, Xuzhou, China (and 1 more)
- Hong Zhu 0006 — Xi'an University of Technology, Faculty of Automation and Information Engineering, Xi'an, China
- Hong Zhu 0007 — Institute of Disaster Prevention, College of Ecology and Environment, Beijing, China (and 2 more)
- Hong Zhu 0008 — Southeast University, Key Laboratory of Concrete and Prestressed Concrete Structures of the Ministry of Education, Nanjing, China
- Hong Zhu 0009 — Hong Kong University of Science and Technology, Department of Electronic and Computer Engineering, Hong Kong
- Hong Zhu 0010 — China University of Mining and Technology, School of Information and Electrical Engineering, Xuzhou, China
- Hong Zhu 0011 — Shenzhen University, College of Computer Science and Software Engineering, Shenzhen, China (and 2 more)
- Hong Zhu 0012 — Jiangsu University, Faculty of Science, Zhenjiang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j21]Chao Peng, Jie Zhou, Binhai Zhu, Hong Zhu:
Complexity analysis and algorithms for the Program Download Problem. J. Comb. Optim. 29(1): 216-227 (2015) - 2013
- [c41]Jie Zhou, Tian-Ming Bu, Hong Zhu, Yixiang Chen:
Vehicle Scheduling Problem on Trees. BIC-TA 2013: 535-541 - [c40]Chao Peng, Jie Zhou, Binhai Zhu, Hong Zhu:
The Program Download Problem: Complexity and Algorithms. COCOON 2013: 688-696 - 2012
- [j20]Haitao Jiang, Binhai Zhu, Daming Zhu, Hong Zhu:
Minimum common string partition revisited. J. Comb. Optim. 23(4): 519-527 (2012) - 2011
- [j19]Zeyu Guo, He Sun, Hong Zhu:
Greedy Construction of 2-Approximate Minimum Manhattan Networks. Int. J. Comput. Geom. Appl. 21(3): 331-350 (2011) - 2010
- [c39]Haitao Jiang, Binhai Zhu, Daming Zhu, Hong Zhu:
Minimum Common String Partition Revisited. FAW 2010: 45-52 - [c38]Jie Zhou, Hong Zhu:
A Measurement of Software Trustworthiness Based on Approximation Algorithms. UIC/ATC Workshops 2010: 282-287
2000 – 2009
- 2009
- [j18]Yong Zhang, Francis Y. L. Chin, Hong Zhu:
A 1-Local Asymptotic 13/9-Competitive Algorithm for Multicoloring Hexagonal Graphs. Algorithmica 54(4): 557-567 (2009) - [j17]Chao Peng, Yasuo Tan, Naixue Xiong, Laurence Tianruo Yang, Hong Zhu:
Approximation algorithms for inner-node weighted minimum spanning trees. Comput. Syst. Sci. Eng. 24(3) (2009) - [j16]He Sun, Hong Zhu:
On Construction of Almost-Ramanujan Graphs. Discret. Math. Algorithms Appl. 1(2): 193-204 (2009) - [j15]S. Barry Cooper, Hong Zhu:
Preface: Algorithms, complexity and models of computation. Theor. Comput. Sci. 410(11): 1001-1002 (2009) - [c37]He Sun, Hong Zhu:
On Construction of Almost-Ramanujan Graphs. COCOA 2009: 197-207 - [c36]Kerui Min, Ming-Yang Kao, Hong Zhu:
The Closest Pair Problem under the Hamming Metric. COCOON 2009: 205-214 - [c35]Yixiang Chen, Tian-Ming Bu, Min Zhang, Hong Zhu:
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks. Web Intelligence/IAT Workshops 2009: 62-64 - [c34]Yixiang Chen, Min Zhang, Hong Zhu, Tian-Ming Bu:
Average Transitive Trustworthy Degrees for Trustworthy Networks. RSKT 2009: 682-689 - 2008
- [c33]Zeyu Guo, He Sun, Hong Zhu:
A Fast 2-Approximation Algorithm for the Minimum Manhattan Network Problem. AAIM 2008: 212-223 - [c32]Zeyu Guo, He Sun, Hong Zhu:
Greedy Construction of 2-Approximation Minimum Manhattan Network. ISAAC 2008: 4-15 - 2007
- [j14]Joseph Wun-Tat Chan, Francis Y. L. Chin, Deshi Ye, Yong Zhang, Hong Zhu:
Greedy online frequency allocation in cellular networks. Inf. Process. Lett. 102(2-3): 55-61 (2007) - [j13]Wun-Tat Chan, Yong Zhang, Stanley P. Y. Fung, Deshi Ye, Hong Zhu:
Efficient algorithms for finding a longest common increasing subsequence. J. Comb. Optim. 13(3): 277-288 (2007) - [c31]Rudolf Fleischer, Qi Ge, Jian Li, Hong Zhu:
Efficient Algorithms for k -Disjoint Paths Problems on DAGs. AAIM 2007: 134-143 - [c30]Francis Y. L. Chin, Yong Zhang, Hong Zhu:
Online OVSF Code Assignment with Resource Augmentation. AAIM 2007: 191-200 - [c29]Francis Y. L. Chin, Yong Zhang, Hong Zhu:
A 1-Local 13/9-Competitive Algorithm for Multicoloring Hexagonal Graphs. COCOON 2007: 526-536 - [c28]Amitabh Chaudhary, Danny Z. Chen, Rudolf Fleischer, Xiaobo Sharon Hu, Jian Li, Michael T. Niemier, Zhiyi Xie, Hong Zhu:
Approximating the Maximum Sharing Problem. WADS 2007: 52-63 - [e1]Jin-yi Cai, S. Barry Cooper, Hong Zhu:
Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings. Lecture Notes in Computer Science 4484, Springer 2007, ISBN 978-3-540-72503-9 [contents] - 2006
- [j12]Wun-Tat Chan, Francis Y. L. Chin, Yong Zhang, Hong Zhu, Hong Shen, Prudence W. H. Wong:
A dynamic programming approach of finding an optimal broadcast schedule in minimizing total flow time. J. Comb. Optim. 11(2): 177-187 (2006) - [j11]Qi Ge, Haitao Wang, Hong Zhu:
An Improved Algorithm for Finding the Closest Pair of Points. J. Comput. Sci. Technol. 21(1): 27-31 (2006) - [j10]Yong Zhang, Qi Ge, Rudolf Fleischer, Tao Jiang, Hong Zhu:
Approximating the minimum weight weak vertex cover. Theor. Comput. Sci. 363(1): 99-105 (2006) - [c27]Rudolf Fleischer, Jian Li, Shijun Tian, Hong Zhu:
Non-metric Multicommodity and Multilevel Facility Location. AAIM 2006: 138-148 - [c26]Danny Z. Chen, Rudolf Fleischer, Jian Li, Haitao Wang, Hong Zhu:
Traversing the Machining Graph. ESA 2006: 220-231 - [c25]Joseph Wun-Tat Chan, Francis Y. L. Chin, Deshi Ye, Yong Zhang, Hong Zhu:
Frequency Allocation Problems for Linear Cellular Networks. ISAAC 2006: 61-70 - [c24]Danny Z. Chen, Rudolf Fleischer, Jian Li, Zhiyi Xie, Hong Zhu:
On Approximating the Maximum Simple Sharing Problem. ISAAC 2006: 547-556 - [c23]Li Chen, Hong Zhu, Wei Cui:
Very Fast Region-Connected Segmentation for Spatial Data: Case Study. SMC 2006: 4001-4005 - 2005
- [j9]Jin-yi Cai, Hong Zhu:
Progress in Computational Complexity Theory. J. Comput. Sci. Technol. 20(6): 735-750 (2005) - [c22]Wun-Tat Chan, Francis Y. L. Chin, Yong Zhang, Hong Zhu, Hong Shen, Prudence W. H. Wong:
Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling. COCOON 2005: 318-328 - [c21]Wun-Tat Chan, Yong Zhang, Stanley P. Y. Fung, Deshi Ye, Hong Zhu:
Efficient Algorithms for Finding a Longest Common Increasing Subsequence. ISAAC 2005: 665-674 - 2004
- [j8]Xiaotie Deng, Haodi Feng, Pixing Zhang, Yuzhong Zhang, Hong Zhu:
Minimizing Mean Completion Time in a Batch Processing System. Algorithmica 38(4): 513-528 (2004) - [j7]Ning Chen, Jie Meng, Jiawei Rong, Hong Zhu:
Approximation for Dominating Set Problem with Measure Functions. Comput. Artif. Intell. 23(1): 37-49 (2004) - [j6]Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu:
(2+f(n))-SAT and its properties. Discret. Appl. Math. 136(1): 3-11 (2004) - [j5]Yong Zhang, Hong Zhu:
Approximation Algorithm for Weighted Weak Vertex Cover. J. Comput. Sci. Technol. 19(6): 782-786 (2004) - [c20]Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu:
Some Observations on Zap and Its Applications. ACNS 2004: 180-193 - [c19]Zhide Chen, Hong Zhu:
General Public Key m-Out-of-n Oblivious Transfer. CIS 2004: 888-894 - [c18]Yong Zhang, Hong Zhu:
An Approximation Algorithm for Weighted Weak Vertex Cover Problem in Undirected Graphs. COCOON 2004: 143-150 - [c17]Jiantao Song, Chaofeng Sha, Hong Zhu:
Nash Equilibria in Parallel Downloading with Multiple Clients. ICDCS 2004: 94-101 - [c16]Zhiyun Chen, Huiqin Qu, Mingming Lu, Hong Zhu:
A Probabilistic Parameterized Algorithm for Vertex Cover in Sticker Model. IPDPS 2004 - [c15]Zhide Chen, Hong Zhu:
Quantum m-out-of-n oblivious transfer. ISCC 2004: 375-380 - [c14]Ning Chen, Hong Zhu:
Fully Truthful Mechanisms. SOFSEM 2004: 373-384 - 2003
- [c13]Ning Chen, Hong Zhu:
Incentive Compatible Mechanism Based on Linear Pricing Scheme for Single-Minded Auction. ASIAN 2003: 161-172 - [c12]Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu:
Resettable Zero-Knowledge in the Weak Public-Key Model. EUROCRYPT 2003: 123-139 - [c11]Haibin Kan, Hong Shen, Hong Zhu:
The Closest Vector Problem on Some Lattices. GCC (2) 2003: 446-449 - [c10]Ning Chen, Xiaotie Deng, Hong Zhu:
Double Auction in Two-Level Markets. International Conference on Computational Science 2003: 34-45 - [c9]Jiantao Song, Yong Zhang, Chaofeng Sha, Hong Zhu:
Building Semantic Peer-to-Peer Networks upon CAN. Networked Group Communication 2003: 95-106 - [c8]Ning Chen, Xiaotie Deng, Hong Zhu:
Combinatorial auction across independent markets (extended abstract). EC 2003: 206-207 - [i1]Zhide Chen, Hong Zhu:
Quantum m-out-of-n Oblivious Transfer. CoRR cs.CR/0311039 (2003) - 2002
- [c7]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
(2+ f(n))-SAT and Its Properties. COCOON 2002: 28-36 - [c6]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
Reduction Zero-Knowledge. SCN 2002: 303-317 - 2001
- [c5]Xiaotie Deng, Haodi Feng, Pixing Zhang, Hong Zhu:
A Polynomial Time Approximation Scheme for Minimizing Total Completion Time of Unbounded Batch Scheduling. ISAAC 2001: 26-35
1990 – 1999
- 1999
- [c4]Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31 - 1998
- [j4]Shouhuai Xu, Gendu Zhang, Hong Zhu:
On the Security of Three-Party Cryptographic Protocols. ACM SIGOPS Oper. Syst. Rev. 32(3): 7-20 (1998) - 1997
- [j3]Qi Cheng, Hong Zhu:
MNP: A class of NP optimization problems. J. Comput. Sci. Technol. 12(4): 306-313 (1997) - [j2]Shouhuai Xu, Gendu Zhang, Hong Zhu:
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. ACM SIGOPS Oper. Syst. Rev. 31(4): 12-23 (1997) - 1995
- [c3]Qi Cheng, Hong Zhu:
MNP: A Class of NP Optimization Problems (Extended Abstract). COCOON 1995: 559-565 - 1994
- [j1]Jigang Wu, Hong Zhu:
The least basic operations on heap and improved heapsort. J. Comput. Sci. Technol. 9(3): 261-266 (1994) - 1993
- [c2]Jilei Yin, Hong Zhu:
On the Learnability of a Restricted Predicate Formulae. FCT 1993: 462-471 - [c1]Jilei Yin, Hong Zhu:
Learning Decision Lists from Noisy Examples. MFCS 1993: 761-766
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint