default search action
Shilong Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j31]Shilong Ma, Baozhong He, Xiangyu Ge, Xuefeng Luo:
Spatial prediction of soil salinity based on the Google Earth Engine platform with multitemporal synthetic remote sensing images. Ecol. Informatics 75: 102111 (2023) - 2020
- [j30]Qianchen Xia, Jianghua Lv, Shilong Ma, Bocheng Gao, Zhenhua Wang:
A New Information-Theoretic Method for Advertisement Conversion Rate Prediction for Large-Scale Sparse Data Based on Deep Learning. Entropy 22(6): 643 (2020) - [j29]Ronghe Wang, Bo Zhang, Jianning Bi, Xinhai Zhang, Xiaolei Guo, Dong Jiao, Jianghua Lv, Shilong Ma:
Cloud rendering learning platform technology research for visual analysis of large scale 3D multimedia data. Multim. Tools Appl. 79(7-8): 5371-5398 (2020) - [j28]Xiangxi Meng, Jianghua Lv, Shilong Ma:
Applying improved K-means algorithm into official service vehicle networking environment and research. Soft Comput. 24(11): 8355-8363 (2020) - [c44]Jifang Wu, Jianghua Lv, Haoming Guo, Shilong Ma:
Ontology Matching by Jointly Encoding Terminological Description and Network Structure. CCIOT 2020: 77-85
2010 – 2019
- 2019
- [j27]Jiangong Song, Qinyong Li, Shilong Ma:
Toward Bounds on Parallel Execution Times of Task Graphs on Multicores With Memory Constraints. IEEE Access 7: 52778-52789 (2019) - [j26]Ronghe Wang, Bo Zhang, Manqing Wu, Jun Zhang, Xiaolei Guo, Xinhai Zhang, Huibo Li, Dong Jiao, Shilong Ma:
Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications. EURASIP J. Wirel. Commun. Netw. 2019: 79 (2019) - [c43]Xiangxi Meng, Haoming Guo, Jianghua Lv, Shilong Ma:
Research on Data Cache Optimization Based on Time Series State Prediction. ICCCS 2019: 1-5 - [c42]Jianhai Du, Jianghua Lv, Shiwei Gao, Ling Zhan, Qianqian Li, Qinyong Li, Shilong Ma:
Distributed File System for Spacecraft Integrated Test System. ICCCS 2019: 140-144 - [c41]Ronghe Wang, Bo Zhang, Haiyong Xie, Dong Jiao, Shilong Ma:
A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology. CLOUD 2019: 314-323 - 2018
- [j25]Ronghe Wang, Jianghua Lv, Shilong Ma:
A MRI image segmentation method based on medical semaphore calculating in medical multimedia big data environment. Multim. Tools Appl. 77(8): 9995-10015 (2018) - [j24]Shilong Ma, Yilin Wang, Nan Zou, Guolong Liang:
A Broadband Beamformer Suitable for UUV to Detect the Tones Radiated from Marine Vessels. Sensors 18(9): 2928 (2018) - [c40]Wentao Yao, Shilong Ma, Jianghua Lv, Yanfang Liu:
Cloud Storage Behavior Analysis Using Time Series Clustering. CCIS 2018: 90-95 - [c39]Yanfang Liu, Jianghua Lv, Shilong Ma:
A Real Time Anomaly Detection Method Based on Variable N-Gram for Flight Data. HPCC/SmartCity/DSS 2018: 370-376 - [c38]Yanfang Liu, Jianghua Lv, Shilong Ma, Wentao Yao:
The Runtime System Problem Identification Method Based on Log Analysis. ICCCN 2018: 1-7 - [c37]Peihong Huang, Guolei Zheng, Shilong Ma:
Ten-Years Research Progress of Natural Language Understanding Based on Perceptual Formalization. IFIP TC12 ICIS 2018: 191-200 - [c36]Yanfang Liu, Jianwei Niu, Qingjuan Zhao, Jianghua Lv, Shilong Ma:
A Novel Text Classification Method for Emergency Event Detection on Social Media. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1106-1111 - 2017
- [j23]Peng Tian, Jianghua Lv, Shilong Ma, Jin Zheng:
Object tracking by features and particles selection in multiple subspace. Int. J. Comput. Appl. Technol. 56(1): 77-86 (2017) - 2016
- [j22]Qunhui Wu, Shilong Ma, Yunzhen Liu:
Sub-event discovery and retrieval during natural hazards on social media data. World Wide Web 19(2): 277-297 (2016) - 2015
- [j21]Jianghua Lv, Shilong Ma, Xianjun Li, Jiangong Song:
A high order collaboration and real time formal model for automatic testing of safety critical systems. Frontiers Comput. Sci. 9(4): 495-510 (2015) - [j20]Feng Liang, Yunzhen Liu, Hai Liu, Shilong Ma, Bettina Schnor:
A Parallel Job Execution Time Estimation Approach Based on User Submission Patterns within Computational Grids. Int. J. Parallel Program. 43(3): 440-454 (2015) - [j19]Shi-Wei Gao, Jianghua Lv, Bing-Lei Du, Charles J. Colbourn, Shilong Ma:
Balancing Frequencies and Fault Detection in the In-Parameter-Order Algorithm. J. Comput. Sci. Technol. 30(5): 957-968 (2015) - [c35]Rui Li, Shilong Ma, Wentao Yao:
Ontology-Based Requirements Generation for Credibility Validation of Safety-Critical System. CIT/IUCC/DASC/PICom 2015: 849-854 - [c34]Rui Li, Shilong Ma:
The implementation of user interface autogenerate for spacecraft automatic tests based on ontology. FSKD 2015: 2676-2681 - [c33]Qunhui Wu, Jianghua Lv, Shilong Ma:
Continuous Summarization for Microblog Streams Based on Clustering. ICONIP (2) 2015: 371-379 - [c32]Qunhui Wu, Jianghua Lv, Shilong Ma, Hao Wang:
EET: Efficient event tracking over emergency-oriented web data. IJCNN 2015: 1-8 - 2014
- [j18]Jing Tian, Bing Yu, Dan Yu, Shilong Ma:
Missing data analyses: a hybrid multiple imputation algorithm using Gray System Theory and entropy based on clustering. Appl. Intell. 40(2): 376-388 (2014) - [c31]Chen Xiao, Tiemeng Li, Nan Yang, Lifeng Wang, Shilong Ma:
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints. ComComAP 2014: 104-109 - [c30]Shiwei Gao, Binglei Du, Yaruo Jiang, Jianghua Lv, Shilong Ma:
An efficient algorithm for pairwise test case generation in presence of constraints. ICSAI 2014: 406-410 - [c29]Shiwei Gao, Jianghua Lv, Binglei Du, Yaruo Jiang, Shilong Ma:
General Optimization Strategies for Refining the In-Parameter-Order Algorithm. QSIC 2014: 21-26 - 2013
- [j17]Qunhui Wu, Shilong Ma, Hao Wang:
Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining. J. Softw. 8(8): 1809-1817 (2013) - [j16]Jing Tian, Dan Yu, Bing Yu, Shilong Ma:
A fuzzy TOPSIS model via chi-square test for information source selection. Knowl. Based Syst. 37: 515-527 (2013) - [j15]Zhongwen Li, Gang Ye, Shilong Ma, Jia Huang:
The study of spacecraft parallel testing. Telecommun. Syst. 53(1): 69-76 (2013) - [c28]Feng Liang, Hai Liu, Yunzhen Liu, Shilong Ma, Siyao Zheng, Pan Deng:
A Capability-Based Matchmaking Mechanism Supporting Resource Aggregation within Large-Scale Distributed Computing Infrastructures. CloudComp 2013: 145-154 - [c27]Shengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma:
Mining Frequent Rooted Ordered Tree Generators Efficiently. CyberC 2013: 132-139 - [c26]Hai Liu, Jian Chen, Shilong Ma:
An Emergency-Response Timing Constraint Workflow Model. GRMSE (2) 2013: 149-159 - [c25]Hai Liu, Yunzhen Liu, Qunhui Wu, Shilong Ma:
A Heterogeneous Data Integration Model. GRMSE (1) 2013: 298-312 - 2012
- [j14]Xiaoqiang Zhang, Guiliang Zhu, Weiping Wang, Mengmeng Wang, Shilong Ma:
New Public-Key Cryptosystem Based on Two-Dimension DLP. J. Comput. 7(1): 169-178 (2012) - [j13]Feng Liang, Shilong Ma, André Luckow, Bettina Schnor:
Advance Reservation-based Computational Resource Brokering using Earliest Start Time Estimation. J. Comput. 7(6): 1329-1336 (2012) - [j12]Feng Liang, Haoming Guo, Shengwei Yi, Shilong Ma:
A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems. J. Networks 7(3): 524-531 (2012) - [c24]Rui Li, Nanjun Yang, Shilong Ma:
An Approach of Windows Synchronization Mechanism Simulation on Linux. PDCAT 2012: 442-445 - 2011
- [j11]Xanjun Li, Gang Ye, Zhongwen Li, Shilong Ma:
Study and Implementation of Spacecraft Integration Test Platform Based on Component Technology. J. Comput. 6(5): 963-968 (2011) - [j10]Haoming Guo, Shilong Ma, Feng Liang:
Enabling Awareness Driven Differentiated data service in IOT. J. Networks 6(11): 1572-1577 (2011) - [c23]Bing Yu, Jing Tian, Shilong Ma, Shengwei Yi, Dan Yu:
Gird or cloud? Survey on scientific computing infrastructure. CCIS 2011: 244-249 - [c22]Yang Zhang, Dan Yu, Shilong Ma:
Researches on real-time satellite data flow processing based on file buffer. ICNC 2011: 1768-1774 - [c21]Dan Yu, Shilong Ma:
A Method of Analysis and Verification for Safety-Critical Software Based on Modelling and Testing. SSIRI (Companion) 2011: 3-4 - 2010
- [j9]Chen Xiao, Shiguo Lian, Lifeng Wang, Shilong Ma, Weifeng Lv, Ke Xu:
A Speed-Adaptive Media Encryption Scheme for Real-Time Recording and Playback System. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j8]Xiaohui Rong, Feng Chen, Pan Deng, Shilong Ma:
A Large-Scale Device Collaboration Performance Evaluation Approach Based-on Dynamics. J. Comput. 5(8): 1177-1184 (2010) - [j7]Feng Chen, Xiaohui Rong, Pan Deng, Shilong Ma:
Transaction in Large-scale Device Collaborative System. J. Comput. 5(8): 1204-1212 (2010) - [c20]Xiaoqiang Zhang, Guiliang Zhu, Weiping Wang, Mengmeng Wang, Shilong Ma:
Period Law of Discrete Two-Dimensional Arnold Transformation. FCST 2010: 565-569 - [c19]Feng Liang, Shilong Ma, André Luckow, Bettina Schnor:
Earliest Start Time Estimation for Advance Reservation-Based Resource Brokering within Computational Grids. ISPA 2010: 8-15
2000 – 2009
- 2009
- [j6]Zhiming Zheng, Shilong Ma, Wei Li, Wei Wei, Xin Jiang, ZhanLi Zhang, BingHui Guo:
Dynamical characteristics of software trustworthiness and their evolutionary complexity. Sci. China Ser. F Inf. Sci. 52(8): 1328-1334 (2009) - [j5]Zhiming Zheng, Shilong Ma, Wei Li, Xin Jiang, Wei Wei, LiLi Ma, Shaoting Tang:
Complexity of software trustworthiness and its dynamical statistical analysis methods. Sci. China Ser. F Inf. Sci. 52(9): 1651-1657 (2009) - [c18]Yongxin Tong, Zhao Li, Dan Yu, Shilong Ma, Zhiyuan Cheng, Ke Xu:
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently. ADMA 2009: 652-660 - [c17]Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, Zhao Li, Ke Xu:
Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences. PAISI 2009: 130-142 - [i8]Yongxin Tong, Zhao Li, Dan Yu, Shilong Ma, Ke Xu:
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently. CoRR abs/0906.0885 (2009) - 2008
- [j4]Guoshun Hao, Shilong Ma, Yuefei Sui, Jianghua Lv:
Dynamic description logic model for data integration. Frontiers Comput. Sci. China 2(3): 306-330 (2008) - [c16]Jing Xie, Dan Yu, Shilong Ma:
A Novel Enterprise Mobile E-mail System Using the SyncML Protocol. ACIS-ICIS 2008: 391-396 - [c15]Dan Yu, Gang Ye, Shilong Ma, Naixue Xiong, Laurence Tianruo Yang:
The Spacecraft Automatic Testing System Based on Workflow. APSCC 2008: 890-895 - [c14]Yiping Zhang, Shilong Ma, Jun Huang:
A Simple Approach of Improving DNS based CDN Video Sharing System. ICOIN 2008: 1-5 - [c13]Dan Yu, Zhongwen Li, Gang Ye, Shilong Ma:
The Workflow-Based Modelling Method for Spacecraft Automatic Testing Process. IKE 2008: 267-271 - 2007
- [j3]Shilong Ma, Yuefei Sui, Ke Xu:
Well limit behaviors of term rewriting systems. Frontiers Comput. Sci. China 1(3): 283-296 (2007) - [c12]Guoshun Hao, Shilong Ma, Yuefei Sui, Jianghua Lv:
An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries. ER (Tutorials, Posters, Panels & Industrial Contributions) 2007: 121-126 - [c11]Li Ma, Shilong Ma, Yuefei Sui:
A Dynamic Description Logic Approach to Extended RBAC Model. FGCN (1) 2007: 284-288 - [c10]Chen Xiao, Shilong Ma, Ke Xu, Lifeng Wang, Weifeng Lv:
A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System. ICME 2007: 871-874 - [c9]Nidal H. Abu-Hamdeh, Shilong Ma:
OWL-based Ontology for Secure and Adaptable Ubiquitous Environment. SKG 2007: 230-235 - 2006
- [c8]Guoshun Hao, Shilong Ma, Jianghua Lv, Yuefei Sui:
A Service-Oriented Data Integration Architecture and the Integrating Tree. GCC 2006: 526-530 - [c7]Jianghua Lv, Shilong Ma, Jing Pan, Li Ma:
A Layered Semantics for Mobile Computation*. PRIMA 2006: 175-186 - 2005
- [c6]Jianghua Lv, Shilong Ma, Aili Wang, Jing Pan:
Using Ambient in Computational Reflection Semantics Description. ICCNMC 2005: 1105-1114 - [c5]Haoming Guo, Mei Yang, Xiaolong Wu, Yingtao Jiang, Shilong Ma, Guoshun Hao:
Autonomous and Dynamic Web Service Composition in Wireless Grids. ITCC (2) 2005: 574-579 - [c4]Guoshun Hao, Shilong Ma, Haoming Guo, Xiaolong Wu, Mei Yang, Yingtao Jiang:
Analyze Grid from the Perspective of a Computing System. ITCC (2) 2005: 789-790 - 2004
- [j2]Wei Li, Shilong Ma:
Limits of theory sequences over algebraically closed fields and applications. Discret. Appl. Math. 136(1): 23-43 (2004) - 2003
- [c3]Qingguo Zheng, Ke Xu, Shilong Ma:
When to Update the Sequential Patterns of Stream Data? PAKDD 2003: 545-550 - 2002
- [c2]Shilong Ma, Yuefei Sui, Ke Xu:
The Limits of Horn Logic Programs. ICLP 2002: 467 - [c1]Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma:
Intelligent search of correlated alarms from database containing noise data. NOMS 2002: 405-419 - [i7]Shilong Ma, Yuefei Sui, Ke Xu:
The Prioritized Inductive Logic Programs. CoRR cs.AI/0206017 (2002) - [i6]Qingguo Zheng, Ke Xu, Shilong Ma, Weifeng Lv:
The Algorithms of Updating Sequetial Patterns. CoRR cs.DB/0203027 (2002) - [i5]Qingguo Zheng, Ke Xu, Shilong Ma:
When to Update the sequential patterns of stream data? CoRR cs.DB/0203028 (2002) - [i4]Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma:
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints. CoRR cs.NI/0204055 (2002) - 2001
- [i3]Shilong Ma, Yuefei Sui, Ke Xu:
The Limits of Horn Logic Programs. CoRR cs.LO/0103008 (2001) - [i2]Wei Li, Shilong Ma, Yuefei Sui, Ke Xu:
A Logical Framework for Convergent Infinite Computations. CoRR cs.LO/0105020 (2001) - [i1]Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma:
Intelligent Search of Correlated Alarms from Database containing Noise Data. CoRR cs.NI/0109042 (2001)
1990 – 1999
- 1998
- [j1]Shilong Ma, Shucheng Ning:
Practically solving some problems expressed in the first order theory of real closed field. Int. J. Comput. Math. 69(3-4): 265-282 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint