default search action
Yin Wang 0001
Person information
- affiliation: HP Labs, Palo Alto, CA, USA
- affiliation (PhD 2009): University of Michigan, Electrical Engineering and Computer Science Department, Ann Arbor, MI, USA
Other persons with the same name
- Yin Wang — disambiguation page
- Yin Wang 0002 — Xi'an Jiaotong University, School of Management, China
- Yin Wang 0003 — Nanjing University of Aeronautics and Astronautics, Jiangsu Key Laboratory of New Energy Generation and Power Conversion, China
- Yin Wang 0004 — Central South University, School of Software, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j9]Yanmin Zhu, Yin Wang, George Forman, Hong Wei:
Mining Large-Scale GPS Streams for Connectivity Refinement of Road Maps. Comput. J. 58(9): 2109-2119 (2015) - [j8]Yin Wang, Tae-Sic Yoo, Stéphane Lafortune:
Erratum to: Diagnosis of discrete event systems using decentralized architectures. Discret. Event Dyn. Syst. 25(4): 601-603 (2015) - 2014
- [c28]Yanzhe Chen, Yin Wang, Rong Chen, Haibo Chen, Binyu Zang:
Greedy map generalization by iterative point removal. SIGSPATIAL/GIS 2014: 617-620 - 2013
- [j7]Hongwei Liao, Yin Wang, Hyoun Kyu Cho, Jason Stanley, Terence Kelly, Stéphane Lafortune, Scott A. Mahlke, Spyros A. Reveliotis:
Concurrency bugs in multithreaded software: modeling and analysis using Petri nets. Discret. Event Dyn. Syst. 23(2): 157-195 (2013) - [j6]Yanmin Zhu, Xuemei Liu, Yin Wang:
Pervasive Urban Sensing with Large-Scale Mobile Probe Vehicles. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Hongwei Liao, Stéphane Lafortune, Spyros A. Reveliotis, Yin Wang, Scott A. Mahlke:
Optimal Liveness-Enforcing Control for a Class of Petri Nets Arising in Multithreaded Software. IEEE Trans. Autom. Control. 58(5): 1123-1138 (2013) - [j4]Hongwei Liao, Yin Wang, Jason Stanley, Stéphane Lafortune, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke:
Eliminating Concurrency Bugs in Multithreaded Software: A New Approach Based on Discrete-Event Control. IEEE Trans. Control. Syst. Technol. 21(6): 2067-2082 (2013) - [c27]Stéphane Lafortune, Yin Wang, Spyros A. Reveliotis:
Eliminating Concurrency Bugs in Multithreaded Software: An Approach Based on Control of Petri Nets. Petri Nets 2013: 21-28 - [c26]Hyoun Kyu Cho, Terence Kelly, Yin Wang, Stéphane Lafortune, Hongwei Liao, Scott A. Mahlke:
Practical lock/unlock pairing for concurrent programs. CGO 2013: 6:1-6:12 - [c25]Hong Wei, Yin Wang, George Forman, Yanmin Zhu:
Map matching: comparison of approaches using sparse and noisy data. SIGSPATIAL/GIS 2013: 434-437 - [c24]Yin Wang, Hong Wei, George Forman:
Mining large-scale gps streams for connectivity refinement of road maps. SIGSPATIAL/GIS 2013: 438-441 - [c23]Tianyu Zhou, Hong Wei, Heng Zhang, Yin Wang, Yanmin Zhu, Haibing Guan, Haibo Chen:
Point-polygon topological relationship query using hierarchical indices. SIGSPATIAL/GIS 2013: 562-565 - [c22]Miao Yu, Chao Zhang, Zhengwei Qi, Jianguo Yao, Yin Wang, Haibing Guan:
VGRIS: virtualized GPU resource isolation and scheduling in cloud gaming. HPDC 2013: 203-214 - [c21]Rui Xin, Zhengwei Qi, Shiqiu Huang, Chengcheng Xiang, Yudi Zheng, Yin Wang, Haibing Guan:
An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs. ICSM 2013: 100-109 - [c20]Yin Wang, Xuemei Liu, Hong Wei, George Forman, Chao Chen, Yanmin Zhu:
CrowdAtlas: self-updating maps for cloud and personal use. MobiSys 2013: 27-40 - [c19]Yin Wang, Xuemei Liu, Hong Wei, George Forman, Yanmin Zhu:
CrowdAtlas: self-updating maps for cloud and personal use. MobiSys 2013: 469-470 - 2012
- [c18]Yin Wang, Peng Liu, Terence Kelly, Stéphane Lafortune, Spyros A. Reveliotis, Charles Zhang:
On atomicity enforcement in concurrent software via Discrete Event Systems theory. CDC 2012: 7230-7237 - [c17]Hong Wei, Yin Wang, George Forman, Yanmin Zhu, Haibing Guan:
Fast Viterbi map matching with tunable weight functions. SIGSPATIAL/GIS 2012: 613-616 - [c16]Xuemei Liu, James Biagioni, Jakob Eriksson, Yin Wang, George Forman, Yanmin Zhu:
Mining large-scale, sparse GPS traces for map inference: comparison of approaches. KDD 2012: 669-677 - [c15]Yin Wang, Jason Stanley, Stéphane Lafortune:
Explicit storage and analysis of billions of states using commodity computers. WODES 2012: 364-371 - 2011
- [j3]Ahmed Nazeem, Spyros A. Reveliotis, Yin Wang, Stéphane Lafortune:
Designing Compact and Maximally Permissive Deadlock Avoidance Policies for Complex Resource Allocation Systems Through Classification Theory: The Linear Case. IEEE Trans. Autom. Control. 56(8): 1818-1833 (2011) - [c14]Hongwei Liao, Jason Stanley, Yin Wang, Stéphane Lafortune, Spyros A. Reveliotis, Scott A. Mahlke:
Deadlock-avoidance control of multithreaded software: An efficient siphon-based algorithm for Gadara petri nets. CDC/ECC 2011: 1142-1148 - [c13]Yin Wang, Ahmed Nazeem, Ram Swaminathan:
On the Optimal Petri Net Representation for Service Composition. ICWS 2011: 235-242 - 2010
- [c12]Hongwei Liao, Stéphane Lafortune, Spyros A. Reveliotis, Yin Wang, Scott A. Mahlke:
Synthesis of maximally-permissive liveness-enforcing control policies for Gadara petri nets. CDC 2010: 2797-2804 - [c11]Yin Wang, Hamid Reza Motahari-Nezhad, Sharad Singhal:
A Language-Based Framework for Analyzing Service Representation Models and Service Composition Approaches. ICEBE 2010: 222-229 - [c10]Yin Wang, Hyoun Kyu Cho, Hongwei Liao, Ahmed Nazeem, Terence Kelly, Stéphane Lafortune, Scott A. Mahlke, Spyros A. Reveliotis:
Supervisory control of software execution for failure avoidance: Experience from the Gadara project. WODES 2010: 259-266 - [c9]Ahmed Nazeem, Spyros A. Reveliotis, Yin Wang, Stéphane Lafortune:
Optimal deadlock avoidance for complex resource allocation systems through classification theory. WODES 2010: 267-274
2000 – 2009
- 2009
- [j2]Terence Kelly, Yin Wang, Stéphane Lafortune, Scott A. Mahlke:
Eliminating Concurrency Bugs with Control Engineering. Computer 42(11): 52-60 (2009) - [c8]Yin Wang, Hongwei Liao, Ahmed Nazeem, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke, Stéphane Lafortune:
Maximally permissive deadlock avoidance for multithreaded computer programs (Extended abstract). CASE 2009: 37-41 - [c7]Yin Wang, Hongwei Liao, Spyros A. Reveliotis, Terence Kelly, Scott A. Mahlke, Stéphane Lafortune:
Gadara nets: Modeling and analyzing lock allocation for deadlock avoidance in multithreaded software. CDC 2009: 4971-4976 - [c6]Yin Wang, Stéphane Lafortune, Terence Kelly, Manjunath Kudlur, Scott A. Mahlke:
The theory of deadlock avoidance via discrete control. POPL 2009: 252-263 - 2008
- [c5]Yin Wang, Terence Kelly, Manjunath Kudlur, Stéphane Lafortune, Scott A. Mahlke:
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. OSDI 2008: 281-294 - 2007
- [j1]Yin Wang, Tae-Sic Yoo, Stéphane Lafortune:
Diagnosis of Discrete Event Systems Using Decentralized Architectures. Discret. Event Dyn. Syst. 17(2): 233-263 (2007) - [c4]Yin Wang, Terence Kelly, Stéphane Lafortune:
Discrete control for safe execution of IT automation workflows. EuroSys 2007: 305-314 - [c3]Yin Wang, Arif Merchant:
Proportional-Share Scheduling for Distributed Storage Systems. FAST 2007: 47-60 - 2006
- [c2]Yin Wang, Terence Kelly, Stéphane Lafortune:
Discrete Control for Dependable IT Automation. HotDep 2006 - 2005
- [c1]Yin Wang, Tae-Sic Yoo, Stéphane Lafortune:
Decentralized Diagnosis of Discrete Event Systems using Unconditional and Conditional Decisions. CDC/ECC 2005: 6298-6304
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint