default search action
Wenzhi Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Xu Li, Shiyan Jiang, Yue Hu, Xiaoxiao Feng, Wenzhi Chen, Fan Ouyang:
Investigating the impact of structured knowledge feedback on collaborative academic writing. Educ. Inf. Technol. 29(14): 19005-19033 (2024) - [j52]Yiquan Chen, Yuan Xie, Yijing Wang, Jiexiong Xu, Zhen Jin, Anyu Li, Xiaoyan Fu, Qiang Liu, Wenzhi Chen:
Optimizing NVMe Storage for Large-Scale Deployment: Key Technologies and Strategies in Alibaba Cloud. IEEE Micro 44(5): 47-56 (2024) - [j51]Chenhui Gao, Wenzhi Chen, Feiping Nie, Weizhong Yu, Zonghui Wang:
Spectral clustering with linear embedding: A discrete clustering method for large-scale data. Pattern Recognit. 151: 110396 (2024) - [j50]Yiquan Lin, Wenhai Lin, Jiexiong Xu, Yiquan Chen, Zhen Jin, Jingchang Qin, Jiahao He, Shishun Cai, Yuzhong Zhang, Zonghui Wang, Wenzhi Chen:
PARS: A Pattern-Aware Spatial Data Prefetcher Supporting Multiple Region Sizes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3638-3649 (2024) - [j49]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j48]Han Bao, Xuhong Zhang, Qinying Wang, Kangming Liang, Zonghui Wang, Shouling Ji, Wenzhi Chen:
MILG: Realistic lip-sync video generation with audio-modulated image inpainting. Vis. Informatics 8(1): 71-81 (2024) - [c66]Lilong Chen, Xiaochong Jiang, Xiang Hu, Tianyu Xu, Ye Yang, Xing Li, Bingqian Lu, Chengkun Wei, Wenzhi Chen:
CMDRL: A Markovian Distributed Rate Limiting Algorithm in Cloud Networks. APNet 2024: 59-66 - [c65]Jingchang Qin, Yiquan Chen, Shishun Cai, Wenhai Lin, Jiexiong Xu, Zhen Jin, Lifa Cao, Zijie Zheng, Yuzhong Zhang, Yi Chen, Wenzhi Chen:
BlueJay: A Platform to Quantifying the Impact of Memory Latency on Datacenter Application Performance. CCGrid 2024: 489-495 - [c64]Wenhai Lin, Yiquan Chen, Jiexiong Xu, Zhen Jin, Peiyu Liu, Shishun Cai, Yuzhong Zhang, Jingchang Qin, Yiquan Lin, Wenzhi Chen:
CINDA: Don't Ignore Instructions When Cloning Memory Access Behavior. CCGrid 2024: 507-513 - [c63]Jiexiong Xu, Yiquan Chen, Yijing Wang, Wenhui Shi, Guoju Fang, Yi Chen, Huasheng Liao, Yang Wang, Hai Lin, Zhen Jin, Qiang Liu, Wenzhi Chen:
LightPool: A NVMe-oF-based High-performance and Lightweight Storage Pool Architecture for Cloud-Native Distributed Database. HPCA 2024: 983-995 - [c62]Yuehua Wu, Yunxiao Wang, Feihu Yan, Wenzhi Chen:
ShardingSim: A Modular Committee-Based Sharding Blockchain Simulator. ICBC 2024: 273-278 - [c61]Wenzhi Chen, Hongjian Sun, Minglei You, Jing Jiang:
Privacy Leakage in Federated Home Applications Using Gradient Inversion Algorithms. ICIT 2024: 1-6 - [c60]Wenzhi Chen, Hongjian Sun, Minglei You, Jing Jiang:
Accurate Action Recommendations and Demand Response for Smart Homes via Knowledge Graphs. ICIT 2024: 1-6 - [c59]Han Bao, Xuhong Zhang, Qinying Wang, Kangming Liang, Zonghui Wang, Shouling Ji, Wenzhi Chen:
Pluggable Watermarking of Deepfake Models for Deepfake Detection. IJCAI 2024: 331-339 - [c58]Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen:
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. NDSS 2024 - [c57]Xing Li, Xiaochong Jiang, Ye Yang, Lilong Chen, Yi Wang, Chao Wang, Chao Xu, Yilong Lv, Bowen Yang, Taotao Wu, Haifeng Gao, Zikang Chen, Yisong Qiao, Hongwei Ding, Yijian Dong, Hang Yang, Jianming Song, Jianyuan Lu, Pengyu Zhang, Chengkun Wei, Zihui Zhang, Wenzhi Chen, Qinming He, Shunmin Zhu:
Triton: A Flexible Hardware Offloading Architecture for Accelerating Apsara vSwitch in Alibaba Cloud. SIGCOMM 2024: 750-763 - [c56]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
Exploring ChatGPT's Capabilities on Vulnerability Management. USENIX Security Symposium 2024 - [i13]Zhe Ma, Xuhong Zhang, Qingming Li, Tianyu Du, Wenzhi Chen, Zonghui Wang, Shouling Ji:
Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models. CoRR abs/2405.05846 (2024) - [i12]Lirong Fu, Peiyu Liu, Wenlong Meng, Kangjie Lu, Shize Zhou, Xuhong Zhang, Wenzhi Chen, Shouling Ji:
Understanding the AI-powered Binary Code Similarity Detection. CoRR abs/2410.07537 (2024) - [i11]Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, Jiaheng Zhang:
An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks. IACR Cryptol. ePrint Arch. 2024: 703 (2024) - [i10]Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, Jiaheng Zhang:
BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2024: 1862 (2024) - 2023
- [j47]Xu Li, Chengkun Wei, Zhuoren Jiang, Wenlong Meng, Fan Ouyang, Zihui Zhang, Wenzhi Chen:
EduNER: a Chinese named entity recognition dataset for education research. Neural Comput. Appl. 35(24): 17717-17731 (2023) - [j46]Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen:
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 194-220 (2023) - [c55]Yuehua Wu, Feihu Yan, Yunxiao Wang, Wenzhi Chen:
PoWVDF: Progressive Real-Time Block Rate Targeting. BCCA 2023: 44-51 - [c54]Yiquan Chen, Jinlong Chen, Yijing Wang, Yi Chen, Zhen Jin, Jiexiong Xu, Guoju Fang, Wenhai Lin, Chengkun Wei, Wenzhi Chen:
HyQ: Hybrid I/O Queue Architecture for NVMe over Fabrics to Enable High- Performance Hardware Offloading. CCGrid 2023: 13-24 - [c53]Chengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, Tianhao Wang:
Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. CCS 2023: 2262-2276 - [c52]Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. CCS 2023: 2621-2635 - [c51]Wenhai Lin, Jingchang Qin, Yiquan Chen, Zhen Jin, Jiexiong Xu, Yuzhong Zhang, Shishun Cai, Lirong Fu, Yi Chen, Wenzhi Chen:
JACO: JAva Code Layout Optimizer Enabling Continuous Optimization without Pausing Application Services. CLUSTER 2023: 295-306 - [c50]Wenzhi Chen, Dong Xu, Ying-Shung Lee:
Preliminary Study on Students' Experiences in Design-Based Interdisciplinary Learning. HCI (30) 2023: 577-587 - [c49]Yiquan Chen, Jiexiong Xu, Chengkun Wei, Yijing Wang, Xin Yuan, Yangming Zhang, Xulin Yu, Yi Chen, Zeke Wang, Shuibing He, Wenzhi Chen:
BM-Store: A Transparent and High-performance Local Storage Architecture for Bare-metal Clouds Enabling Large-scale Deployment. HPCA 2023: 1031-1044 - [c48]Chengkun Wei, Xing Li, Ye Yang, Xiaochong Jiang, Tianyu Xu, Bowen Yang, Taotao Wu, Chao Xu, Yilong Lv, Haifeng Gao, Zhentao Zhang, Zikang Chen, Zeke Wang, Zihui Zhang, Shunmin Zhu, Wenzhi Chen:
Achelous: Enabling Programmability, Elasticity, and Reliability in Hyperscale Cloud Networks. SIGCOMM 2023: 769-782 - [c47]Xing Li, Xiaochong Jiang, Ye Yang, Lilong Chen, Tianyu Xu, Chao Xu, Longbiao Xiao, Fengmin Shi, Yi Wang, Taotao Wu, Yilong Lv, Hangfeng Gao, Zikang Chen, Yisong Qiao, Hongwei Ding, Yijian Dong, Chengkun Wei, Zihui Zhang, Shunmin Zhu, Wenzhi Chen:
Poster: Triton: Accelerating vSwitch with Flexibility through Hardware Assisting not Bypassing Software. SIGCOMM 2023: 1156-1158 - [c46]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen:
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. SP 2023: 3365-3381 - [i9]Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi Chen:
Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models. CoRR abs/2303.13131 (2023) - [i8]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i7]Yiquan Chen, Zhen Jin, Yijing Wang, Yi Chen, Hao Yu, Jiexiong Xu, Jinlong Chen, Wenhai Lin, Kanghua Fang, Chengkun Wei, Qiang Liu, Yuan Xie, Wenzhi Chen:
High-performance and Scalable Software-based NVMe Virtualization Mechanism with I/O Queues Passthrough. CoRR abs/2304.05148 (2023) - [i6]Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. CoRR abs/2305.05900 (2023) - [i5]Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen:
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. CoRR abs/2308.13904 (2023) - [i4]Jintao Sun, Zeke Wang, Tao Lu, Wenzhi Chen:
PyHGL: A Python-based Hardware Generation Language Framework. CoRR abs/2309.04859 (2023) - [i3]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
How ChatGPT is Solving Vulnerability Management Problem. CoRR abs/2311.06530 (2023) - 2022
- [j45]Jiaqi Yang, Xuequan Lu, Wenzhi Chen:
A robust scheme for copy detection of 3D object point clouds. Neurocomputing 510: 181-192 (2022) - [j44]Xu Li, Fan Ouyang, Wenzhi Chen:
Examining the effect of a genetic algorithm-enabled grouping method on collaborative performances, processes, and perceptions. J. Comput. High. Educ. 34(3): 790-819 (2022) - [j43]Chenhui Gao, Wenzhi Chen, Feiping Nie, Weizhong Yu, Feihu Yan:
Subspace clustering by directly solving Discriminative K-means. Knowl. Based Syst. 252: 109452 (2022) - [i2]Tao Lu, Chengkun Wei, Ruijing Yu, Yi Chen, Li Wang, Chaochao Chen, Zeke Wang, Wenzhi Chen:
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs. IACR Cryptol. ePrint Arch. 2022: 1321 (2022) - 2021
- [j42]Fan Ouyang, Xu Li, Pengcheng Jiao, Xian Peng, Wenzhi Chen:
The Three-Iterative Design and Implementation of a Student-Facing Social Learning Analytics Tool. Int. J. Distance Educ. Technol. 19(4): 1-22 (2021) - [j41]Xiaoqian Fan, Bowen Yang, Wenzhi Chen, Quanfang Fan:
Deep Neural Network Based Noised Asian Speech Enhancement and Its Implementation on a Hearing Aid App. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(5): 78:1-78:14 (2021) - [j40]Guoxi Li, Wenzhi Chen, Yang Xiang:
Zweilous: A Decoupled and Flexible Memory Management Framework. IEEE Trans. Computers 70(9): 1350-1362 (2021) - [j39]Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, Raheem Beyah:
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(6): 2719-2735 (2021) - [c45]Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, Yanjun Wu:
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels. CCS 2021: 794-810 - [c44]Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah:
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. ASE 2021: 805-816 - [i1]Jiaqi Yang, Xuequan Lu, Wenzhi Chen:
A Robust Scheme for 3D Point Cloud Copy Detection. CoRR abs/2110.00972 (2021) - 2020
- [j38]Kui Su, Peiyu Liu, Liang Gu, Wenzhi Chen, Kai Hwang, Zhibin Yu:
vMobiDesk: Desktop Virtualization for Mobile Operating Systems. IEEE Access 8: 213541-213553 (2020) - [j37]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Zhongxian Tang, Yang Xiang:
Smart VM co-scheduling with the precise prediction of performance characteristics. Future Gener. Comput. Syst. 105: 1016-1027 (2020) - [j36]Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3239-3254 (2020) - [c43]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah:
Understanding the Security Risks of Docker Hub. ESORICS (1) 2020: 257-276
2010 – 2019
- 2019
- [j35]Xuequan Lu, Zhigang Deng, Jun Luo, Wenzhi Chen, Sai-Kit Yeung, Ying He:
3D articulated skeleton extraction using a single consumer-grade depth camera. Comput. Vis. Image Underst. 188 (2019) - [j34]Wan Li, Wenzhi Chen:
An online learned hough forest model based on improved multi-feature fusion matching for multi-object tracking. Multim. Tools Appl. 78(7): 8861-8874 (2019) - [c42]Wenzhi Chen:
Perception Differences Between Students and Teachers of Undergraduate Industrial Design Core Courses. HCI (35) 2019: 210-216 - [c41]Guoxi Li, Wenhai Lin, Wenzhi Chen:
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes. ICA3PP (1) 2019: 169-182 - [c40]Peiyu Liu, Wenzhi Chen, Zonghui Wang, Lirong Fu:
Prudent Practices for Designing Virtual Desktop Experiments. SEKE 2019: 404-517 - 2018
- [j33]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang, Hang Jiang, Wei Liu, Yong Liu:
Towards a multilayered permission-based access control for extending Android security. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j32]Yuxia Cheng, Yang Xiang, Wenzhi Chen, Houcine Hassan, Abdulhameed Alelaiwi:
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies. Future Gener. Comput. Syst. 86: 964-974 (2018) - [j31]Yuxia Cheng, Qing Wu, Wenzhi Chen, Bei Wang:
Distributed shielded execution for transmissible cyber threats analysis. J. Parallel Distributed Comput. 122: 70-80 (2018) - [j30]Xuequan Lu, Shihao Wu, Honghua Chen, Sai-Kit Yeung, Wenzhi Chen, Matthias Zwicker:
GPF: GMM-Inspired Feature-Preserving Point Set Filtering. IEEE Trans. Vis. Comput. Graph. 24(8): 2315-2326 (2018) - [c39]Xuequan Lu, Honghua Chen, Sai-Kit Yeung, Zhigang Deng, Wenzhi Chen:
Unsupervised Articulated Skeleton Extraction From Point Set Sequences Captured by a Single Depth Camera. AAAI 2018: 7226-7234 - 2017
- [j29]Xuequan Lu, Wenzhi Chen, Scott Schaefer:
Robust mesh denoising via vertex pre-filtering and L1-median normal filtering. Comput. Aided Geom. Des. 54: 49-60 (2017) - [j28]Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, Abdulhameed Alelaiwi:
MIPE: a practical memory integrity protection method in a trusted execution environment. Clust. Comput. 20(2): 1075-1087 (2017) - [j27]Yuxia Cheng, Xinjie Yu, Wenzhi Chen, Rui Chang, Yang Xiang:
A practical cross-datacenter fault-tolerance algorithm in the cloud storage system. Clust. Comput. 20(2): 1801-1813 (2017) - [j26]Xian Chen, Wenzhi Chen, Zhongyong Lu, Yu Zhang, Rui Chang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Yang Xiang:
MBSA: a lightweight and flexible storage architecture for virtual machines. Concurr. Comput. Pract. Exp. 29(16) (2017) - [j25]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Yang Xiang:
Precise contention-aware performance prediction on virtualized multicore system. J. Syst. Archit. 72: 42-50 (2017) - [j24]Jianhai Chen, Qinming He, Deshi Ye, Wenzhi Chen, Yang Xiang, Kevin Chiew, Liangwei Zhu:
Joint affinity aware grouping and virtual machine placement. Microprocess. Microsystems 52: 365-380 (2017) - [j23]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Xinjie Yu:
Performance-Monitoring-Based Traffic-Aware Virtual Machine Deployment on NUMA Systems. IEEE Syst. J. 11(2): 973-982 (2017) - [j22]Xian Chen, Wenzhi Chen, Zhongyong Lu, Peng Long, Shuiqiao Yang, Zonghui Wang:
A Duplication-Aware SSD-Based Cache Architecture for Primary Storage in Virtualization Environment. IEEE Syst. J. 11(4): 2578-2589 (2017) - [j21]Yingjie Xia, Wenzhi Chen, Xuejiao Liu, Luming Zhang, Xuelong Li, Yang Xiang:
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 18(10): 2629-2641 (2017) - [j20]Yuan Yao, Wenzhi Chen, Tulika Mitra, Yang Xiang:
TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures. IEEE Trans. Parallel Distributed Syst. 28(11): 3313-3327 (2017) - [c38]Thao-Hien Dang, Wenzhi Chen:
The Importance of Physical Elements and Their Influences on Users' Concentration of Academic Library. AHFE (4) 2017: 382-389 - [c37]Yuxia Cheng, Qing Wu, Bei Wang, Wenzhi Chen:
Protecting In-memory Data Cache with Secure Enclaves in Untrusted Cloud. CSS 2017: 43-56 - [c36]Guoxi Li, Wenzhi Chen, Kui Su, Zhongyong Lu, Zonghui Wang:
Hzmem: New Huge Page Allocator with Main Memory Compression. ICA3PP 2017: 51-64 - 2016
- [j19]Bei Wang, Yuxia Cheng, Wenzhi Chen, Qinming He, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Efficient consolidation-aware VCPU scheduling on multicore virtualization platform. Future Gener. Comput. Syst. 56: 229-237 (2016) - [j18]Xuejiao Liu, Yingjie Xia, Wenzhi Chen, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
SEMD: Secure and efficient message dissemination with policy enforcement in VANET. J. Comput. Syst. Sci. 82(8): 1316-1328 (2016) - [j17]Xuequan Lu, Zhigang Deng, Wenzhi Chen:
A Robust Scheme for Feature-Preserving Mesh Denoising. IEEE Trans. Vis. Comput. Graph. 22(3): 1181-1194 (2016) - [c35]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang:
Enhancement of Permission Management for an ARM-Android Platform. CIT 2016: 415-422 - [c34]Kui Su, Pengfei Jiang, Zonghui Wang, Wenzhi Chen:
vMobiDesk: Desktop Virtualization for Mobile Operating System. HPCC/SmartCity/DSS 2016: 945-950 - [c33]Yuan Yao, Guanhua Wang, Zhiguo Ge, Tulika Mitra, Wenzhi Chen, Naxin Zhang:
Efficient Timestamp-Based Cache Coherence Protocol for Many-Core Architectures. ICS 2016: 19:1-19:13 - 2015
- [j16]Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Xinjie Yu, Yang Xiang:
AMC: an adaptive multi-level cache algorithm in hybrid storage systems. Concurr. Comput. Pract. Exp. 27(16): 4230-4246 (2015) - [j15]Lei Xu, Zonghui Wang, Wenzhi Chen:
The Study and Evaluation of ARM-Based Mobile Virtualization. Int. J. Distributed Sens. Networks 11: 310308:1-310308:10 (2015) - [j14]Haoquan Shen, Yan Yan, Shicheng Xu, Nicolas Ballas, Wenzhi Chen:
Evaluation of semi-supervised learning method on action recognition. Multim. Tools Appl. 74(2): 523-542 (2015) - [j13]Wenzhi Chen, Lei Xu, Guoxi Li, Yang Xiang:
A Lightweight Virtualization Solution for Android Devices. IEEE Trans. Computers 64(10): 2741-2751 (2015) - [c32]Yuan Yao, Guanhua Wang, Zhiguo Ge, Tulika Mitra, Wenzhi Chen, Naxin Zhang:
SelectDirectory: a selective directory for cache coherence in many-core architectures. DATE 2015: 175-180 - [c31]Wenzhi Chen:
The Instructional Model Framework of Undergraduate Industrial Design Core Course. HCI (28) 2015: 230-234 - [c30]Xian Chen, Wenzhi Chen, Zhongyong Lu:
Fusion-Cache: A Refactored Content-Aware Host-Side SSD Cache. ICA3PP (2) 2015: 297-314 - [c29]Kui Su, Lei Xu, Cong Chen, Wenzhi Chen, Zonghui Wang:
Affinity and Conflict-Aware Placement of Virtual Machines in Heterogeneous Data Centers. ISADS 2015: 289-294 - [c28]Lei Xu, Guoxi Li, Chuan Li, Weijie Sun, Wenzhi Chen, Zonghui Wang:
Condroid: A Container-Based Virtualization Solution Adapted for Android Devices. MobileCloud 2015: 81-88 - [c27]Kui Su, Wenzhi Chen, Guoxi Li, Zonghui Wang:
RPFF: A Remote Page-Fault Filter for Post-copy Live Migration. SmartCity 2015: 938-943 - 2014
- [j12]Lei Xu, Zonghui Wang, Wenzhi Chen:
An Integrated Dynamic Resource Scheduling Framework in On-Demand Clouds. J. Inf. Sci. Eng. 30(5): 1537-1552 (2014) - [j11]Xuequan Lu, Wenzhi Chen, Mingliang Xu, Zonghui Wang, Zhigang Deng, Yangdong Ye:
AA-FVDM: An accident-avoidance full velocity difference model for animating realistic street-level traffic in rural scenes. Comput. Animat. Virtual Worlds 25(1): 83-97 (2014) - [j10]Xuequan Lu, Zonghui Wang, Mingliang Xu, Wenzhi Chen, Zhigang Deng:
A personality model for animating heterogeneous traffic behaviors. Comput. Animat. Virtual Worlds 25(3-4): 363-373 (2014) - [j9]Kui Su, Zonghui Wang, Xuequan Lu, Wenzhi Chen:
An original-stream based solution for smoothly replaying high-definition videos in desktop virtualization systems. J. Vis. Lang. Comput. 25(6): 676-683 (2014) - [c26]Kui Su, Zonghui Wang, Xuequan Lu, Wenzhi Chen:
An Original-Stream Based Solution for Smoothly Replaying High-definition Videos in Desktop Virtualization Systems. DMS 2014: 39-46 - [c25]Xian Chen, Wenzhi Chen, Shuiqiao Yang, Zhongyong Lu, Zonghui Wang:
DASH: A duplication-aware flash cache architecture in virtualization environment. ICPADS 2014: 842-847 - 2013
- [j8]Xuequan Lu, Mingliang Xu, Wenzhi Chen, Zonghui Wang, Abdennour El Rhalibi:
Adaptive-AR Model with Drivers' Prediction for Traffic Simulation. Int. J. Comput. Games Technol. 2013: 904154:1-904154:8 (2013) - [c24]Yuxia Cheng, Wenzhi Chen:
Evaluation of Virtual Machine Performance on NUMA Multicore Systems. 3PGCIC 2013: 136-143 - [c23]Jianhai Chen, Kevin Chiew, Deshi Ye, Liangwei Zhu, Wenzhi Chen:
AAGA: Affinity-Aware Grouping for Allocation of Virtual Machines. AINA 2013: 235-242 - [c22]Yuxia Cheng, Wenzhi Chen, Xiao Chen, Bin Xu, Shaoyu Zhang:
A User-Level NUMA-Aware Scheduler for Optimizing Virtual Machine Performance. APPT 2013: 32-46 - [c21]Xian Chen, Wenzhi Chen, Peng Long, Zhongyong Lu, Zonghui Wang:
SEMMA: Secure Efficient Memory Management Approach in Virtual Environment. CBD 2013: 131-138 - [c20]Yuan Yao, Zhongyong Lu, Qingsong Shi, Wenzhi Chen:
FPGA based hardware-software co-designed dynamic binary translation system. FPL 2013: 1-4 - [c19]Wenzhi Chen, Chun-Wen Chen, Kuan-Hung Chen:
Modified Control-Response Ratio for Move and Rotation Operations on a Large Multi-touch Interface. HCI (6) 2013: 446-453 - 2012
- [j7]Hsien-Hui Tang, Yuying Y. Lee, Wenzhi Chen:
Reexamining the relationship between design performance and the design process using reflection in action. Artif. Intell. Eng. Des. Anal. Manuf. 26(2): 205-219 (2012) - [c18]Lei Xu, Wenzhi Chen, Zonghui Wang, Shuangquan Yang:
Smart-DRS: A Strategy of Dynamic Resource Scheduling in Cloud Data Center. CLUSTER Workshops 2012: 120-127 - [c17]Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu:
Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center. NPC 2012: 279-288 - 2011
- [c16]Wenzhi Chen, Hsien-Hui Tang:
Exploring the Learning Problems and Resources Usage of Undergraduate Industrial Design Students in Design Studio. HCI (9) 2011: 43-52 - [c15]Chiung-Cheng Liao, Wenzhi Chen, Hsien-Hui Tang:
Exploring the Relationship between Thinking Style and Collaborative Design Outcomes. HCI (22) 2011: 63-66 - [c14]Kuan-Hung Chen, Chun-Wen Chen, Wenzhi Chen:
A Study on the C/R Ratio of Direct-Operation Multi-touch Interface. HCI (23) 2011: 232-236 - [c13]Wenzhi Chen, Yu-How Lin:
A New Structure of Online Learning Environment to Support the Professional Learning. HCI (8) 2011: 530-537 - [c12]Jianhai Chen, Dawei Huang, Bei Wang, Deshi Ye, Qinming He, Wenzhi Chen:
A Fine-Grained Performance-Based Decision Model for Virtualization Application Solution. TPCTC 2011: 180-195 - 2010
- [j6]Wenzhi Chen, Mingmin Zhang, Zhigeng Pan, Gengdai Liu, Huaqing Shen, Shengnan Chen, Yong Liu:
Animations, Games, and Virtual Reality for the Jing-Hang Grand Canal. IEEE Computer Graphics and Applications 30(3): 84-88 (2010) - [j5]Mingliang Xu, Huansen Li, Pei Lv, Wenzhi Chen, Gengdai Liu, Pengyu Zhu, Zhigeng Pan:
L4RW: Laziness-based Realistic Real-time Responsive Rebalance in Walking. Comput. Graph. Forum 29(7): 2187-2196 (2010) - [j4]Jiejie Zhu, Zhigeng Pan, Chao Sun, Wenzhi Chen:
Handling occlusions in video-based augmented reality using depth information. Comput. Animat. Virtual Worlds 21(5): 509-521 (2010) - [c11]Wenzhi Chen, Huijun Chen, Wei Huang, Xiaoqin Chen, Dapeng Huang:
Improving host swapping using adaptive prefetching and paging notifier. HPDC 2010: 300-303
2000 – 2009
- 2009
- [j3]Zhigeng Pan, Wenzhi Chen, Mingmin Zhang, Jianfeng Liu, Gangshan Wu:
Virtual Reality in the Digital Olympic Museum. IEEE Computer Graphics and Applications 29(5): 91-95 (2009) - [j2]Wenzhi Chen, Qingsong Shi, Weifang Hu, Wei Hu, Sha Liu:
A New Slack Reclaiming Algorithm for Real-time Systems. J. Softw. 4(10): 1045-1052 (2009) - [j1]Zhigeng Pan, Xi Cheng, Wenzhi Chen, Gengdai Liu, Bing Tang:
Real time falling animation with active and protective responses. Vis. Comput. 25(5-7): 487-497 (2009) - [c10]Disheng Su, Wenzhi Chen, Wei Huang, Haitao Shan, Yunhong Jiang:
SmartVisor: towards an efficient and compatible virtualization platform for embedded system. IIES@EuroSys 2009: 37-41 - 2008
- [c9]Wenzhi Chen, Hongwei Zhu, Wei Huang:
SeVMM: VMM-Based Security Control Model. CW 2008: 820-823 - 2007
- [c8]Wenzhi Chen, Manlai You:
The Differences Between the Influences of Synchronous and Asynchronous Modes on Collaborative Learning Project of Industrial Design. HCI (15) 2007: 275-283 - [c7]Jianbo Cao, Binggang Cao, Wenzhi Chen, Peng Xu, Xiaolan Wu:
Neural network control of electric vehicle based on position-sensorless brushless DC motor. ROBIO 2007: 1900-1905 - 2004
- [c6]Wenzhi Chen, Zhou Jiang, Zhaohui Wu:
AnyCom: A Component Framework Optimization for Pervasive Computing. ICESS 2004: 236-242 - [c5]Wenzhi Chen, Cheng Xie, Jiaoying Shi:
A Component-Based Model Integrated Framework for Embedded Software. ICESS 2004: 563-569 - [c4]Cheng Xie, Wenzhi Chen, Jiaoying Shi, Lü Ye:
Hierarchical Integration of Runtime Models. ICESS 2004: 589-594 - [c3]Bin Wu, Zhaohui Wu, Wenzhi Chen:
Component model optimization for distributed real-time embedded software. SMC (2) 2004: 1158-1163 - [c2]Cheng Xie, Wenzhi Chen, Jiaoying Shi:
Pcanel: a model driven component framework. SMC (6) 2004: 5171-5176
1990 – 1999
- 1999
- [c1]Wenzhi Chen, Wen-Ko Chiou:
A study on tactile interfaces as an aid to home electronic appliance operation for the visually impaired. HCI (1) 1999: 740-744
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint