default search action
Weiqi Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Xiai Yan, Yao Yi, Weiqi Shi, Hua Tian, Xin Su:
Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces. Int. J. Semantic Web Inf. Syst. 20(1): 1-18 (2024) - [c8]Weiqi Shi, Maurice Chu, Dario Kneubuehler, Ervin Teng, Adam Burr, Tallon Hodge, Ian Sachs, Andrew Kunz:
End-to-end Automatic Body and Face Setup for Generative or User Created 3D Avatar. SIGGRAPH Talks 2024: 13 - 2023
- [c7]Xiai Yan, Shengkai Ding, Weiqi Shi:
MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection. CSCloud/EdgeCom 2023: 144-149 - 2022
- [j11]Weiqi Shi, Julie Dorsey, Holly E. Rushmeier:
Learning-Based Inverse Bi-Scale Material Fitting From Tabular BRDFs. IEEE Trans. Vis. Comput. Graph. 28(4): 1810-1823 (2022) - 2021
- [j10]Zuoting Ning, Weiqi Shi, Lijun Xiao, Wei Liang, Tien-Hsiung Weng:
A novel approach for anti-pollution attacks in network coding. Connect. Sci. 33(3): 447-462 (2021) - [j9]Davit Gigilashvili, Weiqi Shi, Zeyu Wang, Marius Pedersen, Jon Yngve Hardeberg, Holly E. Rushmeier:
The Role of Subsurface Scattering in Glossiness Perception. ACM Trans. Appl. Percept. 18(3): 10:1-10:26 (2021) - [c6]Weiqi Shi, Zeyu Wang, Cyril Soler, Holly E. Rushmeier:
A Low-Dimensional Perceptual Space for Intuitive BRDF Editing. EGSR (DL) 2021: 191-203 - 2020
- [j8]Nan Gao, Weiqi Shi, Xin Peng, Jing Huang, Cheng Xu, Guoqi Xie:
Effective Real-Time Scheduling Optimization for Multi-Functional Mixed-Criticality Systems. J. Circuits Syst. Comput. 29(14): 2050226:1-2050226:26 (2020) - [j7]Zuoting Ning, Lijun Xiao, Wei Liang, Weiqi Shi, Kuan-Ching Li:
On the Exploitation of Blockchain for Distributed File Storage. J. Sensors 2020: 8861688:1-8861688:11 (2020) - [j6]Xin Su, Weiqi Shi, Xilong Qu, Yi Zheng, Xuchong Liu:
DroidDeep: using Deep Belief Network to characterize and detect android malware. Soft Comput. 24(8): 6017-6030 (2020) - [j5]Steven L. Song, Weiqi Shi, Michael Reed:
Accurate face rig approximation with deep differential subspace reconstruction. ACM Trans. Graph. 39(4): 34 (2020) - [i1]Steven L. Song, Weiqi Shi, Michael Reed:
Accurate Face Rig Approximation with Deep Differential Subspace Reconstruction. CoRR abs/2006.01746 (2020)
2010 – 2019
- 2019
- [j4]Xi-ai Yan, Wei-qi Shi, Hua Tian:
Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter. J. Inf. Process. Syst. 15(6): 1265-1276 (2019) - [c5]Ezra Davis, Weiqi Shi, Holly E. Rushmeier, Julie Dorsey, Hongzhi Wu:
Image-Based BRDF Design. Material Appearance 2019: 1-6 - 2018
- [j3]Zeyu Wang, Weiqi Shi, Kiraz Akoglu, Eleni Kotoula, Ying Yang, Holly E. Rushmeier:
CHER-Ob: A Tool for Shared Analysis and Video Dissemination. ACM Journal on Computing and Cultural Heritage 11(4): 18:1-18:22 (2018) - [c4]Xin Su, Weiqi Shi, Jiuchuan Lin, Xin Wang:
Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration. ICCCS (3) 2018: 101-112 - 2017
- [c3]Weiqi Shi, Zeyu Wang, T. Metin Sezgin, Julie Dorsey, Holly E. Rushmeier:
Material Design in Augmented Reality with In-Situ Visual Feedback. EGSR (EI&I) 2017: 93-103 - 2016
- [j2]Manfred Lau, Kapil Dev, Weiqi Shi, Julie Dorsey, Holly E. Rushmeier:
Tactile mesh saliency. ACM Trans. Graph. 35(4): 52:1-52:11 (2016) - [j1]Xiang Wang, Weiqi Shi, Yang Xiang, Jun Li:
Efficient Network Security Policy Enforcement With Policy Space Analysis. IEEE/ACM Trans. Netw. 24(5): 2926-2938 (2016) - [c2]Weiqi Shi, Eleni Kotoula, Kiraz Goze Akoglu, Ying Yang, Holly E. Rushmeier:
CHER-Ob: A Tool for Shared Analysis in Cultural Heritage. GCH 2016: 187-190 - 2015
- [c1]Weiqi Shi, Alexander Afanasyev:
RepoSync: Combined action-based and data-based synchronization model in Named Data Network. INFOCOM Workshops 2015: 275-280
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint