DEPT OF COMPUTER SCIENCE
Researcher : BI B |
List of Research Outputs |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Bi B |
List of Research Outputs |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Bo P |
List of Research Outputs |
Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462. |
Researcher : CHAN SH |
List of Research Outputs |
CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104. |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Researcher : CHEN F |
List of Research Outputs |
Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012. |
Researcher : CHEN Z |
List of Research Outputs |
CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17. |
Chen Z., 3D Shape Recovery under Multiple Viewpoints and Single Viewpoint. Hong Kong, 2012. |
Researcher : CHENG L |
List of Research Outputs |
CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084. |
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012. |
Researcher : Cao L |
List of Research Outputs |
Cao L., Interactive Network Rendering based on Textured Depth Map Re-projection. Hong Kong, 2012. |
Researcher : Chan HL |
Project Title: | Competitive on-line scheduling algorithms for minimizing weighted flow time |
Investigator(s): | Chan HL |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 10/2010 |
Completion Date: | 12/2012 |
Project Title: | Adaptive algorithms for finding top-k items in sliding windows |
Investigator(s): | Chan HL |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
Researcher : Chan HTH |
Project Title: | Privacy-Preserving Mechanisms on Multi-user Data with Untrusted Aggregator |
Investigator(s): | Chan HTH |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | HKU Overseas Fellowship Awards 2011-12 |
Investigator(s): | Chan HTH |
Department: | Computer Science |
Source(s) of Funding: | HKU Overseas Fellowship Awards |
Start Date: | 09/2011 |
Project Title: | Private Recommendation System in Social Networks |
Investigator(s): | Chan HTH |
Department: | Computer Science |
Source(s) of Funding: | France/Hong Kong Joint Research Scheme - Travel Grants |
Start Date: | 01/2012 |
Project Title: | The 12th Privacy Enhancing Technologies Symposium Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams over a Sliding Window |
Investigator(s): | Chan HTH |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 07/2012 |
Completion Date: | 07/2012 |
Project Title: | Privacy-Preserving Mechanisms on Multi-User Data in Ubiquitous Computing Environments |
Investigator(s): | Chan HTH |
Department: | Computer Science |
Source(s) of Funding: | Early Career Scheme (ECS) |
Start Date: | 09/2012 |
List of Research Outputs |
Chan H.T.H., Chang K.L. and Raman R., An SDP Primal-Dual Algorithm for Approximating the Lovasz-Theta Function, Algorithmica. 2013. |
Chan H.T.H., Li M., Shi E. and Xu W., Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams (over a Sliding Window), Privacy Enhancing Technologies Symposium (PETS). 2012. |
Chan H.T.H., Shi E. and Song D., Optimal Lower Bound for Differentially Private Multi-party Aggregation, European Symposium on Algorithms. 2012. |
Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012. |
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012. |
Chan H.T.H., Lau L.C. and Trevisan L., Theory and Applications of Models of Computation, 10th International Conference. 2013. |
Researcher : Chan K |
List of Research Outputs |
Chan K., Distributed Software Transactional Memory with Clock Validation on Clusters. Hong Kong, 2013. |
Researcher : Chan KP |
Project Title: | Optimal Transfers in Generalized Cross Domain Learning |
Investigator(s): | Chan KP |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 04/2011 |
Project Title: | Temporal Latent Topic Model for Facial Expression Recognition |
Investigator(s): | Chan KP |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | Continuous Discriminant Latent Topic Model (CD-LTM) for Facial Expression Recognition and Generation |
Investigator(s): | Chan KP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2013 |
List of Research Outputs |
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803. |
Researcher : Chan WK |
List of Research Outputs |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917. |
Li W.Y.S., Wu S., Chan W.K. and Tse T.H., JSCloud: toward remote execution of JavaScript code on handheld devices, The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA '12), in Proceedings of the 12th International Conference on Quality Software (QSIC '12), IEEE Computer Society, Los Alamitos, CA. 2012, 240−245. |
Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81. |
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896. |
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231. |
Researcher : Chen TY |
List of Research Outputs |
Chen T.Y., Hu P., Li H. and Tse T.H., An enhanced flow analysis technique for detecting unreachability faults in concurrent systems, Information Sciences (ISI impact factor 3.643). 2012, 194 (7): 254−269. |
Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., DESSERT: a divide-and-conquer methodology for identifying categories, choices, and choice relations for test case generation, IEEE Transactions on Software Engineering (ISI impact factor 2.588). 2012, 38 (4): 794−809. |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Researcher : Chen Z |
List of Research Outputs |
CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17. |
Chen Z., 3D Shape Recovery under Multiple Viewpoints and Single Viewpoint. Hong Kong, 2012. |
Researcher : Cheng CK |
Project Title: | Privacy Protection in Location-based Services with Location Cloaking |
Investigator(s): | Cheng CK |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2007 |
Project Title: | Scalable Cleaning of Probabilistic Databases with Quality Guarantees |
Investigator(s): | Cheng CK |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2010 |
Project Title: | UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases |
Investigator(s): | Cheng CK |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2011 |
Project Title: | Evaluating Probabilistic Queries over Uncertain Graph Databases |
Investigator(s): | Cheng CK |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | Outstanding Young Researcher Award 2011-12 |
Investigator(s): | Cheng CK |
Department: | Computer Science |
Source(s) of Funding: | Outstanding Young Researcher Award |
Start Date: | 01/2013 |
Project Title: | Query-efficient representations of uncertain graphs |
Investigator(s): | Cheng CK, Maniu S |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2013 |
List of Research Outputs |
Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012. |
Cheng C.K., Editorial Advisory Board, In: D. Shasha and G. Vossen, Information Systems. Elsevier, 2012. |
Cheng C.K., Editorial Board Member, In: A. P. Sheth and D. Agrawal, Distributed and Parallel Databases Journal (DAPD). Springer, 2013. |
Cheng C.K., Evaluating Probabilistic Queries over Uncertain Matching, research seminar, Shandong University. 2012. |
Cheng C.K., Explore or Exploit? Effective Strategies for Disambiguating Large Databases, In: Haixun Wang, research seminar at the Microsoft Research Asia (MSRA), Beijing, China. 2012. |
Cheng C.K., Explore or Exploit? Effective Strategies for Disambiguating Large Databases, research seminar, Shandong University. 2012. |
Cheng C.K., Filter-based Procotols for Continuous Queries over Imprecise Location Data, In: Michael Benedikt and Dan Oltaneau, research seminar at the INQUEST workshop (INovative QUErying of Streams), Oxford University. 2012. |
Cheng C.K., Managing Quality of Probabilistic Databases, In: Shazia Sadiq, Handbook of Data Quality. Berlin, Springer Berlin Heidelberg, 2013, 271-291. |
Cheng C.K., Managing Uncertain Databases, 2012 International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). 2012. |
Cheng C.K., On Incentive-based Tagging, In: Ao-Ying Zhou, research seminar at the East China Normal University. 2013. |
Cheng C.K., On Incentive-based Tagging, In: Yu Zheng, research seminar at the Microsoft Research Asia (MSRA), Beijing, China. 2013. |
Cheng C.K., Outstanding Young Researcher Award 2011-12 (awarded a research funding of HKD $300,000 and 1 Type B student), University of Hong Kong. 2013. |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013. |
Tang R., Cheng C.K., Wu H. and Bressan S., A Framework for Conditioning Uncertain Relational Data, 23rd Conf. on Database and Expert Systems Applications (DEXA 2012). 2012. |
XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344. |
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013. |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Researcher : Cheng L |
List of Research Outputs |
CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084. |
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012. |
Researcher : Cheung DWL |
Project Title: | An eLogistics Appliance with data exchange and conversion technologies for infrastructure connectivity |
Investigator(s): | Cheung DWL, Kwok WCH, Kao CM, Lee TYT, Yee PKC |
Department: | Computer Science |
Source(s) of Funding: | Platform Research Projects - General Award |
Start Date: | 07/2007 |
Project Title: | Universal web service adapter to facilitate "software as a service" implementation |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 11/2008 |
Project Title: | Multi-site infrastructure for massive digital content collaboration |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 12/2008 |
Project Title: | An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme |
Investigator(s): | Cheung DWL, Kwok WCH, Yee PKC, Kwok RPM, Tsang WW |
Department: | Computer Science |
Source(s) of Funding: | Guangdong-Hong Kong Technology Cooperation Funding Scheme |
Start Date: | 04/2009 |
Project Title: | An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 04/2009 |
Project Title: | An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 07/2009 |
Project Title: | Business Intelligence Support on Common Cloud Platform |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Applied Research |
Start Date: | 11/2010 |
Project Title: | A Smartphone Control Device and Signpost System for Visually Impaired Users |
Investigator(s): | Cheung DWL, Lau MK, Yee PKC |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 2) |
Start Date: | 12/2011 |
Completion Date: | 05/2013 |
Project Title: | A Smartphone Control Device and Signpost System for Visually Impaired Users |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 12/2011 |
Project Title: | A Smartphone Control Device and Signpost System for Visually Impaired Users |
Investigator(s): | Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 12/2011 |
List of Research Outputs |
Atzeni P., Cheung D.W.L. and Ram S., In: Paolo Atzeni, David W. Cheung, Sudha Ram , Conceptual Modeling, Lecture Notes in Computer Science 7532. Springer, 2012. |
Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012. |
Cheung D.W.L., Distinguished Fellow, Hong Kong Computer Society. 2012. |
Cheung D.W.L., Fellow, Hong Kong Institute of Engineering. 2012. |
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027. |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18. |
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013. |
Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013. |
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Researcher : Chim TW |
Project Title: | Enhanced Credential-based Privacy-preserving Power Request Scheme for Smart Grid Network |
Investigator(s): | Chim TW, Hui CK, Li VOK |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 01/2012 |
List of Research Outputs |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012. |
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012. |
Chim T.W., Yiu S.M., Hui L.C.K. and Li V.O.K., VANET-based secure taxi service, Elsevier Ad Hoc Networks Journal. 2013. |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1. |
Researcher : Chin FYL |
Project Title: | MultiVision Fund |
Investigator(s): | Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | MultiVision Intelligent Surveillance (Hong Kong) Ltd. - General Award |
Start Date: | 07/2003 |
Project Title: | Flexible Framework for GPGPU-based Video Decoding and Post-processing. |
Investigator(s): | Chin FYL, Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 09/2009 |
Project Title: | Bounded Space On-line Bin Packing |
Investigator(s): | Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2011 |
Project Title: | Next-Generation Sequencing Algorithms |
Investigator(s): | Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | Next-Generation Sequencing Algorithms |
Investigator(s): | Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 01/2012 |
Project Title: | A Pilot Feasibility Study on Motion-Compensated Video Reconstruction Approach for Cost Effective Video Storage Solution |
Investigator(s): | Chin FYL, Chow KP, Chung HY |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Applied Research |
Start Date: | 06/2012 |
Completion Date: | 02/2013 |
Project Title: | The 11th European Conference on Computational Biology (ECCB'12); MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample |
Investigator(s): | Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 09/2012 |
Project Title: | Next-Generation Sequencing Algorithms |
Investigator(s): | Chin FYL, Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 12/2012 |
List of Research Outputs |
Chin F.Y.L., Editor, Information Processing Letters (until Dec 2012). 2012. |
Chin F.Y.L., Managing Editor, International Journal of Foundations of Computer Science. World Scientific Publishing Co., 2012. |
Chin F.Y.L., Meta-genomics Assembly and Binning, ISCB-Asia/SCCG 2012, BGI Special Session. 2012. |
Chin F.Y.L., Metagenomic Assembly and Binning, Nanyang Technological University (NTU). Singapore, 2012. |
Chin F.Y.L., Metagenomic Assembly and Binning, National University of Singapore (NUS). Singapore, 2012. |
Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Choi YK |
Project Title: | A capacity-constrained centroidal Voronoi tessellation framework for blue noise point sampling |
Investigator(s): | Choi YK, Wang WP |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 04/2011 |
Project Title: | SIGGRAPH 2012 Robust Modeling of Constant Mean Curvature Surfaces |
Investigator(s): | Choi YK |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2012 |
List of Research Outputs |
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4. |
Researcher : Chow KP |
Project Title: | Robust Face Detection and Reconstruction Method that Addresses Inherent Limitations in Face Recognition Technology |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 10/2008 |
Project Title: | Robust Face Detection and Reconstruction Method that Addresses Inherent Limitations in Face Recognition Technology |
Investigator(s): | Chow KP, Chin FYL, Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 10/2008 |
Project Title: | Object-oriented Motion Deblurring Technology for Forensic Video Enhancement |
Investigator(s): | Chow KP, Chin FYL, Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 09/2009 |
Project Title: | Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras |
Investigator(s): | Chow KP, Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 09/2010 |
Project Title: | Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 09/2010 |
Project Title: | Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 10/2010 |
Project Title: | Protecting digital data privacy in computer forensic examination |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 05/2011 |
Completion Date: | 10/2012 |
Project Title: | Integrating Multiple Visual Biometic for Human Recognition |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 10/2011 |
Project Title: | Integrating Multiple Visual Biometic for Human Recognition |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 10/2011 |
Project Title: | Integrating Multiple Visual Biometic for Human Recognition |
Investigator(s): | Chow KP, Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 10/2011 |
Project Title: | To Develop a Practical Framework for Cloud Forensics |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Applied Research |
Start Date: | 06/2012 |
Completion Date: | 05/2013 |
Project Title: | A preliminary forensic analysis tool for Shanzhai mobile phones |
Investigator(s): | Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2012 |
List of Research Outputs |
Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128. |
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296. |
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309. |
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012. |
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828. |
Wang M. and Chow K.P., Temporal Analysis of HFS+ and Mac OS X in Digital Investigations, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012. |
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512. |
Researcher : DI S |
List of Research Outputs |
DI S. and Wang C.L., Dynamic Optimization of Multi-Attribute Resource Allocation in Self-Organizing Clouds, In: Ivan Stojmenovic, IEEE Transactions on Parallel and Distributed Systems. IEEE Computer Society, 2013, 24: 464-478. |
DI S. and Wang C.L., Error-Tolerant Resource Allocation and Payment Minimization for Cloud System, IEEE Transactions on Parallel and Distributed Systems (TPDS). 2013, 24(6): 1097-1106. |
DI S., Wang C.L. and Chen L., Ex-post Efficient Resource Allocation for Self-organizing Cloud, Journal of Computers and Electrical Engineering (CEE). Elsevier, 2013. |
DI S., Kondo D. and Wang C.L., Optimization and Stabilization of Composite Service Processing in a Cloud System, IEEE/ACM International Symposium on Quality of Service (IWQoS 2013). Montreal, Canada, 2013. |
DI S., Wang C.L. and Kondo D., Towards Payment-Bound Analysis in Cloud Systems with Task-Prediction Errors, International Conference on Cloud Computing (IEEE CLOUD2013). Santa Clara Marriott, CA, USA, 2013. |
Researcher : Fang J |
List of Research Outputs |
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296. |
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309. |
Researcher : Fu X |
Project Title: | The Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition (CVPR2010) Reconstruction of Display and Eyes from a Single Image |
Investigator(s): | Fu X |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 06/2010 |
Researcher : Ge S |
List of Research Outputs |
Ge S., Advanced Analysis and Join Queries in Multidimensional Spaces , Hong Kong, 2013. |
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027. |
Researcher : Ge S |
List of Research Outputs |
Ge S., Advanced Analysis and Join Queries in Multidimensional Spaces , Hong Kong, 2013. |
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027. |
Researcher : HAN G |
List of Research Outputs |
Han G., Profile-Guided Loop Parallelization and Co-Scheduling on GPU-Based Heterogeneous Many-Core Architectures. Hong Kong, 2013. |
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012. |
Researcher : HUA Q |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449. |
Researcher : Han G |
List of Research Outputs |
Han G., Profile-Guided Loop Parallelization and Co-Scheduling on GPU-Based Heterogeneous Many-Core Architectures. Hong Kong, 2013. |
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012. |
Researcher : He Y |
List of Research Outputs |
He Y., Protecting Security in Cloud and Other Distributed Environments. Hong Kong, 2012. |
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012. |
Researcher : Ho SL |
List of Research Outputs |
Ho S.L., Technical Solution to Conduct Investigation in Digital Age, Hong Kong, 2012. |
Researcher : Hu W |
List of Research Outputs |
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4. |
Researcher : Hua Q |
Project Title: | Faster Exact Algorithms for NP-hard Problems |
Investigator(s): | Hua Q, Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 02/2011 |
Completion Date: | 07/2012 |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449. |
Researcher : Hui CK |
Project Title: | Cryptanalysis and Implementation of Cipher |
Investigator(s): | Hui CK, Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | NSFC/RGC Joint Research Scheme |
Start Date: | 01/2010 |
Completion Date: | 12/2012 |
Project Title: | Securing Smart Grid Network for the Power Industry |
Investigator(s): | Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | Cyberspace Investigation Technology Using Criminal Profiling |
Investigator(s): | Hui CK, Chow KP |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 10/2011 |
Completion Date: | 12/2012 |
Project Title: | Cyberspace Investigation Technology Using Criminal Profiling |
Investigator(s): | Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 10/2011 |
Project Title: | Cyberspace Investigation Technology Using Criminal Profiling |
Investigator(s): | Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 11/2011 |
Project Title: | Applying advanced Cryptographic Techniques for Privacy Preserving Computation in Cloud Computing Environment |
Investigator(s): | Hui CK, Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2012 |
Completion Date: | 06/2013 |
Project Title: | Light-Weight Secure and Privacy Preserving Protocol for Power Selling in Smart Grid |
Investigator(s): | Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2013 |
List of Research Outputs |
Chan P.C.K., Hui C.K. and Yiu S.M., Heap graph based software theft detection, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(1): p.101-110. |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012. |
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012. |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1. |
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296. |
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309. |
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828. |
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512. |
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696. |
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307. |
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012. |
Researcher : Huo Q |
Project Title: | International Conference on Pattern Recognition (ICPR-2002) A Comparative Study of Several Modeling Approaches for Large Vocabulary Offline Recognition of Handwritten Chinese Characters |
Investigator(s): | Huo Q |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2002 |
Project Title: | Chinese spoken language processing |
Investigator(s): | Huo Q |
Department: | Computer Science |
Source(s) of Funding: | Anhui USTC iFLYTEK Co. Ltd. - General Award |
Start Date: | 09/2005 |
Researcher : IEONG SCR |
List of Research Outputs |
Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128. |
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012. |
Researcher : Ieong SCR |
List of Research Outputs |
Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128. |
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012. |
Researcher : JIN Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, Hong Kong, 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Jiang B |
List of Research Outputs |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Researcher : Jiang L |
List of Research Outputs |
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309. |
Researcher : Jin Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, Hong Kong, 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : KUANG Z |
List of Research Outputs |
KUANG Z., SUN J. and Wong K.K.Y., Learning Regularized, Query-Dependent Bilinear Similarities for Large Scale Image Retrieval, 1st IEEE International Workshop on Large Scale Computer Vision. Portland, USA, 2013. |
Researcher : Kao CM |
Project Title: | CubeLSI: A three-dimensional latent semantic indexing method |
Investigator(s): | Kao CM |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 03/2011 |
Project Title: | Resource Searching and Diversified Tag Recommendation in Social Tagging Systems |
Investigator(s): | Kao CM, Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 10/2012 |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Researcher : Kwan YK |
List of Research Outputs |
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828. |
Researcher : LI H |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013. |
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013. |
Li H., Optimal Data Dissemination in Stochastic and Arbitrary Wireless Networks. Hong Kong, 2012. |
Researcher : LI J |
List of Research Outputs |
LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433. |
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012. |
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110. |
Researcher : LI R |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : LI R |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : LI X |
List of Research Outputs |
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013. |
Researcher : LIU X |
List of Research Outputs |
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113. |
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146. |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Researcher : LIU X |
List of Research Outputs |
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113. |
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146. |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Researcher : Lam KT |
List of Research Outputs |
Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178. |
Researcher : Lam TW |
Project Title: | Compressed indexes for approximate string matching, with applications to biological sequences |
Investigator(s): | Lam TW |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 08/2006 |
Project Title: | Outstanding Research Student Supervisor Award 2008-2009 |
Investigator(s): | Lam TW |
Department: | Computer Science |
Source(s) of Funding: | Outstanding Research Student Supervisor Award |
Start Date: | 12/2009 |
Project Title: | Ttradeoff between energy and throughput for online scheduling |
Investigator(s): | Lam TW |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 02/2011 |
Completion Date: | 07/2012 |
Project Title: | A theoretical study of competitive online algorithms for energy-efficient job scheduling on multiple machines |
Investigator(s): | Lam TW |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 06/2012 |
Project Title: | Ultrafast SNP-sensitive and Gap-sensitive Alignment of Short Reads to Human Genome via Better Indexing |
Investigator(s): | Lam TW |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 08/2012 |
Project Title: | A Genomic and Pharmaceutical Knowledge-based System for Clinical Diagnosis and Case Repository |
Investigator(s): | Lam TW, Cheung DWL, Ting HF, Yiu SM, Luo R |
Department: | Computer Science |
Source(s) of Funding: | Guangdong-Hong Kong Technology Cooperation Funding Scheme |
Start Date: | 03/2013 |
Project Title: | A Genomic and Pharmaceutical Knowledge-based System for Clinical Diagnosis and Case Repository |
Investigator(s): | Lam TW, Cheung DWL, Ting HF, Yiu SM, Luo R |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 04/2013 |
List of Research Outputs |
CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104. |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113. |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Online Speed Scaling Based on Active Job Count to Minimize Flow Plus Energy, Algorithmica. 2013, 65(3): 605 - 633. |
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874. |
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18. |
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1. |
Researcher : Lau FCM |
Project Title: | The Hong Kong University grid point |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | Matching Fund for Hi-Tech Research and Development Program of China (863 Projects) |
Start Date: | 12/2002 |
Project Title: | HP mobile technology for teaching initiative |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | Hewlett-Packard HK SAR Ltd. |
Start Date: | 10/2004 |
Project Title: | UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | Other Funding Scheme |
Start Date: | 05/2006 |
Project Title: | HKU Grid Point for Systems Research and Applications in Multiple Disciplines |
Investigator(s): | Lau FCM, Wang CL, Ho PT, Chan GKY, Li WK |
Department: | Computer Science |
Source(s) of Funding: | UGC One-off Special Equipment Grant Scheme |
Start Date: | 12/2008 |
Project Title: | Distributed Data Queries in Wireless Sensor Networks under the Physical Interference Model |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 10/2011 |
Project Title: | 10th International Conference on Wired/Wireless Internet Communications Dynamic Contention Resolution in Multiple-Access Channels |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 06/2012 |
Project Title: | The 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013); An Approximate Approach for Area Coverage in Wireless Sensor Networks |
Investigator(s): | Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 06/2013 |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013. |
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013. |
QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013. |
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449. |
Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013. |
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013. |
Researcher : Law YW |
List of Research Outputs |
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828. |
Researcher : Lee LK |
Project Title: | Ultra-fast GPU-based Alignment of Long Reads with Mixed Sequencing Error |
Investigator(s): | Lee LK, Lam TW |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 06/2013 |
Completion Date: | 06/2014 |
List of Research Outputs |
CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104. |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Online Speed Scaling Based on Active Job Count to Minimize Flow Plus Energy, Algorithmica. 2013, 65(3): 605 - 633. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Researcher : Lee SD |
List of Research Outputs |
Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012. |
Researcher : Leung CM |
Project Title: | Binning Metagenomic data |
Investigator(s): | Leung HCM, Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 09/2010 |
Project Title: | The 15th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2011) T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome |
Investigator(s): | Leung HCM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 03/2011 |
List of Research Outputs |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362. |
Researcher : Leung HCM |
Project Title: | Binning Metagenomic data |
Investigator(s): | Leung HCM, Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 09/2010 |
Project Title: | The 15th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2011) T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome |
Investigator(s): | Leung HCM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 03/2011 |
List of Research Outputs |
Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online. |
Hoa V., Chin F.Y.L., Hon W.K., Leung H.C.M., Sadakane K., Sung W.K. and Yiu S.M., Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees, ISBRA 2013. p.112 - 124. |
Researcher : Li H |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013. |
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013. |
Li H., Optimal Data Dissemination in Stochastic and Arbitrary Wireless Networks. Hong Kong, 2012. |
Researcher : Li J |
List of Research Outputs |
LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433. |
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012. |
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110. |
Researcher : Li J |
List of Research Outputs |
LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433. |
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012. |
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110. |
Researcher : Li M |
List of Research Outputs |
Chan H.T.H., Li M., Shi E. and Xu W., Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams (over a Sliding Window), Privacy Enhancing Technologies Symposium (PETS). 2012. |
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012. |
Li M., Sparse Representation and Fast Processing of Massive Data, Hong Kong, 2012. |
Researcher : Li R |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Li R |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97. |
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013. |
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Li Y |
List of Research Outputs |
Li Y., A Study on Surface and Volume Tiling for Geometric Modeling. Hong Kong, 2012. |
Liu Y., Li Y., Xu W.W. and Wang W.P., All-hex Meshing Using Singularity-restricted Field, ACM Transactions on Graphics (SIGGRAPH Asia 2012). 2012, 31, No. 6. |
Researcher : Ling R |
List of Research Outputs |
Ling R., Methods for Generating Meshes with Sharp Features, Hong Kong, 2012. |
Researcher : Liu B |
List of Research Outputs |
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874. |
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18. |
Researcher : Liu CM |
List of Research Outputs |
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013. |
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Researcher : Luo R |
List of Research Outputs |
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874. |
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18. |
Researcher : MO L |
List of Research Outputs |
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013. |
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013. |
Researcher : Ma CCC |
List of Research Outputs |
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1. |
Researcher : Ma KK |
List of Research Outputs |
Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178. |
Researcher : Mamoulis N |
Project Title: | Outstanding Young Researcher Award 2008-2009 |
Investigator(s): | Mamoulis N |
Department: | Computer Science |
Source(s) of Funding: | Outstanding Young Researcher Award |
Start Date: | 12/2009 |
Project Title: | Algorithms for Large-Scale Matching Problems |
Investigator(s): | Mamoulis N |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2010 |
Project Title: | Durable Queries in Temporal and Spatio-temporal Databases |
Investigator(s): | Mamoulis N |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2011 |
Project Title: | Spatio-textual Joins |
Investigator(s): | Mamoulis N |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2013 |
List of Research Outputs |
Chatzimilioudis G., Cuzzocrea A., Gunopulos D. and Mamoulis N., A Novel Distributed Framework For Optimizing Query Routing Trees In Wireless Sensor Networks Via Optimal Operator Placement, Journal of Computer and System Sciences. Elsevier, 2013, 79(3): 349-368. |
Emrich T., Kriegel H.P., Mamoulis N., Renz M. and Zuefle A., Indexing uncertain spatio-temporal data, 21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA. 2012, 395-404. |
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027. |
LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433. |
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110. |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Researcher : NING L |
List of Research Outputs |
Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012. |
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012. |
Researcher : Ning L |
List of Research Outputs |
Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012. |
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012. |
Researcher : Pan G |
List of Research Outputs |
Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222. |
Pan G., Motion Segmentation by Adaptive Mode Seeking and Clustering Consensus. Hong Kong, 2012. |
Researcher : Pan H |
List of Research Outputs |
Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012. |
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4. |
Researcher : Pun KH |
Project Title: | Community Legal Information Project |
Investigator(s): | Pun KH |
Department: | Computer Science |
Source(s) of Funding: | Department of Justice, HKSAR Government - General Award |
Start Date: | 04/2004 |
Researcher : QIU X |
List of Research Outputs |
QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013. |
Researcher : SUN L |
List of Research Outputs |
XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344. |
Researcher : Schnieders D |
Project Title: | European Conference on Computer Vision; Mode Seeking with an Adaptive Distance Measure |
Investigator(s): | Schnieders D |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 10/2012 |
Project Title: | Photometric Stereo under Near-Light with Attenuation |
Investigator(s): | Schnieders D, Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 06/2013 |
Completion Date: | 10/2014 |
List of Research Outputs |
Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222. |
Researcher : Shang L |
List of Research Outputs |
Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222. |
Researcher : Sun F |
List of Research Outputs |
Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012. |
Researcher : Sun H |
List of Research Outputs |
Sun H., Modeling Information Diffusion in Social Networks, Hong Kong, 2012. |
Researcher : TAN H |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
Researcher : TANG Y |
List of Research Outputs |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
Researcher : TSANG YH |
List of Research Outputs |
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012. |
Researcher : TSUI KW |
List of Research Outputs |
TSUI K.W., Wong K.K.Y. and Lee P.W., Automatic systole-diastole classification of mitral valve complex from RT-3D echocardiography based on multiresolution processing, SPIE Medical Imaging: Image Processing. Florida, USA, 2013, 8669: 46-1 - 46-6. |
Researcher : Ting HF |
Project Title: | Online Optimization Algorithms on Wireless Communication Networks |
Investigator(s): | Ting HF, Zhang Y |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 01/2010 |
Project Title: | Design and analysis of distributed algorithms for vertex cover and maximal matching |
Investigator(s): | Ting HF |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 03/2011 |
Project Title: | A competitive approach for analyzing data stream algorithms |
Investigator(s): | Ting HF |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 06/2012 |
Completion Date: | 06/2013 |
Project Title: | ACM Conference on Bioinformatics, Computational Biology and Biomedicine 2012; Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples |
Investigator(s): | Ting HF |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 10/2012 |
Project Title: | Design and analysis of algorithms for online bin packing: Old challenges and new opportunities |
Investigator(s): | Ting HF, Chin FYL |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 12/2012 |
List of Research Outputs |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
Ting H.F. and Xiang X., Equilibria of GSP for range auction, In: J. Gudmundsson, J. Mestre, T. Viglas, 18th Annual International Conference on Computing and Combinatorics. Springer, 2012, 580-591. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Tse TH |
Project Title: | Towards an integrated method for program verification, testing and debugging |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2003 |
Project Title: | 27th Annual international computer software and applications conference |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | Croucher Foundation - Conference / Seminars |
Start Date: | 09/2004 |
Project Title: | TIRAMISU: testing context-sensitive, concurrent and middleware-based ubiquitous software |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2006 |
Project Title: | TASTE: Testing of Adaptive Service-based sofTwarE |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 04/2011 |
Project Title: | TASTE: Testing of Adaptive Service-based sofTwarE |
Investigator(s): | Tse TH, Kao CM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 10/2011 |
Project Title: | CARISMA: a Context-sensitive Approach to Race-condItion test case Selection for Multithreaded software Applications |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 05/2012 |
Project Title: | The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA 2012) Held in Conjunction with the 12th International Conference on Quality Software (QSIC 2012); JSCloud: toward remote execution of JavaScript code on handheld devices |
Investigator(s): | Tse TH |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2012 |
Project Title: | CARISMA: a Context-sensitive Approach to Race-condItion test case Selection for Multithreaded software Applications |
Investigator(s): | Tse TH, Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 11/2012 |
List of Research Outputs |
Chen T.Y., Hu P., Li H. and Tse T.H., An enhanced flow analysis technique for detecting unreachability faults in concurrent systems, Information Sciences (ISI impact factor 3.643). 2012, 194 (7): 254−269. |
Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., DESSERT: a divide-and-conquer methodology for identifying categories, choices, and choice relations for test case generation, IEEE Transactions on Software Engineering (ISI impact factor 2.588). 2012, 38 (4): 794−809. |
Cheung S.C. and Tse T.H., Message from the general chairs, Proceedings of the 19th Asia-Pacific Software Engineering Conference (APSEC '12), IEEE Computer Society, Los Alamitos, CA. 2012, p. xvi. |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917. |
Li W.Y.S., Wu S., Chan W.K. and Tse T.H., JSCloud: toward remote execution of JavaScript code on handheld devices, The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA '12), in Proceedings of the 12th International Conference on Quality Software (QSIC '12), IEEE Computer Society, Los Alamitos, CA. 2012, 240−245. |
Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81. |
Tse T.H., Basics of research studies that they don't teach you at the graduate school, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012. |
Tse T.H., Best Teacher Award, Faculty of Engineering, The University of Hong Kong. 2012. |
Tse T.H., Design of 30th Anniversary Logo, IEEE Hong Kong Section Computer Society Chapter. 2012. |
Tse T.H., Design of 50th Anniversary Logo, SAHK, Hong Kong. 2013. |
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012. |
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Peking University, Beijing, China. 2012. |
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Tsinghua University, Beijing, China. 2012. |
Tse T.H., Logo Design, The 19th Asia-Pacific Conference on Software Engineering (APSEC 2012), IEEE Computer Society, Los Alamitos, CA. 2012. |
Tse T.H., Long Service Award, The University of Hong Kong. 2013. |
Tse T.H., Presentation techniques at international conferences, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012. |
Tse T.H., Visiting Distinguished Scholar, Institute of Software, Chinese Academy of Sciences. 2012. |
Tse T.H., editorial board member, Journal for Universal Computer Science. Springer, Berlin, 2013. |
Tse T.H., editorial board member, Journal of Systems and Software. Elsevier, Amsterdam, 2013. |
Tse T.H., editorial board member, Software Testing, Verification and Reliability. Wiley, New York, NY, 2013. |
Tse T.H., editorial board member, Software: Practice and Experience. Elsevier, Amsterdam, 2013. |
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896. |
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231. |
Researcher : WU R |
List of Research Outputs |
WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013. |
Researcher : Wan C |
List of Research Outputs |
Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Researcher : Wang CL |
Project Title: | The HKU Grid Computing Research Center |
Investigator(s): | Wang CL, Lau FCM |
Department: | Computer Science |
Source(s) of Funding: | The University of Hong Kong Foundation Seed Grant |
Start Date: | 07/2003 |
Project Title: | Adaptation and virtualization techniques for grid |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | Matching Fund for Hi-Tech Research and Development Program of China (863 Projects) |
Start Date: | 08/2007 |
Project Title: | Efficient Resource Allocation Support for Self-Organizing Desktop Cloud System |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 04/2011 |
Project Title: | Transparent Runtime and Memory Coherence Support for GPU-Based Heterogeneous Many-Core Architecture |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 11/2011 |
Project Title: | Software-Managed Coherency Protocol with Dynamic Zoning on Tiled Manycore Processor |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2012 |
Project Title: | 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS2012); Mobile Edutainment with Interactive Augmented Reality using Adaptive Marker Tracking |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 12/2012 |
Project Title: | Scalable Cloud-on-Chip Runtime Support with Software Coherence for Future 1000-Core Tiled Architectures |
Investigator(s): | Wang CL |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2013 |
List of Research Outputs |
CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084. |
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012. |
DI S. and Wang C.L., Dynamic Optimization of Multi-Attribute Resource Allocation in Self-Organizing Clouds, In: Ivan Stojmenovic, IEEE Transactions on Parallel and Distributed Systems. IEEE Computer Society, 2013, 24: 464-478. |
DI S. and Wang C.L., Error-Tolerant Resource Allocation and Payment Minimization for Cloud System, IEEE Transactions on Parallel and Distributed Systems (TPDS). 2013, 24(6): 1097-1106. |
DI S., Wang C.L. and Chen L., Ex-post Efficient Resource Allocation for Self-organizing Cloud, Journal of Computers and Electrical Engineering (CEE). Elsevier, 2013. |
DI S., Kondo D. and Wang C.L., Optimization and Stabilization of Composite Service Processing in a Cloud System, IEEE/ACM International Symposium on Quality of Service (IWQoS 2013). Montreal, Canada, 2013. |
DI S., Wang C.L. and Kondo D., Towards Payment-Bound Analysis in Cloud Systems with Task-Prediction Errors, International Conference on Cloud Computing (IEEE CLOUD2013). Santa Clara Marriott, CA, USA, 2013. |
Lai C. and Wang C.L., Mobile Edutainment with Interactive Augmented Reality using Adaptive Marker Tracking, 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS2012). 2012. |
Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178. |
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012. |
Researcher : Wang F |
List of Research Outputs |
Wang F., Complex Stock Trading Strategy Based on Parallel Particle Swarm Optimization , Hong Kong, 2013. |
Researcher : Wang H |
List of Research Outputs |
Wang H., Effective Test Case Selection for Context - Aware Applications Based on Mutation Testing and Adequacy Testing from a Context Diversity Perspective, Hong Kong, 2013. |
Researcher : Wang L |
List of Research Outputs |
Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012. |
Researcher : Wang M |
List of Research Outputs |
Wang M. and Chow K.P., Temporal Analysis of HFS+ and Mac OS X in Digital Investigations, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012. |
Researcher : Wang R |
List of Research Outputs |
Wang R., Medial Axis Simplification based on Global Geodesic Slope and Accumulated Hyperbotic Distance, Hong Kong, 2012. |
Researcher : Wang WP |
Project Title: | 7th Asian Symposium on Visualization VISJET & VISFLOOD: Software for Environmental Hydraulic Modeling and Visualization |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 11/2003 |
Project Title: | Continuous collision detection for composite quadric models in computer graphics |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 07/2006 |
Project Title: | Research Output Prize (Faculty of Engineering) |
Investigator(s): | Wang WP, Liu Y |
Department: | Computer Science |
Source(s) of Funding: | Research Output Prize (in Faculty) |
Start Date: | 11/2007 |
Project Title: | New Internet-based Visualization Technology for Water Quality Management |
Investigator(s): | Wang WP, Lee JHW |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Applied Research |
Start Date: | 11/2007 |
Project Title: | Computation of Centroidal Voronoi Tessellation |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2009 |
Project Title: | Applications of Spectral Mesh Processing |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2010 |
Project Title: | Studies on 3D Optimal Delaunay Triangulation |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2011 |
Project Title: | SIGGRAPH 2011 Circular Arc Structures |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2011 |
Project Title: | A New Approach to Automatic Hexahedral Mesh Generation |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2011 |
Project Title: | Free-Form Shape Modeling Using Cyclides |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2012 |
Project Title: | Algebraic Geometry and Geometric Modeling; All-hex meshing using singularity-restricted field |
Investigator(s): | Wang WP |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 01/2013 |
List of Research Outputs |
Edwards J., Wang W.P. and Bajaj C., Surface Segmentation for Improved Remeshing, Proceedings of 21st International Meshing Roundtable, San Jose, 2012. |
Guo Y.W., Liu M., Gu T.T. and Wang W.P., Improving Photo Composition Elegantly:Considering Image Similarity During Composition Optimization, "Computer Graphics Forum". 2012. |
Jia X.H., Tu C.H. and Wang W.P., Topological classification of non-degenerate intersections of two ring tori, Computer Aided Geometric Design. 2013, 30(2): 181-198. |
Liu Y., Li Y., Xu W.W. and Wang W.P., All-hex Meshing Using Singularity-restricted Field, ACM Transactions on Graphics (SIGGRAPH Asia 2012). 2012, 31, No. 6. |
Lu L., Levy B. and Wang W.P., Centroidal Voronoi Tessellation of Line Segments and Graphs, "Computer Graphics Forum". 2012, vol. 31, no. 2: 775-784. |
Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012. |
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4. |
WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013. |
Wang W.P., Computer Aided Geometric Design. Elsevier, 2012. |
Wang W.P., Computers & Graphics. Elsevier, 2012. |
Wang W.P., Free-form Offset Surfaces for Architectural Design, CAD/CG’2012. 2012. |
Wang W.P., IEEE Transactions on Visualization and Computer Graphics (TVCG). IEEE, 2012. |
YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114. |
Yan D.M., Wang W.P., Levy B. and yang L., Efficient Computation Of Clipped Voronoi Diagram For Mesh Generation, Computer-Aided Design. 2013, 45(4): 843-852. |
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013. |
Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462. |
Researcher : Wang Y |
List of Research Outputs |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362. |
Researcher : Wei LY |
Project Title: | Bilateral Blue Noise Sampling |
Investigator(s): | Wei LY |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 01/2012 |
Project Title: | Dynamic Element Textures |
Investigator(s): | Wei LY |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 10/2012 |
List of Research Outputs |
Zhou Y., Huang H., Wei L.Y. and Wang R., Point sampling with general noise spectrum, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, 31: 1-11. |
Researcher : Wong KF |
List of Research Outputs |
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1. |
Researcher : Wong KKY |
Project Title: | Shape recovery of specular surfaces from unknown translations |
Investigator(s): | Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 03/2011 |
Completion Date: | 02/2013 |
Project Title: | Shape recovery of objects with a highly reflective surface |
Investigator(s): | Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | Matching Facial Composites to Partially Occluded or Disguised Faces for Law Enforcement and Crime Investigations (ITS/301/11) |
Investigator(s): | Wong KKY, Chow KP, Schnieders D |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 04/2012 |
Project Title: | Matching Facial Composites to Partially Occluded or Disguised Faces for Law Enforcement and Crime Investigations |
Investigator(s): | Wong KKY, Chow KP, Schnieders D |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Support Programme (Tier 3) |
Start Date: | 07/2012 |
Completion Date: | 10/2013 |
Project Title: | 11th Asian Conference on Computer Vision; Self‐calibration and Motion Recovery from Silhouettes with Two Mirrors |
Investigator(s): | Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 11/2012 |
Project Title: | Tracking and visualizing mitral valve in 3D echocardiography |
Investigator(s): | Wong KKY, Schnieders D |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Applied Research |
Start Date: | 05/2013 |
Project Title: | Reconstruction of mirror surfaces from uncalibrated camera |
Investigator(s): | Wong KKY |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 06/2013 |
List of Research Outputs |
CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17. |
KUANG Z., SUN J. and Wong K.K.Y., Learning Regularized, Query-Dependent Bilinear Similarities for Large Scale Image Retrieval, 1st IEEE International Workshop on Large Scale Computer Vision. Portland, USA, 2013. |
Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222. |
TSUI K.W., Wong K.K.Y. and Lee P.W., Automatic systole-diastole classification of mitral valve complex from RT-3D echocardiography based on multiresolution processing, SPIE Medical Imaging: Image Processing. Florida, USA, 2013, 8669: 46-1 - 46-6. |
YUK S.C. and Wong K.K.Y., Adaptive Background Defogging with Foreground Decremental Preconditioned Conjugate Gradient, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 602-614. |
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992. |
Zhang H., Shao L. and Wong K.K.Y., Self-calibration and Motion Recovery from Silhouettes with Two Mirrors, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 1-12. |
Researcher : Wong KY |
List of Research Outputs |
Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013. |
Researcher : Wong WK |
List of Research Outputs |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Researcher : Wu C |
Project Title: | The 28th IEEE International Conference on Computer Communications (IEEE INFOCOM) Diagnosing Network-wide P2P Live Streaming Inefficiencies Distilling Superior Peers in Large-Scale P2P Streaming Systems |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 04/2009 |
Project Title: | Modeling the Performance and Locality Tradeoff in P2P File Sharing System Design |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 12/2009 |
Project Title: | Autonomous Peer-to-Peer via Auctions: Modeling and Mechanism Design |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2010 |
Project Title: | Characterizing a Hybrid P2P + Cloud Framework for Large-Scale Internet Applications |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | A Hybrid P2P + Cloud Framework for Large-Scale Internet Applications: Modeling, Algorithm Design, and Implementation |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2012 |
Project Title: | Dynamic Predictive Algorithms for Seamless Scaling of Social Media Applications in Multi-Provider Clouds |
Investigator(s): | Wu C |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 12/2012 |
List of Research Outputs |
Deng W., Liu F., Jin H., Wu C. and Liu X., MultiGreen: Cost- Minimizing Multi-source Datacenter Power Supply with Online Control, the fourth ACM International Conference on Future Energy Systems (ACM e-Energy). 2013. |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013. |
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013. |
Li Z. and Wu C., Space Information Flow: Multiple Unicast, the 2012 IEEE International Symposium on Information Theory (ISIT 2012). 2012. |
QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013. |
Wang Z., Wu C., Sun L. and Yang S., Peer-Assisted Social Media Streaming With Social Reciprocity, IEEE Transactions on Network and Service Manage- ment. 2013, 10: 84-94. |
Xiahou T., Li Z. and Wu C., Information Multicast in (Pseudo-)Planar Networks: Efficient Network Coding over Small Finite Fields, the 2013 IEEE International Symposium on Network Coding (NetCod 2013). 2013. |
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013. |
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22. |
Zhao C., ZHAO J., Lin X. and Wu C., Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control, IEEE INFOCOM 2013. |
Zhou R., Li Z., Wu C. and Williamson C., Buddy Routing: A Routing Paradigm for NanoNets Based on Physical Layer Network Coding, the IEEE International Conference on Computer Communication Networks (ICCCN 2012). 2012. |
Researcher : Wu MKE |
List of Research Outputs |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Researcher : XIE X |
List of Research Outputs |
XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344. |
Researcher : XIONG H |
List of Research Outputs |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Researcher : Xiang X |
List of Research Outputs |
Ting H.F. and Xiang X., Equilibria of GSP for range auction, In: J. Gudmundsson, J. Mestre, T. Viglas, 18th Annual International Conference on Computing and Combinatorics. Springer, 2012, 580-591. |
Researcher : Xiong H |
List of Research Outputs |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Researcher : YANG X |
List of Research Outputs |
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013. |
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013. |
Researcher : YE J |
List of Research Outputs |
YE J., Yan Z. and Yu Y., Fast Nonrigid 3D Retrieval Using Modal Space Transform, ACM International Conference on Multimedia Retrieval (ICMR). 2013, 121-126. |
Researcher : YU D |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449. |
Researcher : YUAN Z |
List of Research Outputs |
YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114. |
Researcher : YUK SC |
List of Research Outputs |
YUK S.C. and Wong K.K.Y., Adaptive Background Defogging with Foreground Decremental Preconditioned Conjugate Gradient, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 602-614. |
Researcher : Yang Y |
List of Research Outputs |
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110. |
Researcher : Yip CL |
List of Research Outputs |
Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013. |
Researcher : Yiu SM |
Project Title: | Algorithms for Inferring k-articulated Phylogenetic Network |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 11/2009 |
Project Title: | Indexing data structures for searching ncRNAs |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 03/2011 |
Project Title: | The 19th Annual International Conference on Intelligent systems for Molecular Biology and 10th European Conference on Computational Biology (ISMB/ECCB 2011) Meta-IDBA: de novo assembler for mixed species in metagenomic data |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 07/2011 |
Project Title: | Structural alignment and prediction for non-coding RNAs with triple helix structure |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 09/2011 |
Project Title: | GPU RNA alignment tool for complex pseudoknots |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 01/2012 |
Completion Date: | 06/2013 |
Project Title: | The First RECOMB Satellite Conference on Open Problems in Algorithmic Biology (RECOMB-AB); Algorithms for constructing k-articulated network: a more powerful classification of phylogenetic networks |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2012 |
Project Title: | Software protection in smart meters |
Investigator(s): | Yiu SM |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 03/2013 |
List of Research Outputs |
Chan P.C.K., Hui C.K. and Yiu S.M., Heap graph based software theft detection, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(1): p.101-110. |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012. |
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012. |
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1. |
Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online. |
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296. |
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309. |
Hoa V., Chin F.Y.L., Hon W.K., Leung H.C.M., Sadakane K., Sung W.K. and Yiu S.M., Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees, ISBRA 2013. p.112 - 124. |
Hou S.H., Sasaki R., Uehara T. and Yiu S.M., Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, ICT-EurAsia 2013. p.312-317. |
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113. |
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828. |
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146. |
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013. |
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874. |
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169. |
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5). |
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012. |
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362. |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512. |
Yiu S.M., Information Processing Letters. 2013. |
Yiu S.M. and Yiu S.M., Meta-genomics assembly and binning, Harbin Institute of Technology (HIT). 2012. |
Yiu S.M., Selected research problems in computer forensics, Information Security Laboratory, Tokyo Denki University. 2012. |
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696. |
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Researcher : Yu D |
List of Research Outputs |
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012. |
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449. |
Researcher : Yu J |
List of Research Outputs |
Yu J., Phylogenetic Tree Reconstruction with Protein Linkage, Hong Kong, 2012. |
Researcher : Yu KY |
List of Research Outputs |
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012. |
Yu K.Y., Efficient Schemes for Anonymous Credential with Reputation Support . Hong Kong, 2012. |
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696. |
Researcher : Yu Y |
Project Title: | Resolution Independent Visualization for Comparative Analysis of Multi-Dimensional Imaging Data |
Investigator(s): | Yu Y |
Department: | Computer Science |
Source(s) of Funding: | Seed Funding Programme for Basic Research |
Start Date: | 06/2011 |
Project Title: | Resolution Independent Full-Color Image Representations |
Investigator(s): | Yu Y |
Department: | Computer Science |
Source(s) of Funding: | Incentive Award for RGC GRF Fundable But Not Funded Projects |
Start Date: | 07/2011 |
Project Title: | An Advanced Video Fusion System for Security Investigations |
Investigator(s): | Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 06/2012 |
Project Title: | An Advanced Video Fusion System for Security Investigations |
Investigator(s): | Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Guangdong-Hong Kong Technology Cooperation Funding Scheme |
Start Date: | 06/2012 |
Project Title: | An Advanced Video Fusion System for Security Investigations |
Investigator(s): | Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL |
Department: | Computer Science |
Source(s) of Funding: | Innovation and Technology Fund Internship Programme |
Start Date: | 06/2012 |
Project Title: | SIGGRAPH 2012; Single-View Hair Modeling for Portrait Manipulation |
Investigator(s): | Yu Y |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 08/2012 |
Project Title: | Multiphase Implicit Functions for Geometric Modeling of Heterogeneous Volume Objects |
Investigator(s): | Yu Y |
Department: | Computer Science |
Source(s) of Funding: | General Research Fund (GRF) |
Start Date: | 01/2013 |
List of Research Outputs |
Chai M., Wang L., Weng Y., Yu Y., Guo B. and Zhou K., Single-View Hair Modeling for Portrait Manipulation, ACM Transactions on Graphics (special issue for SIGGRAPH 2012). 2012, Vol 31: Article 116. |
Fan H., Peng Q. and Yu Y., A Robust Algorithm for Denoising Meshes with High-Resolution Details, Computational Visual Media. 2012, 75-82. |
Gao S., Yu Y. and Cheng Y., Linear Subspace Learning Based on A Learned Discriminative Dictionary for Sparse Coding, International Conference on Computer Vision Theory and Applications. 2013, 530-538. |
Huang H.D., Yin K., Zhao L., Qi Y., Yu Y. and Tong X., Detail-Preserving Controllable Deformation from Sparse Examples, IEEE Transactions on Visualization and Computer Graphics. 2012, Vol 18: 1215-1227. |
Liao Z., Hoppe H., Forsyth D.A. and Yu Y., A Subdivision-Based Representation for Vector Image Editing, IEEE Transactions on Visualization and Computer Graphics. 2012, Vol 18: 1858-1867. |
Liu Y. and Yu Y., Medical Volume Segmentation Based on Level Sets of Probabilities, International Conference on Computer Vision Theory and Applications. 2013, 387-394. |
WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013. |
Wei S. and Yu Y., Subspace Segmentation with Minimal Square Frobenius Norm Representation, 21st International Conference on Pattern Recognition. 2012, 3509-3512. |
YE J., Yan Z. and Yu Y., Fast Nonrigid 3D Retrieval Using Modal Space Transform, ACM International Conference on Multimedia Retrieval (ICMR). 2013, 121-126. |
YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114. |
Yu Y., Associate Editor, Computer Graphics Forum. 2013. |
Yu Y., Associate Editor, The Visual Computer. 2012. |
Yu Y., Data-Driven Image Color Theme Enhancement, International Conference on Digital Home, Sun Yat-sen University. 2012. |
Yu Y., Editorial Board, International Journal of Software and Informatics. 2013. |
Yu Y., Linear Subspace Learning Based on A Learned Discriminative Dictionary for Sparse Coding, Microsoft Research Asia. 2013. |
Researcher : Yuen TH |
Project Title: | Leakage Resilient Public Key Cryptosystems |
Investigator(s): | Yuen TH, Hui CK |
Department: | Computer Science |
Source(s) of Funding: | Small Project Funding |
Start Date: | 01/2012 |
Completion Date: | 03/2013 |
Project Title: | Eurocrypt 2012 Identity-Based Encryption Resilient to Continual Auxiliary Leakage |
Investigator(s): | Yuen TH |
Department: | Computer Science |
Source(s) of Funding: | URC/CRCG - Conference Support for Teaching Staff |
Start Date: | 04/2012 |
List of Research Outputs |
Au M.H., Liu J.K., Susilo W. and Yuen T.H., Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction, Theoretical Computer Science. Elsevier, 2013, 469: 1-14. |
Wang Y., Au M.H., Liu J.K., Yuen T.H. and Susilo W., Threshold-Oriented Optimistic Fair Exchange, In: Javier Lopez, Xinyi Huang, and Ravi Sandhu, The 7th International Conference on Network and System Security (NSS 2013). Springer Berlin Heidelberg, 2013, 7873: 424-438. |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696. |
Yuen T.H., Liu J.K., Au M.H., Susilo W. and Zhou J., Efficient Linkable and/or Threshold Ring Signature without Random Oracles, In: Chris Mitchell, The Computer Journal. Oxford University Press, 2012, 56: 407-421. |
Yuen T.H., Liu J.K., Huang X., Au M.H., Susilo W. and Zhou J., Forward Secure Attribute-Based Signature, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 167-177. |
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Researcher : ZHAI K |
List of Research Outputs |
Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81. |
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231. |
Researcher : ZHANG C |
List of Research Outputs |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Researcher : ZHANG L |
List of Research Outputs |
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013. |
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803. |
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012. |
Researcher : ZHANG P |
List of Research Outputs |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012. |
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012. |
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012. |
Researcher : ZHANG Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : ZHANG Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : ZHANG Z |
List of Research Outputs |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917. |
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896. |
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22. |
Researcher : ZHAO J |
List of Research Outputs |
Zhao C., ZHAO J., Lin X. and Wu C., Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control, IEEE INFOCOM 2013. |
Researcher : ZHU X |
List of Research Outputs |
CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17. |
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013. |
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992. |
Researcher : ZHU X |
List of Research Outputs |
CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17. |
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013. |
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992. |
Researcher : Zhang C |
List of Research Outputs |
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74. |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22. |
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012. |
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70. |
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70. |
Researcher : Zhang L |
List of Research Outputs |
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013. |
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803. |
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012. |
Researcher : Zhang L |
List of Research Outputs |
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013. |
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803. |
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012. |
Researcher : Zhang P |
List of Research Outputs |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012. |
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012. |
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012. |
Researcher : Zhang P |
List of Research Outputs |
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130. |
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169. |
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012. |
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012. |
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012. |
Researcher : Zhang W |
List of Research Outputs |
Zhang W., Adaptive Live VM Migration over WAN: Modeling and Implementation. Hong Kong, 2013. |
Researcher : Zhang Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Zhang Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Zhang Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Zhang Y |
List of Research Outputs |
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012. |
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462. |
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013. |
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154. |
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348. |
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013. |
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168. |
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012. |
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517. |
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013. |
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236. |
Researcher : Zhang Z |
List of Research Outputs |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917. |
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896. |
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22. |
Researcher : Zhang Z |
List of Research Outputs |
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758. |
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917. |
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896. |
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22. |
Researcher : Zheng W |
List of Research Outputs |
Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462. |
Researcher : Zhou H |
List of Research Outputs |
Zhou H., An Efficient Algorithm for Face Sketch Synthesis Using Markov Weight Fields and Cascade Decomposition Method, Hong Kong, 2012. |