DEPT OF COMPUTER SCIENCE



Researcher : BI B

List of Research Outputs

LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Bi B

List of Research Outputs

LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Bo P

List of Research Outputs

Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462.


Researcher : CHAN SH

List of Research Outputs

CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104.
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.


Researcher : CHEN F

List of Research Outputs

Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012.


Researcher : CHEN Z

List of Research Outputs

CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17.
Chen Z., 3D Shape Recovery under Multiple Viewpoints and Single Viewpoint. Hong Kong, 2012.


Researcher : CHENG L

List of Research Outputs

CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084.
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012.


Researcher : Cao L

List of Research Outputs

Cao L., Interactive Network Rendering based on Textured Depth Map Re-projection. Hong Kong, 2012.


Researcher : Chan HL

Project Title:Competitive on-line scheduling algorithms for minimizing weighted flow time
Investigator(s):Chan HL
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:10/2010
Completion Date:12/2012


Project Title:Adaptive algorithms for finding top-k items in sliding windows
Investigator(s):Chan HL
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.


Researcher : Chan HTH

Project Title:Privacy-Preserving Mechanisms on Multi-user Data with Untrusted Aggregator
Investigator(s):Chan HTH
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:HKU Overseas Fellowship Awards 2011-12
Investigator(s):Chan HTH
Department:Computer Science
Source(s) of Funding:HKU Overseas Fellowship Awards
Start Date:09/2011


Project Title:Private Recommendation System in Social Networks
Investigator(s):Chan HTH
Department:Computer Science
Source(s) of Funding:France/Hong Kong Joint Research Scheme - Travel Grants
Start Date:01/2012


Project Title:The 12th Privacy Enhancing Technologies Symposium Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams over a Sliding Window
Investigator(s):Chan HTH
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:07/2012
Completion Date:07/2012


Project Title:Privacy-Preserving Mechanisms on Multi-User Data in Ubiquitous Computing Environments
Investigator(s):Chan HTH
Department:Computer Science
Source(s) of Funding:Early Career Scheme (ECS)
Start Date:09/2012


List of Research Outputs

Chan H.T.H., Chang K.L. and Raman R., An SDP Primal-Dual Algorithm for Approximating the Lovasz-Theta Function, Algorithmica. 2013.
Chan H.T.H., Li M., Shi E. and Xu W., Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams (over a Sliding Window), Privacy Enhancing Technologies Symposium (PETS). 2012.
Chan H.T.H., Shi E. and Song D., Optimal Lower Bound for Differentially Private Multi-party Aggregation, European Symposium on Algorithms. 2012.
Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012.
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012.
Chan H.T.H., Lau L.C. and Trevisan L., Theory and Applications of Models of Computation, 10th International Conference. 2013.


Researcher : Chan K

List of Research Outputs

Chan K., Distributed Software Transactional Memory with Clock Validation on Clusters. Hong Kong, 2013.


Researcher : Chan KP

Project Title:Optimal Transfers in Generalized Cross Domain Learning
Investigator(s):Chan KP
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:04/2011


Project Title:Temporal Latent Topic Model for Facial Expression Recognition
Investigator(s):Chan KP
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:Continuous Discriminant Latent Topic Model (CD-LTM) for Facial Expression Recognition and Generation
Investigator(s):Chan KP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2013


List of Research Outputs

Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803.


Researcher : Chan WK

List of Research Outputs

Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917.
Li W.Y.S., Wu S., Chan W.K. and Tse T.H., JSCloud: toward remote execution of JavaScript code on handheld devices, The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA '12), in Proceedings of the 12th International Conference on Quality Software (QSIC '12), IEEE Computer Society, Los Alamitos, CA. 2012, 240−245.
Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81.
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896.
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231.


Researcher : Chen TY

List of Research Outputs

Chen T.Y., Hu P., Li H. and Tse T.H., An enhanced flow analysis technique for detecting unreachability faults in concurrent systems, Information Sciences (ISI impact factor 3.643). 2012, 194 (7): 254−269.
Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., DESSERT: a divide-and-conquer methodology for identifying categories, choices, and choice relations for test case generation, IEEE Transactions on Software Engineering (ISI impact factor 2.588). 2012, 38 (4): 794−809.
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.


Researcher : Chen Z

List of Research Outputs

CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17.
Chen Z., 3D Shape Recovery under Multiple Viewpoints and Single Viewpoint. Hong Kong, 2012.


Researcher : Cheng CK

Project Title:Privacy Protection in Location-based Services with Location Cloaking
Investigator(s):Cheng CK
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2007


Project Title:Scalable Cleaning of Probabilistic Databases with Quality Guarantees
Investigator(s):Cheng CK
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2010


Project Title:UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases
Investigator(s):Cheng CK
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2011


Project Title:Evaluating Probabilistic Queries over Uncertain Graph Databases
Investigator(s):Cheng CK
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:Outstanding Young Researcher Award 2011-12
Investigator(s):Cheng CK
Department:Computer Science
Source(s) of Funding:Outstanding Young Researcher Award
Start Date:01/2013


Project Title:Query-efficient representations of uncertain graphs
Investigator(s):Cheng CK, Maniu S
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2013


List of Research Outputs

Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012.
Cheng C.K., Editorial Advisory Board, In: D. Shasha and G. Vossen, Information Systems. Elsevier, 2012.
Cheng C.K., Editorial Board Member, In: A. P. Sheth and D. Agrawal, Distributed and Parallel Databases Journal (DAPD). Springer, 2013.
Cheng C.K., Evaluating Probabilistic Queries over Uncertain Matching, research seminar, Shandong University. 2012.
Cheng C.K., Explore or Exploit? Effective Strategies for Disambiguating Large Databases, In: Haixun Wang, research seminar at the Microsoft Research Asia (MSRA), Beijing, China. 2012.
Cheng C.K., Explore or Exploit? Effective Strategies for Disambiguating Large Databases, research seminar, Shandong University. 2012.
Cheng C.K., Filter-based Procotols for Continuous Queries over Imprecise Location Data, In: Michael Benedikt and Dan Oltaneau, research seminar at the INQUEST workshop (INovative QUErying of Streams), Oxford University. 2012.
Cheng C.K., Managing Quality of Probabilistic Databases, In: Shazia Sadiq, Handbook of Data Quality. Berlin, Springer Berlin Heidelberg, 2013, 271-291.
Cheng C.K., Managing Uncertain Databases, 2012 International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). 2012.
Cheng C.K., On Incentive-based Tagging, In: Ao-Ying Zhou, research seminar at the East China Normal University. 2013.
Cheng C.K., On Incentive-based Tagging, In: Yu Zheng, research seminar at the Microsoft Research Asia (MSRA), Beijing, China. 2013.
Cheng C.K., Outstanding Young Researcher Award 2011-12 (awarded a research funding of HKD $300,000 and 1 Type B student), University of Hong Kong. 2013.
JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013.
Tang R., Cheng C.K., Wu H. and Bressan S., A Framework for Conditioning Uncertain Relational Data, 23rd Conf. on Database and Expert Systems Applications (DEXA 2012). 2012.
XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344.
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013.
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.


Researcher : Cheng L

List of Research Outputs

CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084.
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012.


Researcher : Cheung DWL

Project Title:An eLogistics Appliance with data exchange and conversion technologies for infrastructure connectivity
Investigator(s):Cheung DWL, Kwok WCH, Kao CM, Lee TYT, Yee PKC
Department:Computer Science
Source(s) of Funding:Platform Research Projects - General Award
Start Date:07/2007


Project Title:Universal web service adapter to facilitate "software as a service" implementation
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:11/2008


Project Title:Multi-site infrastructure for massive digital content collaboration
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:12/2008


Project Title:An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme
Investigator(s):Cheung DWL, Kwok WCH, Yee PKC, Kwok RPM, Tsang WW
Department:Computer Science
Source(s) of Funding:Guangdong-Hong Kong Technology Cooperation Funding Scheme
Start Date:04/2009


Project Title:An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:04/2009


Project Title:An Intelligent Data Security Gateway for Multiparty Data Transfer Supported by Multi-Factor and Multi-Dimensional Data Protection Scheme
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:07/2009


Project Title:Business Intelligence Support on Common Cloud Platform
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Applied Research
Start Date:11/2010


Project Title:A Smartphone Control Device and Signpost System for Visually Impaired Users
Investigator(s):Cheung DWL, Lau MK, Yee PKC
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 2)
Start Date:12/2011
Completion Date:05/2013


Project Title:A Smartphone Control Device and Signpost System for Visually Impaired Users
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:12/2011


Project Title:A Smartphone Control Device and Signpost System for Visually Impaired Users
Investigator(s):Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:12/2011


List of Research Outputs

Atzeni P., Cheung D.W.L. and Ram S., In: Paolo Atzeni, David W. Cheung, Sudha Ram , Conceptual Modeling, Lecture Notes in Computer Science 7532. Springer, 2012.
Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012.
Cheung D.W.L., Distinguished Fellow, Hong Kong Computer Society. 2012.
Cheung D.W.L., Fellow, Hong Kong Institute of Engineering. 2012.
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027.
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18.
MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013.
Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013.
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.


Researcher : Chim TW

Project Title:Enhanced Credential-based Privacy-preserving Power Request Scheme for Smart Grid Network
Investigator(s):Chim TW, Hui CK, Li VOK
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:01/2012


List of Research Outputs

Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012.
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012.
Chim T.W., Yiu S.M., Hui L.C.K. and Li V.O.K., VANET-based secure taxi service, Elsevier Ad Hoc Networks Journal. 2013.
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1.


Researcher : Chin FYL

Project Title:MultiVision Fund
Investigator(s):Chin FYL
Department:Computer Science
Source(s) of Funding:MultiVision Intelligent Surveillance (Hong Kong) Ltd. - General Award
Start Date:07/2003


Project Title:Flexible Framework for GPGPU-based Video Decoding and Post-processing.
Investigator(s):Chin FYL, Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:09/2009


Project Title:Bounded Space On-line Bin Packing
Investigator(s):Chin FYL
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2011


Project Title:Next-Generation Sequencing Algorithms
Investigator(s):Chin FYL
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:Next-Generation Sequencing Algorithms
Investigator(s):Chin FYL
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:01/2012


Project Title:A Pilot Feasibility Study on Motion-Compensated Video Reconstruction Approach for Cost Effective Video Storage Solution
Investigator(s):Chin FYL, Chow KP, Chung HY
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Applied Research
Start Date:06/2012
Completion Date:02/2013


Project Title:The 11th European Conference on Computational Biology (ECCB'12); MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample
Investigator(s):Chin FYL
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:09/2012


Project Title:Next-Generation Sequencing Algorithms
Investigator(s):Chin FYL, Yiu SM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:12/2012


List of Research Outputs

Chin F.Y.L., Editor, Information Processing Letters (until Dec 2012). 2012.
Chin F.Y.L., Managing Editor, International Journal of Foundations of Computer Science. World Scientific Publishing Co., 2012.
Chin F.Y.L., Meta-genomics Assembly and Binning, ISCB-Asia/SCCG 2012, BGI Special Session. 2012.
Chin F.Y.L., Metagenomic Assembly and Binning, Nanyang Technological University (NTU). Singapore, 2012.
Chin F.Y.L., Metagenomic Assembly and Binning, National University of Singapore (NUS). Singapore, 2012.
Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Choi YK

Project Title:A capacity-constrained centroidal Voronoi tessellation framework for blue noise point sampling
Investigator(s):Choi YK, Wang WP
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:04/2011


Project Title:SIGGRAPH 2012 Robust Modeling of Constant Mean Curvature Surfaces
Investigator(s):Choi YK
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2012


List of Research Outputs

Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4.


Researcher : Chow KP

Project Title:Robust Face Detection and Reconstruction Method that Addresses Inherent Limitations in Face Recognition Technology
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:10/2008


Project Title:Robust Face Detection and Reconstruction Method that Addresses Inherent Limitations in Face Recognition Technology
Investigator(s):Chow KP, Chin FYL, Wong KKY
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:10/2008


Project Title:Object-oriented Motion Deblurring Technology for Forensic Video Enhancement
Investigator(s):Chow KP, Chin FYL, Wong KKY
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:09/2009


Project Title:Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras
Investigator(s):Chow KP, Wong KKY
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:09/2010


Project Title:Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:09/2010


Project Title:Using Face Recognition Result as Cue for Human Tracking System with Multiple Uncalibrated Cameras
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:10/2010


Project Title:Protecting digital data privacy in computer forensic examination
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:05/2011
Completion Date:10/2012


Project Title:Integrating Multiple Visual Biometic for Human Recognition
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:10/2011


Project Title:Integrating Multiple Visual Biometic for Human Recognition
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:10/2011


Project Title:Integrating Multiple Visual Biometic for Human Recognition
Investigator(s):Chow KP, Hui CK
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:10/2011


Project Title:To Develop a Practical Framework for Cloud Forensics
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Applied Research
Start Date:06/2012
Completion Date:05/2013


Project Title:A preliminary forensic analysis tool for Shanzhai mobile phones
Investigator(s):Chow KP
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2012


List of Research Outputs

Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128.
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296.
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309.
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012.
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828.
Wang M. and Chow K.P., Temporal Analysis of HFS+ and Mac OS X in Digital Investigations, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012.
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512.


Researcher : DI S

List of Research Outputs

DI S. and Wang C.L., Dynamic Optimization of Multi-Attribute Resource Allocation in Self-Organizing Clouds, In: Ivan Stojmenovic, IEEE Transactions on Parallel and Distributed Systems. IEEE Computer Society, 2013, 24: 464-478.
DI S. and Wang C.L., Error-Tolerant Resource Allocation and Payment Minimization for Cloud System, IEEE Transactions on Parallel and Distributed Systems (TPDS). 2013, 24(6): 1097-1106.
DI S., Wang C.L. and Chen L., Ex-post Efficient Resource Allocation for Self-organizing Cloud, Journal of Computers and Electrical Engineering (CEE). Elsevier, 2013.
DI S., Kondo D. and Wang C.L., Optimization and Stabilization of Composite Service Processing in a Cloud System, IEEE/ACM International Symposium on Quality of Service (IWQoS 2013). Montreal, Canada, 2013.
DI S., Wang C.L. and Kondo D., Towards Payment-Bound Analysis in Cloud Systems with Task-Prediction Errors, International Conference on Cloud Computing (IEEE CLOUD2013). Santa Clara Marriott, CA, USA, 2013.


Researcher : Fang J

List of Research Outputs

Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296.
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309.


Researcher : Fu X

Project Title:The Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition (CVPR2010) Reconstruction of Display and Eyes from a Single Image
Investigator(s):Fu X
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:06/2010




Researcher : Ge S

List of Research Outputs

Ge S., Advanced Analysis and Join Queries in Multidimensional Spaces , Hong Kong, 2013.
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027.


Researcher : Ge S

List of Research Outputs

Ge S., Advanced Analysis and Join Queries in Multidimensional Spaces , Hong Kong, 2013.
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027.


Researcher : HAN G

List of Research Outputs

Han G., Profile-Guided Loop Parallelization and Co-Scheduling on GPU-Based Heterogeneous Many-Core Architectures. Hong Kong, 2013.
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012.


Researcher : HUA Q

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449.


Researcher : Han G

List of Research Outputs

Han G., Profile-Guided Loop Parallelization and Co-Scheduling on GPU-Based Heterogeneous Many-Core Architectures. Hong Kong, 2013.
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012.


Researcher : He Y

List of Research Outputs

He Y., Protecting Security in Cloud and Other Distributed Environments. Hong Kong, 2012.
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012.


Researcher : Ho SL

List of Research Outputs

Ho S.L., Technical Solution to Conduct Investigation in Digital Age, Hong Kong, 2012.


Researcher : Hu W

List of Research Outputs

Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4.


Researcher : Hua Q

Project Title:Faster Exact Algorithms for NP-hard Problems
Investigator(s):Hua Q, Lau FCM
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:02/2011
Completion Date:07/2012


List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449.


Researcher : Hui CK

Project Title:Cryptanalysis and Implementation of Cipher
Investigator(s):Hui CK, Yiu SM
Department:Computer Science
Source(s) of Funding:NSFC/RGC Joint Research Scheme
Start Date:01/2010
Completion Date:12/2012


Project Title:Securing Smart Grid Network for the Power Industry
Investigator(s):Hui CK
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:Cyberspace Investigation Technology Using Criminal Profiling
Investigator(s):Hui CK, Chow KP
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:10/2011
Completion Date:12/2012


Project Title:Cyberspace Investigation Technology Using Criminal Profiling
Investigator(s):Hui CK
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:10/2011


Project Title:Cyberspace Investigation Technology Using Criminal Profiling
Investigator(s):Hui CK
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:11/2011


Project Title:Applying advanced Cryptographic Techniques for Privacy Preserving Computation in Cloud Computing Environment
Investigator(s):Hui CK, Yiu SM
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2012
Completion Date:06/2013


Project Title:Light-Weight Secure and Privacy Preserving Protocol for Power Selling in Smart Grid
Investigator(s):Hui CK
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2013


List of Research Outputs

Chan P.C.K., Hui C.K. and Yiu S.M., Heap graph based software theft detection, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(1): p.101-110.
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012.
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012.
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1.
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296.
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309.
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828.
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512.
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696.
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307.
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012.


Researcher : Huo Q

Project Title:International Conference on Pattern Recognition (ICPR-2002) A Comparative Study of Several Modeling Approaches for Large Vocabulary Offline Recognition of Handwritten Chinese Characters
Investigator(s):Huo Q
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2002


Project Title:Chinese spoken language processing
Investigator(s):Huo Q
Department:Computer Science
Source(s) of Funding:Anhui USTC iFLYTEK Co. Ltd. - General Award
Start Date:09/2005




Researcher : IEONG SCR

List of Research Outputs

Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128.
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012.


Researcher : Ieong SCR

List of Research Outputs

Cheung A.S.Y., IEONG S.C.R., Chow K.P. and Weber R.O.L.F., Challenges to Personal Data Protection in Cloud Computing, Journal of Law and Economic Regulation. South Korea, Seoul National University, 2013, 6:1: 105-128.
Ieong S.C.R. and Chow K.P., Enchanced monitoring rule through direct node query for Foxy Network investigation, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012.


Researcher : JIN Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, Hong Kong, 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Jiang B

List of Research Outputs

Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.


Researcher : Jiang L

List of Research Outputs

Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309.


Researcher : Jin Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, Hong Kong, 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : KUANG Z

List of Research Outputs

KUANG Z., SUN J. and Wong K.K.Y., Learning Regularized, Query-Dependent Bilinear Similarities for Large Scale Image Retrieval, 1st IEEE International Workshop on Large Scale Computer Vision. Portland, USA, 2013.


Researcher : Kao CM

Project Title:CubeLSI: A three-dimensional latent semantic indexing method
Investigator(s):Kao CM
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:03/2011


Project Title:Resource Searching and Diversified Tag Recommendation in Social Tagging Systems
Investigator(s):Kao CM, Cheung DWL
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:10/2012


List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.


Researcher : Kwan YK

List of Research Outputs

Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828.


Researcher : LI H

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013.
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013.
Li H., Optimal Data Dissemination in Stochastic and Arbitrary Wireless Networks. Hong Kong, 2012.


Researcher : LI J

List of Research Outputs

LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433.
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012.
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110.


Researcher : LI R

List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : LI R

List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : LI X

List of Research Outputs

MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013.


Researcher : LIU X

List of Research Outputs

Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113.
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146.
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.


Researcher : LIU X

List of Research Outputs

Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113.
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146.
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.


Researcher : Lam KT

List of Research Outputs

Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178.


Researcher : Lam TW

Project Title:Compressed indexes for approximate string matching, with applications to biological sequences
Investigator(s):Lam TW
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:08/2006


Project Title:Outstanding Research Student Supervisor Award 2008-2009
Investigator(s):Lam TW
Department:Computer Science
Source(s) of Funding:Outstanding Research Student Supervisor Award
Start Date:12/2009


Project Title:Ttradeoff between energy and throughput for online scheduling
Investigator(s):Lam TW
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:02/2011
Completion Date:07/2012


Project Title:A theoretical study of competitive online algorithms for energy-efficient job scheduling on multiple machines
Investigator(s):Lam TW
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:06/2012


Project Title:Ultrafast SNP-sensitive and Gap-sensitive Alignment of Short Reads to Human Genome via Better Indexing
Investigator(s):Lam TW
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:08/2012


Project Title:A Genomic and Pharmaceutical Knowledge-based System for Clinical Diagnosis and Case Repository
Investigator(s):Lam TW, Cheung DWL, Ting HF, Yiu SM, Luo R
Department:Computer Science
Source(s) of Funding:Guangdong-Hong Kong Technology Cooperation Funding Scheme
Start Date:03/2013


Project Title:A Genomic and Pharmaceutical Knowledge-based System for Clinical Diagnosis and Case Repository
Investigator(s):Lam TW, Cheung DWL, Ting HF, Yiu SM, Luo R
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:04/2013


List of Research Outputs

CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104.
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113.
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Online Speed Scaling Based on Active Job Count to Minimize Flow Plus Energy, Algorithmica. 2013, 65(3): 605 - 633.
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874.
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18.
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1.


Researcher : Lau FCM

Project Title:The Hong Kong University grid point
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:Matching Fund for Hi-Tech Research and Development Program of China (863 Projects)
Start Date:12/2002


Project Title:HP mobile technology for teaching initiative
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:Hewlett-Packard HK SAR Ltd.
Start Date:10/2004


Project Title:UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:Other Funding Scheme
Start Date:05/2006


Project Title:HKU Grid Point for Systems Research and Applications in Multiple Disciplines
Investigator(s):Lau FCM, Wang CL, Ho PT, Chan GKY, Li WK
Department:Computer Science
Source(s) of Funding:UGC One-off Special Equipment Grant Scheme
Start Date:12/2008


Project Title:Distributed Data Queries in Wireless Sensor Networks under the Physical Interference Model
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:10/2011


Project Title:10th International Conference on Wired/Wireless Internet Communications Dynamic Contention Resolution in Multiple-Access Channels
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:06/2012


Project Title:The 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013); An Approximate Approach for Area Coverage in Wireless Sensor Networks
Investigator(s):Lau FCM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:06/2013


List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013.
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013.
QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013.
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449.
Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013.
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013.


Researcher : Law YW

List of Research Outputs

Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828.


Researcher : Lee LK

Project Title:Ultra-fast GPU-based Alignment of Long Reads with Mixed Sequencing Error
Investigator(s):Lee LK, Lam TW
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:06/2013
Completion Date:06/2014


List of Research Outputs

CHAN S.H., Lam T.W. and Lee L.K., Scheduling for weighted flow time and energy with rejection penalty, Theoretical Computer Science. 2013, 470: 93-104.
Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Online Speed Scaling Based on Active Job Count to Minimize Flow Plus Energy, Algorithmica. 2013, 65(3): 605 - 633.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).


Researcher : Lee SD

List of Research Outputs

Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012.


Researcher : Leung CM

Project Title:Binning Metagenomic data
Investigator(s):Leung HCM, Chin FYL
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:09/2010


Project Title:The 15th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2011) T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome
Investigator(s):Leung HCM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:03/2011


List of Research Outputs

Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362.


Researcher : Leung HCM

Project Title:Binning Metagenomic data
Investigator(s):Leung HCM, Chin FYL
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:09/2010


Project Title:The 15th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2011) T-IDBA: A de novo Iterative de Bruijn Graph Assembler for Transcriptome
Investigator(s):Leung HCM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:03/2011


List of Research Outputs

Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online.
Hoa V., Chin F.Y.L., Hon W.K., Leung H.C.M., Sadakane K., Sung W.K. and Yiu S.M., Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees, ISBRA 2013. p.112 - 124.


Researcher : Li H

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013.
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013.
Li H., Optimal Data Dissemination in Stochastic and Arbitrary Wireless Networks. Hong Kong, 2012.


Researcher : Li J

List of Research Outputs

LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433.
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012.
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110.


Researcher : Li J

List of Research Outputs

LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433.
Li J., Advanced Spatial Queries with Textual and Social Components, Hong Kong, 2012.
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110.


Researcher : Li M

List of Research Outputs

Chan H.T.H., Li M., Shi E. and Xu W., Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams (over a Sliding Window), Privacy Enhancing Technologies Symposium (PETS). 2012.
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012.
Li M., Sparse Representation and Fast Processing of Massive Data, Hong Kong, 2012.


Researcher : Li R

List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Li R

List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Chan H.L., Lam T.W. and Li R., Online Flow Time Scheduling in the Presence of Preemption Overhead, 15th International Workshop on Approximation, Randomization, and Combinatorial Optimization (APPROX-RANDOM) . Springer, 2012, 85-97.
LI R., Kao C.M., BI B., Cheng C.K. and Lo E., DQR: a probabilistic approach to diversified query recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Li R., A Probabilistic Approach to Diversified Query Recommendation, Hong Kong, 2013.
Li R., Kao C.M., Bi B., Cheng C.K. and Lo C.L., DRQ: A Probabilistic Approach to Diversified Query Recommendation, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Li Y

List of Research Outputs

Li Y., A Study on Surface and Volume Tiling for Geometric Modeling. Hong Kong, 2012.
Liu Y., Li Y., Xu W.W. and Wang W.P., All-hex Meshing Using Singularity-restricted Field, ACM Transactions on Graphics (SIGGRAPH Asia 2012). 2012, 31, No. 6.


Researcher : Ling R

List of Research Outputs

Ling R., Methods for Generating Meshes with Sharp Features, Hong Kong, 2012.


Researcher : Liu B

List of Research Outputs

Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874.
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18.


Researcher : Liu CM

List of Research Outputs

Chan H.L., CHAN S.H., Lam T.W., Lee L.K., LI R. and Liu C.M., Competitive Online Algorithms for Multiple-Machine Power Management and Weighted Flow Time, 19th Australasian Theory Symposium (CATS). 2013.
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).


Researcher : Luo R

List of Research Outputs

Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874.
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).
Luo R., Liu B., Xie Y., … , Cheung D.W.L., … , Lam T.W. and Wang J., SOAPdenovo2: an empirically improved memory-efficient short-read de novo assembler, GigaScience. BioMed Central, 2012, 1:18.


Researcher : MO L

List of Research Outputs

MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013.
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013.


Researcher : Ma CCC

List of Research Outputs

Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1.


Researcher : Ma KK

List of Research Outputs

Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178.


Researcher : Mamoulis N

Project Title:Outstanding Young Researcher Award 2008-2009
Investigator(s):Mamoulis N
Department:Computer Science
Source(s) of Funding:Outstanding Young Researcher Award
Start Date:12/2009


Project Title:Algorithms for Large-Scale Matching Problems
Investigator(s):Mamoulis N
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2010


Project Title:Durable Queries in Temporal and Spatio-temporal Databases
Investigator(s):Mamoulis N
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2011


Project Title:Spatio-textual Joins
Investigator(s):Mamoulis N
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2013


List of Research Outputs

Chatzimilioudis G., Cuzzocrea A., Gunopulos D. and Mamoulis N., A Novel Distributed Framework For Optimizing Query Routing Trees In Wireless Sensor Networks Via Optimal Operator Placement, Journal of Computer and System Sciences. Elsevier, 2013, 79(3): 349-368.
Emrich T., Kriegel H.P., Mamoulis N., Renz M. and Zuefle A., Indexing uncertain spatio-temporal data, 21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA. 2012, 395-404.
Ge S., U L.H., Mamoulis N. and Cheung D.W.L., Efficient All Top-$(k)$ Computation - A Unified Solution for All Top-$(k)$, Reverse Top-$(k)$ and Top-$(m)$ Influential Queries, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1015-1027.
LI J., Yiu M.L. and Mamoulis N., Efficient notification of meeting points for moving groups via independent safe regions, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 422-433.
Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110.
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.


Researcher : NING L

List of Research Outputs

Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012.
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012.


Researcher : Ning L

List of Research Outputs

Chan H.T.H., CHEN F. and NING L., Optimizing Social Welfare for Network Bargaining Games in the Face of Unstability, Greed and Spite, European Symposium on Algorithms. 2012.
Chan H.T.H., Li M. and Ning L., Sparse Fault-Tolerant Spanners for Doubling Metrics with Bounded Hop-Diameter or Degree, International Colloquium on Automata, Languages and Programming (ICALP). 2012.


Researcher : Pan G

List of Research Outputs

Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222.
Pan G., Motion Segmentation by Adaptive Mode Seeking and Clustering Consensus. Hong Kong, 2012.


Researcher : Pan H

List of Research Outputs

Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012.
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4.


Researcher : Pun KH

Project Title:Community Legal Information Project
Investigator(s):Pun KH
Department:Computer Science
Source(s) of Funding:Department of Justice, HKSAR Government - General Award
Start Date:04/2004




Researcher : QIU X

List of Research Outputs

QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013.


Researcher : SUN L

List of Research Outputs

XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344.


Researcher : Schnieders D

Project Title:European Conference on Computer Vision; Mode Seeking with an Adaptive Distance Measure
Investigator(s):Schnieders D
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:10/2012


Project Title:Photometric Stereo under Near-Light with Attenuation
Investigator(s):Schnieders D, Wong KKY
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:06/2013
Completion Date:10/2014


List of Research Outputs

Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222.


Researcher : Shang L

List of Research Outputs

Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222.


Researcher : Sun F

List of Research Outputs

Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012.


Researcher : Sun H

List of Research Outputs

Sun H., Modeling Information Diffusion in Social Networks, Hong Kong, 2012.


Researcher : TAN H

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.


Researcher : TANG Y

List of Research Outputs

ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.


Researcher : TSANG YH

List of Research Outputs

Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012.


Researcher : TSUI KW

List of Research Outputs

TSUI K.W., Wong K.K.Y. and Lee P.W., Automatic systole-diastole classification of mitral valve complex from RT-3D echocardiography based on multiresolution processing, SPIE Medical Imaging: Image Processing. Florida, USA, 2013, 8669: 46-1 - 46-6.


Researcher : Ting HF

Project Title:Online Optimization Algorithms on Wireless Communication Networks
Investigator(s):Ting HF, Zhang Y
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:01/2010


Project Title:Design and analysis of distributed algorithms for vertex cover and maximal matching
Investigator(s):Ting HF
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:03/2011


Project Title:A competitive approach for analyzing data stream algorithms
Investigator(s):Ting HF
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:06/2012
Completion Date:06/2013


Project Title:ACM Conference on Bioinformatics, Computational Biology and Biomedicine 2012; Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples
Investigator(s):Ting HF
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:10/2012


Project Title:Design and analysis of algorithms for online bin packing: Old challenges and new opportunities
Investigator(s):Ting HF, Chin FYL
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:12/2012


List of Research Outputs

LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
Ting H.F. and Xiang X., Equilibria of GSP for range auction, In: J. Gudmundsson, J. Mestre, T. Viglas, 18th Annual International Conference on Computing and Combinatorics. Springer, 2012, 580-591.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Tse TH

Project Title:Towards an integrated method for program verification, testing and debugging
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2003


Project Title:27th Annual international computer software and applications conference
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:Croucher Foundation - Conference / Seminars
Start Date:09/2004


Project Title:TIRAMISU: testing context-sensitive, concurrent and middleware-based ubiquitous software
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2006


Project Title:TASTE: Testing of Adaptive Service-based sofTwarE
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:04/2011


Project Title:TASTE: Testing of Adaptive Service-based sofTwarE
Investigator(s):Tse TH, Kao CM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:10/2011


Project Title:CARISMA: a Context-sensitive Approach to Race-condItion test case Selection for Multithreaded software Applications
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:05/2012


Project Title:The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA 2012) Held in Conjunction with the 12th International Conference on Quality Software (QSIC 2012); JSCloud: toward remote execution of JavaScript code on handheld devices
Investigator(s):Tse TH
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2012


Project Title:CARISMA: a Context-sensitive Approach to Race-condItion test case Selection for Multithreaded software Applications
Investigator(s):Tse TH, Lau FCM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:11/2012


List of Research Outputs

Chen T.Y., Hu P., Li H. and Tse T.H., An enhanced flow analysis technique for detecting unreachability faults in concurrent systems, Information Sciences (ISI impact factor 3.643). 2012, 194 (7): 254−269.
Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., DESSERT: a divide-and-conquer methodology for identifying categories, choices, and choice relations for test case generation, IEEE Transactions on Software Engineering (ISI impact factor 2.588). 2012, 38 (4): 794−809.
Cheung S.C. and Tse T.H., Message from the general chairs, Proceedings of the 19th Asia-Pacific Software Engineering Conference (APSEC '12), IEEE Computer Society, Los Alamitos, CA. 2012, p. xvi.
Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917.
Li W.Y.S., Wu S., Chan W.K. and Tse T.H., JSCloud: toward remote execution of JavaScript code on handheld devices, The 2012 International Workshop on Embedded System Software Development and Quality Assurance (WESQA '12), in Proceedings of the 12th International Conference on Quality Software (QSIC '12), IEEE Computer Society, Los Alamitos, CA. 2012, 240−245.
Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81.
Tse T.H., Basics of research studies that they don't teach you at the graduate school, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012.
Tse T.H., Best Teacher Award, Faculty of Engineering, The University of Hong Kong. 2012.
Tse T.H., Design of 30th Anniversary Logo, IEEE Hong Kong Section Computer Society Chapter. 2012.
Tse T.H., Design of 50th Anniversary Logo, SAHK, Hong Kong. 2013.
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012.
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Peking University, Beijing, China. 2012.
Tse T.H., Equality to equals and unequals: a revisit of the equivalence and nonequivalence criteria in class-level testing of object-oriented software, invited lecture, Tsinghua University, Beijing, China. 2012.
Tse T.H., Logo Design, The 19th Asia-Pacific Conference on Software Engineering (APSEC 2012), IEEE Computer Society, Los Alamitos, CA. 2012.
Tse T.H., Long Service Award, The University of Hong Kong. 2013.
Tse T.H., Presentation techniques at international conferences, invited lecture, Institute of Software, Chinese Academy of Sciences, Beijing, China. 2012.
Tse T.H., Visiting Distinguished Scholar, Institute of Software, Chinese Academy of Sciences. 2012.
Tse T.H., editorial board member, Journal for Universal Computer Science. Springer, Berlin, 2013.
Tse T.H., editorial board member, Journal of Systems and Software. Elsevier, Amsterdam, 2013.
Tse T.H., editorial board member, Software Testing, Verification and Reliability. Wiley, New York, NY, 2013.
Tse T.H., editorial board member, Software: Practice and Experience. Elsevier, Amsterdam, 2013.
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896.
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231.


Researcher : WU R

List of Research Outputs

WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013.


Researcher : Wan C

List of Research Outputs

Wan C., Kao C.M. and Cheung D.W.L., Location-Sensitive Resources Recommendation in Social Tagging Systems, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.


Researcher : Wang CL

Project Title:The HKU Grid Computing Research Center
Investigator(s):Wang CL, Lau FCM
Department:Computer Science
Source(s) of Funding:The University of Hong Kong Foundation Seed Grant
Start Date:07/2003


Project Title:Adaptation and virtualization techniques for grid
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:Matching Fund for Hi-Tech Research and Development Program of China (863 Projects)
Start Date:08/2007


Project Title:Efficient Resource Allocation Support for Self-Organizing Desktop Cloud System
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:04/2011


Project Title:Transparent Runtime and Memory Coherence Support for GPU-Based Heterogeneous Many-Core Architecture
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:11/2011


Project Title:Software-Managed Coherency Protocol with Dynamic Zoning on Tiled Manycore Processor
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2012


Project Title:18th IEEE International Conference on Parallel and Distributed Systems (ICPADS2012); Mobile Edutainment with Interactive Augmented Reality using Adaptive Marker Tracking
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:12/2012


Project Title:Scalable Cloud-on-Chip Runtime Support with Software Coherence for Future 1000-Core Tiled Architectures
Investigator(s):Wang CL
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2013


List of Research Outputs

CHENG L. and Wang C.L., Network Performance Isolation for Latency-Sensitive Cloud Applications, Future Generation Computer Systems (FGCS). Elsevier, 2013, 29(4): 1073-1084.
Cheng L. and Wang C.L., vBalance: Using Interrupt Load Balance to Improve I/O Performance for SMP Virtual Machines, ACM Symposium on Cloud Computing 2012 (SoCC2012). 2012.
DI S. and Wang C.L., Dynamic Optimization of Multi-Attribute Resource Allocation in Self-Organizing Clouds, In: Ivan Stojmenovic, IEEE Transactions on Parallel and Distributed Systems. IEEE Computer Society, 2013, 24: 464-478.
DI S. and Wang C.L., Error-Tolerant Resource Allocation and Payment Minimization for Cloud System, IEEE Transactions on Parallel and Distributed Systems (TPDS). 2013, 24(6): 1097-1106.
DI S., Wang C.L. and Chen L., Ex-post Efficient Resource Allocation for Self-organizing Cloud, Journal of Computers and Electrical Engineering (CEE). Elsevier, 2013.
DI S., Kondo D. and Wang C.L., Optimization and Stabilization of Composite Service Processing in a Cloud System, IEEE/ACM International Symposium on Quality of Service (IWQoS 2013). Montreal, Canada, 2013.
DI S., Wang C.L. and Kondo D., Towards Payment-Bound Analysis in Cloud Systems with Task-Prediction Errors, International Conference on Cloud Computing (IEEE CLOUD2013). Santa Clara Marriott, CA, USA, 2013.
Lai C. and Wang C.L., Mobile Edutainment with Interactive Augmented Reality using Adaptive Marker Tracking, 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS2012). 2012.
Wang C.L., Lam K.T. and Ma K.K., A Computation Migration Approach to Elasticity of Cloud Computing, In: Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan and Mustafa Mat Deris , Network and Traffic Engineering in Emerging Distributed Computing Applications. USA, IGI Global, 2012, 145-178.
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012.


Researcher : Wang F

List of Research Outputs

Wang F., Complex Stock Trading Strategy Based on Parallel Particle Swarm Optimization , Hong Kong, 2013.


Researcher : Wang H

List of Research Outputs

Wang H., Effective Test Case Selection for Context - Aware Applications Based on Mutation Testing and Adequacy Testing from a Context Diversity Perspective, Hong Kong, 2013.


Researcher : Wang L

List of Research Outputs

Bernecker T., Cheng C.K., Cheung D.W.L., Kriegel H.P., Lee S.D., Renz M., Verhein F., Wang L. and Zuefle A., Model-based Probabilistic Frequent Itemset Mining, In: Xindong Wu, Knowledge and Information Systems Journal (KAIS). Springer, 2012.


Researcher : Wang M

List of Research Outputs

Wang M. and Chow K.P., Temporal Analysis of HFS+ and Mac OS X in Digital Investigations, The First International Conference on Digital Forensics and Investigation (ICDFI), 21-23 September 2012 . Beijing, China, 2012.


Researcher : Wang R

List of Research Outputs

Wang R., Medial Axis Simplification based on Global Geodesic Slope and Accumulated Hyperbotic Distance, Hong Kong, 2012.


Researcher : Wang WP

Project Title:7th Asian Symposium on Visualization VISJET & VISFLOOD: Software for Environmental Hydraulic Modeling and Visualization
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:11/2003


Project Title:Continuous collision detection for composite quadric models in computer graphics
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:07/2006


Project Title:Research Output Prize (Faculty of Engineering)
Investigator(s):Wang WP, Liu Y
Department:Computer Science
Source(s) of Funding:Research Output Prize (in Faculty)
Start Date:11/2007


Project Title:New Internet-based Visualization Technology for Water Quality Management
Investigator(s):Wang WP, Lee JHW
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Applied Research
Start Date:11/2007


Project Title:Computation of Centroidal Voronoi Tessellation
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2009


Project Title:Applications of Spectral Mesh Processing
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2010


Project Title:Studies on 3D Optimal Delaunay Triangulation
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2011


Project Title:SIGGRAPH 2011 Circular Arc Structures
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2011


Project Title:A New Approach to Automatic Hexahedral Mesh Generation
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2011


Project Title:Free-Form Shape Modeling Using Cyclides
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2012


Project Title:Algebraic Geometry and Geometric Modeling; All-hex meshing using singularity-restricted field
Investigator(s):Wang WP
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:01/2013


List of Research Outputs

Edwards J., Wang W.P. and Bajaj C., Surface Segmentation for Improved Remeshing, Proceedings of 21st International Meshing Roundtable, San Jose, 2012.
Guo Y.W., Liu M., Gu T.T. and Wang W.P., Improving Photo Composition Elegantly:Considering Image Similarity During Composition Optimization, "Computer Graphics Forum". 2012.
Jia X.H., Tu C.H. and Wang W.P., Topological classification of non-degenerate intersections of two ring tori, Computer Aided Geometric Design. 2013, 30(2): 181-198.
Liu Y., Li Y., Xu W.W. and Wang W.P., All-hex Meshing Using Singularity-restricted Field, ACM Transactions on Graphics (SIGGRAPH Asia 2012). 2012, 31, No. 6.
Lu L., Levy B. and Wang W.P., Centroidal Voronoi Tessellation of Line Segments and Graphs, "Computer Graphics Forum". 2012, vol. 31, no. 2: 775-784.
Lu L., Sun F., Pan H. and Wang W.P., Global Optimization of Centroidal Voronoi Tessellation with Monte Carlo Approach, IEEE Transactions on Visualization and Computer Graphics. 2012.
Pan H., Choi Y.K., Liu Y., Hu W., Du Q., Polthier C.M., Zhang C.M. and Wang W.P., Robust Modeling of Constant Mean Curvature Surfaces, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4.
WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013.
Wang W.P., Computer Aided Geometric Design. Elsevier, 2012.
Wang W.P., Computers & Graphics. Elsevier, 2012.
Wang W.P., Free-form Offset Surfaces for Architectural Design, CAD/CG’2012. 2012.
Wang W.P., IEEE Transactions on Visualization and Computer Graphics (TVCG). IEEE, 2012.
YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114.
Yan D.M., Wang W.P., Levy B. and yang L., Efficient Computation Of Clipped Voronoi Diagram For Mesh Generation, Computer-Aided Design. 2013, 45(4): 843-852.
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013.
Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462.


Researcher : Wang Y

List of Research Outputs

Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362.


Researcher : Wei LY

Project Title:Bilateral Blue Noise Sampling
Investigator(s):Wei LY
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:01/2012


Project Title:Dynamic Element Textures
Investigator(s):Wei LY
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:10/2012


List of Research Outputs

Zhou Y., Huang H., Wei L.Y. and Wang R., Point sampling with general noise spectrum, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, 31: 1-11.


Researcher : Wong KF

List of Research Outputs

Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1.


Researcher : Wong KKY

Project Title:Shape recovery of specular surfaces from unknown translations
Investigator(s):Wong KKY
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:03/2011
Completion Date:02/2013


Project Title:Shape recovery of objects with a highly reflective surface
Investigator(s):Wong KKY
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:Matching Facial Composites to Partially Occluded or Disguised Faces for Law Enforcement and Crime Investigations (ITS/301/11)
Investigator(s):Wong KKY, Chow KP, Schnieders D
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:04/2012


Project Title:Matching Facial Composites to Partially Occluded or Disguised Faces for Law Enforcement and Crime Investigations
Investigator(s):Wong KKY, Chow KP, Schnieders D
Department:Computer Science
Source(s) of Funding:Innovation and Technology Support Programme (Tier 3)
Start Date:07/2012
Completion Date:10/2013


Project Title:11th Asian Conference on Computer Vision; Self‐calibration and Motion Recovery from Silhouettes with Two Mirrors
Investigator(s):Wong KKY
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:11/2012


Project Title:Tracking and visualizing mitral valve in 3D echocardiography
Investigator(s):Wong KKY, Schnieders D
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Applied Research
Start Date:05/2013


Project Title:Reconstruction of mirror surfaces from uncalibrated camera
Investigator(s):Wong KKY
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:06/2013


List of Research Outputs

CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17.
KUANG Z., SUN J. and Wong K.K.Y., Learning Regularized, Query-Dependent Bilinear Similarities for Large Scale Image Retrieval, 1st IEEE International Workshop on Large Scale Computer Vision. Portland, USA, 2013.
Pan G., Shang L., Schnieders D. and Wong K.K.Y., Mode Seeking with an Adaptive Distance Measure, 3rd IEEE International Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). 2012, 213-222.
TSUI K.W., Wong K.K.Y. and Lee P.W., Automatic systole-diastole classification of mitral valve complex from RT-3D echocardiography based on multiresolution processing, SPIE Medical Imaging: Image Processing. Florida, USA, 2013, 8669: 46-1 - 46-6.
YUK S.C. and Wong K.K.Y., Adaptive Background Defogging with Foreground Decremental Preconditioned Conjugate Gradient, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 602-614.
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992.
Zhang H., Shao L. and Wong K.K.Y., Self-calibration and Motion Recovery from Silhouettes with Two Mirrors, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 1-12.


Researcher : Wong KY

List of Research Outputs

Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013.


Researcher : Wong WK

List of Research Outputs

Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.


Researcher : Wu C

Project Title:The 28th IEEE International Conference on Computer Communications (IEEE INFOCOM) Diagnosing Network-wide P2P Live Streaming Inefficiencies Distilling Superior Peers in Large-Scale P2P Streaming Systems
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:04/2009


Project Title:Modeling the Performance and Locality Tradeoff in P2P File Sharing System Design
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:12/2009


Project Title:Autonomous Peer-to-Peer via Auctions: Modeling and Mechanism Design
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2010


Project Title:Characterizing a Hybrid P2P + Cloud Framework for Large-Scale Internet Applications
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:A Hybrid P2P + Cloud Framework for Large-Scale Internet Applications: Modeling, Algorithm Design, and Implementation
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2012


Project Title:Dynamic Predictive Algorithms for Seamless Scaling of Social Media Applications in Multi-Provider Clouds
Investigator(s):Wu C
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:12/2012


List of Research Outputs

Deng W., Liu F., Jin H., Wu C. and Liu X., MultiGreen: Cost- Minimizing Multi-source Datacenter Power Supply with Online Control, the fourth ACM International Conference on Future Energy Systems (ACM e-Energy). 2013.
HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
LI H., Wu C., Li Z. and Lau F.C.M., Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds, IEEE INFOCOM 2013 Mini-Conference. 2013.
LI H., Wu C., Li Z. and Lau F.C.M., Socially-optimal Multi-hop Secondary Communication under Arbitrary Primary User Mechanisms, IEEE INFOCOM 2013.
Li Z. and Wu C., Space Information Flow: Multiple Unicast, the 2012 IEEE International Symposium on Information Theory (ISIT 2012). 2012.
QIU X., Yeow W., Wu C. and Lau F.C.M., Preemptive Schedul- ing of Heterogeneous MapReduce Workloads on Hybrid Clouds for Cost Minimization and QoS Guarantee, ACM/IEEE International Symposium on Quality of Service (ACM/IEEE IWQoS 2013). 2013.
Wang Z., Wu C., Sun L. and Yang S., Peer-Assisted Social Media Streaming With Social Reciprocity, IEEE Transactions on Network and Service Manage- ment. 2013, 10: 84-94.
Xiahou T., Li Z. and Wu C., Information Multicast in (Pseudo-)Planar Networks: Efficient Network Coding over Small Finite Fields, the 2013 IEEE International Symposium on Network Coding (NetCod 2013). 2013.
ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013.
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22.
Zhao C., ZHAO J., Lin X. and Wu C., Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control, IEEE INFOCOM 2013.
Zhou R., Li Z., Wu C. and Williamson C., Buddy Routing: A Routing Paradigm for NanoNets Based on Physical Layer Network Coding, the IEEE International Conference on Computer Communication Networks (ICCCN 2012). 2012.


Researcher : Wu MKE

List of Research Outputs

Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).


Researcher : XIE X

List of Research Outputs

XIE X., Cheng C.K., Yiu M.L., SUN L. and Chen J., UV-Diagram: A Voronoi Diagram for Uncertain Spatial Databases, Very Large Databases Journal (VLDBJ). 2012, 22(3): 319-344.


Researcher : XIONG H

List of Research Outputs

Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.


Researcher : Xiang X

List of Research Outputs

Ting H.F. and Xiang X., Equilibria of GSP for range auction, In: J. Gudmundsson, J. Mestre, T. Viglas, 18th Annual International Conference on Computing and Combinatorics. Springer, 2012, 580-591.


Researcher : Xiong H

List of Research Outputs

Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.


Researcher : YANG X

List of Research Outputs

MO L., Cheng C.K., LI X., Cheung D.W.L. and YANG X., Cleaning Uncertain Data for Top-k Queries, The 29th International Conference on Data Engineering (ICDE 2013). 2013.
YANG X., Cheng C.K., MO L., Kao C.M. and Cheung D.W.L., On incentive-based tagging, The 29th IEEE International Conference on Data Engineering. 2013.


Researcher : YE J

List of Research Outputs

YE J., Yan Z. and Yu Y., Fast Nonrigid 3D Retrieval Using Modal Space Transform, ACM International Conference on Multimedia Retrieval (ICMR). 2013, 121-126.


Researcher : YU D

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449.


Researcher : YUAN Z

List of Research Outputs

YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114.


Researcher : YUK SC

List of Research Outputs

YUK S.C. and Wong K.K.Y., Adaptive Background Defogging with Foreground Decremental Preconditioned Conjugate Gradient, Asian Conference on Computer Vision. Daejeon, Korea, 2012, 4: 602-614.


Researcher : Yang Y

List of Research Outputs

Li J., Yang Y. and Mamoulis N., Optimal Route Queries with Arbitrary Order Constraints, IEEE Transactions on Knowledge and Data Engineering. 2013, 25(5): 1097-1110.


Researcher : Yip CL

List of Research Outputs

Yip C.L., Wong K.Y. and Lau F.C.M., Provision of Expert Services to Convert and Implement the WTWS Software from a UNIX Computer Platform to a LINUX Computer Platform for the Hong Kong Observatory: Maintenance (2013) , The Hong Kong Observatory. 2013.


Researcher : Yiu SM

Project Title:Algorithms for Inferring k-articulated Phylogenetic Network
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:11/2009


Project Title:Indexing data structures for searching ncRNAs
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:03/2011


Project Title:The 19th Annual International Conference on Intelligent systems for Molecular Biology and 10th European Conference on Computational Biology (ISMB/ECCB 2011) Meta-IDBA: de novo assembler for mixed species in metagenomic data
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:07/2011


Project Title:Structural alignment and prediction for non-coding RNAs with triple helix structure
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:09/2011


Project Title:GPU RNA alignment tool for complex pseudoknots
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:01/2012
Completion Date:06/2013


Project Title:The First RECOMB Satellite Conference on Open Problems in Algorithmic Biology (RECOMB-AB); Algorithms for constructing k-articulated network: a more powerful classification of phylogenetic networks
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2012


Project Title:Software protection in smart meters
Investigator(s):Yiu SM
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:03/2013


List of Research Outputs

Chan P.C.K., Hui C.K. and Yiu S.M., Heap graph based software theft detection, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(1): p.101-110.
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., Privacy-Preserving Advance Power Reservation, IEEE Communications Magazine Feature Topic on Cyber Security for Smart Grid Communications. USA, 2012.
Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012.
Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., VSPN: VANET-based Secure and Privacy-preserving Navigation, IEEE Transactions on Computers. 2012, PP, Issue 99: 1.
Chin F.Y.L., Leung H.C.M. and Yiu S.M., Non-adaptive Complex Group Testing with Multiple Positive Sets, Theoretical Computer Science. Elsevier B.V., 2013, online.
Fang J., Jiang L., Yiu S.M., Chow K.P., Hui C.K., Chen L., Niu X. and Wang X., A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications (JDCTA). Korea, 2012, 6(13): 285-296.
Fang J., Jiang L., He M.F., Yiu S.M., Hui C.K., Chow K.P. and Zhou G., Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones, Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012). Vancouver BC, Canada, 2012, 1297-1309.
Hoa V., Chin F.Y.L., Hon W.K., Leung H.C.M., Sadakane K., Sung W.K. and Yiu S.M., Reconstructing k-Reticulated Phylogenetic Network from a Set of Gene Trees, ISBRA 2013. p.112 - 124.
Hou S.H., Sasaki R., Uehara T. and Yiu S.M., Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, ICT-EurAsia 2013. p.312-317.
Hsu B.Y., Wong T.K.F., Hon W.K., LIU X., Lam T.W. and Yiu S.M., A Local Structural Prediction Algorithm for RNA Triple Helix Structure, PRIB 2013. p.102-113.
Jiang Z.L., Fang J.B., Law Y.W., Lai P.K.Y., Ieong R.S.C., Kwan Y.K., Chow K.P., Hui C.K. and Yiu S.M., Maintaining hard disk integrity with digital legal professional privilege (LPP) data, IEEE Transactions on Information Forensics and Security (IEEE IFS). 2013, 8(5): p.821-828.
LIANG C., LIU X., Yiu S.M. and Lim B.L., De novo assembly and characterization of Camelina sativa transcriptome by paired-end sequencing, BMC Genomics. 2013, 14: 146.
LIU X., Cheung D.W.L., Ting H.F., Lam T.W. and Yiu S.M., LCR_Finder: A de novo low copy repeat finder for human genome, The 9th International Symposium on Bioinformatics Research and Applications (ISBRA 2013). 2013.
Liu B., Yuan J., Yiu S.M., Li Z., Xie Y., Chen Y., Shi Y., Zhang H., Li Y., Lam T.W. and Luo R., COPE: an accurate k-mer-based pair-end reads connection tool to facilitate genome assembly, Bioinformatics. 2012, 28(22): 2870-2874.
Luo R., Yuan C., Liu C.M., Lam T.W., Wong T., Yiu S.M., Li R. and Ting H.F., Efficient SNP-sensitive alignment and database-assisted SNP calling for low coverage samples, ACM International Conference on Bioinformatics, Computational Biology and Biomedicine (BCB). 2012, 163-169.
Luo R., Wong T., Zhu J., Liu C.M., Zhu X., Wu M.K.E., Lee L.K., Li H., Cheung D.W.L., Ting H.F., Yiu S.M., Peng S., Yu C., Li Y., Li R. and Lam T.W., SOAP3-dp: Fast, Accurate and Sensitive GPU-based Short Read Aligner, PLOS ONE. 2013, 8(5).
Ma C.C.C., Wong K.F., Lam T.W., Hon W., Sadakane K. and Yiu S.M., An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence, IEEE/ACM Transactions on Computational Biology and Bioinformatics. 2012, PP, Issue: 99: 1.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: A two-round binning approach for metagenomic data for low-abundance species in a noisy sample, 11th European Conference on Computational Biology (ECCB 2012). 2012.
Wang Y., Leung C.M., Yiu S.M. and Chin F.Y.L., MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample, Bioinformatics. Oxford University Press, 2012, 28(18): i356-i362.
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
Ye Y.M., Wu Q.Y., Li Y., Chow K.P., Hui C.K. and Yiu S.M., Unknown Chinese word extraction based on variety of overlapping strings, Information Processing Management. 2013, 49 (2): p.497-512.
Yiu S.M., Information Processing Letters. 2013.
Yiu S.M. and Yiu S.M., Meta-genomics assembly and binning, Harbin Institute of Technology (HIT). 2012.
Yiu S.M., Selected research problems in computer forensics, Information Security Laboratory, Tokyo Denki University. 2012.
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696.
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.


Researcher : Yu D

List of Research Outputs

HUA Q., TAN H., Wang Y., LI H., YU D., Lau F.C.M. and Wu C., Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks, 2012 International Symposium on Per- vasive Systems, Algorithms, and Networks (ISPAN). 2012.
Shi W., Hua Q., Yu D., Wang Y. and Lau F.C.M., Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks, 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012). 2012, 438-449.


Researcher : Yu J

List of Research Outputs

Yu J., Phylogenetic Tree Reconstruction with Protein Linkage, Hong Kong, 2012.


Researcher : Yu KY

List of Research Outputs

Chim T.W., Yiu S.M., Hui C.K., Li V.O.K., Mui T.W., TSANG Y.H., Kwok C.K. and Yu K.Y., Selling Power back to the Grid in a Secure and Privacy-preserving manner, The 2012 International Conference on Information and Communications Security (ICICS 2012). Hong Kong, 2012.
Yu K.Y., Efficient Schemes for Anonymous Credential with Reputation Support . Hong Kong, 2012.
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696.


Researcher : Yu Y

Project Title:Resolution Independent Visualization for Comparative Analysis of Multi-Dimensional Imaging Data
Investigator(s):Yu Y
Department:Computer Science
Source(s) of Funding:Seed Funding Programme for Basic Research
Start Date:06/2011


Project Title:Resolution Independent Full-Color Image Representations
Investigator(s):Yu Y
Department:Computer Science
Source(s) of Funding:Incentive Award for RGC GRF Fundable But Not Funded Projects
Start Date:07/2011


Project Title:An Advanced Video Fusion System for Security Investigations
Investigator(s):Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:06/2012


Project Title:An Advanced Video Fusion System for Security Investigations
Investigator(s):Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL
Department:Computer Science
Source(s) of Funding:Guangdong-Hong Kong Technology Cooperation Funding Scheme
Start Date:06/2012


Project Title:An Advanced Video Fusion System for Security Investigations
Investigator(s):Yu Y, Wang WP, Chow KP, Wong KKY, Cheung DWL
Department:Computer Science
Source(s) of Funding:Innovation and Technology Fund Internship Programme
Start Date:06/2012


Project Title:SIGGRAPH 2012; Single-View Hair Modeling for Portrait Manipulation
Investigator(s):Yu Y
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:08/2012


Project Title:Multiphase Implicit Functions for Geometric Modeling of Heterogeneous Volume Objects
Investigator(s):Yu Y
Department:Computer Science
Source(s) of Funding:General Research Fund (GRF)
Start Date:01/2013


List of Research Outputs

Chai M., Wang L., Weng Y., Yu Y., Guo B. and Zhou K., Single-View Hair Modeling for Portrait Manipulation, ACM Transactions on Graphics (special issue for SIGGRAPH 2012). 2012, Vol 31: Article 116.
Fan H., Peng Q. and Yu Y., A Robust Algorithm for Denoising Meshes with High-Resolution Details, Computational Visual Media. 2012, 75-82.
Gao S., Yu Y. and Cheng Y., Linear Subspace Learning Based on A Learned Discriminative Dictionary for Sparse Coding, International Conference on Computer Vision Theory and Applications. 2013, 530-538.
Huang H.D., Yin K., Zhao L., Qi Y., Yu Y. and Tong X., Detail-Preserving Controllable Deformation from Sparse Examples, IEEE Transactions on Visualization and Computer Graphics. 2012, Vol 18: 1215-1227.
Liao Z., Hoppe H., Forsyth D.A. and Yu Y., A Subdivision-Based Representation for Vector Image Editing, IEEE Transactions on Visualization and Computer Graphics. 2012, Vol 18: 1858-1867.
Liu Y. and Yu Y., Medical Volume Segmentation Based on Level Sets of Probabilities, International Conference on Computer Vision Theory and Applications. 2013, 387-394.
WU R., Yu Y. and Wang W.P., SCaLE: Supervised and Cascaded Laplacian Eigenmaps for Visual Object Recognition Based on Nearest Neighbors, IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2013.
Wei S. and Yu Y., Subspace Segmentation with Minimal Square Frobenius Norm Representation, 21st International Conference on Pattern Recognition. 2012, 3509-3512.
YE J., Yan Z. and Yu Y., Fast Nonrigid 3D Retrieval Using Modal Space Transform, ACM International Conference on Multimedia Retrieval (ICMR). 2013, 121-126.
YUAN Z., Yu Y. and Wang W.P., Object-Space Multiphase Implicit Functions, ACM Transactions on Graphics (SIGGRAPH 2012). 2012, Vol. 31, No. 4: Article 114.
Yu Y., Associate Editor, Computer Graphics Forum. 2013.
Yu Y., Associate Editor, The Visual Computer. 2012.
Yu Y., Data-Driven Image Color Theme Enhancement, International Conference on Digital Home, Sun Yat-sen University. 2012.
Yu Y., Editorial Board, International Journal of Software and Informatics. 2013.
Yu Y., Linear Subspace Learning Based on A Learned Discriminative Dictionary for Sparse Coding, Microsoft Research Asia. 2013.


Researcher : Yuen TH

Project Title:Leakage Resilient Public Key Cryptosystems
Investigator(s):Yuen TH, Hui CK
Department:Computer Science
Source(s) of Funding:Small Project Funding
Start Date:01/2012
Completion Date:03/2013


Project Title:Eurocrypt 2012 Identity-Based Encryption Resilient to Continual Auxiliary Leakage
Investigator(s):Yuen TH
Department:Computer Science
Source(s) of Funding:URC/CRCG - Conference Support for Teaching Staff
Start Date:04/2012


List of Research Outputs

Au M.H., Liu J.K., Susilo W. and Yuen T.H., Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction, Theoretical Computer Science. Elsevier, 2013, 469: 1-14.
Wang Y., Au M.H., Liu J.K., Yuen T.H. and Susilo W., Threshold-Oriented Optimistic Fair Exchange, In: Javier Lopez, Xinyi Huang, and Ravi Sandhu, The 7th International Conference on Network and System Security (NSS 2013). Springer Berlin Heidelberg, 2013, 7873: 424-438.
Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
Yu K.Y., Yuen T.H., Chow S.M., Yiu S.M. and Hui C.K., PE(AR)^2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation, In: Sara Foresti, Moti Yung, and Fabio Martinelli, The 17th European Symposium on Research in Computer Security (ESORICS 2012). Springer Berlin Heidelberg, 2012, 7459: 679-696.
Yuen T.H., Liu J.K., Au M.H., Susilo W. and Zhou J., Efficient Linkable and/or Threshold Ring Signature without Random Oracles, In: Chris Mitchell, The Computer Journal. Oxford University Press, 2012, 56: 407-421.
Yuen T.H., Liu J.K., Huang X., Au M.H., Susilo W. and Zhou J., Forward Secure Attribute-Based Signature, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 167-177.
Yuen T.H., Yiu S.M. and Hui C.K., Fully Leakage-Resilient Signatures with Auxiliary Inputs, In: Willy Susilo , Yi Mu and Jennifer Seberry , Information Security and Privacy 17th Australasian Conference, ACISP 2012. Springer, 7372: 294-307.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.


Researcher : ZHAI K

List of Research Outputs

Mei L.J., ZHAI K., Jiang B., Chan W.K. and Tse T.H., Preemptive regression test scheduling strategies: a new testing approach to thriving on the volatile service environments, Proceedings of the 36th Annual International Computer Software and Applications Conference (COMPSAC '12), IEEE Computer Society, Los Alamitos, CA (acceptance rate: 18%). 2012, 72−81.
Zhai K., Xu B., Chan W.K. and Tse T.H., CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA '12), ACM, New York, NY. 2012, 221−231.


Researcher : ZHANG C

List of Research Outputs

Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.


Researcher : ZHANG L

List of Research Outputs

ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013.
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803.
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012.


Researcher : ZHANG P

List of Research Outputs

Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012.
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012.
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012.


Researcher : ZHANG Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : ZHANG Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : ZHANG Z

List of Research Outputs

Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917.
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896.
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22.


Researcher : ZHAO J

List of Research Outputs

Zhao C., ZHAO J., Lin X. and Wu C., Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control, IEEE INFOCOM 2013.


Researcher : ZHU X

List of Research Outputs

CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17.
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013.
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992.


Researcher : ZHU X

List of Research Outputs

CHEN Z., Wong K.K.Y., Matsushita Y. and ZHU X., Depth from Refraction Using a Transparent Medium with Unknown Pose and Refractive Index, International Jounral of Computer Vision. 2013, 102(1-3): 3-17.
ZHU X., Ger Y., Wang W.P. and Fetcher T., Model Selection And Estimation Of Multi-compartment Models In Diffusion Mri With A Rician Noise Model,, Proceedings Of The 23rd Biennial International Conference On Information Processing In Medical Imaging (IPMI2013). 2013.
ZHU X. and Wong K.K.Y., Single-Frame Hand Gesture Recognition Using Color and Depth Kernel Descriptors, International Conference on Pattern Recognition. Tsukuba Science City, Japan, 2012, 2989-2992.


Researcher : Zhang C

List of Research Outputs

Xiong H., Yuen T.H., Zhang C., He Y.J. and Yiu S.M., Attribute Specified Identity-Based Encryption, In: Robert H. Deng and Tao Feng, The 9th International Conference on Information Security Practice and Experience (ISPEC 2013). Springer Berlin Heidelberg, 2013, 7863: 60-74.
Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
Xiong H., Yuen T.H., Zhang C., Yiu S.M. and He Y.J., Leakage-Resilient Certificateless Public Key Encryption, The first ACM workshop on Asia public-key cryptography (AsiaPKC 2013). New York, NY, USA, ACM, 2013, 13-22.
ZHANG C., HAN G. and Wang C.L., GPU-TLS: An Efficient Runtime for Speculative Loop Parallelization on GPUs, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid2013). Delft, The Netherlands, 2012.
Zhang C., Yuen T.H., Xiong H., Chow S.M., Yiu S.M. and He Y.J., Multi-key Leakage-Resilient Threshold Cryptography, The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). New York, NY, USA, ACM, 2013, 61-70.
Zhang C., Yuen T.H., XIONG H., Cbow S.S.M. and Yiu S.M., Multi-key leakage-resilient threshold cryptography, ASIACCS 2013. p.61-70.


Researcher : Zhang L

List of Research Outputs

ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013.
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803.
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012.


Researcher : Zhang L

List of Research Outputs

ZHANG L., Wu C., Li Z., Guo C., Chen M. and Lau F.C.M., Move My Data to the Cloud: an Online Cost-Minimizing Approach, IEEE INFOCOM 2013 Mini-Conference. 2013.
Zhang L. and Chan K.P., Adaptive Bayesian HMM for Fully Unsupervised Chinese Part-of-Speech Induction, ACM Transaction on Asian Language Information Processing. 2012, 11: 10.1145/2334801.2334803.
Zhang L., Move My Data to the Cloud: an Online Cost-Minimizing Approach . Hong Kong, 2012.


Researcher : Zhang P

List of Research Outputs

Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012.
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012.
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012.


Researcher : Zhang P

List of Research Outputs

Xiong H., Zhang C., Yuen T.H., Zhang P., Yiu S.M. and Qing S., Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model, In: Tat Wing Chim and Tsz Hon Yuen, The 14th International Conference on Information and Communications Security (ICICS 2012). Springer Berlin Heidelberg, 2012, 7618: 119-130.
ZHANG P., Cheng C.K., Mamoulis N., Renz M., Zuefle A., TANG Y. and Emrich T., Voronoi-based nearest neighbor search for multi-dimensional uncertain databases, 2013 IEEE 29th International Conference on Data Engineering (ICDE). 2013, 158-169.
Zhang P., He Y. and Hui C.K., Cloud based Privacy Preserving Data Mining with Decision Tree, (Best Student Paper Award) International Conference on Data Management Technologies and Applications (DATA), 25-27 Jul 2012. Rome, Italy, 2012.
Zhang P., Secure Multi-Party Protocol using Modern Crytographic Technique and Tamper Resistant Hardware, 2012.
Zhang P., Voronoi-based Nearest Neighbor Search for Multi-Dimensional Uncertain Databases, Hong Kong, 2012.


Researcher : Zhang W

List of Research Outputs

Zhang W., Adaptive Live VM Migration over WAN: Modeling and Implementation. Hong Kong, 2013.


Researcher : Zhang Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Zhang Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Zhang Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Zhang Y

List of Research Outputs

JIN Y., Cheng C.K., Kao C.M., Lam K.Y. and ZHANG Y., A filter-based protocol for continuous queries over imprecise location data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Jin Y., Cheng C.K., Kao C.M., Lam K.Y. and Zhang Y., A Filter-based Protocol for Continuous Queries over Imprecise Location Data, 21st ACM Conf. on Information and Knowledge Management (ACM CIKM 2012). 2012.
Ma R., Han X., Ting H.F., Ye D. and Zhang Y., A note on a selfish bin packing problem, Journal of Global Optimization. 2013, 56: 1457-1462.
ZHANG Y., Lo E. and Kao C.M., On the Use of Bug and Predicate Signatures for Statistical Debugging, The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). 2013.
ZHANG Y. and Cheng C.K., Probabilistic Filters: A Stream Protocol for Continuous Probabilistic Queries, Information Systems (IS). Elsevier, 2012, 38(1): 132-154.
Zhang Y., Xue C.J., Wong D.S., Mamoulis N. and Yiu S.M., Acceleration of Composite Order Bilinear Pairing on Graphics Hardware, Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. 341-348.
Zhang Y., Chin F.Y.L. and Ting H.F., Constant-Competitive Tree Node Assignment, Theoretical Computer Science. 2013.
Zhang Y., Wong W.K., Yiu S.M., Mamoulis N. and Cheung D.W.L., Lightweight Privacy-Preserving Peer-to-Peer Data Integration, Proceedings of the VLDB Endowment. 2013, 6(3): 157-168.
Zhang Y., Lo E. and Kao C.M., Multiple-Bug Localization Using Simple and Complex Predicates, The 19th Asia-Pacific Software Engineering Conference. 2012.
Zhang Y., Chin F.Y.L., Ting H.F., Han X., Poon C.K., Tsin Y.H. and Ye D.S., Online Algorithms for 1-Space Bounded 2-Dimensional Bin Packing and Square Packing, COCOON 2013. LNCS 7936: 506-517.
Zhang Y., Chin F.Y.L. and Ting H.F., Online Pricing for Bundles of Multiple Items, Journal of Global Optimization. Springer US, 2013.
Zhang Y., Chin F.Y.L., Ting H.F. and Han X., Online algorithms for 1-space bounded multi dimensional bin packing and hypercube packing, Journal of Combinatorial Optimization. 2012, 26 (2): 223-236.


Researcher : Zhang Z

List of Research Outputs

Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917.
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896.
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22.


Researcher : Zhang Z

List of Research Outputs

Jiang B., Zhang Z., Chan W.K., Tse T.H. and Chen T.Y., How well does test case prioritization integrate with statistical fault localization?, Information and Software Technology (ISI impact factor 1.522). 2012, 54 (7): 739−758.
Jiang B., Zhai K., Chan W.K., Tse T.H. and Zhang Z., On the adoption of MC/DC and control-flow adequacy for a tight integration of program testing and statistical fault localization, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 897−917.
Xu J., Zhang Z., Chan W.K., Tse T.H. and Li S., A general noise-reduction framework for fault localization of Java programs, Information and Software Technology (ISI impact factor 1.522). 2013, 55 (5): 880−896.
ZHANG Z., Wu C. and Cheung D.W.L., A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice, ACM SIGMETRICS Performance Evaluation Review, Special Issue on Cloud Computing. 2013, 40: 13-22.


Researcher : Zheng W

List of Research Outputs

Zheng W., Bo P., Liu Y. and Wang W.P., Fast B-spline Curve Fitting by L-BFGS, Computer Aided Geometric Design. 2012, vol. 29, no. 7: 448-462.


Researcher : Zhou H

List of Research Outputs

Zhou H., An Efficient Algorithm for Face Sketch Synthesis Using Markov Weight Fields and Cascade Decomposition Method, Hong Kong, 2012.


-- End of Listing --