Wang Yue

Results: 67



#Item
1SPATE: Small-group PKI-less Authenticated Trust Establishment ∗ Yue-Hsun Lin† Ahren Studer§ Hsu-Chun Hsiao§ Jonathan M. McCune§ King-Hang Wang† Maxwell Krohn§ Phen-Lan Lin◦ Adrian Perrig§ Hung-Min Sun† Bo-

SPATE: Small-group PKI-less Authenticated Trust Establishment ∗ Yue-Hsun Lin† Ahren Studer§ Hsu-Chun Hsiao§ Jonathan M. McCune§ King-Hang Wang† Maxwell Krohn§ Phen-Lan Lin◦ Adrian Perrig§ Hung-Min Sun† Bo-

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:39
2Delay Analysis of Structural Real-Time Workload Nan Guan1,2 , Yue Tang1 , Yang Wang1 and Wang Yi2 1 2  Northeastern University, China

Delay Analysis of Structural Real-Time Workload Nan Guan1,2 , Yue Tang1 , Yang Wang1 and Wang Yi2 1 2 Northeastern University, China

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2015-04-24 08:42:13
    3CAUC’s Aerial Robot for IARC 2014 WANG Yao, YUE Fengfa, ZENG Zhengchao, JIN Yabo, ZHANG Yunhao, ZHAO Long, SHI Yongzheng, JIANG Nan, HUO Lu Civil Aviation University of China ABSTRACT To complete the 7th mission of the

    CAUC’s Aerial Robot for IARC 2014 WANG Yao, YUE Fengfa, ZENG Zhengchao, JIN Yabo, ZHANG Yunhao, ZHAO Long, SHI Yongzheng, JIANG Nan, HUO Lu Civil Aviation University of China ABSTRACT To complete the 7th mission of the

    Add to Reading List

    Source URL: www.aerialroboticscompetition.org

    Language: English - Date: 2018-04-29 02:00:38
      4Code Completion with Neural Attention and Pointer Networks Jian Li, Yue Wang, Irwin King, and Michael R. Lyu arXiv:1711.09573v1 [cs.CL] 27 NovDepartment of Computer Science and Engineering

      Code Completion with Neural Attention and Pointer Networks Jian Li, Yue Wang, Irwin King, and Michael R. Lyu arXiv:1711.09573v1 [cs.CL] 27 NovDepartment of Computer Science and Engineering

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2017-11-27 20:57:21
        5Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Joseph S.B. Mitchell∗

        Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Joseph S.B. Mitchell∗

        Add to Reading List

        Source URL: www.ams.sunysb.edu

        Language: English - Date: 2006-07-20 21:12:11
          6Demo Abstract: Real-time Heterogeneous Edge Computing System for Social Sensing Applications Yue Zhang, Nathan Vance, and Dong Wang Department of Computer Science and Engineering University of Notre Dame

          Demo Abstract: Real-time Heterogeneous Edge Computing System for Social Sensing Applications Yue Zhang, Nathan Vance, and Dong Wang Department of Computer Science and Engineering University of Notre Dame

          Add to Reading List

          Source URL: 2018.rtas.org

          Language: English - Date: 2018-05-06 16:29:45
            7Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Zhongjie Wang Yue Cao

            Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Zhongjie Wang Yue Cao

            Add to Reading List

            Source URL: www.cs.ucr.edu

            Language: English - Date: 2017-10-29 00:55:15
              8A Real-Time and Non-Cooperative Task Allocation Framework for Social Sensing Applications in Edge Computing Systems Daniel (Yue) Zhang, Yue Ma, Yang Zhang, Suwen Lin, X. Sharon Hu, and Dong Wang Department of Computer Sc

              A Real-Time and Non-Cooperative Task Allocation Framework for Social Sensing Applications in Edge Computing Systems Daniel (Yue) Zhang, Yue Ma, Yang Zhang, Suwen Lin, X. Sharon Hu, and Dong Wang Department of Computer Sc

              Add to Reading List

              Source URL: 2018.rtas.org

              Language: English - Date: 2018-05-06 16:24:35
                9Lifting the Haze off the Cloud: A Consumer-Centric Market for Database Computation in the Cloud Yue Wang Alexandra Meliou

                Lifting the Haze off the Cloud: A Consumer-Centric Market for Database Computation in the Cloud Yue Wang Alexandra Meliou

                Add to Reading List

                Source URL: www.vldb.org

                - Date: 2016-12-01 18:32:50
                  10Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel† University of California, Riverside, † US Army Research Laborato

                  Off-Path TCP Exploits: Global Rate Limit Considered Dangerous Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel† University of California, Riverside, † US Army Research Laborato

                  Add to Reading List

                  Source URL: www.cs.ucr.edu

                  - Date: 2016-08-09 00:20:11