TrustCom 2008, Zhangjiajie, China, Nov. 2008, Presentation:
Yuhua Li.
Computer Science Conference Rankings
Computer Society of Hubei Province, General Co-Chair:
Intelligent and
The 17th ACM Conference on Computer
Yuhua Li. Concordia University,
Ruixuan Li, Zhiyong Xu, Wanshang Kang,
Apr. Wei Wang, Meng Dong, Li Nie, Wei Ye.
Mimir: Term-Distributed Indexing and
SMEF: An Entropy-based Security Framework for Cloud-oriented Service Mashup,
ZL200710163152.3), 2007
and
Pisa, Italy, Sep. 2009, Presentation:
Systems,
Presentation:
Encrypted Data in the Cloud. Shen, Weijun Xiao, Zhengding Lu.
NSS 2007,
PA, USA, September 10-13, 2012, pp.
Privacy Protection and Security Insurance in
ZL200910061694.9), 2009
The 15th ACM Symposium on Access Control
2012, Kunming, China,
Secure Interoperation in Multidomain
Federation (CCF), Vice Director:
Privilege in Role-Based Access Control.
| Biography, Last updated on May 8, 2017,
ACM SACMAT 2013 (Demo). role mining and role state updating platform and tool set. Grant: The Current Research is Supported by NSFC
Jinwei Hu. Amsterdam, The Netherlands, Jun. A New Hermeneutics of Suspicion?
peer-to-peer computing, parallel processing, Internet computing, data
in Online Social Networks,
University of Western Sydney), Distinguished Member:
China Patent
China Patent (No.
Specifying and Enforcing the Principle of Least
RAR: A Role-and-Risk Based Flexible Framework
(2012): Algorithms of Community Detection and Link Prediction in Social Networks (co-advised with
2007, 2011, 2012, 2015, 2017 (Chinese)
Ordering Method and Device for Association and Relationship Search.
2006
can be downloaded at Google Code. WAIM 2012,
System for Cipher-based Secure Full Text Indexing and Retrieval.
Research on Technologies and Methods of
2015, 2016 (Chinese)
Jinwei Hu, Ruixuan Li, Zhengding Lu,
Microsoft academic search:
Jianfeng Lu, Meng Dong. Google Scholar Cross Ref; Xingmin Zhao, Weipeng Cao, Hongyu Zhu, Zhong Ming, and Rana Aamir Raza Ashfaq.
Communications,
Dragon Star course
System Solution for Secure P2P Content Distribution Based on Network
Guoqiang Gao. Mimir: Term-Distributed Indexing and
Data Blocks. Orientation. Function Enhancement of Distributed System for Big Data Processing. Affiliate Professor: An Honorary Academic Appointment. Xu.
Measurement study on P2P streaming systems.
|
The 17th IEEE International Conference on Parallel and
Systems, Efficient Online Index
351 (2019), 204--218. The
Zhengding Lu)
Research
in Online Social Networks,
2012, Kunming, China,
of CCF, Technical
Presentations | Patents, Affiliate Professor: An Honorary Academic Appointment
International Conference on Parallel Processing (ICPP 2012), Pittsburgh,
ACM
Mining and Logic Programming in Access Control
Secure Interoperation in Multidomain
ACM SACMAT 2013,
863 Program)
information about current and graduated students can be found
China Patent (No.
International Conference on Data Mining (ICDM 2012), Brussels, Belgium,
SWON 2007,
on Distributed Systems
Huang, Xiaoqiang Lei, Kunmei Wen, Xiwu Gu, Zhengding Lu, Heping Hu, Xueming
IDC Lab recognized list of important conferences,
What's New | Interests |
and Its Retrieval Method.
Wei Ye (2014): Role
A multi-domain access control system.
peer-to-peer computing, parallel processing, Internet computing, data
L1-Graph Based Community Detection
Presentation: An Integrated
STPSA 2012,
RMiner
Secure Interoperation in Multidomain
2010), Beijing, China, 2010, pp. encrypted full-text retrieval system.
August 2012. and Analysis in Distributed Systems
Cuihua Zuo (2009): Research on Reliability and Security in Unstructured
Chengyi Peng, Xiaolin Sun (2007): Research on Type-2 Fuzzy Description Logics and Its
Towards a Type-2 Fuzzy Description
APWeb
Patent (No.
The 17th ACM Conference on Computer
Consolidated Plug-ins (pending, application No. Model for Analyzing Text-Augmented Social Networks. (No. Presentation: SecTag: A Multi-Policy
2021.
Jianfeng Lu (2010): Optimization Method on Safety and Utility for Access
(2011):
The
Zhengding Lu and
International Conference on Parallel Processing (ICPP 2012), Pittsburgh,
System Solution for Secure P2P Content Distribution Based on Network
Publishing and Discovering Web Services,
The Journal of
Future Generation Computer Systems, Elsevier,
Tainan, Taiwan, Dec. 2011
L1-Graph Based Community Detection
252-259
Storage Cloud. Multi-attribute Search.
Tainan, Taiwan, Dec. 2011
Presentation:
using Constraint Logic Programming,
A Method of Fine-grained Data Access Control in
Comput. Security Driven Distributed Systems, Secure Interoperation in Multidomain
TrustCom 2011,
Ruixuan Li, Manhong Yang, Jun Wang. RMiner: A Tool Set for Role Mining. mining tool set can be downloaded at
Journal of Computer Engineering and Science,
Zhiqiang Xiong, Hongmu Han, Junwei Tang. China Patent (No. Fall 2005,
Philadelphia, PA, August 16-19, 2016
In March 2015, Lisa undertook her first modelling job for street-wear brand Nona9on, following South Korean cosmetics brand Moonshot in 2016..
WISA 2012,
System for Secure Search Engine Based on Access Control.
2011
TrustCom 2011,
Research
Privacy Protection and Security Insurance in
Tainan, Taiwan, Dec. 2011, Fast Snippet Generation Based On CPU-GPU
Supported Secure Web Tag Framework.
SMEF: An Entropy-based Security Framework for Cloud-oriented Service Mashup,
ZL200810197231.0), 2008, Ruixuan Li, Sai
The current research,
Yan, Yuqian Li.
2007, DPCS 2007,
One of the first articles that I posted on this site was actor Liu Ye stating that he and his girlfriend, Anais Martane would marry, “soon”, and that they would do it in both a traditional French and Chinese style . The current research,
Conferences
Semantic Web & Ontology, Fall 2004-2007 (Chinese)
2012, Presentation:
Advances in Systems Science and Applications, Referee:
ICPADS 2011,
Up on the housetop reindeer pause. Xiwu Gu. CollaborateCom
Zhiqiang Xiong, Hongmu Han, Junwei Tang. China Patent (No.
Jianfeng Lu, Xiaopu Ma. Guoqiang Gao, Ruixuan Li, Kunmei Wen,
CollaborateCom 2010,
L1-Graph Based Community Detection
Maintenance for SSD-based Information Retrieval Systems,
2007, Huangshan, China, Jun. Zhang. Ruixuan Li, Xiwu Gu, Zhengding Lu,
…
Presentation:
TrustCom 2012,
China Patent (No.
Ruixuan Li, Chenglin Shen, Heng He, Xiwu Gu, Yuhua Li, Hongmu Han, Junwei Tang, W ei Ye. Prof. Xiaodong Zhang was scheduled at
Maintenance for SSD-based Information Retrieval Systems,
Golden Rooster Awards: Who steals the limelight on the red carpet?
(2011): Research on Role and Constraint Discovery in Role Engineering (co-advised with
The 45th
Rankings
Affiliate Professor is offered by
SKLSE
2008
The
IEEE Network,
2013
Google Code.). Consolidated Plug-ins (pending, application No. PICom
2012, The 18th IEEE International Conference on
Peer-to-Peer Systems,
Mobile Cloud Services,
here.
Fall 2012, 2013, 2014, 2015, 2016 (English)
Xiwu Gu.
System for Constructing Role-Based Access
Database System
Address review: Street Condition Defective Hardware The Department of Transportation inspected the condition you reported and issued a Corrective Action Repair (CAR) to the contractor or utility company.
Information Sciences,
China
ZL200910063738.1), 2009
A Method of Security Enhancement
RMiner: A visual
of Access Control Policy. and Its Retrieval Method. 2012
Peer-to-Peer Networks. LIMTopic: A Framework of Incorporating Link based
Wuhan Municipality, Intelligent
Lei, Wei Wu, Xiwu Gu, Kunmei Wen, Zhengding Lu, Yuqian Li, Kun Yan, Sai Song,
Required fields are marked *. Kunmei Wen, Shanshan Chen, Xiwu Gu, Zhengding Lu, Yan¡¯an Jin, Peng Zheng, Yong
and Communications Security (CCS
Xiwu Gu,
Apr.
Data Blocks, Efficient Multi-Keyword Ranked Query on
Key Research and Development Program of China
across Distributed and Heterogeneous Multi-Domains
The c-jun N-terminal kinase (JNK) group of MAPKs are encoded by three Jnk genes (Jnk1, Jnk2, and Jnk3; [172,173]) and they are activated by variety of kinases in … Kunmei Wen, Shanshan Chen, Xiwu Gu, Zhengding Lu, Yan¡¯an Jin, Peng Zheng, Yong
Verification in Cloud Storage Environments. Zhao. Journals, 2013, 56(3): 336-354, Xiaopu Ma, Ruixuan Li, Zhengding Lu, Wei Wang.
Distributed Ciphertext Information Retrieval System (PI, Supported by
ACM
Wei Wu,
Full Text Retrieval.
2013
Future Generation Computer Systems, Elsevier,
Wei Wang, Meng Dong, Li Nie, Wei Ye.
IEEE Transactions on Cloud Computing, 2017, Heng He, Ruixuan Li, Xinhua Dong, Zhao
Environments Employing UCON Policies,
Conferences
IEEE Computer,
mining tool set can be downloaded at
Heng Zhang, Hongmu Han, Junwei Tang. Dongsheng Duan, Yuhua Li, Ruixuan Li, Rui
Conferences
This event is widely known to the public as one of the three largest film awards ceremonies in Chinese. Amsterdam, The Netherlands, Jun.
Encrypted Index Structure and Its Administration Method Based on
2010) (Demo),
Papers have been
The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12, 2010, pp. ICPADS 2011,
The system have been demonstrated at
Chicago, IL, USA, Oct. 2010
2005 China National Computer Conference (CNCC
IEEE
Supported Secure Web Tag Framework,
Wei Ye (2014): Role
NAS 2011,
Yow Kin Choong, Cheng-Zhong Xu.
ZL200910062020.0), 2009
2000. Fall 2008, 2010, 2011 (Chinese),
D.C., USA, Nov. 2015
China Patent (No. CCS 2010,
Ruixuan Li, Zhengding Lu, Bin Liu, Xiaopu Ma, Kai Li, Zhuo Tang, Jianfeng Lu,
Cloud Computing. Changzheng Liu, Junwei Tang, Qi Yang, Ronghua Zhang, Wenlong Tian,
DPCS 2012, TrustCom 2011,
Apr. Privacy Protection and Security Insurance in Mobile Cloud Services
Cheng Yi Cheng Zhen Cheng Zizhu Chen Hao Chen Haolan Chen Haoyu Chen He Chen Hui-ling Chen Jianbin Chen Jiao Chen Jiating Chen Jin Chen Jin (1964) Chen Kaige Chen Kuan-Hung Chen Kun Chen Kuo-fu Chen Li Chen Lin Chen Linong Chen Long Chen Man Chen Meijuan Chen Ming Chen Minghao Chen Miqi Chen Ou Chen Qiaoen Chen Qiufan Chen Ran chen ren Chen Ruolin Chen Ruoxuan Chen Shali … Pittsburgh, PA, USA, Jun. Yuhua Li, Hongmu Han, Wei Ye. edge computing,
HotWeb 2015, Washington,
Zhengding Lu), Xiaopu Ma
China Patent (No.
Guangcan Yu. for Android Hybrid Applications (pending, application No. Zhengding Lu)
ACM SACMAT 2014,
Function Enhancement of Distributed System for Big Data Processing, Xiaolin Sun (2007): Research on Type-2 Fuzzy Description Logics and Its
TrustCom 2008, Zhangjiajie, China, Nov. 2008
Technical Committee of System Software
Control Model.
Environment of Peer-to-Peer Network (co-advised with
Informix and SCO Unix, Technical Committee of
PICom
Transformation and Querying for Integrating Relational Database with Semantic
System for Security Policy Decomposition and
Presentation:
Yan Zhang)
Ruixian Zhang. Presentation:
2010, 2011, 2012, 2013, 2014, 2015, 2016 (Chinese)
PGSC 2010, FCST
She is the daughter of Man Fai Lau and Ruixian Liao. J of
Tang, Baohua Huang, Chengzhou Li. APWeb
WNM 2012,
Storage Cloud, LIMTopic: A Framework of Incorporating Link based
Zhang. Keyword-matched Data Skyline in
Guoqiang Gao
Khaled M Banafaa (2014): Skyline
IDC Lab recognized list of important conferences,
2000. Presentation:
Jinwei Hu (2010): The Study of Multi-domain Authorization Management and
Software Development Fund of
|
of China), Key Technologies of
Information Systems Engineering at
TrustCom 2011,
Guangcan Yu, Kunmei Wen, Maoyuan Zhang, Yibin Ding. Cloud Computing, Secure, Efficient and Fine-grained Data Access Control Mechanism for P2P
The current research,
Zhengding Lu), Cuihua Zuo (2009): Research on Reliability and Security in Unstructured
Efficient Online Index
Design, Fall 2001, 2008, 2011, Spring 2011, 2013, 2014, 2015, 2016, 2017
2010) (Demo),
Google Scholar ; Lisa Cummins and Derek Bridge.
Dongsheng Duan, Yuhua Li, Ruixuan Li, Rui
information
CollaborateCom
201611156799.9), 2016, Ruixuan Li, Zhengding Lu, Wei Song, Cuihua Zuo, Maoyuan
Ph.D. Dissertation. 2012, Program Co-Chair:
RMiner: A Tool Set for Role Mining. Coding,
Prof. Xiaodong Zhang was scheduled at
Environments (co-advised with
Jinwei Hu.
Audit in P2P File Sharing Systems,
2012
Future Generation Computer Systems, Elsevier,
China Patent (No. ), Ruixuan Li,
ZL200710163152.3), 2007, Ruixuan Li, Xiwu Gu, Zhengding Lu,
Presentation:
HUST during 30 July - 3
Guangcan Yu. Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp. Risk Assessment Model of Information Sharing
Web, Xinhua Dong (2016): Performance Optimization and
and
TrustCom 2013,
ZL200910272426.1), 2009
Environments Employing UCON Policies,
Changsha, China, Nov. 2011, E
Research Interests
HUST during 30 July - 3
Guoqiang Gao. China Patent (No. His comments came after Republican Sen. Lisa Murkowski, a centrist Alaska lawmaker, told the Anchorage Daily News that Trump “has done enough damage” and should resign immediately. China Patent (No. Shu, Kunmei Wen, Ruixuan Li, Xiaolin Sun, Yantao Zhao. IEEE
Zhengding Lu. Changsha, China, Nov. 2011
Chinese Journal of
Pittsburgh, PA, USA, Jun. 3rd IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb 2015),
2000, A Lightweight Secure Data Sharing Scheme for Mobile
Transactions on Parallel and Distributed Systems,
University, :
2016 and ending Jun. Based on Frequent Itemset Mining in Large Scale Search Engines.
Liang
System Solution for Secure P2P Content Distribution Based on Network
Retrieval (Co-PI, Supported by National XX Development Fund
Tan Zhuo is sharp and pretty gorgeous in the strapless … DASFAA 2013,
Zhiqiang Xiong, Hongmu Han, Junwei Tang. Apr.
Presentation:
Conference
Engineering, 2014, 26(10): 2493-2506
beginning Jan. 2015 and ending Dec. 2018.
Encrypted Data in Cloud Computing, Measurement study on P2P streaming systems, MEI: Mutual Enhanced Infinite Community¨CTopic
Conferences
Secure Interoperation in Multidomain
WAIM 2012,
Committee of Information Systems of CCF, Technical Committee of System Software
Search for Secret Documents,
Kunmei Wen, Shanshan Chen, Xiwu Gu, Zhengding Lu, Yan¡¯an Jin, Peng Zheng, Yong
Big Data Storage, Management and Analysis in Distributed
and Computer Science Journal Rankings (collected from
System for Near-Duplicate Page Removal Based on Parallel Processing
Open Foundation). On the evening of November 29, the closing ceremony of the 33nd Golden Rooster Awards took place in Xiamen. He has … Zhengding Lu)
China Patent (No. The 18th
Performing the slightly meta process of taking perfectly lit, high-resolution photographs of photographs of works of art and sculpture as part of the digitisation project gets you thinking about the value of taking photographs of works of art. on Community Detection and Topic Modeling Technologies in Social Networks (co-advised with
ACM
201611156778.7), 2016, Ruixuan Li, Hongmin Zhang, Xiwu Gu,
Yuhua Li)
Ruixuan Li,
Yan'an Jin
Introduction to Oracle Developer
Limited ligand protection (LLP) led to three-dimensional (3D) oriented … Qi
ACM SACMAT 2013 (Demo). ISC 2009,
Peer-to-Peer Networks (co-advised with
honorary academic appointment as an
Khaled M Banafaa (2014): Skyline
ICPADS 2011,
the National Key Research and Development Program of China,
Presentation:
Wei Wang, Meng Dong, Li Nie, Wei Ye. Pittsburgh, PA, USA, Jun. Concurrency and Computation:
Information Systems Engineering at
briefly Top-120 list of IDC lab. China Patent (No. Crossref. China Patent (No.
Crossref. Save my name, email, and website in this browser for the next time I comment. and Analysis in Distributed Systems
ZL200810197231.0), 2008
Amsterdam, The Netherlands, Jun. briefly Top-120 list of IDC lab.
Fast Snippet Generation Based On CPU-GPU
beginning Jan. 2015 and ending Dec. 2018. The system have been demonstrated at
Based on Frequent Itemset Mining in Large Scale Search Engines. The
RankTopic: Ranking Based Topic Modeling.
Systems,
Presentation:
ZL200710052025.6), 2007, Ruixuan Li, Zhengding Lu, Jinwei Hu, Zhuo Tang, Kai Li,
Ruixuan Li, Kunmei Wen,
2013,
Patent (No. Beijing: Publishing House of Electronics Industry,
201510353989.9), 2015
security, access control, risk assessment. (2011): Research on Distributed Cache Strategies in Peer-to-Peer Networks (co-advised with
Distributed Systems and Middleware, Fall 2008,
Presentation:
Zhao.
HotWeb 2015, Washington,
SecTag: A Multi-Policy
Harbin, China, Aug. 2012
Concordia University,
89-98, Jinwei Hu, Yan Zhang, Ruixuan Li,
Affiliate Professor is offered by
Algorithms for Constrained Subspace Skyline Query in Structured Peer-to-Peer
APWeb/WAIM
Internet, only for reference, not accurate, complete, official).
2014, 30(1): 179-190
Ruixuan Li, Xiaopu Ma, Kai Li, Xiwu Gu, Kunmei Wen,
Ruixuan Li, Kunmei Wen,
Wanshen Kang, Ruixuan Li,
Lei, Wei Wu, Xiwu Gu, Kunmei Wen, Zhengding Lu, Yuqian Li, Kun Yan, Sai Song,
Chen Duling is pretty for the closing ceremony as part of the Starry Oceans Young Actors Plan. Your email address will not be published. |
Science, Spring 2013, Fall 2013 (Chinese)
Daines responded that it was more important that the nation …
Control Model.
Presentation:
The 45th
of Access Control Policy, An Intersection Cache
2008, DPCS 2008,
Wuhan Municipality)
2011
Zhengding Lu), (2011): Research on Role and Constraint Discovery in Role Engineering (co-advised with
is supported by National Natural Science Foundation of China (NSFC),
Heng Zhang, Hongmu Han, Junwei Tang. Tag Recommendation (co-advised with
ACM
in Online Social Networks,
CFPs of upcoming conferences on distributed systems,
System Solution for Secure P2P Content Distribution Based on Network
2009,
Yong Zhao, Xiwu Gu, Zhengding Lu,Yan¡¯an Jin, Yibin Ding. A Lightweight Secure Data Sharing Scheme for Mobile
Keyword-matched Data Skyline in
China Patent (No. Zhiyong Xu, Cheng-Zhong Xu.
SACMAT 2010,
Presentation:
Tang, Baohua Huang, Chengzhou Li. Kin Choong Yow, Cheng-Zhong Xu.
Presentation:
Ruixuan Li, Yibin Ding,
Queries in Peer-to-peer Systems, Wei Ye (2014): Role
ZL200910272426.1), 2009, Ruixuan Li, Yibin Ding,
Database System Principle,
201611156778.7), 2016
A Lightweight Secure Data Sharing Scheme for Mobile
(PI, Supported by NSF-HB), Scale-Free Network Model in Semantic
Yuhua Li, Hongmu Han, Junwei Tang, Wei Ye. Model for Analyzing Text-Augmented Social Networks, Mining Constraints in Role-Based Access Control, Proactive Replication for Rare Objects in Unstructured
2012
Distributed Systems and Middleware, Fall 2008,
Mobile Cloud Services,
Elsevier, 2012, 35(1): 85-96
FCST 2006, Aizu, Fukushima, Japan,
24th USENIX Large Installation System Administration Conference (LISA
Presentation:
Ruixuan Li, Xiaopu Ma, Kai Li, Xiwu Gu, Kunmei Wen,
China Patent (No.
2012
Peer-to-Peer Networks. GCC
Proactive Replication for Rare Objects in Unstructured
2011, Presentation: SecTag: A Multi-Policy
Presentation:
ZL200910063738.1), 2009, Ruixuan Li, Guoqiang Gao,
mining tool set can be downloaded at
Control
Computer
SWON 2007,
Kunmei Wen, Xiwu Gu, Wei Wu, Zhengding Lu, Heping Hu, Songfeng Lu, Cuihua Zuo,
Efficient Online Index
Oriented Secure Database Search Engine.
(PI, Supported by NSFC), Privacy Protection and Security Insurance in Mobile Cloud Services
Role Mining Based on Weights,
District Finalists and recipients of $5,000 scholarships are as follows: • Alyssa Lau of President Theodore Roosevelt High School. Ruixuan Li.
Ruixuan Li, Xiaopu Ma, Xiwu Gu, Kai Li, Wei
China Patent (No. Hybrid System. and
System for Distributed Cipher Full Text Retrieval. Zhang, Xiwu Gu and Kunmei Wen.
Ruixuan Li,
Control Model.
Zhengding Lu), (2012): Algorithms of Community Detection and Link Prediction in Social Networks (co-advised with
Fall 2010, 2011 (Chinese)
Future Generation Computer Systems,
Towards Automatic Update
Semantic Web & Ontology, Fall 2004-2007 (Chinese), Modern Information Retrieval,
Member:
2010) (Demo), Ruixuan Li,
633-635
Big Data Storage, Management and Analysis in Distributed
Multidatabase Systems, Introduction to Oracle Developer
Ruixuan Li, Zhengding Lu, Kunmei Wen, Xiaolin Sun,
University of Western
beginning Jan. 2015 and ending Dec. 2018.
Well nearly a year later, Liu Ye has kept that promise, and pictures from the ceremonies (both of them) show the bride and groom as happy as can be.
Supercomputing, Springer, 2013, 66(3): 1656-1686, Dongsheng Duan, Yuhua Li, Ruixuan
In the memory of , many people think that Yang Tongshu and Yu Hewei's wife Song Linjing are very similar. Kun Yan. The 18th
Introduction to Stanford Database Group Research, Wuhan, China, Jul. on Distributed Systems. 2005 China National Computer Conference (CNCC
In Proceedings of the 19th International Conference on Case-Based Reasoning (ICCBR’11). APWeb
Search for Secret Documents,
Grant: The Research was Supported by the National
Engineering, 2014, 26(10): 2493-2506
Coding,
Algorithms for Constrained Subspace Skyline Query in Structured Peer-to-Peer
Zhengding Lu)
Security Driven Distributed Systems,