default search action
Yi Qiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Yi Qiao, Han Zhang, Jilong Wang:
NetFEC: In-network FEC Encoding Acceleration for Latency-sensitive Multimedia Applications. INFOCOM 2024: 2348-2357 - 2023
- [j11]Na Lu, Yi Qiao, Pengfei An, Jiajian Luo, Changwei Bi, Musheng Li, Zuhong Lu, Jing Tu:
Exploration of whole genome amplification generated chimeric sequences in long-read sequencing data. Briefings Bioinform. 24(5) (2023) - [j10]Anders Pitman, Xiaomeng Huang, Gabor T. Marth, Yi Qiao:
quickBAM: a parallelized BAM file access API for high-throughput sequence analysis informatics. Bioinform. 39(8) (2023) - [j9]Xiang Zhang, Yi Qiao, Yangzhao Yang, Shuai Wang:
SMod: Scene-Specific-Prior-Based Moving Object Detection for Airport Apron Surveillance Systems. IEEE Intell. Transp. Syst. Mag. 15(1): 58-69 (2023) - 2022
- [j8]Yi Qiao, Menghao Zhang, Yu Zhou, Xiao Kong, Han Zhang, Mingwei Xu, Jun Bi, Jilong Wang:
NetEC: Accelerating Erasure Coding Reconstruction With In-Network Aggregation. IEEE Trans. Parallel Distributed Syst. 33(10): 2571-2583 (2022) - 2021
- [j7]Kaiyang Zhao, Xu An Wang, Jiasen Liu, Yi Qiao, Yang Zhou:
Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City. J. Circuits Syst. Comput. 30(15): 2150267:1-2150267:25 (2021) - [c14]Yi Qiao, Zheng Wang, Qian Wang, HanXiao Qu:
Design of Train Braking Distribution Simulator. ICITEE 2021: 84:1-84:6 - 2020
- [j6]Naiyun Long, Yi Qiao, Zheyun Xu, Jing Tu, Zuhong Lu:
Recent advances and application in whole-genome multiple displacement amplification. Quant. Biol. 8(4): 279-294 (2020) - [c13]Yi Qiao, Xiao Kong, Menghao Zhang, Yu Zhou, Mingwei Xu, Jun Bi:
Towards In-network Acceleration of Erasure Coding. SOSR 2020: 41-47
2010 – 2019
- 2019
- [j5]Yi Qiao, Zhaobin Liu, Haoze Lv, Minghui Li, Zhiyi Huang, Zhiyang Li, Weijiang Liu:
An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing. IEEE Access 7: 136203-136213 (2019) - [j4]Yabin Wang, Yi Qiao, Zhaobin Liu, Zhiyi Huang:
HighPU: a high privacy-utility approach to mining frequent itemset with differential privacy. Int. J. Embed. Syst. 11(5): 624-633 (2019) - [j3]Menghao Zhang, Jun Bi, Kai Gao, Yi Qiao, Guanyu Li, Xiao Kong, Zhaogeng Li, Hongxin Hu:
Tripod: Towards a Scalable, Efficient and Resilient Cloud Gateway. IEEE J. Sel. Areas Commun. 37(3): 570-585 (2019) - [c12]Liwei Guo, Shuang Zhai, Yi Qiao, Felix Xiaozhu Lin:
Transkernel: Bridging Monolithic Kernels to Peripheral Cores. USENIX ATC 2019: 675-692 - 2018
- [i1]Liwei Guo, Shuang Zhai, Yi Qiao, Felix Xiaozhu Lin:
Transkernel: An Executor for Commodity Kernels on Peripheral Cores. CoRR abs/1811.05000 (2018)
2000 – 2009
- 2009
- [c11]Xin Chen, Yi Qiao:
JBigin: A Java Package for Bayesian Inference of Genetic Interaction Networks from Micro-Array Data. BMEI 2009: 1-5 - 2008
- [j2]Yi Qiao, Fabián E. Bustamante, Peter A. Dinda, Stefan Birrer, Dong Lu:
Improving peer-to-peer performance through server-side scheduling. ACM Trans. Comput. Syst. 26(4): 10:1-10:30 (2008) - [j1]Fabián E. Bustamante, Yi Qiao:
Designing less-structured P2P systems for the expected high churn. IEEE/ACM Trans. Netw. 16(3): 617-627 (2008) - 2006
- [c10]Yi Qiao, Fabián E. Bustamante:
Structured and Unstructured Overlays under the Microscope: A Measurement-based View of Two P2P Systems That People Use. USENIX ATC, General Track 2006: 341-355 - 2005
- [c9]Dong Lu, Yi Qiao, Peter A. Dinda, Fabián E. Bustamante:
Characterizing and Predicting TCP Throughput on the Wide Area Network. ICDCS 2005: 414-424 - [c8]Dong Lu, Yi Qiao, Peter A. Dinda, Fabián E. Bustamante:
Modeling and Taming Parallel TCP on the Wide Area Network. IPDPS 2005 - [c7]Dong Lu, Peter A. Dinda, Yi Qiao, Huanyuan Sheng:
Effects and Implications of File Size/Service Time Correlation onWeb Server Scheduling Policies. MASCOTS 2005: 258-270 - [c6]Yi Qiao, Fabián E. Bustamante:
Elders Know Best - Handling Churn in Less Structured P2P Systems. Peer-to-Peer Computing 2005: 77-86 - 2004
- [c5]Yi Qiao, Jason A. Skicewicz, Peter A. Dinda:
An Empirical Study of the Multiscale Predictability of Network Traffic. HPDC 2004: 66-76 - [c4]Yi Qiao, Dong Lu, Fabián E. Bustamante, Peter A. Dinda:
Looking at the server side of peer-to-peer systems. LCR 2004: 4:1-4:8 - [c3]Stefan Birrer, Dong Lu, Fabián E. Bustamante, Yi Qiao, Peter A. Dinda:
FatNemo: Building a Resilient Multi-source Multicast Fat-Tree. WCW 2004: 182-196 - 2003
- [c2]Fabian E. Bustamante, Yi Qiao:
Friendships that Last: Peer Lifespan and its Role in P2P Protocols. WCW 2003: 233-246
1990 – 1999
- 1995
- [c1]Dan Schonfeld, Yi Qiao:
A new stochastic projection-based image recovery method. ICIP 1995: 466-469
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint