Остановите войну!
for scientists:
default search action
Chuliang Weng
- > Home > Persons > Chuliang Weng
Publications
- 2013
- [j6]Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li:
Hybrid CPU Management for Adapting to the Diversity of Virtual Machines. IEEE Trans. Computers 62(7): 1332-1344 (2013) - 2011
- [c31]Chuliang Weng, Qian Liu, Lei Yu, Minglu Li:
Dynamic adaptive scheduling for virtual machines. HPDC 2011: 239-250 - 2010
- [j4]Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo:
An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds. IEEE Secur. Priv. 8(6): 56-62 (2010) - [c30]Lei Yu, Chuliang Weng, Minglu Li, Yuan Luo:
Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments. ChinaGrid 2010: 223-227 - 2009
- [c29]Yiqun Zhu, Minglu Li, Chuliang Weng:
Ant Algorithm with Execution Quality Based Prediction in Grid Scheduling. ChinaGrid 2009: 77-83 - [c28]Houkun Zhu, Yuan Luo, Chuliang Weng, Minglu Li:
A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach. ChinaGrid 2009: 134-138 - [c27]Zhe Fang, Minglu Li, Chuliang Weng, Yuan Luo:
Dynamic Malicious Code Detection Based on Binary Translator. CloudCom 2009: 80-89 - [c26]Chuliang Weng, Minglu Li, Zhigang Wang, Xinda Lu:
Automatic Performance Tuning for the Virtualized Cluster System. ICDCS 2009: 183-190 - [c25]Wentao Qu, Minglu Li, Chuliang Weng:
An Active Trusted Model for Virtual Machine Systems. ISPA 2009: 145-152 - [c24]Qiang Zhang, Yuan Luo, Chuliang Weng, Minglu Li:
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. SSIRI 2009: 59-64 - [c23]Guanhai Wang, Minglu Li, Chuliang Weng:
Chinese Wall Isolation Mechanism and Its Implementation on VMM. SVM 2009: 13-18 - [c22]Chuliang Weng, Zhigang Wang, Minglu Li, Xinda Lu:
The hybrid scheduling framework for virtual machine systems. VEE 2009: 111-120 - 2008
- [c21]Weiyi Qi, Junwei Wu, Minglu Li, Chuliang Weng:
A Resource Scheduling Model Supporting Differentiated Service for Grid Computing. ChinaGrid 2008: 47-54 - [c20]Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:
An Abstract Model for Intrusion Detection on Multi-Core Platform. ChinaGrid 2008: 202-208 - [c19]Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:
A Reasonable Approach for Defining Load Index in Parallel Computing. EUC (1) 2008: 467-473 - [c18]Jiang Bian, Chuliang Weng, Jie Du, Minglu Li:
A QoS-Aware and Fault-Tolerant Workflow Composition for Grid. GCC 2008: 510-516 - [c17]Jie Du, Chuliang Weng, Jiang Bian, Minglu Li:
Mapping DAG-Based Power System Computing and Simulation Applications to Grid. GCC 2008: 599-604 - [c16]Chuliang Weng, Minglu Li, Xinda Lu:
An Incentive Approach for Computational Resource Sharing in the Autonomous Environment. GPC 2008: 104-115 - [c15]Chuliang Weng, Minglu Li, Xinda Lu:
Data Aggregation with Multiple Spanning Trees in Wireless Sensor Networks. ICESS 2008: 355-362 - [c14]Chuliang Weng, Yuan Luo, Minglu Li, Xinda Lu:
A BLP-Based Access Control Mechanism for the Virtual Machine System. ICYCS 2008: 2278-2282 - [c13]Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:
A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform. NPC Workshops 2008: 583-590 - [c12]Zhigang Wang, Chuliang Weng, Yu Wang, Minglu Li:
A Resource Management Mechanism and Its Implementation for Virtual Machines. SVM 2008: 113-118 - [e1]Jian Cao, Minglu Li, Chuliang Weng, Yang Xiang, Xin Wang, Hong Tang, Feng Hong, Hong Liu, Yinglin Wang:
IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3354-4 [contents] - 2007
- [j3]Chuliang Weng, Minglu Li, Xinda Lu:
Grid resource management based on economic mechanisms. J. Supercomput. 42(2): 181-199 (2007) - 2006
- [j2]Chuliang Weng, Minglu Li, Xinda Lu:
An Online Scheduling Algorithm for Assigning Jobs in the Computational Grid. IEICE Trans. Inf. Syst. 89-D(2): 597-604 (2006) - [c11]Feilong Tang, Minglu Li, Chuliang Weng, Chongqing Zhang, Wenzhe Zhang, Hongyu Huang, Yi Wang:
Combining Wireless Sensor Network with Grid for Intelligent City Traffic. Asia-Pacific Computer Systems Architecture Conference 2006: 260-269 - 2005
- [c10]Chuliang Weng, Zhongguo Chen, Xinda Lu, Minglu Li, Yong Yin:
A User-Guided Semi-automatic Parallelization Method and Its Implementation. APPT 2005: 204-213 - [c9]Chuliang Weng, Minglu Li, Xinda Lu:
Resource Management and Scheduling for High Performance Computing Application Based on WSRF. APWeb 2005: 718-729 - [c8]Chuliang Weng, Minglu Li, Xinda Lu:
A New Method for Online Scheduling in Computational Grid Environments. APWeb 2005: 832-837 - [c7]Minglu Li, Min-You Wu, Ying Li, Linpeng Huang, Qianni Deng, Jian Cao, Guangtao Xue, Chuliang Weng, Xinhua Lin, Xinda Lu, Changjun Jiang, Weiqin Tong, Yadong Gui, Aoying Zhou, Xinhong Wu, Shui Jiang:
ShanghaiGrid: A Grid Prototype for Metropolis Information Services. APWeb 2005: 1033-1036 - [c6]Chuliang Weng, Minglu Li, Xinda Lu, Qianni Deng:
An economic-based resource management framework in the grid context. CCGRID 2005: 542-549 - [c5]Minglu Li, Chuliang Weng, Xinda Lu, Yong Yin, Qianni Deng:
A Resource Scheduling Strategy for the CFD Application on the Grid. ISPA Workshops 2005: 305-314 - 2004
- [c4]Chuliang Weng, Xinda Lu, Guangtao Xue, Qianni Deng, Minglu Li:
A Double Auction Mechanism for Resource Allocation on Grid Computing Systems. GCC 2004: 269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint