default search action
Yishi Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Tianyu Nie, Yishi Zhao, Shihong Yao:
ELA-Net: An Efficient Lightweight Attention Network for Skin Lesion Segmentation. Sensors 24(13): 4302 (2024) - [j10]Tiangang Li, Shi Ying, Yishi Zhao, Jianga Shang:
Batch Jobs Load Balancing Scheduling in Cloud Computing Using Distributional Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 35(1): 169-185 (2024) - [j9]Xiangbo Tian, Shi Ying, Tiangang Li, Mengting Yuan, Ruijin Wang, Yishi Zhao, Jianga Shang:
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems. IEEE Trans. Software Eng. 50(10): 2583-2601 (2024) - 2023
- [j8]Wanli Yuan, Shi Ying, Xiaoyu Duan, Hailong Cheng, Yishi Zhao, Jianga Shang:
PVE: A log parsing method based on VAE using embedding vectors. Inf. Process. Manag. 60(5): 103476 (2023) - [j7]Keyu Pan, Yishi Zhao, Tao Wang, Shihong Yao:
MSNet: a lightweight multi-scale deep learning network for pedestrian re-identification. Signal Image Video Process. 17(6): 3091-3098 (2023) - 2021
- [j6]Ri-Gui Zhou, Mingyu Huo, Wenwen Hu, Yishi Zhao:
Dynamic Multiparty Quantum Secret Sharing With a Trusted Party Based on Generalized GHZ State. IEEE Access 9: 22986-22995 (2021) - [j5]Shi Ying, Bingming Wang, Lu Wang, Qingshan Li, Yishi Zhao, Jianga Shang, Hao Huang, Guoli Cheng, Zhe Yang, Jiangyi Geng:
An Improved KNN-Based Efficient Log Anomaly Detection Method with Automatically Labeled Samples. ACM Trans. Knowl. Discov. Data 15(3): 34:1-34:22 (2021) - 2020
- [c11]Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao:
A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. TrustCom 2020: 1950-1955
2010 – 2019
- 2018
- [j4]Zhongwen Luo, Huimin Lv, Fang Fang, Yishi Zhao, Yuanyuan Liu, Xiuqiao Xiang, Xiaohui Yuan:
Dynamic Taxi Service Planning by Minimizing Cruising Distance Without Passengers. IEEE Access 6: 70005-70016 (2018) - 2017
- [c10]Lu Wang, Fang Fang, Xiaohui Yuan, Zhongwen Luo, Yuanyuan Liu, Bo Wan, Yishi Zhao:
Urban function zoning using geotagged photos and openstreetmap. IGARSS 2017: 815-818 - [c9]Huimin Lv, Fang Fang, Yishi Zhao, Yuanyuan Liu, Zhongwen Luo:
A Performance Evaluation Model for Taxi Cruising Path Recommendation System. PAKDD (2) 2017: 156-167 - 2016
- [c8]Yishi Zhao, Nigel Thomas:
Performance Modelling of Optimistic Fair Exchange. ASMTA 2016: 298-313 - 2015
- [c7]Leijie Sha, Jie Ding, Xiao Chen, Xiaobin Zhang, Yun Zhang, Yishi Zhao:
Performance Modeling of Openstack Cloud Computing Platform Using Performance Evaluation Process Algebra. CCBD 2015: 49-56 - 2013
- [j3]Antonio Cerone, Yishi Zhao:
Stochastic Modelling and Analysis of Driver Behaviour. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 69 (2013) - 2012
- [c6]Nigel Thomas, Michael D. Harrison, Yishi Zhao, Xiao Chen:
Formal Performance Modelling: From Protocols to People. EPEW/UKPEW 2012: 127-139 - 2011
- [b1]Yishi Zhao:
Practical applications of performance modelling of security protocols using PEPA. University of Newcastle upon Tyne, UK, 2011 - [j2]Nigel Thomas, Yishi Zhao:
Mean value analysis for a class of PEPA models. Comput. J. 54(5): 643-652 (2011) - [c5]Yishi Zhao, Nigel Thomas:
A Simplified Solution of a PEPA Model of Kerberos Protocol. CyberC 2011: 257-264 - 2010
- [j1]Yishi Zhao, Nigel Thomas:
Efficient solutions of a PEPA model of a key distribution centre. Perform. Evaluation 67(8): 740-756 (2010)
2000 – 2009
- 2009
- [c4]Nigel Thomas, Yishi Zhao:
Mean Value Analysis for a Class of PEPA Models. EPEW 2009: 59-72 - [c3]Yishi Zhao, Nigel Thomas:
Comparing Methods for the Efficient Analysis of PEPA Models of Non-repudiation Protocols. ICPADS 2009: 821-827 - 2008
- [c2]Yishi Zhao, Nigel Thomas:
A Cost Model Analysis of a Secure Key Distribution Centre. ICYCS 2008: 1969-1974 - [c1]Yishi Zhao, Nigel Thomas:
Approximate Solution of a PEPA Model of a Key Distribution Centre. SIPEW 2008: 44-57
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint