default search action
Ying Yuan 0001
Person information
- affiliation: Northeastern University at Qinhuangdao, Qinhuangdao, China
Other persons with the same name
- Ying Yuan — disambiguation page
- Ying Yuan 0002 — University of Padua, Italy
- Ying Yuan 0003 — Xinyang College, China
- Ying Yuan 0004 — Xidian University, Xi'an, China
- Ying Yuan 0005 — Xiamen University of Technology, Xiamen, China
- Ying Yuan 0006 — Hanyang University, Seoul, Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Cong Wang, Yaoming Wang, Ying Yuan, Sancheng Peng, Guorui Li, Pengfei Yin:
Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning. Neural Networks 179: 106621 (2024) - 2022
- [c17]Ying Yuan, Yichen Yang, Cong Wang:
Virtual Network Embedding with Virtual Nodes Ranking and Multi Points Sampling. CBD 2022: 48-53 - 2021
- [j11]Guangcong Zheng, Cong Wang, Weijie Shao, Ying Yuan, Zejie Tian, Sancheng Peng, Ali Kashif Bashir, Shahid Mumtaz:
A single-player Monte Carlo tree search method combined with node importance for virtual network embedding. Ann. des Télécommunications 76(5-6): 297-312 (2021) - 2020
- [j10]Cong Wan, Shan Jiang, Cong Wang, Ying Yuan, Cuirong Wang:
A Novel Sentence Embedding Based Topic Detection Method for Microblogs. IEEE Access 8: 202980-202992 (2020) - [j9]Cong Wang, Fanghui Zheng, Guangcong Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Guorui Li, Ying Yuan:
Modeling on virtual network embedding using reinforcement learning. Concurr. Comput. Pract. Exp. 32(23) (2020) - [j8]Ying Yuan, Zejie Tian, Cong Wang, Fanghui Zheng, Yanxia Lv:
A Q-learning-based approach for virtual network embedding in data center. Neural Comput. Appl. 32(7): 1995-2004 (2020) - [i1]Cong Wan, Shan Jiang, Cuirong Wang, Cong Wang, Changming Xu, Xianxia Chen, Ying Yuan:
A novel sentence embedding based topic detection method for micro-blog. CoRR abs/2006.09977 (2020)
2010 – 2019
- 2019
- [j7]Ying Yuan, Cong Wang, Sancheng Peng, Keshav Sood:
Topology-Oriented Virtual Network Embedding Approach for Data Centers. IEEE Access 7: 2429-2438 (2019) - [j6]Ying Wang, Guorui Li, Sancheng Peng, Cong Wang, Ying Yuan:
A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks. Int. J. Embed. Syst. 11(4): 440-451 (2019) - [j5]Ying Yuan, Cong Wang:
IPTV video quality assessment model based on neural network. J. Vis. Commun. Image Represent. 64 (2019) - [c16]Cong Wang, Fanghui Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Ying Yuan:
A Coordinated Two-Stages Virtual Network Embedding Algorithm Based on Reinforcement Learning. CBD 2019: 43-48 - 2017
- [j4]Cong Wang, Guohua Liu, Sancheng Peng, Ying Yuan, Guorui Li, Cong Wan:
Virtual network embedding with pre-transformation and incentive convergence mechanism. Concurr. Comput. Pract. Exp. 29(14) (2017) - 2016
- [j3]Bingyu Liu, Cuirong Wang, Cong Wang, Ying Yuan:
基于引力因子的加权网络重叠社区识别算法 (Overlapping Community Recognition Algorithm of Weighted Networks Based on Gravity Factor). 计算机科学 43(12): 153-157 (2016) - [c15]Cong Wan, Sancheng Peng, Cong Wang, Ying Yuan:
Communities Detection Algorithm Based on General Stochastic Block Model in Mobile Social Networks. CBD 2016: 178-185 - [c14]Ying Yuan, Sancheng Peng, Lixin Zhou, Cong Wang, Cong Wan, Hongtao Huang:
A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator. SmartCom 2016: 527-536 - [c13]Cong Wang, Yian Su, Lixin Zhou, Sancheng Peng, Ying Yuan, Hongtao Huang:
A Virtual Network Embedding Algorithm Based on Hybrid Particle Swarm Optimization. SmartCom 2016: 568-576 - [c12]Cong Wang, Yuxuan Liu, Ying Yuan, Guorui Li, Qiaohong Wang:
A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy. ICSI (2) 2016: 306-313 - 2015
- [c11]Cong Wang, Guohua Liu, Ying Yuan:
A Novel Method for Virtual Network Embedding with Incentive Convergence Mechanism. CBD 2015: 275-281 - [c10]Bingyu Liu, Cuirong Wang, Cong Wang, Ying Yuan:
A new algorithm for overlapping community detection. ICIA 2015: 813-816 - 2013
- [j2]Ying Yuan, Cuirong Wang, Cong Wang:
Fair Virtual Bandwidth Allocation Model in Virtual Data Centers. J. Digit. Inf. Manag. 11(3): 179-183 (2013) - [c9]Cong Wan, Cuirong Wang, Ying Yuan, Haiming Wang:
Game-Based Scheduling Algorithm to Achieve Optimize Profit in MapReduce Environment. ICIC (1) 2013: 234-240 - [c8]Ying Yuan, Cuirong Wang, Na Zhu, Cong Wan, Cong Wang:
Virtual Network Embedding Algorithm Based Connective Degree and Comprehensive Capacity. ICIC (1) 2013: 250-258 - [c7]Cong Wang, Ying Yuan, Ying Yang:
Fair Virtual Network Embedding Algorithm with Repeatable Pre-configuration Mechanism. ICIC (2) 2013: 324-331 - [c6]Ying Yuan, Cui-Rong Wang, Cong Wan, Cong Wang, Xin Song:
Repeatable Optimization Algorithm Based Discrete PSO for Virtual Network Embedding. ISNN (1) 2013: 334-342 - [c5]Cong Wan, Cuirong Wang, Ying Yuan, Haiming Wang, Xin Song:
Utility-Driven Share Scheduling Algorithm in Hadoop. ISNN (2) 2013: 560-568 - [c4]Cong Wang, Ying Yuan, Ying Yang, Xi Hu:
An Enhanced Node Repeatable Virtual Network Embedding Algorithm Based PSO Solution. ICSI (1) 2013: 210-217 - [c3]Ying Yuan, Cuirong Wang, Cong Wang, Shiming Zhu, Siwei Zhao:
Discrete Particle Swarm Optimization Algorithm for Virtual Network Reconfiguration. ICSI (1) 2013: 250-257 - 2012
- [j1]Xin Song, Rongcui Wang, Ying Yuan:
Local Mapping Based Modeling Sensor Network Data Algorithm for Query Processing. J. Networks 7(9): 1369-1375 (2012) - [c2]Ying Yuan, Cuirong Wang, Cong Wang:
A Game Based Approach for Sharing the Data Center Network. ISNN (1) 2012: 641-649 - 2011
- [c1]Cong Wang, Cuirong Wang, Ying Yuan:
Dynamic Bandwidth Allocation for Preventing Congestion in Data Center Networks. ISNN (3) 2011: 160-167
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint