Yujie Liu

ORCID: 0000-0002-2372-8737
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed systems and fault tolerance
  • Parallel Computing and Optimization Techniques
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Data Storage Technologies
  • Higher Education and Teaching Methods
  • Robotics and Sensor-Based Localization
  • Image Processing and 3D Reconstruction
  • Software-Defined Networks and 5G
  • Cognitive Functions and Memory
  • Educational Technology and Assessment
  • Remote Sensing and Land Use
  • Video Surveillance and Tracking Methods
  • Optimization and Search Problems
  • Medical Image Segmentation Techniques
  • Simulation and Modeling Applications
  • Education and Work Dynamics
  • Interconnection Networks and Systems
  • Data Visualization and Analytics
  • Online Learning and Analytics
  • Education and Vocational Training
  • Advanced Vision and Imaging
  • Chaos-based Image/Signal Encryption
  • Software System Performance and Reliability
  • Advanced Steganography and Watermarking Techniques

Soochow University
2024

China University of Petroleum, East China
2007-2024

Affiliated Hospital of Qingdao University
2024

Qingdao University
2024

Civil Aviation University of China
2023

National University of Defense Technology
2023

Beijing Institute of Petrochemical Technology
2021-2023

Beijing Institute of Technology
2022

Guangzhou University
2022

Beijing University of Posts and Telecommunications
2018-2021

This paper presents nonblocking hash table algorithms that support resizing in both directions: shrinking and growing. The heart of the is a freezable set abstraction, which greatly simplifies task moving elements among buckets during resize. Furthermore, abstraction makes possible use highly optimized implementations individual buckets, including single flat array used for each bucket, improves cache locality.

10.1145/2611462.2611495 article EN 2014-07-15

The addition of transactional memory (TM) support to existing languages provides the opportunity create new soft- ware from scratch using transactions, and also simplify or extend legacy code by replacing synchronization with language-level transactions. In this paper, we describe our experiences transactionalizing memcached application through use GCC implementation Draft C++ TM Specification. We present recommendations that hope will guide effort integrate into languages, may contribute...

10.1145/2541940.2541960 article EN 2014-02-24

With the development of social life, prediction becomes more and important. As an emerging sequence modeling model, temporal convolutional network has been proven to outperform on tasks such as audio synthesis natural language processing. But it is rarely used for time series prediction. In this paper, we apply into problem. Gated linear units allow gradient propagate through unit without scaling so introduce in networks. order extract useful features, propose a multi-channel gated...

10.1109/icis46139.2019.8940265 article EN 2019-06-01

Time-based transactional memories typically rely on a shared memory counter to ensure consistency. Unfortunately, such can become bottleneck. In this article, we identify properties of hardware cycle counters that allow their use in place counter. We then devise algorithms exploit the x86 enable bottleneck-free runtime systems. also consider impact privatization safety and ordering constraints correctness, performance, generality our algorithms.

10.1145/2541228.2555297 article EN ACM Transactions on Architecture and Code Optimization 2013-12-01

10.1016/j.jnca.2015.04.009 article EN Journal of Network and Computer Applications 2015-05-06

Community structure is an important characteristic of many real networks, which shows high concentrations edges within special groups vertices and low between these groups. related graph analysis, such as discovering relationships among communities, identifying attribute-structure relationships, selecting a large number with desired structural features attributes, are common tasks in knowledge discovery networks. The clutter the lack interactivity often hinder efforts to apply traditional...

10.1109/tvcg.2012.172 article EN IEEE Transactions on Visualization and Computer Graphics 2012-09-01

Byte-addressable, non-volatile, random access memory (NVM) has the potential to dramatically accelerate performance of storage-intensive workloads. For applications with irregular data patterns, and that rely on ad-hoc structures, most promising model for interacting NVM is a transactional model. However, specifics matter significantly. We introduce two models programming persistent transactions. show how build concurrent from traditional software memories. then general model-specific...

10.1109/pact.2019.00025 article EN 2019-09-01

Alloying is an effective way to modulate material's properties. In particular, graded alloying within a single domain of two-dimensional transition-metal chalcogenide (2D-TMC) great technological importance, for example, achieving band gap modulations. Here, we report facile method grow gradient Mo1–xWxS2 monolayers with large sizes and high crystal qualities via the chemical vapor deposition technique. The as-grown have composition W from x = ∼0 ∼1 in lateral dimension up 300 μm, span can...

10.1021/acsami.9b03608 article EN ACS Applied Materials & Interfaces 2019-05-23

Iterative, opportunistic and evolving visual sense-making has been an important research topic as it assists users in overcoming ever-increasing information overload. Exploratory visualization systems (EVSs) maximize the amount of can gain through learning have widely used scientific discovery decision-making contexts. Although many EVSs developed recently, there is a lack general guidance on how to evaluate such systems. Researchers face challenges understanding cognitive process supported...

10.1177/1473871612459995 article EN Information Visualization 2012-10-08

Combining Network Functions Virtualization (NFV) with Software-Defined Networking (SDN) is an emerging and promising solution to provide scalable elastic network control service. In such a system, virtualized (NFs) need be consistently migrated from one instance another for various purposes, as resource optimization, fault tolerance, load balancing, etc. These migrations involve simultaneously coordinating updates the NF state SDN forwarding state. To solve this problem, we design two...

10.1109/tsc.2017.2765636 article EN IEEE Transactions on Services Computing 2017-01-01

Recent microprocessors and compilers have added support for transactional memory (TM). While state-of-the-art TM systems allow the replacement of lock-based critical sections with scalable, optimistic transactions, there is not yet an acceptable mechanism supporting use condition variables in transactions. We introduce a new implementation variables, which uses transactions internally, can be used from within both sections, compatible existing C/C++ interfaces synchronization. By moving most...

10.1145/2612669.2612681 article EN 2014-06-21

This paper introduces a concurrent data structure called the mound. The mound is rooted tree of sorted lists that relies on randomization for balance. It supports O(log(log(N))) insert and O(log(N)) extract Min operations, making it suitable use as priority queue. We present two algorithms: first achieves lock freedom via pure-software double-compare-and-swap (DCAS), second uses fine grained locks. Mounds perform well in practice, support novel operations we expect to be useful parallel...

10.1109/icpp.2012.42 article EN 2012-09-01

How to reduce the content placement cost of cloud delivery networks (CCDNs) is a hot topic in recent years. Traditional methods mainly by constructing trees, but they cannot adapt dynamic deployment proxy servers CCDNs. In addition, traditional method only provides paths according local decision-making without considering global dynamics congestion CCDNs, which also one main factors causing high placement. To solve these problems, we propose model based on Q-learning for called Q-content...

10.1109/access.2019.2917564 article EN cc-by-nc-nd IEEE Access 2019-01-01

Objective This study aims to evaluate the effectiveness of Vaginal Microecology Evaluation System (VMES) in assessing dynamics vaginal microbiome (VM) throughout process vitro fertilization and embryo transfer (IVF-ET). Furthermore, it seeks explore potential correlation between distinct types VM ecology success rate IVF-ET. Methods employed VMES ascertain composition VM. Data were collected from infertile women who underwent their initial IVF-ET treatment for tubal factor January 2018...

10.3389/fendo.2024.1380187 article EN cc-by Frontiers in Endocrinology 2024-07-09

10.1007/s11390-018-1836-1 article EN Journal of Computer Science and Technology 2018-05-01

Combining Network Functions Virtualization (NFV) with Software-Defined Networking (SDN) is an emerging solution to provide fine-grained control over scalable and elastic packet processing functions. Due changes in network policy, traffic characteristics, or physical topology NFV (SDNFV) systems, the controller needs carry out updates frequently, i.e., change data plane configuration from one state another. In order adapt a newly desired quickly, update process expected be completed shortest...

10.1109/infcomw.2016.7562137 article EN 2016-04-01

A selective encryption algorithm is proposed to improve the efficiency of high video coding (HEVC) and ensure security HEVC videos. The adopts integer dynamic coupling tent mapping optimization model as pseudo-random sequence generator, multi-core parallelization used generation mechanism. binstrings during process context adaptive binary arithmetic are selected for encryption, which conforms features invariable binstream compatible format in terms encryption. Performance tests six types...

10.20965/jaciii.2020.p0335 article EN cc-by-nd Journal of Advanced Computational Intelligence and Intelligent Informatics 2020-05-19
Coming Soon ...