Dawei Sun

ORCID: 0000-0003-3137-6257
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • IoT and Edge/Fog Computing
  • Data Stream Mining Techniques
  • Cloud Data Security Solutions
  • Distributed systems and fault tolerance
  • Graph Theory and Algorithms
  • Privacy-Preserving Technologies in Data
  • Advanced Data Storage Technologies
  • Advanced Database Systems and Queries
  • Opportunistic and Delay-Tolerant Networks
  • Data Management and Algorithms
  • Parallel Computing and Optimization Techniques
  • Advanced Neural Network Applications
  • Advanced Image and Video Retrieval Techniques
  • Security and Verification in Computing
  • Peer-to-Peer Network Technologies
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Mobile Ad Hoc Networks
  • Robotics and Sensor-Based Localization
  • Domain Adaptation and Few-Shot Learning
  • Data Mining Algorithms and Applications
  • Machine Learning and ELM
  • Access Control and Trust

University of Illinois Urbana-Champaign
2022-2024

China University of Geosciences (Beijing)
2015-2024

ZheJiang Academy of Agricultural Sciences
2024

Ministry of Agriculture and Rural Affairs
2024

Beijing Institute of Big Data Research
2020

Intel (United States)
2020

Tsinghua University
2013-2019

Ministry of Natural Resources
2019

State Key Laboratory on Integrated Optoelectronics
2019

Chinese Academy of Sciences
2019

Establishing correspondences between two images requires both local and global spatial context. Given putative of feature points in views, this paper, we propose Order-Aware Network, which infers the probabilities being inliers regresses relative pose encoded by essential matrix. Specifically, proposed network is built hierarchically comprises three novel operations. First, to capture context sparse correspondences, clusters unordered input learning a soft assignment These are canonical...

10.1109/iccv.2019.00594 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2019-10-01

Cloud computing is still in its infancy spite of gaining tremendous momentum recently, high security one the major obstacles for opening up new era long dreamed vision as a utility. As sensitive applications and data are moved into cloud centers, run on virtual resources form machine. This unique attributes, however, poses many novel tangible intangible challenges. It might be difficult to track issue environments. So this paper primarily aims highlight security, privacy trust issues current...

10.1016/j.proeng.2011.08.537 article EN Procedia Engineering 2011-01-01

Convolutional Neural Networks (CNNs) have become deeper and more complicated compared with the pioneering AlexNet. However, current prevailing training scheme follows previous way of adding supervision to last layer network only propagating error information up layer-by-layer. In this paper, we propose Deeply-supervised Knowledge Synergy (DKS), a new method aiming train CNNs improved generalization ability for image classification tasks without introducing extra computational cost during...

10.1109/cvpr.2019.00716 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

Today, one of the most important factors for success cloud computing is to create trust and security. Cloud will face a lot challenges when key element absent. There are no special evaluation models environment. In this paper, definition in systems introduced properties analyzed. Based on semantics trust, an extensible model named ETEC proposed, which includes time-variant comprehensive method expressing direct space-variant calculating recommendation trust. To compute systems, algorithm...

10.1109/icacc.2011.6016378 article EN 2011-01-01

Establishing correspondences between two images requires both local and global spatial context. Given putative of feature points in views, this paper, we propose Order-Aware Network, which infers the probabilities being inliers regresses relative pose encoded by essential matrix. Specifically, proposed network is built hierarchically comprises three novel operations. First, to capture context sparse correspondences, clusters unordered input learning a soft assignment These are canonical...

10.48550/arxiv.1908.04964 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Security of cloud computing is one the challenges to be addressed before novel pas-as-you-go business model widely applied, and dependability most important means improve security current heterogeneous platforms. Previous research on in systems only uses qualitative approaches there are few systematic works systems. In this paper, definition given a series quantitative indicators presented evaluate dependability. A CDSV established enhance environments. System-level virtualization techniques...

10.1109/pcspa.2010.81 article EN 2010-09-01

To allocate cloud resources efficiently and obtain the maximum economic benefit are major goals of resource providers users. The objective this paper is to present a novel allocation algorithm named NECDA overcome some shortcomings current mechanisms. A model m*n type based on M/M/1 queuing system established first. Then Nash equilibrium mode applied in computing among environment, optimization each performance-QoS economic-QoS, achieved by taking advantage continuous double auction step,...

10.1109/iccda.2010.5541088 article EN 2010-06-01

The issue of high system stability is one the major obstacles for real-time computing over fluctuating big data streams. A stable scheduling more important than an efficient stream applications, especially when a to be rescheduled dynamically at runtime. In this paper, online strategy with makespan guarantee SOMG discussed, which includes following features: 1) profiling mathematical relationships between stability, response time, and resource utilization, indicating conditions meet...

10.1109/access.2016.2634557 article EN cc-by-nc-nd IEEE Access 2016-01-01

High security of cloud computing is one the most challenges to be addressed before novel pas-as-you-go business paradigm widely applied over internet. Trust brings a means improve platforms. However, there are few systematic works on trust in systems. In this paper, definition systems given and properties analysed by referring fruits from social science. Based semantics trust, dynamic multi-dimensional model named DMTC proposed, which includes time-variant comprehensive evaluation method for...

10.1504/ijica.2011.044529 article EN International Journal of Innovative Computing and Applications 2011-01-01

In the research on mobile sensor networks, coverage control is one of most important challenges. For network constructed by random distribution, better can be achieved topology adjustment utilizing mobility nodes. This paper investigates how to make use radius and nodes improve coverage. A node distribution optimization scheme based multi-objective differential evolution algorithm proposed. Simulation results show that proposed quickly achieve a network, increase effective rate, reduce...

10.1109/icgec.2010.21 article EN 2010-12-01

High fault tolerance issue is one of the major obstacles for opening up new era high serviceability cloud computing as plays a key role in order to ensure serviceability. In most current clouds, check pointing, process saving application states, and replication, replicating hot data, usually stable storage, have been two common strategies. However, when, where, how often insert pointing or replicate data become challenges are ignored clouds. this paper, definitions fault, error, failure...

10.1109/icdcsw.2012.6 article EN 2012-06-01

Entity–relationship extraction plays a pivotal role in the construction of domain knowledge graphs. For aquatic disease domain, however, this relationship is formidable task because overlapping relationships, data specialization, limited feature fusion, and imbalanced samples, which significantly weaken extraction’s performance. To tackle these challenges, study leverages published books websites as sources to compile text corpus, establish datasets, then propose Fd-CasBGRel model...

10.3390/app14146147 article EN cc-by Applied Sciences 2024-07-15
Coming Soon ...