Search Results - "Weining Qian"
-
1
Analyzing user behavior of the micro-blogging website Sina Weibo during hot social events
Published in Physica A (01-02-2014)“…The spread and resonance of users’ opinions on Sina Weibo, the most popular micro-blogging website in China, are tremendously influential, having significantly…”
Get full text
Journal Article -
2
Predicting Regional Variations in Nationalism With Online Expression of Disgust in China
Published in Frontiers in psychology (28-05-2021)“…Disgust is one of the basic emotions and is part of the behavioral immune system, which evolutionarily protects humans from toxic substances as well as from…”
Get full text
Journal Article -
3
Scalable and adaptive log manager in distributed systems
Published in Frontiers of Computer Science (01-04-2023)“…On-line transaction processing (OLTP) systems rely on transaction logging and quorum-based consensus protocol to guarantee durability, high availability and…”
Get full text
Journal Article -
4
Scalable and quantitative contention generation for performance evaluation on OLTP databases
Published in Frontiers of Computer Science (01-04-2023)“…Massive scale of transactions with critical requirements become popular for emerging businesses, especially in E-commerce. One of the most representative…”
Get full text
Journal Article -
5
Are current benchmarks adequate to evaluate distributed transactional databases?
Published in BenchCouncil Transactions on Benchmarks, Standards and Evaluations (01-03-2022)“…With the rapid development of distributed transactional databases in recent years, there is an urgent need for fair performance evaluation and comparison…”
Get full text
Journal Article -
6
Range Optimistic Concurrency Control for a Composite OLTP and Bulk Processing Workload
Published in 2018 IEEE 34th International Conference on Data Engineering (ICDE) (01-04-2018)“…This work addresses the need for efficient key-range validation for a composite OLTP and bulk processing workload characterized by modern enterprise…”
Get full text
Conference Proceeding -
7
Benchmarking in-memory database
Published in Frontiers of Computer Science (01-12-2016)“…We have witnessed exciting development of RAM technology in the past decade. The memory size grows rapidly and the price continues to decrease, so that it is…”
Get full text
Journal Article -
8
Collective Emotional Reaction to Societal Risks in China
Published in 2015 IEEE International Conference on Systems, Man, and Cybernetics (01-10-2015)“…Modern China is exposed to many societal risks. The risk perception induced emotion at the individual level but their relationship on a large scale is costly…”
Get full text
Conference Proceeding -
9
Sampling social streams for hot social events analytics
Published in 2015 31st IEEE International Conference on Data Engineering Workshops (01-04-2015)“…Various analytical methods are applied on social media data for opinion mining, user recommondation, product advertising, and etc. They share the common…”
Get full text
Conference Proceeding -
10
Security and Privacy in Cloud Computing: A Survey
Published in 2010 Sixth International Conference on Semantics, Knowledge and Grids (01-11-2010)“…Cloud Computing is becoming a well-known buzzword nowadays. Many companies, such as Amazon, Google, Microsoft and so on, accelerate their paces in developing…”
Get full text
Conference Proceeding -
11
On the rise and fall of Sina Weibo: Analysis based on a fixed user group
Published in 2015 31st IEEE International Conference on Data Engineering Workshops (01-04-2015)“…Micro-blogging service Sina Weibo in China has become the country's most free-flowing and important source of news and opinions just a few years ago. Following…”
Get full text
Conference Proceeding -
12
Finding centric local outliers in categorical/numerical spaces
Published in Knowledge and information systems (01-03-2006)“…Outlier detection techniques are widely used in many applications such as credit-card fraud detection, monitoring criminal activities in electronic commerce,…”
Get full text
Journal Article -
13
Learning legal text representations via disentangling elements
Published in Expert systems with applications (01-09-2024)“…Recently, a rising number of works has been focusing on tasks in the legal field for providing references to professionals in order to improve their work…”
Get full text
Journal Article -
14
Effective Data Density Estimation in Ring-Based P2P Networks
Published in 2012 IEEE 28th International Conference on Data Engineering (01-04-2012)“…Estimating the global data distribution in Peer-to-Peer (P2P) networks is an important issue and has yet to be well addressed. It can benefit many P2P…”
Get full text
Conference Proceeding -
15
Efficient Indices Using Graph Partitioning in RDF Triple Stores
Published in 2009 IEEE 25th International Conference on Data Engineering (01-03-2009)“…With the advance of the semantic Web, varying RDF data were increasingly generated, published, queried, and reused via the Web. For example, the DBpedia, a…”
Get full text
Conference Proceeding -
16
SI-News: Integrating social information for news recommendation with attention-based graph convolutional network
Published in Neurocomputing (Amsterdam) (14-07-2022)“…High-quality news recommendation heavily relies on accurate and timely representations of news documents and user interests. Social information, which usually…”
Get full text
Journal Article -
17
Services in the Cloud Computing era: A survey
Published in 2010 4th International Universal Communication Symposium (01-10-2010)“…Cloud Computing is becoming a well-known buzzword nowadays. As a brand new infrastructure to offer services, Cloud Computing systems have many superiorities in…”
Get full text
Conference Proceeding -
18
Approximately Processing Multi-granularity Aggregate Queries over Data Streams
Published in 22nd International Conference on Data Engineering (ICDE'06) (2006)“…Aggregate monitoring over data streams is attracting more and more attention in research community due to its broad potential applications. Existing methods…”
Get full text
Conference Proceeding -
19
Bloom filter-based XML packets filtering for millions of path queries
Published in 21st International Conference on Data Engineering (ICDE'05) (2005)“…The filtering of XML data is the basis of many complex applications. Lots of algorithms have been proposed to solve this problem. One important challenge is…”
Get full text
Conference Proceeding -
20
Lauca: A Workload Duplicator for Benchmarking Transactional Database Performance
Published in IEEE transactions on knowledge and data engineering (01-07-2024)“…Generating synthetic workloads is essential and critical to the performance evaluation of database systems. When benchmarking database performance for a…”
Get full text
Journal Article