default search action
Futian Wang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Futian Wang, Xuyang Zhao, Xiao Sun:
SHADE: Speaker-History-Aware Dialog Generation Through Contrastive and Prompt Learning. IEEE Trans. Comput. Soc. Syst. 11(2): 2302-2312 (2024) - [c30]Qinghe Wang, Futian Wang, Xinwei Zheng:
Hops: Fine-grained heterogeneous sensing, efficient and fair Deep Learning cluster scheduling system. SoCC 2024: 1-17 - [c29]Futian Wang, Weijie Lv, Jin Tang, Andong Lu:
TSR-YOLO: Multi-Stage Self-Processing Method for Small Traffic-Signs Recognition. CSAIDE 2024: 288-294 - [c28]Can Zhou, Haiqun Jin, Chunying Yin, Jun Guo, Futian Wang, Yueyi Zhang, Ruobing Zhang:
Electron Microscopy Image Registration with Twin Axial Transformer and Progressive Training. WBIR 2024: 253-264 - [i2]Xiao Wang, Qian Zhu, Jiandong Jin, Jun Zhu, Futian Wang, Bo Jiang, Yaowei Wang, Yonghong Tian:
Spatio-Temporal Side Tuning Pre-trained Foundation Models for Video-based Pedestrian Attribute Recognition. CoRR abs/2404.17929 (2024) - 2023
- [j19]Futian Wang, Wenqi Wang, Lei Liu, Chenglong Li, Jing Tang:
Siamese transformer RGBT tracking. Appl. Intell. 53(21): 24709-24723 (2023) - [j18]Zhiyuan Hu, Futian Wang, Yuanjie Tang:
Scenario-oriented repetitive project scheduling optimization. Comput. Aided Civ. Infrastructure Eng. 38(10): 1239-1273 (2023) - [c27]Yun Xiao, Fei Liu, Yabin Zhu, Chenglong Li, Futian Wang, Jin Tang:
UAV Cross-Modal Image Registration: Large-Scale Dataset and Transformer-Based Approach. BICS 2023: 166-176 - [c26]Futian Wang, Feier Chen, Jin Tang, Mengyu Huang:
Generic Skeleton Object Detection Framework with Gradient Maps. ICDIP 2023: 41:1-41:8 - [c25]Futian Wang, Qiang Wen, Jie Fang:
LWSCA-YOLOV5: An Improved Lightweight Fire Detection Algorithm Based on YOLOV5. IoTAAI 2023: 836-843 - [c24]Futian Wang, Zhimin Wu, Jin Tang, Chenglong Li, Cheng Zhang:
Multi-Request Data Cache Optimization Strategy in Edge Computing. SNPD-Winter 2023: 267-273 - [i1]Lei Liu, Chenglong Li, Futian Wang, Longfeng Shen, Jin Tang:
Prototype-based Cross-Modal Object Tracking. CoRR abs/2312.14471 (2023) - 2022
- [j17]Cheng Zhang, Haitao Cui, Lingli Cao, Futian Wang, Yun Yang:
Group role assignment strategies in microservices team based on E-CARGO model. Knowl. Based Syst. 248: 108910 (2022) - [j16]Futian Wang, Yin Guo, Chenglong Li, Andong Lu, Zhongfeng Ding, Jin Tang, Bin Luo:
Electrical Thermal Image Semantic Segmentation: Large-Scale Dataset and Baseline. IEEE Trans. Instrum. Meas. 71: 1-13 (2022) - [j15]Chenglong Li, Zhiqiang Xiang, Jin Tang, Bin Luo, Futian Wang:
RGBT Tracking via Noise-Robust Cross-Modal Ranking. IEEE Trans. Neural Networks Learn. Syst. 33(9): 5019-5031 (2022) - [c23]Jifang Tan, Yang Cao, Futian Wang, Xiushan Xia, Zhenyi Xu:
VOCs Leakage Detection Based on Weak Temporal Attention Asymmetric 3D Convolution. ICARM 2022: 200-205 - 2021
- [j14]Futian Wang, Xiaoping Wang, Jin Tang, Bin Luo, Chenglong Li:
VTAAN: Visual Tracking with Attentive Adversarial Network. Cogn. Comput. 13(3): 646-656 (2021) - [j13]Futian Wang, Li Yang, Jin Tang, Si-Bao Chen, Xin Wang:
DLA+: A Light Aggregation Network for Object Classification and Detection. Int. J. Autom. Comput. 18(6): 963-972 (2021) - [c22]Futian Wang, Lugang Wang, Jin Tang, Chenglong Li:
Progressive Fusion Network for Safety Protection Detection. ICIG (1) 2021: 293-304 - 2020
- [j12]Futian Wang, Xunan Wang, Cheng Zhang, Qiang He, Yun Yang:
Fault tolerating multi-tenant service-based systems with dynamic quality. Knowl. Based Syst. 195: 105715 (2020) - [c21]Weichao Liu, Cheng Zhang, Futian Wang, Yun Yang:
Combining Network Analysis with Structural Matching for Design Pattern Detection. EASE 2020: 61-70 - [c20]Heng Tong, Cheng Zhang, Futian Wang:
Code Smell Detection Based on Multi-dimensional Software Data and Complex Networks. ICPCSEE (2) 2020: 490-505
2010 – 2019
- 2019
- [j11]Lei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang:
An efficient temporal verification algorithm for intersectant constraints in scientific workflow. Int. J. High Perform. Comput. Netw. 14(3): 304-314 (2019) - [j10]Xuejun Li, Lei Zhang, Yang Wu, Xiao Liu, Erzhou Zhu, Huikang Yi, Futian Wang, Cheng Zhang, Yun Yang:
A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows. IEEE Trans. Serv. Comput. 12(3): 370-383 (2019) - [c19]Erzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu, Futian Wang:
TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management. ICA3PP (1) 2019: 315-329 - [c18]Yuan Gao, Chenglong Li, Yabin Zhu, Jin Tang, Tao He, Futian Wang:
Deep Adaptive Fusion Network for High Performance RGBT Tracking. ICCV Workshops 2019: 91-99 - [c17]Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang:
A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows. ICDS 2019: 698-708 - [c16]Futian Wang, Xingxiang Huang, Hongfang Nian, Qiang He, Yun Yang, Cheng Zhang:
Cost-Effective Edge Server Placement in Edge Computing. ICSCC 2019: 6-10 - [c15]Zaibing Lv, Cheng Zhang, Futian Wang:
Cost Optimization Strategy for Long-Term Storage of Scientific Workflow. ICPCSEE (1) 2019: 148-157 - [c14]Futian Wang, Songjian Hua, Xiao Wang, Zhengzheng Tu, Cheng Zhang, Jin Tang:
A Novel Method for Thermal Image Based Electrical-Equipment Detection. PRCV (1) 2019: 239-250 - 2018
- [j9]Yuanjie Tang, Rengkui Liu, Futian Wang, Quanxin Sun, Amr A. Kandil:
Scheduling Optimization of Linear Schedule with Constraint Programming. Comput. Aided Civ. Infrastructure Eng. 33(2): 124-151 (2018) - [j8]Yuanjie Tang, Quanxin Sun, Rengkui Liu, Futian Wang:
Resource Leveling Based on Line of Balance and Constraint Programming. Comput. Aided Civ. Infrastructure Eng. 33(10): 864-884 (2018) - [j7]Rongbin Xu, Yeguo Wang, Haoyu Luo, Futian Wang, Ying Xie, Xiao Liu, Yun Yang:
A sufficient and necessary temporal violation handling point selection strategy in cloud workflow. Future Gener. Comput. Syst. 86: 464-479 (2018) - [j6]Wei Zhang, Yun Yang, Xiao Liu, Cheng Zhang, Xuejun Li, Rongbin Xu, Futian Wang, Muhammad Ali Babar:
Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization. Int. J. Comput. Intell. Syst. 11(1): 894-910 (2018) - [j5]Yiwen Zhang, Yuanyuan Zhou, Futian Wang, Zheng Sun, Qiang He:
Service recommendation based on quotient space granularity analysis and covering algorithm on Spark. Knowl. Based Syst. 147: 25-35 (2018) - [c13]Yeguo Wang, Rongbin Xu, Futian Wang, Haoyu Luo, Menglong Wang, Xiao Liu:
Sliding-window based Propagation-aware Temporal Verification for Monitoring Parallel Cloud Business Workflows. CSCWD 2018: 449-454 - [c12]Erzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li:
Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 96-102 - [c11]Erzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang:
Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 766-772 - [c10]Erzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li:
An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 781-787 - 2017
- [c9]Lei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang:
A novel strategy for efficient temporal verification with intersectant situation in scientific workflow. ACSW 2017: 40:1-40:5 - [c8]Min Guo, Cheng Zhang, Futian Wang:
What is the Further Evidence about UML? - A Systematic Literature Review. APSEC Workshops 2017: 106-113 - [c7]Shuhui Wu, Cheng Zhang, Futian Wang:
Extracting Software Security Concerns of Problem Frames Based on a Mapping Study. APSEC Workshops 2017: 121-125 - [c6]Futian Wang, Ke Fang, Jin Tang, Cheng Zhang:
A server selection strategy about cloud workflow based on QoS constraint. SERA 2017: 13-18 - 2016
- [j4]Xiao Liu, Dingxian Wang, Dong Yuan, Futian Wang, Yun Yang:
Workflow temporal verification for monitoring parallel business processes. J. Softw. Evol. Process. 28(4): 286-302 (2016) - [c5]Haoyu Luo, Xiao Liu, Jin Liu, Futian Wang:
Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows. SCC 2016: 155-162 - 2015
- [j3]Peng Xu, Quanxin Sun, Rengkui Liu, Reginald R. Souleyrette, Futian Wang:
Optimizing the Alignment of Inspection Data from Track Geometry Cars. Comput. Aided Civ. Infrastructure Eng. 30(1): 19-35 (2015) - [j2]Futian Wang, Xiao Liu, Yun Yang:
Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems. Sci. China Inf. Sci. 58(5): 1-16 (2015) - [c4]Haoyu Luo, Xiao Liu, Jin Liu, Futian Wang:
An Epidemic Model Based Temporal Violation Prediction Strategy for Large Batch of Parallel Business Cloud Workflows. DSDIS 2015: 182-189 - 2014
- [c3]Rongbin Xu, Xiao Liu, Ying Xie, Futian Wang, Cheng Zhang, Yun Yang:
Logistics scheduling based on cloud business workflows. CSCWD 2014: 29-34 - [c2]Xiao Liu, Dingxian Wang, Dong Yuan, Futian Wang, Yun Yang:
Throughput based temporal verification for monitoring large batch of parallel processes. ICSSP 2014: 124-133 - [c1]Zhou Zhao, Futian Wang, Xiaoliang Fan, Xiao Liu:
Temporal Verification for Business Cloud Workflows: Open Research Issues. SKG 2014: 33-40 - 2011
- [j1]Peng Xu, Rengkui Liu, Futian Wang, Quanxin Sun, Hualiang (Harry) Teng:
A Novel Description Method for Track Irregularity Evolution. Int. J. Comput. Intell. Syst. 4(6): 1358-1366 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint