default search action
Peiyan Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Xiaoyan Zhao, Ming Li, Peiyan Yuan:
An online energy-saving offloading algorithm in mobile edge computing with Lyapunov optimization. Ad Hoc Networks 163: 103580 (2024) - [j44]Baofang Chang, Yuchao Wang, Xiaoyan Zhao, Guoqiang Li, Peiyan Yuan:
A general-purpose edge-feature guidance module to enhance vision transformers for plant disease identification. Expert Syst. Appl. 237(Part C): 121638 (2024) - [j43]Xiaoyan Zhao, Jiale Zhang, Junna Zhang, Peiyan Yuan, Hu Jin, Xiangyang Li:
CooCo: A Collaborative Offloading and Resource Configuration Algorithm in Edge Networks. IEEE Internet Things J. 11(6): 10709-10721 (2024) - [j42]Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan:
Dependency-aware online task offloading based on deep reinforcement learning for IoV. J. Cloud Comput. 13(1): 136 (2024) - [c21]Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, Haojuan Zhang:
A Cloud-Edge Collaborative System for Object Detection Based on KubeEdge. CSCWD 2024: 248-253 - [c20]Xiaoyan Zhao, Fengxian Hou, Yan Kuang, Peiyan Yuan:
Cache Strategy for Joint Content Recommendation and D2D Collaboration. CSCWD 2024: 915-920 - [c19]Baofang Chang, Fuxiang Sun, Maodong Li, Peiyan Yuan, Hecang Zang, Hu Jin:
Gene Selection and Classification Method Based on SNR and Multi-loops BPSO. ICIC (LNBI 1) 2024: 73-84 - [c18]Haojuan Zhang, Yali Wang, Peiyan Yuan, Junna Zhang:
Energy- and Cost-Oriented Optimization of Hybrid Coded Storage in Edge Caching Systems. ICWS 2024: 92-99 - 2023
- [j41]Chunhong Liu, Haoyang Zhang, Jieyu Zhang, Zhengling Zhang, Peiyan Yuan:
Design of a Learning Path Recommendation System Based on a Knowledge Graph. Int. J. Inf. Commun. Technol. Educ. 19(1): 1-18 (2023) - [j40]Junna Zhang, Jiawei Chen, Xiang Bao, Chunhong Liu, Peiyan Yuan, Xinglin Zhang, Shangguang Wang:
Dependent task offloading mechanism for cloud-edge-device collaboration. J. Netw. Comput. Appl. 216: 103656 (2023) - [j39]Peiyan Yuan, Zhao Han, Xiaoyan Zhao:
Integrating the edge intelligence technology into image composition: A case study. Peer Peer Netw. Appl. 16(4): 1641-1651 (2023) - [j38]Peiyan Yuan, Rong Huang, Junna Zhang, En Zhang, Xiaoyan Zhao:
Accuracy Rate Maximization in Edge Federated Learning With Delay and Energy Constraints. IEEE Syst. J. 17(2): 2053-2064 (2023) - [j37]Junna Zhang, Guoxian Zhang, Xiang Bao, Chuntao Ding, Peiyan Yuan, Xinglin Zhang, Shangguang Wang:
Dependent Application Offloading in Edge Computing. IEEE Trans. Cloud Comput. 11(4): 3439-3451 (2023) - [j36]Peiyan Yuan, Saike Shao, Junna Zhang, Xiaoyan Zhao:
Cooperative edge offloading strategy for sensory data with delay and energy constraints. Wirel. Networks 29(8): 3469-3478 (2023) - 2022
- [j35]Peiyan Yuan, Saike Shao, Xiaoyan Huang:
RAPAR: Routing algorithm based on node relationship mining in opportunistic network. Peer-to-Peer Netw. Appl. 15(4): 1953-1963 (2022) - [j34]Peiyan Yuan, Shuhong Li, Yunyun Cai, Xiaoyan Zhao, Shaojie Tang, Xiang-Yang Li:
Maximizing the Capacity of Edge-Caching Networks With User-Content Evolution Relationship. IEEE Trans. Veh. Technol. 71(11): 12169-12178 (2022) - 2021
- [j33]Peiyan Yuan, Saike Shao, Lijuan Geng, Xiaoyan Zhao:
Caching hit ratio maximization in mobile edge computing with node cooperation. Comput. Networks 200: 108507 (2021) - [j32]Peiyan Yuan, Rong Huang:
Integrating the device-to-device communication technology into edge computing: A case study. Peer-to-Peer Netw. Appl. 14(2): 599-608 (2021) - [c17]Peiyan Yuan, Saike Shao, Lijuan Geng, Xiaoyan Zhao:
How Much Can Edge Offload? A Tradeoff Between the Delay and Energy Consumption. ANTS 2021: 448-451 - 2020
- [j31]Yunyun Cai, Peiyan Yuan:
Time-Varying Mobile Edge Computing for Capacity Maximization. IEEE Access 8: 142832-142842 (2020) - [j30]Peiyan Yuan, Yunyun Cai, Yihang Liu, Junna Zhang, Yali Wang, Xiaoyan Zhao:
ProRec: a unified content caching and replacement framework for mobile edge computing. Wirel. Networks 26(4): 2929-2941 (2020) - [c16]Peiyan Yuan, Hao Zhang, Xiaoyan Huang:
Disjoint-Path Routing Mechanism in Mobile Opportunistic Networks. ICPCSEE (1) 2020: 368-379
2010 – 2019
- 2019
- [j29]Peiyan Yuan, Xiaoxiao Pang, MingYang Song:
SSR: Using the Social Similarity to Improve the Data Forwarding Performance in Mobile Opportunistic Networks. IEEE Access 7: 44840-44850 (2019) - [j28]Yihang Liu, Peiyan Yuan:
Saliency Detection Using Global and Local Information Under Multilayer Cellular Automata. IEEE Access 7: 72736-72748 (2019) - [j27]Peiyan Yuan, Xiaoxiao Pang, Ping Liu, En Zhang:
FollowMe: One Social Importance-Based Collaborative Scheme in MONs. Future Internet 11(4): 98 (2019) - [j26]Peiyan Yuan, Yunyun Cai, Xiaoyan Huang, Shaojie Tang, Xiaoyan Zhao:
Collaboration Improves the Capacity of Mobile Edge Computing. IEEE Internet Things J. 6(6): 10610-10619 (2019) - [j25]Peiyan Yuan, Hao Zhang:
一种面向移动机会网络的能效性路由算法 (Energy Efficient Routing Algorithm in Mobile Opportunistic Networks). 计算机科学 46(11A): 387-392 (2019) - [c15]Peiyan Yuan, Yunyun Cai:
Contact Ratio Aware Mobile Edge Computing for Content Offloading. ICPADS 2019: 520-524 - 2018
- [j24]Peiyan Yuan, Hai Yu, Ping Liu:
Analysis of Student Online Interaction Behavior: A Social Relationship Perspective. EAI Endorsed Trans. e Learn. 5(18): e4 (2018) - [j23]Peiyan Yuan, Xiaoxiao Pang, Xiaoyan Zhao:
Influence of Crowd Participation Features on Mobile Edge Computing. Future Internet 10(10): 94 (2018) - [j22]Xiaoyan Zhao, Lilin Fan, Zhanao Xue, Peiyan Yuan:
Many-to-one D2D for content delivery in cellular networks. Int. J. Wirel. Mob. Comput. 14(1): 70-77 (2018) - [j21]Peiyan Yuan, Chenyang Wang:
OPPO: An optimal copy allocation scheme in mobile opportunistic networks. Peer-to-Peer Netw. Appl. 11(1): 102-109 (2018) - [j20]Xiaoyan Zhao, Peiyan Yuan, Haiwen li, Shaojie Tang:
Collaborative Edge Caching in Context-Aware Device-to-Device Networks. IEEE Trans. Veh. Technol. 67(10): 9583-9596 (2018) - 2017
- [j19]Peiyan Yuan, Wei Wang, MingYang Song:
Ties in Overlapping Community Structures: Strong or Weak? IEEE Access 5: 10012-10016 (2017) - [j18]Lilin Fan, Zhengnan Dong, Peiyan Yuan:
The Capacity of Device-to-Device Communication Underlaying Cellular Networks With Relay Links. IEEE Access 5: 16840-16846 (2017) - [j17]Xiaoyan Zhao, Peiyan Yuan, Yajun Chen, Pei Chen:
Femtocaching assisted multi-source D2D content delivery in cellular networks. EURASIP J. Wirel. Commun. Netw. 2017: 125 (2017) - [j16]Peiyan Yuan, Hai Yu:
A Combinational Buffer Management Scheme in Mobile Opportunistic Network. Future Internet 9(4): 82 (2017) - [j15]Peiyan Yuan, Shangwang Liu, En Zhang:
Modelling epidemic routing with heterogeneous infection rate. Int. J. High Perform. Comput. Netw. 10(3): 218-225 (2017) - [j14]Ping Liu, Peiyan Yuan, Chenyang Wang:
A Socially Aware Routing Protocol in Mobile Opportunistic Networks. J. Commun. 12(1): 62-71 (2017) - [j13]Peiyan Yuan, MingYang Song, Xiaoyan Zhao:
Effective and efficient collection of control messages for opportunistic routing algorithms. J. Netw. Comput. Appl. 98: 125-130 (2017) - [j12]Ping Liu, Peiyan Yuan:
移动自组织认知网络中的路由选择与信道分配方法 (Routing Selection and Channel Assignment Method for Mobile Ad Hoc Cognitive Network). 计算机科学 44(3): 140-144 (2017) - [j11]Honghai Wu, Huahong Ma, Liang Liu, Huadong Ma, Peiyan Yuan:
A traffic-camera assisted cache-and-relay routing for live video stream delivery in vehicular ad hoc networks. Wirel. Networks 23(7): 2051-2067 (2017) - [c14]Xiaoyan Zhao, Peiyan Yuan, Yajun Chen, Pei Chen:
Cooperative D2D for Content Delivery in Heterogeneous Networks. BigCom 2017: 265-271 - [c13]Peiyan Yuan, Honghai Wu, Xiaoyan Zhao, Zhengnan Dong:
Cache Potentiality of MONs: A Prime. ICDCS 2017: 2650-2653 - 2016
- [j10]Peiyan Yuan, Ping Liu, Shaojie Tang:
RIM: Relative-importance based data forwarding in people-centric networks. J. Netw. Comput. Appl. 62: 100-111 (2016) - [j9]Peiyan Yuan, Lilin Fan, Ping Liu, Shaojie Tang:
Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation. J. Netw. Comput. Appl. 62: 163-170 (2016) - [c12]Peiyan Yuan, Wei Wang, MingYang Song:
Detecting Overlapping Community Structures with PCA Technology and Member Index. MobiMedia 2016: 121-125 - 2015
- [j8]Peiyan Yuan, Yali Wang:
Modeling Opportunistic Social Networks with Decayed Aggregation Graph. J. Commun. 10(3): 213-220 (2015) - [j7]Peiyan Yuan, Ping Liu:
Data fusion prolongs the lifetime of mobile sensing networks. J. Netw. Comput. Appl. 49: 51-59 (2015) - [j6]En Zhang, Peiyan Yuan, Jiao Du:
Verifiable Rational Secret Sharing Scheme in Mobile Networks. Mob. Inf. Syst. 2015: 462345:1-462345:7 (2015) - [j5]Peiyan Yuan, Huadong Ma, Huiyuan Fu:
Hotspot-entropy based data forwarding in opportunistic social networks. Pervasive Mob. Comput. 16: 136-154 (2015) - [j4]Layuan Li, Chunlin Li, Peiyan Yuan:
An Energy Level Based Routing Protocol in Ad Hoc Networks. Wirel. Pers. Commun. 81(3): 981-996 (2015) - [c11]Peiyan Yuan, Ping Liu:
Inter Action Time in Virtual and Physical Spaces: A Comparative Study. HOTPOST@MobiHoc 2015: 37-41 - [c10]Peiyan Yuan, Wei Wang, Chenyang Wang:
Poster: An Adaptive Copy Spraying Scheme for Data Forwarding in Mobile Opportunistic Networks. MobiHoc 2015: 377-378 - 2014
- [j3]Huadong Ma, Dong Zhao, Peiyan Yuan:
Opportunities in mobile crowd sensing. IEEE Commun. Mag. 52(8): 29-35 (2014) - [j2]Peiyan Yuan, Huadong Ma:
Differentiation forwarding with hotspot. Int. J. Ad Hoc Ubiquitous Comput. 15(4): 227-238 (2014) - [c9]Peiyan Yuan, Ping Liu, Shaojie Tang:
Exploiting Partial Centrality of Nodes for Data Forwarding in Mobile Opportunistic Networks. CSE 2014: 1435-1442 - 2013
- [j1]Peiyan Yuan, Hua-Dong Ma, Peng-Rui Duan:
Impact of Strangers on Opportunistic Routing Performance. J. Comput. Sci. Technol. 28(3): 574-582 (2013) - [c8]Peiyan Yuan, Huadong Ma:
Fuzzy forwarding for opportunistic networks. ICC 2013: 1501-1505 - [c7]Peiyan Yuan, Huadong Ma:
Opportunistic forwarding with hotspot entropy. WOWMOM 2013: 1-9 - 2012
- [c6]Peiyan Yuan, Huadong Ma:
Impact of infection rate on scaling law of epidemic routing. WCNC 2012: 2934-2939 - [c5]Dong Zhao, Huadong Ma, Peiyan Yuan, Liang Liu:
Differentiated probabilistic forwarding for extending the lifetime of opportunistic networks. WCNC 2012: 3002-3007 - [c4]Peiyan Yuan, Huadong Ma:
Hug: Human gathering point based routing for opportunistic networks. WCNC 2012: 3024-3029 - 2011
- [c3]Peiyan Yuan, Huadong Ma, XuFei Mao:
The dissemination speed of correlated messages in opportunistic networks. ISCC 2011: 309-315 - [c2]Peiyan Yuan, Huadong Ma, Pengrui Duan:
On Exploiting Few Strangers for Data Forwarding in Delay Tolerant Networks. MSN 2011: 282-288
2000 – 2009
- 2006
- [c1]Layuan Li, Chunlin Li, Peiyan Yuan:
An Energy Level Based Routing Protocol in Ad Hoc Networks. IAT 2006: 306-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint