default search action
Yuanli Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Jiahang Li, Taoyu Chen, Yuanli Wang:
Trace and Edit Relation Associations in GPT. CoRR abs/2401.02976 (2024) - [i1]Yuanli Wang, Lei Huang:
Efficient Data Distribution Estimation for Accelerated Federated Learning. CoRR abs/2406.01774 (2024) - 2022
- [j2]Minglu Chi, Rongsheng Liu, Cheng Chang, Yuanli Wang, Huadong Zheng, Xiaoyan Qian, Qinchao Ren, Ruihua Ren:
Bivariable magnetic moment control of a Capsule Endoscope. Int. J. Robotics Autom. 37(6) (2022) - [c12]Yuanli Wang, Baiqing Lyu, Vasiliki Kalavri:
The non-expert tax: quantifying the cost of auto-scaling in cloud-based data stream analytics. BiDEDE@SIGMOD 2022: 7:1-7:7 - [c11]Esmail Asyabi, Yuanli Wang, John Liagouris, Vasiliki Kalavri, Azer Bestavros:
A new benchmark harness for systematic and robust evaluation of streaming state stores. EuroSys 2022: 559-574 - [c10]Joel Wolfrath, Nikhil Sreekumar, Dhruv Kumar, Yuanli Wang, Abhishek Chandra:
HACCS: Heterogeneity-Aware Clustered Client Selection for Accelerated Federated Learning. IPDPS 2022: 985-995 - 2021
- [j1]Minglu Chi, Yuanli Wang, Jianxia Zhang, Aimin Zhang, Jingcai Bai, Junxiao Wu:
Steering driving characteristics of a Capsule robot in Multiple bending Environment. Int. J. Robotics Autom. 36(2) (2021) - [c9]Yuanli Wang, Joel Wolfrath, Nikhil Sreekumar, Dhruv Kumar, Abhishek Chandra:
Accelerated Training via Device Similarity in Federated Learning. EdgeSys@EuroSys 2021: 31-36 - [c8]Andrew Yoo, Yuanli Wang, Ritesh Sinha, Shuai Mu, Tianyin Xu:
Fail-slow fault tolerance needs programming support. HotOS 2021: 228-235 - 2020
- [c7]Yuanli Wang, Dhruv Kumar, Abhishek Chandra:
Poster: Exploiting Data Heterogeneity for Performance and Reliability in Federated Learning. SEC 2020: 164-166
2010 – 2019
- 2018
- [c6]Chenchen Liu, Yi Zhong, Yuanli Wang, Xiu Xiong:
Intelligent fault diagnosis of air conditioning system in electric bus. ICNSC 2018: 1-6 - [c5]Chenchen Liu, Yi Zhong, Yuanli Wang:
Improved Detection of User Malicious Behavior through Log Mining based on IHMM. ICSAI 2018: 1193-1198
2000 – 2009
- 2006
- [c4]Yuanli Wang, Xianghui Liu, Jianping Yin:
Requirements of Quality of Service in Wireless Sensor Network. ICN/ICONS/MCL 2006: 116 - [c3]Yuanli Wang, Samuel Murgie:
Hybrid Mesh Generation for Viscous Flow Simulation. IMR 2006: 109-126 - [c2]Yuanli Wang, Xianghui Liu, Jing Ning, Jianping Yin, Yongan Wu:
Algorithms for Delay Constrained and Energy Efficiently Routing in Wireless Sensor Network. WASA 2006: 632-642 - 2005
- [c1]Yuanli Wang, François Guibault, Ricardo Camarero:
Automatic Near-Body Domain Decomposition Using the Eikonal Equation. IMR 2005: 91-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint