default search action
Gen Li 0002
Person information
- affiliation: National University of Defense Technology, Changsha, China
Other persons with the same name
- Gen Li — disambiguation page
- Gen Li 0001 — Beijing University of Posts and Telecommunications
- Gen Li 0003 — Tianjin University, China
- Gen Li 0004 — University of Michigan, Ann Arbor, MI, USA (and 2 more)
- Gen Li 0005 — Chinese University of Hong Kong, Department of Statistics, Hong Kong (and 2 more)
- Gen Li 0006 — Cardiff University, School of Engineering, UK
- Gen Li 0007 — Genetalks Biotech Inc., Beijing, China
- Gen Li 0008 — University of Edinburgh, UK
- Gen Li 0009 — Chinese Academy of Sciences, Guangzhou Institute of Advanced Technology, China (and 1 more)
- Gen Li 0010 — ETH Zurich, Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c21]Ying Zhang, Gen Li, Lei Wang:
A High-Performance with Low-Resource Utility FPGA Implementation of Variable Size HEVC 2D-DCT Transform. ACA 2020: 325-333
2010 – 2019
- 2019
- [j8]Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking. Frontiers Comput. Sci. 13(2): 247-263 (2019) - 2018
- [j7]Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:
A survey of the double-fetch vulnerabilities. Concurr. Comput. Pract. Exp. 30(6) (2018) - [j6]Kai Lu, Peng-Fei Wang, Gen Li, Xu Zhou:
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory. J. Comput. Sci. Technol. 33(3): 587-602 (2018) - 2017
- [j5]Gen Li, Ke Ma, Jian Sun, Gui Jin, Mingxin Qin, Hua Feng:
Twenty-Four-Hour Real-Time Continuous Monitoring of Cerebral Edema in Rabbits Based on a Noninvasive and Noncontact System of Magnetic Induction. Sensors 17(3): 537 (2017) - [c20]Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro:
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. USENIX Security Symposium 2017: 1-16 - 2016
- [c19]Xinglu He, Kai Lu, Gen Li:
Taint Reverse Propagation for Analysis of Privacy Leak. Trustcom/BigDataSE/ISPA 2016: 1718-1722 - [c18]Huijun Wu, Liming Zhu, Kai Lu, Gen Li, Dongyao Wu:
StageFS: A Parallel File System Optimizing Metadata Performance for SSD Based Clusters. Trustcom/BigDataSE/ISPA 2016: 2147-2152 - 2014
- [j4]Kai Lu, Xiaoping Wang, Gen Li, Ruibo Wang, Wanqing Chi, Yongpeng Liu, Hong-Wei Tang, Hua Feng, Yinghui Gao:
Iaso: an autonomous fault-tolerant management system for supercomputers. Frontiers Comput. Sci. 8(3): 378-390 (2014) - [c17]Gen Li, Shuangxi Wang, Ying Zhang, Xiaohui Peng:
Hunter: Online Accurate Taint Propagation Analysis Based System for Detecting Bugs in Binaries. DASC 2014: 69-74 - [c16]Xu Zhou, Gen Li, Kai Lu, Shuangxi Wang:
Enhancing the Security of Parallel Programs via Reducing Scheduling Space. DASC 2014: 133-138 - [c15]Gen Li, Ying Zhang, Shuangxi Wang, Kai Lu:
Online Taint Propagation Analysis with Precise Pointer-to Analysis for Detecting Bugs in Binaries. HPCC/CSS/ICESS 2014: 778-784 - [c14]Ying Zhang, Gen Li, Caixia Sun, Hongwei Zhou, Fayuan Wang:
Exploiting the Inter-cluster Record Reuse for Stream Processors. HPCC/CSS/ICESS 2014: 916-921 - 2013
- [j3]Xu Zhou, Kai Lu, Xiaoping Wang, Wenzhe Zhang, Kai Zhang, Xu Li, Gen Li:
Deterministic Message Passing for Distributed Parallel Computing. IEICE Trans. Inf. Syst. 96-D(5): 1068-1077 (2013) - [c13]Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, Pingjing Lu:
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor. GPC 2013: 317-325 - [c12]Ying Zhang, Gen Li, Hongwei Zhou, Pingjing Lu, Caixia Sun, Qiang Dou:
Mapping and Optimizing 2-D Scientific Applications on a Stream Processor. MUE 2013: 449-457 - [c11]Kai Lu, Xu Zhou, Xiaoping Wang, Wenzhe Zhang, Gen Li:
RaceFree: an efficient multi-threading model for determinism. PPoPP 2013: 297-298 - 2010
- [j2]Weixia Xu, Qiang Dou, Ying Zhang, Gen Li, Xuejun Yang:
Exploiting Loop-Carried Stream Reuse for Scientific Computing Applications on the Stream Processor. Int. J. Commun. Netw. Syst. Sci. 3(1): 32-37 (2010) - [j1]Xuejun Yang, Ying Zhang, Xicheng Lu, Jingling Xue, Ian Rogers, Gen Li, Guibin Wang, Xudong Fang:
Exploiting the reuse supplied by loop-dependent stream references for stream processors. ACM Trans. Archit. Code Optim. 7(2): 11:1-11:35 (2010)
2000 – 2009
- 2009
- [c10]Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:
Decoupling Dynamic Test Generation from Specific Operating System Details Based on Whole System Virtual Machine. FCST 2009: 649-654 - [c9]Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:
Architecture- and OS-Independent Binary-Level Dynamic Test Generation. ICICS 2009: 198-210 - [c8]Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang:
Mixing Concrete and Symbolic Execution to Improve the Performance of Dynamic Test Generation. NTMS 2009: 1-5 - 2008
- [c7]Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers, Gen Li, Guibin Wang:
Exploiting loop-dependent stream reuse for stream processors. PACT 2008: 22-31 - [c6]Ying Zhang, Qiang Dou, Gen Li, Xuejun Yang, Yongjin Li, Caixia Huang:
Mapping and Optimizing 2-D Jacobi Iteration on a Stream Processor. HPCC 2008: 389-396 - [c5]Ying Zhang, Xuejun Yang, Guibin Wang, Ian Rogers, Gen Li, Yu Deng, Xiaobo Yan:
Scientific Computing Applications on a Stream Processor. ISPASS 2008: 105-114 - 2007
- [c4]Ying Zhang, Gen Li, Xuejun Yang, Kun Zeng:
Optimizing Stream Organization to Improve the Performance of Scientific Computing Applications on the Stream Processor. ICA3PP 2007: 198-209 - [c3]Ying Zhang, Gen Li, Xuejun Yang:
Recognition and Optimization of Loop-Carried Stream Reusing of Scientific Computing Applications on the Stream Processor. International Conference on Computational Science (1) 2007: 474-481 - [c2]Ying Zhang, Gen Li, Xuejun Yang:
Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor. ICCSA (3) 2007: 353-366 - [c1]Ying Zhang, Tao Tang, Gen Li, Xuejun Yang:
Implementation and Optimization of Dense LU Decomposition on the Stream Processor. PPAM 2007: 78-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint