default search action
Ke Xia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ke Xia, Lei Zhang, Haifeng Zhang:
Multifunction Applications of Filtering Dielectric Resonator Antenna Based on Liquid Crystal. Sensors 24(1): 115 (2024) - [c9]Ke Xia, Sheng Wei:
DM-TEE: Trusted Execution Environment for Disaggregated Memory. ACM Great Lakes Symposium on VLSI 2024: 204-209 - 2023
- [c8]Ke Xia, Sheng Wei:
DF-TEE: Trusted Execution Environment for Disaggregated Multi-FPGA Cloud Systems. AsianHOST 2023: 1-6 - 2021
- [j6]Ke Xia:
The characteristics of average abundance function of multi-player threshold public goods evolutionary game model under redistribution mechanism. Appl. Math. Comput. 392: 125733 (2021) - [j5]Yi Xu, Xianglong Liu, Binshuai Wang, Renshuai Tao, Ke Xia, Xianbin Cao:
Fast Nearest Subspace Search via Random Angular Hashing. IEEE Trans. Multim. 23: 342-352 (2021) - [j4]Yan Wu, Xianglong Liu, Haotong Qin, Ke Xia, Sheng Hu, Yuqing Ma, Meng Wang:
Boosting Temporal Binary Coding for Large-Scale Video Search. IEEE Trans. Multim. 23: 353-364 (2021) - [c7]Ke Xia, Yukui Luo, Xiaolin Xu, Sheng Wei:
SGX-FPGA: Trusted Execution Environment for CPU-FPGA Heterogeneous Architecture. DAC 2021: 301-306 - [c6]Xianglong Feng, Mengmei Ye, Ke Xia, Sheng Wei:
Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification. DATE 2021: 786-789 - 2020
- [i1]Weidi Wang, Zeyuan Wang, Yinghui Zhang, Bo Sun, Ke Xia:
Learning Order Parameters from Videos of Dynamical Phases for Skyrmions with Neural Networks. CoRR abs/2012.06308 (2020)
2010 – 2019
- 2019
- [j3]Yeguang Li, Liang Hu, Ke Xia, Jie Luo:
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. EURASIP J. Image Video Process. 2019: 51 (2019) - 2018
- [c5]Binshuai Wang, Xianglong Liu, Ke Xia, Kotagiri Ramamohanarao, Dacheng Tao:
Random Angular Projection for Fast Nearest Subspace Search. PCM (1) 2018: 15-26 - 2017
- [c4]Ke Xia, Yuqing Ma, Xianglong Liu, Yadong Mu, Li Liu:
Temporal Binary Coding for Large-Scale Video Search. ACM Multimedia 2017: 333-341 - 2016
- [c3]Yeguang Li, Ke Xia:
Fast Video Deduplication via Locality Sensitive Hashing with Similarity Ranking. ICIMCS 2016: 94-98 - [c2]Ke Xia, Zhengxin Weng:
Workpieces sorting system based on industrial robot of machine vision. ICSAI 2016: 422-426
2000 – 2009
- 2009
- [c1]Weijin Jiang, Yuhui Xu, Dejia Shi, Ke Xia:
A novel dynamic clustering algorithm and its application in fuzzy modeling. GrC 2009: 284-289 - 2004
- [j2]Tingjun Hou, Ke Xia, Wei Zhang, Xiaojie Xu:
ADME Evaluation in Drug Discovery. 4. Prediction of Aqueous Solubility Based on Atom Contribution Approach. J. Chem. Inf. Model. 44(1): 266-275 (2004) - [j1]Tingjun Hou, Wei Zhang, Ke Xia, Xuebin Qiao, Xiaojie Xu:
ADME Evaluation in Drug Discovery. 5. Correlation of Caco-2 Permeation with Simple Molecular Properties. J. Chem. Inf. Model. 44(5): 1585-1600 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint