default search action
Wensheng Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Hua Ma, Jingze Li, Haibin Zhu, Wensheng Tang, Zhuoxuan Huang, Yuqi Tang:
Collaborative Optimization of Learning Team Formation Based on Multidimensional Characteristics and Constraints Modeling: A Team Leader-Centered Approach via E-CARGO. IEEE Trans. Comput. Soc. Syst. 11(1): 184-196 (2024) - [j29]Lin Xiao, Penglin Cao, Wentong Song, Liu Luo, Wensheng Tang:
A Fixed-Time Noise-Tolerance ZNN Model for Time-Variant Inequality-Constrained Quaternion Matrix Least-Squares Problem. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10503-10512 (2024) - [j28]Lin Xiao, Xiaopeng Li, Penglin Cao, Yongjun He, Wensheng Tang, Jichun Li, Yaonan Wang:
A Dynamic-Varying Parameter Enhanced ZNN Model for Solving Time-Varying Complex-Valued Tensor Inversion With Its Application to Image Encryption. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13681-13690 (2024) - [j27]Wensheng Tang, Dejun Dong, Shijie Li, Chengpeng Wang, Peisen Yao, Jinguo Zhou, Charles Chuan Zhang:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. ACM Trans. Softw. Eng. Methodol. 33(3): 66:1-66:33 (2024) - [c29]Bowen Zhang, Wei Chen, Peisen Yao, Chengpeng Wang, Wensheng Tang, Charles Zhang:
SIRO: Empowering Version Compatibility in Intermediate Representations via Program Synthesis. ASPLOS (3) 2024: 882-899 - [c28]Hua Ma, Peiji Huang, Xi Luo, Qiong Huang, Xiangru Fu, Wensheng Tang:
Teaching Early Warning Approach for Teachers based on Cognitive Diagnosis and Long Short-term Memory. CSCWD 2024: 3030-3035 - [c27]Rongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao, Charles Zhang:
LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems. ICSE 2024: 105:1-105:13 - 2023
- [j26]Hua Ma, Zhuoxuan Huang, Haibin Zhu, Wensheng Tang, Hongyu Zhang, Keqin Li:
Predicting examinee performance based on a fuzzy cloud cognitive diagnosis framework in e-learning environment. Soft Comput. 27(24): 18949-18969 (2023) - [j25]Hua Ma, Zhuoxuan Huang, Wensheng Tang, Haibin Zhu, Hong-Yu Zhang, Jingze Li:
Predicting Student Performance in Future Exams via Neutrosophic Cognitive Diagnosis in Personalized E-Learning Environment. IEEE Trans. Learn. Technol. 16(5): 680-693 (2023) - [j24]Lin Xiao, Yongjun He, Yaonan Wang, Jianhua Dai, Ran Wang, Wensheng Tang:
A Segmented Variable-Parameter ZNN for Dynamic Quadratic Minimization With Improved Convergence and Robustness. IEEE Trans. Neural Networks Learn. Syst. 34(5): 2413-2424 (2023) - [c26]Hua Ma, Wen Zhao, Zixu Jiang, Peiji Huang, Wensheng Tang, Hongyu Zhang:
A Multi-level Approach to Learning Early Warning based on Cognitive Diagnosis and Learning Behaviors Analysis. CSCWD 2023: 468-473 - [c25]Chengpeng Wang, Peisen Yao, Wensheng Tang, Gang Fan, Charles Zhang:
Synthesizing Conjunctive Queries for Code Search. ECOOP 2023: 36:1-36:30 - [c24]Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang:
DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems. ASE 2023: 914-925 - [i1]Chengpeng Wang, Peisen Yao, Wensheng Tang, Gang Fan, Charles Zhang:
Synthesizing Conjunctive Queries for Code Search. CoRR abs/2305.04316 (2023) - 2022
- [j23]Chengpeng Wang, Peisen Yao, Wensheng Tang, Qingkai Shi, Charles Zhang:
Complexity-guided container replacement synthesis. Proc. ACM Program. Lang. 6(OOPSLA1): 1-31 (2022) - [c23]Zhuoxuan Huang, Hua Ma, Wensheng Tang, Jingze Li:
Collaborative Prediction of Examinee Performance based on Fuzzy Cognitive Diagnosis via cloud model. CSCWD 2022: 286-291 - [c22]Lingyuan Kong, Hua Ma, Yan Peng, Wensheng Tang:
Hybrid Recommendation of Personalized MOOC Resources: A User Context-aware Approach. CSCWD 2022: 537-542 - [c21]Hua Ma, Zhuoxuan Huang, Wensheng Tang, Xuxiang Zhang:
Exercise Recommendation Based on Cognitive Diagnosis and Neutrosophic Set. CSCWD 2022: 1467-1472 - 2021
- [j22]Lin Xiao, Haiyan Tan, Jianhua Dai, Lei Jia, Wensheng Tang:
High-order error function designs to compute time-varying linear matrix equations. Inf. Sci. 576: 173-186 (2021) - [j21]Hua Ma, Wensheng Tang, Haibin Zhu, Hongyu Zhang:
Resource Utilization-Aware Collaborative Optimization of IaaS Cloud Service Composition for Data-Intensive Applications. IEEE Trans. Syst. Man Cybern. Syst. 51(2): 1322-1333 (2021) - [j20]Wenjun Yang, Pingping Dong, Lin Cai, Wensheng Tang:
Loss-Aware Throughput Estimation Scheduler for Multi-Path TCP in Heterogeneous Wireless Networks. IEEE Trans. Wirel. Commun. 20(5): 3336-3349 (2021) - [c20]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. ISSTA 2021: 322-335 - [c19]Wensheng Tang, Yikun Hu, Gang Fan, Peisen Yao, Rongxin Wu, Guangyuan Bai, Pengcheng Wang, Charles Zhang:
Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems. ASE 2021: 829-841 - [c18]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Skeletal approximation enumeration for SMT solver testing. ESEC/SIGSOFT FSE 2021: 1141-1153 - 2020
- [j19]Lin Xiao, Yongsheng Zhang, Qiuyue Zuo, Jianhua Dai, Jichun Li, Wensheng Tang:
A Noise-Tolerant Zeroing Neural Network for Time-Dependent Complex Matrix Inversion Under Various Kinds of Noises. IEEE Trans. Ind. Informatics 16(6): 3757-3766 (2020) - [c17]Xuping He, Wensheng Tang, Jia Liu, Bo Yang, Shengchun Wang:
Research on Educational Data Mining Based on Big Data. eLEOT (2) 2020: 265-278 - [c16]Jia Liu, Wensheng Tang, Xuping He, Bo Yang, Shengchun Wang:
Research on DINA Model in Online Education. eLEOT (2) 2020: 279-291 - [c15]Hua Zhong, Pingping Dong, Wensheng Tang, Bo Yang, Jingyun Xie:
A Short Flows Fast Transmission Algorithm Based on MPTCP Congestion Control. ICAIS (1) 2020: 786-797
2010 – 2019
- 2019
- [j18]Pingping Dong, Wenjun Yang, Kaiping Xue, Wensheng Tang, Kai Gao, Jiawei Huang:
Tuning the Aggressive Slow-Start Behavior of MPTCP for Short Flows. IEEE Access 7: 6010-6024 (2019) - [j17]Pingping Dong, Jingyun Xie, Wensheng Tang, Naixue Xiong, Hua Zhong, Athanasios V. Vasilakos:
Performance Evaluation of Multipath TCP Scheduling Algorithms. IEEE Access 7: 29818-29825 (2019) - [j16]Xiaoping Lou, Hu Long, Wensheng Tang, Yuguang Yang, Jian Li:
Continuous-Variable Arbitrated Quantum Signature Based on Dense Coding and Teleportation. IEEE Access 7: 85719-85726 (2019) - [j15]Wensheng Tang, Yunshan Fu, Pingping Dong, Wenjun Yang, Bo Yang, Naixue Xiong:
A MPTCP Scheduler Combined With Congestion Control for Short Flow Delivery in Signal Transmission. IEEE Access 7: 116195-116206 (2019) - [j14]Wensheng Tang, Jingjing Zhang:
Symmetric integrators based on continuous-stage Runge-Kutta-Nyström methods for reversible systems. Appl. Math. Comput. 361: 1-12 (2019) - [j13]Wensheng Tang, Yajuan Sun, Jingjing Zhang:
High order symplectic integrators based on continuous-stage Runge-Kutta-Nyström methods. Appl. Math. Comput. 361: 670-679 (2019) - [j12]Pingping Dong, Kai Gao, Jingyun Xie, Wensheng Tang, Naixue Xiong, Athanasios V. Vasilakos:
Receiver-Side TCP Countermeasure in Cellular Networks. Sensors 19(12): 2791 (2019) - [j11]Hua Ma, Haibin Zhu, Keqin Li, Wensheng Tang:
Collaborative Optimization of Service Composition for Data-Intensive Applications in a Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 30(5): 1022-1035 (2019) - [c14]Wensheng Tang:
Identifying error code misuses in complex system. ISSTA 2019: 428-432 - 2018
- [j10]Wensheng Tang, Jingjing Zhang:
Symplecticity-preserving continuous-stage Runge-Kutta-Nyström methods. Appl. Math. Comput. 323: 204-219 (2018) - [j9]Wensheng Tang:
A note on continuous-stage Runge-Kutta methods. Appl. Math. Comput. 339: 231-241 (2018) - [j8]Pingping Dong, Wenjun Yang, Wensheng Tang, Jiawei Huang, Haodong Wang, Yi Pan, Jianxin Wang:
Reducing transport latency for short flows with multipath TCP. J. Netw. Comput. Appl. 108: 20-36 (2018) - [j7]Xiaoping Lou, Wensheng Tang, Xiaoxiao Chen:
A high capacity quantum weak blind signature based on logistic chaotic maps. Quantum Inf. Process. 17(10): 251 (2018) - [c13]Hua Ma, Yuepeng Chen, Haibin Zhu, Hongyu Zhang, Wensheng Tang:
Optimization of Cloud Service Composition for Data-intensive Applications via E-CARGO. CSCWD 2018: 785-789 - [c12]Chen Ling, Wensheng Tang, Pingping Dong, Wenjun Yang, Xiaoping Lou, Hangjun Zhou:
Blocking Time-Based MPTCP Scheduler for Heterogeneous Networks. ICCCS (1) 2018: 364-375 - 2017
- [j6]Hua Ma, Haibin Zhu, Zhigang Hu, Wensheng Tang, Pingping Dong:
Multi-valued collaborative QoS prediction for cloud service via time series analysis. Future Gener. Comput. Syst. 68: 275-288 (2017) - [j5]Wensheng Tang, Yajuan Sun, Wenjun Cai:
Discontinuous Galerkin methods for Hamiltonian ODEs and PDEs. J. Comput. Phys. 330: 340-364 (2017) - [j4]Hua Ma, Haibin Zhu, Zhigang Hu, Keqin Li, Wensheng Tang:
Time-aware trustworthiness ranking prediction for cloud services using interval neutrosophic set and ELECTRE. Knowl. Based Syst. 138: 27-45 (2017) - 2016
- [j3]Wensheng Tang, Guangming Lang, Xuqiong Luo:
Construction of symplectic (partitioned) Runge-Kutta methods with continuous stage. Appl. Math. Comput. 286: 279-287 (2016) - 2014
- [j2]Wensheng Tang, Yajuan Sun:
Construction of Runge-Kutta type methods for solving ordinary differential equations. Appl. Math. Comput. 234: 179-191 (2014) - 2012
- [j1]Wensheng Tang, Yajuan Sun:
Time finite element methods: A unified framework for numerical discretizations of ODEs. Appl. Math. Comput. 219(4): 2158-2179 (2012) - 2011
- [c11]Shengchun Wang, Wensheng Tang:
Pavement Crack Segmentation Algorithm Based on Local Optimal Threshold of Cracks Density Distribution. ICIC (1) 2011: 298-302 - [c10]Wensheng Tang, Shaohua Jiang, Shulin Wang:
Gray Scale Potential Theory of Sparse Image. ICIC (1) 2011: 357-363 - [c9]Boyun Zhang, Zhigang Chen, Wensheng Tang, Qiang Fan, Xiai Yan, Shulin Wang:
Network Security Situation Assessment Based on Stochastic Game Model. ICIC (1) 2011: 517-525 - 2010
- [c8]Shaohua Jiang, Cheng Wang, Xuejun Xu, Wensheng Tang, Hongbo Zhu, Xuesong Chen:
Fast Algorithm for Multisource Image Registration Based on Geometric Feature of Corners. ICIC (1) 2010: 438-446
2000 – 2009
- 2008
- [c7]Wensheng Tang, Wangqiu Kuang, Bibo Wang, Jian Yang:
E3NP: An Energy-Efficient, Expeditious Network Reprogramming Mechanism in Wireless Sensor Network. ICESS 2008: 516-523 - [c6]Wensheng Tang, Wangqiu Kuang, Dingxing Zhang:
A Novel Approach to Mobile Positioning Tracking. ICYCS 2008: 498-503 - [c5]Shaogang Wang, Dan Wu, Zhengbin Pang, Wensheng Tang, Xiaodong Yang:
Lowering the Overhead of Hybrid Transactional Memory with Transact Cache. ICYCS 2008: 1314-1319 - 2007
- [c4]Wensheng Tang, Shaogang Wang, Dan Wu, Wangqiu Kuang:
A SWP Specification for Sequential Image Processing Algorithms. Asia-Pacific Computer Systems Architecture Conference 2007: 244-255 - [c3]Dingxing Zhang, Ming Xu, Wei Xiao, Junwen Gao, Wensheng Tang:
Minimization of the Redundant Sensor Nodes in Dense Wireless Sensor Networks. ICES 2007: 355-367 - 2006
- [c2]Boyun Zhang, Jianping Yin, Wensheng Tang, Jingbo Hao, Dingxing Zhang:
Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine. IJCNN 2006: 2583-2587 - [c1]Shulin Wang, Ji Wang, Huowang Chen, Wensheng Tang:
The Classification of Tumor Using Gene Expression Profile Based on Support Vector Machines and Factor Analysis. ISDA (2) 2006: 471-476
Coauthor Index
aka: Charles Chuan Zhang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint