default search action
Kai Nie
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j9]Wei Li, Peilin Wang, Wencheng Cheng, Kai Nie:
Transnational remanufacturing decisions under carbon taxes and tariffs. Eur. J. Oper. Res. 312(1): 150-163 (2024) - [j8]Chaoyang Zhang, Hang Xue, Kai Nie, Xihui Wu, Zhengzheng Lou, Shouyi Yang, Qinglei Zhou, Shizhe Hu:
Nice to meet images with Big Clusters and Features: A cluster-weighted multi-modal co-clustering method. Inf. Process. Manag. 61(5): 103735 (2024) - [j7]Shuang Tian, Qinghua Song, Jialin He, Yihan Wang, Kai Nie, Gang Du, Ling Bu:
Implementation of JPEG XS entropy encoding and decoding on FPGA. J. Real Time Image Process. 21(2): 34 (2024) - 2023
- [j6]Zhanwen Shi, Erbao Cao, Kai Nie:
Capacity pooling games in crowdsourcing services. Electron. Commer. Res. 23(2): 1007-1047 (2023) - 2020
- [j5]Kai Nie, Pascal A. Baltzer, Bernhard Preim, Gabriel Mistelbauer:
Knowledge-Assisted Comparative Assessment of Breast Cancer using Dynamic Contrast-Enhanced Magnetic Resonance Imaging. Comput. Graph. Forum 39(3): 13-23 (2020) - 2019
- [j4]Kai Nie, Yunling Wang, Xiaoling Tao:
Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing. Int. J. Embed. Syst. 11(6): 707-718 (2019) - 2018
- [j3]Hui Liu, Rongcai Zhao, Kai Nie:
Using Ensemble Learning to Improve Automatic Vectorization of Tensor Contraction Program. IEEE Access 6: 47112-47124 (2018) - [j2]Kai Nie, Qinglei Zhou, Weijun Zhu, Chaoyang Zhang:
基于时序逻辑的3种网络攻击建模 (Modeling for Three Kinds of Network Attacks Based on Temporal Logic). 计算机科学 45(2): 209-214 (2018) - 2017
- [j1]Miaolei Deng, Kai Nie, Weijun Zhu, Chunyan Zhang:
The detection of Udpstorm attacks based on model checking linear temporal logic. Autom. Control. Comput. Sci. 51(3): 174-179 (2017)
Conference and Workshop Papers
- 2023
- [c9]Zhuohui Cui, Kai Nie, Shouliang Qi, Che Hou, Wenjie Chen:
A Robust Gray-code Pattern Decoding Method for 3D Scanning with Structured Light. ICCVIT 2023: 9:1-9:5 - 2021
- [c8]Kai Nie, Qinglei Zhou, Hong Qian, Jianmin Pang, Jinlong Xu, Yapeng Li:
Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors. ICPCSEE (1) 2021: 163-179 - [c7]Jinying Kong, Kai Nie, Qinglei Zhou, Jinlong Xu, Lin Han:
Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors. ICPCSEE (1) 2021: 180-189 - 2018
- [c6]Kai Nie, Gabriel Mistelbauer, Bernhard Preim:
Classification of Lobular and Ductal Breast Carcinomas by Texture Analysis in DCE-MRI Data. Bildverarbeitung für die Medizin 2018: 67-72 - 2017
- [c5]Yingjie Han, Qinglei Zhou, Linfeng Jiao, Kai Nie, Chunyan Zhang, Weijun Zhu:
Model Checking for Computation Tree Logic with Past Based on DNA Computing. BIC-TA 2017: 131-147 - [c4]Kai Nie, Sylvia Glaßer, Uli Niemann, Gabriel Mistelbauer, Bernhard Preim:
Classification of DCE-MRI Data for Breast Cancer Diagnosis Combining Contrast Agent Dynamics and Texture Features. Bildverarbeitung für die Medizin 2017: 325-330 - 2016
- [c3]Weijun Zhu, Yanfeng Wang, Qinglei Zhou, Kai Nie:
Model Checking Computational Tree Logic Using Sticker Automata. BIC-TA (1) 2016: 12-20 - [c2]Qiusheng He, Zhiyi Sun, Kai Nie, Wei Chen:
Sky images enhancement under complex weather conditions. ICIA 2016: 1490-1495 - 2011
- [c1]Xin-shuang Zhao, Kai Nie, Hou-xiang Wang:
Research on Equipment Effectiveness Evaluation with Weight Random Variables. ISCID (1) 2011: 12-14
Informal and Other Publications
- 2017
- [i2]Weijun Zhu, Kai Nie:
Aiming to Detect a malware of GSM frequency. CoRR abs/1705.04785 (2017) - 2013
- [i1]Kai Nie, Man Yu:
Research on fresh agriculture product based on overconfidence of the retailer under options and spot markets dominated. CoRR abs/1312.2203 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint