Home > Research > Distributed Systems > Publications & Outputs
View graph of relations

Distributed Systems

  1. Journal article
  2. Published

    Machine Learning in Compiler Optimization

    Wang, Z. & O'Boyle, M., 11/2018, In: Proceedings of the IEEE . 106, 11, p. 1879-1901 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. E-pub ahead of print

    Adaptive Web Browsing on Mobile Heterogeneous Multi-cores

    Ren, J., Wang, X., Fang, J., Feng, Y. & Wang, Z., 24/09/2018, (E-pub ahead of print) In: IEEE Computer Architecture Letters. 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    SleepGuard: capturing rich sleep information using smartwatch sensing data

    Chang, L., Lu, J., Wang, J., Chen, X., Fang, D., Tang, Z., Nurmi, P. T. & Wang, Z., 09/2018, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2, 3, 34 p., 98.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

    Tang, Z., Li, M., Cao, S., Chen, M., Ye, G., Gong, X., Fang, D. & Wang, Z., 12/05/2018, In: Applied Sciences. 8, 5, 23 p., 771.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X. & Wang, Z., 05/2018, In: Computers and Security. 74, p. 202-220 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Defeat Your Enemy Hiding Behind Public WiFi: WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Zhang, J., Tang, Z., Li, M., Chen, X., Fang, D. & Wang, Z., 28/03/2018, In: Applied Sciences. 8, 4, 24 p., 515.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Holistic energy and failure aware workload scheduling in Cloud datacenters

    Li, X., Jiang, X., Garraghan, P. & Wu, Z., 01/2018, In: Future Generation Computer Systems. 78, 3, p. 887-900 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Other report
  12. Published

    Parallel-Pattern Aware Compiler Optimisations: Challenges and Opportunities

    Wang, Z. & Leather, H., 10/09/2018, Lancaster: Lancaster University. 3 p.

    Research output: Book/Report/ProceedingsOther report

Previous 1 2 Next

Back to top