default search action
Junwen Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xuemei Hu, Junwen Yang:
G-LASSO/G-SCAD/G-MCP penalized trinomial logit dynamic models predict up trends, sideways trends and down trends for stock returns. Expert Syst. Appl. 249: 123476 (2024) - [j10]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros, A. Lee Swindlehurst:
Block-Level MU-MISO Interference Exploitation Precoding: Optimal Structure and Explicit Duality. IEEE Internet Things J. 11(21): 35519-35535 (2024) - [j9]Junwen Yang, Zixin Zhong, Vincent Y. F. Tan:
Optimal Clustering with Bandit Feedback. J. Mach. Learn. Res. 25: 186:1-186:54 (2024) - [j8]Xuemei Hu, Junwen Yang:
Group Penalized Multinomial Logit Models and Stock Return Direction Prediction. IEEE Trans. Inf. Theory 70(6): 4297-4318 (2024) - [j7]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
ADMM-SLPNet: A Model-Driven Deep Learning Framework for Symbol-Level Precoding. IEEE Trans. Veh. Technol. 73(1): 1376-1381 (2024) - [j6]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Low Complexity SLP: An Inversion-Free, Parallelizable ADMM Approach. IEEE Trans. Wirel. Commun. 23(9): 12424-12439 (2024) - [i11]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros, A. Lee Swindlehurst:
Block-Level MU-MISO Interference Exploitation Precoding: Optimal Structure and Explicit Duality. CoRR abs/2401.00166 (2024) - [i10]Junwen Yang, Tianyuan Jin, Vincent Y. F. Tan:
Multi-Armed Bandits with Abstention. CoRR abs/2402.15127 (2024) - [i9]Junwen Yang, Vincent Y. F. Tan, Tianyuan Jin:
Best Arm Identification with Minimal Regret. CoRR abs/2409.18909 (2024) - 2023
- [j5]Xiaoxuan Liu, Shuxian Wang, Mengzhu Sun, Sicheng Pan, Ge Li, Siddharth Jha, Cong Yan, Junwen Yang, Shan Lu, Alvin Cheung:
Leveraging Application Data Constraints to Optimize Database-Backed Web Applications. Proc. VLDB Endow. 16(6): 1208-1221 (2023) - [j4]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Speeding-Up Symbol-Level Precoding Using Separable and Dual Optimizations. IEEE Trans. Commun. 71(12): 7056-7071 (2023) - [c18]Junwen Yang, Yifan Feng:
Nested Elimination: A Simple Algorithm for Best-Item Identification From Choice-Based Feedback. ICML 2023: 39205-39233 - [c17]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Parallelizable First-Order Fast Algorithm for Symbol-Level Precoding in Lage-Scale Systems. VTC2023-Spring 2023: 1-6 - [c16]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Duality Between the Power Minimization and Max-Min SINR Balancing Symbol-Level Precoding. VTC2023-Spring 2023: 1-6 - [i8]Junwen Yang, Yifan Feng:
Nested Elimination: A Simple Algorithm for Best-Item Identification from Choice-Based Feedback. CoRR abs/2307.09295 (2023) - 2022
- [j3]Junwen Yang, Yunmin Wang, Xiang Li:
Prediction of stock price direction using the LASSO-LSTM model combines technical indicators and financial sentiment analysis. PeerJ Comput. Sci. 8: e1148 (2022) - [c15]Jie Li, Hui Chen, Junwen Yang, Siyang Liu, Yongjie Nie, Jinyuan Li:
Power Consumption Forecast Based on Ridge Regression Model. ICITEE 2022: 297-302 - [c14]Junwen Yang, Vincent Y. F. Tan:
Minimax Optimal Fixed-Budget Best Arm Identification in Linear Bandits. NeurIPS 2022 - [i7]Junwen Yang, Zixin Zhong, Vincent Y. F. Tan:
Optimal Clustering with Bandit Feedback. CoRR abs/2202.04294 (2022) - [i6]Xiaoxuan Liu, Shuxian Wang, Mengzhu Sun, Sharon Lee, Sicheng Pan, Joshua Wu, Cong Yan, Junwen Yang, Shan Lu, Alvin Cheung:
Leveraging Application Data Constraints to Optimize Database-Backed Web Applications. CoRR abs/2205.02954 (2022) - [i5]Yifan Zhang, Junwen Yang, Haoyu Dong, Qingchen Wang, Huajie Shao, Kevin Leach, Yu Huang:
ASTRO: An AST-Assisted Approach for Generalizable Neural Clone Detection. CoRR abs/2208.08067 (2022) - [i4]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Low Complexity SLP: An Inversion-Free, Parallelizable ADMM Approach. CoRR abs/2209.12369 (2022) - [i3]Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros:
Speeding-up Symbol-Level Precoding Using Separable and Dual Optimizations. CoRR abs/2211.14818 (2022) - 2021
- [j2]Junwen Yang, Yeye He, Surajit Chaudhuri:
Auto-Pipeline: Synthesize Data Pipelines By-Target Using Reinforcement Learning and Search. Proc. VLDB Endow. 14(11): 2563-2575 (2021) - [c13]Sophie Xie, Junwen Yang, Shan Lu:
Automated Code Refactoring upon Database-Schema Changes in Web Applications. ASE 2021: 1262-1265 - [c12]Yongle Zhang, Junwen Yang, Zhuqi Jin, Utsav Sethi, Kirk Rodrigues, Shan Lu, Ding Yuan:
Understanding and Detecting Software Upgrade Failures in Distributed Systems. SOSP 2021: 116-131 - [i2]Junwen Yang, Vincent Y. F. Tan:
Towards Minimax Optimal Best Arm Identification in Linear Bandits. CoRR abs/2105.13017 (2021) - [i1]Junwen Yang, Yeye He, Surajit Chaudhuri:
AutoPipeline: Synthesize Data Pipelines By-Target Using Reinforcement Learning and Search. CoRR abs/2106.13861 (2021) - 2020
- [c11]Cong Yan, Alvin Cheung, Junwen Yang, Shan Lu:
View-Driven Optimization of Database-Backed Web Applications. CIDR 2020 - [c10]Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu:
Managing data constraints in database-backed web applications. ICSE (Companion Volume) 2020: 302-303 - [c9]Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu:
Managing data constraints in database-backed web applications. ICSE 2020: 1098-1109
2010 – 2019
- 2019
- [c8]Junwen Yang, Cong Yan, Chengcheng Wan, Shan Lu, Alvin Cheung:
View-centric performance optimization for database-backed web applications. ICSE 2019: 994-1004 - [c7]Junwen Yang, Jinshui Zhang, Shuang Zhu, Qing Xu, Feng Zhang, Zhijiang Yang, Zheng Dong:
Cropland Mapping in Fragmented Agricultural Landscape Using Modified Pyramid Scene Parsing Network. IGARSS 2019: 9831-9834 - [c6]Junwen Yang:
Improving performance and quality of database-backed software. SPLASH (Companion Volume) 2019: 23-25 - 2018
- [c5]Junwen Yang, Pranav Subramaniam, Shan Lu, Cong Yan, Alvin Cheung:
How not to structure your database-backed web applications: a study of performance bugs in the wild. ICSE 2018: 800-810 - [c4]Shuang Zhu, Jinshui Zhang, Xiaohe Gu, Junwen Yang, Baolin Xian:
Mapping Highly Heterogeneous Impervious Surface in the Urban-Rural Fringe using Integrated Hard and Soft Classification from Incorporating Spectral and Texture Features. IGARSS 2018: 6951-6954 - [c3]Mingwei Liu, Xin Peng, Qingtao Jiang, Andrian Marcus, Junwen Yang, Wenyun Zhao:
Searching StackOverflow Questions with Multi-Faceted Categorization. Internetware 2018: 10:1-10:10 - [c2]Junwen Yang, Cong Yan, Pranav Subramaniam, Shan Lu, Alvin Cheung:
PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE. ESEC/SIGSOFT FSE 2018: 884-887 - 2017
- [j1]Junwen Yang, Hai Wang, Xin Peng, Wenyun Zhao:
基于开发者行为分析的Web资源推荐 (Web Resource Recommendation Based on Analysis of Developer's Behavior). 计算机科学 44(7): 147-150 (2017) - [c1]Cong Yan, Alvin Cheung, Junwen Yang, Shan Lu:
Understanding Database Performance Inefficiencies in Real-world Web Applications. CIKM 2017: 1299-1308
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint