default search action
Sheng Lin 0002
Person information
- affiliation: Tianjin University of Technology, School of Computer and Communication Engineering, China
- affiliation: Nankai University, College of Information Technical Science, Nankai-Baidu Joint Laboratory, Department of Computer, China
Other persons with the same name
- Sheng Lin — disambiguation page
- Sheng Lin 0001 — Tencent Media Lab, USA (and 2 more)
- Sheng Lin 0003 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Sheng Lin 0004 — University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
- Sheng Lin 0005 — Xidian University, School of Aerospace Science and Technology, Xi'an, China
- Sheng Lin 0006 — Northeastern University, Department of Electrical and Computer Engineering, Boston, MA, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j6]Qingfeng Song, Kai Shi, Sheng Lin, Guangping Xu, Oliver Yang, Jinsong Wang:
Optimal decision for a fuzzy supply chain with shrinkage under VaR criterion. J. Intell. Fuzzy Syst. 34(1): 733-744 (2018) - [c17]Guangping Xu, Yi Zhang, Sheng Lin, Kai Shi, Quan Yu, Chi Wan Sung:
PM-RAD: An Efficient Restore Algorithm in Deduplication by Pattern Matching. HPCC/SmartCity/DSS 2018: 354-361 - 2017
- [c16]Hongwei Zhang, Jinsong Wang, Sheng Lin:
Eleven Code: A 3-Erasure MDS Code with Optimize Partial Stripes Writes. APPT 2017: 99-104 - 2016
- [j5]Rebecca J. Stones, Ming Su, Xiaoguang Liu, Gang Wang, Sheng Lin:
A Latin square autotopism secret sharing scheme. Des. Codes Cryptogr. 80(3): 635-650 (2016) - [j4]Rebecca J. Stones, Sheng Lin, Xiaoguang Liu, Gang Wang:
On Computing the Number of Latin Rectangles. Graphs Comb. 32(3): 1187-1202 (2016) - [c15]Guangping Xu, Qunfang Mao, Sheng Lin, Kai Shi, Hua Zhang:
Extremal graphic model in optimizing fractional repetition codes for efficient storage repair. ICC 2016: 1-6 - 2015
- [j3]Menglong Li, Kai Shi, Sheng Lin, Jinsong Wang, Chunyan Hou, Peng Zhang:
An Enhanced TCP for Optimizing Channel Utilization in Dynamic Spectrum Access Networks. Int. J. Grid High Perform. Comput. 7(4): 33-46 (2015) - [c14]Guangping Xu, Huan Li, Qunfang Mao, Sheng Lin, Hua Zhang:
Performance Optimization and Evaluation of Space Management in Cloud Storage Systems. ICA3PP (4) 2015: 612-625 - 2013
- [c13]Guangping Xu, Xing Guo, Hua Zhang, Sheng Lin, Chunxia Yang:
Optimization for reliable erasure-coded storage allocation under multiple constraints. IPCCC 2013: 1-2 - [c12]Guangping Xu, Sheng Lin, Hua Zhang, Xing Guo, Kai Shi:
Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storage. IPCCC 2013: 1-9 - [c11]Sheng Lin, Kai Shi, Douglas S. Stones, Guangping Xu, Jinsong Wang:
New pattern erasure codes. ISIT 2013: 1899-1903 - [c10]Bingpeng Zhu, Gang Wang, Xiaoguang Liu, Dianming Hu, Sheng Lin, Jingwei Ma:
Proactive drive failure prediction for large scale storage systems. MSST 2013: 1-5 - 2012
- [c9]Guangping Xu, Sheng Lin, Gang Wang, Xiaoguang Liu, Kai Shi, Hua Zhang:
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks. IPCCC 2012: 246-255 - 2011
- [j2]Naiyong Ao, Fan Zhang, Di Wu, Douglas S. Stones, Gang Wang, Xiaoguang Liu, Jing Liu, Sheng Lin:
Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units. Proc. VLDB Endow. 4(8): 470-481 (2011) - [c8]Hao Wang, Jinsong Wang, Jian Zhang, Sheng Lin, Chengyi Xia:
The Research of Detecting SQL Injection Based on the Connectivity with Its Behavior. ICFCE 2011: 501-508 - 2010
- [j1]Sheng Lin, Gang Wang, Douglas S. Stones, Xiaoguang Liu, Jing Liu:
T-Code: 3-Erasure Longest Lowest-Density MDS Codes. IEEE J. Sel. Areas Commun. 28(2): 289-296 (2010)
2000 – 2009
- 2009
- [c7]Sheng Lin, Chi Zhang, Gang Wang, Xiaoguang Liu, Jing Liu:
Reliability Analysis for Full-2 Code. ISPAN 2009: 454-459 - [c6]Gang Wang, Sheng Lin, Xiaoguang Liu, Jing Liu:
Representing X-Code Using Latin Squares. PRDC 2009: 177-182 - 2008
- [c5]Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:
Constructing Double-Erasure HoVer Codes Using Latin Squares. ICPADS 2008: 533-540 - [c4]Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:
Generalizing RDP Codes Using the Combinatorial Method. NCA 2008: 93-100 - [c3]Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xiu, Jing Liu:
Constructing Liberation Codes Using Latin Squares. PRDC 2008: 73-80 - 2007
- [c2]Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:
Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches. ICPADS 2007: 1-8 - [c1]Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu:
Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems. PRDC 2007: 61-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint