Zhuhua Cai
Zhuhua Cai
Graduate Student, Rice University
Verificeret mail på rice.edu - Startside
Citeret af
Citeret af
Simulation of database-valued Markov chains using SimSQL
Z Cai, Z Vagena, L Perez, S Arumugam, PJ Haas, C Jermaine
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
Facilitating real-time graph mining
Z Cai, D Logothetis, G Siganos
Proceedings of the fourth international workshop on Cloud data management, 1-8, 2012
A comparison of platforms for implementing and running very large scale machine learning algorithms
Z Cai, ZJ Gao, S Luo, LL Perez, Z Vagena, C Jermaine
Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014
The latent community model for detecting sybil attacks in social networks
Z Cai, C Jermaine
Proc. NDSS, 2012
Declarative recursive computation on an rdbms, or, why you should use a database for distributed machine learning
D Jankov, S Luo, B Yuan, Z Cai, J Zou, C Jermaine, ZJ Gao
arXiv preprint arXiv:1904.11121, 2019
Evaluating network security with two-layer attack graphs
A Xie, Z Cai, C Tang, J Hu, Z Chen
2009 Annual Computer Security Applications Conference, 127-136, 2009
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
Bring order to online social networks
R Chen, EK Lua, Z Cai
2011 Proceedings IEEE INFOCOM, 541-545, 2011
Declarative recursive computation on an RDBMS: or, why you should use a database for distributed machine learning
D Jankov, S Luo, B Yuan, Z Cai, J Zou, C Jermaine, ZJ Gao
ACM SIGMOD Record 49 (1), 43-50, 2020
A secure routing and aggregation protocol with low energy cost for sensor networks
N Gui, R Chen, Z Cai, J Hu, Z Chen
2009 International Symposium on Information Engineering and Electronic …, 2009
A holistic mechanism against file pollution in peer-to-peer networks
Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu
Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009
Social trust and reputation in online social networks
EK Lua, R Chen, Z Cai
2011 IEEE 17th International conference on parallel and distributed systems …, 2011
The pairwise Gaussian random field for high-dimensional data imputation
Z Cai, C Jermaine, Z Vagena, D Logothetis, LL Perez
2013 IEEE 13th International Conference on Data Mining, 61-70, 2013
SpamResist: making peer-to-peer tagging systems robust to spam
E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
SKIP: A secure key issuing scheme for peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
2009 Fifth International Conference on Networking and Services, 296-302, 2009
An adjacency matrixes-based model for network security analysis
A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen
2010 IEEE International Conference on Communications, 1-5, 2010
Very large scale bayesian inference using mcdb
Z Cai, Z Vagena, C Jermaine, P Haas
Big Learn Workshop, Advances in Neural Information Processing Systems, 2011
Using Hive to perform medium-scale data analysis
N Pansare, Z Cai
Very large scale Bayesian machine learning
Z Cai
Rice University, 2014
Green: Towards a pollution-free peer-to-peer content sharing service
R Chen, EK Lua, Z Cai, J Crowcroft, Z Chen
arXiv preprint arXiv:1108.1343, 2011
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20