
Jidong Ge
Person information
- affiliation: Nanjing University, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j24]Hamza Djigal
, Jun Feng
, Jiamin Lu, Jidong Ge:
IPPTS: An Efficient Algorithm for Scientific Workflow Scheduling in Heterogeneous Computing Systems. IEEE Trans. Parallel Distributed Syst. 32(5): 1057-1071 (2021) - 2020
- [j23]Chuanyi Li, Jidong Ge, Lijie Wen, Li Kong, Victor Chang
, Liguo Huang
, Bin Luo:
A novel completeness definition of event logs and corresponding generation algorithm. Expert Syst. J. Knowl. Eng. 37(4) (2020) - [j22]Li Kong, Chuanyi Li, Jidong Ge
, Feifei Zhang, Yi Feng, Zhongjin Li, Bin Luo:
Leveraging multiple features for document sentiment classification. Inf. Sci. 518: 39-55 (2020) - [j21]Sheng Zhang, Yu Liang, Jidong Ge, Mingjun Xiao, Jie Wu:
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes. IEEE/ACM Trans. Netw. 28(4): 1684-1697 (2020) - [c63]Li Kong, Chuanyi Li, Jidong Ge, Bin Luo, Vincent Ng:
Identifying Exaggerated Language. EMNLP (1) 2020: 7024-7034 - [c62]Chuanyi Li, Jidong Ge, Victor Chang, Bin Luo:
Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description. IoTBDS 2020: 296-303 - [i1]Simin Wang, Liguo Huang, Jidong Ge, Tengfei Zhang, Haitao Feng, Ming Li, He Zhang, Vincent Ng:
Synergy between Machine/Deep Learning and Software Engineering: How Far Are We? CoRR abs/2008.05515 (2020)
2010 – 2019
- 2019
- [j20]Shuai Zhang, Sheng Zhang
, Zhuzhong Qian, Xiaoda Zhang, Mingjun Xiao, Jie Wu, Jidong Ge, Xiaoliang Wang:
Efficient scheduling for multi-stage coflows. CCF Trans. Netw. 2(2): 83-97 (2019) - [j19]Yu Liang, Jidong Ge
, Sheng Zhang
, Bin Luo:
Modeling and deploying hybrid tenant requests with shared networklets. Comput. Networks 153: 63-72 (2019) - [j18]Feifei Zhang, Jidong Ge
, Chifong Wong, Chuanyi Li, Xingguo Chen, Sheng Zhang, Bin Luo, He Zhang, Victor Chang
:
Online learning offloading framework for heterogeneous mobile edge computing system. J. Parallel Distributed Comput. 128: 167-183 (2019) - [j17]Shanshan Li
, He Zhang, Zijia Jia, Zheng Li, Cheng Zhang, Jiaqi Li, Qiuya Gao, Jidong Ge, Zhihao Shan:
A dataflow-driven approach to identifying microservices from monolithic applications. J. Syst. Softw. 157 (2019) - [j16]Yu Liang, Jidong Ge
, Sheng Zhang
, Jie Wu
, Ze Tang, Bin Luo:
A Utility-Based Optimization Framework for Edge Service Entity Caching. IEEE Trans. Parallel Distributed Syst. 30(11): 2384-2395 (2019) - [j15]Chuanyi Li, Jidong Ge
, Zhongjin Li, Liguo Huang, Hongji Yang, Bin Luo:
Monitoring Interactions Across Multi Business Processes with Token Carried Data. IEEE Trans. Serv. Comput. 12(6): 941-954 (2019) - [c61]Yi Feng, Chuanyi Li, Jidong Ge, Bin Luo:
Improving Statute Prediction via Mining Correlations between Statutes. ACML 2019: 710-725 - [c60]Chuanyi Li, Yu Sheng, Jidong Ge, Bin Luo:
Apply event extraction techniques to the judicial field. UbiComp/ISWC Adjunct 2019: 492-497 - [c59]Linxia Yao, Jidong Ge, Chuanyi Li, Yuan Yao, Zhenhao Li, Jin Zeng, Bin Luo, Victor Chang
:
Word Segmentation for Chinese Judicial Documents. ICPCSEE (1) 2019: 466-478 - [c58]Mengting He, Zhongyue Li, Yanshu Wei, Jidong Ge, Peitang Ling, Chuanyi Li, Ting Lei, Bin Luo:
Evaluation System for Reasoning Description of Judgment Documents Based on TensorFlow CNN. ICPCSEE (1) 2019: 518-533 - [c57]Peitang Ling, Zian Wang, Yi Feng, Jidong Ge, Mengting He, Chuanyi Li, Bin Luo:
Statute Recommendation Based on Word Embedding. ICPCSEE (1) 2019: 534-548 - [c56]Li Kong, Chuanyi Li, Jidong Ge, Zhongjin Li, Feifei Zhang, Bin Luo:
An Efficient Heuristic Method for Repairing Event Logs Independent of Process Models. IoTBDS 2019: 83-93 - [c55]Xiaoyu Liu, LiGuo Huang, Jidong Ge, Vincent Ng:
Predicting Licenses for Changed Source Code. ASE 2019: 686-697 - 2018
- [j14]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Chifong Wong, Li Kong, Bin Luo, Victor I. Chang
:
A load-aware resource allocation and task scheduling for the emerging cloudlet system. Future Gener. Comput. Syst. 87: 438-456 (2018) - [j13]Yunzhi Jin, Hua Zhou, Hongji Yang, Sijing Zhang, Jidong Ge:
An approach to locating delayed activities in software processes. Int. J. Autom. Comput. 15(1): 115-124 (2018) - [j12]Haiyang Hu, Zhongjin Li, Hua Hu, Jie Chen, Jidong Ge, Chuanyi Li, Victor I. Chang
:
Multi-objective scheduling for scientific workflow in multicloud environment. J. Netw. Comput. Appl. 114: 108-122 (2018) - [j11]Chuanyi Li, Liguo Huang, Jidong Ge, Bin Luo, Vincent Ng:
Automatically classifying user requests in crowdsourcing requirements engineering. J. Syst. Softw. 138: 108-123 (2018) - [j10]Xiaoyu Liu
, LiGuo Huang, Alexander Egyed, Jidong Ge:
Do code data sharing dependencies support an early prediction of software actual change impact set? J. Softw. Evol. Process. 30(11) (2018) - [j9]Zhongjin Li, Jidong Ge, Haiyang Hu, Wei Song
, Hao Hu, Bin Luo:
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds. IEEE Trans. Serv. Comput. 11(4): 713-726 (2018) - [c54]Shuai Zhang, Sheng Zhang, Xiaoda Zhang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Jidong Ge, Xiaoliang Wang:
Far-Sighted Multi-Stage Awasre Coflow Scheduling. GLOBECOM 2018: 1-7 - [c53]Yixuan Dong, Yemao Zhou, Chuanyi Li, Jidong Ge, Yali Han, Mengting He, Dekuan Liu, Xiaoyu Zhou, Bin Luo:
Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure. ICPCSEE (2) 2018: 27-40 - [c52]Linxia Yao, Haojie Huang, Jidong Ge, Simeng Zhao, Peitang Ling, Ting Lei, Mengting He, Bin Luo:
The Construction Approach of Statutes Database. ICPCSEE (1) 2018: 140-150 - [c51]Zhongyue Li, Chuhan Zhuang, Jidong Ge, Chuanyi Li, Ting Lei, Peitang Ling, Mengting He, Bin Luo:
Predicting Statutes Based on Causes of Action and Content of Statutes. ICPCSEE (2) 2018: 477-492 - [c50]Zhongjin Li, JiaCheng Yu, Haiyang Hu, Jie Chen, Hua Hu, Jidong Ge, Victor Chang:
Fault-Tolerant Scheduling for Scientific Workflow with Task Replication Method in Cloud. IoTBDS 2018: 95-104 - [c49]Rui Zhang, Sheng Zhang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Jidong Ge, Sanglu Lu:
Collaborative Interactive Wireless Charging in a Cyclic Mobispace. IWQoS 2018: 1-10 - [c48]Li Kong, Chuanyi Li, Jidong Ge, Yufan Yang, Feifei Zhang, Bin Luo:
Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning. PRICAI (1) 2018: 204-216 - [c47]Yi Feng, Jidong Ge, Chuanyi Li, Li Kong, Feifei Zhang, Bin Luo:
Statutes Recommendation Using Classification and Co-occurrence Between Statutes. PRICAI 2018: 326-334 - [c46]Xiaosong Zhou, Chuanyi Li, Jidong Ge, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks. PRICAI 2018: 430-437 - [c45]Chuanyi Li, Jingjing Ye, Jidong Ge, Li Kong, Haiyang Hu, Bin Luo:
A Novel Convolutional Neural Network for Statutes Recommendation. PRICAI (1) 2018: 851-863 - 2017
- [j8]Zhongjin Li, Jidong Ge
, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo, Victor Chang
:
Energy cost minimization with job security guarantee in Internet data center. Future Gener. Comput. Syst. 73: 63-78 (2017) - [j7]Chuanyi Li, Jidong Ge
, Liguo Huang, Haiyang Hu, Budan Wu, Hao Hu, Bin Luo:
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs. J. Syst. Softw. 124: 260-273 (2017) - [c44]Yi Feng, Jidong Ge, Yemao Zhou, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
A Method of the Association Statistics between the Cause of Action and the Statutes. WISA 2017: 23-26 - [c43]Yuanliang Chen, Jidong Ge, Yi Feng, Yemao Zhou, Chuanyi Li, Zhongjin Li, Bin Luo:
Design and Implementation of Visual Modeling Tool for Evidence Chain. WISA 2017: 168-171 - [c42]Yufan Yang, Yi Feng, Jidong Ge, Yemao Zhou, Jin Zeng, Chuanyi Li, Bin Luo:
Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm. WISA 2017: 197-200 - [c41]Jin Zeng, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Bin Luo:
Statutes Recommendation Based on Text Similarity. WISA 2017: 201-204 - [c40]Chuhan Zhuang, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Xiaoyu Zhou, Bin Luo:
Information Extraction from Chinese Judgment Documents. WISA 2017: 240-244 - [c39]Miaomiao Lei, Jidong Ge, Zhongjin Li, Chuanyi Li, Yemao Zhou, Xiaoyu Zhou, Bin Luo:
Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms. DASFAA Workshops 2017: 3-17 - [c38]Yue Wang, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Topic Model Based Text Similarity Measure for Chinese Judgment Document. ICPCSEE (2) 2017: 42-54 - [c37]Siyuan Kong, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Yi Feng, Xiaoyu Zhou, Bin Luo:
Build Evidence Chain Relational Model Based on Chinese Judgment Documents. ICPCSEE (2) 2017: 94-107 - [c36]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo:
Task Offloading for Scientific Workflow Application in Mobile Cloud. IoTBDS 2017: 136-148 - [c35]Mingrui Chen, Yann Dautais, LiGuo Huang, Jidong Ge:
Data driven credit risk management process: a machine learning approach. ICSSP 2017: 109-113 - 2016
- [j6]Yu Zhou, Jidong Ge, Pengcheng Zhang, Weigang Wu:
Model based verification of dynamically evolvable service oriented systems. Sci. China Inf. Sci. 59(3): 32101:1-32101:17 (2016) - [j5]Zhongjin Li, Jidong Ge
, Hongji Yang, Liguo Huang, Haiyang Hu, Hao Hu, Bin Luo:
A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener. Comput. Syst. 65: 140-152 (2016) - [j4]Chuanyi Li, Jidong Ge
, Liguo Huang, Haiyang Hu, Budan Wu, Hongji Yang, Hao Hu, Bin Luo:
Process mining with token carried data. Inf. Sci. 328: 558-576 (2016) - [c34]Zhongjin Li, Jidong Ge, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo:
Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets. IoTBD 2016: 407-418 - 2015
- [j3]Wei Zhang, LiGuo Huang, Vincent Ng, Jidong Ge:
SMPLearner: learning to predict software maintainability. Autom. Softw. Eng. 22(1): 111-141 (2015) - [c33]Kesheng Qi, Hao Hu, Wei Song, Jidong Ge, Jian Lu:
Personalized QoS Prediction via Matrix Factorization Integrated with Neighborhood Information. SCC 2015: 186-193 - [c32]Feng Liu, Chongjun Wang, Jidong Ge, Bin Luo:
PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm. ICTAI 2015: 119-124 - [c31]Yang Liang, Hao Hu, Wei Song, Jidong Ge:
Qos-aware Automatic Web Service Composition Considering QoS Correlations. Internetware 2015: 39-42 - 2014
- [c30]Yu Zhou, Jidong Ge, Pengcheng Zhang:
Hierarchical timed automata based verification of dynamic evolution process in open environments. ICSSP 2014: 144-148 - 2013
- [c29]Jing Wang, Hao Hu, Ping Yu, Jian Lv, Jidong Ge:
Public-View and Object Petri Net Based Modeling of Cross-Organizational Process. IEEE WISA 2013: 425-428 - [c28]Jianchun Xing, Xuewei Zhang, Wei Song, Qiliang Yang, Jidong Ge, Hongda Wang:
BPEL Similarity - A Metric Based on Activity Constraint Graphs. AP-BPM 2013: 39-55 - [c27]Junhua Ding, Dianxiang Xu, Jidong Ge:
An Approach for Analyzing Software Specifications in Petri Nets. SEKE 2013: 411-416 - [c26]Yu Zhou, Yankai Huang, Jidong Ge, Jun Hu:
Towards Fine-Grained Verification of Application Mobility. WISE Workshops 2013: 75-83 - [c25]Xiaobo Guo, Jidong Ge, Yu Zhou, Haiyang Hu, Feng Yao, Chuanyi Li, Hao Hu:
Dynamically Predicting the Deadlines in Time-Constrained Workflows. WISE Workshops 2013: 120-132 - [c24]Huan Yang, Jidong Ge, Quanjiang Yu, Chuanyi Li, Zhihong Zhao, Hao Hu, Bin Luo:
A Task Selecting Algorithm for Personal Schedules in Workflow Systems. WISE Workshops 2013: 133-143 - 2012
- [j2]Dongyi Wang, JiDong Ge, Hao Hu, Bin Luo, LiGuo Huang:
Discovering process models from event multiset. Expert Syst. Appl. 39(15): 11970-11978 (2012) - [c23]Junhua Ding, Jidong Ge:
An Approach for Modeling and Analyzing Code Mobility. APSCC 2012: 109-116 - [c22]JiDong Ge, Haiyang Hu, Hao Hu, Xianglin Fei:
Invariant Analysis for Ordering Constraints of Multi-view Business Process Model. APWeb Workshops 2012: 257-268 - 2011
- [c21]Eryu Ding, Bin Luo, Daliang Zhang, JiDong Ge, Dong Shao, Haoran Wang:
Research and practice on software engineering undergraduate curriculum NJU-SEC2006. CSEE&T 2011: 492-496 - [c20]Dongyi Wang, JiDong Ge, Hao Hu, Bin Luo:
A New Process Mining Algorithm Based on Event Type. DASC 2011: 1144-1151 - 2010
- [j1]LiGuo Huang, JiDong Ge, Barry W. Boehm, Jian Lu:
Modeling the Value-Based Software Process with Object-Petri-Nets. Int. J. Softw. Informatics 4(1): 101-119 (2010) - [c19]JiDong Ge, Haiyang Hu, Hao Hu:
Calculating the Order Relations of Workflow Net with Invariant Method. ACIS-ICIS 2010: 714-719 - [c18]Haiyang Hu, Jianen Xie, JiDong Ge:
Formal Verification of Stochastic Timing Behavior in Web-Based Business Process Collaboration. WAIM Workshops 2010: 166-176 - [c17]JiDong Ge, Haiyang Hu:
Checking Order Constraints in Collaborative Workflow with Invariant Analysis. WISE Workshops 2010: 483-493
2000 – 2009
- 2009
- [c16]JiDong Ge, Hao Hu, Jian Lu:
Service Discovery and Substitution According to Inheritance of Behavior with Invariant Analysis. ACIS-ICIS 2009: 971-976 - [c15]JiDong Ge, Haiyang Hu:
A Decomposition Approach with Invariant Analysis for Workflow Coordination. DASFAA Workshops 2009: 290-302 - [c14]Haiyang Hu, Bo Xie, JiDong Ge, Yi Zhuang, Hua Hu:
A Framework for Mining Stochastic Model of Business Process in Mobile Environments. DASFAA Workshops 2009: 349-354 - [c13]JiDong Ge, Baoliu Ye, Xianglin Fei, Bin Luo:
A Novel Practical Framework for Operating Systems Teaching. ScalCom-EmbeddedCom 2009: 596-601 - 2008
- [c12]JiDong Ge, Hao Hu, Jian Lü:
Order Constraints for Multi-view Software Process Model. CSSE (2) 2008: 639-642 - 2007
- [c11]Qiang Lin, JiDong Ge, Hao Hu, Jian Lu:
An Approach to Model Cross-organizational Processes using Object Petri net. IEEE SCW 2007: 146-152 - [c10]Reng Yin, Hao Hu, JiDong Ge, Jian Lu:
Quantitative Analysis of Value-Based Software Processes Using Decision-Based Stochastic Object Petri-Nets. APSEC 2007: 526-533 - [c9]Shaxun Chen, JiDong Ge, XianPing Tao, Jian Lu:
A Transaction Model for Context-Aware Applications. GPC 2007: 252-262 - 2006
- [c8]JiDong Ge, Hao Hu, Jian Lu:
Invariant Analysis for the Task Refinement of Workflow Nets. CIMCA/IAWTIC 2006: 209 - [c7]LiGuo Huang, Barry W. Boehm, Hao Hu, JiDong Ge, Jian Lü, Cheng Qian:
Applying the Value/Petri process to ERP software development in China. ICSE 2006: 502-511 - [c6]JiDong Ge, Hao Hu, Qing Gu, Jian Lu:
Modeling Multi-View Software Process with Object Petri Nets. ICSEA 2006: 41 - [c5]LiGuo Huang, Hao Hu, JiDong Ge, Barry W. Boehm, Jian Lü:
Tailor the Value-Based Software Quality Achievement Process to Project Business Cases. SPW/ProSim 2006: 56-63 - 2005
- [c4]Qin Yin, Hao Hu, Jun Li, JiDong Ge, Jian Lu:
An Approach to Ensure Service Behavior Consistency in OSGi. APSEC 2005: 185-192 - [c3]Haiyang Hu, XianPing Tao, JiDong Ge, Jian Lu:
An Efficient Scheme for Fault-Tolerant Web Page Access in Wireless Mobile Environment Based on Mobile Agents. HPCC 2005: 378-387 - [c2]Haiyang Hu, JiDong Ge, Ping Lu, XianPing Tao, Jian Lu:
Supporting Wireless Web Page Access in Mobile Environments Using Mobile Agents. ISPA 2005: 859-869 - [c1]JiDong Ge, Haiyang Hu, Ping Lu, Hao Hu, Jian Lü:
Translation of Nets Within Nets in Cross-organizational Software Process Modeling. ISPW 2005: 360-375
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-26 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint