default search action
Xiangru Meng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Jiucheng Xu, Xiangru Meng, Kanglin Qu, Yuanhao Sun, Qincheng Hou:
Feature selection using relative dependency complement mutual information in fitting fuzzy rough set model. Appl. Intell. 53(15): 18239-18262 (2023) - [j21]Dong Zhai, Xiangru Meng, Zhenhua Yu, Hang Hu, Yuan Liang:
A migration method for service function chain based on failure prediction. Comput. Networks 222: 109554 (2023) - [j20]Jiucheng Xu, Kanglin Qu, Kangjian Qu, Qincheng Hou, Xiangru Meng:
Feature selection using neighborhood uncertainty measures and Fisher score for gene expression data classification. Int. J. Mach. Learn. Cybern. 14(12): 4011-4028 (2023) - 2022
- [j19]Jiucheng Xu, Kanglin Qu, Xiangru Meng, Yuanhao Sun, Qincheng Hou:
Feature selection based on multiview entropy measures in multiperspective rough set. Int. J. Intell. Syst. 37(10): 7200-7234 (2022) - [j18]Jiucheng Xu, Qincheng Hou, Kanglin Qu, Yuanhao Sun, Xiangru Meng:
A Fast Weighted Fuzzy C-Medoids Clustering for Time Series Data Based on P-Splines. Sensors 22(16): 6163 (2022) - 2021
- [j17]Dong Zhai, Xiangru Meng, Zhenhua Yu, Xiaoyang Han:
Reliability-Aware Service Function Chain Backup Protection Method. IEEE Access 9: 14660-14676 (2021) - [j16]Xiaoyang Han, Xiangru Meng, Zhenhua Yu, Dong Zhai:
A Dynamic Adjustment Method of Service Function Chain Resource Configuration. KSII Trans. Internet Inf. Syst. 15(8): 2783-2804 (2021) - [j15]Dong Zhai, Xiangru Meng, Zhenhua Yu, Hang Hu, Xiaoyang Han:
A fine-grained and dynamic scaling method for service function chains. Knowl. Based Syst. 228: 107289 (2021) - 2020
- [j14]Xiaoyang Han, Xiangru Meng, Zhenhua Yu, Qiao-yan Kang, Yu Zhao:
A Service Function Chain Deployment Method Based on Network Flow Theory for Load Balance in Operator Networks. IEEE Access 8: 93187-93199 (2020)
2010 – 2019
- 2019
- [j13]Xiaoyang Han, Xiangru Meng, Qiao-yan Kang, Yuze Su:
Survivable Virtual Network Link Shared Protection Method Based on Maximum Spanning Tree. IEEE Access 7: 92137-92150 (2019) - [j12]Yuze Su, Xiangru Meng, Zhenhua Yu, Qiao-yan Kang:
Cognitive Virtual Network Topology Reconfiguration Method Based on Traffic Prediction and Link Importance. IEEE Access 7: 138915-138926 (2019) - [j11]Yuze Su, Xiangru Meng, Xiaoyang Han, Qiao-yan Kang:
Symptom-aware hybrid fault diagnosis algorithm in the network virtualization environment. Turkish J. Electr. Eng. Comput. Sci. 27(5): 3326-3341 (2019) - [j10]Yuze Su, Xiangru Meng, Zhiyuan Zhao, Zhentao Li:
Cognitive Virtual Network Embedding Algorithm Based on Weighted Relative Entropy. KSII Trans. Internet Inf. Syst. 13(4): 1845-1865 (2019) - 2018
- [j9]Yuze Su, Xiangru Meng, Qiao-yan Kang, Xiaoyang Han:
Survivable Virtual Network Link Protection Method Based on Network Coding and Protection Circuit. IEEE Access 6: 67477-67493 (2018) - [j8]Yuze Su, Xiangru Meng, Qiao-yan Kang, Xiaoyang Han:
Dynamic Virtual Network Reconfiguration Method for Hybrid Multiple Failures Based on Weighted Relative Entropy. Entropy 20(9): 711 (2018) - [j7]Zhiyuan Zhao, Xiangru Meng, Siyuan Lu, Yuze Su:
Different QoS Constraint Virtual SDN Embedding under Multiple Controllers. KSII Trans. Internet Inf. Syst. 12(9): 4144-4165 (2018) - [j6]Zhentao Li, Xiangru Meng, Zhiyuan Zhao, Yuze Su:
一种面向节点负载均衡的虚拟网络重构算法 (Virtual Network Reconfiguration Algorithm for Nodes Load Balancing). 计算机科学 45(7): 95-98 (2018) - [c9]Yuze Su, Xiangru Meng, Qingwei Meng, Xiaoyang Han:
DDoS Attack Detection Algorithm Based on Hybrid Traffic Prediction Model. ICSPCC 2018: 1-5 - 2017
- [j5]Zhiyuan Zhao, Xiangru Meng, Yuze Su, Zhentao Li:
Virtual Network Embedding based on Node Connectivity Awareness and Path Integration Evaluation. KSII Trans. Internet Inf. Syst. 11(7): 3393-3412 (2017) - [j4]Wenyan Cui, Xiangru Meng, Binfeng Yang, Huan-huan Yang, Zhiyuan Zhao:
An efficient lossy link localization approach for wireless sensor networks. Frontiers Inf. Technol. Electron. Eng. 18(5): 689-707 (2017) - [j3]Xiangxi Wen, Xiangru Meng, Xiao-Long Liang, Qiao-yan Kang:
Centroid Normal Direct Support Vector Machine. Neural Process. Lett. 45(2): 563-575 (2017) - [c8]Qingwei Meng, Xiangru Meng, Zhiqiang Ma:
A compressed sensing sparse channel estimation method for unique word prefixed single carrier frequency domain equalization. ICSPCC 2017: 1-5 - 2016
- [j2]Wenyan Cui, Xiangru Meng, Huan-huan Yang, Qiao-yan Kang, Zhiyuan Zhao:
QoS-Aware Approach for Maximizing Rerouting Traffic in IP Networks. KSII Trans. Internet Inf. Syst. 10(9): 4287-4306 (2016) - 2015
- [j1]Mingming Wang, Xiangru Meng, You Xu, Wenyan Cui:
基于rLFA技术的性能优化及重路由选择算法研究 (Research of Performance Optimization and Re-routing Selection Algorithm Based on Improved rLFA). 计算机科学 42(1): 106-109 (2015)
2000 – 2009
- 2009
- [c7]Li Zhang, Xiangru Meng, Weijia Wu, Hua Zhou:
Network Fault Feature Selection Based on Adaptive Immune Clonal Selection Algorithm. CSO (2) 2009: 969-973 - [c6]Xiangru Meng, Yongjie Zhang, Wei Song:
Network Construction on Reverse Logistics of Discarded and Used Household Appliances. ESIAT (1) 2009: 108-111 - [c5]Xiangru Meng, Wei Song:
The Green Degree Assessment of the Automobile Reverse Logistics System. ESIAT (1) 2009: 112-115 - [c4]Xiangru Meng, Yongjie Zhang, Wei Song:
Analysis on 3PRL and Its Provider Selection. ESIAT (1) 2009: 631-634 - [c3]Xiangru Meng, Wei Song:
Open-Loop Network Design Based on Reverse Logistics Recycling. SSME 2009: 209-212 - [c2]Xiangru Meng, Wei Song:
Construction of Third-Party Reverse Logistics About Electronics Enterprise Based on Circular Economy. SSME 2009: 213-216 - [c1]Li Zhang, Xiangru Meng, Hua Zhou:
Network Fault Diagnosis Using Hierarchical SVMs Based on Kernel Method. WKDD 2009: 753-756
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint