Follow
Lei Wang
Title
Cited by
Cited by
Year
Linux kernels as complex networks: A novel method to study evolution
L Wang, Z Wang, C Yang, L Zhang, Q Ye
Software Maintenance, 2009. ICSM 2009. IEEE International Conference on, 41-50, 2009
542009
Automated detection of code vulnerabilities based on program analysis and model checking
L Wang, Q Zhang, PC Zhao
Source Code Analysis and Manipulation, 2008 Eighth IEEE International …, 2008
512008
Hill: A hybrid indoor localization scheme
SA Kharidia, Q Ye, S Sampalli, J Cheng, H Du, L Wang
Mobile Ad-hoc and Sensor Networks (MSN), 2014 10th International Conference …, 2014
282014
Propagation and stability in software: A complex network perspective
L Wang, P Wang
International Journal of Modern Physics C 26 (05), 1550052, 2015
102015
On the evolution of Linux kernels: a complex network perspective
L Wang, P Yu, Z Wang, C Yang, Q Ye
Journal of software: Evolution and Process 25 (5), 439-458, 2013
102013
Design and Implementation of Encryption System Based on File System Filtering Drive [J]
W Shen, L Wang, J CHEN
Computer Engineering 20, 058, 2009
82009
DECF: A coarse-grained data-parallel programming framework for seismic processing
C Zhao, H Yan, X Shi, L Wang
2008 International Conference on Computer Science and Software Engineering 3 …, 2008
82008
TLDFS: A distributed file system based on the layered structure
L Wang, C Yang
Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP …, 2007
82007
Escape analysis for synchronization removal
L Wang, X Sun
Proceedings of the 2006 ACM symposium on Applied computing, 1419-1423, 2006
82006
Evolution and stability of Linux kernels based on complex networks
L Wang, Z Wang, C Yang, L Zhang
Science China Information Sciences 55 (9), 1972-1982, 2012
62012
Optimization of LevelDB by Separating Key and Value
L Wang, G Ding, Y Zhao, D Wu, C He
Parallel and Distributed Computing, Applications and Technologies (PDCAT …, 2017
52017
CodeAuditor: A Vulnerability Detection Framework Based on Constraint Analysis and Model Checking
L Wang, G Chen, J Wang, P Zhao, Q Zhang
2009 International Conference on Management and Service Science, 1-4, 2009
52009
Leveraging SSD's Flexible Address Mapping to Accelerate Data Copy Operations
F Ni, X Wu, W Li, L Wang, S Jiang
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
42019
WOJ: Enabling Write-Once Full-data Journaling in SSDs by using weak-hashing-based deduplication
F Ni, X Wu, W Li, L Wang, S Jiang
Performance Evaluation 127, 56-69, 2018
42018
Mechanism of asymmetric software structures: A complex network perspective from behaviors of new nodes
L Wang, Y Wang, Y Zhao
Physica A: Statistical Mechanics and its Applications 413, 162-172, 2014
42014
Optimizing event polling for network-intensive applications: A case study on redis
X Wu, X Long, L Wang
Parallel and Distributed Systems (ICPADS), 2013 International Conference on …, 2013
42013
Long-haul transmission performance in the internet
Q Ye, D Cui, Z Wang, L Wang, MH MacGregor
Communication Networks and Services Research Conference (CNSR), 2010 Eighth …, 2010
42010
IR+: Removing parallel I/O interference of MPI programs via data replication over heterogeneous storage devices
X Zhang, S Jiang, A Diallo, L Wang
Parallel Computing 76, 91-105, 2018
32018
Message-passing interprocess communication design in seL4
Z Yu, C Yuan, X Wei, Y Gao, L Wang
2016 5th International Conference on Computer Science and Network Technology …, 2016
32016
A User-Level Approach for ARINC 653 Temporal Partitioning in seL4
Q Kang, C Yuan, X Wei, Y Gao, L Wang
2016 International Symposium on System and Software Reliability (ISSSR), 106-110, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20