default search action
Rongcai Zhao
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j20]Huihui Sun, Sergei Gorlatch, Rongcai Zhao:
Vectorizing programs with IF-statements for processors with SIMD extensions. J. Supercomput. 76(6): 4731-4746 (2020)
2010 – 2019
- 2018
- [j19]Hui Liu, Rongcai Zhao, Kai Nie:
Using Ensemble Learning to Improve Automatic Vectorization of Tensor Contraction Program. IEEE Access 6: 47112-47124 (2018) - [j18]Xiaoyan Xu, Xiaofeng Song, Chunfang Yang, Weiwei Zhao, Rongcai Zhao:
Steganalysis of content-adaptive JPEG steganography based on scale co-occurrence matrix with diverse quantization. J. Electronic Imaging 27(06): 063004 (2018) - [j17]Jinyang Yao, Rongcai Zhao, Qi Wang, Yingying Li:
面向间接数组索引的向量化方法 (Vectorization Methods for Indirect Array Index). 计算机科学 45(9): 220-223 (2018) - [j16]Jie Zhao, Rongcai Zhao:
K-DT: a formal system for the evaluation of linear data dependence testing techniques. J. Supercomput. 74(4): 1655-1675 (2018) - [j15]Hui Liu, Rongcai Zhao, Qi Wang, Yingying Li:
ALIC: A Low Overhead Compiler Optimization Prediction Model. Wirel. Pers. Commun. 103(1): 809-829 (2018) - [c46]Xiaoyan Xu, Xiaofeng Song, Rongcai Zhao:
Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography. CSAI/ICIMT 2018: 375-379 - [c45]Xiaoyan Xu, Linna Fan, Rongcai Zhao:
Steganalysis of Content-Adaptive JPEG Steganography Based on CNN and 2D Gabor Filters. CSAI/ICIMT 2018: 542-547 - [c44]Huihui Sun, Sergei Gorlatch, Rongcai Zhao:
Refactoring Loops with Nested IFs for SIMD Extensions Without Masked Instructions. Euro-Par Workshops 2018: 769-781 - [c43]Bo Zhao, Yingying Li, Lin Han, Jie Zhao, Wei Gao, Rongcai Zhao, Ramin Yahyapour:
A Practical and Aggressive Loop Fission Technique. ICA3PP (Workshops) 2018: 66-75 - [c42]Jinyang Yao, Rongcai Zhao, Qi Wang, Xiaohan Tao:
Loop-nest Auto-vectorization Method Based on Benefit Analysis. ICAIP 2018: 240-244 - [c41]Bo Zhao, Xiaoyan Xu, Peng Liu, Yingying Li, Rongcai Zhao, Ramin Yahyapour:
A Demand-Driven Pointer-Range Analysis Technique for Data Transmission Optimization. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 557-564 - 2017
- [j14]Jie Zhao, Rongcai Zhao:
Identifying superword level parallelism with extended directed dependence graph reachability. Sci. China Inf. Sci. 60(1): 19103 (2017) - [j13]Wei Gao, Lin Han, Rongcai Zhao, Yingying Li, Jian Liu:
Insufficient Vectorization: A New Method to Exploit Superword Level Parallelism. IEICE Trans. Inf. Syst. 100-D(1): 91-106 (2017) - [j12]Xiaoyan Xu, Bo Zhao, Xiaorui Wang, Rongcai Zhao:
Research on Semantic Gap Problem of Virtual Machine. Wirel. Pers. Commun. 97(4): 5983-6004 (2017) - [c40]Jin Han, Rongcai Zhao, Zhen Shan, Fudong Liu, Bingling Zhao, Xi Meng, Hongyan Wang:
Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene. CyberC 2017: 17-20 - 2016
- [j11]Jie Zhao, Rongcai Zhao, Jinchen Xu:
Code Generation for Distributed-Memory Architectures. Comput. J. 59(1): 119-132 (2016) - [j10]Wei Gao, Rongcai Zhao, Haining Yu, Qinghua Zhang:
循环展开技术在向量程序中的应用 (Loop Unrolling in Vectorized Programs). 计算机科学 43(1): 226-231 (2016) - [c39]Dong Wang, Rongcai Zhao, Qi Wang, Yingying Li:
Outer-Loop Auto-Vectorization for SIMD Architectures Based on Open64 Compiler. PDCAT 2016: 19-23 - 2015
- [j9]Bo Zhao, Rongcai Zhao, Jinlong Xu, Wei Gao:
渐进式智能回溯向量化代码调优方法 (Method of Progressive Intelligent Backtracking Vector Code Adjustment and Optimization). 计算机科学 42(1): 50-53 (2015) - [j8]Peng Liu, Rongcai Zhao, Pengyuan Li:
一种面向向量化的动态指针别名分析框架 (Dynamic Pointer Alias Analysis Framework for Vectorization). 计算机科学 42(3): 26-30 (2015) - [j7]Pengyuan Li, Rongcai Zhao, Wei Gao, Qinghua Zhang:
一种支持跨幅访存的向量化代码生成方法 (Effective Vectorization Technique for Interleaved Data with Constant Strides). 计算机科学 42(5): 194-199 (2015) - [j6]Jinlong Xu, Rongcai Zhao, Bo Zhao:
SIMD向量指令的非满载使用方法研究 (Research on Non-full Length Usage of SIMD Vector Instruction). 计算机科学 42(7): 229-233 (2015) - [j5]Huihui Sun, Rongcai Zhao, Wei Gao, Yanbing Li:
基于条件分类的控制流向量化 (Control Flow Vectorization Based on Conditions Classification). 计算机科学 42(11): 240-247 (2015) - [j4]Jinlong Xu, Rongcai Zhao, Xiaoyan Xu:
SIMD代码中的向量访存优化研究 (Memory Access Optimization for Vector Program of SIMD Form). 计算机科学 42(12): 18-22 (2015) - [j3]Jie Zhao, Rongcai Zhao, Xi Chen, Bo Zhao:
An improved nonlinear data dependence test. J. Supercomput. 71(1): 340-368 (2015) - [c38]Bo Zhao, Wei Gao, Rongcai Zhao, Lin Han, Huihui Sun, Yingying Li:
Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions. BigCom 2015: 257-272 - [c37]Huihui Sun, Rongcai Zhao, Wei Gao, Yi Gong, Gang Li:
Exploiting Pure Superword Level Parallelism for Array Indirections. PAAP 2015: 13-19 - [c36]Jinlong Xu, Huihui Sun, Rongcai Zhao:
SIMD vectorization of nested loop based on strip mining. SNPD 2015: 49-55 - [c35]Pengyuan Li, Qinghua Zhang, Rongcai Zhao, Haining Yu:
Data layout transformation for structure vectorization on SIMD architectures. SNPD 2015: 403-409 - 2013
- [j2]Jie Zhao, Rongcai Zhao, Lin Han, Jinlong Xu:
QP test: a dependence test for quadratic array subscripts. IET Softw. 7(5): 271-282 (2013) - [c34]Xiaonan Liu, Rongcai Zhao, Jianmin Pang, Meijuan Yin, Zhenfang Wei:
Data recovery of user-defined procedures in binary translation. BMEI 2013: 634-638 - [c33]Yongwei Wang, Yunan Liu, Rongcai Zhao, Cheng Si, Shuai Liu:
A Novel Rule Matching Algorithm Based on Improved Twig Pattern. CyberC 2013: 495-499 - [c32]Peng Liu, Rongcai Zhao, Wei Gao, Shuai Wei:
A New Algorithm to Exploit Superword Level Parallelism. DASC 2013: 521-527 - [c31]Xiaonan Liu, Rongcai Zhao, Jianmin Pang, Meijuan Yin, Lili Bai, Wuping Chen:
A flag simulation strategy based on fusion of semantic trees in binary translation. FSKD 2013: 1070-1074 - [c30]Feng Yue, Jianmin Pang, Rongcai Zhao, Chao Dai:
The Synchronization Treatment in Implementing Data-Parallel Programming Languages on CPUs. HPCC/EUC 2013: 1916-1921 - [c29]Xiaoxian Liu, Rongcai Zhao, Lin Han:
A Compile-Time Cost Model for Automatic OpenMP Decoupled Software Pipelining Parallelization. SNPD 2013: 253-260 - [c28]Rui Ding, Rongcai Zhao, Liguo Fu:
Code Generation for Accurate Array Redistribution on Automatic Distributed-Memory Parallelization. SNPD 2013: 267-274 - [c27]Xiaoxian Liu, Rongcai Zhao, Lin Han, Peng Liu:
An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP. TrustCom/ISPA/IUCC 2013: 1825-1831 - 2012
- [c26]Jie Zhao, Rongcai Zhao, Han Lin:
A Nonlinear Array Subscripts Dependence Test. HPCC-ICESS 2012: 764-771 - [c25]Jie Zhao, Rongcai Zhao, Yao Yuan:
A Nested Loop Fusion Algorithm Based on Cost Analysis. HPCC-ICESS 2012: 1096-1101 - [c24]Rui Ding, Rongcai Zhao, Lin Han:
An Automatic Computation and Data Decomposition Algorithm of Prioritized Dominant Array. PDCAT 2012: 305-308 - 2011
- [c23]Jiafeng Zhu, Rongcai Zhao, Lin Han, Yunlong Hao, Lili Bai:
A Vectorization Method of Export Branch for SIMD Extension. ACIS-ICIS 2011: 265-269
2000 – 2009
- 2009
- [c22]Hongtu Ma, Rongcai Zhao, Ling Liang, Xun Li:
A Multi-variable Algorithm for Placing Phi-nodes. ACIS-ICIS 2009: 39-43 - [c21]Hongtu Ma, Rongcai Zhao, Xiang Gao, Youwei Zhang:
Barrier Optimization for OpenMP Program. SNPD 2009: 495-500 - 2008
- [c20]Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma:
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. ACIS-ICIS 2008: 525-530 - [c19]Miao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai:
Reconstructing Control Flow in Modulo Scheduled Loops. ACIS-ICIS 2008: 539-544 - [c18]Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables. ACIS-ICIS 2008: 545-550 - [c17]Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. ACIS-ICIS 2008: 589-594 - [c16]Lin Han, Rongcai Zhao, Jianmin Pang:
A Consistency Combination Algorithm for Global Dynamic Computation and Data Decomposition. CISIS 2008: 148-154 - [c15]Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao:
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. CSSE (2) 2008: 338-341 - [c14]Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu:
Formal Abstraction of Semantics for Detecting Malicious Code. CSSE (2) 2008: 350-353 - [c13]Jianmin Pang, Jiuzhen Jin, Rongcai Zhao, Zheng Shan, Zheng Zhang:
Using Queuing Network to Evaluate IXP2400 Based VoIP SPS. ICNS 2008: 266-271 - [c12]Shuo Zhang, Rongcai Zhao, Ke An:
On Generating Self-Similar Network Traffic Using Multi-core Processors. ISCSCT (1) 2008: 667-672 - 2007
- [c11]Jingbo Zhang, Rongcai Zhao, Jianmin Pang:
Parameter and Return-value Analysis of Binary Executables. COMPSAC (1) 2007: 501-508 - [c10]Wen Tu, Rongcai Zhao, Jianmin Pang, Bo Wei:
Research on the Recovery Technology of Floating-point Parameters in Binary Translation. IMECS 2007: 1163-1168 - [c9]Miao Wang, Rongcai Zhao, Guoming Cai:
Un-speculation in Modulo Scheduled Loops. IMSCCS 2007: 486-489 - [c8]Lin Han, Rongcai Zhao, Jianmin Pang:
Dynamic decomposition algorithm merging control flow analysis. PDPTA 2007: 245-249 - [c7]Xuerong Gong, Linsheng Lu, Rongcai Zhao:
Communication Optimization Algorithms based on Extend Data Flow Graph. SNPD (3) 2007: 3-8 - [c6]Chunli Dong, Rongcai Zhao, Zhuojie Ma, Donghong Li:
Communication Optimization on Automatic Program Parallelization. SNPD (1) 2007: 437-442 - [c5]Yanan Shen, Rongcai Zhao, Lei Wang:
Eliminating Redundant Communication of Code Generation for Distributed Memory Machines. SNPD (2) 2007: 751-756 - 2006
- [c4]Yanan Shen, Rongcai Zhao, Jianmin Pang:
Automatic code generation of data decomposition. Infoscale 2006: 12 - [c3]Shanshan Wang, Rongcai Zhao, Jianmin Pang:
Improvement and Implementation of Accurate Array Data-Flow Analysis. PDPTA 2006: 620-629 - [c2]Xuemeng Zhang, Rongcai Zhao, Jianmin Pang:
Semantic Abstraction of IA-64 Multimedia Instructions. SKG 2006: 91 - 2005
- [c1]Zheng Shan, Rongcai Zhao, Kangmin Xie:
A Model for NP-based Application Design. PDCAT 2005: 880-883 - 2003
- [j1]Dongrui Fan, Hongbo Yang, Guang Rong Gao, Rongcai Zhao:
Evaluation and Choice of Various Branch Predictors for Low-Power Embedded Processor. J. Comput. Sci. Technol. 18(6): 833-838 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint