default search action
Jianqiang Shen
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Sotiris Vasileiadis, Matthew Paraskeva, George Savva, Andreas Efstathiou, Edson Ramiro Lucas Filho, Jianqiang Shen, Lun Yang, Ke-Bo Fu, Herodotos Herodotou:
Optimizing Distributed Tiered Data Storage Systems with DITIS. Proc. VLDB Endow. 17(12): 4393-4396 (2024) - [i4]Ping Liu, Haichao Wei, Xiaochen Hou, Jianqiang Shen, Shihai He, Kay Qianqi Shen, Zhujun Chen, Fedor Borisyuk, Daniel Hewlett, Liang Wu, Srikant Veeraraghavan, Alex Tsun, Chengming Jiang, Wenjing Zhang:
LinkSAGE: Optimizing Job Matching Using Graph Neural Networks. CoRR abs/2402.13430 (2024) - [i3]Jianqiang Shen, Yuchin Juan, Shaobo Zhang, Ping Liu, Wen Pu, Sriram Vasudevan, Qingquan Song, Fedor Borisyuk, Kay Qianqi Shen, Haichao Wei, Yunxiang Ren, Yeou S. Chiou, Sicong Kuang, Yuan Yin, Ben Zheng, Muchen Wu, Shaghayegh Gharghabi, Xiaoqing Wang, Huichao Xue, Qi Guo, Daniel Hewlett, Luke Simon, Liangjie Hong, Wenjing Zhang:
Learning to Retrieve for Job Matching. CoRR abs/2402.13435 (2024) - 2022
- [j5]Jiliang Jin, Liyun Xing, Jianqiang Shen, Ran Li, Miao Yang, Zhen Xiong Zhou:
Design of a Dynamic Sparse Circulant Measurement Matrix Based on a New Compound Sine Chaotic Map. IEEE Access 10: 10827-10837 (2022) - 2021
- [j4]Jin Gu, Jianqiang Shen, Baoyun Wang:
A robust and secure multi-authority access control system for cloud storage. Peer-to-Peer Netw. Appl. 14(3): 1488-1499 (2021) - 2020
- [c30]Sahin Cem Geyik, Luthfur Chowdhury, Florian Raudies, Wen Pu, Jianqiang Shen:
Impression Pacing for Jobs Marketplace at LinkedIn. CIKM 2020: 2445-2452
2010 – 2019
- 2018
- [c29]Chengyong Si, Jianqiang Shen, Weian Guo, Lei Wang:
On the Cooperation Between Evolutionary Algorithms and Constraint Handling Techniques. ICSI (1) 2018: 42-50 - 2017
- [c28]Jianqiang Shen, Chengyong Si, Xuan Zou, Taoning Li:
Elman neural network-based identification of fabric weave patterns with wavelet & radon transform. CISP-BMEI 2017: 1-5 - [c27]Chengyong Si, Jianqiang Shen, Xuan Zou, Lei Wang:
Comparison of Differential Evolution Algorithms on the Mapping Between Problems and Penalty Parameters. ICSI (1) 2017: 420-428 - [i2]Sahin Cem Geyik, Jianqiang Shen, Shahriar Shariat, Ali Dasdan, Santanu Kolay:
Towards Data Quality Assessment in Online Advertising. CoRR abs/1711.11175 (2017) - 2016
- [c26]Sahin Cem Geyik, Sergey Faleev, Jianqiang Shen, Sean O'Donnell, Santanu Kolay:
Joint Optimization of Multiple Performance Metrics in Online Video Advertising. KDD 2016: 471-480 - [c25]Chengyong Si, Jianqiang Shen, Xuan Zou, Lei Wang, Qidi Wu:
On the Constraint Normalization: An Empirical Study. ICSI (1) 2016: 236-243 - 2015
- [j3]Jianqiang Shen, Oliver Brdiczka, Juan Liu:
A study of Facebook behavior: What does it tell about your Neuroticism and Extraversion? Comput. Hum. Behav. 45: 32-38 (2015) - [c24]Jianqiang Shen, Burkay Orten, Sahin Cem Geyik, Daniel Liu, Shahriar Shariat, Fang Bian, Ali Dasdan:
From 0.5 Million to 2.5 Million: Efficiently Scaling up Real-Time Bidding. ICDM 2015: 973-978 - [c23]Jianqiang Shen, Sahin Cem Geyik, Ali Dasdan:
Effective Audience Extension in Online Advertising. KDD 2015: 2099-2108 - [c22]Chengyong Si, Jianqiang Shen, Xuan Zou, Yashuai Duo, Lei Wang, Qidi Wu:
A Dynamic Penalty Function for Constrained Optimization. ICSI (2) 2015: 261-272 - 2014
- [c21]Chengyong Si, Jianqiang Shen, Xuan Zou, Lei Wang, Qidi Wu:
Mapping constrained optimization problems to penalty parameters: An empirical study. IEEE Congress on Evolutionary Computation 2014: 3073-3079 - 2013
- [j2]Jianqiang Shen, Oliver Brdiczka, Yiye Ruan:
A comparison study of user behavior on Facebook and Gmail. Comput. Hum. Behav. 29(6): 2650-2655 (2013) - [c20]Francis T. O'Donovan, Connie Fournelle, Steve Gaffigan, Oliver Brdiczka, Jianqiang Shen, Juan Liu, Kendra E. Moore:
Characterizing user behavior and information propagation on a social multimedia network. ICME Workshops 2013: 1-6 - [c19]Oleg Kurmaev, Yanxing Zeng, Sergei V. Fedorenko, Vladimir Ivanov, Jianqiang Shen:
Pseudo-ternary run-length limited spectrum shaped codes. ISIT 2013: 146-150 - [c18]Jianqiang Shen, Oliver Brdiczka, Juan Liu, Masafumi Suzuki:
WhoAmi: profiling attendees before meetings. IUI Companion 2013: 81-82 - [c17]Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, John Hanley:
Modeling Attrition in Organizations from Email Communication. SocialCom 2013: 331-338 - [c16]Elise T. Axelrad, Paul J. Sticha, Oliver Brdiczka, Jianqiang Shen:
A Bayesian Network Model for Predicting Insider Threats. IEEE Symposium on Security and Privacy Workshops 2013: 82-89 - [c15]Jianqiang Shen, Oliver Brdiczka, Juan Liu:
Understanding Email Writers: Personality Prediction from Email Messages. UMAP 2013: 318-330 - [i1]Francis T. O'Donovan, Connie Fournelle, Steve Gaffigan, Oliver Brdiczka, Jianqiang Shen, Juan Liu, Kendra E. Moore:
Characterizing User Behavior and Information Propagation on a Social Multimedia Network. CoRR abs/1305.2091 (2013) - 2012
- [c14]Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut:
Proactive Insider Threat Detection through Graph Learning and Psychological Context. IEEE Symposium on Security and Privacy Workshops 2012: 142-149 - [c13]Jianqiang Shen, Oliver Brdiczka, Nicolas Ducheneaut, Nicholas Yee, Bo Begole:
Inferring Personality of Online Gamers by Fusing Multiple-View Predictions. UMAP 2012: 261-273 - 2011
- [c12]Jian Cheng, Jianqiang Shen:
Off-Topic Detection in Automated Speech Assessment Applications. INTERSPEECH 2011: 1597-1600 - 2010
- [c11]Jianqiang Shen, Xuan Zou, Fang Xu, Zhicong Xian:
Intelligent Recognition of Fabric Weave Patterns Using Texture Orientation Features. ICICA (2) 2010: 8-15 - [c10]Jian Cheng, Jianqiang Shen:
Towards accurate recognition for children's oral reading fluency. SLT 2010: 103-108 - [p1]Thomas G. Dietterich, Xinlong Bao, Victoria Keiser, Jianqiang Shen:
Machine Learning Methods for High Level Cyber Situation Awareness. Cyber Situational Awareness 2010: 227-247
2000 – 2009
- 2009
- [j1]Jianqiang Shen, Thomas G. Dietterich:
A family of large margin linear classifiers and its application in dynamic environments. Stat. Anal. Data Min. 2(5-6): 328-345 (2009) - [c9]Jianqiang Shen, Jed Irvine, Xinlong Bao, Michael Goodman, Stephen Kolibaba, Anh Tran, Fredric Carl, Brenton Kirschner, Simone Stumpf, Thomas G. Dietterich:
Detecting and correcting user activity switches: algorithms and interfaces. IUI 2009: 117-126 - [c8]Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietterich:
Discovering frequent work procedures from resource connections. IUI 2009: 277-286 - [c7]Jianqiang Shen, Thomas G. Dietterich:
A Family of Large Margin Linear Classifiers and Its Application in Dynamic Environments. SDM 2009: 164-172 - 2008
- [c6]Jianqiang Shen, Lida Li, Weng-Keen Wong:
Markov Blanket Feature Selection for Support Vector Machines. AAAI 2008: 696-701 - [c5]Jianqiang Shen, Werner Geyer, Michael J. Muller, Casey Dugan, Beth Brownholtz, David R. Millen:
Automatically finding and recommending resources to support knowledge workers' activities. IUI 2008: 207-216 - 2007
- [c4]Jianqiang Shen, Lida Li, Thomas G. Dietterich:
Real-Time Detection of Task Switches of Desktop Users. IJCAI 2007: 2868-2873 - [c3]Jianqiang Shen, Thomas G. Dietterich:
Active EM to reduce noise in activity recognition. IUI 2007: 132-140 - 2006
- [c2]Jianqiang Shen, Lida Li, Thomas G. Dietterich, Jonathan L. Herlocker:
A hybrid learning system for recognizing user tasks from desktop activities and email messages. IUI 2006: 86-92 - 2005
- [c1]Simone Stumpf, Xinlong Bao, Anton N. Dragunov, Thomas G. Dietterich, Jonathan L. Herlocker, Kevin Johnsrude, Lida Li, Jianqiang Shen:
The TaskTracker System. AAAI 2005: 1712-1713
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint