Shaozhi Ye
Shaozhi Ye
Software Engineer at Google Inc.
Verified email at - Homepage
Cited by
Cited by
Measuring message propagation and social influence on Twitter. com
S Ye, SF Wu
Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010
Crawling online social graphs
S Ye, J Lang, F Wu
2010 12th International Asia-Pacific Web Conference, 236-242, 2010
Distributed PageRank computation based on iterative aggregation-disaggregation methods
Y Zhu, S Ye, X Li
Proceedings of the 14th ACM international conference on Information and …, 2005
Understanding current IPv6 performance: a measurement study
Y Wang, S Ye, X Li
10th IEEE Symposium on Computers and Communications (ISCC'05), 71-76, 2005
Template detection for large scale search engines
L Chen, S Ye, X Li
Proceedings of the 2006 ACM symposium on Applied computing, 1094-1098, 2006
Noise injection for search privacy protection
S Ye, F Wu, R Pandey, H Chen
2009 International Conference on Computational Science and Engineering 3, 1-8, 2009
Estimating the size of online social networks
S Ye, SF Wu
International Journal of Social Computing and Cyber-Physical Systems 1 (2 …, 2011
中国水土保持科学 2 (3), 64-69, 2004
A systematic study on parameter correlations in large-scale duplicate document detection
S Ye, JR Wen, WY Ma
Knowledge and Information Systems 14, 217-232, 2008
Davis social links: integrating social networks with internet routing
L Banks, S Ye, Y Huang, SF Wu
Proceedings of the 2007 workshop on Large scale attack defense, 121-128, 2007
Microsoft Research Asia at the Web Track of TREC 2003.
JR Wen, R Song, D Cai, K Zhu, S Yu, S Ye, WY Ma
TREC, 408-417, 2003
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
DAS De Oliveira, JR Crandall, G Wassermann, S Ye, SF Wu, Z Su, ...
NOMS 2008-2008 IEEE Network Operations and Management Symposium, 121-128, 2008
Socialwiki: Bring order to wiki systems with social context
H Zhao, S Ye, P Bhattacharyya, J Rowe, K Gribble, SF Wu
Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010
Design and implementation of faith, an experimental system to intercept and manipulate online social informatics
R Lee, R Nia, J Hsu, KN Levitt, J Rowe, SF Wu, S Ye
2011 International Conference on Advances in Social Networks Analysis and …, 2011
Workload-aware Web crawling and server workload detection
S Ye, G Lu, X Li
Proceedings of the second Asia-Pacific advanced network research workshop …, 2004
A query-dependent duplicate detection approach for large scale search engines
S Ye, R Song, JR Wen, WY Ma
Advanced Web Technologies and Applications: 6th Asia-Pacific Web Conference …, 2004
Design and implementation of davis social links osn kernel
T Tran, K Chan, S Ye, P Bhattacharyya, A Garg, X Lu, SF Wu
Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009
Error restricted fast MAP decoding of VLC
M Jia, J Wen, S Ye, X Li
IEEE communications letters 9 (10), 909-911, 2005
Online social network measurements and search privacy protection
S Ye
University of California, Davis, 2010
Putting trojans on the horns of a dilemma: Redundancy for information theft detection
JR Crandall, J Brevik, S Ye, G Wassermann, DAS De Oliveira, Z Su, ...
Transactions on Computational Science IV: Special Issue on Security in …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20