​
Login / Signup
Ti Zhou
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 12
Top Topics
Energy Saving
Reinforcement Learning
Home Appliances
Embedded Devices
Top Venues
CoRR
Manag. Sci.
ICAIS (1)
IEEE Internet Things J.
</>
Publications
</>
Haoyu Wang
,
Xinyi Li
,
Ti Zhou
,
Man Lin
Data-driven Software-based Power Estimation for Embedded Devices.
CoRR
(2024)
Ti Zhou
,
Man Lin
CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning.
CoRR
(2023)
Ti Zhou
,
Man Lin
CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning.
J. Syst. Archit.
142 (2023)
Saroj Kumar Panda
,
Man Lin
,
Ti Zhou
Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing.
IEEE Internet Things J.
10 (8, April 15) (2023)
Dan Yang
,
Xinyi Zhang
,
Ti Zhou
,
Tao Wang
,
Jiahui Li
A Novel Pipeline Corrosion Monitoring Method Based on Piezoelectric Active Sensing and CNN.
Sensors
23 (2) (2023)
Ti Zhou
,
Man Lin
Deadline-Aware Deep-Recurrent-Q-Network Governor for Smart Energy Saving.
IEEE Trans. Netw. Sci. Eng.
9 (6) (2022)
Zhengming Zhang
,
Ran Zuo
,
Rui Guo
,
Yanfeng Li
,
Ti Zhou
,
Han Xue
,
Cuixia Ma
,
Hongan Wang
Multi-scale visualization based on sketch interaction for massive surveillance video data.
Pers. Ubiquitous Comput.
25 (6) (2021)
Ti Zhou
,
Jinying Wang
,
Yi Miao
A Formal Method for Safety Time Series Simulation of Aerospace.
ICAIS (1)
(2020)
Ron Kaniel
,
Stathis Tompaidis
,
Ti Zhou
Impact of Managerial Commitment on Risk Taking with Dynamic Fund Flows.
Manag. Sci.
65 (7) (2019)
Jian Zhang
,
Qing Ye
,
Ti Zhou
Anomaly Detection of Target Dynamics Based on Clustering.
I-SPAN
(2018)
Tong Li
,
Yuhui Zheng
,
Ti Zhou
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks.
Secur. Commun. Networks
2017 (2017)
Yan Huang
,
Ti Zhou
,
Yanfeng Li
,
Yan Zhang
,
CuiXia Ma
Interactive Animation Editing Based on Sketch Interaction.
Monterey Workshop
(2016)
Jingjun Jiao
,
Xiaozhou Xin
,
Jing Zhao
,
Li Li
,
Ti Zhou
,
Zhiqing Peng
Estimation of evapotranspiration over heterogeneous surface based on HJ-1B satellite.
IGARSS
(2014)
Ti Zhou
,
Mengjun Li
,
Zhoujun Li
Local abstract verification and refinement of security protocols.
FMSE
(2008)
Ti Zhou
,
Zhoujun Li
,
Mengjun Li
,
Huowang Chen
Constraint Abstraction in Verification of Security Protocols.
FAW
(2008)
Mengjun Li
,
Ti Zhou
,
Zhoujun Li
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Inscrypt
(2008)
Ti Zhou
,
Mengjun Li
,
Zhoujun Li
,
Huowang Chen
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Electron. Notes Theor. Comput. Sci.
212 (2008)
Feng Liu
,
Zhoujun Li
,
Ti Zhou
,
Mengjun Li
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
SEKE
(2008)
Mengjun Li
,
Zhoujun Li
,
Huowang Chen
,
Ti Zhou
A Novel Derivation Framework For Definite Logic Program.
Electron. Notes Theor. Comput. Sci.
212 (2008)
Zhoujun Li
,
Ti Zhou
,
Mengjun Li
,
Huowang Chen
Constraints Solution for Time Sensitive Security Protocols.
FAW
(2007)
Mengjun Li
,
Ti Zhou
,
Zhoujun Li
,
Huowang Chen
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
ASIAN
(2007)