scispace - formally typeset
R

Runyuan Sun

Researcher at University of Jinan

Publications -  43
Citations -  525

Runyuan Sun is an academic researcher from University of Jinan. The author has contributed to research in topics: Data management & Data Web. The author has an hindex of 11, co-authored 39 publications receiving 487 citations.

Papers
More filters
Journal ArticleDOI

A Task Scheduling Algorithm Based on PSO for Grid Computing

TL;DR: A heuristic approach based on particle swarm optimization algorithm is adopted to solving task scheduling problem in grid environment and the results of simulated experiments show that the particle swarm optimized algorithm is able to get the better schedule than genetic algorithm.
Proceedings ArticleDOI

Traffic classification using probabilistic neural networks

TL;DR: Experimental results show that probabilistic neural network is an effective machine learning technique for traffic identification.
Journal ArticleDOI

Improving matrix approximation for recommendation via a clustering-based reconstructive method

TL;DR: A reconstructive method that compresses low-rank approximation into a cluster-level rating-pattern referred to as a codebook, and then constructs an improved approximation by expending the codebook improves the prediction accuracy of the state-of theart matrix factorization and social recommendation models.
Proceedings ArticleDOI

Toward a lightweight framework for monitoring public clouds

TL;DR: This paper described the experience with a lightweight monitoring framework that performed end-to-end measurements at virtual machine instances and software in the public cloud and discussed the manager-agent and module-centralized architecture in details.
Patent

Multi-feature mobile terminal malicious software detecting method based on network flow and multi-feature mobile terminal malicious software detecting system based on network flow

TL;DR: In this paper, a multi-feature mobile terminal malicious software detecting method based on network flow is presented, which comprises the following steps of: extracting features capable of effectively representing mobile terminals malicious software network behaviors from network flow data; classifying the extracted features according to different feature types; building detecting models adapting to the classified features; and selecting the corresponding detecting model for each kind of features, and outputting a corresponding detecting result.