教师名录
黄荷姣
通讯地址:广东省深圳市南山区西丽大学城哈工大校区
电子邮件:hjhuang@hitsz.edu.cn;hejiao0@yahoo.com.cn
联系电话:0755-26033487(o);13632597055 (m)

个人简介

哈尔滨工业大学,深圳研究生院,教授,博士生导师
深圳市高层次专业人才(地方级)、深圳市海外高层次专业人才(C类)、深圳市互联网信息协同技术及应用重点实验室副主任。在相关领域发表论文100余篇,其中SCI论文40余篇,EI论文60余篇。据scholar.google统计,全部文章引用3599次,H-index 30,i10-index 96

研究方向

1、无线网络(Mesh 网,传感器网,自组网,下一代网络等)
2、可信计算 (软件形式化方法,安全策略设计,安全协议验证等)
3、云计算 (虚拟能效,云存储安全与隐私保护,移动云计算等)
4、智慧供应链 (智能库存,动态配货,多目标路径规划等)
5、Petri网理论,组合优化

教育经历

2001/02-- 2004/06  博士 香港城市大学计算机科学系
1996/09-- 1999/07  硕士 陕西师范大学数学系
1992/09-- 1996/07  学士 陕西师范大学数学系

研究与工作经历

2011/07 至今  哈尔滨工业大学深圳研究生院教授
2008/07--2009/06  法国INRIA特聘教授
2006/12--2011/07  哈尔滨工业大学深圳研究生院副教授
2004/12--2006/12  哈尔滨工业大学深圳研究生院博士后
1999/02--2001/01  香港城市大学计算机系助理研究员
1998/10--2004/01  陕西师范大学数学系讲师

专业资质与学术兼职

2012/01--2013/12  中国计算机学会会员(Petri网专家委员会成员)
2005年至今  IEEE 会员
2009年至今  IEEE TPDS, IEEE TSE, IEEE TDSC, TCS 等国际期刊审稿人。SAPSE, COCOON,COCOA 等国际会议程序委员会成员。

科研项目

2016/07--2018/07  深圳市基础研究项目,分布式云计算虚拟机部署策略及优化算法设计,JCYJ20160318094101317
2014/01--2017/12  国家自然科学基金项目,11371004,面向物流行业的车辆路径问题研究与系统实现
2013/08--2015/08   深圳市基础研究项目,广义车辆路径问题研究及其面向物流行业的应用, JCYJ20130329153215152
2012/11--2014/09   深圳市基础研究项目,无线网络安全协议设计与形式化验证,JCYJ20120613151201451
2011/01—2013/12  国家自然科学基金面上项目,11071271,多域交互环境下RBAC安全策略形式化设计
2011/01-2012/12  粤港合作深圳市深港创新圈重点项目,JSE201007140001A、基于Mesh 网和无线传感器网络的实时事件监测系统研究
2008/01--2010/12  国家自然科学基金青年基金项目,10701030、大规模车间调度系统设计,优化及应用
2006/12-2008/12  国家863重点项目,2006AA01Z197,基于NLP的智能搜索引擎 (参加)
2005/01--2006/12  中国博士后基金,2005037180、基于构件性质保留Petri网进程代数(应用于智能信息检索系统设计)
2016/07--2019/06  国家重点研发计划,面向网安试验的网络仿真与效果评估关键技术,(网络空间安全专项,子课题名称:系统安全与管理,课题 编号:2016YFB0800804,2016YFB0800800(参与)
2016/08--2018/08  国家自然基金,面向云数据高级查询的可搜索加密模型与关键技术研究, 61672195(参与)

科研成果及奖励

2011,2010  校教学观摩二等奖、一等奖
2006、2007、2008  校精品课程
2008  校三八红旗手
2008  深圳市科研创新奖(排名第三)

发明专利

1. 顾崇林、黄荷姣, 梁良, 能耗监控方法及装置 201480000337.0
2. 黄荷姣,顾崇林,史鹏宙,石帅: 基于树回归的虚拟化云平台能耗测量方法及系统201410592305.6

论文及著作

1.C. Gu, L. Fan, W. Wu, H. Huang, X. Jia, "Greening cloud data centers in an economical way by energy trading with the power grid", Future Generation Computer Systems. 2016.

2.Tao Lv, Feng He, Hejiao Huang, Xiaohua Jia, "Collaborative Data Downloading by using Inter-Satellite Links in Satellite Networks", accepted by IEEE Transactions on Wireless Communications.2016.

3.Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang, Xuan Wang, "Key based data analytics across data centers considering bi-level resource provision in cloud computing". Future Generation Comp. Syst. 62: 40-50,2016.

4.Jiangtao Zhang, Hejiao Huang, Xuan Wang,"Resource provision algorithms in cloud computing: A survey". J. Network and Computer Applications 64: 23-42,2016.

5.Shi Chen, Chonglin Gu, Jiangtao Zhang, Hejiao Huang, Xiaohua Jia. "Reservation Schemes for IaaS Cloud Broker: A Time-multiplexing Way for Different Rental Time". Concurrency and Computation: Practice and Experience,2016.

6.Nuo Yu, Yuting Miao, Lan Mu, Hejiao Huang, Hongwei Du, Xiaohua Jia, “Minimizing Energy Cost by Dynamic Switching On/Off Base Stations in Cellular Networks” IEEE Transactions on Wireless Communications. Volume: 15, Issue: 11,7457 - 7469,2016.

7.Jiangtao Zhang, Hejiao Huang, Xuan Wang, "Clustering Based Virtual Placement in Machines Distributed Cloud Computing " ,Future Generation Computer Systems,vol.66,1–10,2016.

8.Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Xuan Wang, Chonglin Gu, and Zhixiang He, "A Unified Algorithm for Virtual Desktops Placement in Distributed Cloud Computing," Mathematical Problems in Engineering, vol. 2016, 15 pages, 2016.

9.Liang Song, Dan Yang, Hejiao Huang, "A lower bound for the adaptive two-echelon capacitated vehicle routing problem", Journal of Combinatorial Optimization. 1-23,2016.

10.Chunyan Liu, Hejiao Huang, Hongwei Du, "Optimal RSUs Deployment with Delay Bound Along Highways in VANET", Journal of Combinatorial Optimization.1-15,2016.

11.Liang Song,Hejiao Huang,Hongwei Du, "Approximation schemes for Euclidean vehicle routing problems with time windows", Journal of Combinatorial Optimization. 32(4), 1217-1231,2016,DOI 10.1007/s10878-015-9931-5,2016.

12.He Zhixiang, GuChonglin, Chen Shi, Huang Hejiao, JiaXiaohua,"Detecting Spammers using Review Graph".(JHPCN), InderScience, 2015.

13.LiangSong, HaibinChen, HaoGu, HejiaoHuang, HongweiDu, "Set covering in fuel-considered vehicle routing problems" , Theoretical Computer Science,pp. 471-479 ,2015.

14.Hejiao Huang, Feng Shang, Jinling Liu and Hongwei Du, “Handling Least Privilege Problem and Role Mining in RBAC”, Journal of Combinatorial Optimization: Volume 30, Issue 1 , Page 63-86,2015.

15.Chonglin Gu, Pengzhou Shi, Shuai Shi, Hejiao Huang, Xiaohua Jia, " A Tree Regression Based Approach for VM Power Metering" IEEE Accss, 2015.

16.Chonglin Gu, Hejiao Huang, Xiaohua JIa, " Power Metering for Virtual Machine in Cloud Computing---Challenges and Opportunities", IEEE Access, vol. 2, issue 1, pp. 1106-1116, Dec 2014.

17.Chunyan Liu, Bo Fu, Hejiao Huang, “Delay Minimization and Priority Scheduling in Wireless Mesh Networks”, Wireless Networks, Volume 20, Issue 7, pp.1955-1965, 2014.

18.Huihui Wang, Yun Peng and Hejiao Huang,"AG-Index:Adjacent Edge Hash Index for Graph Databases", Applied Mechanics and Materials, vol. 631-632, pp.1045-1048, 2014.

19.Hejiao Huang, Helene Kirchner, “Secure Interoperation Design in Multi-domain Environments based on Colored Petri Nets”, Information Sciences 221,pp.591-606, 2013.

20.Baohua Wang, Hejiao Huang, Xiaolong Wang, “A Support Vector Machine Based MSM Model for Financial Short-Term Volatility Forecasting”, Neural Computing & Applications, vol. 22, pp. 21-28, 2013.

21.刘猛,王轩,黄荷娇,赵海楠,张加佳,“基于Petri网的IRBAC 2000域间动态转换SMER约束违反检测”,《计算机研究与发展》49(9):1991—1998,2012.

22.Baohua Wang, Hejiang Huang, Xiaolong Wang, “A Novel Text Mining Approach to Financial Time Series Forecasting”, Neurocomputing, vol. 83, pp136-145, 2012.

23.Hejiao Huang, Helene Kirchner, “Formal Specification and Verification of Modular Security Policy based on Colored Petri Nets”,IEEE Transactions on Dependable and Secure Computing, vol8(6), pp.852-865, 2011.

24.Farooq Ahmad, Hejiao Huang, and Xiaolong Wang, “Analysis of the Petri net model of parallel manufacturing processes with shared resources”, Inform. Sci. , vol.181(23), pp.5249-5266, 2011.

25.Hejiao Huang, Taiping Lu, “Solving a Multi-objective Flexible Job Shop Scheduling Problem with Timed Petri Nets and Genetic Algorithm”, Discrete Mathematics, Algorithms, and Applications,Volume: 2, Issue: 2, pp. 221-237,2010.

26.Farooq Ahmad, Hejiao Huang, and Xiaolong Wang, “Analysis of Parallel Manufacturing Processes with Resource Sharing”, International Journal of Computer Theory and Engineering, vol. 2, no. 2, pp.250-257, 2010.

27.Farooq Ahmad, Hejiao Huang, and Xiaolong Wang, “Petri net modeling and deadlock analysis of parallel manufacturing processes with shared resources”, Journal of Systems and Software, vol. 83(4), pp. 675-688, 2010.

28.Baohua Wang, Hejiang Huang, Xiaolong Wang, “ARSSearch: a Semantic Search Engine for the Annual Reports”, Journal of Computational Information Systems,6(5):1833-1840. 2009.

29.Baohua Wang, Hejiao Huang, Xiaolong Wang, Wensheng Chen, “An Ontology-Based NLP Approach to Semantic Annotation of Annual Report” , In 2009 International Conference on Computational Intelligence and Security(CIS),1:180-183,2009.

30.Hejiao Huang, Helene Kirchner, Songyun Liu and Weili Wu, “Handling Inheritance Violation for Secure Interoperation of Heterogeneous Systems”, International Journal of Security and Networks, vol. 4, no.4, pp. 223-233, 2009.

31.Hejiao Huang, Xiaolu Cao, Xiaohua Jia, and Xiaolong Wang, “Channel Assignment using Block Design in Wireless Mesh Networks”, Computer Communications, Volume 32, Issues 7-10,pp. 1148-1153,2009

32.Hejiao Huang, “Component-based Design for Job-shop Scheduling Systems”, International Journal of Advanced Manufacturing Technology, vol. 45, issue 9, pp.958-967,2009.

33.D. He, L. Cui, H. Huang, M. Ma, “Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 20, no. 7, pp. 1050-1058, 2009.

34.D. He, L. Cui, H. Huang, M. Ma, “Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks,” International Journal on Wireless Personal Communications , vol. 50, no. 4, pp. 545-561, 2009.

35.Farooq Ahmad, Hejiao Huang, and Xiaolong Wang, “A Technique for Reachability Graph Generation for the Petri Net Models of Parallel Processes”, International Journal of Computer Science and Engineering 3(1): 57-61, 2009.

36.Farooq Ahmad, Hejiao Huang, and Xiaolong Wang, “A technique for generating the reachability graph for parallel processes", International Journal of Electrical and Electronics Engineering (IJEEE), in Issue 5, Vol 3, pp. 298-302, 2009.

37.Li Jiao, Hejiao Huang, To-Yat Cheung,"Handling Resource Sharing Problem Using Property-Preserving Place Fusions of Petri Nets". Journal of Circuits, Systems, and Computers 17(3): 365-387,2008.

38.Farooq,Hejiao Huang and Xiaolong Wang,"Analysis of Structure properties of Petri Nets Using Transition Vectors”,Information Technology Journal, vol. 7(2), 285-291, 2008.

39.Hejiao Huang,To-yat Cheung and Xiaolong Wang, “Applications of Property-Preserving Algebras to Manufacturing System Design”, Journal of Information Science and Engineering, Vol. 23, 167-181,2007.

40.Li Jiao, Hejiao Huang and To-yat Cheung, “Property-preserving Composition by Place Merging”, Journal of Circuits, Systems and Computers, vol. 14, no. 4, pp793-812, 2005.

41.Hejiao Huang, Li Jiao and To-yat Cheung, “Property-Preserving Subnet Reductions for Designing Manufacturing Systems with Shared Resources”, Theoretical Computer Science,vol. 332, issue 1-3, pp.461-485,2005.

42.Hejiao Huang, To-Yat Cheung and Wai Ming Mak, “Structure and Behaviour Preservation by Petri-net-based Refinements in System Design”, Theoretical Computer Science, vol. 328, issue 3, pp.245-269,2004.

43.X. Jia, D. Du, X. Hu, H. Huang and D. Li, “On the Optimal Placement of Wavelength Converters in WDM Networks”, Computer Communications, vol. 26, pp. 986-995, 2003.

44.X. Jia, D. Du, X. Hu, H. Huang, and D. Li, “Optimal Placement of Wavelength Converters for Guaranteed Wavelength Assignment in WDM Networks”, IEICE Trans. Communications, vol. E85-B, no. 9, pp. 1731-1739, 2002.

45.X. Hu, X. Jia, D. Du, D. Li, and H. Huang, “Placement of Data Replicas for Optimal Data Availability in Ring Networks”, Journal of Parallel and Distributed Computing, vol. 61, no. 10, pp. 1412-1424, 2001.

46.X. Jia, D. Du, X. Hu, H. Huang, and D. Li, “Optimal Placement of Wavelength Converters in WDM Networks with Special Topologies”, Optical Networks- Recent Advances, D. Du and L. Ruan (eds.), Kluwer Academic Public, pp. 75-98, 2001.

会议论文及发表演说

1.Lan Mu(#),Nuo Yu,Hejiao Huang,Hongwei Du,Xiaohua Jia,"Distributed Real-Time Pricing Scheme for Local Power Supplier in Smart Community",2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),pp 40-47,2016.

2.Yuting Miao(#),Nuo Yu,Hejiao Huang,Hongwei Du,Xiaohua Jia,"Minimizing Energy Cost of Base Stations with Consideration of Switching on/off Cost". 2016 International Conference on Advanced Cloud and Big Data (CBD),pp 310  ~  315,2016.

3.Tao Lv(#),Wenqiang Liu,Hejiao Huang,Xiaohua Jia,"Optimal Data Downloading by Using Inter-Satellite Offloading in LEO Satellite Networks". 2016 IEEE Global Communications Conference (GLOBECOM),pp1-6,2016.

4.Chunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia, "Performance- Guaranteed  Strongly  Connected Dominating Sets in Heterogeneous Wireless Sensor Networks", Proceedings of INFOCOM 2016.

5.Jiangtao Zhang, Linmin Zhang,Hejiao Huang,Xuan Wang,"Key based reducer placement for data analytics across data centers considering bi-level resource provision in cloud computing".2016.

6.Gu Chonglin, Huang Hejiao, Jia Xiaohua,"Green Scheduling for Cloud Data Centers Using ESDs to Store Renewable Energy "[C]. IEEE International Conference on Communications (ICC), pp1-7,2016.

7.Feng He, Qin Liu, Tao Lv, Chunyan Liu, Hejiao Huang, Xiaohua Jia, "Delay-bounded and minimal transmission broadcast in LEO satellite networks", in Proceedings of IEEE International Conference on Communications (ICC), pp1-7,2016.

8.Chonglin Gu, Zhenlong Li, Chunyan Liu, Hejiao Huang. "Planning for Green Cloud Data Centers Using Sustainable Energy" [C]. ISCC2016.

9.Chonglin Gu, Ke Hu, Zhenlong Li, Qiang Yuan, Hejiao Huang, Xiaohua Jia,"Lowering Down The Cost for Green Cloud Data Centers by Using ESDs and Energy Trading", Proceedings of the 14th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2016), pp 1508-1515,2016.

10.Shi Chen, Chonglin Gu, Jiangtao Zhang, Hejiao Huang, Xiaohua Jia,"A Time-multiplexing Way for Different Rental Time", special issue of Concurrency and Computation: Practice and Experience (CCPE) for IEEE TrustCom/ISPA/BigDataSE 2016 conferences.

11.Nuo Yu, Lan Mu, Yuting Miao, Hejiao Huang, Hongwei Du and Xiaohua Jia, “Distributed Load Scheduling in Smart Community With Capacity Constrained Local Power Supplier”, IPCCC 2015, pp 1-8,2015.

12.GuChongin, Zhang Linmin, He Zhixiang, Huang Hejiao, JiaXiaohua. "Minimizing Energy Cost for Green CloudData Centers by Using ESDs"[C]//Performance Computing and Communications Conference (IPCCC), pp 1-2,2015.

13.Chonglin Gu, Chunyan Liu,Jiangtao Zhang, Hejiao Huang, Xiaohua Jia, " Green Scheduling for Cloud Data Centers Using Renewable Resources", INFOCOM2015 WORKSHOP. pp 354-359,2015.

14.Dan Yang, Xiaohan He, Liang Song, Hejiao Huang, and Hongwei Du. "A Hybrid Large Neighborhood Search forDynamic Vehicle Routing Problem with TimeDeadline"[C]. The 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15), pp 307-318,2015.

15.Zeqi Song, Hongwei Du, Hejiao Huang, Chuang Liu,"Indoor Localization via Candidate Fingerprints and Genetic Algorithm". COCOA 2015: 319-333,2015.

16.Chonglin Gu, Chunyan Liu, Chen Shi, Zhixiang He,Hejiao Huang, and Xiaohua Jia,"A Green Scheduler for Cloud Data Centers Using Renewable Energy",Proceedings of ICA3PP, pp 476-491,2015.

17.Chonglin Gu, Shuai Shi, Pengzhou Shi, Hejiao Huang, and Xiaohua Jia, " Towards VM Power Metering: A Decision Tree Method and Evaluations", Proceedings of Algorithms and Architectures for Parallel Processing, pp 508-523,2015.

18.Jiangtao Zhang, Shi Chen, Hejiao Huang, Xuan Wang, and Dingzhu Du, "Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms" , Proceedings of ICA3PP, pp 339-356. 2015.

19.Lishi Chen, Chun-Yan Liu, Hejiao Huang"Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri net".  Q2SWinet@MSWiM 2015: 157-164, 2015.

20.Liang Song, Hejiao Huang, HOngwei Du, "A quasi-polynomial time approximation scheme for Euclidean CVRPTW", Proceedings of COCOA , pp. 66-73, 2014, Dec 19-21,2014.

21.Hao Gu, Liangsong, Hejiao Huang, Hongwei Du, " A Bicriteria Approximation Algorithm for DVRP with Time Windows " , Proceedings of COCOA, pp.231-238, 2014, Dec 19-21,2014.

22.Jiangtao Zhang, Chonglin Gu, Hejiao Huang, Xuan Wang, Zhixiang He, Lingmin Zhang, "SLA Aware Cost Efficient Virtual Machines Placement in Cloud Computing", Proceedings of IPCCC ,pp 1-8,2014.

23.Chunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia, “Optimizaton of RSU placement in mobile vehicle networks”, Proceedings of International Conference on Web-Age Information Management, 236-246, WAIM’14, LNCS.2014.

24.Huihui Wang, Yun Peng, Hejiao Huang, " AG-Index: Adjacent Edge Hash Index for Graph Databases", Proceedings of ICITMI2014, 第三届信息技术与管理创新国际学术会议, 2014.

25.Songsong Li, Yuqing Zhuy, Deying Li, Donghyun Kimz, Huan Ma, and Hejiao Huang, “Influence Maximization in Social Networks with User Attitude Modification”, Proceedings of ICC2014. pp 3913-3918,2014.

26.Ying-ying CHENG, He-jiao HUANG, Hong-wei DU, “Detecting Sybil Attacks in Mobile Wireless Sensor Networks based on ID Frequency”, proceedings of 2014 International Conferences on Computer, Network Security and Communication Engineering [CNSCE2014],22-23,2014.

27.Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, and Hejiao Huang,"Rumor Restriction in Online Social Networks",Proceedings of the 32nd IEEE International Performance Computing and Communications Conference (IPCCC 2013), Dec. 6-8,2013.

28.Jing Lv, Hongwei Du and Hejiao Huang, “A general framework on connected sensor cover in homogenous dense sensor networks”, 第七届中国传感器网络学术会议, 2013.

29.Ning Bao, Hejiao Huang, and Hongwei Du, “Keynote: Specification and Conflict Detection for GTRBAC in Multi-domain Environment,, Business Process Management Workshops, 467-472
proceedings of BPM’13. (2nd workshop on security in business process), August 26-30,2013.

30.Jiangtao Zhang, Chonglin Gu, Xuan Wang and Hejiao Huang,"A Unified MetaScheduler Architecture for Telecom Grade Cloud Computing”,proceedings of Third IEEE International Conference on Information Science and Technology,23-25,2013.

31.Hejiao Huang,Qiang Zhou, “Petri-net-based Modeling and Verification of Black Hole Attack in WMN”, Proceedings of COMPSAC 2012,pp.409-414,2012.

32.Hejiao Huang, Feng Shang, Jiangtao Zhang, “Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC”, Proceedings of COMPSAC 2012,pp.427-432,2012.

33.Jinling Liu, Hejiao Huang, Hongwei Du, “Greedy Algorithm for Least Privilege in RBAC Model”, Proceedings of COCOA 2011,pp.537-545,2011.

34.Guoli Zhao,Hejiao Huang,“Security Analysis of GTRBAC Models Using Colored Timed Petri Nets”,Proceedings of the 2010 International Conference on Information Security and Artificial Intelligence v2:383-387, Chengdu, Dec. 17-19, 2010.

35.Songyun Liu and Hejiao Huang," Role-Based Access Control for Distributed Cooperation Environment", 2009 International Conference on Computational Intelligence and Security,pp 455-459,2009.

36.Hejiao Huang, Helene Kirchner, “Policy Composition based on Petri Nets”, Proceedings of 33rd Annual IEEE International Computer Software and Applications Conference, pp.416-421, 2009.

37.Hejiao Huang, Helene Kirchner, “Component-based Security Policy Design with Colored Petri Nets”, Festschrift for Peter Mosses, LNCS 5700, pp. 21-42,2009.

38.Bo Fu, Hejiao Huang, “A QoS Framework with Traffic Request in Wireless Mesh Network”, Proceedings of International Conference on Wireless Algorithms, Systems, and Applications, LNCS 5682, pp. 418-427, 2009.

39.Hejiao Huang, Helene Kirchner, “Modular Security Policy Design based on Extended Petri Nets”, 39.Proceeding of INRIA,pp.1-19,2009.

40.Hejiao Huang, Helene Kirchner, “Secure Interoperation in Heterogeneous Systems based on RBAC”, 40.Proceeding of INRIA,pp.1-16,2009.

41.Hejiao Huang, Jing Li, Weisheng Zhou, “Deadlock-free Design of JSP with Multi-resource Sharing”, Proceedings of the International Conference on Computer and Electrical Engineering, pp.412-416, 2008.

42.Jing Li, Hejiao Huang, Farooq Ahmad, “Deadlock Avoidance of a Kind of JSP with Multi-resources Sharing”, Proceedings of the IEEE 11th Joint Conference on Information Science, 8th International Conference on Computational Intelligence and Natural Computing,2008.

43.Hejiao Huang and Yun Peng, “Throughput Maximization with Traffic Profile in Wireless Mesh Network”, Proceedings of the 14th Annual International Computing and Combinatorics Conference (COCOON). vol. 5092, pp.531-540,2008.

44.Hejiao Huang, Yun Peng and Jing Li, “Joint Routing and Channel Assignment Based on Extended Petri Nets”, Proceedings of the 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops 2008), pp. 108-113,2008.

45.Hejiao Huang, Yun Peng, Xiaolu Cao, and Xiaolong Wang, “Minimimum Transmission Period in Multi-radio Wireless Mesh Networks”, Proceedings of IEEE ICMLC 2008, pp, 1317-1322,2008.

46.Hejiao Huang, Xiaolu Cao and Xiaolong Wang, “Topology Simplification and Channel Assignment in Multi-radio Wireless Mesh Networks”, Proceedings of IEEE International Conference on SMC, 1285-1290,2008.

47.Farooq,Hejiao Huang and Xiaolong Wang, “ Sequential and Concurrent Behavior Analysis of Petri Nets Using Transition Vectors”, Proceedings of IEEE International Conference on SMC, pp.3636-3641,2008.

48.Farooq,Hejiao Huang and Xiaolong Wang, “Verification of Petri Net Models Based on Transition Vectors” Proceedings of IEEE ICMLC 2008.

49.Ahmad F, Huang H, Wang X, et al. A technique for generating the reduced reachability graph of petri net models[C]//Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on. IEEE, pp.3636-3641,2008.

50.周维生,黄荷姣,李婧, “混合遗传算法在柔性作业车间调度中的应用”, To appear in《计算机应用研究》,2009.7.

51.Hejiao Huang, Xiaolu Cao, Xiaohua Jia and Xiaolong Wang, “A BIBD-based Channel Assignment Algorithm for Multi-radio Wireless Mesh Networks”, Proceedings of the 5th International Conference on Machine Learning and Cybernetics (ICMLC2006), pp.4419-4424, Dalian, August 13-16, 2006.

52.Qingcai Chen, Pengfei Su, Hejiao Huang and Xiaolong Wang, “Evaluation for Liaison of Spoken English: A Sugeno Integration Approach”, Proceedings of the 5th International Conference on Machine Learning and Cybernetics (ICMLC2006), pp. 2617-2623, Dalian, August 13-16, 2006.

53.Qingcai Chen, Guanghong Deng, Xiaolong Wang and Hejiao Huang, “An Inner Contour Based Lip Moving Feature Extraction Method for Chinese Speech”, Proceedings of the 5th International Conference on Machine Learning and Cybernetics (ICMLC2006), pp. 3859-3864, Dalian, August 13-16, 2006.

54.Hejiao Huang, Xuan Wang, Qingcai Chen and Xiaolong Wang, “Specification and Verification of Multi-agent Systems with a Property-preserving Component-based Methodology”, Proceedings of the 4th International Conference on Machine Learning and Cybernetics (ICMLC2005), pp.90-95, Guangzhou August 18-21, 2005.

55.D. Frank Hsu, X.-D. Hu, H.-J. Huang and X.-H. Jia, “Optimal Data Replica Placements in Linear Bus Networks,” proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN-04), May 10-12, 2004.

56.H. Huang, L. Jiao and T. Y. Cheung, “Property-preserving Composition of Augmented Marked Graphs that Share Common Resources”, Proc. of the IEEE ICRA2003 (2003 IEEE International Conference on Robotics and Automation), pp. 1446-1451,2003.

57.H. Huang, T. Y Cheung and W. M. Mak, “Preservation of Nineteen Properties under Reductions”, Proc. of the 9th Bellman Continuum: International Workshop on Uncertain Systems and Soft Computing, pp. 328-336, 2002.

58.X. Jia, D. Du, X. Hu, H. Huang, and D. Li, “Placement of Wavelength Converters for Minimal Wavelength Usage in WDM Networks”, IEEE INFOCOM'02, 2002.

59.X. Jia, D. Li, X. Hu, H. Huang, and D. Du, “Optimal Placement of Proxies of Replicated Web Servers in the Internet”, Proc. of the 1st International Conf. on Web Information Systems Engineering, pp. 55-59,2000.

60.X. Jia, D. Du, X. Hu, H. Huang, and D. Li, “A New Wavelength Assignment Method for Minimal Wavelength Conversions in WDM Networks”, Proc. of the 9th IEEE International Conf. on Computer Communications and Network, pp. 621-624,2000.

61.X. Jia, D. Du, X. Hu, H. Huang, and D. Li, “Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems”, Proc. of the 4th International Conf. on Algorithms and Architectures for Parallel Processing (ICA3PP), pp. 548-559,2000.

任教和任导师经历

《组合数学》:硕士生秋季课程,32学时/2学分  该课程针对计算机专业涉及的数学理论讲解图论,组合计数及组合设计等。具体内容包括鸽巢原理,排列组合,二项式定理,容斥原理,递推关系与生成函数,二分图匹配,组合设计和Polya计数等。
《网络流规划》:博士生春季课程,32学时/2学分  该课程将综述网络流的应用,并针对网络流的一些特例重点介绍以下内容:最短路问题,最小生成树问题,最大流问题,最小费用流问题和多商品流问题等。
招生招聘  每年招收6-8名硕士研究生及2名博士研究生、2名博士后。
目前在读硕士生18名,博士生3名,已毕业47人,其中优秀毕业生或获优秀毕业论文20余人次。
最后更新:2017-04-07 00:00:00