default search action
Qixia Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j9]Andrzej Mizera, Jun Pang, Qixia Yuan:
GPU-accelerated steady-state computation of large probabilistic Boolean networks. Formal Aspects Comput. 31(1): 27-46 (2019) - [j8]Qixia Yuan, Andrzej Mizera, Jun Pang, Hongyang Qu:
A new decomposition-based method for detecting attractors in synchronous Boolean networks. Sci. Comput. Program. 180: 18-35 (2019) - [j7]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
Taming Asynchrony for Attractor Detection in Large Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 31-42 (2019) - 2018
- [j6]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Learning probabilistic models for model checking: an evolutionary approach and an empirical study. Int. J. Softw. Tools Technol. Transf. 20(6): 689-704 (2018) - [j5]Andrzej Mizera, Jun Pang, Cui Su, Qixia Yuan:
ASSA-PBN: A Toolbox for Probabilistic Boolean Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 15(4): 1203-1216 (2018) - [j4]Andrzej Mizera, Jun Pang, Qixia Yuan:
Reviving the Two-State Markov Chain Approach. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1525-1537 (2018) - [c12]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
ASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks. CMSB 2018: 277-284 - 2017
- [b1]Qixia Yuan:
Computational Methods for Analysing Long-run Dynamics of Large Biological Networks. University of Luxembourg, 2017 - [c11]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. FASE 2017: 3-21 - [c10]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
A New Decomposition Method for Attractor Detection in Large Synchronous Boolean Networks. SETTA 2017: 232-249 - [i5]Andrzej Mizera, Jun Pang, Hongyang Qu, Qixia Yuan:
Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report). CoRR abs/1704.06530 (2017) - 2016
- [j3]Qixia Yuan, Hongyang Qu, Jun Pang, Andrzej Mizera:
Improving BDD-based attractor detection for synchronous Boolean networks. Sci. China Inf. Sci. 59(8): 080101:1-080101:16 (2016) - [c9]Andrzej Mizera, Jun Pang, Qixia Yuan:
Fast Simulation of Probabilistic Boolean Networks. CMSB 2016: 216-231 - [c8]Andrzej Mizera, Jun Pang, Qixia Yuan:
ASSA-PBN 2.0: A Software Tool for Probabilistic Boolean Networks. CMSB 2016: 309-315 - [c7]Andrzej Mizera, Jun Pang, Qixia Yuan:
Parallel approximate steady-state analysis of large probabilistic Boolean networks. SAC 2016: 1-8 - [c6]Andrzej Mizera, Jun Pang, Qixia Yuan:
GPU-Accelerated Steady-State Computation of Large Probabilistic Boolean Networks. SETTA 2016: 50-66 - [i4]Andrzej Mizera, Jun Pang, Qixia Yuan:
Fast Simulation of Probabilistic Boolean Networks (Technical Report). CoRR abs/1605.00854 (2016) - [i3]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. CoRR abs/1605.08278 (2016) - 2015
- [j2]Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. Int. J. Embed. Syst. 7(3/4): 216-229 (2015) - [c5]Andrzej Mizera, Jun Pang, Qixia Yuan:
ASSA-PBN: An Approximate Steady-State Analyser of Probabilistic Boolean Networks. ATVA 2015: 214-220 - [c4]Hongyang Qu, Qixia Yuan, Jun Pang, Andrzej Mizera:
Improving BDD-based Attractor Detection for Synchronous Boolean Networks. Internetware 2015: 212-220 - [i2]Andrzej Mizera, Jun Pang, Qixia Yuan:
Reviving the Two-state Markov Chain Approach (Technical Report). CoRR abs/1501.01779 (2015) - [i1]Andrzej Mizera, Jun Pang, Qixia Yuan:
Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks (Technical Report). CoRR abs/1508.07828 (2015) - 2014
- [c3]Andrzej Mizera, Jun Pang, Qixia Yuan:
Model-Checking Based Approaches to Parameter Estimation of Gene Regulatory Networks. ICECCS 2014: 206-209 - 2012
- [j1]Qixia Yuan, Panuwat Trairatphisan, Jun Pang, Sjouke Mauw, Monique Wiesinger, Thomas Sauter:
Probabilistic Model Checking of the PDGF Signaling Pathway. Trans. Comp. Sys. Biology 14: 151-180 (2012) - 2011
- [c2]Qixia Yuan, Jun Pang, Sjouke Mauw, Panuwat Trairatphisan, Monique Wiesinger, Thomas Sauter:
A Study of the PDGF Signaling Pathway with PRISM. CompMod 2011: 65-81 - 2010
- [c1]Shanqing Guo, Qixia Yuan, Fengbo Lin, Fengyu Wang, Tao Ban:
A Malware Detection Algorithm Based on Multi-view Fusion. ICONIP (2) 2010: 259-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint