Yongxi Cheng
Tsinghua University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yongxi Cheng.
Journal of Computational Biology | 2008
Yongxi Cheng; Ding-Zhu Du
The study of gene functions requires a DNA library of high quality, such a library is obtained from a large mount of testing and screening. Pooling design is a very helpful tool for reducing the number of tests for DNA library screening. In this paper, we present new one- and two-stage pooling designs, together with new probabilistic pooling designs. The approach in this paper works for both error-free and error-tolerance scenarios.
Journal of Computational Biology | 2007
Yongxi Cheng; Ding-Zhu Du
The study of gene functions requires a DNA library of high quality, such a library is obtained from a large mount of testing and screening. Pooling design is a very helpful tool for reducing the number of tests for DNA library screening. In this paper, we present two Las Vegas algorithms for efficient constructions of d-disjunct and (d ; z)-disjunct matrices respectively. These new constructions can be directly applied to construct error-free and error-tolerant pooling designs.
partial evaluation and semantic-based program manipulation | 2006
Yanhong A. Liu; Chen Wang; Michael Gorbovitski; Tom Rothamel; Yongxi Cheng; Yingchao Zhao; Jing Zhang
This paper describes a transformational method applied to the core component of role-based access control (RBAC), to derive efficient implementations from a specification based on the ANSI standard for RBAC. The method is based on the idea of incrementally maintaining the result of expensive set operations, where a new method is described and used for systematically deriving incrementalization rules. We calculate precise complexities for three variants of efficient implementations as well as for a straightforward implementation based on the specification. We describe successful prototypes and experiments for the efficient implementations and for automatically generating efficient implementations from straightforward implementations.
Theoretical Computer Science | 2008
Chen Wang; Myung Ah Park; James Willson; Yongxi Cheng; András Faragó; Weili Wu
Topology control is one of the major approaches to achieve energy efficiency as well as fault tolerance in wireless networks. In this paper, we study the dual power assignment problem for 2-edge connectivity and 2-vertex connectivity in the symmetric graphical model. The problem has arisen from the following practical origin. In a wireless ad hoc network where each node can switch its transmission power between high-level and low-level, how can we establish a fault-tolerant connected network topology in the most energy-efficient way? Specifically, the objective is to minimize the number of nodes assigned with high power and yet achieve 2-edge connectivity or 2-vertex connectivity. Note that to achieve a minimum number of high-power nodes is harder than an optimization problem in the same model whose objective is to minimize the total power cost. We first address these two optimization problems (2-edge connectivity and 2-vertex connectivity version) under the general graph model. Due to the NP-hardness, we propose an approximation algorithm, called prioritized edge selection algorithm, which achieves a 4-ratio approximation for 2-edge connectivity. After that, we modify the algorithm to solve the problem for 2-vertex connectivity and also achieve the same approximation ratio. We also show that the 4-ratio is tight for our algorithms in both cases.
Journal of Computer Science and Technology | 2007
Yongxi Cheng
We investigate the problem of listing combinations using a special class of operations, prefix shifts. Combinations are represented as bitstrings of 0s and 1s, and prefix shifts are the operations of rotating some prefix of a bitstring by one position to left or right. We give a negative answer to an open problem asked by F. Ruskey and A. Williams (Generating combinations by prefix shifts, In Proc. 11th Annual International Computing and Combinatorics Conference 2005, LNCS 3595, Springer, 2005, pp.570–576), that is whether we can generate combinations by only using three very basic prefix shifts on bitstrings, which are transposition of the first two bits and the rotation of the entire bitstring by one position in either direction (i.e., applying the permutations σ2, σn and σn−1 to the indices of the bitstrings).
Discrete Mathematics | 2008
Yongxi Cheng
Theoretical Computer Science | 2007
Yongxi Cheng
Theoretical Computer Science | 2008
Yongxi Cheng; Ker I. Ko; Weili Wu
Discrete Mathematics | 2008
Yongxi Cheng; Xiaoming Sun; Yiqun Lisa Yin
Archive | 2005
Yongxi Cheng; Xiaoming Sun; Yiqun Lisa Yin