The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dongsheng Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peng Li, Dongsheng Wang, Songliu Guo, Tao Tian, Weimin Zheng
    Live Range Aware Cache Architecture. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:409-415 [Conf]
  2. Haixia Wang, Dongsheng Wang, Peng Li
    Acceleration Techniques for Chip-Multiprocessor Simulator Debug. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:509-515 [Conf]
  3. Wenbin Yao, Dongsheng Wang, Weimin Zheng
    A Fault-Tolerant Single-Chip Multiprocessor. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2004, pp:137-145 [Conf]
  4. Youhui Zhang, Liu Dong, Gu Yu, Dongsheng Wang
    Exploring Design Space Using Transaction Level Models. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2005, pp:589-599 [Conf]
  5. Hongliang Yu, Weimin Zheng, Dongsheng Wang, Haitao Dong, Lu Li
    CAPU: Enhancing P2P File Sharing System with Capacity Aware Topology. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:214-225 [Conf]
  6. Peng Li, Dongsheng Wang, Haixia Wang, Meijuan Lu, Weimin Zheng
    LIRAC: Using Live Range Information to Optimize Memory Access. [Citation Graph (0, 0)][DBLP]
    ARCS, 2007, pp:28-42 [Conf]
  7. Peter Suaris, Dongsheng Wang, Nan-Chi Chou
    A practical cut-based physical retiming algorithm for field programmable gate arrays. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:1027-1030 [Conf]
  8. Dongsheng Wang, Ping Zhang, Chung-Kuan Cheng, Arunabha Sen
    A Performance-Driven I/O Pin Routing Algorithm. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 1999, pp:129-132 [Conf]
  9. Zhen Guo, He Li, Shuling Guo, Dongsheng Wang
    Design and Simulation of a RISC-Based 32-bit Embedded On-Board Computer. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 1998, pp:413-0 [Conf]
  10. Tian Song, Lu Li, Dongsheng Wang, Zhizhong Tang
    Service Roaming Based Distributed Environment for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    PSC, 2005, pp:78-84 [Conf]
  11. Oana G. Cula, Kristin J. Dana, Dinesh K. Pai, Dongsheng Wang
    Polarization Multiplexing for Bidirectional Imaging. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2005, pp:1116-1123 [Conf]
  12. Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang
    PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:308-314 [Conf]
  13. Dongsheng Wang, Ernest S. Kuh
    A Performance-Driven MCM Router with Special Consideration of Crosstalk Reduction. [Citation Graph (0, 0)][DBLP]
    DATE, 1998, pp:466-470 [Conf]
  14. Men Chaoguang, Wang Dongsheng, Zhao Yunlong
    An Efficient Computing-Checkpoint Based Coordinated Checkpoint Algorithm. [Citation Graph (0, 0)][DBLP]
    EUC, 2006, pp:99-109 [Conf]
  15. Peter Suaris, Dongsheng Wang, Pei-Ning Guo, Nan-Chi Chou
    A physical retiming algorithm for field programmable gate arrays. [Citation Graph (0, 0)][DBLP]
    FPGA, 2003, pp:247- [Conf]
  16. Haitao Dong, Weimin Zheng, Dongsheng Wang
    Janus: Build Gnutella-Like File Sharing System over Structured Overlay. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:511-518 [Conf]
  17. Ming Li, Jinfeng Hu, Haitao Dong, Dongsheng Wang, Weimin Zheng
    Gemini: Probabilistic Routing Algorithm in Structured P2P Overlay. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:519-526 [Conf]
  18. Youhui Zhang, Dongsheng Wang, Chongnan Gao, Weimin Zheng
    A JDO Storage Cluster Based on Object Devices. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:187-194 [Conf]
  19. Dongsheng Wang, Ernest S. Kuh
    Performance-Driven Interconnect Global Routing. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1996, pp:132-136 [Conf]
  20. Jinfeng Hu, Haitao Dong, Weimin Zheng, Dongsheng Wang, Ming Li
    Twins: 2-hop Structured Overlay with High Scalability. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:174-183 [Conf]
  21. Ning Ning, Dongsheng Wang, Yongquan Ma, Jinfeng Hu, Jing Sun, Chongnan Gao, Weimin Zheng
    Genius: Peer-to-Peer Location-Aware Gossip Using Network Coordinates. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:163-170 [Conf]
  22. Tianxiong Xue, Ernest S. Kuh, Dongsheng Wang
    Post global routing crosstalk risk estimation and reduction. [Citation Graph (0, 0)][DBLP]
    ICCAD, 1996, pp:302-309 [Conf]
  23. Youhui Zhang, Dongsheng Wang, Jinglei Wang, Weimin Zheng
    Using Model-Based Test Program Generator for Simulation Validation. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:549-556 [Conf]
  24. Yihua Xu, Dongsheng Wang, Heung-Yeung Shum, Songde Ma
    Dynamic depth recovery using belief propagation. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2003, pp:385-388 [Conf]
  25. Yongquan Ma, Dongsheng Wang
    An Approach to Fair Resource Sharing in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:643-652 [Conf]
  26. Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang
    Tourist: Self-Adaptive Structured Overlay. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:30- [Conf]
  27. Youhui Zhang, Dongsheng Wang
    Research on Object-Storage-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2006, pp:68-78 [Conf]
  28. Yihua Xu, Dongsheng Wang, Tao Feng, Harry Shum
    Stereo Computation Using Radial Adaptive Windows. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2002, pp:595-598 [Conf]
  29. Qizhi Wang, Dongsheng Wang, Min Tan
    Characterization of the Analytical Boundary of the Workspace for 3-6 SPS Parallel Manipulator. [Citation Graph (0, 0)][DBLP]
    ICRA, 2001, pp:3755-3759 [Conf]
  30. Jinfeng Hu, Ming Li, Weimin Zheng, Dongsheng Wang, Ning Ning, Haitao Dong
    SmartBoa: Constructing p2p Overlay Network in the Heterogeneous Internet Using Irregular Routing Tables. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:278-287 [Conf]
  31. Guangming Dong, Jin Chen, Xuanyang Lei, Zuogui Ning, Dongsheng Wang, Xiongxiang Wang
    Global-Based Structure Damage Detection Using LVQ Neural Network and Bispectrum Analysis. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:531-537 [Conf]
  32. Youhui Zhang, Dongsheng Wang, Weimin Zheng
    Parallel Checkpoint/Recovery on Cluster of IA-64 Computers. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:212-216 [Conf]
  33. Dongsheng Wang, Peter Suaris, Nan-Chi Chou
    A Practical ASIC Methdology for Flexible Clock Tree Synthesis with Routing Blockages. [Citation Graph (0, 0)][DBLP]
    PATMOS, 2003, pp:511-519 [Conf]
  34. Yun Mao, Kang Chen, Dongsheng Wang, Weimin Zheng
    Cluster-based online monitoring system of web traffic. [Citation Graph (0, 0)][DBLP]
    WIDM, 2001, pp:47-53 [Conf]
  35. Yun Mao, Kang Chen, Dongsheng Wang, Weimin Zheng, Xiaotie Deng
    MOT: Memory Online Tracing of Web Information System. [Citation Graph (0, 0)][DBLP]
    WISE (1), 2001, pp:271-277 [Conf]
  36. Youhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng
    Seamless Peripherals Integration for Network Computers based on the Reversed Server Message Block Protocol. [Citation Graph (0, 0)][DBLP]
    ICNS, 2006, pp:112- [Conf]
  37. Oana G. Cula, Kristin J. Dana, Dinesh K. Pai, Dongsheng Wang
    Polarization Multiplexing and Demultiplexing for Appearance-Based Modeling. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2007, v:29, n:2, pp:362-367 [Journal]
  38. Pei Dan, Dongsheng Wang, Youhui Zhang, Meiming Shen
    Quasi-Asynchronous Migration: A Novel Migration Protocol for PVM Tasks. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:2, pp:5-14 [Journal]
  39. Yun Mao, Youhui Zhang, Dongsheng Wang, Weimin Zheng
    LND: A Reliable Multi-Tier Storage Device in NOW. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:1, pp:70-80 [Journal]
  40. Youhui Zhang, Dongsheng Wang
    A checkpoint-based high availability run-time system for Windows NT clusters. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:2, pp:12-18 [Journal]
  41. Youhui Zhang, Dongsheng Wang, Weimin Zheng
    Transparent Checkpointing and Rollback Recovery Mechanism for Windows NT Applications. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:2, pp:78-85 [Journal]
  42. Tianxiong Xue, Ernest S. Kuh, Dongsheng Wang
    Post global routing crosstalk synthesis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1997, v:16, n:12, pp:1418-1430 [Journal]
  43. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
    A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:307-322 [Conf]
  44. Tian Song, Dongsheng Wang, Meizhi Hu, Yibo Xue
    n-Cube Model for Cluster Computing and Its Evaluation. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:340-351 [Conf]
  45. Tian Song, Zhizhong Tang, Dongsheng Wang
    Multilevel Pattern Matching Architecture for Network Intrusion Detection and Prevention System. [Citation Graph (0, 0)][DBLP]
    ICESS, 2007, pp:604-614 [Conf]
  46. Haixia Wang, Dongsheng Wang, Peng Li, Jinglei Wang, XianPing Fu
    Exploit Temporal Locality of Shared Data in SRC Enabled CMP. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:384-393 [Conf]

  47. IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. [Citation Graph (, )][DBLP]


  48. A Novel Cache Organization for Tiled Chip Multiprocessor. [Citation Graph (, )][DBLP]


  49. An Efficient Lightweight Shared Cache Design for Chip Multiprocessors. [Citation Graph (, )][DBLP]


  50. A MAC Protocol with Little Idle Listening for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  51. An Efficient Handoff Strategy for Mobile Computing Checkpoint System. [Citation Graph (, )][DBLP]


  52. Acquiring Commonsense Knowledge about Properties of Concepts from Text. [Citation Graph (, )][DBLP]


  53. A Two-Phase Differential Synchronization Algorithm for Remote Files. [Citation Graph (, )][DBLP]


  54. Hardware optimizations of variable block size Hadamard transform for H.264/AVC FRExt. [Citation Graph (, )][DBLP]


  55. R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems. [Citation Graph (, )][DBLP]


  56. A Memory Efficient Multiple Pattern Matching Architecture for Network Security. [Citation Graph (, )][DBLP]


  57. Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage. [Citation Graph (, )][DBLP]


  58. A New Video Compression Algorithm for Very Low Bandwidth Using Curve Fitting Method. [Citation Graph (, )][DBLP]


  59. Network caching for Chip Multiprocessors. [Citation Graph (, )][DBLP]


  60. TH-CDP: An Efficient Block Level Continuous Data Protection System. [Citation Graph (, )][DBLP]


  61. Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP. [Citation Graph (, )][DBLP]


  62. A High Effective Indexing and Retrieval Method Providing Block-Level Timely Recovery to Any Point-in-Time. [Citation Graph (, )][DBLP]


  63. T-Archive: A Novel HSM-Based Data Archive System. [Citation Graph (, )][DBLP]


Search in 0.097secs, Finished in 0.100secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002