The SCEAS System
| |||||||

## Search the dblp DataBase
Da-Wei Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee
**Steiner Problems on Directed Acyclic Graphs.**[Citation Graph (0, 0)][DBLP] COCOON, 1996, pp:21-30 [Conf] - Kuo-Hui Tsai, Da-Wei Wang
**Optimal Algorithms for Circle Partitioning.**[Citation Graph (0, 0)][DBLP] COCOON, 1997, pp:304-310 [Conf] - Kuo-Hui Tsai, Da-Wei Wang
**Lower Bounds for Wide-Sense Non-blocking Clos Network.**[Citation Graph (0, 0)][DBLP] COCOON, 1998, pp:213-218 [Conf] - Nick Reingold, Da-Wei Wang, Lenore D. Zuck
**Games I/O Automata Play (Extended Abstract).**[Citation Graph (0, 0)][DBLP] CONCUR, 1992, pp:325-339 [Conf] - Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
**Secrecy of Two-Party Secure Computation.**[Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:114-123 [Conf] - Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
**Information Theoretical Analysis of Two-Party Secret Computation.**[Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:310-317 [Conf] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
**On The Damage and Compensation of Privacy Leakage.**[Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:311-324 [Conf] - Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu
**Generalized Edge Coloring for Channel Assignment in Wireless Networks.**[Citation Graph (0, 0)][DBLP] ICPP, 2006, pp:82-92 [Conf] - Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu
**Efficient Parallel I/O Scheduling in the Presence of Data Duplication.**[Citation Graph (0, 0)][DBLP] ICPP, 2003, pp:231-238 [Conf] - Jan-Jan Wu, Da-Wei Wang, Yih-Fang Lin
**Placement of I/O servers to improve parallel I/O performance on switch-based clusters.**[Citation Graph (0, 0)][DBLP] ICS, 2003, pp:244-251 [Conf] - Pangfeng Liu, Da-Wei Wang
**Reduction Optimization in Heterogeneous Cluster Environments.**[Citation Graph (0, 0)][DBLP] IPDPS, 2000, pp:477-482 [Conf] - Cho-Chin Lin, Tsan-sheng Hsu, Da-Wei Wang
**Bounds on the Client-Server Incremental Computing.**[Citation Graph (0, 0)][DBLP] ISPAN, 2004, pp:86-91 [Conf] - Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
**A Logical Model for Privacy Protection.**[Citation Graph (0, 0)][DBLP] ISC, 2001, pp:110-124 [Conf] - Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
**Quantifying Privacy Leakage through Answering Database Queries.**[Citation Graph (0, 0)][DBLP] ISC, 2002, pp:162-176 [Conf] - Da-Wei Wang, Lenore D. Zuck
**Tight Bounds for the Sequence Transmission Problem.**[Citation Graph (0, 0)][DBLP] PODC, 1989, pp:73-83 [Conf] - Da-Wei Wang, Lenore D. Zuck
**Real-Time Sequence Transmission Problem.**[Citation Graph (0, 0)][DBLP] PODC, 1991, pp:111-123 [Conf] - Yi-Ting Chiang, Yu-Cheng Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
**How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.**[Citation Graph (0, 0)][DBLP] Rough Sets and Current Trends in Computing, 2002, pp:226-233 [Conf] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
**A GrC-Based Approach to Social Network Data Protection.**[Citation Graph (0, 0)][DBLP] RSCTC, 2006, pp:438-447 [Conf] - Pangfeng Liu, Da-Wei Wang, Yi-Heng Guo
**An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters.**[Citation Graph (0, 0)][DBLP] RTCSA, 2003, pp:38-52 [Conf] - David S. Greenberg, Gadi Taubenfeld, Da-Wei Wang
**Choice Coordination with Multiple Alternatives (Preliminary Version).**[Citation Graph (0, 0)][DBLP] WDAG, 1992, pp:54-68 [Conf] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
**Medical privacy protection based on granular computing.**[Citation Graph (0, 0)][DBLP] Artificial Intelligence in Medicine, 2004, v:32, n:2, pp:137-149 [Journal] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
**An epistemic framework for privacy protection in database linking.**[Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 2007, v:61, n:1, pp:176-205 [Journal] - Xiaoyun Lu, Da-Wei Wang, C. K. Wong
**On the bounded domination number of tournaments.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2000, v:220, n:1-3, pp:257-261 [Journal] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
**Value versus damage of information release: A data privacy perspective.**[Citation Graph (0, 0)][DBLP] Int. J. Approx. Reasoning, 2006, v:43, n:2, pp:179-201 [Journal] - Yehuda Afek, Hagit Attiya, Alan Fekete, Michael J. Fischer, Nancy A. Lynch, Yishay Mansour, Da-Wei Wang, Lenore D. Zuck
**Reliable Communication Over Unreliable Channels.**[Citation Graph (0, 0)][DBLP] J. ACM, 1994, v:41, n:6, pp:1267-1297 [Journal] - Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee
**Two Variations of the Minimum Steiner Problem.**[Citation Graph (0, 0)][DBLP] J. Comb. Optim., 2005, v:9, n:1, pp:101-120 [Journal] - Kuo-Hui Tsai, Da-Wei Wang, Frank K. Hwang
**Lower bounds for wide-sense nonblocking Clos network.**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:261, n:2, pp:323-328 [Journal] - Ean-Wen Huang, Da-Wei Wang, Der-Ming Liou
**Development of a deterministic XML schema by resolving structure ambiguity of HL7 messages.**[Citation Graph (0, 0)][DBLP] Computer Methods and Programs in Biomedicine, 2005, v:80, n:1, pp:1-15 [Journal] - Xiaoyun Lu, Da-Wei Wang, C. K. Wong
**The strong Hall property and symmetric chain orders.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1999, v:203, n:1-3, pp:161-168 [Journal] - Xiaoyun Lu, Da-Wei Wang, C. K. Wong
**On avoidable and unavoidable claws.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1998, v:184, n:1-3, pp:259-265 [Journal] - Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
**Granulation as a Privacy Protection Mechanism.**[Citation Graph (0, 0)][DBLP] T. Rough Sets, 2007, v:7, n:, pp:256-273 [Journal] **Heterogeneous Subset Sampling.**[Citation Graph (, )][DBLP]**Logical Definability in Social Position Analysis.**[Citation Graph (, )][DBLP]**Towards Efficient Privacy-preserving Collaborative Recommender Systems.**[Citation Graph (, )][DBLP]**Scalar-product based Secure Two-party Computation.**[Citation Graph (, )][DBLP]**Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks.**[Citation Graph (, )][DBLP]**A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination.**[Citation Graph (, )][DBLP]**An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.**[Citation Graph (, )][DBLP]**An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments.**[Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.007secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |