The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Da-Wei Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee
    Steiner Problems on Directed Acyclic Graphs. [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:21-30 [Conf]
  2. Kuo-Hui Tsai, Da-Wei Wang
    Optimal Algorithms for Circle Partitioning. [Citation Graph (0, 0)][DBLP]
    COCOON, 1997, pp:304-310 [Conf]
  3. Kuo-Hui Tsai, Da-Wei Wang
    Lower Bounds for Wide-Sense Non-blocking Clos Network. [Citation Graph (0, 0)][DBLP]
    COCOON, 1998, pp:213-218 [Conf]
  4. Nick Reingold, Da-Wei Wang, Lenore D. Zuck
    Games I/O Automata Play (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CONCUR, 1992, pp:325-339 [Conf]
  5. Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    Secrecy of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:114-123 [Conf]
  6. Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
    Information Theoretical Analysis of Two-Party Secret Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:310-317 [Conf]
  7. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
    On The Damage and Compensation of Privacy Leakage. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:311-324 [Conf]
  8. Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu
    Generalized Edge Coloring for Channel Assignment in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2006, pp:82-92 [Conf]
  9. Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu
    Efficient Parallel I/O Scheduling in the Presence of Data Duplication. [Citation Graph (0, 0)][DBLP]
    ICPP, 2003, pp:231-238 [Conf]
  10. Jan-Jan Wu, Da-Wei Wang, Yih-Fang Lin
    Placement of I/O servers to improve parallel I/O performance on switch-based clusters. [Citation Graph (0, 0)][DBLP]
    ICS, 2003, pp:244-251 [Conf]
  11. Pangfeng Liu, Da-Wei Wang
    Reduction Optimization in Heterogeneous Cluster Environments. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2000, pp:477-482 [Conf]
  12. Cho-Chin Lin, Tsan-sheng Hsu, Da-Wei Wang
    Bounds on the Client-Server Incremental Computing. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:86-91 [Conf]
  13. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
    A Logical Model for Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:110-124 [Conf]
  14. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
    Quantifying Privacy Leakage through Answering Database Queries. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:162-176 [Conf]
  15. Da-Wei Wang, Lenore D. Zuck
    Tight Bounds for the Sequence Transmission Problem. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:73-83 [Conf]
  16. Da-Wei Wang, Lenore D. Zuck
    Real-Time Sequence Transmission Problem. [Citation Graph (0, 0)][DBLP]
    PODC, 1991, pp:111-123 [Conf]
  17. Yi-Ting Chiang, Yu-Cheng Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
    How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2002, pp:226-233 [Conf]
  18. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    A GrC-Based Approach to Social Network Data Protection. [Citation Graph (0, 0)][DBLP]
    RSCTC, 2006, pp:438-447 [Conf]
  19. Pangfeng Liu, Da-Wei Wang, Yi-Heng Guo
    An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2003, pp:38-52 [Conf]
  20. David S. Greenberg, Gadi Taubenfeld, Da-Wei Wang
    Choice Coordination with Multiple Alternatives (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    WDAG, 1992, pp:54-68 [Conf]
  21. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    Medical privacy protection based on granular computing. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence in Medicine, 2004, v:32, n:2, pp:137-149 [Journal]
  22. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    An epistemic framework for privacy protection in database linking. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2007, v:61, n:1, pp:176-205 [Journal]
  23. Xiaoyun Lu, Da-Wei Wang, C. K. Wong
    On the bounded domination number of tournaments. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2000, v:220, n:1-3, pp:257-261 [Journal]
  24. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
    Value versus damage of information release: A data privacy perspective. [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 2006, v:43, n:2, pp:179-201 [Journal]
  25. Yehuda Afek, Hagit Attiya, Alan Fekete, Michael J. Fischer, Nancy A. Lynch, Yishay Mansour, Da-Wei Wang, Lenore D. Zuck
    Reliable Communication Over Unreliable Channels. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1994, v:41, n:6, pp:1267-1297 [Journal]
  26. Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee
    Two Variations of the Minimum Steiner Problem. [Citation Graph (0, 0)][DBLP]
    J. Comb. Optim., 2005, v:9, n:1, pp:101-120 [Journal]
  27. Kuo-Hui Tsai, Da-Wei Wang, Frank K. Hwang
    Lower bounds for wide-sense nonblocking Clos network. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:261, n:2, pp:323-328 [Journal]
  28. Ean-Wen Huang, Da-Wei Wang, Der-Ming Liou
    Development of a deterministic XML schema by resolving structure ambiguity of HL7 messages. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2005, v:80, n:1, pp:1-15 [Journal]
  29. Xiaoyun Lu, Da-Wei Wang, C. K. Wong
    The strong Hall property and symmetric chain orders. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1999, v:203, n:1-3, pp:161-168 [Journal]
  30. Xiaoyun Lu, Da-Wei Wang, C. K. Wong
    On avoidable and unavoidable claws. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1998, v:184, n:1-3, pp:259-265 [Journal]
  31. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    Granulation as a Privacy Protection Mechanism. [Citation Graph (0, 0)][DBLP]
    T. Rough Sets, 2007, v:7, n:, pp:256-273 [Journal]

  32. Heterogeneous Subset Sampling. [Citation Graph (, )][DBLP]


  33. Logical Definability in Social Position Analysis. [Citation Graph (, )][DBLP]


  34. Towards Efficient Privacy-preserving Collaborative Recommender Systems. [Citation Graph (, )][DBLP]


  35. Scalar-product based Secure Two-party Computation. [Citation Graph (, )][DBLP]


  36. Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks. [Citation Graph (, )][DBLP]


  37. A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination. [Citation Graph (, )][DBLP]


  38. An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. [Citation Graph (, )][DBLP]


  39. An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002