The SCEAS System
Navigation Menu

Search the dblp DataBase


Qing Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang
    Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:105-0 [Conf]
  2. Qing Zhao, David J. Lilja
    Compiler-Directed Classification of Value Locality Behavior. [Citation Graph (0, 0)][DBLP]
    ICCD, 2001, pp:240-248 [Conf]
  3. Sangyeun Cho, Jenn-Yuan Tsai, Yonghong Song, Bixia Zheng, Stephen J. Schwinn, Xin Wang, Qing Zhao, Zhiyuan Li, David J. Lilja, Pen-Chung Yew
    High-Level Information - An Approach for Integrating Front-End and Back-End Compilers. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:346-355 [Conf]
  4. Lucian Ilie, Sheng Yu, Qing Zhao
    Introduction to Process Traces. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:1706-1712 [Conf]
  5. Sheng Yu, Qing Zhao
    Process Traces With the Option Operation. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2004, pp:750-755 [Conf]
  6. Henry Wolkowicz, Qing Zhao
    Semidefinite Programming Relaxations for the Graph Partitioning Problem. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1999, v:96, n:, pp:461-479 [Journal]
  7. Qing Zhao, Stefan E. Karisch, Franz Rendl, Henry Wolkowicz
    Semidefinite Programming Relaxations for the Quadratic Assignment Problem. [Citation Graph (0, 0)][DBLP]
    J. Comb. Optim., 1998, v:2, n:1, pp:71-109 [Journal]
  8. Qing Zhao, David J. Lilja
    Static Classification of Value Predictability Using Compiler Hints. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:8, pp:929-944 [Journal]
  9. Qing Zhao, Lang Tong
    A multiqueue service room MAC protocol for wireless networks with multipacket reception. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:125-137 [Journal]
  10. Qing Zhao, Zhihan Xu
    Design of a novel knowledge-based fault detection and isolation scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2004, v:34, n:2, pp:1089-1095 [Journal]
  11. Tong Zhao, Qing Zhao
    Coverage-Based Information Retrieval for Lifetime Maximization in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:220-225 [Conf]
  12. Yunxia Chen, Qing Zhao, Ananthram Swami
    Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  13. Qing Zhao, Brian M. Sadler
    Dynamic Spectrum Access: Signal Processing, Networking, and Regulatory Policy [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  14. Qing Zhao, Lang Tong, David Counsil
    Energy-Aware Adaptive Routing for Large-Scale Ad Hoc Networks: Protocol and Performance Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:9, pp:1048-1059 [Journal]

  15. A Paralleled Large-Scale Astronomical Cross-Matching Function. [Citation Graph (, )][DBLP]

  16. Optimality of Myopic Sensing in Multi-Channel Opportunistic Access. [Citation Graph (, )][DBLP]

  17. Structure and Optimality of Myopic Sensing for Opportunistic Spectrum Access. [Citation Graph (, )][DBLP]

  18. Optimality and Complexity of Opportunistic Spectrum Access: A Truncated Markov Decision Process Formulation. [Citation Graph (, )][DBLP]

  19. Markov-optimal sensing policy for user state estimation in mobile devices. [Citation Graph (, )][DBLP]

  20. Signal waveform monitoring for power systems. [Citation Graph (, )][DBLP]

  21. Connectivity of cognitive radio networks: proximity vs. opportunity. [Citation Graph (, )][DBLP]

  22. Bursty Traffic in Energy-Constrained Opportunistic Spectrum Access. [Citation Graph (, )][DBLP]

  23. A negotiation game for multichannel access in cognitive radio networks. [Citation Graph (, )][DBLP]

  24. Statistical properties of CUSUM based fault detection schemes for fault tolerant control. [Citation Graph (, )][DBLP]

  25. On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access. [Citation Graph (, )][DBLP]

  26. Application of Simulated Annealing Algorithm in Pest Image Segmentation. [Citation Graph (, )][DBLP]

  27. Link throughput of multi-channel opportunistic access with limited sensing. [Citation Graph (, )][DBLP]

  28. Power control in spectrum overlay networks: How to cross a multi-lane highway. [Citation Graph (, )][DBLP]

  29. Quickest change detection in multiple on-off processes. [Citation Graph (, )][DBLP]

  30. Magnetic Computing for Reducing Erosion of Rail Electrodes. [Citation Graph (, )][DBLP]

  31. Study on Security of Web-Based Database. [Citation Graph (, )][DBLP]

  32. Network configuration for optimal utilization efficiency of wireless sensor networks. [Citation Graph (, )][DBLP]

  33. On Myopic Sensing for Multi-Channel Opportunistic Access [Citation Graph (, )][DBLP]

  34. Structure and Optimality of Myopic Policy in Opportunistic Access with Noisy Observations [Citation Graph (, )][DBLP]

  35. Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway [Citation Graph (, )][DBLP]

  36. A Restless Bandit Formulation of Multi-channel Opportunistic Access: Indexablity and Index Policy [Citation Graph (, )][DBLP]

  37. Optimality of Myopic Sensing in Multi-Channel Opportunistic Access [Citation Graph (, )][DBLP]

  38. Connectivity of Cognitive Radio Networks: Proximity vs. Opportunity [Citation Graph (, )][DBLP]

  39. Decentralized Multi-Armed Bandit with Multiple Distributed Players [Citation Graph (, )][DBLP]

  40. On the Connectivity and Multihop Delay of Ad Hoc Cognitive Radio Networks [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002