|
Search the dblp DataBase
Jiandong Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Junwu Zhu, Jiandong Wang, Li Bin, Jiang Yi
On Semantic-based cooperation among Web Services. [Citation Graph (0, 0)][DBLP] CSCWD, 2006, pp:700-703 [Conf]
- Sylvain Delisle, Stan Matwin, Jiandong Wang, Lionel Zupan
Explanation-based Learning Helps Acquire Knowledge from Natural Language Texts. [Citation Graph (0, 0)][DBLP] ISMIS, 1991, pp:326-337 [Conf]
- Feiyue Ye, Jiandong Wang, Shiliang Wu, Huiping Chen, Tianqiang Huang, Li Tao
An Integrated Approach for Mining Meta-rules. [Citation Graph (0, 0)][DBLP] MLDM, 2005, pp:549-557 [Conf]
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. [Citation Graph (, )][DBLP]
Identity-Based Key Issuing Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]
Weighted Margin Multi-Class Core Vector Machines. [Citation Graph (, )][DBLP]
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. [Citation Graph (, )][DBLP]
On Dynamic and Concurrent Model of Web Service Components. [Citation Graph (, )][DBLP]
SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System. [Citation Graph (, )][DBLP]
A Fuzzy Support Vector Machine with Weighted Margin for Flight Delay Early Warning. [Citation Graph (, )][DBLP]
On-line off-line Ranking Support Vector Machine and analysis. [Citation Graph (, )][DBLP]
Anonymous Conditional Proxy Re-encryption without Random Oracle. [Citation Graph (, )][DBLP]
On system identification in a networked environment. [Citation Graph (, )][DBLP]
Revisiting the Two-Stage Algorithm for Hammerstein system identification. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|