The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xu Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xu Huang, Allan C. Madoc, Dharmendra Sharma
    Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator. [Citation Graph (0, 0)][DBLP]
    DELTA, 2006, pp:31-34 [Conf]
  2. Xu Huang, Allan C. Madoc, M. Wagner
    Noises removal for images by wavelet-based Bayesian estimator via Levy process analysis. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:327-330 [Conf]
  3. Xu Huang, Allan C. Madoc, Andrew D. Cheetham
    Image multi-noise removal by wavelet-based Bayesian estimator. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2699-2702 [Conf]
  4. Dan Meng, Xu Huang
    An Interactive Intelligent Search Engine Model Research Based on User Information Preference. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  5. Xu Huang
    An Improved ALOHA Algorithm for RFID Tag Identification. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1157-1162 [Conf]
  6. Xu Huang, Allan C. Madoc
    Image Multi-noise Removal via Lévy Process Analysis. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:22-28 [Conf]
  7. Xu Huang, Allan C. Madoc
    Investigating the Transport Communicating Rates of Wireless Networks over Fading Channels. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:233-239 [Conf]
  8. Xu Huang, Alexander Ridgewell, Dharmendra Sharma
    A Dynamic Threshold Technique for XML Data Transmission on Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1163-1167 [Conf]
  9. Xu Huang, Dharmendra Sharma
    Investigating Security in Multi-tree Based Technique in RFID Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1150-1156 [Conf]
  10. Alexander Ridgewell, Xu Huang, Dharmendra Sharma
    Evaluating the Size of the SOAP for Integration in B2B. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:29-34 [Conf]
  11. Son Le, Xu Huang, Dharmendra Sharma
    A Multi-agent Architecture for RFID Taxonomy. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:917-925 [Conf]
  12. Nazni Farooq, Xu Huang, Dharmendra Sharma
    Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:950-958 [Conf]
  13. Xu Huang, Dat Tran
    Adaptive Binary Splitting for a RFID Tag Collision Arbitration Via Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:926-933 [Conf]

  14. Degradation of MIMO UWB-IR Transceiver in Poisson Models. [Citation Graph (, )][DBLP]


  15. Novel Protocol and Its Implementation QKD in Wi-Fi Networks. [Citation Graph (, )][DBLP]


  16. Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  17. Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. [Citation Graph (, )][DBLP]


  18. E-health Services with Secure Mobile Agent. [Citation Graph (, )][DBLP]


  19. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks. [Citation Graph (, )][DBLP]


  20. Noises removal for images in Nakagami fading channels by wavelet-based Bayesian estimator. [Citation Graph (, )][DBLP]


  21. An improved projection pursuit clustering model and its application based on Quantum-behaved PSO. [Citation Graph (, )][DBLP]


  22. Security Analyses for the Passive RFID Systems Deployed by HJM Model Tree. [Citation Graph (, )][DBLP]


  23. A New Efficient Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]


  24. An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]


  25. An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. [Citation Graph (, )][DBLP]


  26. Multi-Agent Systems in Quantum Security for Modern Wireless Networks. [Citation Graph (, )][DBLP]


  27. Automatic Speech-Based Classification of Gender, Age and Accent. [Citation Graph (, )][DBLP]


  28. RFID Technology and Crowded Event Management. [Citation Graph (, )][DBLP]


  29. Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. [Citation Graph (, )][DBLP]


  30. Australian Accent-Based Speaker Classification. [Citation Graph (, )][DBLP]


  31. Solving 2D HP Protein Folding Problem by Parallel Ant Colonies. [Citation Graph (, )][DBLP]


  32. Fuzzy Switching Controller for the Security in 802.11 Networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002