The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ke Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marc H. Graham, Ke Wang
    Constant Time Maintenance or The Triumph of the fd. [Citation Graph (8, 11)][DBLP]
    PODS, 1986, pp:202-216 [Conf]
  2. Ke Wang
    Can Constant-time Maintainability Be More Practical? [Citation Graph (3, 15)][DBLP]
    PODS, 1989, pp:120-127 [Conf]
  3. Héctor J. Hernández, Ke Wang
    On the Boundedness of Constant-Time-Maintainable Database Schemes. [Citation Graph (3, 0)][DBLP]
    SIAM J. Comput., 1993, v:22, n:1, pp:29-45 [Journal]
  4. Ke Wang, Huiqing Liu
    Schema Discovery for Semistructured Data. [Citation Graph (2, 0)][DBLP]
    KDD, 1997, pp:271-274 [Conf]
  5. Ke Wang, Marc H. Graham
    Constant-Time Maintainability: A Generalization of Independence. [Citation Graph (2, 32)][DBLP]
    ACM Trans. Database Syst., 1992, v:17, n:2, pp:201-246 [Journal]
  6. Ke Wang
    Some Positive Results for Boundedness of Multiple Recursive Rules. [Citation Graph (1, 13)][DBLP]
    ICDT, 1995, pp:383-396 [Conf]
  7. Weining Zhang, Ke Wang, Siu-Cheung Chau
    Data partition: A Practical Parallel Evaluation of Datalog Programs. [Citation Graph (1, 0)][DBLP]
    PDIS, 1991, pp:98-105 [Conf]
  8. Bing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi
    Using Decision Tree Induction for Discovering Holes in Data. [Citation Graph (1, 0)][DBLP]
    PRICAI, 1998, pp:182-193 [Conf]
  9. Ke Wang, Huiqing Liu
    Discovering Typical Structures of Documents: A Road Map Approach. [Citation Graph (1, 0)][DBLP]
    SIGIR, 1998, pp:146-154 [Conf]
  10. Ke Wang, Senqiang Zhou, Shiang Chen Liew
    Building Hierarchical Classifiers Using Class Proximity. [Citation Graph (1, 11)][DBLP]
    VLDB, 1999, pp:363-374 [Conf]
  11. Ke Wang, Li-Yan Yuan
    First-Order Logic Characterization of Program Properties. [Citation Graph (1, 27)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:4, pp:518-533 [Journal]
  12. Ke Wang, Yabo Xu, Rong She, Philip S. Yu
    Classification Spanning Private Databases. [Citation Graph (0, 0)][DBLP]
    AAAI, 2006, pp:- [Conf]
  13. Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu
    A New Automatic Intrusion Response Taxonomy and Its Application. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:999-1003 [Conf]
  14. Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal
    Multi-Dimensional Sequential Pattern Mining. [Citation Graph (0, 0)][DBLP]
    CIKM, 2001, pp:81-88 [Conf]
  15. Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin
    Mining Confident Rules Without Support Requirement. [Citation Graph (0, 0)][DBLP]
    CIKM, 2001, pp:89-96 [Conf]
  16. Ke Wang, Chu Xu, Bing Liu
    Clustering Transactions Using Large Items. [Citation Graph (0, 0)][DBLP]
    CIKM, 1999, pp:483-490 [Conf]
  17. Ke Wang, Yabo Xu, Jeffrey Xu Yu
    Scalable sequential pattern mining for biological sequences. [Citation Graph (0, 0)][DBLP]
    CIKM, 2004, pp:178-187 [Conf]
  18. Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei
    Classification spanning correlated data streams. [Citation Graph (0, 0)][DBLP]
    CIKM, 2006, pp:132-141 [Conf]
  19. Rui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie
    Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. [Citation Graph (0, 0)][DBLP]
    CSB, 2004, pp:152-160 [Conf]
  20. Ke Wang, Beng Chin Ooi, Sam Yuan Sung
    P-Tree: A B-Tree Index for Lists. [Citation Graph (0, 12)][DBLP]
    DASFAA, 1999, pp:221-228 [Conf]
  21. Sonny Han Seng Chee, Jiawei Han, Ke Wang
    RecTree: An Efficient Collaborative Filtering Method. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2001, pp:141-151 [Conf]
  22. Wang Chiew Tan, Ke Wang, Limsoon Wong
    QUICK: Graphical User Interface to Multiple Databases. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1996, pp:404-409 [Conf]
  23. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern
    EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:290-0 [Conf]
  24. Ke Wang
    Mining Association Patterns from Nested Databases. [Citation Graph (0, 0)][DBLP]
    DMKD, 1997, pp:0-0 [Conf]
  25. Ke Wang, Senqiang Zhou, Jiawei Han
    Profit Mining: From Patterns to Actions. [Citation Graph (0, 0)][DBLP]
    EDBT, 2002, pp:70-87 [Conf]
  26. Ke Wang, Li-Yan Yuan
    Incremental Database Design Revisited. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:219-230 [Conf]
  27. Ke Wang, Li-Yan Yuan
    Enforce Constraints in Archival Databases. [Citation Graph (0, 0)][DBLP]
    ICCI, 1992, pp:397-400 [Conf]
  28. Ke Wang, Weining Zhang, Siu-Cheung Chau
    Minimize Linear Mutual Recursion by Rule Unfolding. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:98-102 [Conf]
  29. Benjamin C. M. Fung, Ke Wang, Philip S. Yu
    Top-Down Specialization for Information and Privacy Preservation. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:205-216 [Conf]
  30. Ke Wang, Yuelong Jiang, Alexander Tuzhilin
    Mining Actionable Patterns by Role Models. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:16- [Conf]
  31. Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han
    Pushing Aggregate Constraints by Divide-and-Approximate. [Citation Graph (0, 0)][DBLP]
    ICDE, 2003, pp:291-302 [Conf]
  32. Ke Wang, Li-Yan Yuan
    First-Order Logic Reducible Programs. [Citation Graph (0, 11)][DBLP]
    ICDE, 1991, pp:746-755 [Conf]
  33. Ke Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang
    Mining Customer Value: From Association Rules to Direct Marketing. [Citation Graph (0, 0)][DBLP]
    ICDE, 2003, pp:738-740 [Conf]
  34. Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
    Privacy-Preserving Frequent Pattern Mining across Private Databases. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:613-616 [Conf]
  35. Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu
    Mining Patterns That Respond to Actions. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:669-672 [Conf]
  36. Jian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang
    Efficiently Mining Frequent Closed Partial Orders. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:753-756 [Conf]
  37. Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang
    Mining Association Rules from Stars. [Citation Graph (0, 0)][DBLP]
    ICDM, 2002, pp:322-329 [Conf]
  38. Ke Wang, Benjamin C. M. Fung, Philip S. Yu
    Template-Based Privacy Preservation in Classification Problems. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:466-473 [Conf]
  39. Ke Wang, Philip S. Yu, Sourav Chakraborty
    Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ICDM, 2004, pp:249-256 [Conf]
  40. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang
    MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:371-378 [Conf]
  41. Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang
    Direct Marketing When There Are Voluntary Buyers. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:922-927 [Conf]
  42. Ke Wang, James N. K. Liu, Weimin Ma
    Mining the Most Reliable Association Rules with Composite Items. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:749-754 [Conf]
  43. Ke Wang, Han Chong Goh
    Minimum Splits Based Discretization for Continuous Features. [Citation Graph (0, 0)][DBLP]
    IJCAI (2), 1997, pp:942-951 [Conf]
  44. Weimin Ma, Ke Wang
    On the On-Line k-Truck Problem with Benefit Maximization. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2006, pp:660-669 [Conf]
  45. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:74-90 [Conf]
  46. Ke Wang, Benjamin C. M. Fung, Guozhu Dong
    Integrating Private Databases for Data Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:171-182 [Conf]
  47. Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang
    Anomaly Detection in Computer Security and an Application to File System Accesses. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:14-28 [Conf]
  48. Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
    Bias and controversy: beyond the statistical deviation. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:625-630 [Conf]
  49. Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han
    Mining frequent item sets by opportunistic projection. [Citation Graph (0, 0)][DBLP]
    KDD, 2002, pp:229-238 [Conf]
  50. Rong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman
    Frequent-subsequence-based prediction of outer membrane proteins. [Citation Graph (0, 0)][DBLP]
    KDD, 2003, pp:436-445 [Conf]
  51. Ke Wang, Benjamin C. M. Fung
    Anonymizing sequential releases. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:414-423 [Conf]
  52. Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan
    Mining unexpected rules by pushing user dynamics. [Citation Graph (0, 0)][DBLP]
    KDD, 2003, pp:246-255 [Conf]
  53. Ke Wang, Ming-Yen Thomas Su
    Item selection by "hub-authority" profit ranking. [Citation Graph (0, 0)][DBLP]
    KDD, 2002, pp:652-657 [Conf]
  54. Ke Wang, Suman Sundaresh
    Selecting Features by Vertical Compactness of Data. [Citation Graph (0, 0)][DBLP]
    KDD, 1997, pp:275-278 [Conf]
  55. Ke Wang, Soon Hock William Tay, Bing Liu
    Interestingness-Based Interval Merger for Numeric Association Rules. [Citation Graph (0, 0)][DBLP]
    KDD, 1998, pp:121-128 [Conf]
  56. Ke Wang, Senqiang Zhou, Yu He
    Growing decision trees on support-less association rules. [Citation Graph (0, 0)][DBLP]
    KDD, 2000, pp:265-269 [Conf]
  57. Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang
    (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:754-759 [Conf]
  58. Li-bao Zhang, Ke Wang
    Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. [Citation Graph (0, 0)][DBLP]
    MIAR, 2004, pp:86-93 [Conf]
  59. Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
    A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:57-81 [Conf]
  60. Li-bao Zhang, Ke Wang
    New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:513-516 [Conf]
  61. Bing Liu, Wynne Hsu, Ke Wang, Shu Chen
    Visually Aided Exploration of Interesting Association Rules. [Citation Graph (0, 0)][DBLP]
    PAKDD, 1999, pp:380-389 [Conf]
  62. Ke Wang, Yu He
    User-Defined Association Mining. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2001, pp:387-399 [Conf]
  63. Ke Wang, Liu Tang, Jiawei Han, Junqiang Liu
    Top Down FP-Growth for Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2002, pp:334-340 [Conf]
  64. Ke Wang, Bing Liu
    Concurrent Discretization of Multiple Attributes. [Citation Graph (0, 0)][DBLP]
    PRICAI, 1998, pp:250-259 [Conf]
  65. Ke Wang, Gabriela Cretu, Salvatore J. Stolfo
    Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:227-246 [Conf]
  66. Ke Wang, Janak J. Parekh, Salvatore J. Stolfo
    Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:226-248 [Conf]
  67. Ke Wang, Salvatore J. Stolfo
    Anomalous Payload-Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:203-222 [Conf]
  68. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
    FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:82-101 [Conf]
  69. Emin Gün Sirer, Ke Wang
    An access control language for web services. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:23-30 [Conf]
  70. Benjamin C. M. Fung, Ke Wang, Martin Ester
    Hierarchical Document Clustering using Frequent Itemsets. [Citation Graph (0, 0)][DBLP]
    SDM, 2003, pp:- [Conf]
  71. Gao Cong, Lan Yi, Bing Liu, Ke Wang
    Discovering Frequent Substructures from Hierarchical Semi-structured Data. [Citation Graph (0, 0)][DBLP]
    SDM, 2002, pp:- [Conf]
  72. Rong She, Ke Wang, Yabo Xu, Philip S. Yu
    Pushing Feature Selection Ahead Of Join. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  73. Ke Wang, Yabo Xu, Philip S. Yu, Rong She
    Building Decision Trees on Records Linked through Key References. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  74. Ke Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu
    Mining Changes of Classification by Correspondence Tracing. [Citation Graph (0, 0)][DBLP]
    SDM, 2003, pp:- [Conf]
  75. Jiawei Han, Jian Pei, Guozhu Dong, Ke Wang
    Efficient Computation of Iceberg Cubes with Complex Measures. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2001, pp:1-12 [Conf]
  76. Jiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang
    CubeExplorer: online exploration of data cubes. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2002, pp:626- [Conf]
  77. Ke Wang
    Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. [Citation Graph (0, 26)][DBLP]
    SIGMOD Conference, 1990, pp:74-83 [Conf]
  78. Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang
    Mining Multi-Dimensional Constrained Gradients in Data Cubes. [Citation Graph (0, 0)][DBLP]
    VLDB, 2001, pp:321-330 [Conf]
  79. Ke Wang, Yu He, Jiawei Han
    Mining Frequent Itemsets Using Support Constraints. [Citation Graph (0, 21)][DBLP]
    VLDB, 2000, pp:43-52 [Conf]
  80. Douglas A. Bodner, Ke Wang, Sheng Xu
    Advanced decision logic in simulation of material flow processing networks. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2005, pp:1359-1366 [Conf]
  81. Ke Wang, Sheng Xu, Leon F. McGinnis
    Time management in distributed factory simulation, a case study using HLA. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2005, pp:1781-1786 [Conf]
  82. Ian Tian Yi Li, Qiang Yang, Ke Wang
    Classification Pruning for Web-request Prediction. [Citation Graph (0, 0)][DBLP]
    WWW Posters, 2001, pp:- [Conf]
  83. Zhao Xu, Ke Wang, Xiao-hua Qiao
    A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:59-62 [Conf]
  84. Zhao Xu, Ke Wang, Xiao-hua Qiao
    Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:41-46 [Conf]
  85. Niels Provos, Joe McClain, Ke Wang
    Search worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:1-8 [Conf]
  86. Qiang Yang, Tianyiian Li, Ke Wang
    Web-Log Cleaning for Constructing Sequential Classifiers. [Citation Graph (0, 0)][DBLP]
    Applied Artificial Intelligence, 2003, v:17, n:5-6, pp:431-441 [Journal]
  87. Ke Wang, Weining Zhang, Siu-Cheung Chau
    Weakly Independent Database Schemes. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1997, v:34, n:1, pp:1-22 [Journal]
  88. Chang-Jian Zhao, Lokenath Debnath, Ke Wang
    Positive periodic solutions of a delayed model in population. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2003, v:16, n:4, pp:561-565 [Journal]
  89. Ke Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung
    Mining Customer Value: From Association Rules to Direct Marketing. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:1, pp:57-79 [Journal]
  90. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang
    Data Mining for Inventory Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:1, pp:81-112 [Journal]
  91. Qiang Yang, Ian Tian Yi Li, Ke Wang
    Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2004, v:8, n:3, pp:253-273 [Journal]
  92. Ke Wang, Li-Yan Yuan
    Preservation of Integrity Constraints in Definite DATALOG Programs. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:44, n:4, pp:185-193 [Journal]
  93. Marc H. Graham, Ke Wang
    On the Equivalence of an Egd to a Set of Fd's [Citation Graph (0, 0)][DBLP]
    J. ACM, 1990, v:37, n:3, pp:474-490 [Journal]
  94. Ke Wang, Weining Zhang, Siu-Cheung Chau
    Decomposition of Magic Rewriting. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1995, v:42, n:2, pp:329-381 [Journal]
  95. Wang Chiew Tan, Ke Wang, Limsoon Wong
    A Graphical Interface to Genome Multidatabases. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 1998, v:9, n:1, pp:24-32 [Journal]
  96. Ke Wang
    Discovering Patterns from Large and Dynamic Sequential Data. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 1997, v:9, n:1, pp:33-56 [Journal]
  97. Irene Pekerskaya, Jian Pei, Ke Wang
    Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2006, v:27, n:3, pp:215-242 [Journal]
  98. Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman
    PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2003, v:31, n:13, pp:3613-3617 [Journal]
  99. In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch
    The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1984, v:33, n:10, pp:906-911 [Journal]
  100. Ke Wang
    On Characterizing Boundedness of Database Schemes with Bounded Dependencies. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1992, v:100, n:2, pp:347-364 [Journal]
  101. Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou
    Mining Constrained Gradients in Large Databases. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:8, pp:922-938 [Journal]
  102. Jian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu
    Discovering Frequent Closed Partial Orders from Strings. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2006, v:18, n:11, pp:1467-1481 [Journal]
  103. Ke Wang, Yu He, Jiawei Han
    Pushing Support Constraints Into Association Rules Mining. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:3, pp:642-658 [Journal]
  104. Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han
    Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:3, pp:354-368 [Journal]
  105. Ke Wang, Huiqing Liu
    Discovering Structural Association of Semistructured Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:3, pp:353-371 [Journal]
  106. Weining Zhang, Ke Wang
    An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:225-237 [Journal]
  107. Weining Zhang, Ke Wang, Siu-Cheung Chau
    Data Partition and Parallel Evaluation of Datalog Programs. [Citation Graph (0, 12)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:1, pp:163-176 [Journal]
  108. Senqiang Zhou, Ke Wang
    Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:12, pp:1694-1705 [Journal]
  109. Tao Jiang, Ah-Hwee Tan, Ke Wang
    Mining Generalized Associations of Semantic Relations from Textual Web Content. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:2, pp:164-179 [Journal]
  110. Benjamin C. M. Fung, Ke Wang, Philip S. Yu
    Anonymizing Classification Data for Privacy Preservation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:5, pp:711-725 [Journal]
  111. Ke Wang, Weiwei, Yiying Tong, Mathieu Desbrun, Peter Schröder
    Edge subdivision schemes and the construction of smooth vector fields. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Graph., 2006, v:25, n:3, pp:1041-1048 [Journal]
  112. Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang
    Behavior-based modeling and its application to Email analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2006, v:6, n:2, pp:187-221 [Journal]
  113. Ling Bai, Ke Wang
    Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:1, pp:531-546 [Journal]
  114. Bing Zheng, Ke Wang
    On accelerate overrelaxation methods for rank deficient linear systems. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:173, n:2, pp:951-959 [Journal]
  115. Ke Wang, Bing Zheng
    Symmetric successive overrelaxation methods for fuzzy linear systems. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:175, n:2, pp:891-901 [Journal]
  116. Ke Wang, Bing Zheng
    Inconsistent fuzzy linear systems. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:181, n:2, pp:973-981 [Journal]
  117. Bing Zheng, Ke Wang
    General fuzzy linear systems. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:181, n:2, pp:1276-1286 [Journal]
  118. Bing Zheng, Ke Wang
    Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:182, n:2, pp:1709-1713 [Journal]
  119. Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu
    Computing Join Aggregates over Private Tables. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2007, pp:78-88 [Conf]
  120. Ke Wang, Wei Wang, Yan Zhuang
    Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:834-842 [Conf]
  121. Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang
    Mining favorable facets. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:804-813 [Conf]
  122. Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
    Summarizing Review Scores of "Unequal" Reviewers. [Citation Graph (0, 0)][DBLP]
    SDM, 2007, pp:- [Conf]
  123. Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang
    Maintaining K-Anonymity against Incremental Updates. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2007, pp:5- [Conf]
  124. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei
    Minimality Attack in Privacy Preserving Data Publishing. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:543-554 [Conf]
  125. Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen
    Privacy-enhancing personalized web search. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:591-600 [Conf]
  126. Weimin Ma, Ting Gao, Ke Wang
    On the On-Line k -Taxi Problem with Limited Look Ahead. [Citation Graph (0, 0)][DBLP]
    COCOA, 2007, pp:72-80 [Conf]
  127. Weimin Ma, Ke Wang
    On the On-Line Weighted k-Taxi Problem. [Citation Graph (0, 0)][DBLP]
    ESCAPE, 2007, pp:152-162 [Conf]
  128. Ke Wang, Benjamin C. M. Fung, Philip S. Yu
    Handicapping attacker's confidence: an alternative to k -anonymization. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2007, v:11, n:3, pp:345-368 [Journal]
  129. Moonjung Cho, Jian Pei, Ke Wang
    Answering ad hoc aggregate queries from data streams using prefix aggregate trees. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2007, v:12, n:3, pp:301-329 [Journal]

  130. Online anonymity for personalized web services. [Citation Graph (, )][DBLP]


  131. A Novel Architecture for Enterprise Network Security. [Citation Graph (, )][DBLP]


  132. Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. [Citation Graph (, )][DBLP]


  133. Anonymity for continuous data publishing. [Citation Graph (, )][DBLP]


  134. OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. [Citation Graph (, )][DBLP]


  135. Privacy-preserving data mashup. [Citation Graph (, )][DBLP]


  136. A Novel Constraint Handling Technique for Complex Portfolio Selection. [Citation Graph (, )][DBLP]


  137. FF-Anonymity: When Quasi-identifiers Are Missing. [Citation Graph (, )][DBLP]


  138. Global privacy guarantee in serial data publishing. [Citation Graph (, )][DBLP]


  139. On optimal anonymization for l+-diversity. [Citation Graph (, )][DBLP]


  140. Publishing Sensitive Transactions for Itemset Utility. [Citation Graph (, )][DBLP]


  141. A Study on the Reliability of Case-Based Reasoning Systems. [Citation Graph (, )][DBLP]


  142. Fine-Grain Perturbation for Privacy Preserving Data Publishing. [Citation Graph (, )][DBLP]


  143. Quasi-neutral Limit of the Drift-Diffusion Models for Semiconductors with PN-Junctions. [Citation Graph (, )][DBLP]


  144. A framework for privacy-preserving cluster analysis. [Citation Graph (, )][DBLP]


  145. Anonymizing transaction databases for publication. [Citation Graph (, )][DBLP]


  146. Multispectral and Panchromatic Images Fusion by Adaptive PCNN. [Citation Graph (, )][DBLP]


  147. On Mining Rating Dependencies in Online Collaborative Rating Networks. [Citation Graph (, )][DBLP]


  148. Anonymizing Transaction Data by Integrating Suppression and Generalization. [Citation Graph (, )][DBLP]


  149. Fast and Accurate Gene Prediction by Decision Tree Classification. [Citation Graph (, )][DBLP]


  150. Publishing Skewed Sensitive Microdata. [Citation Graph (, )][DBLP]


  151. Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. [Citation Graph (, )][DBLP]


  152. A Novel Server-Based Application Execution Architecture. [Citation Graph (, )][DBLP]


  153. A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. [Citation Graph (, )][DBLP]


  154. Heterogeneous Multi-core Parallel SGEMM Performance Testing and Analysis on Cell/B.E Processor. [Citation Graph (, )][DBLP]


  155. A Framework for Software Performance Simulation Using Binary to C Translation. [Citation Graph (, )][DBLP]


  156. Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network. [Citation Graph (, )][DBLP]


  157. To Wait or Not to Wait? Analysis for the Traveler's Waiting Problem with Incomplete Information. [Citation Graph (, )][DBLP]


  158. Urban growth simulation for Spatial Strategic Plan of Chuangdong area, China. [Citation Graph (, )][DBLP]


  159. Management information system of the Yellow River Mouth based on 3S. [Citation Graph (, )][DBLP]


  160. Edge detection from high-resolution remotely sensed imagery based on Gabor filter in frequency domain. [Citation Graph (, )][DBLP]


  161. Extinction and permanence in a stochastic non-autonomous population system. [Citation Graph (, )][DBLP]


  162. Preserving Individual Privacy in Serial Data Publishing [Citation Graph (, )][DBLP]


  163. Can the Utility of Anonymized Data be used for Privacy Breaches? [Citation Graph (, )][DBLP]


  164. Anonymization with Worst-Case Distribution-Based Background Knowledge [Citation Graph (, )][DBLP]


  165. Privacy-preserving data publishing: A survey of recent developments. [Citation Graph (, )][DBLP]


  166. Privacy-preserving data publishing for cluster analysis. [Citation Graph (, )][DBLP]


Search in 0.048secs, Finished in 0.056secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002