Search the dblp DataBase
Ke Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Marc H. Graham , Ke Wang Constant Time Maintenance or The Triumph of the fd. [Citation Graph (8, 11)][DBLP ] PODS, 1986, pp:202-216 [Conf ] Ke Wang Can Constant-time Maintainability Be More Practical? [Citation Graph (3, 15)][DBLP ] PODS, 1989, pp:120-127 [Conf ] Héctor J. Hernández , Ke Wang On the Boundedness of Constant-Time-Maintainable Database Schemes. [Citation Graph (3, 0)][DBLP ] SIAM J. Comput., 1993, v:22, n:1, pp:29-45 [Journal ] Ke Wang , Huiqing Liu Schema Discovery for Semistructured Data. [Citation Graph (2, 0)][DBLP ] KDD, 1997, pp:271-274 [Conf ] Ke Wang , Marc H. Graham Constant-Time Maintainability: A Generalization of Independence. [Citation Graph (2, 32)][DBLP ] ACM Trans. Database Syst., 1992, v:17, n:2, pp:201-246 [Journal ] Ke Wang Some Positive Results for Boundedness of Multiple Recursive Rules. [Citation Graph (1, 13)][DBLP ] ICDT, 1995, pp:383-396 [Conf ] Weining Zhang , Ke Wang , Siu-Cheung Chau Data partition: A Practical Parallel Evaluation of Datalog Programs. [Citation Graph (1, 0)][DBLP ] PDIS, 1991, pp:98-105 [Conf ] Bing Liu , Ke Wang , Lai-Fun Mun , Xin-Zhi Qi Using Decision Tree Induction for Discovering Holes in Data. [Citation Graph (1, 0)][DBLP ] PRICAI, 1998, pp:182-193 [Conf ] Ke Wang , Huiqing Liu Discovering Typical Structures of Documents: A Road Map Approach. [Citation Graph (1, 0)][DBLP ] SIGIR, 1998, pp:146-154 [Conf ] Ke Wang , Senqiang Zhou , Shiang Chen Liew Building Hierarchical Classifiers Using Class Proximity. [Citation Graph (1, 11)][DBLP ] VLDB, 1999, pp:363-374 [Conf ] Ke Wang , Li-Yan Yuan First-Order Logic Characterization of Program Properties. [Citation Graph (1, 27)][DBLP ] IEEE Trans. Knowl. Data Eng., 1994, v:6, n:4, pp:518-533 [Journal ] Ke Wang , Yabo Xu , Rong She , Philip S. Yu Classification Spanning Private Databases. [Citation Graph (0, 0)][DBLP ] AAAI, 2006, pp:- [Conf ] Huiqiang Wang , Gaofei Wang , Ying Lan , Ke Wang , Daxin Liu A New Automatic Intrusion Response Taxonomy and Its Application. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:999-1003 [Conf ] Helen Pinto , Jiawei Han , Jian Pei , Ke Wang , Qiming Chen , Umeshwar Dayal Multi-Dimensional Sequential Pattern Mining. [Citation Graph (0, 0)][DBLP ] CIKM, 2001, pp:81-88 [Conf ] Ke Wang , Yu He , David Wai-Lok Cheung , Francis Y. L. Chin Mining Confident Rules Without Support Requirement. [Citation Graph (0, 0)][DBLP ] CIKM, 2001, pp:89-96 [Conf ] Ke Wang , Chu Xu , Bing Liu Clustering Transactions Using Large Items. [Citation Graph (0, 0)][DBLP ] CIKM, 1999, pp:483-490 [Conf ] Ke Wang , Yabo Xu , Jeffrey Xu Yu Scalable sequential pattern mining for biological sequences. [Citation Graph (0, 0)][DBLP ] CIKM, 2004, pp:178-187 [Conf ] Yabo Xu , Ke Wang , Ada Wai-Chee Fu , Rong She , Jian Pei Classification spanning correlated data streams. [Citation Graph (0, 0)][DBLP ] CIKM, 2006, pp:132-141 [Conf ] Rui Kuang , Eugene Ie , Ke Wang , Kai Wang , Mahira Siddiqi , Yoav Freund , Christina S. Leslie Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. [Citation Graph (0, 0)][DBLP ] CSB, 2004, pp:152-160 [Conf ] Ke Wang , Beng Chin Ooi , Sam Yuan Sung P-Tree: A B-Tree Index for Lists. [Citation Graph (0, 12)][DBLP ] DASFAA, 1999, pp:221-228 [Conf ] Sonny Han Seng Chee , Jiawei Han , Ke Wang RecTree: An Efficient Collaborative Filtering Method. [Citation Graph (0, 0)][DBLP ] DaWaK, 2001, pp:141-151 [Conf ] Wang Chiew Tan , Ke Wang , Limsoon Wong QUICK: Graphical User Interface to Multiple Databases. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1996, pp:404-409 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern EMT/MET: Systems for Modeling and Detecting Errant Email. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:290-0 [Conf ] Ke Wang Mining Association Patterns from Nested Databases. [Citation Graph (0, 0)][DBLP ] DMKD, 1997, pp:0-0 [Conf ] Ke Wang , Senqiang Zhou , Jiawei Han Profit Mining: From Patterns to Actions. [Citation Graph (0, 0)][DBLP ] EDBT, 2002, pp:70-87 [Conf ] Ke Wang , Li-Yan Yuan Incremental Database Design Revisited. [Citation Graph (0, 0)][DBLP ] ICCI, 1991, pp:219-230 [Conf ] Ke Wang , Li-Yan Yuan Enforce Constraints in Archival Databases. [Citation Graph (0, 0)][DBLP ] ICCI, 1992, pp:397-400 [Conf ] Ke Wang , Weining Zhang , Siu-Cheung Chau Minimize Linear Mutual Recursion by Rule Unfolding. [Citation Graph (0, 0)][DBLP ] ICCI, 1993, pp:98-102 [Conf ] Benjamin C. M. Fung , Ke Wang , Philip S. Yu Top-Down Specialization for Information and Privacy Preservation. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:205-216 [Conf ] Ke Wang , Yuelong Jiang , Alexander Tuzhilin Mining Actionable Patterns by Role Models. [Citation Graph (0, 0)][DBLP ] ICDE, 2006, pp:16- [Conf ] Ke Wang , Yuelong Jiang , Jeffrey Xu Yu , Guozhu Dong , Jiawei Han Pushing Aggregate Constraints by Divide-and-Approximate. [Citation Graph (0, 0)][DBLP ] ICDE, 2003, pp:291-302 [Conf ] Ke Wang , Li-Yan Yuan First-Order Logic Reducible Programs. [Citation Graph (0, 11)][DBLP ] ICDE, 1991, pp:746-755 [Conf ] Ke Wang , Senqiang Zhou , Jack Man Shun Yeung , Qiang Yang Mining Customer Value: From Association Rules to Direct Marketing. [Citation Graph (0, 0)][DBLP ] ICDE, 2003, pp:738-740 [Conf ] Ada Wai-Chee Fu , Raymond Chi-Wing Wong , Ke Wang Privacy-Preserving Frequent Pattern Mining across Private Databases. [Citation Graph (0, 0)][DBLP ] ICDM, 2005, pp:613-616 [Conf ] Yuelong Jiang , Ke Wang , Alexander Tuzhilin , Ada Wai-Chee Fu Mining Patterns That Respond to Actions. [Citation Graph (0, 0)][DBLP ] ICDM, 2005, pp:669-672 [Conf ] Jian Pei , Jian Liu , Haixun Wang , Ke Wang , Philip S. Yu , Jianyong Wang Efficiently Mining Frequent Closed Partial Orders. [Citation Graph (0, 0)][DBLP ] ICDM, 2005, pp:753-756 [Conf ] Eric Ka Ka Ng , Ada Wai-Chee Fu , Ke Wang Mining Association Rules from Stars. [Citation Graph (0, 0)][DBLP ] ICDM, 2002, pp:322-329 [Conf ] Ke Wang , Benjamin C. M. Fung , Philip S. Yu Template-Based Privacy Preservation in Classification Problems. [Citation Graph (0, 0)][DBLP ] ICDM, 2005, pp:466-473 [Conf ] Ke Wang , Philip S. Yu , Sourav Chakraborty Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. [Citation Graph (0, 0)][DBLP ] ICDM, 2004, pp:249-256 [Conf ] Raymond Chi-Wing Wong , Ada Wai-Chee Fu , Ke Wang MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP ] ICDM, 2003, pp:371-378 [Conf ] Yi-Ting Lai , Ke Wang , Daymond Ling , Hua Shi , Jason Zhang Direct Marketing When There Are Voluntary Buyers. [Citation Graph (0, 0)][DBLP ] ICDM, 2006, pp:922-927 [Conf ] Ke Wang , James N. K. Liu , Weimin Ma Mining the Most Reliable Association Rules with Composite Items. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:749-754 [Conf ] Ke Wang , Han Chong Goh Minimum Splits Based Discretization for Continuous Features. [Citation Graph (0, 0)][DBLP ] IJCAI (2), 1997, pp:942-951 [Conf ] Weimin Ma , Ke Wang On the On-Line k -Truck Problem with Benefit Maximization. [Citation Graph (0, 0)][DBLP ] ISAAC, 2006, pp:660-669 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu Behavior Profiling of Email. [Citation Graph (0, 0)][DBLP ] ISI, 2003, pp:74-90 [Conf ] Ke Wang , Benjamin C. M. Fung , Guozhu Dong Integrating Private Databases for Data Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:171-182 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Linh H. Bui , Ryan Ferster , Ke Wang Anomaly Detection in Computer Security and an Application to File System Accesses. [Citation Graph (0, 0)][DBLP ] ISMIS, 2005, pp:14-28 [Conf ] Hady Wirawan Lauw , Ee-Peng Lim , Ke Wang Bias and controversy: beyond the statistical deviation. [Citation Graph (0, 0)][DBLP ] KDD, 2006, pp:625-630 [Conf ] Junqiang Liu , Yunhe Pan , Ke Wang , Jiawei Han Mining frequent item sets by opportunistic projection. [Citation Graph (0, 0)][DBLP ] KDD, 2002, pp:229-238 [Conf ] Rong She , Fei Chen , Ke Wang , Martin Ester , Jennifer L. Gardy , Fiona S. L. Brinkman Frequent-subsequence-based prediction of outer membrane proteins. [Citation Graph (0, 0)][DBLP ] KDD, 2003, pp:436-445 [Conf ] Ke Wang , Benjamin C. M. Fung Anonymizing sequential releases. [Citation Graph (0, 0)][DBLP ] KDD, 2006, pp:414-423 [Conf ] Ke Wang , Yuelong Jiang , Laks V. S. Lakshmanan Mining unexpected rules by pushing user dynamics. [Citation Graph (0, 0)][DBLP ] KDD, 2003, pp:246-255 [Conf ] Ke Wang , Ming-Yen Thomas Su Item selection by "hub-authority" profit ranking. [Citation Graph (0, 0)][DBLP ] KDD, 2002, pp:652-657 [Conf ] Ke Wang , Suman Sundaresh Selecting Features by Vertical Compactness of Data. [Citation Graph (0, 0)][DBLP ] KDD, 1997, pp:275-278 [Conf ] Ke Wang , Soon Hock William Tay , Bing Liu Interestingness-Based Interval Merger for Numeric Association Rules. [Citation Graph (0, 0)][DBLP ] KDD, 1998, pp:121-128 [Conf ] Ke Wang , Senqiang Zhou , Yu He Growing decision trees on support-less association rules. [Citation Graph (0, 0)][DBLP ] KDD, 2000, pp:265-269 [Conf ] Raymond Chi-Wing Wong , Jiuyong Li , Ada Wai-Chee Fu , Ke Wang (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. [Citation Graph (0, 0)][DBLP ] KDD, 2006, pp:754-759 [Conf ] Li-bao Zhang , Ke Wang Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. [Citation Graph (0, 0)][DBLP ] MIAR, 2004, pp:86-93 [Conf ] Salvatore J. Stolfo , Shlomo Hershkop , Ke Wang , Olivier Nimeskern , Chia-Wei Hu A Behavior-Based Approach to Securing Email Systems. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:57-81 [Conf ] Li-bao Zhang , Ke Wang New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:513-516 [Conf ] Bing Liu , Wynne Hsu , Ke Wang , Shu Chen Visually Aided Exploration of Interesting Association Rules. [Citation Graph (0, 0)][DBLP ] PAKDD, 1999, pp:380-389 [Conf ] Ke Wang , Yu He User-Defined Association Mining. [Citation Graph (0, 0)][DBLP ] PAKDD, 2001, pp:387-399 [Conf ] Ke Wang , Liu Tang , Jiawei Han , Junqiang Liu Top Down FP-Growth for Association Rule Mining. [Citation Graph (0, 0)][DBLP ] PAKDD, 2002, pp:334-340 [Conf ] Ke Wang , Bing Liu Concurrent Discretization of Multiple Attributes. [Citation Graph (0, 0)][DBLP ] PRICAI, 1998, pp:250-259 [Conf ] Ke Wang , Gabriela Cretu , Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:227-246 [Conf ] Ke Wang , Janak J. Parekh , Salvatore J. Stolfo Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:226-248 [Conf ] Ke Wang , Salvatore J. Stolfo Anomalous Payload-Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:203-222 [Conf ] Michael E. Locasto , Ke Wang , Angelos D. Keromytis , Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:82-101 [Conf ] Emin Gün Sirer , Ke Wang An access control language for web services. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:23-30 [Conf ] Benjamin C. M. Fung , Ke Wang , Martin Ester Hierarchical Document Clustering using Frequent Itemsets. [Citation Graph (0, 0)][DBLP ] SDM, 2003, pp:- [Conf ] Gao Cong , Lan Yi , Bing Liu , Ke Wang Discovering Frequent Substructures from Hierarchical Semi-structured Data. [Citation Graph (0, 0)][DBLP ] SDM, 2002, pp:- [Conf ] Rong She , Ke Wang , Yabo Xu , Philip S. Yu Pushing Feature Selection Ahead Of Join. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Ke Wang , Yabo Xu , Philip S. Yu , Rong She Building Decision Trees on Records Linked through Key References. [Citation Graph (0, 0)][DBLP ] SDM, 2005, pp:- [Conf ] Ke Wang , Senqiang Zhou , Ada Wai-Chee Fu , Jeffrey Xu Yu Mining Changes of Classification by Correspondence Tracing. [Citation Graph (0, 0)][DBLP ] SDM, 2003, pp:- [Conf ] Jiawei Han , Jian Pei , Guozhu Dong , Ke Wang Efficient Computation of Iceberg Cubes with Complex Measures. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2001, pp:1-12 [Conf ] Jiawei Han , Jianyong Wang , Guozhu Dong , Jian Pei , Ke Wang CubeExplorer: online exploration of data cubes. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2002, pp:626- [Conf ] Ke Wang Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. [Citation Graph (0, 26)][DBLP ] SIGMOD Conference, 1990, pp:74-83 [Conf ] Guozhu Dong , Jiawei Han , Joyce M. W. Lam , Jian Pei , Ke Wang Mining Multi-Dimensional Constrained Gradients in Data Cubes. [Citation Graph (0, 0)][DBLP ] VLDB, 2001, pp:321-330 [Conf ] Ke Wang , Yu He , Jiawei Han Mining Frequent Itemsets Using Support Constraints. [Citation Graph (0, 21)][DBLP ] VLDB, 2000, pp:43-52 [Conf ] Douglas A. Bodner , Ke Wang , Sheng Xu Advanced decision logic in simulation of material flow processing networks. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2005, pp:1359-1366 [Conf ] Ke Wang , Sheng Xu , Leon F. McGinnis Time management in distributed factory simulation, a case study using HLA. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2005, pp:1781-1786 [Conf ] Ian Tian Yi Li , Qiang Yang , Ke Wang Classification Pruning for Web-request Prediction. [Citation Graph (0, 0)][DBLP ] WWW Posters, 2001, pp:- [Conf ] Zhao Xu , Ke Wang , Xiao-hua Qiao A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:59-62 [Conf ] Zhao Xu , Ke Wang , Xiao-hua Qiao Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:41-46 [Conf ] Niels Provos , Joe McClain , Ke Wang Search worms. [Citation Graph (0, 0)][DBLP ] WORM, 2006, pp:1-8 [Conf ] Qiang Yang , Tianyiian Li , Ke Wang Web-Log Cleaning for Constructing Sequential Classifiers. [Citation Graph (0, 0)][DBLP ] Applied Artificial Intelligence, 2003, v:17, n:5-6, pp:431-441 [Journal ] Ke Wang , Weining Zhang , Siu-Cheung Chau Weakly Independent Database Schemes. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1997, v:34, n:1, pp:1-22 [Journal ] Chang-Jian Zhao , Lokenath Debnath , Ke Wang Positive periodic solutions of a delayed model in population. [Citation Graph (0, 0)][DBLP ] Appl. Math. Lett., 2003, v:16, n:4, pp:561-565 [Journal ] Ke Wang , Senqiang Zhou , Qiang Yang , Jack Man Shun Yeung Mining Customer Value: From Association Rules to Direct Marketing. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:1, pp:57-79 [Journal ] Raymond Chi-Wing Wong , Ada Wai-Chee Fu , Ke Wang Data Mining for Inventory Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:1, pp:81-112 [Journal ] Qiang Yang , Ian Tian Yi Li , Ke Wang Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2004, v:8, n:3, pp:253-273 [Journal ] Ke Wang , Li-Yan Yuan Preservation of Integrity Constraints in Definite DATALOG Programs. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1992, v:44, n:4, pp:185-193 [Journal ] Marc H. Graham , Ke Wang On the Equivalence of an Egd to a Set of Fd's [Citation Graph (0, 0)][DBLP ] J. ACM, 1990, v:37, n:3, pp:474-490 [Journal ] Ke Wang , Weining Zhang , Siu-Cheung Chau Decomposition of Magic Rewriting. [Citation Graph (0, 0)][DBLP ] J. ACM, 1995, v:42, n:2, pp:329-381 [Journal ] Wang Chiew Tan , Ke Wang , Limsoon Wong A Graphical Interface to Genome Multidatabases. [Citation Graph (0, 0)][DBLP ] J. Database Manag., 1998, v:9, n:1, pp:24-32 [Journal ] Ke Wang Discovering Patterns from Large and Dynamic Sequential Data. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 1997, v:9, n:1, pp:33-56 [Journal ] Irene Pekerskaya , Jian Pei , Ke Wang Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2006, v:27, n:3, pp:215-242 [Journal ] Jennifer L. Gardy , Cory Spencer , Ke Wang , Martin Ester , Gábor E. Tusnády , István Simon , Sujun Hua , Katalin de Fays , Christophe G. Lambert , Kenta Nakai , Fiona S. L. Brinkman PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 2003, v:31, n:13, pp:3613-3617 [Journal ] In-Shek Hsu , Irving S. Reed , Trieu-Kien Truong , Ke Wang , Chiunn-Shyong Ye , Leslie J. Deutsch The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1984, v:33, n:10, pp:906-911 [Journal ] Ke Wang On Characterizing Boundedness of Database Schemes with Bounded Dependencies. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1992, v:100, n:2, pp:347-364 [Journal ] Guozhu Dong , Jiawei Han , Joyce M. W. Lam , Jian Pei , Ke Wang , Wei Zou Mining Constrained Gradients in Large Databases. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:8, pp:922-938 [Journal ] Jian Pei , Haixun Wang , Jian Liu , Ke Wang , Jianyong Wang , Philip S. Yu Discovering Frequent Closed Partial Orders from Strings. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2006, v:18, n:11, pp:1467-1481 [Journal ] Ke Wang , Yu He , Jiawei Han Pushing Support Constraints Into Association Rules Mining. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:3, pp:642-658 [Journal ] Ke Wang , Yuelong Jiang , Jeffrey Xu Yu , Guozhu Dong , Jiawei Han Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:3, pp:354-368 [Journal ] Ke Wang , Huiqing Liu Discovering Structural Association of Semistructured Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:3, pp:353-371 [Journal ] Weining Zhang , Ke Wang An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:225-237 [Journal ] Weining Zhang , Ke Wang , Siu-Cheung Chau Data Partition and Parallel Evaluation of Datalog Programs. [Citation Graph (0, 12)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:1, pp:163-176 [Journal ] Senqiang Zhou , Ke Wang Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:12, pp:1694-1705 [Journal ] Tao Jiang , Ah-Hwee Tan , Ke Wang Mining Generalized Associations of Semantic Relations from Textual Web Content. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:2, pp:164-179 [Journal ] Benjamin C. M. Fung , Ke Wang , Philip S. Yu Anonymizing Classification Data for Privacy Preservation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:5, pp:711-725 [Journal ] Ke Wang , Weiwei , Yiying Tong , Mathieu Desbrun , Peter Schröder Edge subdivision schemes and the construction of smooth vector fields. [Citation Graph (0, 0)][DBLP ] ACM Trans. Graph., 2006, v:25, n:3, pp:1041-1048 [Journal ] Salvatore J. Stolfo , Shlomo Hershkop , Chia-Wei Hu , Wei-Jen Li , Olivier Nimeskern , Ke Wang Behavior-based modeling and its application to Email analysis. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2006, v:6, n:2, pp:187-221 [Journal ] Ling Bai , Ke Wang Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2005, v:171, n:1, pp:531-546 [Journal ] Bing Zheng , Ke Wang On accelerate overrelaxation methods for rank deficient linear systems. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:173, n:2, pp:951-959 [Journal ] Ke Wang , Bing Zheng Symmetric successive overrelaxation methods for fuzzy linear systems. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:175, n:2, pp:891-901 [Journal ] Ke Wang , Bing Zheng Inconsistent fuzzy linear systems. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:181, n:2, pp:973-981 [Journal ] Bing Zheng , Ke Wang General fuzzy linear systems. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:181, n:2, pp:1276-1286 [Journal ] Bing Zheng , Ke Wang Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:182, n:2, pp:1709-1713 [Journal ] Rong She , Ke Wang , Ada Wai-Chee Fu , Yabo Xu Computing Join Aggregates over Private Tables. [Citation Graph (0, 0)][DBLP ] DaWaK, 2007, pp:78-88 [Conf ] Ke Wang , Wei Wang , Yan Zhuang Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2007, pp:834-842 [Conf ] Raymond Chi-Wing Wong , Jian Pei , Ada Wai-Chee Fu , Ke Wang Mining favorable facets. [Citation Graph (0, 0)][DBLP ] KDD, 2007, pp:804-813 [Conf ] Hady Wirawan Lauw , Ee-Peng Lim , Ke Wang Summarizing Review Scores of "Unequal" Reviewers. [Citation Graph (0, 0)][DBLP ] SDM, 2007, pp:- [Conf ] Jian Pei , Jian Xu , Zhibin Wang , Wei Wang , Ke Wang Maintaining K-Anonymity against Incremental Updates. [Citation Graph (0, 0)][DBLP ] SSDBM, 2007, pp:5- [Conf ] Raymond Chi-Wing Wong , Ada Wai-Chee Fu , Ke Wang , Jian Pei Minimality Attack in Privacy Preserving Data Publishing. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:543-554 [Conf ] Yabo Xu , Ke Wang , Benyu Zhang , Zheng Chen Privacy-enhancing personalized web search. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:591-600 [Conf ] Weimin Ma , Ting Gao , Ke Wang On the On-Line k -Taxi Problem with Limited Look Ahead. [Citation Graph (0, 0)][DBLP ] COCOA, 2007, pp:72-80 [Conf ] Weimin Ma , Ke Wang On the On-Line Weighted k-Taxi Problem. [Citation Graph (0, 0)][DBLP ] ESCAPE, 2007, pp:152-162 [Conf ] Ke Wang , Benjamin C. M. Fung , Philip S. Yu Handicapping attacker's confidence: an alternative to k -anonymization. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2007, v:11, n:3, pp:345-368 [Journal ] Moonjung Cho , Jian Pei , Ke Wang Answering ad hoc aggregate queries from data streams using prefix aggregate trees. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2007, v:12, n:3, pp:301-329 [Journal ] Online anonymity for personalized web services. [Citation Graph (, )][DBLP ] A Novel Architecture for Enterprise Network Security. [Citation Graph (, )][DBLP ] Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. [Citation Graph (, )][DBLP ] Anonymity for continuous data publishing. [Citation Graph (, )][DBLP ] OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. [Citation Graph (, )][DBLP ] Privacy-preserving data mashup. [Citation Graph (, )][DBLP ] A Novel Constraint Handling Technique for Complex Portfolio Selection. [Citation Graph (, )][DBLP ] FF-Anonymity: When Quasi-identifiers Are Missing. [Citation Graph (, )][DBLP ] Global privacy guarantee in serial data publishing. [Citation Graph (, )][DBLP ] On optimal anonymization for l+ -diversity. [Citation Graph (, )][DBLP ] Publishing Sensitive Transactions for Itemset Utility. [Citation Graph (, )][DBLP ] A Study on the Reliability of Case-Based Reasoning Systems. [Citation Graph (, )][DBLP ] Fine-Grain Perturbation for Privacy Preserving Data Publishing. [Citation Graph (, )][DBLP ] Quasi-neutral Limit of the Drift-Diffusion Models for Semiconductors with PN-Junctions. [Citation Graph (, )][DBLP ] A framework for privacy-preserving cluster analysis. [Citation Graph (, )][DBLP ] Anonymizing transaction databases for publication. [Citation Graph (, )][DBLP ] Multispectral and Panchromatic Images Fusion by Adaptive PCNN. [Citation Graph (, )][DBLP ] On Mining Rating Dependencies in Online Collaborative Rating Networks. [Citation Graph (, )][DBLP ] Anonymizing Transaction Data by Integrating Suppression and Generalization. [Citation Graph (, )][DBLP ] Fast and Accurate Gene Prediction by Decision Tree Classification. [Citation Graph (, )][DBLP ] Publishing Skewed Sensitive Microdata. [Citation Graph (, )][DBLP ] Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. [Citation Graph (, )][DBLP ] A Novel Server-Based Application Execution Architecture. [Citation Graph (, )][DBLP ] A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. [Citation Graph (, )][DBLP ] Heterogeneous Multi-core Parallel SGEMM Performance Testing and Analysis on Cell/B.E Processor. [Citation Graph (, )][DBLP ] A Framework for Software Performance Simulation Using Binary to C Translation. [Citation Graph (, )][DBLP ] Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network. [Citation Graph (, )][DBLP ] To Wait or Not to Wait? Analysis for the Traveler's Waiting Problem with Incomplete Information. [Citation Graph (, )][DBLP ] Urban growth simulation for Spatial Strategic Plan of Chuangdong area, China. [Citation Graph (, )][DBLP ] Management information system of the Yellow River Mouth based on 3S. [Citation Graph (, )][DBLP ] Edge detection from high-resolution remotely sensed imagery based on Gabor filter in frequency domain. [Citation Graph (, )][DBLP ] Extinction and permanence in a stochastic non-autonomous population system. [Citation Graph (, )][DBLP ] Preserving Individual Privacy in Serial Data Publishing [Citation Graph (, )][DBLP ] Can the Utility of Anonymized Data be used for Privacy Breaches? [Citation Graph (, )][DBLP ] Anonymization with Worst-Case Distribution-Based Background Knowledge [Citation Graph (, )][DBLP ] Privacy-preserving data publishing: A survey of recent developments. [Citation Graph (, )][DBLP ] Privacy-preserving data publishing for cluster analysis. [Citation Graph (, )][DBLP ] Search in 0.025secs, Finished in 0.038secs