The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhe Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhe Wu, Benjamin W. Wah
    An Efficient Global-Search Strategy in Discrete Lagrangian Methods for Solving Hard Satisfiability Problems. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 2000, pp:310-315 [Conf]
  2. Zhe Wu, Benjamin W. Wah
    Trap Escaping Strategies in Discrete Lagrangian Methods for Solving Hard Satisfiability and Maximum Satisfiability Problems. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1999, pp:673-678 [Conf]
  3. Benjamin W. Wah, Yi Shang, Zhe Wu
    Discrete Lagrangian Method for Optimizing the Design of Multiplierless QMF Filter Banks. [Citation Graph (0, 0)][DBLP]
    ASAP, 1997, pp:529-0 [Conf]
  4. Benjamin W. Wah, Zhe Wu
    The Theory of Discrete Lagrange Multipliers for Nonlinear Discrete Optimization. [Citation Graph (0, 0)][DBLP]
    CP, 1999, pp:28-42 [Conf]
  5. Zhe Wu, Benjamin W. Wah
    Solving Hard Satisfiability Problems: A Unified Algorithm Based on Discrete Lagrange Multipliers. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1999, pp:210-217 [Conf]
  6. Benjamin W. Wah, Tao Wang, Yi Shang, Zhe Wu
    Improving the Performance of Weighted Lagrange-Multiplier Methods for Nonlinear Constrained Optimization. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1997, pp:224-231 [Conf]
  7. Benjamin W. Wah, Tao Wang, Yi Shang, Zhe Wu
    Improving the performance of weighted Lagrange-multiplier methods for nonlinear constrained optimization. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:124, n:1-4, pp:241-272 [Journal]
  8. Benjamin W. Wah, Zhe Wu
    Penalty Formulations and Trap-Avoidance Strategies for Solving Hard Satisfiability Problems. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:1, pp:3-17 [Journal]
  9. Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang
    A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:129-132 [Conf]
  10. Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang
    A Secure Email System Based on Fingerprint Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:250-253 [Conf]

  11. A Scalable Scheme for Bulk Loading Large RDF Graphs into Oracle. [Citation Graph (, )][DBLP]


  12. Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in Oracle. [Citation Graph (, )][DBLP]


  13. Visualizing large-scale RDF data using Subsets, Summaries, and Sampling in Oracle. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002