The SCEAS System
Navigation Menu

Search the dblp DataBase


Peng Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peng Zhang, Jing Peng, Norbert Riedel
    Finite Sample Error Bound for Parzen Windows. [Citation Graph (0, 0)][DBLP]
    AAAI, 2005, pp:925-931 [Conf]
  2. Omran A. Bukhres, Peng Zhang, Boualem Benatallah
    Modeling of Dynamic Internet Transactional Workflows. [Citation Graph (0, 10)][DBLP]
    ADBIS, 1997, pp:379-389 [Conf]
  3. Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
    Privacy Preserving Naive Bayes Classification. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:744-752 [Conf]
  4. Liyi Xiao, Bin Li, Yizheng Ye, Guoyong Huang, JinJun Guo, Peng Zhang
    A mixed-signal simulator for VHDL-AMS. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2001, pp:287-292 [Conf]
  5. Zaiping Chen, Qiang Gao, Chao Dong, Hongjin Liu, Peng Zhang, Zhenlin Xu
    The Flux-Oriented Control of an Induction Machine Utilizing an Online Controller Parameter Adaptation Scheme. [Citation Graph (0, 0)][DBLP]
    Australian Joint Conference on Artificial Intelligence, 2002, pp:249-258 [Conf]
  6. Yu Bo, Yunhai Tong, Hongding Wang, Peng Zhang, Shiwei Tang, Dongqing Yang
    IECS: An Integrated E-Community System for Management, Decision and Service. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2004, pp:542-552 [Conf]
  7. Chaoyuan Yue, Shengbao Yao, Peng Zhang, Wanan Cui
    Rough Approximation of a Preference Relation for Stochastic Multi-attribute Decision Problems. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:1242-1245 [Conf]
  8. Zhi-jie Li, Fei-xue Huang, Dong-qing Zhou, Peng Zhang
    Using Data Cube for Mining of Hybrid-Dimensional Association Rules. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:899-902 [Conf]
  9. Wenpeng Zhou, Peng Zhang, Xiaole Bai, Raimo Kantola
    A QoS Based Routing Algorithm for Multi-class Optimization in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2003, pp:136-145 [Conf]
  10. Dujuan Wang, Huaiming Li, Peng Zhang, Shangyu Nie
    The Design and Realization of Document Transmission Model Based on Agent. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:562-565 [Conf]
  11. Peng Zhang, Yanzhang Wang, Xuehua Wang
    Research on the Integration in E-government Based on Multi-agent. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:578-581 [Conf]
  12. Peng Zhang, Jing Peng, Carlotta Domeniconi
    Dimensionality Reduction Using Kernel Pooled Local Discriminant Information. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:701-704 [Conf]
  13. Peng Zhang, Norbert Riedel
    Discriminant Analysis: A Unified Approach. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:514-521 [Conf]
  14. Peng Zhang, Yan Lu, Qingming Huang, Wen Gao
    Mode mapping method for h.264/avc spatial downscaling transcoding. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2781-2784 [Conf]
  15. Peng Zhang, Debin Zhao, Siwei Ma, Yan Lu, Wen Gao
    Multiple modes intra-prediction in intra coding. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:419-422 [Conf]
  16. Peng Zhang, Jing Peng
    SVM vs Regularized Least Squares Classification. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2004, pp:176-179 [Conf]
  17. Peng Zhang, Jing Peng, Bill P. Buckles
    Learning Optimal Filter Representation for Texture Classification. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:1138-1141 [Conf]
  18. Peng Zhang, Raimo Kantola
    Building MPLS VPNs with QoS Routing Capabilty. [Citation Graph (0, 0)][DBLP]
    INTERWORKING, 2000, pp:292-301 [Conf]
  19. Juan Ventura Agustina, Peng Zhang, Raimo Kantola
    Performance Evaluation of GSM Handover Traffic in a GPRS/GSM Network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:137-142 [Conf]
  20. Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
    KD3 Scheme for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:659-661 [Conf]
  21. Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang
    Mining Association Rules from Distorted Data for Privacy Preservation. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1345-1351 [Conf]
  22. Xiaole Bai, Shuping Liu, Peng Zhang, Raimo Kantola
    ICN: Interest-Based Clustering Network. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2004, pp:219-226 [Conf]
  23. Bo Hu, Peng Zhang, Qingming Huang, Wen Gao
    Reducing Spatial Resolution for MPEG-2 to H.264/AVC Transcoding. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:830-840 [Conf]
  24. Peng Zhang, Qingming Huang, Wen Gao
    Key Techniques of Bit Rate Reduction for H.264 Streams. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:985-992 [Conf]
  25. Peng Zhang, Raimo Kantola
    Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks. [Citation Graph (0, 0)][DBLP]
    QofIS, 2000, pp:153-166 [Conf]
  26. Peng Zhang
    A New Approximation Algorithm for the k-Facility Location Problem. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:217-230 [Conf]
  27. Jianhui Li, Peng Zhang, Orna Etzion
    Module-aware translation for real-life desktop applications. [Citation Graph (0, 0)][DBLP]
    VEE, 2005, pp:89-99 [Conf]
  28. Peng Zhang, Lin Ni
    WDFB Contourlet and Shearing Invariant for Image Denoising. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:662-667 [Conf]
  29. Zhang Peng, Bi Guangguo, You Xiaohu
    An effective simplifying scheme for Viterbi decoder. [Citation Graph (0, 0)][DBLP]
    VTC Fall (2), 2004, pp:1363-1366 [Conf]
  30. Junhao Zheng, Lei Deng, Peng Zhang, Don Xie
    An Efficient VLSI Architecture for Motion Compensation of AVS HDTV Decoder. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:3, pp:370-377 [Journal]
  31. Xinhua Zhuang, Tao Wang, Peng Zhang
    A Highly Robust Estimator Through Partially Likelihood Function Modeling and Its Application in Computer Vision. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 1992, v:14, n:1, pp:19-35 [Journal]
  32. Wenbo Zhao, Peng Zhang, Tao Jiang
    A network flow approach to the Minimum Common Integer Partition Problem. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:369, n:1-3, pp:456-462 [Journal]
  33. Peng Zhang, Jing Peng, Carlotta Domeniconi
    Kernel pooled local subspaces for classification. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:3, pp:489-502 [Journal]
  34. Peng Zhang
    Approximating Generalized Multicut on Trees. [Citation Graph (0, 0)][DBLP]
    CiE, 2007, pp:799-808 [Conf]
  35. Peng Zhang, Juliang Zhang, Yong Shi
    A New Multi-Criteria Quadratic-Programming Linear Classification Model for VIP E-Mail Analysis. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:499-502 [Conf]
  36. Omran A. Bukhres, Stuart Morton, Peng Zhang, E. Vanderdijs, Casimir J. Crawley, J. Platt, Merrick Mossman
    A proposed mobile architecture for a distributed database environment. [Citation Graph (0, 0)][DBLP]
    PDP, 1997, pp:413-418 [Conf]
  37. Wenbo Zhao, Peng Zhang
    Approximation to the Minimum Rooted Star Cover Problem. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:670-679 [Conf]
  38. Peng Zhang
    An Approximation Algorithm to the k -Steiner Forest Problem. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:728-737 [Conf]
  39. Peng Zhang, Wenbo Zhao
    On the Complexity and Approximation of the Min-Sum and Min-Max Disjoint Paths Problems. [Citation Graph (0, 0)][DBLP]
    ESCAPE, 2007, pp:70-81 [Conf]
  40. Zhong-Hui Ou, Shi-Qiang Dai, Peng Zhang, Li-Yun Dong
    Nonlinear Analysis in the Aw-Rascle Anticipation Model of Traffic Flow. [Citation Graph (0, 0)][DBLP]
    SIAM Journal of Applied Mathematics, 2007, v:67, n:3, pp:605-618 [Journal]
  41. Mingji Xia, Peng Zhang, Wenbo Zhao
    Computational complexity of counting problems on 3-regular planar graphs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:384, n:1, pp:111-125 [Journal]
  42. Peng Zhang
    A new approximation algorithm for the k-facility location problem. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:384, n:1, pp:126-135 [Journal]

  43. Auto-scaled Incremental Tensor Subspace Learning for Region Based Rate Control Application. [Citation Graph (, )][DBLP]

  44. A Novel Feature-based Approach to Chinese Entity Relation Extraction. [Citation Graph (, )][DBLP]

  45. Simulation on Vehicle Emission by the Brake-Light Cellular Automata Model. [Citation Graph (, )][DBLP]

  46. Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. [Citation Graph (, )][DBLP]

  47. WCOMP: Waveform Comparison Tool for Mixed-signal Validation Regression in Memory Design. [Citation Graph (, )][DBLP]

  48. Saturation Attack on the Block Cipher HIGHT. [Citation Graph (, )][DBLP]

  49. Vision-Based Human-Computer System Using Hand Gestures. [Citation Graph (, )][DBLP]

  50. A New Local Repair Scheme Based on Link Breaks for Ad Hoc Networks. [Citation Graph (, )][DBLP]

  51. A remote health care system based on wireless sensor networks. [Citation Graph (, )][DBLP]

  52. Study of wood defects detection based on image Processing. [Citation Graph (, )][DBLP]

  53. A trust-based multipath routing framework for Mobile Ad hoc NETworks. [Citation Graph (, )][DBLP]

  54. Zoomed Object Segmentation from Dynamic Scene Containing a Door. [Citation Graph (, )][DBLP]

  55. DEA-Based Comprehensive Evaluation of Intelligent Knowledge. [Citation Graph (, )][DBLP]

  56. A Bias-Variance Analysis of Multiple Criteria Linear Programming Classification Ensembles. [Citation Graph (, )][DBLP]

  57. Kernel-Based Nonparametric Regression Method. [Citation Graph (, )][DBLP]

  58. Select Objective Functions for Multiple Criteria Programming Classification. [Citation Graph (, )][DBLP]

  59. A Utility-Based Web Content Sensitivity Mining Approach. [Citation Graph (, )][DBLP]

  60. Research on Relation Models of Unexpected Events Oriented to Emergency Decision Support. [Citation Graph (, )][DBLP]

  61. Flexible Orthogonal Code for CDMA Based MIMO-OFDM Systems with Space-Time-Frequency Spreading. [Citation Graph (, )][DBLP]

  62. Optimized Power Control and Resource Allocation in Grouped MC-CDMA Systems. [Citation Graph (, )][DBLP]

  63. A Compressed Sensing Based Ultra-Wideband Communication System. [Citation Graph (, )][DBLP]

  64. A Rough Set-Based Multiple Criteria Linear Programming Approach for Classification. [Citation Graph (, )][DBLP]

  65. Select Representative Samples for Regularized Multiple-Criteria Linear Programming Classification. [Citation Graph (, )][DBLP]

  66. Bias-Variance Analysis for Ensembling Regularized Multiple Criteria Linear Programming Models. [Citation Graph (, )][DBLP]

  67. Multiple Criteria Quadratic Programming for Financial Distress Prediction of the Listed Manufacturing Companies. [Citation Graph (, )][DBLP]

  68. Kernel Based Regularized Multiple Criteria Linear Programming Model. [Citation Graph (, )][DBLP]

  69. Finding the Hidden Pattern of Credit Card Holder's Churn: A Case of China. [Citation Graph (, )][DBLP]

  70. Active Learning from Data Streams. [Citation Graph (, )][DBLP]

  71. Multiple-Criteria Linear Programming for VIP E-Mail Behavior Analysis. [Citation Graph (, )][DBLP]

  72. A Regularized Multiple Criteria Linear Program for Classification. [Citation Graph (, )][DBLP]

  73. Cleansing Noisy Data Streams. [Citation Graph (, )][DBLP]

  74. A New Kernel-Based Classification Algorithm. [Citation Graph (, )][DBLP]

  75. Mining Data Streams with Labeled and Unlabeled Training Examples. [Citation Graph (, )][DBLP]

  76. The Application of the Snake Model in Carcinoma Cell Image Segment. [Citation Graph (, )][DBLP]

  77. A Geometric Active Contours Model for Multiple Objects Segmentation. [Citation Graph (, )][DBLP]

  78. An Efficient Reference Frame Storage Scheme for H.264 HDTV Decoder. [Citation Graph (, )][DBLP]

  79. Research on Wood Density Detection by X-Ray Based on Neural Network. [Citation Graph (, )][DBLP]

  80. Applying Hopfield neural network to defect edge detection of wood image. [Citation Graph (, )][DBLP]

  81. P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP]

  82. Analyzing Computer Game Narratives. [Citation Graph (, )][DBLP]

  83. Categorizing and mining concept drifting data streams. [Citation Graph (, )][DBLP]

  84. An Aggregate Ensemble for Mining Concept Drifting Data Streams with Noise. [Citation Graph (, )][DBLP]

  85. Privacy-preserving OLAP based on output perturbation across multiple sites. [Citation Graph (, )][DBLP]

  86. Approximating true relevance distribution from a mixture model based on irrelevance data. [Citation Graph (, )][DBLP]

  87. Approximation and Hardness Results for Label Cut and Related Problems. [Citation Graph (, )][DBLP]

  88. Business-Oriented Virtualization of Web Services A Case Study. [Citation Graph (, )][DBLP]

  89. Resource Allocation for Wireless Multi-Carrier Network with Receiver Cooperation. [Citation Graph (, )][DBLP]

  90. Abnormal Video Sections Detection Based on Inter-frames Information. [Citation Graph (, )][DBLP]

  91. An optimization model for container transportation network with ACO approach. [Citation Graph (, )][DBLP]

  92. The Study of Pathogen Particles Spread around Buildings by Considering the Pathogen Survival Time in Air. [Citation Graph (, )][DBLP]

  93. Performance Analysis and Diversity-Multiplexing Tradeoff in Virtual Antenna Array. [Citation Graph (, )][DBLP]

  94. Atmosphere-affected flight simulation system. [Citation Graph (, )][DBLP]

  95. The application of intrinsic variable preserving manifold learning method to tracking multiple people with occlusion reasoning. [Citation Graph (, )][DBLP]

  96. Oil and Gas Pipeline Limited Charge Optimum Maintenance Decision-Making Analysis Based on Fuzzy-Gray-Element Theory and Fuzzy Analytical Hierarchy Process*. [Citation Graph (, )][DBLP]

  97. Simulations and Trajectory Tracking of Two Manipulators Manipulating a Flexible Payload. [Citation Graph (, )][DBLP]

  98. Improvement of multi-channel MAC protocol for dense VANET with directional antennas. [Citation Graph (, )][DBLP]

  99. A relay assignment algorithm with interference mitigation for cooperative communication. [Citation Graph (, )][DBLP]

  100. Transfer Knowledge via Relational K-Means Method. [Citation Graph (, )][DBLP]

  101. A New Research Field: Intelligent Knowledge Management. [Citation Graph (, )][DBLP]

  102. A New Classification Method for PCA-Based Face Recognition. [Citation Graph (, )][DBLP]

  103. A Bicriteria Approximation Algorithm for Generalized k-Multicut in Trees. [Citation Graph (, )][DBLP]

  104. The Behavior Properties of Refinement of Petri Nets and Application in Parallel Programming. [Citation Graph (, )][DBLP]

  105. Personal Financial Market Segmentation Based on Clustering Ensembles. [Citation Graph (, )][DBLP]

  106. Long-Distance Oil/Gas Pipeline Failure Rate Prediction Based on Fuzzy Neural Network Model. [Citation Graph (, )][DBLP]

  107. Spatiotemporal latent semantic cues for moving people tracking. [Citation Graph (, )][DBLP]

  108. Exploiting the Role of Position Feature in Chinese Relation Extraction. [Citation Graph (, )][DBLP]

  109. A Study on Identifying Essential Hyperplanes for Constructing a Multiclass Classification Model. [Citation Graph (, )][DBLP]

  110. Intelligent delivery of interactive advertisement content. [Citation Graph (, )][DBLP]

  111. Several multi-criteria programming methods for classification. [Citation Graph (, )][DBLP]

  112. An Explicit Nonlinear Mapping for Manifold Learning [Citation Graph (, )][DBLP]

  113. On Tsallis Entropy Bias and Generalized Maximum Entropy Models [Citation Graph (, )][DBLP]

  114. Data Mining Consulting Improve Data Quality. [Citation Graph (, )][DBLP]

Search in 0.083secs, Finished in 0.091secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002