The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fan Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tsai-Pin Chu, Fan Wu, Shih-Wen Chiang
    Mining Frequent Pattern Using Item-Transformation Method. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:698-706 [Conf]
  2. Fan Wu, Frank Kuo, Liu-Wei Liu
    The application of RFID on drug safety of inpatient nursing healthcare. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:85-92 [Conf]
  3. Yi-Lun Pan, Yuehching Lee, Fan Wu
    Job Scheduling of Savant for Grid Computing on RFID EPC Network. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:75-84 [Conf]
  4. W. C. Tsai, Frank Kuo, Yuehching Lee, Fan Wu
    The Application of RFID in Emergency Medicine. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1201-1206 [Conf]
  5. Mi-Cheng Lu, Fan Wu
    A Structure for Materialized Views of Data Warehouse with Concurrency Control. [Citation Graph (0, 0)][DBLP]
    IKE, 2004, pp:385-391 [Conf]
  6. Tongqing Qiu, Fan Wu, Guihai Chen
    A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:816-826 [Conf]
  7. Fan Wu, Tongqing Qiu, YueQuan Chen, Guihai Chen
    Redundancy Schemes for High Availability in DHTs. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:990-1000 [Conf]
  8. Fan Wu, Ching-Chi Hsu
    Processor Allocation in the Star Graph Using Sg-lattice Model. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1997, pp:310-316 [Conf]
  9. Fan Wu, Mi-Cheng Lu
    Modeling of Warehouse and Its Analyses. [Citation Graph (0, 0)][DBLP]
    MSV/AMCS, 2004, pp:239-245 [Conf]
  10. Fan Wu, Tso-Chih Kuan, Li-Ping Chou
    Processor Allocation Scheme for Incomplete Substructure of Recursively Decomposable Interconnection Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2218-2224 [Conf]
  11. Ching-Chi Hsu, Fan Wu
    Topic-specific crawling on the Web with the measurements of the relevancy context graph. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2006, v:31, n:4-5, pp:232-246 [Journal]
  12. Fan Wu, Ching-Chi Hsu, Li-Ping Chou
    Processor Allocation in the Mesh Multiprocessors Using the Leapfrog Method. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:3, pp:276-289 [Journal]
  13. Fan Wu, Emmanuel Agu, Matthew Ward
    Multiresolution Graphics on Ubiquitous Displays Using Wavelets. [Citation Graph (0, 0)][DBLP]
    IJVR, 2006, v:5, n:3, pp:9-15 [Journal]
  14. Fan Wu, Shih-Wen Chiang, Jiunn-Rong Lin
    A new approach to mine frequent patterns using item-transformation methods. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2007, v:32, n:7, pp:1056-1072 [Journal]

  15. The Prediction of Severe Sepsis Using SVM Model. [Citation Graph (, )][DBLP]


  16. Yield and Reliability Enhancement for VLSI Design. [Citation Graph (, )][DBLP]


  17. A Novel and Efficient Distributed Data Mining Algorithm Based on Frequent Pattern-Tree. [Citation Graph (, )][DBLP]


  18. Linked List Based High Utility Itemsets Mining Using Pattern Growth Method. [Citation Graph (, )][DBLP]


  19. Distributed Frequent Pattern Mining Using Time-Slice Method. [Citation Graph (, )][DBLP]


  20. Dynamic correction of color appearance on mobile displays. [Citation Graph (, )][DBLP]


  21. Preventing Wormhole Attacks in Mobile Commerce. [Citation Graph (, )][DBLP]


  22. Data Hiding for Speech Bandwidth Extension and its Hardware Implementation. [Citation Graph (, )][DBLP]


  23. Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. [Citation Graph (, )][DBLP]


  24. Adaptive CPU Scheduling to Conserve Energy in Real-Time Mobile Graphics Applications. [Citation Graph (, )][DBLP]


  25. On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP]


  26. Incentive-compatible opportunistic routing for wireless networks. [Citation Graph (, )][DBLP]


  27. Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission. [Citation Graph (, )][DBLP]


  28. Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. [Citation Graph (, )][DBLP]


  29. Design of an Intelligent Reporting System for Cardiac Catheterization. [Citation Graph (, )][DBLP]


  30. Spam Mail Filtering Using an Incremental One-Class Support Vector Machine. [Citation Graph (, )][DBLP]


  31. Intrusion Detection Method Based on Wavelet Neural Network. [Citation Graph (, )][DBLP]


  32. Decision Support System for Cephalometric Analyses of Orthodontics. [Citation Graph (, )][DBLP]


  33. Using RFID to guard inpatient medication safety. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.307secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002