Search the dblp DataBase
Fan Wu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tsai-Pin Chu , Fan Wu , Shih-Wen Chiang Mining Frequent Pattern Using Item-Transformation Method. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2005, pp:698-706 [Conf ] Fan Wu , Frank Kuo , Liu-Wei Liu The application of RFID on drug safety of inpatient nursing healthcare. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:85-92 [Conf ] Yi-Lun Pan , Yuehching Lee , Fan Wu Job Scheduling of Savant for Grid Computing on RFID EPC Network. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:75-84 [Conf ] W. C. Tsai , Frank Kuo , Yuehching Lee , Fan Wu The Application of RFID in Emergency Medicine. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:1201-1206 [Conf ] Mi-Cheng Lu , Fan Wu A Structure for Materialized Views of Data Warehouse with Concurrency Control. [Citation Graph (0, 0)][DBLP ] IKE, 2004, pp:385-391 [Conf ] Tongqing Qiu , Fan Wu , Guihai Chen A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:816-826 [Conf ] Fan Wu , Tongqing Qiu , YueQuan Chen , Guihai Chen Redundancy Schemes for High Availability in DHTs. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:990-1000 [Conf ] Fan Wu , Ching-Chi Hsu Processor Allocation in the Star Graph Using Sg-lattice Model. [Citation Graph (0, 0)][DBLP ] ISPAN, 1997, pp:310-316 [Conf ] Fan Wu , Mi-Cheng Lu Modeling of Warehouse and Its Analyses. [Citation Graph (0, 0)][DBLP ] MSV/AMCS, 2004, pp:239-245 [Conf ] Fan Wu , Tso-Chih Kuan , Li-Ping Chou Processor Allocation Scheme for Incomplete Substructure of Recursively Decomposable Interconnection Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:2218-2224 [Conf ] Ching-Chi Hsu , Fan Wu Topic-specific crawling on the Web with the measurements of the relevancy context graph. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2006, v:31, n:4-5, pp:232-246 [Journal ] Fan Wu , Ching-Chi Hsu , Li-Ping Chou Processor Allocation in the Mesh Multiprocessors Using the Leapfrog Method. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:3, pp:276-289 [Journal ] Fan Wu , Emmanuel Agu , Matthew Ward Multiresolution Graphics on Ubiquitous Displays Using Wavelets. [Citation Graph (0, 0)][DBLP ] IJVR, 2006, v:5, n:3, pp:9-15 [Journal ] Fan Wu , Shih-Wen Chiang , Jiunn-Rong Lin A new approach to mine frequent patterns using item-transformation methods. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2007, v:32, n:7, pp:1056-1072 [Journal ] The Prediction of Severe Sepsis Using SVM Model. [Citation Graph (, )][DBLP ] Yield and Reliability Enhancement for VLSI Design. [Citation Graph (, )][DBLP ] A Novel and Efficient Distributed Data Mining Algorithm Based on Frequent Pattern-Tree. [Citation Graph (, )][DBLP ] Linked List Based High Utility Itemsets Mining Using Pattern Growth Method. [Citation Graph (, )][DBLP ] Distributed Frequent Pattern Mining Using Time-Slice Method. [Citation Graph (, )][DBLP ] Dynamic correction of color appearance on mobile displays. [Citation Graph (, )][DBLP ] Preventing Wormhole Attacks in Mobile Commerce. [Citation Graph (, )][DBLP ] Data Hiding for Speech Bandwidth Extension and its Hardware Implementation. [Citation Graph (, )][DBLP ] Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. [Citation Graph (, )][DBLP ] Adaptive CPU Scheduling to Conserve Energy in Real-Time Mobile Graphics Applications. [Citation Graph (, )][DBLP ] On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP ] Incentive-compatible opportunistic routing for wireless networks. [Citation Graph (, )][DBLP ] Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission. [Citation Graph (, )][DBLP ] Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. [Citation Graph (, )][DBLP ] Design of an Intelligent Reporting System for Cardiac Catheterization. [Citation Graph (, )][DBLP ] Spam Mail Filtering Using an Incremental One-Class Support Vector Machine. [Citation Graph (, )][DBLP ] Intrusion Detection Method Based on Wavelet Neural Network. [Citation Graph (, )][DBLP ] Decision Support System for Cephalometric Analyses of Orthodontics. [Citation Graph (, )][DBLP ] Using RFID to guard inpatient medication safety. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.307secs