The SCEAS System
Navigation Menu

Search the dblp DataBase


Kun Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alexander Egyed, Wuwei Shen, Kun Wang
    Maintaining Life Perspectives During the Refinement of UML Class Structures. [Citation Graph (0, 0)][DBLP]
    FASE, 2005, pp:310-325 [Conf]
  2. Jessica Chen, Kun Wang
    Experiment on Embedding Interception Service into Java RMI. [Citation Graph (0, 0)][DBLP]
    FIDJI, 2003, pp:48-61 [Conf]
  3. Kun Wang, Zhenguo Ding, Lihua Zhou
    Efficient Access Control in Wireless Network. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:85-88 [Conf]
  4. Huaxi Gu, Qiming Xie, Kun Wang, Jie Zhang, Yunsong Li
    X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection Width. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:149-157 [Conf]
  5. Kun Wang, Yin-long Xu, Guo-Liang Chen, Ya-feng Wu
    Power-Aware On-Demand Routing Protocol for MANET. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:723-728 [Conf]
  6. Kun Wang
    Adaptive stereo matching algorithm based on edge detection. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:1345-1348 [Conf]
  7. Kun Wang, Nanning Zheng, Weixiang Liu
    Natural image matting with non-negative matrix factorization. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:1186-1189 [Conf]
  8. Huaxi Gu, Zhiliang Qiu, Zengji Liu, Guochang Kang, Kun Wang, Feng Hong
    Choice of Inner Switching Mechanisms in Terabit Router. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:826-833 [Conf]
  9. Kun Wang, Nanning Zheng
    Realistic Face Modeling With Robust Correspondence. [Citation Graph (0, 0)][DBLP]
    IV, 2004, pp:997-1002 [Conf]
  10. Kun Wang, Tianzi Jiang, Meng Liang, Liang Wang, Lixia Tian, Xinqing Zhang, Kuncheng Li, Zhening Liu
    Discriminative Analysis of Early Alzheimer's Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI. [Citation Graph (0, 0)][DBLP]
    MICCAI (2), 2006, pp:340-347 [Conf]
  11. Zhonghai Yin, Kun Wang, Jianfeng Jian, Lihua Zhou
    Improvements of the definition of image fidelity. [Citation Graph (0, 0)][DBLP]
    MMM, 2006, pp:- [Conf]
  12. Kun Wang, Lihua Zhou, Zhen Cai, Zengxin Li
    A Disaster Recovery System Model in an E-government System. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:247-250 [Conf]
  13. Jessica Chen, Kun Wang
    Constructing a Reproducible Testing Environment for Distributed Java Applications. [Citation Graph (0, 0)][DBLP]
    QSIC, 2003, pp:402-409 [Conf]
  14. Kun Wang, Ruidan Su, Zengxin Li, Zhen Cai, Lihua Zhou
    Study of Secure Complicated Information System Architecture Model. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:101- [Conf]
  15. Kun Wang, Zhonghai Yin, Feng Yuan, Lihua Zhou
    A Mathematical Approach to Disaster Recovery Planning. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:46- [Conf]
  16. Kun Wang, Marta Murcia, Pere Constans, Carlos Pérez, Angel R. Ortiz
    Gaussian mapping of chemical fragments in ligand binding sites. [Citation Graph (0, 0)][DBLP]
    Journal of Computer-Aided Molecular Design, 2004, v:18, n:2, pp:101-118 [Journal]
  17. Huaxi Gu, Jie Zhang, Kun Wang, Changshan Wang
    rHALB: A New Load-Balanced Routing Algorithm for k-ary n-cube Networks. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:392-401 [Conf]
  18. Kun Wang, Wuwei Shen
    Improving the Accuracy of UML Class Model Recovery. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:387-390 [Conf]
  19. Wang Kun, Xie Yuejian, Li Sanli
    Performance Analysis and Comparison for Two WS-Resource Framework Implementations. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:437-443 [Conf]
  20. N. Rahman, A. Parayandeh, Kun Wang, A. Prodic
    Multimode digital SMPS controller IC for low-power management. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  21. Kun Wang, Liqun Gao, Zhaoyu Pian, Li Guo, Jianhua Wu
    Edge Detection Combined Entropy Threshold and Self-Organizing Map (SOM). [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:931-937 [Conf]
  22. Zhaoyu Pian, Liqun Gao, Kun Wang, Li Guo, Jianhua Wu
    Edge Enhancement Post-processing Using Hopfield Neural Net. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:846-852 [Conf]

  23. An incentive mechanism for charging scheme in heterogeneous collaborative networks. [Citation Graph (, )][DBLP]

  24. An Incentive-Based Secure Charging Scheme for Integrating Networks. [Citation Graph (, )][DBLP]

  25. Adaptive Load Management over Real-Time Data Streams. [Citation Graph (, )][DBLP]

  26. Computing Minimal Diagnosis with Binary Decision Diagrams Algorithm. [Citation Graph (, )][DBLP]

  27. Fast Access Control Algorithm in Wireless Network. [Citation Graph (, )][DBLP]

  28. A Service-Based Framework for Pharmacogenomics Data Integration. [Citation Graph (, )][DBLP]

  29. Internal force compensating method for wall-climbing caterpillar robot. [Citation Graph (, )][DBLP]

  30. Optimal Search on Water Pollution Accident Source in Discrete Spaces. [Citation Graph (, )][DBLP]

  31. A Novel Location-Aided Routing Algorithm for MANETs. [Citation Graph (, )][DBLP]

  32. Performance Analysis of the OGSA-DAI 3.0 Software. [Citation Graph (, )][DBLP]

  33. A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  34. A Trust Approach for Node Cooperation in MANET. [Citation Graph (, )][DBLP]

  35. A New Inner Congestion Control Mechanism in Terabit Routers. [Citation Graph (, )][DBLP]

  36. PSH: A Private and Shared History-Based Incentive Mechanism. [Citation Graph (, )][DBLP]

  37. A Parallel Biomedical Data Transportation Component and its Application. [Citation Graph (, )][DBLP]

  38. An Improved Median Filtering System and Its Application of Calcified Lesions' Detection in Digital Mammograms. [Citation Graph (, )][DBLP]

  39. A trust-incentive-based combinatorial double auction algorithm. [Citation Graph (, )][DBLP]

  40. Efficient Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  41. An Empirical Analysis of EZhou's Spatial Expansion Using Genealogy of Orientation Based on GIS. [Citation Graph (, )][DBLP]

  42. A New Training Algorithm for RBF Neural Network Based on PSO and Simulation Study. [Citation Graph (, )][DBLP]

  43. Classification of DNA Sequences Basing on the Dinucleotide Compositions. [Citation Graph (, )][DBLP]

  44. Prediction of the Coal and Gas Outburst by Neural Network. [Citation Graph (, )][DBLP]

  45. Principle and Application of Vibrating Suction Method. [Citation Graph (, )][DBLP]

  46. Fairness Control Algorithm Based on IEEE 1588. [Citation Graph (, )][DBLP]

  47. An Intelligent Security Defensive Software Scheme and Realization. [Citation Graph (, )][DBLP]

  48. Identity-Based Threshold Key Management for Ad Hoc Networks. [Citation Graph (, )][DBLP]

  49. Evaluation of the attractiveness of tourism destinations based on link analysis. [Citation Graph (, )][DBLP]

  50. SIISAM: A Model for Secure Inhomogeneous Information Systems. [Citation Graph (, )][DBLP]

  51. Compiler and runtime techniques for software transactional memory optimization. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002