|
Search the dblp DataBase
Kun Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alexander Egyed, Wuwei Shen, Kun Wang
Maintaining Life Perspectives During the Refinement of UML Class Structures. [Citation Graph (0, 0)][DBLP] FASE, 2005, pp:310-325 [Conf]
- Jessica Chen, Kun Wang
Experiment on Embedding Interception Service into Java RMI. [Citation Graph (0, 0)][DBLP] FIDJI, 2003, pp:48-61 [Conf]
- Kun Wang, Zhenguo Ding, Lihua Zhou
Efficient Access Control in Wireless Network. [Citation Graph (0, 0)][DBLP] IAT Workshops, 2006, pp:85-88 [Conf]
- Huaxi Gu, Qiming Xie, Kun Wang, Jie Zhang, Yunsong Li
X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection Width. [Citation Graph (0, 0)][DBLP] ICCSA (5), 2006, pp:149-157 [Conf]
- Kun Wang, Yin-long Xu, Guo-Liang Chen, Ya-feng Wu
Power-Aware On-Demand Routing Protocol for MANET. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2004, pp:723-728 [Conf]
- Kun Wang
Adaptive stereo matching algorithm based on edge detection. [Citation Graph (0, 0)][DBLP] ICIP, 2004, pp:1345-1348 [Conf]
- Kun Wang, Nanning Zheng, Weixiang Liu
Natural image matting with non-negative matrix factorization. [Citation Graph (0, 0)][DBLP] ICIP (2), 2005, pp:1186-1189 [Conf]
- Huaxi Gu, Zhiliang Qiu, Zengji Liu, Guochang Kang, Kun Wang, Feng Hong
Choice of Inner Switching Mechanisms in Terabit Router. [Citation Graph (0, 0)][DBLP] ICN (1), 2005, pp:826-833 [Conf]
- Kun Wang, Nanning Zheng
Realistic Face Modeling With Robust Correspondence. [Citation Graph (0, 0)][DBLP] IV, 2004, pp:997-1002 [Conf]
- Kun Wang, Tianzi Jiang, Meng Liang, Liang Wang, Lixia Tian, Xinqing Zhang, Kuncheng Li, Zhening Liu
Discriminative Analysis of Early Alzheimer's Disease Based on Two Intrinsically Anti-correlated Networks with Resting-State fMRI. [Citation Graph (0, 0)][DBLP] MICCAI (2), 2006, pp:340-347 [Conf]
- Zhonghai Yin, Kun Wang, Jianfeng Jian, Lihua Zhou
Improvements of the definition of image fidelity. [Citation Graph (0, 0)][DBLP] MMM, 2006, pp:- [Conf]
- Kun Wang, Lihua Zhou, Zhen Cai, Zengxin Li
A Disaster Recovery System Model in an E-government System. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:247-250 [Conf]
- Jessica Chen, Kun Wang
Constructing a Reproducible Testing Environment for Distributed Java Applications. [Citation Graph (0, 0)][DBLP] QSIC, 2003, pp:402-409 [Conf]
- Kun Wang, Ruidan Su, Zengxin Li, Zhen Cai, Lihua Zhou
Study of Secure Complicated Information System Architecture Model. [Citation Graph (0, 0)][DBLP] SKG, 2005, pp:101- [Conf]
- Kun Wang, Zhonghai Yin, Feng Yuan, Lihua Zhou
A Mathematical Approach to Disaster Recovery Planning. [Citation Graph (0, 0)][DBLP] SKG, 2005, pp:46- [Conf]
- Kun Wang, Marta Murcia, Pere Constans, Carlos Pérez, Angel R. Ortiz
Gaussian mapping of chemical fragments in ligand binding sites. [Citation Graph (0, 0)][DBLP] Journal of Computer-Aided Molecular Design, 2004, v:18, n:2, pp:101-118 [Journal]
- Huaxi Gu, Jie Zhang, Kun Wang, Changshan Wang
rHALB: A New Load-Balanced Routing Algorithm for k-ary n-cube Networks. [Citation Graph (0, 0)][DBLP] APPT, 2007, pp:392-401 [Conf]
- Kun Wang, Wuwei Shen
Improving the Accuracy of UML Class Model Recovery. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2007, pp:387-390 [Conf]
- Wang Kun, Xie Yuejian, Li Sanli
Performance Analysis and Comparison for Two WS-Resource Framework Implementations. [Citation Graph (0, 0)][DBLP] GCC, 2007, pp:437-443 [Conf]
- N. Rahman, A. Parayandeh, Kun Wang, A. Prodic
Multimode digital SMPS controller IC for low-power management. [Citation Graph (0, 0)][DBLP] ISCAS, 2006, pp:- [Conf]
- Kun Wang, Liqun Gao, Zhaoyu Pian, Li Guo, Jianhua Wu
Edge Detection Combined Entropy Threshold and Self-Organizing Map (SOM). [Citation Graph (0, 0)][DBLP] ISNN (2), 2007, pp:931-937 [Conf]
- Zhaoyu Pian, Liqun Gao, Kun Wang, Li Guo, Jianhua Wu
Edge Enhancement Post-processing Using Hopfield Neural Net. [Citation Graph (0, 0)][DBLP] ISNN (3), 2007, pp:846-852 [Conf]
An incentive mechanism for charging scheme in heterogeneous collaborative networks. [Citation Graph (, )][DBLP]
An Incentive-Based Secure Charging Scheme for Integrating Networks. [Citation Graph (, )][DBLP]
Adaptive Load Management over Real-Time Data Streams. [Citation Graph (, )][DBLP]
Computing Minimal Diagnosis with Binary Decision Diagrams Algorithm. [Citation Graph (, )][DBLP]
Fast Access Control Algorithm in Wireless Network. [Citation Graph (, )][DBLP]
A Service-Based Framework for Pharmacogenomics Data Integration. [Citation Graph (, )][DBLP]
Internal force compensating method for wall-climbing caterpillar robot. [Citation Graph (, )][DBLP]
Optimal Search on Water Pollution Accident Source in Discrete Spaces. [Citation Graph (, )][DBLP]
A Novel Location-Aided Routing Algorithm for MANETs. [Citation Graph (, )][DBLP]
Performance Analysis of the OGSA-DAI 3.0 Software. [Citation Graph (, )][DBLP]
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Trust Approach for Node Cooperation in MANET. [Citation Graph (, )][DBLP]
A New Inner Congestion Control Mechanism in Terabit Routers. [Citation Graph (, )][DBLP]
PSH: A Private and Shared History-Based Incentive Mechanism. [Citation Graph (, )][DBLP]
A Parallel Biomedical Data Transportation Component and its Application. [Citation Graph (, )][DBLP]
An Improved Median Filtering System and Its Application of Calcified Lesions' Detection in Digital Mammograms. [Citation Graph (, )][DBLP]
A trust-incentive-based combinatorial double auction algorithm. [Citation Graph (, )][DBLP]
Efficient Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
An Empirical Analysis of EZhou's Spatial Expansion Using Genealogy of Orientation Based on GIS. [Citation Graph (, )][DBLP]
A New Training Algorithm for RBF Neural Network Based on PSO and Simulation Study. [Citation Graph (, )][DBLP]
Classification of DNA Sequences Basing on the Dinucleotide Compositions. [Citation Graph (, )][DBLP]
Prediction of the Coal and Gas Outburst by Neural Network. [Citation Graph (, )][DBLP]
Principle and Application of Vibrating Suction Method. [Citation Graph (, )][DBLP]
Fairness Control Algorithm Based on IEEE 1588. [Citation Graph (, )][DBLP]
An Intelligent Security Defensive Software Scheme and Realization. [Citation Graph (, )][DBLP]
Identity-Based Threshold Key Management for Ad Hoc Networks. [Citation Graph (, )][DBLP]
Evaluation of the attractiveness of tourism destinations based on link analysis. [Citation Graph (, )][DBLP]
SIISAM: A Model for Secure Inhomogeneous Information Systems. [Citation Graph (, )][DBLP]
Compiler and runtime techniques for software transactional memory optimization. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|