The SCEAS System
Navigation Menu

Search the dblp DataBase


Ning Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Ma, Xiaoqing Ding, Zhenger Wang, Ning Wang
    Robust Precise Eye Location Under Probabilistic Framework. [Citation Graph (0, 0)][DBLP]
    FGR, 2004, pp:339-344 [Conf]
  2. Xin Ye, Xingkai Yang, Liming Zhu, Ning Wang, Jiangnan Qiu
    Research of Government Horizon Business Integration Management System Based on HRNM and Agent. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:558-561 [Conf]
  3. Ning Wang, Liming Li, Shengju Han, Xin Ye, Jing Wang
    A System Structure Design of Government's Information Resource Integration Based on Agent. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:555-557 [Conf]
  4. Huaiming Li, Tian Ma, Ning Wang
    The Research of Network Administrative Permit Management System Based on Agent Technology. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:574-577 [Conf]
  5. Guo-wei Gao, Yan-zhang Wang, Ning Wang, Huaiming Li, Dujuan Wang
    An Intelligent and Cooperative Information System for the Dynamic Management of E-government Services in Inter-administration. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:570-573 [Conf]
  6. Liang Huang, Ning Wang
    An Optimization Algorithm Inspired by Membrane Computing. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:49-52 [Conf]
  7. Nengheng Zheng, Ning Wang, Tan Lee, P. C. Ching
    Speaker Verification Using Complementary Information from Vocal Source and Vocal Tract. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:518-528 [Conf]
  8. Nengheng Zheng, P. C. Ching, Ning Wang, Tan Lee
    Integrating Complementary Features with a Confidence Measure for Speaker Identification. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:549-557 [Conf]
  9. Lei Qu, Ning Wang, W. Lewis Johnson
    Choosing when to interact with learners. [Citation Graph (0, 0)][DBLP]
    Intelligent User Interfaces, 2004, pp:307-309 [Conf]
  10. Ning Wang, W. Lewis Johnson, Paola Rizzo, Erin Shaw, Richard E. Mayer
    Experimental evaluation of polite interaction tactics for pedagogical agents. [Citation Graph (0, 0)][DBLP]
    IUI, 2005, pp:12-19 [Conf]
  11. Ning Wang, Stacy Marsella
    Introducing EVG: An Emotion Evoking Game. [Citation Graph (0, 0)][DBLP]
    IVA, 2006, pp:282-291 [Conf]
  12. Ning Wang, George Pavlou
    Bandwidth Constrained IP Multicast Traffic Engineering Without MPLS Overlay. [Citation Graph (0, 0)][DBLP]
    MMNS, 2004, pp:140-151 [Conf]
  13. Kin-Hon Ho, Ning Wang, Panos Trimintzios, George Pavlou
    Multi-objective Egress Router Selection Policies for Inter-domain Traffic with Bandwidth Guarantees. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:271-283 [Conf]
  14. Ning Wang, Chor Ping Low
    On Finding Feasible Solutions to the Group Multicast Routing Problem. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:213-227 [Conf]
  15. Mairtin O'Droma, Ivan Ganchev, Ning Wang
    On Incoming Call Connection Service in a Ubiquitous Consumer Wireless World. [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2006, pp:287-297 [Conf]
  16. Ning Wang, George Pavlou
    Scalable IP Multicast Sender Access Control for Bi-directional Trees. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2001, pp:141-158 [Conf]
  17. Ning Wang, George Pavlou, Konstantina Papantoni
    Scalable Support for Source Specific Multicast in Differentiated Services Networks. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:234-241 [Conf]
  18. Xiaopeng Tao, Ning Wang, Shuigeng Zhou, Aoying Zhou, Yunfa Hu
    Mining Functional Dependency Rule of Relational Database. [Citation Graph (0, 0)][DBLP]
    PAKDD, 1999, pp:520-524 [Conf]
  19. Ning Wang, Jinmei Yu
    Neuron Based Nonlinear PID Control. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2006, pp:1089-1093 [Conf]
  20. Ning Wang, George Pavlou
    DQM : An Overlay Scheme for Quality of Service Differentiation in Source Specific Multicast. [Citation Graph (0, 0)][DBLP]
    QoS-IP, 2003, pp:306-319 [Conf]
  21. Lei Qu, Ning Wang, W. Lewis Johnson
    Using Learner Focus of Attention to Detect Learner Motivation Factors. [Citation Graph (0, 0)][DBLP]
    User Modeling, 2005, pp:70-73 [Conf]
  22. Paola Rizzo, Hyokyeong Lee, Erin Shaw, W. Lewis Johnson, Ning Wang, Richard E. Mayer
    A Semi-automated Wizard of Oz Interface for Modeling Tutorial Strategies. [Citation Graph (0, 0)][DBLP]
    User Modeling, 2005, pp:174-178 [Conf]
  23. Guangshun Yao, Xiujiang Lv, Ning Wang, Yan Zhao
    A Method of the Rule Acquisition Based on Rough Set. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2006, pp:243- [Conf]
  24. Ning Wang, George Pavlou
    Scalable sender access control for bi-directional multicast routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:5, pp:539-555 [Journal]
  25. Ning Wang, George Pavlou
    An overlay framework for provisioning differentiated services in Source Specific Multicast. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:44, n:4, pp:481-497 [Journal]
  26. Michael P. Howarth, Mohamed Boucadair, Paris Flegkas, Ning Wang, George Pavlou, Pierrick Morand, Thibaut Coadic, David Griffin, Abolghasem (Hamid) Asgari, Panos Georgatsos
    End-to-end quality of service provisioning through inter-provider traffic engineering. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:6, pp:683-702 [Journal]
  27. Chor Ping Low, Ning Wang
    An efficient algorithm for group multicast routing with bandwidth reservation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:18, pp:1740-1746 [Journal]
  28. Michael Franz, Deepak Chandra, Andreas Gal, Vivek Haldar, Christian W. Probst, Fermín Reig, Ning Wang
    A portable virtual machine target for proof-carrying code. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:57, n:3, pp:275-294 [Journal]
  29. Fang Chen, Eric H. C. Choi, Ning Wang
    Exploiting Speech-Gesture Correlation in Multimodal Interaction. [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:23-30 [Conf]
  30. Jonathan Gratch, Ning Wang, Anna Okhmatovskaia, Francois Lamothe, Mathieu Morales, Rick J. van der Werf, Louis-Philippe Morency
    Can Virtual Humans Be More Engaging Than Real Ones? [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:286-297 [Conf]
  31. Ning Wang, David Griffin, Jason Spencer, Jonas Griem, J. Rodriguez Sanchez, Mohamed Boucadair, E. Mykoniati, Bruno Quoitin, Michael P. Howarth, George Pavlou, A. J. Elizondo, M. L. Garcia Osma, Panos Georgatsos
    A Framework for Lightweight QoS Provisioning: Network Planes and Parallel Internets. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:797-800 [Conf]
  32. Jonathan Gratch, Ning Wang, Jillian Gerten, Edward Fast, Robin Duffy
    Creating Rapport with Virtual Agents. [Citation Graph (0, 0)][DBLP]
    IVA, 2007, pp:125-138 [Conf]
  33. Ning Wang, Wen-Xiu Zhang, Chang-Lin Mei
    Fuzzy nonparametric regression based on local linear smoothing technique. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:18, pp:3882-3900 [Journal]

  34. The Politeness Effect: Pedagogical Agents and Learning Gains. [Citation Graph (, )][DBLP]

  35. Can Virtual Human Build Rapport and Promote Learning? [Citation Graph (, )][DBLP]

  36. Does the contingency of agents' nonverbal feedback affect users' social anxiety? [Citation Graph (, )][DBLP]

  37. Individual differences in expressive response: a challenge for ECA design. [Citation Graph (, )][DBLP]

  38. Don't just stare at me! [Citation Graph (, )][DBLP]

  39. Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character Image. [Citation Graph (, )][DBLP]

  40. Applying Dynamic Labels of the Biba Model in Forensic Evidence Analysis. [Citation Graph (, )][DBLP]

  41. Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases. [Citation Graph (, )][DBLP]

  42. Knowledge Mass and Multiple Approximate Reasoning in Type I Topological Logic C1 T. [Citation Graph (, )][DBLP]

  43. A complete XML data dependency model. [Citation Graph (, )][DBLP]

  44. Study on the Authorization Management Model Based on Organization in E-government. [Citation Graph (, )][DBLP]

  45. Research on the Web Information System Development Platform Based on MVC Design Pattern. [Citation Graph (, )][DBLP]

  46. Research on Relation Models of Unexpected Events Oriented to Emergency Decision Support. [Citation Graph (, )][DBLP]

  47. Proposal to the Development of Emergency Logistics System. [Citation Graph (, )][DBLP]

  48. Study on the Government Affairs System Based on MetaData. [Citation Graph (, )][DBLP]

  49. ERPBAM: A Model for Structure and Reasoning of Agent Based on Entity-Relation-Problem Knowledge Representation System. [Citation Graph (, )][DBLP]

  50. An Adaptive Peer Selection Scheme with Dynamic Network Condition Awareness. [Citation Graph (, )][DBLP]

  51. The Prediction of Reverberation Signals Based on Dynamic Models. [Citation Graph (, )][DBLP]

  52. Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes. [Citation Graph (, )][DBLP]

  53. An Online Self-constructing Fuzzy Neural Network with Restrictive Growth. [Citation Graph (, )][DBLP]

  54. Multiple Description Multiwavelet Based Image Coding. [Citation Graph (, )][DBLP]

  55. The Politeness Effect in an Intelligent Foreign Language Tutoring System. [Citation Graph (, )][DBLP]

  56. Facial Expressions and Politeness Effect in Foreign Language Training System. [Citation Graph (, )][DBLP]

  57. Agreeable People Like Agreeable Virtual Humans. [Citation Graph (, )][DBLP]

  58. Resource Management and Signalling Architecture of a Hybrid Multicast Service for Multimedia Distribution. [Citation Graph (, )][DBLP]

  59. Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance. [Citation Graph (, )][DBLP]

  60. An Architecture for the Provision of Incoming Call Connection Service in UCWW. [Citation Graph (, )][DBLP]

  61. Fast Network Failure Recovery Using Multiple BGP Routing Planes. [Citation Graph (, )][DBLP]

  62. Exercise Rate Estimation using a Triaxial Accelerometer. [Citation Graph (, )][DBLP]

  63. Knowledge Mass and Automatic Reasoning System in Similarity Logic CQ. [Citation Graph (, )][DBLP]

  64. Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering. [Citation Graph (, )][DBLP]

  65. Making IP traffic engineering robust to intra- and inter-AS transient link failures. [Citation Graph (, )][DBLP]

  66. A dynamic Peer-to-Peer traffic limiting policy for ISP networks. [Citation Graph (, )][DBLP]

  67. Seal Identification Based on Pixel Distribution Probability with Three-Mode and Nine-Section. [Citation Graph (, )][DBLP]

  68. A High Performance SOAP Engine for Grid Computing. [Citation Graph (, )][DBLP]

  69. Joint Channel-Network Coding (JCNC) for Distributed Storage in Wireless Network. [Citation Graph (, )][DBLP]

  70. A fast and parsimonious fuzzy neural network (FPFNN) for function approximation. [Citation Graph (, )][DBLP]

  71. Stability of switched linear systems and the convergence of random products. [Citation Graph (, )][DBLP]

  72. A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud. [Citation Graph (, )][DBLP]

  73. An Efficient Method for Battlefield Information Data Stream Mining. [Citation Graph (, )][DBLP]

  74. Accelerometry based classification of gait patterns using empirical mode decomposition. [Citation Graph (, )][DBLP]

  75. Printing Press Fuzzy Identification Based on Pixel Distribution Probability of Character Image. [Citation Graph (, )][DBLP]

  76. The AGAVE approach for network virtualization: differentiated services delivery. [Citation Graph (, )][DBLP]

  77. Optimize tool paths of flank milling with generic cutters based on approximation using the tool envelope surface. [Citation Graph (, )][DBLP]

  78. Analytical calculation of the envelope surface for generic milling tools directly from CL-data based on the moving frame method. [Citation Graph (, )][DBLP]

  79. Inter-autonomous system provisioning for end-to-end bandwidth guarantees. [Citation Graph (, )][DBLP]

  80. An overview of routing optimization for internet traffic engineering. [Citation Graph (, )][DBLP]

Search in 0.009secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002