The SCEAS System
Navigation Menu

Search the dblp DataBase


Shan Lu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazuyuki Imagawa, Shan Lu, Seiji Igi
    Real-Time Tracking of Human Hands from a Sign-Language Image Sequence. [Citation Graph (0, 0)][DBLP]
    ACCV (1), 1998, pp:698-705 [Conf]
  2. Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, ChengXiang Zhai
    Have things changed now?: an empirical study of bug characteristics in modern open source software. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:25-33 [Conf]
  3. Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
    AVIO: detecting atomicity violations via access interleaving invariants. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:37-48 [Conf]
  4. Shan Lu, Dimitris N. Metaxas, Dimitris Samaras, John Oliensis
    Using Multiple Cues for Hand Tracking and Model Refinement. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2003, pp:443-450 [Conf]
  5. Kazuyuki Imagawa, Shan Lu, Seiji Igi
    Color-Based Hands Tracking System for Sign Language Recognition. [Citation Graph (0, 0)][DBLP]
    FG, 1998, pp:462-467 [Conf]
  6. Shan Lu, Seiji Igi
    Active Character: Dynamic Reaction to the User. [Citation Graph (0, 0)][DBLP]
    Gesture Workshop, 1999, pp:253-264 [Conf]
  7. Shan Lu, Seiji Igi, Hideaki Matsuo, Yuji Nagashima
    Towards a Dialogue System Based on Recognition and Synthesis of Japanese Sign Language. [Citation Graph (0, 0)][DBLP]
    Gesture Workshop, 1997, pp:259-271 [Conf]
  8. Hideaki Matsuo, Seiji Igi, Shan Lu, Yuji Nagashima, Yuji Takata, Terutaka Teshima
    The Recognition Algorithm with Non-contact for Japanese Sign Language Using Morphological Analysis. [Citation Graph (0, 0)][DBLP]
    Gesture Workshop, 1997, pp:273-284 [Conf]
  9. Shan Lu, Kazuyuki Imagawa, Seiji Igi
    An Active Gazing-Line System for Improving Sign-Language Conversation. [Citation Graph (0, 0)][DBLP]
    HCI (2), 1997, pp:283-286 [Conf]
  10. Shan Lu, Hiroyuki Sakato, Tsuyoshi Uezono, Seiji Igi
    A New Method to Synthesize Japanese Sign Language Based on Intuitive Motion Primitives. [Citation Graph (0, 0)][DBLP]
    HCI (1), 1999, pp:441-445 [Conf]
  11. Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker, Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger
    An Approach for Intent Identification by Building on Deception Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  12. Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse
    Blob Analysis of the Head and Hands: A Method for Deception Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  13. Feng Qin, Shan Lu, Yuanyuan Zhou
    SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. [Citation Graph (0, 0)][DBLP]
    HPCA, 2005, pp:291-302 [Conf]
  14. Kazuyuki Imagawa, Hideaki Matsuo, Rin-ichiro Taniguchi, Daisaku Arita, Shan Lu, Seiji Igi
    Recognition of Local Features for Camera-Based Sign Language Recognition System. [Citation Graph (0, 0)][DBLP]
    ICPR, 2000, pp:4849-4853 [Conf]
  15. Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas
    AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. [Citation Graph (0, 0)][DBLP]
    MICRO, 2004, pp:269-280 [Conf]
  16. Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas
    PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. [Citation Graph (0, 0)][DBLP]
    MICRO, 2006, pp:38-52 [Conf]
  17. Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
    CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:289-302 [Conf]
  18. Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev
    Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:117-130 [Conf]
  19. Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee
    Analyzing persistent state interactions to improve state management. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:363-364 [Conf]
  20. Zhaohui Zhu, Rong Zhang, Shan Lu
    A characterization theorem for injective model classes axiomatized by general rules. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:360, n:1-3, pp:147-171 [Journal]
  21. Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
    CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:3, pp:176-192 [Journal]
  22. Shan Lu, Weihang Jiang, Yuanyuan Zhou
    A study of interleaving coverage criteria. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:533-536 [Conf]
  23. Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou
    MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:103-116 [Conf]
  24. Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou
    Triage: diagnosing production run failures at the user's site. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:131-144 [Conf]
  25. Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
    Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:115-128 [Conf]
  26. Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
    AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2007, v:27, n:1, pp:26-35 [Journal]

  27. Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. [Citation Graph (, )][DBLP]

  28. CTrigger: exposing atomicity violation bugs from their hiding places. [Citation Graph (, )][DBLP]

  29. ConMem: detecting severe concurrency bugs through an effect-oriented approach. [Citation Graph (, )][DBLP]

  30. A Dynamic Programming Approach to the Study of Protein Sequence Variations. [Citation Graph (, )][DBLP]

  31. Leveraging parallelism for multi-dimensional packetclassification on software routers. [Citation Graph (, )][DBLP]

  32. A study of interleaving coverage criteria. [Citation Graph (, )][DBLP]

  33. PRES: probabilistic replay with execution sketching on multiprocessors. [Citation Graph (, )][DBLP]

  34. A Orthogonal Superimposed Pilot for Channel Estimation in MIMO-OFDM systems. [Citation Graph (, )][DBLP]

  35. A Revenue-Based Low-Delay and Efficient Downlink Scheduling Algorithm in OFDMA Systems. [Citation Graph (, )][DBLP]

  36. Reduced Feedback Schemes for LTE MBMS. [Citation Graph (, )][DBLP]

  37. Channel-Aware Frequency Domain Packet Scheduling for MBMS in LTE. [Citation Graph (, )][DBLP]

  38. Automatic Flow Distribution and Management in Heterogeneous Networks. [Citation Graph (, )][DBLP]

  39. Joint Power and Rate Control in Ad Hoc Networks Using a Supermodular Game Approach. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002