Search the dblp DataBase
Fei-Yue Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
William Zhu , Fei-Yue Wang Binary Relation Based Rough Sets. [Citation Graph (0, 0)][DBLP ] FSKD, 2006, pp:276-285 [Conf ] William Zhu , Fei-Yue Wang Properties of the First Type of Covering-Based Rough Sets. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:407-411 [Conf ] Meimei Gao , Mengchu Zhou , Fei-Yue Wang Improvement of product sustainability. [Citation Graph (0, 0)][DBLP ] ICRA, 2003, pp:3548-3553 [Conf ] Paul J. A. Lever , Fei-Yue Wang , Deqian Chen A Fuzzy Control System for an Automated Mining Excavator. [Citation Graph (0, 0)][DBLP ] ICRA, 1994, pp:3284-3289 [Conf ] Fei-Yue Wang , Bing Pu Planning Time-Optimal Trajectory for Coordinated Robot Arms. [Citation Graph (0, 0)][DBLP ] ICRA (1), 1993, pp:245-250 [Conf ] Fei-Yue Wang , Jeffery L. Russell Minimum-Weight Robot Arm for a Specified Fundamental Frequency. [Citation Graph (0, 0)][DBLP ] ICRA (3), 1993, pp:490-495 [Conf ] Fei-Yue Wang , Jeffery L. Russell A New Approach to Optimum Flexible Link Design. [Citation Graph (0, 0)][DBLP ] ICRA, 1995, pp:931-937 [Conf ] Xianbin Cao , Hong Qiao , Fei-Yue Wang , Xinzheng Zhang Application of Cooperative Co-evolution in Pedestrian Detection Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:664-665 [Conf ] D. Chen , Xianbin Cao , Hong Qiao , Fei-Yue Wang A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:758-759 [Conf ] Xinjian Chen , Jie Tian , Qi Su , Xin Yang , Fei-Yue Wang A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:549-553 [Conf ] Guanpi Lai , Fei-Yue Wang Toward an ITS Specific Knowledge Engine. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:625-626 [Conf ] Hong Qiao , Fei-Yue Wang , Xianbin Cao Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:662-663 [Conf ] Qing Tao , Gao-wei Wu , Fei-Yue Wang , Jue Wang Some Marginal Learning Algorithms for Unsupervised Problems. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:395-401 [Conf ] Yan Wu Xu , Xianbin Cao , Hong Qiao , Fei-Yue Wang Fast Pedestrian Detection Using Color Information. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:627-632 [Conf ] William Zhu , Clark D. Thomborson , Fei-Yue Wang A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:454-458 [Conf ] William Zhu , Fei-Yue Wang Covering Based Granular Computing for Conflict Analysis. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:566-571 [Conf ] Yiyu Yao , Fei-Yue Wang , Jue Wang "Rule + Exception" Strategies for Knowledge Management and Discovery. [Citation Graph (0, 0)][DBLP ] RSFDGrC (2), 2005, pp:69-78 [Conf ] William Zhu , Feiyue Wang Axiomatic Systems of Generalized Rough Sets. [Citation Graph (0, 0)][DBLP ] RSKT, 2006, pp:216-221 [Conf ] Daniel Dajun Zeng , Fei-Yue Wang , Sudha Ram Storage allocation in web prefetching techniques. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2003, pp:264-265 [Conf ] Fei-Yue Wang A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. [Citation Graph (0, 0)][DBLP ] WISI, 2006, pp:183-184 [Conf ] Jue Wang , Fei-Yue Wang , Daniel Dajun Zeng Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. [Citation Graph (0, 0)][DBLP ] WISI, 2006, pp:181-182 [Conf ] William Zhu , Clark D. Thomborson , Fei-Yue Wang Applications of Homomorphic Functions to Software Obfuscation. [Citation Graph (0, 0)][DBLP ] WISI, 2006, pp:152-153 [Conf ] Li Li , Fei-Yue Wang Approximate Vehicle Waiting Time Estimation Using Adaptive Video-Based Vehicle Tracking. [Citation Graph (0, 0)][DBLP ] IWICPAS, 2006, pp:105-114 [Conf ] Hsinchun Chen , Fei-Yue Wang Guest Editors' Introduction: Artificial Intelligence for Homeland Security. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2005, v:20, n:5, pp:12-16 [Journal ] Li Li , Jingyan Song , Fei-Yue Wang , Wolfgang Niehsen , Nan-Ning Zheng IVS 05: New Developments and Research Trends for Intelligent Vehicles. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2005, v:20, n:4, pp:10-14 [Journal ] Ruqian Lu , Daniel Dajun Zeng , Fei-Yue Wang AI Research in China: 50 Years down the Road. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2006, v:21, n:3, pp:91-93 [Journal ] Pitu B. Mirchandani , Fei-Yue Wang RHODES to Intelligent Transportation Systems. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2005, v:20, n:1, pp:10-15 [Journal ] Shuming Tang , Fei-Yue Wang , Qinghai Miao ITSC 05: Current Issues and Research Trends. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2006, v:21, n:2, pp:96-102 [Journal ] Fei-Yue Wang Agent-Based Control for Networked Traffic Management Systems. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2005, v:20, n:5, pp:92-96 [Journal ] Fei-Yue Wang Driving into the Future with ITS. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2006, v:21, n:3, pp:94-95 [Journal ] Fei-Yue Wang , Shuming Tang Artificial Societies for Integrated and Sustainable Development of Metropolitan Systems. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2004, v:19, n:4, pp:82-87 [Journal ] Fei-Yue Wang , Shuming Tang , Yagang Sui , Xiaojing Wang Toward Intelligent Transportation Systems for the 2008 Olympics. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2003, v:18, n:6, pp:8-11 [Journal ] Fei-Yue Wang , Xiaojing Wang , Li Li , Pitu B. Mirchandani Creating a Digital-Vehicle Proving Ground. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2003, v:18, n:2, pp:12-15 [Journal ] Fei-Yue Wang , Zhixue Wang , Pitu B. Mirchandani The VISTA Project and Its Applications. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2002, v:17, n:6, pp:72-75 [Journal ] Yiyu Yao , Fei-Yue Wang , Jue Wang , Daniel Dajun Zeng Rule + Exception Strategies for Security Information Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2005, v:20, n:5, pp:52-57 [Journal ] Nan-Ning Zheng , Shuming Tang , Hong Cheng , Qing Li , Guanpi Lai , Fei-Yue Wang Toward Intelligent Driver-Assistance and Safety Warning Systems. [Citation Graph (0, 0)][DBLP ] IEEE Intelligent Systems, 2004, v:19, n:2, pp:8-11 [Journal ] Fei-Yue Wang On the Extremal Fundamental Frequencies of One-Link Flexible Manipulators. [Citation Graph (0, 0)][DBLP ] I. J. Robotic Res., 1994, v:13, n:2, pp:162-170 [Journal ] Fei-Yue Wang On the abstraction of conventional dynamic systems: from numerical analysis to linguistic analysis. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2005, v:171, n:1-3, pp:233-259 [Journal ] William Zhu , Fei-Yue Wang Reduction and axiomization of covering generalized rough sets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2003, v:152, n:, pp:217-230 [Journal ] Ming-Kuan Liu , Fei-Yue Wang , Daniel Dajun Zeng Web Caching: A Way to Improve Web QoS. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:2, pp:113-127 [Journal ] Fei-Yue Wang , Paul J. A. Lever A cell mapping method for general optimum trajectory planning of multiple robotic arms. [Citation Graph (0, 0)][DBLP ] Robotics and Autonomous Systems, 1994, v:12, n:1-2, pp:15-27 [Journal ] Fei-Yue Wang Agent-based control for fuzzy behavior programming in robotic excavation. [Citation Graph (0, 0)][DBLP ] IEEE T. Fuzzy Systems, 2004, v:12, n:4, pp:540-548 [Journal ] Fei-Yue Wang An efficient coordinate frame calibration method for 3-D measurement by multiple camera systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2005, v:35, n:4, pp:453-464 [Journal ] Jin Xiao , Fei-Yue Wang , W. N. Chen Optimization of mass and rigidity distributions for flexible manipulators. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 1999, pp:322-325 [Conf ] Pixuan Zhou , Fei-Yue Wang , Paul J. A. Lever Concurrent optimization of structure and controller of flexible robotic arms. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 1999, pp:326-329 [Conf ] Wenji Mao , Daniel Zeng , Li Zhang , Donghua Wei , Fei-Yue Wang Social Modeling and Reasoning for Security Informatics. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:321-322 [Conf ] C. X. Wei , X. B. Cao , Yan Wu Xu , Hong Qiao , Fei-Yue Wang The Treelike Assembly Classifier for Pedestrian Detection. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:232-237 [Conf ] Daniel Dajun Zeng , Li Zhang , Donghua Wei , Fei-Yue Wang A Web Portal for Terrorism Activities in China. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:307-308 [Conf ] William Zhu , Fei-Yue Wang On Three Types of Covering-Based Rough Sets. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:8, pp:1131-1144 [Journal ] Fei-Yue Wang , Derong Liu , S. X. Yang , Li Li Guest Editorial: Networking, Sensing, and Control for Networked Control Systems: Architectures, Algorithms, and Applications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2007, v:37, n:2, pp:157-159 [Journal ] Topological Properties in Covering-Based Rough Sets. [Citation Graph (, )][DBLP ] Agent-Based Social Simulation and Modeling in Social Computing. [Citation Graph (, )][DBLP ] Chinese Word Segmentation for Terrorism-Related Contents. [Citation Graph (, )][DBLP ] Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations. [Citation Graph (, )][DBLP ] Polarity Classification of Public Health Opinions in Chinese. [Citation Graph (, )][DBLP ] Online Communities: A Social Computing Perspective. [Citation Graph (, )][DBLP ] Automatic Recognition of News Web Pages. [Citation Graph (, )][DBLP ] Social Computing: Fundamentals and applications. [Citation Graph (, )][DBLP ] Linguistic Dynamic Systems for Computing with Words and Granular Computing. [Citation Graph (, )][DBLP ] MODEL: moving object detection and localization in wireless networks based on small-scale fading. [Citation Graph (, )][DBLP ] Design for recurrent fuzzy neural networks using MSC-MFS and PSO-MBP. [Citation Graph (, )][DBLP ] The design of self-organizing fuzzy neural networks based on Ga-ecpso and MBP. [Citation Graph (, )][DBLP ] Network-Based Analysis of Beijing SARS Data. [Citation Graph (, )][DBLP ] Design for self-organizing fuzzy neural networks using a novel hybrid learning algorithm. [Citation Graph (, )][DBLP ] A CAN and OSEK NM Based Siren for Automobiles. [Citation Graph (, )][DBLP ] Signal Controller Design for Agent-Based Traffic Control System. [Citation Graph (, )][DBLP ] Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators. [Citation Graph (, )][DBLP ] A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge. [Citation Graph (, )][DBLP ] Search in 0.019secs, Finished in 0.022secs