The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fei-Yue Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. William Zhu, Fei-Yue Wang
    Binary Relation Based Rough Sets. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:276-285 [Conf]
  2. William Zhu, Fei-Yue Wang
    Properties of the First Type of Covering-Based Rough Sets. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:407-411 [Conf]
  3. Meimei Gao, Mengchu Zhou, Fei-Yue Wang
    Improvement of product sustainability. [Citation Graph (0, 0)][DBLP]
    ICRA, 2003, pp:3548-3553 [Conf]
  4. Paul J. A. Lever, Fei-Yue Wang, Deqian Chen
    A Fuzzy Control System for an Automated Mining Excavator. [Citation Graph (0, 0)][DBLP]
    ICRA, 1994, pp:3284-3289 [Conf]
  5. Fei-Yue Wang, Bing Pu
    Planning Time-Optimal Trajectory for Coordinated Robot Arms. [Citation Graph (0, 0)][DBLP]
    ICRA (1), 1993, pp:245-250 [Conf]
  6. Fei-Yue Wang, Jeffery L. Russell
    Minimum-Weight Robot Arm for a Specified Fundamental Frequency. [Citation Graph (0, 0)][DBLP]
    ICRA (3), 1993, pp:490-495 [Conf]
  7. Fei-Yue Wang, Jeffery L. Russell
    A New Approach to Optimum Flexible Link Design. [Citation Graph (0, 0)][DBLP]
    ICRA, 1995, pp:931-937 [Conf]
  8. Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang
    Application of Cooperative Co-evolution in Pedestrian Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:664-665 [Conf]
  9. D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang
    A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:758-759 [Conf]
  10. Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang
    A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:549-553 [Conf]
  11. Guanpi Lai, Fei-Yue Wang
    Toward an ITS Specific Knowledge Engine. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:625-626 [Conf]
  12. Hong Qiao, Fei-Yue Wang, Xianbin Cao
    Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:662-663 [Conf]
  13. Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang
    Some Marginal Learning Algorithms for Unsupervised Problems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:395-401 [Conf]
  14. Yan Wu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang
    Fast Pedestrian Detection Using Color Information. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:627-632 [Conf]
  15. William Zhu, Clark D. Thomborson, Fei-Yue Wang
    A Survey of Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:454-458 [Conf]
  16. William Zhu, Fei-Yue Wang
    Covering Based Granular Computing for Conflict Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:566-571 [Conf]
  17. Yiyu Yao, Fei-Yue Wang, Jue Wang
    "Rule + Exception" Strategies for Knowledge Management and Discovery. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:69-78 [Conf]
  18. William Zhu, Feiyue Wang
    Axiomatic Systems of Generalized Rough Sets. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:216-221 [Conf]
  19. Daniel Dajun Zeng, Fei-Yue Wang, Sudha Ram
    Storage allocation in web prefetching techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:264-265 [Conf]
  20. Fei-Yue Wang
    A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:183-184 [Conf]
  21. Jue Wang, Fei-Yue Wang, Daniel Dajun Zeng
    Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:181-182 [Conf]
  22. William Zhu, Clark D. Thomborson, Fei-Yue Wang
    Applications of Homomorphic Functions to Software Obfuscation. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:152-153 [Conf]
  23. Li Li, Fei-Yue Wang
    Approximate Vehicle Waiting Time Estimation Using Adaptive Video-Based Vehicle Tracking. [Citation Graph (0, 0)][DBLP]
    IWICPAS, 2006, pp:105-114 [Conf]
  24. Hsinchun Chen, Fei-Yue Wang
    Guest Editors' Introduction: Artificial Intelligence for Homeland Security. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:5, pp:12-16 [Journal]
  25. Li Li, Jingyan Song, Fei-Yue Wang, Wolfgang Niehsen, Nan-Ning Zheng
    IVS 05: New Developments and Research Trends for Intelligent Vehicles. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:4, pp:10-14 [Journal]
  26. Ruqian Lu, Daniel Dajun Zeng, Fei-Yue Wang
    AI Research in China: 50 Years down the Road. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2006, v:21, n:3, pp:91-93 [Journal]
  27. Pitu B. Mirchandani, Fei-Yue Wang
    RHODES to Intelligent Transportation Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:1, pp:10-15 [Journal]
  28. Shuming Tang, Fei-Yue Wang, Qinghai Miao
    ITSC 05: Current Issues and Research Trends. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2006, v:21, n:2, pp:96-102 [Journal]
  29. Fei-Yue Wang
    Agent-Based Control for Networked Traffic Management Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:5, pp:92-96 [Journal]
  30. Fei-Yue Wang
    Driving into the Future with ITS. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2006, v:21, n:3, pp:94-95 [Journal]
  31. Fei-Yue Wang, Shuming Tang
    Artificial Societies for Integrated and Sustainable Development of Metropolitan Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2004, v:19, n:4, pp:82-87 [Journal]
  32. Fei-Yue Wang, Shuming Tang, Yagang Sui, Xiaojing Wang
    Toward Intelligent Transportation Systems for the 2008 Olympics. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2003, v:18, n:6, pp:8-11 [Journal]
  33. Fei-Yue Wang, Xiaojing Wang, Li Li, Pitu B. Mirchandani
    Creating a Digital-Vehicle Proving Ground. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2003, v:18, n:2, pp:12-15 [Journal]
  34. Fei-Yue Wang, Zhixue Wang, Pitu B. Mirchandani
    The VISTA Project and Its Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2002, v:17, n:6, pp:72-75 [Journal]
  35. Yiyu Yao, Fei-Yue Wang, Jue Wang, Daniel Dajun Zeng
    Rule + Exception Strategies for Security Information Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:5, pp:52-57 [Journal]
  36. Nan-Ning Zheng, Shuming Tang, Hong Cheng, Qing Li, Guanpi Lai, Fei-Yue Wang
    Toward Intelligent Driver-Assistance and Safety Warning Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2004, v:19, n:2, pp:8-11 [Journal]
  37. Fei-Yue Wang
    On the Extremal Fundamental Frequencies of One-Link Flexible Manipulators. [Citation Graph (0, 0)][DBLP]
    I. J. Robotic Res., 1994, v:13, n:2, pp:162-170 [Journal]
  38. Fei-Yue Wang
    On the abstraction of conventional dynamic systems: from numerical analysis to linguistic analysis. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2005, v:171, n:1-3, pp:233-259 [Journal]
  39. William Zhu, Fei-Yue Wang
    Reduction and axiomization of covering generalized rough sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2003, v:152, n:, pp:217-230 [Journal]
  40. Ming-Kuan Liu, Fei-Yue Wang, Daniel Dajun Zeng
    Web Caching: A Way to Improve Web QoS. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:2, pp:113-127 [Journal]
  41. Fei-Yue Wang, Paul J. A. Lever
    A cell mapping method for general optimum trajectory planning of multiple robotic arms. [Citation Graph (0, 0)][DBLP]
    Robotics and Autonomous Systems, 1994, v:12, n:1-2, pp:15-27 [Journal]
  42. Fei-Yue Wang
    Agent-based control for fuzzy behavior programming in robotic excavation. [Citation Graph (0, 0)][DBLP]
    IEEE T. Fuzzy Systems, 2004, v:12, n:4, pp:540-548 [Journal]
  43. Fei-Yue Wang
    An efficient coordinate frame calibration method for 3-D measurement by multiple camera systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2005, v:35, n:4, pp:453-464 [Journal]
  44. Jin Xiao, Fei-Yue Wang, W. N. Chen
    Optimization of mass and rigidity distributions for flexible manipulators. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1999, pp:322-325 [Conf]
  45. Pixuan Zhou, Fei-Yue Wang, Paul J. A. Lever
    Concurrent optimization of structure and controller of flexible robotic arms. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1999, pp:326-329 [Conf]
  46. Wenji Mao, Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
    Social Modeling and Reasoning for Security Informatics. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:321-322 [Conf]
  47. C. X. Wei, X. B. Cao, Yan Wu Xu, Hong Qiao, Fei-Yue Wang
    The Treelike Assembly Classifier for Pedestrian Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:232-237 [Conf]
  48. Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang
    A Web Portal for Terrorism Activities in China. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:307-308 [Conf]
  49. William Zhu, Fei-Yue Wang
    On Three Types of Covering-Based Rough Sets. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:8, pp:1131-1144 [Journal]
  50. Fei-Yue Wang, Derong Liu, S. X. Yang, Li Li
    Guest Editorial: Networking, Sensing, and Control for Networked Control Systems: Architectures, Algorithms, and Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2007, v:37, n:2, pp:157-159 [Journal]

  51. Topological Properties in Covering-Based Rough Sets. [Citation Graph (, )][DBLP]


  52. Agent-Based Social Simulation and Modeling in Social Computing. [Citation Graph (, )][DBLP]


  53. Chinese Word Segmentation for Terrorism-Related Contents. [Citation Graph (, )][DBLP]


  54. Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations. [Citation Graph (, )][DBLP]


  55. Polarity Classification of Public Health Opinions in Chinese. [Citation Graph (, )][DBLP]


  56. Online Communities: A Social Computing Perspective. [Citation Graph (, )][DBLP]


  57. Automatic Recognition of News Web Pages. [Citation Graph (, )][DBLP]


  58. Social Computing: Fundamentals and applications. [Citation Graph (, )][DBLP]


  59. Linguistic Dynamic Systems for Computing with Words and Granular Computing. [Citation Graph (, )][DBLP]


  60. MODEL: moving object detection and localization in wireless networks based on small-scale fading. [Citation Graph (, )][DBLP]


  61. Design for recurrent fuzzy neural networks using MSC-MFS and PSO-MBP. [Citation Graph (, )][DBLP]


  62. The design of self-organizing fuzzy neural networks based on Ga-ecpso and MBP. [Citation Graph (, )][DBLP]


  63. Network-Based Analysis of Beijing SARS Data. [Citation Graph (, )][DBLP]


  64. Design for self-organizing fuzzy neural networks using a novel hybrid learning algorithm. [Citation Graph (, )][DBLP]


  65. A CAN and OSEK NM Based Siren for Automobiles. [Citation Graph (, )][DBLP]


  66. Signal Controller Design for Agent-Based Traffic Control System. [Citation Graph (, )][DBLP]


  67. Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators. [Citation Graph (, )][DBLP]


  68. A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge. [Citation Graph (, )][DBLP]


Search in 0.202secs, Finished in 0.204secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002