Search the dblp DataBase
Tong Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ming Li , Bao-wei Zhang , Tong Wang , Li Zhao Approximation of Class Unions Based on Dominance-Matrix Within Dominance-Based Rough Set Approach. [Citation Graph (0, 0)][DBLP ] ACII, 2005, pp:795-802 [Conf ] Michael A. Bauer , Tong Wang Strategies for Distributed Search. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1992, pp:251-260 [Conf ] Tong Wang , Da-xin Liu , Xuan-Zuo Lin Query Optimization Method Based on Automaton for Content-based Filtering. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:724-728 [Conf ] Wei Sun , Da-xin Liu , Tong Wang A Model of XML Access Control with Dual-Level Security Views. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:799-802 [Conf ] Tong Wang , Da-xin Liu , Wei Sun , Wan-Song Zhang An Effective XML Filtering Method for High-Performance Publish/Subscribe System. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:889-896 [Conf ] Junliang Wang , Tong Wang , Jiyong Zhang , Hao Tan , Liupeng He , Ji Cheng Study on the Construction and Application of 3D Visualization Platform for the Yellow River Basin. [Citation Graph (0, 0)][DBLP ] APWeb, 2006, pp:1053-1058 [Conf ] Tong Wang , Jacek Ilow Compensation of Nonlinear Distortions with Memory Effects in Digital Transmitters. [Citation Graph (0, 0)][DBLP ] CNSR, 2004, pp:3-9 [Conf ] Ming Li , Tong Wang , Bao-wei Zhang , Bi-Cheng Ye A Novel Method of Image Retrieval Based on Combination of Semantic and Visual Features. [Citation Graph (0, 0)][DBLP ] FSKD (1), 2005, pp:619-628 [Conf ] Tong Wang , Da-xin Liu , Xuan-Zuo Lin , Wei Sun , Gufran Ahmad Clustering Large Scale of XML Documents. [Citation Graph (0, 0)][DBLP ] GPC, 2006, pp:447-455 [Conf ] Wei Sun , Da-xin Liu , Tong Wang Two-Stage Access Control Model for XML Security. [Citation Graph (0, 0)][DBLP ] ICADL, 2005, pp:479-480 [Conf ] Jian Guan , Da-xin Liu , Tong Wang Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2004, pp:706-714 [Conf ] Yan Zhang , Wenhui Li , Yu Meng , Haixu Chen , Tong Wang Intelligent Mosaics Algorithm of Overlapping Images. [Citation Graph (0, 0)][DBLP ] ICNC (3), 2005, pp:938-942 [Conf ] Tong Wang , Da-xin Liu , Wei Sun A Novel Mining Approach for Schemas in XML Documents. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:731-734 [Conf ] Tong Wang , Da-xin Liu , Xuan-Zuo Lin XML Document Clustering by Independent Component Analysis. [Citation Graph (0, 0)][DBLP ] KDXD, 2006, pp:13-21 [Conf ] Ming Li , Tong Wang An Approach to Image Retrieval Based on Concept Lattices and Rough Set Theory. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:845-849 [Conf ] Ruojie Sha , Xiaoping Zhang , Shiping Liao , Pamela E. Constantinou , Baoquan Ding , Tong Wang , Alejandra V. Garibotti , Hong Zhong , Lisa B. Israel , Xing Wang , Gang Wu , Banani Chakraborty , Junghuei Chen , Yuwen Zhang , Hao Yan , Zhiyong Shen , Wanqiu Shen , Phiset Sa-Ardyen , Jens Kopatsch , Jiwen Zheng , Philip S. Lukeman , William B. Sherman , Chengde Mao , Natasa Jonoska , Nadrian C. Seeman Structural DNA Nanotechnology: Molecular Construction and Computation. [Citation Graph (0, 0)][DBLP ] UC, 2005, pp:20-31 [Conf ] Tong Wang , Pi-Lian He Web Log Mining by an Improved AprioriAll Algorithm. [Citation Graph (0, 0)][DBLP ] WEC (2), 2005, pp:97-100 [Conf ] 22-29GHz Ultra-Wideband CMOS Pulse Generator for Collision Avoidance Short Range Vehicular Radar Sensors. [Citation Graph (, )][DBLP ] Dual-Vth leakage reduction with Fast Clock Skew Scheduling Enhancement. [Citation Graph (, )][DBLP ] A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering. [Citation Graph (, )][DBLP ] A Neural Network Model for Evaluating Mobile Ad Hoc Wireless Network Survivability. [Citation Graph (, )][DBLP ] Low-Complexity Channel Estimation for Cooperative Wireless Sensor Networks Based on Data Selection. [Citation Graph (, )][DBLP ] A Distributed Energy-aware Trust Topology Control Algorithm for Service-Oriented Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. [Citation Graph (, )][DBLP ] Hedge-Based Filtering Method for Semi-structure Documents. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs