The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tong Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ming Li, Bao-wei Zhang, Tong Wang, Li Zhao
    Approximation of Class Unions Based on Dominance-Matrix Within Dominance-Based Rough Set Approach. [Citation Graph (0, 0)][DBLP]
    ACII, 2005, pp:795-802 [Conf]
  2. Michael A. Bauer, Tong Wang
    Strategies for Distributed Search. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1992, pp:251-260 [Conf]
  3. Tong Wang, Da-xin Liu, Xuan-Zuo Lin
    Query Optimization Method Based on Automaton for Content-based Filtering. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:724-728 [Conf]
  4. Wei Sun, Da-xin Liu, Tong Wang
    A Model of XML Access Control with Dual-Level Security Views. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:799-802 [Conf]
  5. Tong Wang, Da-xin Liu, Wei Sun, Wan-Song Zhang
    An Effective XML Filtering Method for High-Performance Publish/Subscribe System. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:889-896 [Conf]
  6. Junliang Wang, Tong Wang, Jiyong Zhang, Hao Tan, Liupeng He, Ji Cheng
    Study on the Construction and Application of 3D Visualization Platform for the Yellow River Basin. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:1053-1058 [Conf]
  7. Tong Wang, Jacek Ilow
    Compensation of Nonlinear Distortions with Memory Effects in Digital Transmitters. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:3-9 [Conf]
  8. Ming Li, Tong Wang, Bao-wei Zhang, Bi-Cheng Ye
    A Novel Method of Image Retrieval Based on Combination of Semantic and Visual Features. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:619-628 [Conf]
  9. Tong Wang, Da-xin Liu, Xuan-Zuo Lin, Wei Sun, Gufran Ahmad
    Clustering Large Scale of XML Documents. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:447-455 [Conf]
  10. Wei Sun, Da-xin Liu, Tong Wang
    Two-Stage Access Control Model for XML Security. [Citation Graph (0, 0)][DBLP]
    ICADL, 2005, pp:479-480 [Conf]
  11. Jian Guan, Da-xin Liu, Tong Wang
    Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2004, pp:706-714 [Conf]
  12. Yan Zhang, Wenhui Li, Yu Meng, Haixu Chen, Tong Wang
    Intelligent Mosaics Algorithm of Overlapping Images. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:938-942 [Conf]
  13. Tong Wang, Da-xin Liu, Wei Sun
    A Novel Mining Approach for Schemas in XML Documents. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:731-734 [Conf]
  14. Tong Wang, Da-xin Liu, Xuan-Zuo Lin
    XML Document Clustering by Independent Component Analysis. [Citation Graph (0, 0)][DBLP]
    KDXD, 2006, pp:13-21 [Conf]
  15. Ming Li, Tong Wang
    An Approach to Image Retrieval Based on Concept Lattices and Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:845-849 [Conf]
  16. Ruojie Sha, Xiaoping Zhang, Shiping Liao, Pamela E. Constantinou, Baoquan Ding, Tong Wang, Alejandra V. Garibotti, Hong Zhong, Lisa B. Israel, Xing Wang, Gang Wu, Banani Chakraborty, Junghuei Chen, Yuwen Zhang, Hao Yan, Zhiyong Shen, Wanqiu Shen, Phiset Sa-Ardyen, Jens Kopatsch, Jiwen Zheng, Philip S. Lukeman, William B. Sherman, Chengde Mao, Natasa Jonoska, Nadrian C. Seeman
    Structural DNA Nanotechnology: Molecular Construction and Computation. [Citation Graph (0, 0)][DBLP]
    UC, 2005, pp:20-31 [Conf]
  17. Tong Wang, Pi-Lian He
    Web Log Mining by an Improved AprioriAll Algorithm. [Citation Graph (0, 0)][DBLP]
    WEC (2), 2005, pp:97-100 [Conf]

  18. 22-29GHz Ultra-Wideband CMOS Pulse Generator for Collision Avoidance Short Range Vehicular Radar Sensors. [Citation Graph (, )][DBLP]


  19. Dual-Vth leakage reduction with Fast Clock Skew Scheduling Enhancement. [Citation Graph (, )][DBLP]


  20. A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering. [Citation Graph (, )][DBLP]


  21. A Neural Network Model for Evaluating Mobile Ad Hoc Wireless Network Survivability. [Citation Graph (, )][DBLP]


  22. Low-Complexity Channel Estimation for Cooperative Wireless Sensor Networks Based on Data Selection. [Citation Graph (, )][DBLP]


  23. A Distributed Energy-aware Trust Topology Control Algorithm for Service-Oriented Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  24. Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. [Citation Graph (, )][DBLP]


  25. Hedge-Based Filtering Method for Semi-structure Documents. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002