The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bin Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bin Zhao, Hui Su, Shaowei Xia
    A New Method for Segmenting Unconstrained Handwritten Numeral String. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1997, pp:524-527 [Conf]
  2. Jun-an Yang, Bin Zhao, Zhongfu Ye
    Research of Blind Deconvolution Algorithm Based on High-Order Statistics and Quantum Inspired GA. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:461-467 [Conf]
  3. Bin Zhao, Yong Liu, Shaowei Xia
    Support Vector Machine and its Application in Handwritten Numeral Recognition. [Citation Graph (0, 0)][DBLP]
    ICPR, 2000, pp:2720-2723 [Conf]
  4. Chengnian Long, Bin Zhao, Xinping Guan, Jun Yang
    The Yellow active queue management algorithm. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:47, n:4, pp:525-550 [Journal]
  5. Bin Zhao
    The inverse limit in the category of topological molecular lattices. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2001, v:118, n:3, pp:547-554 [Journal]
  6. Hui Su, Bin Zhao, Feng Ma, Song Wang, Shaowei Xia
    A Fault-Tolerant Chinese Check Recognition System. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 1997, v:11, n:4, pp:571-593 [Journal]
  7. Haolu Xie, Xin Wang, Albert Z. Wang, Bo Qin, Hongyi Chen, Yumei Zhou, Bin Zhao
    A Varying Pulse Width Second Order Derivative Gaussian Pulse Generator for UWB Transceivers in CMOS. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2794-2797 [Conf]

  8. Adaptive Encrypted Information Hiding Scheme for Images. [Citation Graph (, )][DBLP]


  9. A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. [Citation Graph (, )][DBLP]


  10. Unsupervised Maximum Margin Feature Selection with manifold regularization. [Citation Graph (, )][DBLP]


  11. Maximum Margin Embedding. [Citation Graph (, )][DBLP]


  12. Maximum Margin Clustering with Multivariate Loss Function. [Citation Graph (, )][DBLP]


  13. Compressed Spectral Clustering. [Citation Graph (, )][DBLP]


  14. Efficient multiclass maximum margin clustering. [Citation Graph (, )][DBLP]


  15. A Modeling Approach for Service-Oriented Application Based on Extensive Reuse. [Citation Graph (, )][DBLP]


  16. A Logical Framework for Fuzzy Quantifiers Part I: Basic Properties. [Citation Graph (, )][DBLP]


  17. Node Behavior Classification in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  18. Cuts3vm: a fast semi-supervised svm algorithm. [Citation Graph (, )][DBLP]


  19. Design of Secure Watermarking Scheme for Watermarking Protocol. [Citation Graph (, )][DBLP]


  20. Efficient Maximum Margin Clustering via Cutting Plane Algorithm. [Citation Graph (, )][DBLP]


  21. Multiple Kernel Clustering. [Citation Graph (, )][DBLP]


  22. Synthesis of beta-Tricalciumphosphate Powder through Aqueous Precipitation Method. [Citation Graph (, )][DBLP]


  23. Allocation of Measurement Error of Shield's Pose. [Citation Graph (, )][DBLP]


  24. A Precise Measurement Method of Azimuth Angle for TBM. [Citation Graph (, )][DBLP]


  25. Research of an Electric Laser System Based on the Non-diffracting Beam. [Citation Graph (, )][DBLP]


  26. Fast Design and Construction for Network Application Solution Based on .Net 3.5 Framework. [Citation Graph (, )][DBLP]


  27. Towards Fast De-duplication Using Low Energy Coprocessor. [Citation Graph (, )][DBLP]


  28. Active model selection for Graph-Based Semi-Supervised Learning. [Citation Graph (, )][DBLP]


  29. Throughput analysis of wireless mesh networks. [Citation Graph (, )][DBLP]


  30. Sustainable land use evaluation spatialization analysis. [Citation Graph (, )][DBLP]


  31. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. [Citation Graph (, )][DBLP]


  32. Z-abstract Basis. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002