The SCEAS System
Navigation Menu

Search the dblp DataBase


David Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lein Harn, David Huang, Chi-Sung Laih
    Password Authentication Based On Public-Key Distribution Cryptosystem. [Citation Graph (0, 1)][DBLP]
    ICDE, 1989, pp:332-338 [Conf]
  2. Amy R. Pritchett, Seungman Lee, David Huang, David Goldsman
    Hybrid-system simulation for National Airspace System safety analysis. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2000, pp:1132-1142 [Conf]
  3. David Huang, Toly Chen, Mao-Jiun J. Wang
    A fuzzy set approach for event tree analysis. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2001, v:118, n:1, pp:153-165 [Journal]
  4. Lein Harn, David Huang
    A Protocol for Establishing Secure Communication Channels in a Large Network. [Citation Graph (0, 8)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1994, v:6, n:1, pp:188-191 [Journal]
  5. Maolong Tang, Raj Shekhar, David Huang
    Mean curvature mapping for detection of corneal shape abnormality. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Med. Imaging, 2005, v:24, n:3, pp:424-428 [Journal]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002