The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sheng Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang
    Using Continuous Biometric Verification to Protect Interactive Login Sessions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:441-450 [Conf]
  2. Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattacharya
    Efficient Test Compaction for Pseudo-Random Testing. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2005, pp:337-342 [Conf]
  3. Wenliang Chen, Ru Yi, Sheng Zhang
    An Approach to Hole Repairing for FEA Mesh. [Citation Graph (0, 0)][DBLP]
    CISST, 2004, pp:268-271 [Conf]
  4. Sheng Zhang, Terence Sim
    When Fisher meets Fukunaga-Koontz: A New Look at Linear Discriminants. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:323-329 [Conf]
  5. Ji Zhang, Wei Wang, Sheng Zhang
    A Color Indexing Scheme Using Two-level Clustering Processing for Effective and Efficient Image Retrieval. [Citation Graph (0, 0)][DBLP]
    DMIN, 2005, pp:73-78 [Conf]
  6. Sheng Zhang, Fillia Makedon, James Ford, Lin Ai
    A Model for Multi-party Negotiations with Majority Rule. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:228-237 [Conf]
  7. Sheng Zhang, Fillia Makedon, James Ford, Calliope Sudborough, Lin Ai, Sarantos Kapidakis, Vangelis Karkaletsis, Euripidis Loukis
    An International Trade Negotiation Framework for e-Government. [Citation Graph (0, 0)][DBLP]
    EGOV, 2004, pp:211-217 [Conf]
  8. Sheng Zhang, Rajkumar Janakiraman, Terence Sim, Sandeep Kumar
    Continuous Verification Using Multimodal Biometrics. [Citation Graph (0, 0)][DBLP]
    ICB, 2006, pp:562-570 [Conf]
  9. Sheng Zhang, Xianli Wu
    Variable Length Language Model for Chinese Character Recognition. [Citation Graph (0, 0)][DBLP]
    ICMI, 2000, pp:267-271 [Conf]
  10. Bhargab B. Bhattacharya, Sharad C. Seth, Sheng Zhang
    Double-Tree Scan: A Novel Low-Power Scan-Path Architecture. [Citation Graph (0, 0)][DBLP]
    ITC, 2003, pp:470-479 [Conf]
  11. Sheng Zhang, Amit Chakrabarti, James Ford, Fillia Makedon
    Attack detection in time series for recommender systems. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:809-814 [Conf]
  12. Heng Huang, Li Shen, Fillia Makedon, Sheng Zhang, Mark Greenberg, Ling Gao, Justin D. Pearlman
    A clustering-based approach for prediction of cardiac resynchronization therapy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:260-266 [Conf]
  13. Sheng Zhang, Fillia Makedon
    Privacy preserving learning in negotiation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:821-825 [Conf]
  14. Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon, James Ford
    Node clustering based on link delay in P2P networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:744-749 [Conf]
  15. Sheng Zhang, James Ford, Fillia Makedon
    Deriving Private Information from Randomly Perturbed Ratings. [Citation Graph (0, 0)][DBLP]
    SDM, 2006, pp:- [Conf]
  16. Sheng Zhang, Weihong Wang, James Ford, Fillia Makedon
    Learning from Incomplete Ratings Using Non-negative Matrix Factorization. [Citation Graph (0, 0)][DBLP]
    SDM, 2006, pp:- [Conf]
  17. Fillia Makedon, Song Ye, Sheng Zhang, James Ford, Li Shen, Sarantos Kapidakis
    Data Brokers: Building Collections through Automated Negotiation. [Citation Graph (0, 0)][DBLP]
    SETN, 2004, pp:13-22 [Conf]
  18. Sheng Zhang, James Ford, Fillia Makedon
    A privacy-preserving collaborative filtering scheme with two-way communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2006, pp:316-323 [Conf]
  19. Sheng Zhang, Song Ye, Fillia Makedon, James Ford
    A hybrid negotiation strategy mechanism in an automated negotiation system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2004, pp:256-257 [Conf]
  20. Sheng Zhang, Yi Ouyang, James Ford, Fillia Makedon
    Analysis of a low-dimensional linear model under recommendation attacks. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2006, pp:517-524 [Conf]
  21. Bhargab B. Bhattacharya, Sharad C. Seth, Sheng Zhang
    Low-Energy BIST Design for Scan-based Logic Circuits. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2003, pp:546-551 [Conf]
  22. Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattacharya
    On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2005, pp:491-496 [Conf]
  23. Rajkumar Janakiraman, Sandeep Kumar, Sheng Zhang, Terence Sim
    Using Continuous Face Verification to Improve Desktop Security. [Citation Graph (0, 0)][DBLP]
    WACV/MOTION, 2005, pp:501-507 [Conf]
  24. Sheng Zhang, Weihong Wang, James Ford, Fillia Makedon, Justin D. Pearlman
    Using Singular Value Decomposition Approximation for Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:257-264 [Conf]
  25. Ji Zhang, Wei Wang, Han Liu, Sheng Zhang
    X-warehouse: building query pattern-driven data. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:896-897 [Conf]
  26. Sheng Zhang, Ji Zhang, Han Liu, Wei Wang
    XAR-miner: efficient association rules mining for XML data. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:894-895 [Conf]
  27. Jinchao Xu, Sheng Zhang
    Preconditioning the Poincaré-Steklov operator by using Green's function. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1997, v:66, n:217, pp:125-138 [Journal]
  28. Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sandeep Kumar
    Continuous Verification Using Multimodal Biometrics. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2007, v:29, n:4, pp:687-700 [Journal]
  29. Sheng Zhang, Tiecheng Xia
    Symbolic computation and new families of exact non-travelling wave solutions to (3+1)-dimensional Kadomstev-Petviashvili equation. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:181, n:1, pp:319-331 [Journal]
  30. Sheng Zhang, Tiecheng Xia
    Further improved extended Fan sub-equation method and new exact solutions of the (2+1)-dimensional Broer-Kaup-Kupershmidt equations. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:182, n:2, pp:1651-1660 [Journal]
  31. Sheng Zhang, Terence Sim
    Discriminant Subspace Analysis: A Fukunaga-Koontz Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2007, v:29, n:10, pp:1732-1745 [Journal]

  32. Knowledge acquisition approach based on rough fuzzy sets. [Citation Graph (, )][DBLP]


  33. Monte Carlo integration with small random bits. [Citation Graph (, )][DBLP]


  34. Convergence rate of quantum algorithm for multivariate approximation. [Citation Graph (, )][DBLP]


  35. Neural Network Control for a Class of Stochastic Nonlinear Switched System Based on Backstepping. [Citation Graph (, )][DBLP]


  36. Neural Networks Sliding Mode Control for a Class of Switched Nonlinear Systems. [Citation Graph (, )][DBLP]


  37. Vehicle Positioning Using Wi-Fi Networks and GPS/DR System. [Citation Graph (, )][DBLP]


  38. A chip solution for UWB-NFC receiver in CMOS 0.18um technology. [Citation Graph (, )][DBLP]


  39. A Bio-network Based Fault-Tolerant Architecture for Supervisory System. [Citation Graph (, )][DBLP]


  40. Comparative Research of XML Compression Technologies. [Citation Graph (, )][DBLP]


  41. Service-oriented multimedia delivery in pervasive space. [Citation Graph (, )][DBLP]


  42. The Architecture and Implementation of the New Generation Business System in a Commercial Bank. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002