Search the dblp DataBase
Wai Wan Tsang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wai Wan Tsang , Lucas Chi Kwong Hui , K. P. Chow , C. F. Chong , Sam C. W. Tso Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:23-30 [Conf ] Lucas Chi Kwong Hui , K. P. Chow , Kevin K. H. Pun , Siu-Ming Yiu , Wai Wan Tsang , C. F. Chong , H. W. Chan Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2004, pp:88-89 [Conf ] Venus L. S. Cheung , Lucas Chi Kwong Hui , Siu-Ming Yiu , K. P. Chow , Kevin K. H. Pun , Wai Wan Tsang , H. W. Chan , C. F. Chong Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf ] Ai Fen Sui , Sherman S. M. Chow , Lucas Chi Kwong Hui , Siu-Ming Yiu , K. P. Chow , Wai Wan Tsang , C. F. Chong , Kevin K. H. Pun , H. W. Chan Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:275-279 [Conf ] Wai Wan Tsang , Tak Wah Lam , Francis Y. L. Chin An Optimal EREW Parallel Algorithm for Parenthesis Matching. [Citation Graph (0, 0)][DBLP ] ICPP (3), 1989, pp:185-192 [Conf ] Ka Yan Wong , Chi Lap Yip , Ping Wah Li , Wai Wan Tsang Automatic Template Matching Method for Tropical Cyclone Eye Fix. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2004, pp:650-653 [Conf ] Eric Y. K. Chan , H. W. Chan , K. M. Chan , Vivien P. S. Chan , Samuel T. Chanson , Matthew M. H. Cheung , C. F. Chong , K. P. Chow , Albert K. T. Hui , Lucas Chi Kwong Hui , Luke C. K. Lam , W. C. Lau , Kevin K. H. Pun , Anthony Y. F. Tsang , Wai Wan Tsang , Sam C. W. Tso , Dit-Yan Yeung , K. Y. Yu IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. [Citation Graph (0, 0)][DBLP ] ISPAN, 2004, pp:581-586 [Conf ] Kam-Wah Wong , Wai Wan Tsang An Efficient Shadow Algorithm for Area Light Sources using BSP Trees. [Citation Graph (0, 0)][DBLP ] Pacific Conference on Computer Graphics and Applications, 1998, pp:97-0 [Conf ] Xiaoyun Wang , Lucas Chi Kwong Hui , K. P. Chow , Wai Wan Tsang , C. F. Chong , H. W. Chan Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:167-177 [Conf ] Francis Y. L. Chin , Henry C. M. Leung , Siu-Ming Yiu , Tak Wah Lam , Roni Rosenfeld , Wai Wan Tsang , David K. Smith , Y. Jiang Finding motifs for insufficient number of sequences with strong binding to transcription facto. [Citation Graph (0, 0)][DBLP ] RECOMB, 2004, pp:125-132 [Conf ] K. P. Chow , C. F. Chong , Pierre K. Y. Lai , Lucas Chi Kwong Hui , Kevin K. H. Pun , Wai Wan Tsang , H. W. Chan Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:187-194 [Conf ] Feng Ma , Wenping Wang , Wai Wan Tsang , Zesheng Tang , Shaowei Xia , Xin Tong Probabilistic Segmentation of Volume Data for Visualization Using SOM-PNN Classifier. [Citation Graph (0, 0)][DBLP ] VVS, 1998, pp:71-78 [Conf ] Zichen Li , Lucas Chi Kwong Hui , K. P. Chow , C. F. Chong , Wai Wan Tsang , H. W. Chan Security of Tseng-Jan's group signature schemes. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2000, v:75, n:5, pp:187-189 [Journal ] Nicholas V. Findler , Timothy W. Bickmore , Laurie H. Ihrig , Wai Wan Tsang A Note on the comparison of five heuristic optimization techniques of a certain class of decision trees. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1991, v:53, n:1-2, pp:89-100 [Journal ] Henry C. M. Leung , Francis Y. L. Chin , Siu-Ming Yiu , Ronald Rosenfeld , Wai Wan Tsang Finding Motifs with Insufficient Number of Strong Binding Sites. [Citation Graph (0, 0)][DBLP ] Journal of Computational Biology, 2005, v:12, n:6, pp:686-701 [Journal ] George Marsaglia , Wai Wan Tsang A simple method for generating gamma variables. [Citation Graph (0, 0)][DBLP ] ACM Trans. Math. Softw., 2000, v:26, n:3, pp:363-372 [Journal ] George Marsaglia , Wai Wan Tsang The Monty Python method for generating random variables. [Citation Graph (0, 0)][DBLP ] ACM Trans. Math. Softw., 1998, v:24, n:3, pp:341-350 [Journal ] Meiqin Wang , Lin Li , Siu-Ming Yiu , Lucas Chi Kwong Hui , C. F. Chong , K. P. Chow , Wai Wan Tsang , H. W. Chan , Kevin K. H. Pun A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:203-212 [Conf ] Search in 0.002secs, Finished in 0.304secs