The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hua Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hua Wang, Jinli Cao, Yanchun Zhang
    A Flexible Payment Scheme and its Permission-Role Assignment. [Citation Graph (0, 0)][DBLP]
    ACSC, 2003, pp:189-198 [Conf]
  2. Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao
    Anonymous Access Scheme for Electronic Services. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:295-304 [Conf]
  3. Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao
    Authorization Algorithms for the Mobility of User-Role Relationship. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:69-78 [Conf]
  4. Hua Wang, Jinli Cao, Yanchuan Zhang
    Ticket-Based Service Access Scheme for Mobile Users. [Citation Graph (0, 0)][DBLP]
    ACSC, 2002, pp:285-292 [Conf]
  5. Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson
    A framework for role-based group deligation in distributed environments. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:321-328 [Conf]
  6. Hua Wang, Yanchuan Zhang
    Untraceable Off-line Electronic Cash Flow in E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACSC, 2001, pp:191-198 [Conf]
  7. Hua Wang, Yanchun Zhang, Jinli Cao
    Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations. [Citation Graph (0, 0)][DBLP]
    ADC, 2003, pp:125-133 [Conf]
  8. Helmut Prendinger, Hiroshi Dohi, Hua Wang, Sonja Mayer, Mitsuru Ishizuka
    Empathic Embodied Interfaces: Addressing Users' Affective State: Embodied Interfaces That Address Users' Physiological State. [Citation Graph (0, 0)][DBLP]
    ADS, 2004, pp:53-64 [Conf]
  9. Xiaogang Yu, Hua Wang, Hui Xu, Jingming Kuang
    Frequency-Occupation and Throughput Analysis of Hybrid Spread Spectrum (DS/FH) Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:547-550 [Conf]
  10. Jinli Cao, Lili Sun, Hua Wang
    Towards Secure XML Document with Usage Control. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:296-307 [Conf]
  11. Hua Wang, Jinli Cao, David Ross
    Role-Based Delegation with Negative Authorization. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:307-318 [Conf]
  12. Hua Wang, Yanchun Zhang, Jinli Cao, Jian Yang
    Specifying Role-Based Access Constraints with Object Constraint Language. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:687-696 [Conf]
  13. Hua Wang, Antonis Papanikolaou, Miguel Miranda, Francky Catthoor
    A global bus power optimization methodology for physical design of memory dominated systems by coupling bus segmentation and activity driven block placement. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2004, pp:759-761 [Conf]
  14. Xiaodong Fu, Hua Wang, Vijay Karamcheti
    Transparent Network Connectivity in Dynamic Cluster Environments. [Citation Graph (0, 0)][DBLP]
    CANPC, 2000, pp:30-44 [Conf]
  15. Jun Rekimoto, Hua Wang
    Sensing GamePad: electrostatic potential sensing for enhancing entertainment oriented interactions. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2004, pp:1457-1460 [Conf]
  16. Hua Wang, Helmut Prendinger, Takeo Igarashi
    Communicating emotions in online chat using physiological sensors and animated text. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2004, pp:1171-1174 [Conf]
  17. Hua Wang, Zhao-yong You
    PFFM and Quasi-Morishima Matrices. [Citation Graph (0, 0)][DBLP]
    COCOON, 1995, pp:392-395 [Conf]
  18. Antonis Papanikolaou, F. Lobmaier, Hua Wang, Miguel Miranda, Francky Catthoor
    A system-level methodology for fully compensating process variability impact of memory organizations in periodic applications. [Citation Graph (0, 0)][DBLP]
    CODES+ISSS, 2005, pp:117-122 [Conf]
  19. Qiming Teng, Hua Wang, Xiangqun Chen
    A HAL for Component-Based Embedded Operating Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:23-24 [Conf]
  20. Hua Wang, Zhongwei Zhang, David Lai
    Towards an Authentication Protocol for Service Outsourcing Over IP Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:3-9 [Conf]
  21. Pingping Xiu, Liangrui Peng, Xiaoqing Ding, Hua Wang
    Offline Handwritten Arabic Character Segmentation with Probabilistic Model. [Citation Graph (0, 0)][DBLP]
    Document Analysis Systems, 2006, pp:402-412 [Conf]
  22. Hua Wang, Miguel Miranda, Wim Dehaene, Francky Catthoor, Karen Maex
    Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules. [Citation Graph (0, 0)][DBLP]
    DATE, 2005, pp:914-919 [Conf]
  23. Liangrui Peng, Changsong Liu, Xiaoqing Ding, Hua Wang
    Multilingual document recognition research and its application in China. [Citation Graph (0, 0)][DBLP]
    DIAL, 2006, pp:126-132 [Conf]
  24. Hua Wang, Mark H. Chignell, Mitsuru Ishizuka
    Empathic tutoring software agents using real-time eye tracking. [Citation Graph (0, 0)][DBLP]
    ETRA, 2006, pp:73-78 [Conf]
  25. John Cheng, Ray Emami, Larry Kerschberg, Eugene Santos Jr., Qunhua Zhao, Hien Nguyen, Hua Wang, Michael N. Huhns, Marco Valtorta, Jiangbo Dang, Hrishikesh J. Goradia, Jingshan Huang, Sharon Xi
    OmniSeer: A Cognitive Framework for User Modeling, Reuse of Prior and Tacit Knowledge, and Collaborative Knowledge Services. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  26. Hua Wang, Jie Yang, Mark H. Chignell, Mitsuru Ishizuka
    Empathic Multiple Tutoring Agents for Multiple Learner Interface. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:339-342 [Conf]
  27. Xinshun Xu, Jun Ma, Hua Wang
    An Improved Simulated Annealing Algorithm for the Maximum Independent Set Problem. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:822-831 [Conf]
  28. Bruce McQueary, Lee Krause, Eugene Santos Jr., Hua Wang, Qunhua Zhao
    Modeling, Analysis and Visualization of Uncertainty in the Battlespace. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2004, pp:782-783 [Conf]
  29. Michael Rabinovich, Hua Wang
    DHTTP: An Efficient and Cache-Friendly Transfer Protocol for Web Traffic. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1597-1606 [Conf]
  30. Hua Wang, Mark H. Chignell, Mitsuru Ishizuka
    Are two talking heads better than one?: when should use more than one agent in e-learning? [Citation Graph (0, 0)][DBLP]
    Intelligent User Interfaces, 2006, pp:366-368 [Conf]
  31. Hong Hu, Jiuyong Li, Hua Wang, Grant Daggard
    Combined Gene Selection Methods for Microarray Data Analysis. [Citation Graph (0, 0)][DBLP]
    KES (1), 2006, pp:976-983 [Conf]
  32. Hua Wang, Miguel Miranda, Francky Catthoor, Wim Dehaene
    On the Combined Impact of Soft and Medium Gate Oxide Breakdown and Process Variability on the Parametric Figures of SRAM components. [Citation Graph (0, 0)][DBLP]
    MTDT, 2006, pp:71-76 [Conf]
  33. Hua Wang, Xin Wang, Xiangyang Xue
    Simulating Large-Scale Traffic Aggregation in an Automatic Switched Optical Network. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:594-597 [Conf]
  34. Hua Wang, Jinli Cao, Yahiko Kambayashi
    Building consumer self-anonymity scalable payment protocol for Internet purchase. [Citation Graph (0, 0)][DBLP]
    RIDE, 2002, pp:159-168 [Conf]
  35. Hua Wang, Yanchun Zhang
    A Protocol for Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP]
    Web-Age Information Management, 2000, pp:189-197 [Conf]
  36. Hua Wang, Jinli Cao, Yanchun Zhang
    A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    WISE (1), 2001, pp:53-62 [Conf]
  37. Hua Wang, Jinli Cao, Yanchun Zhang
    Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. [Citation Graph (0, 0)][DBLP]
    WISE, 2002, pp:301-312 [Conf]
  38. Hua Wang, Hudai Fu, Wei Yang
    The Application of Image Recognition into the Automatic Recognition System for Truck Cab Assembly Identifier. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:117-120 [Conf]
  39. Hao-hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain
    A secure multicast protocol with copyright protection. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:2, pp:42-60 [Journal]
  40. László A. Székely, Hua Wang
    Binary trees with the largest number of subtrees. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2007, v:155, n:3, pp:374-385 [Journal]
  41. Hua Wang, Yanchun Zhang, Jinli Cao, Yahiko Kambayashi
    A Global Ticket-Based Access Scheme for Mobile Users. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2004, v:6, n:1, pp:35-46 [Journal]
  42. Hideto Yonekura, Hideyuki Migita, Shigeru Sakurai, Hua Wang, Shin-ichi Harada, Md. Joynal Abedin, Sho-ichi Yamagishi, Hiroshi Yamamoto
    Antisense display - a method for functional gene screening: evaluation in a cell-free system and isolation of angiogenesis-related genes. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 1999, v:27, n:13, pp:2591-2600 [Journal]
  43. Wei Wei, Qi Wang, Hua Wang, Hong Guang Zhang
    The feature extraction of nonparametric curves based on niche genetic algorithms and multi-population competition. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2005, v:26, n:10, pp:1483-1497 [Journal]
  44. Hua Wang, Jinli Cao, Yanchun Zhang
    A Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:3, pp:425-436 [Journal]
  45. Michael Rabinovich, Hua Wang
    DHTTP: an efficient and cache-friendly transfer protocol for the web. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:6, pp:1007-1020 [Journal]
  46. Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan
    Achieving secure and flexible M-services through tickets. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:6, pp:697-708 [Journal]
  47. Hua Wang, Miguel Miranda, Antonis Papanikolaou, Francky Catthoor, Wim Dehaene
    Variable tapered pareto buffer design and implementation allowing run-time configuration for low-power embedded SRAMs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2005, v:13, n:10, pp:1127-1135 [Journal]
  48. Wee Ling Wong, Cuihua Shen, Luciano Nocera, Eduardo Carriazo, Fei Tang, Shiyamvar Bugga, Harishkumar Narayanan, Hua Wang, Ute Ritterfeld
    Serious video game effectiveness. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2007, pp:49-55 [Conf]
  49. Hua Wang, Jing Ying
    Toward Runtime Self-adaptation Method in Software-Intensive Systems Based on Hidden Markov Model. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:601-606 [Conf]
  50. Hua Wang, Jie Yang, Mark H. Chignell, Mitsuru Ishizuka
    Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction. [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:225-231 [Conf]
  51. Antonis Papanikolaou, Hua Wang, Miguel Miranda, Francky Catthoor
    Reliability issues in deep deep sub-micron technologies: time-dependent variability and its impact on embedded system design. [Citation Graph (0, 0)][DBLP]
    IOLTS, 2007, pp:121- [Conf]
  52. Hua Wang, Zuquan Ge, Jun Ma
    Self-adaptive Lagrange Relaxation Algorithm for Aggregated Multicast. [Citation Graph (0, 0)][DBLP]
    SOFSEM (1), 2007, pp:544-553 [Conf]
  53. Antonis Papanikolaou, Miguel Miranda, Hua Wang, Francky Catthoor, M. Satyakiran, Pol Marchal, B. Kaczer, C. Bruynseraede, Z. Tokei
    Reliability issues in deep deep sub-micron technologies: time-dependent variability and its impact on embedded system design. [Citation Graph (0, 0)][DBLP]
    VLSI-SoC, 2006, pp:342-347 [Conf]
  54. Qiang Liu, Hua Wang, Jingming Kuang, Zheng Wang, Zhiming Bi
    M-TORA: a TORA-Based Multi-Path Routing Algorithm for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  55. Raul Etkin, David Tse, Hua Wang
    Gaussian Interference Channel Capacity to Within One Bit [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  56. Heng Wang, Jie Fang, Hua Wang, Ya-Min Sun
    TSDLMRA: an efficient multicast routing algorithm based on Tabu search. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:2, pp:77-90 [Journal]

  57. Discriminant Laplacian Embedding. [Citation Graph (, )][DBLP]


  58. Multi-Label Classification: Inconsistency and Class Balanced K-Nearest Neighbor. [Citation Graph (, )][DBLP]


  59. Advanced Permission-Role Relationship in Role-Based Access Control. [Citation Graph (, )][DBLP]


  60. FPValidator: Validating Type Equivalence of Function Pointers on the Fly. [Citation Graph (, )][DBLP]


  61. Integrating recommendation models for improved web page prediction accuracy. [Citation Graph (, )][DBLP]


  62. An efficient hash-based algorithm for minimal k-anonymity. [Citation Graph (, )][DBLP]


  63. Microdata Protection Through Approximate Microaggregation. [Citation Graph (, )][DBLP]


  64. Privacy-aware Access Control with Generalization Boundaries. [Citation Graph (, )][DBLP]


  65. Conditional Purpose Based Access Control Model for Privacy Protection. [Citation Graph (, )][DBLP]


  66. Keep Passwords Away from Memory: Password Caching and Verification Using TPM. [Citation Graph (, )][DBLP]


  67. On the Complexity of Restricted k-anonymity Problem. [Citation Graph (, )][DBLP]


  68. Protecting Information Sharing in Distributed Collaborative Environment. [Citation Graph (, )][DBLP]


  69. SAConf: Semantic Attestation of Software Configurations. [Citation Graph (, )][DBLP]


  70. L-Diversity Based Dynamic Update for Large Time-Evolving Microdata. [Citation Graph (, )][DBLP]


  71. A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses. [Citation Graph (, )][DBLP]


  72. A Comparative Study of Classification Methods For Microarray Data Analysis. [Citation Graph (, )][DBLP]


  73. Priority Driven K-Anonymisation for Privacy Protection. [Citation Graph (, )][DBLP]


  74. Delegating Revocations and Authorizations. [Citation Graph (, )][DBLP]


  75. Injecting purpose and trust into data anonymisation. [Citation Graph (, )][DBLP]


  76. Authorization approaches for advanced permission-role assignments. [Citation Graph (, )][DBLP]


  77. Portable devices of security and privacy preservation for e-learning. [Citation Graph (, )][DBLP]


  78. Privacy preserving on Radio Frequency Identification systems. [Citation Graph (, )][DBLP]


  79. Optimal Privacy-Aware Path in Hippocratic Databases. [Citation Graph (, )][DBLP]


  80. On Memory and I/O Efficient Duplication Detection for Multiple Self-clean Data Sources. [Citation Graph (, )][DBLP]


  81. DISTRO: A System for Detecting Global Outliers from Distributed Data Streams with Privacy Protection. [Citation Graph (, )][DBLP]


  82. Image Categorization Using Directed Graphs. [Citation Graph (, )][DBLP]


  83. Towards a Software Framework for Building Highly Flexible Component-Based Embedded Operating Systems. [Citation Graph (, )][DBLP]


  84. Teletraffic Performance Analysis of Multi-class OFDM-TDMA Systems with AMC. [Citation Graph (, )][DBLP]


  85. DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. [Citation Graph (, )][DBLP]


  86. Erlang Capacity of Multi-Class TDMA Systems with Adaptive Modulation and Coding. [Citation Graph (, )][DBLP]


  87. Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems. [Citation Graph (, )][DBLP]


  88. Uplink Capacity of Multi-Class IEEE 802.16j Relay Networks with Adaptive Modulation and Coding. [Citation Graph (, )][DBLP]


  89. Achieving P-Sensitive K-Anonymity via Anatomy. [Citation Graph (, )][DBLP]


  90. Trust-Based Access Control for Privacy Protection in Collaborative Environment. [Citation Graph (, )][DBLP]


  91. Protecting Disseminative Information in E-Learning. [Citation Graph (, )][DBLP]


  92. Secure and Efficient Information Sharing in Multi-university E-Learning Environments. [Citation Graph (, )][DBLP]


  93. Ticket-based mobile commerce system and its implementation. [Citation Graph (, )][DBLP]


  94. Satisfying Privacy Requirements: One Step before Anonymization. [Citation Graph (, )][DBLP]


  95. Directed Graph Learning via High-Order Co-linkage Analysis. [Citation Graph (, )][DBLP]


  96. Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems. [Citation Graph (, )][DBLP]


  97. Design of Data-Aided SNR Estimator Robust to Frequency Offset for MPSK Signals. [Citation Graph (, )][DBLP]


  98. Design and Analysis of Data-Aided Coarse Carrier Frequency Recovery in DVB-S2. [Citation Graph (, )][DBLP]


  99. NDA SNR Estimation with Phase Lock Detector for Digital QPSK Receivers. [Citation Graph (, )][DBLP]


  100. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems. [Citation Graph (, )][DBLP]


  101. Ubiquitous computing environments and its usage access control. [Citation Graph (, )][DBLP]


  102. Comprehensive printed Tibetan/English mixed text segmentation method. [Citation Graph (, )][DBLP]


  103. Multi-font printed Mongolian document recognition system. [Citation Graph (, )][DBLP]


  104. New statistical method for multifont printed Tibetan/English OCR. [Citation Graph (, )][DBLP]


  105. Printed Arabic document recognition system. [Citation Graph (, )][DBLP]


  106. New statistical method for machine-printed Arabic character recognition. [Citation Graph (, )][DBLP]


  107. Emotion detection via discriminative kernel method. [Citation Graph (, )][DBLP]


  108. Synchronization on a segment without localization: algorithm and applications. [Citation Graph (, )][DBLP]


  109. Hierarchical Downlink Resource Management Framework for OFDMA Based WiMAX Systems. [Citation Graph (, )][DBLP]


  110. Fault-Tolerant Online Backup Service: Formal Modeling and Reasoning. [Citation Graph (, )][DBLP]


  111. Researching on Communication Efficiency for the Mobile Physiological Information Monitor System Based on Zigbee. [Citation Graph (, )][DBLP]


  112. Extended K-Anonymity Models Against Attribute Disclosure. [Citation Graph (, )][DBLP]


  113. An optimized ant colony algorithm based on the gradual changing orientation factor for multi-constraint QoS routing. [Citation Graph (, )][DBLP]


  114. Downlink resource management for QoS scheduling in IEEE 802.16 WiMAX networks. [Citation Graph (, )][DBLP]


  115. Tabu search algorithm for RP selection in PIM-SM multicast routing. [Citation Graph (, )][DBLP]


  116. Vector Gaussian Multiple Description with Individual and Central Receivers [Citation Graph (, )][DBLP]


  117. The extremal values of the Wiener index of a tree with given degree sequence. [Citation Graph (, )][DBLP]


  118. Molecular graphs and the inverse Wiener index problem. [Citation Graph (, )][DBLP]


  119. Corrigendum: The extremal values of the Wiener index of a tree with given degree sequence. [Citation Graph (, )][DBLP]


  120. Extremal trees with given degree sequence for the Randic index. [Citation Graph (, )][DBLP]


  121. On the parity of the Wiener index. [Citation Graph (, )][DBLP]


Search in 0.449secs, Finished in 0.455secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002