Search the dblp DataBase
Hua Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hua Wang , Jinli Cao , Yanchun Zhang A Flexible Payment Scheme and its Permission-Role Assignment. [Citation Graph (0, 0)][DBLP ] ACSC, 2003, pp:189-198 [Conf ] Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao Anonymous Access Scheme for Electronic Services. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:295-304 [Conf ] Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao Authorization Algorithms for the Mobility of User-Role Relationship. [Citation Graph (0, 0)][DBLP ] ACSC, 2005, pp:69-78 [Conf ] Hua Wang , Jinli Cao , Yanchuan Zhang Ticket-Based Service Access Scheme for Mobile Users. [Citation Graph (0, 0)][DBLP ] ACSC, 2002, pp:285-292 [Conf ] Hua Wang , Jiuyong Li , Ron Addie , Stijn Dekeyser , Richard Watson A framework for role-based group deligation in distributed environments. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:321-328 [Conf ] Hua Wang , Yanchuan Zhang Untraceable Off-line Electronic Cash Flow in E-Commerce. [Citation Graph (0, 0)][DBLP ] ACSC, 2001, pp:191-198 [Conf ] Hua Wang , Yanchun Zhang , Jinli Cao Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations. [Citation Graph (0, 0)][DBLP ] ADC, 2003, pp:125-133 [Conf ] Helmut Prendinger , Hiroshi Dohi , Hua Wang , Sonja Mayer , Mitsuru Ishizuka Empathic Embodied Interfaces: Addressing Users' Affective State: Embodied Interfaces That Address Users' Physiological State. [Citation Graph (0, 0)][DBLP ] ADS, 2004, pp:53-64 [Conf ] Xiaogang Yu , Hua Wang , Hui Xu , Jingming Kuang Frequency-Occupation and Throughput Analysis of Hybrid Spread Spectrum (DS/FH) Network. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:547-550 [Conf ] Jinli Cao , Lili Sun , Hua Wang Towards Secure XML Document with Usage Control. [Citation Graph (0, 0)][DBLP ] APWeb, 2005, pp:296-307 [Conf ] Hua Wang , Jinli Cao , David Ross Role-Based Delegation with Negative Authorization. [Citation Graph (0, 0)][DBLP ] APWeb, 2006, pp:307-318 [Conf ] Hua Wang , Yanchun Zhang , Jinli Cao , Jian Yang Specifying Role-Based Access Constraints with Object Constraint Language. [Citation Graph (0, 0)][DBLP ] APWeb, 2004, pp:687-696 [Conf ] Hua Wang , Antonis Papanikolaou , Miguel Miranda , Francky Catthoor A global bus power optimization methodology for physical design of memory dominated systems by coupling bus segmentation and activity driven block placement. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2004, pp:759-761 [Conf ] Xiaodong Fu , Hua Wang , Vijay Karamcheti Transparent Network Connectivity in Dynamic Cluster Environments. [Citation Graph (0, 0)][DBLP ] CANPC, 2000, pp:30-44 [Conf ] Jun Rekimoto , Hua Wang Sensing GamePad: electrostatic potential sensing for enhancing entertainment oriented interactions. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2004, pp:1457-1460 [Conf ] Hua Wang , Helmut Prendinger , Takeo Igarashi Communicating emotions in online chat using physiological sensors and animated text. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2004, pp:1171-1174 [Conf ] Hua Wang , Zhao-yong You PFFM and Quasi-Morishima Matrices. [Citation Graph (0, 0)][DBLP ] COCOON, 1995, pp:392-395 [Conf ] Antonis Papanikolaou , F. Lobmaier , Hua Wang , Miguel Miranda , Francky Catthoor A system-level methodology for fully compensating process variability impact of memory organizations in periodic applications. [Citation Graph (0, 0)][DBLP ] CODES+ISSS, 2005, pp:117-122 [Conf ] Qiming Teng , Hua Wang , Xiangqun Chen A HAL for Component-Based Embedded Operating Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:23-24 [Conf ] Hua Wang , Zhongwei Zhang , David Lai Towards an Authentication Protocol for Service Outsourcing Over IP Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:3-9 [Conf ] Pingping Xiu , Liangrui Peng , Xiaoqing Ding , Hua Wang Offline Handwritten Arabic Character Segmentation with Probabilistic Model. [Citation Graph (0, 0)][DBLP ] Document Analysis Systems, 2006, pp:402-412 [Conf ] Hua Wang , Miguel Miranda , Wim Dehaene , Francky Catthoor , Karen Maex Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules. [Citation Graph (0, 0)][DBLP ] DATE, 2005, pp:914-919 [Conf ] Liangrui Peng , Changsong Liu , Xiaoqing Ding , Hua Wang Multilingual document recognition research and its application in China. [Citation Graph (0, 0)][DBLP ] DIAL, 2006, pp:126-132 [Conf ] Hua Wang , Mark H. Chignell , Mitsuru Ishizuka Empathic tutoring software agents using real-time eye tracking. [Citation Graph (0, 0)][DBLP ] ETRA, 2006, pp:73-78 [Conf ] John Cheng , Ray Emami , Larry Kerschberg , Eugene Santos Jr. , Qunhua Zhao , Hien Nguyen , Hua Wang , Michael N. Huhns , Marco Valtorta , Jiangbo Dang , Hrishikesh J. Goradia , Jingshan Huang , Sharon Xi OmniSeer: A Cognitive Framework for User Modeling, Reuse of Prior and Tacit Knowledge, and Collaborative Knowledge Services. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] Hua Wang , Jie Yang , Mark H. Chignell , Mitsuru Ishizuka Empathic Multiple Tutoring Agents for Multiple Learner Interface. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:339-342 [Conf ] Xinshun Xu , Jun Ma , Hua Wang An Improved Simulated Annealing Algorithm for the Maximum Independent Set Problem. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:822-831 [Conf ] Bruce McQueary , Lee Krause , Eugene Santos Jr. , Hua Wang , Qunhua Zhao Modeling, Analysis and Visualization of Uncertainty in the Battlespace. [Citation Graph (0, 0)][DBLP ] ICTAI, 2004, pp:782-783 [Conf ] Michael Rabinovich , Hua Wang DHTTP: An Efficient and Cache-Friendly Transfer Protocol for Web Traffic. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:1597-1606 [Conf ] Hua Wang , Mark H. Chignell , Mitsuru Ishizuka Are two talking heads better than one?: when should use more than one agent in e-learning? [Citation Graph (0, 0)][DBLP ] Intelligent User Interfaces, 2006, pp:366-368 [Conf ] Hong Hu , Jiuyong Li , Hua Wang , Grant Daggard Combined Gene Selection Methods for Microarray Data Analysis. [Citation Graph (0, 0)][DBLP ] KES (1), 2006, pp:976-983 [Conf ] Hua Wang , Miguel Miranda , Francky Catthoor , Wim Dehaene On the Combined Impact of Soft and Medium Gate Oxide Breakdown and Process Variability on the Parametric Figures of SRAM components. [Citation Graph (0, 0)][DBLP ] MTDT, 2006, pp:71-76 [Conf ] Hua Wang , Xin Wang , Xiangyang Xue Simulating Large-Scale Traffic Aggregation in an Automatic Switched Optical Network. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:594-597 [Conf ] Hua Wang , Jinli Cao , Yahiko Kambayashi Building consumer self-anonymity scalable payment protocol for Internet purchase. [Citation Graph (0, 0)][DBLP ] RIDE, 2002, pp:159-168 [Conf ] Hua Wang , Yanchun Zhang A Protocol for Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP ] Web-Age Information Management, 2000, pp:189-197 [Conf ] Hua Wang , Jinli Cao , Yanchun Zhang A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] WISE (1), 2001, pp:53-62 [Conf ] Hua Wang , Jinli Cao , Yanchun Zhang Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. [Citation Graph (0, 0)][DBLP ] WISE, 2002, pp:301-312 [Conf ] Hua Wang , Hudai Fu , Wei Yang The Application of Image Recognition into the Automatic Recognition System for Truck Cab Assembly Identifier. [Citation Graph (0, 0)][DBLP ] ICICIC (2), 2006, pp:117-120 [Conf ] Hao-hua Chu , Lintian Qiao , Klara Nahrstedt , Hua Wang , Ritesh Jain A secure multicast protocol with copyright protection. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:2, pp:42-60 [Journal ] László A. Székely , Hua Wang Binary trees with the largest number of subtrees. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2007, v:155, n:3, pp:374-385 [Journal ] Hua Wang , Yanchun Zhang , Jinli Cao , Yahiko Kambayashi A Global Ticket-Based Access Scheme for Mobile Users. [Citation Graph (0, 0)][DBLP ] Information Systems Frontiers, 2004, v:6, n:1, pp:35-46 [Journal ] Hideto Yonekura , Hideyuki Migita , Shigeru Sakurai , Hua Wang , Shin-ichi Harada , Md. Joynal Abedin , Sho-ichi Yamagishi , Hiroshi Yamamoto Antisense display - a method for functional gene screening: evaluation in a cell-free system and isolation of angiogenesis-related genes. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 1999, v:27, n:13, pp:2591-2600 [Journal ] Wei Wei , Qi Wang , Hua Wang , Hong Guang Zhang The feature extraction of nonparametric curves based on niche genetic algorithms and multi-population competition. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2005, v:26, n:10, pp:1483-1497 [Journal ] Hua Wang , Jinli Cao , Yanchun Zhang A Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:3, pp:425-436 [Journal ] Michael Rabinovich , Hua Wang DHTTP: an efficient and cache-friendly transfer protocol for the web. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:6, pp:1007-1020 [Journal ] Hua Wang , Yanchun Zhang , Jinli Cao , Vijay Varadharajan Achieving secure and flexible M-services through tickets. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:6, pp:697-708 [Journal ] Hua Wang , Miguel Miranda , Antonis Papanikolaou , Francky Catthoor , Wim Dehaene Variable tapered pareto buffer design and implementation allowing run-time configuration for low-power embedded SRAMs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2005, v:13, n:10, pp:1127-1135 [Journal ] Wee Ling Wong , Cuihua Shen , Luciano Nocera , Eduardo Carriazo , Fei Tang , Shiyamvar Bugga , Harishkumar Narayanan , Hua Wang , Ute Ritterfeld Serious video game effectiveness. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2007, pp:49-55 [Conf ] Hua Wang , Jing Ying Toward Runtime Self-adaptation Method in Software-Intensive Systems Based on Hidden Markov Model. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2007, pp:601-606 [Conf ] Hua Wang , Jie Yang , Mark H. Chignell , Mitsuru Ishizuka Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction. [Citation Graph (0, 0)][DBLP ] HCI (3), 2007, pp:225-231 [Conf ] Antonis Papanikolaou , Hua Wang , Miguel Miranda , Francky Catthoor Reliability issues in deep deep sub-micron technologies: time-dependent variability and its impact on embedded system design. [Citation Graph (0, 0)][DBLP ] IOLTS, 2007, pp:121- [Conf ] Hua Wang , Zuquan Ge , Jun Ma Self-adaptive Lagrange Relaxation Algorithm for Aggregated Multicast. [Citation Graph (0, 0)][DBLP ] SOFSEM (1), 2007, pp:544-553 [Conf ] Antonis Papanikolaou , Miguel Miranda , Hua Wang , Francky Catthoor , M. Satyakiran , Pol Marchal , B. Kaczer , C. Bruynseraede , Z. Tokei Reliability issues in deep deep sub-micron technologies: time-dependent variability and its impact on embedded system design. [Citation Graph (0, 0)][DBLP ] VLSI-SoC, 2006, pp:342-347 [Conf ] Qiang Liu , Hua Wang , Jingming Kuang , Zheng Wang , Zhiming Bi M-TORA: a TORA-Based Multi-Path Routing Algorithm for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Raul Etkin , David Tse , Hua Wang Gaussian Interference Channel Capacity to Within One Bit [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Heng Wang , Jie Fang , Hua Wang , Ya-Min Sun TSDLMRA: an efficient multicast routing algorithm based on Tabu search. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2004, v:27, n:2, pp:77-90 [Journal ] Discriminant Laplacian Embedding. [Citation Graph (, )][DBLP ] Multi-Label Classification: Inconsistency and Class Balanced K-Nearest Neighbor. [Citation Graph (, )][DBLP ] Advanced Permission-Role Relationship in Role-Based Access Control. [Citation Graph (, )][DBLP ] FPValidator: Validating Type Equivalence of Function Pointers on the Fly. [Citation Graph (, )][DBLP ] Integrating recommendation models for improved web page prediction accuracy. [Citation Graph (, )][DBLP ] An efficient hash-based algorithm for minimal k -anonymity. [Citation Graph (, )][DBLP ] Microdata Protection Through Approximate Microaggregation. [Citation Graph (, )][DBLP ] Privacy-aware Access Control with Generalization Boundaries. [Citation Graph (, )][DBLP ] Conditional Purpose Based Access Control Model for Privacy Protection. [Citation Graph (, )][DBLP ] Keep Passwords Away from Memory: Password Caching and Verification Using TPM. [Citation Graph (, )][DBLP ] On the Complexity of Restricted k-anonymity Problem. [Citation Graph (, )][DBLP ] Protecting Information Sharing in Distributed Collaborative Environment. [Citation Graph (, )][DBLP ] SAConf: Semantic Attestation of Software Configurations. [Citation Graph (, )][DBLP ] L-Diversity Based Dynamic Update for Large Time-Evolving Microdata. [Citation Graph (, )][DBLP ] A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses. [Citation Graph (, )][DBLP ] A Comparative Study of Classification Methods For Microarray Data Analysis. [Citation Graph (, )][DBLP ] Priority Driven K-Anonymisation for Privacy Protection. [Citation Graph (, )][DBLP ] Delegating Revocations and Authorizations. [Citation Graph (, )][DBLP ] Injecting purpose and trust into data anonymisation. [Citation Graph (, )][DBLP ] Authorization approaches for advanced permission-role assignments. [Citation Graph (, )][DBLP ] Portable devices of security and privacy preservation for e-learning. [Citation Graph (, )][DBLP ] Privacy preserving on Radio Frequency Identification systems. [Citation Graph (, )][DBLP ] Optimal Privacy-Aware Path in Hippocratic Databases. [Citation Graph (, )][DBLP ] On Memory and I/O Efficient Duplication Detection for Multiple Self-clean Data Sources. [Citation Graph (, )][DBLP ] DISTRO: A System for Detecting Global Outliers from Distributed Data Streams with Privacy Protection. [Citation Graph (, )][DBLP ] Image Categorization Using Directed Graphs. [Citation Graph (, )][DBLP ] Towards a Software Framework for Building Highly Flexible Component-Based Embedded Operating Systems. [Citation Graph (, )][DBLP ] Teletraffic Performance Analysis of Multi-class OFDM-TDMA Systems with AMC. [Citation Graph (, )][DBLP ] DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. [Citation Graph (, )][DBLP ] Erlang Capacity of Multi-Class TDMA Systems with Adaptive Modulation and Coding. [Citation Graph (, )][DBLP ] Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems. [Citation Graph (, )][DBLP ] Uplink Capacity of Multi-Class IEEE 802.16j Relay Networks with Adaptive Modulation and Coding. [Citation Graph (, )][DBLP ] Achieving P-Sensitive K-Anonymity via Anatomy. [Citation Graph (, )][DBLP ] Trust-Based Access Control for Privacy Protection in Collaborative Environment. [Citation Graph (, )][DBLP ] Protecting Disseminative Information in E-Learning. [Citation Graph (, )][DBLP ] Secure and Efficient Information Sharing in Multi-university E-Learning Environments. [Citation Graph (, )][DBLP ] Ticket-based mobile commerce system and its implementation. [Citation Graph (, )][DBLP ] Satisfying Privacy Requirements: One Step before Anonymization. [Citation Graph (, )][DBLP ] Directed Graph Learning via High-Order Co-linkage Analysis. [Citation Graph (, )][DBLP ] Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems. [Citation Graph (, )][DBLP ] Design of Data-Aided SNR Estimator Robust to Frequency Offset for MPSK Signals. [Citation Graph (, )][DBLP ] Design and Analysis of Data-Aided Coarse Carrier Frequency Recovery in DVB-S2. [Citation Graph (, )][DBLP ] NDA SNR Estimation with Phase Lock Detector for Digital QPSK Receivers. [Citation Graph (, )][DBLP ] Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems. [Citation Graph (, )][DBLP ] Ubiquitous computing environments and its usage access control. [Citation Graph (, )][DBLP ] Comprehensive printed Tibetan/English mixed text segmentation method. [Citation Graph (, )][DBLP ] Multi-font printed Mongolian document recognition system. [Citation Graph (, )][DBLP ] New statistical method for multifont printed Tibetan/English OCR. [Citation Graph (, )][DBLP ] Printed Arabic document recognition system. [Citation Graph (, )][DBLP ] New statistical method for machine-printed Arabic character recognition. [Citation Graph (, )][DBLP ] Emotion detection via discriminative kernel method. [Citation Graph (, )][DBLP ] Synchronization on a segment without localization: algorithm and applications. [Citation Graph (, )][DBLP ] Hierarchical Downlink Resource Management Framework for OFDMA Based WiMAX Systems. [Citation Graph (, )][DBLP ] Fault-Tolerant Online Backup Service: Formal Modeling and Reasoning. [Citation Graph (, )][DBLP ] Researching on Communication Efficiency for the Mobile Physiological Information Monitor System Based on Zigbee. [Citation Graph (, )][DBLP ] Extended K-Anonymity Models Against Attribute Disclosure. [Citation Graph (, )][DBLP ] An optimized ant colony algorithm based on the gradual changing orientation factor for multi-constraint QoS routing. [Citation Graph (, )][DBLP ] Downlink resource management for QoS scheduling in IEEE 802.16 WiMAX networks. [Citation Graph (, )][DBLP ] Tabu search algorithm for RP selection in PIM-SM multicast routing. [Citation Graph (, )][DBLP ] Vector Gaussian Multiple Description with Individual and Central Receivers [Citation Graph (, )][DBLP ] The extremal values of the Wiener index of a tree with given degree sequence. [Citation Graph (, )][DBLP ] Molecular graphs and the inverse Wiener index problem. [Citation Graph (, )][DBLP ] Corrigendum: The extremal values of the Wiener index of a tree with given degree sequence. [Citation Graph (, )][DBLP ] Extremal trees with given degree sequence for the Randic index. [Citation Graph (, )][DBLP ] On the parity of the Wiener index. [Citation Graph (, )][DBLP ] Search in 0.721secs, Finished in 0.727secs