Search the dblp DataBase
Hong Chen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hong Chen , Jieh Hsiang Logic Programming with Recurrence Domains. [Citation Graph (1, 0)][DBLP ] ICALP, 1991, pp:20-34 [Conf ] Zhi-jun Xie , Hong Chen , Cuiping Li MFIS-Mining Frequent Itemsets on Data Streams. [Citation Graph (0, 0)][DBLP ] ADMA, 2006, pp:1085-1093 [Conf ] Xiaobo Fan , Wei Xu , Hong Chen , Lei Liu CCSMOMS: A Composite Communication Scheme for Mobile Object Management System. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:235-239 [Conf ] Tao Chen , Hong Chen A linear approximation method for optimum calculation in image processing. [Citation Graph (0, 0)][DBLP ] Annual Simulation Symposium, 1992, pp:214-220 [Conf ] Hong Chen , Xiaoling Wang , Aoying Zhou Efficient Evaluation of Distance Predicates in XPath Full-Text Query. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:76-85 [Conf ] Hong Chen , Jie Tian , Xin Yang Fingerprint Matching with Registration Pattern Inspection. [Citation Graph (0, 0)][DBLP ] AVBPA, 2003, pp:327-334 [Conf ] Jiangang Cheng , Jie Tian , Hong Chen , Qun Ren , Xin Yang Fingerprint Enhancement Using Oriented Diffusion Filter. [Citation Graph (0, 0)][DBLP ] AVBPA, 2003, pp:164-171 [Conf ] Anil K. Jain , Hong Chen , Silviu Minut Dental Biometrics: Human Identification Using Dental Radiographs. [Citation Graph (0, 0)][DBLP ] AVBPA, 2003, pp:429-437 [Conf ] Unsang Park , Hong Chen , Anil K. Jain 3D Model-Assisted Face Recognition in Video. [Citation Graph (0, 0)][DBLP ] CRV, 2005, pp:322-329 [Conf ] Hong Chen , Jieh Hsiang , Hwa-Chung Kong On Finite Representations of Infinite Sequences of Terms. [Citation Graph (0, 0)][DBLP ] CTRS, 1990, pp:100-114 [Conf ] Hong Chen , Zijian Xu , Ziqiang Liu , Song Chun Zhu Composite Templates for Cloth Modeling and Sketching. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2006, pp:943-950 [Conf ] Hong Chen , Song Chun Zhu A Generative Model of Human Hair for Hair Sketching. [Citation Graph (0, 0)][DBLP ] CVPR (2), 2005, pp:74-81 [Conf ] Ziqiang Liu , Hong Chen , Heung-Yeung Shum An Efficient Approach to Learning Inhomogeneous Gibbs Model. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2003, pp:425-431 [Conf ] Zijian Xu , Hong Chen , Song Chun Zhu A High Resolution Grammatical Model for Face Representation and Sketching. [Citation Graph (0, 0)][DBLP ] CVPR (2), 2005, pp:470-477 [Conf ] Zhongwen Li , Hong Chen , Shui Yu Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems. [Citation Graph (0, 0)][DBLP ] DATE, 2006, pp:678-683 [Conf ] Gamal Fahmy , Diaa Eldin M. Nassar , Eyad Jai-Said , Hong Chen , Omaima Nomir , Jindan Zhou , Robert Howell , Hany H. Ammar , Mohamed Abdel-Mottaleb , Anil K. Jain Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP ] DG.O, 2004, pp:- [Conf ] Gamal Fahmy , Diaa Eldin M. Nassar , Eyad Jai-Said , Hong Chen , Omaima Nomir , Jindan Zhou , Robert Howell , Hany H. Ammar , Mohamed Abdel-Mottaleb , Anil K. Jain A Web Based Tool for an Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP ] DG.O, 2004, pp:- [Conf ] Fan Wang , Andrew Lim , Hong Chen Flexible Demand Assignment Problem. [Citation Graph (0, 0)][DBLP ] ECAI, 2004, pp:698-704 [Conf ] Yang Xiang , Zhongwen Li , Hong Chen Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. [Citation Graph (0, 0)][DBLP ] GCC Workshops, 2006, pp:181-188 [Conf ] Ning Zhang 0003 , Hong Chen , Yu Wang , Shi-Jun Cheng , Ming-Feng Xiong Odaies: Ontology-driven Adaptive Web Information Extraction System. [Citation Graph (0, 0)][DBLP ] IAT, 2003, pp:454-460 [Conf ] Xiaoguang Lu , Hong Chen , Anil K. Jain Multimodal Facial Gender and Ethnicity Identification. [Citation Graph (0, 0)][DBLP ] ICB, 2006, pp:554-561 [Conf ] Jiangang Cheng , Jie Tian , Hong Chen Fingerprint Minutiae Matching with Orientation and Ridge. [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:351-358 [Conf ] Gamal Fahmy , Diaa Eldin M. Nassar , Eyad Haj-Said , Hong Chen , Omaima Nomir , Jindan Zhou , Robert Howell , Hany H. Ammar , Mohamed Abdel-Mottaleb , Anil K. Jain Towards an Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:789-796 [Conf ] Hong Chen , Ying-Qing Xu , Heung-Yeung Shum , Song Chun Zhu , Nan-Ning Zheng Example-Based Facial Sketch Generation with Non-parametric Sampling. [Citation Graph (0, 0)][DBLP ] ICCV, 2001, pp:433-438 [Conf ] Hong Chen , Louis-François Pau Individual Telecommunications Tariffs in Chinese Communities: History as a Mirror of the Future, and Relevance for Mobile Service Development in China. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:777-782 [Conf ] Hong Chen , Gary E. Ford An FIR Image Interpolation Filter Design Method Based on Properties of Human Vision. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1994, pp:581-585 [Conf ] Michael E. Farmer , Xiaoguang Lu , Hong Chen , Anil K. Jain Robust motion-based image segmentation using fusion. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:3375-3378 [Conf ] Hong Chen , Louis-François Pau Individual Tariffs for Mobile Services: Theoretical Framework and a Computational Case in Mobile Music. [Citation Graph (0, 0)][DBLP ] ICMB, 2006, pp:5- [Conf ] Louis-François Pau , Hong Chen , P. van de Coterlet , Rob Zuidwijk Introduction of 3rd Generation Wireless Services in a Multi-Enterprise VPN Environment: Case of the Port of Rotterdam. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:643-646 [Conf ] Hong Chen , Anil K. Jain Tooth Contour Extraction for Matching Dental Radiographs. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2004, pp:522-525 [Conf ] Huiguang He , Jie Tian , Jing Wang , Hong Chen , X. P. Zhang Improved MSEL and its Medical Application. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2002, pp:597-600 [Conf ] Zhongwen Li , Yang Xiang , Hong Chen Performance Optimization of Checkpointing Schemes with Task Duplication. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:671-677 [Conf ] Zhi-jun Xie , Chen Hong , Cuiping Li An Efficient Algorithm for Frequent Itemset Mining on Data Streams. [Citation Graph (0, 0)][DBLP ] Industrial Conference on Data Mining, 2006, pp:474-491 [Conf ] Hong Chen Compound Brushing. [Citation Graph (0, 0)][DBLP ] INFOVIS, 2003, pp:- [Conf ] Hong Chen , Brett C. Tjaden , Lonnie R. Welch , Carl Bruggeman , Lu Tong , Barbara Pfarr Monitoring Network QoS in a Dynamic Real-Time System. [Citation Graph (0, 0)][DBLP ] IPDPS, 2002, pp:- [Conf ] Hong Chen , Ruey-Wen Liu An on-line unsupervised learning machine for adaptive feature extraction. [Citation Graph (0, 0)][DBLP ] ISCAS, 1993, pp:535-538 [Conf ] Hong Chen , Nan-Ning Zheng , Lin Liang , Yan Li , Ying-Qing Xu , Heung-Yeung Shum PicToon: a personalized image-based cartoon system. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2002, pp:171-178 [Conf ] Hong Chen , Ziqiang Liu , Chuck Rose , Yingqing Xu , Heung-Yeung Shum , David Salesin Example-based composite sketching of human portraits. [Citation Graph (0, 0)][DBLP ] NPAR, 2004, pp:95-153 [Conf ] Lin Liang , Hong Chen , Ying-Qing Xu , Heung-Yeung Shum Example-Based Caricature Generation with Exaggeration. [Citation Graph (0, 0)][DBLP ] Pacific Conference on Computer Graphics and Applications, 2002, pp:386-393 [Conf ] Julia A. Johnson , Mengchi Liu , Hong Chen Unification of Knowledge Discovery and Data Mining Using Rough Sets Approach in a Real-World Application. [Citation Graph (0, 0)][DBLP ] Rough Sets and Current Trends in Computing, 2000, pp:330-337 [Conf ] Hong Chen , Ninghui Li Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:130-138 [Conf ] Andrei State , Jonathan McAllister , Ulrich Neumann , Hong Chen , Tim J. Cullip , David T. Chen , Henry Fuchs Interactive Volume Visualization on a Heterogeneous Message-Passing Multicomputer. [Citation Graph (0, 0)][DBLP ] SI3D, 1995, pp:69-74 [Conf ] Hong Chen , Enhua Wu An efficient radiosity solution for bump texture generation. [Citation Graph (0, 0)][DBLP ] SIGGRAPH, 1990, pp:125-134 [Conf ] Ninghui Li , Ziqing Mao , Hong Chen Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf ] Ping Wah Wong , Hong Chen , Zhongjue Tang On steganalysis of plus-minus one embedding of continuous-tone images. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:643-652 [Conf ] Andrei State , David T. Chen , Chris Tector , Andrew Brandt , Hong Chen , Ryutarou Ohbuchi , Michael Bajura , Henry Fuchs Case Study: Observing a Volume Rendered Fetus within a Pregnant Patient. [Citation Graph (0, 0)][DBLP ] IEEE Visualization, 1994, pp:364-368 [Conf ] Hong Chen , Anil K. Jain Dental Biometrics: Alignment and Matching of Dental Radiographs. [Citation Graph (0, 0)][DBLP ] WACV/MOTION, 2005, pp:316-321 [Conf ] Xiaohua Sun , Fansheng Kong , Hong Chen Using Quantitative Association Rules in Collaborative Filtering. [Citation Graph (0, 0)][DBLP ] WAIM, 2005, pp:822-827 [Conf ] Hong Chen , Jieh Hsiang Recurrence Domains: Their Unification and Application to Logic Programming [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1995, v:122, n:1, pp:45-69 [Journal ] Hong Chen Compound brushing explained. [Citation Graph (0, 0)][DBLP ] Information Visualization, 2004, v:3, n:2, pp:96-108 [Journal ] Ling Chen , Gencai Chen , Hong Chen , Jack March , Steve Benford , Zhi-Geng Pan An HCI method to improve the human performance reduced by local-lag mechanism. [Citation Graph (0, 0)][DBLP ] Interacting with Computers, 2007, v:19, n:2, pp:215-224 [Journal ] Hong Chen , Ling Chen , Gencai Chen Effects of Local-Lag Mechanism on Task Performance in a Desktop CVE System. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2005, v:20, n:3, pp:396-401 [Journal ] Shan Wang , Xiaoyong Du , Xiaofeng Meng , Hong Chen Database Research: Achievements and Challenges. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:5, pp:823-837 [Journal ] Hong Chen , Hanqin Zhang Diffusion Approximations for Some Multiclass Queueing Networks with FIFO Service Disciplines. [Citation Graph (0, 0)][DBLP ] Math. Oper. Res., 2000, v:25, n:4, pp:679-707 [Journal ] Hong Chen , Yat-Wah Wan Capacity competition of make-to-order firms. [Citation Graph (0, 0)][DBLP ] Oper. Res. Lett., 2005, v:33, n:2, pp:187-194 [Journal ] Hong Chen , Hanqin Zhang Diffusion approximations for Kumar-Seidman network under a priority service discipline. [Citation Graph (0, 0)][DBLP ] Oper. Res. Lett., 1998, v:23, n:3-5, pp:171-181 [Journal ] Heng Qing Ye , Hong Chen Lyapunov method for the stability of fluid networks. [Citation Graph (0, 0)][DBLP ] Oper. Res. Lett., 2001, v:28, n:3, pp:125-136 [Journal ] Hong Chen , Anil K. Jain Dental Biometrics: Alignment and Matching of Dental Radiographs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2005, v:27, n:8, pp:1319-1326 [Journal ] Hong Chen , Song Chun Zhu A Generative Sketch Model for Human Hair Analysis and Synthesis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:7, pp:1025-1040 [Journal ] Yuliang He , Jie Tian , Liang Li , Hong Chen , Xin Yang Fingerprint Matching Based on Global Comprehensive Similarity. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:6, pp:850-862 [Journal ] Anil K. Jain , Hong Chen Matching of dental X-ray images for human identification. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2004, v:37, n:7, pp:1519-1532 [Journal ] Hong Chen , Offer Kella , Gideon Weiss Fluid approximations for a processor-sharing queue. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 1997, v:27, n:1-2, pp:99-125 [Journal ] Hong Chen , Xinyang Shen Computing the Stationary Distribution of an SRBM in an Orthant with Applications to Queueing Networks. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 2003, v:45, n:1, pp:27-45 [Journal ] Hong Chen , Heng Qing Ye Existence Condition for the Diffusion Approximations of Multiclass Priority Queueing Networks. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 2001, v:38, n:4, pp:435-470 [Journal ] Hong Chen , Hanqin Zhang A sufficient condition and a necessary condition for the diffusion approximations of multiclass queueing networks under priority service disciplines. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 2000, v:34, n:1-4, pp:237-268 [Journal ] Hong Chen , Hanqin Zhang Diffusion Approximations for Re-Entrant Lines with a First-Buffer-First-Served Priority Discipline. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 1996, v:23, n:, pp:177-195 [Journal ] Xinyang Shen , Hong Chen , J. G. Dai , Wanyang Dai The Finite Element Method for Computing the Stationary Distribution of an SRBM in a Hypercube with Applications to Finite Buffer Queueing Networks. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 2002, v:42, n:1, pp:33-62 [Journal ] Katsuya Hakozaki , Hideaki Kanai , Katsunori Ishikawa , Hong Chen , Katsushi Izawa Conceptual design of a virtual library for personal use. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 1999, v:30, n:3, pp:43-51 [Journal ] V. Ralph Algazi , Gary E. Ford , Hong Chen Linear filtering of images based on properties of vision. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1995, v:4, n:10, pp:1460-1464 [Journal ] Lu Tong , Carl Bruggeman , Brett C. Tjaden , Hong Chen , Lonnie R. Welch Specification and Modeling of Network Resources in Dynamic, Distributed Real-time System. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2001, pp:395-400 [Conf ] Haifeng Li , Hong Chen GraSeq : A Novel Approximate Mining Approach of Sequential Patterns over Data Stream. [Citation Graph (0, 0)][DBLP ] ADMA, 2007, pp:401-411 [Conf ] Xin Li , Bin Li , Hong Chen , Xianji Wang , Zhengquan Zhuang Full-Space LDA With Evolutionary Selection for Face Recognition. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1097-1105 [Conf ] Wencong Zhang , Hong Chen , Peng Yao , Bin Li , Zhenquan Zhuang Precise Eye Localization with AdaBoost and Fast Radial Symmetry. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:1068-1077 [Conf ] Yongxuan Lai , Hong Chen , Cuiping Li Processing the v-KNN Queries inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICPP, 2007, pp:69- [Conf ] Xiaowen Li , Xiang Xie , Xinkai Chen , GuoLin Li , Li Zhang , Zhihua Wang , Hong Chen Design and Implementation of a Low Complexity Near-lossless Image Compression Method for Wireless Endoscopy Capsule System. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:1321-1324 [Conf ] Xin-Kai Chen , GuoLin Li , Xiang Xie , Xiaowen Li , Zhihua Wang , Hong Chen A Low Power Digital Baseband for Wireless Endoscope Capsule. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:2355-2358 [Conf ] Hong Chen , Chen Jia , Chun Zhang , Zhihua Wang , Chunsheng Liu Power Harvesting With PZT Ceramics. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:557-560 [Conf ] Xiaobo Fan , Ting-Ting Xie , Cuiping Li , Hong Chen MRST - An Efficient Monitoring Technology of Summarization on Stream Data. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:2, pp:190-196 [Journal ] Moment+: Mining Closed Frequent Itemsets over Data Stream. [Citation Graph (, )][DBLP ] DC-Tree: An Algorithm for Skyline Query on Data Streams. [Citation Graph (, )][DBLP ] Mining Top-n Local Outliers in Constrained Spatial Networks. [Citation Graph (, )][DBLP ] A Temporal Dominant Relationship Analysis Method. [Citation Graph (, )][DBLP ] Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies. [Citation Graph (, )][DBLP ] 08043 Summary -- Perspectives Workshop: Telecommunication Economics. [Citation Graph (, )][DBLP ] Maintaining the Dominant Representatives on Data Streams. [Citation Graph (, )][DBLP ] A Multiple Level Sequential Pattern Mining Model over Data Stream. [Citation Graph (, )][DBLP ] On the Security of Delegation in Access Control Systems. [Citation Graph (, )][DBLP ] Access Control Friendly Query Verification for Outsourced Data Publishing. [Citation Graph (, )][DBLP ] Analysis of Graph-Based Semi-supervised Regression. [Citation Graph (, )][DBLP ] A Spatial Overlapping Based Similarity Measure Applied to Hierarchical Clustering. [Citation Graph (, )][DBLP ] Dynamic Partial Coverage Based Feature Selection Method. [Citation Graph (, )][DBLP ] On Efficient Processing of Multiple KNN Queries in Constrained Spatial Networks. [Citation Graph (, )][DBLP ] Guaranteed Cost Tracking Scheme for Wheeled Mobile Robot with Actuator Saturations via T-S Fuzzy Model. [Citation Graph (, )][DBLP ] What-if Analysis in MOLAP Environments. [Citation Graph (, )][DBLP ] Region Extreme Value Query in Sensor Networks. [Citation Graph (, )][DBLP ] A framework for spotting anomaly. [Citation Graph (, )][DBLP ] An improved Fuzzy C Means clustering algorithm and its application in traffic condition recognition. [Citation Graph (, )][DBLP ] Efficient computation of monochromatic reverse top-k queries. [Citation Graph (, )][DBLP ] Energy-Efficient Fault-Tolerant Mechanism for Clustered Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Individual Tariffs for Mobile Service Bundles - A Negotiation Calculation Tool. [Citation Graph (, )][DBLP ] Particle Swarm Optimization-Based Extremum Seeking Control. [Citation Graph (, )][DBLP ] Low-power IC design for a wireless BCI system. [Citation Graph (, )][DBLP ] Integrated Radial Basis Function Networks with Adaptive Residual Subsampling Training Method for Approximation and Solving PDEs. [Citation Graph (, )][DBLP ] Parallel SimRank computation on large graphs with iterative aggregation. [Citation Graph (, )][DBLP ] Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. [Citation Graph (, )][DBLP ] Multi-Source Skyline Queries Processing in Multi-Dimensional Space. [Citation Graph (, )][DBLP ] Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. [Citation Graph (, )][DBLP ] Mining roles with semantic meanings. [Citation Graph (, )][DBLP ] Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP ] Towards analyzing complex operating system access control configurations. [Citation Graph (, )][DBLP ] Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap. [Citation Graph (, )][DBLP ] Mining Approximate Closed Frequent Itemsets over Stream. [Citation Graph (, )][DBLP ] Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] PDA: A Flexible and Efficient Personal Decision Assistant. [Citation Graph (, )][DBLP ] In-Network Execution of External Join for Sensor Networks. [Citation Graph (, )][DBLP ] Efficient Incremental Computation of CUBE in Multiple Versions What-If Analysis. [Citation Graph (, )][DBLP ] The Tradeoff of Delta Table Merging and Re-writing Algorithms in What-If Analysis Application. [Citation Graph (, )][DBLP ] Incremental Computation for MEDIAN Cubes in What-If Analysis. [Citation Graph (, )][DBLP ] Fountain-Code Aided File Transfer in 802.11 WLANs. [Citation Graph (, )][DBLP ] Multi-Level Turbo Decoding Assisted Soft Combining Aided Hybrid ARQ. [Citation Graph (, )][DBLP ] Residue objects: a challenge to web browser security. [Citation Graph (, )][DBLP ] DSOSW: A Deleting Strategy in Mining Frequent Itemsets over Sliding Window of Stream. [Citation Graph (, )][DBLP ] Dynamic balanced storage in wireless sensor networks. [Citation Graph (, )][DBLP ] An Improved LOS Method for Implementing Visibility Analysis of 3D Complex Landscapes. [Citation Graph (, )][DBLP ] Study on the Chaotic Wave. [Citation Graph (, )][DBLP ] An approach to integral input-to-state stabilization via satisficing strategy. [Citation Graph (, )][DBLP ] Energy-level based Routing Algorithm of Multi-sink Sensor Networks. [Citation Graph (, )][DBLP ] A reduced-order nonlinear clutch pressure observer for automatic transmission using ISS. [Citation Graph (, )][DBLP ] Clutch slip control of Automatic Transmission using nonlinear method. [Citation Graph (, )][DBLP ] Nonlinear model predictive control for idle speed control of SI engine. [Citation Graph (, )][DBLP ] Hypothetical Queries on Multidimensional Dataset. [Citation Graph (, )][DBLP ] A New Controller Controlling the Synchronous Communication between Different Chua. [Citation Graph (, )][DBLP ] Efficient Computation of Reverse Skyline on Data Stream. [Citation Graph (, )][DBLP ] Energy Efficient Approximate Top-k Range Queries in Sensor Networks. [Citation Graph (, )][DBLP ] Price Competition for Color TV Supply Chain Based on Stackelberg and Repeated Model Game Theory. [Citation Graph (, )][DBLP ] The Output Competition for Color TV Supply Chain Based on Game Theory. [Citation Graph (, )][DBLP ] Access Control Policy Based on Behavior Patterns. [Citation Graph (, )][DBLP ] A Fuzzy GMDH Network and its Application in Traffic Flow Forecasting. [Citation Graph (, )][DBLP ] Behavior Safety Integration Management and Control System for Coal Enterprises. [Citation Graph (, )][DBLP ] Numerical solution of PDEs via integrated radial basis function networks with adaptive training algorithm. [Citation Graph (, )][DBLP ] Mining non-derivable frequent itemsets over data stream. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.647secs