The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hong Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hong Chen, Jieh Hsiang
    Logic Programming with Recurrence Domains. [Citation Graph (1, 0)][DBLP]
    ICALP, 1991, pp:20-34 [Conf]
  2. Zhi-jun Xie, Hong Chen, Cuiping Li
    MFIS-Mining Frequent Itemsets on Data Streams. [Citation Graph (0, 0)][DBLP]
    ADMA, 2006, pp:1085-1093 [Conf]
  3. Xiaobo Fan, Wei Xu, Hong Chen, Lei Liu
    CCSMOMS: A Composite Communication Scheme for Mobile Object Management System. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:235-239 [Conf]
  4. Tao Chen, Hong Chen
    A linear approximation method for optimum calculation in image processing. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 1992, pp:214-220 [Conf]
  5. Hong Chen, Xiaoling Wang, Aoying Zhou
    Efficient Evaluation of Distance Predicates in XPath Full-Text Query. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:76-85 [Conf]
  6. Hong Chen, Jie Tian, Xin Yang
    Fingerprint Matching with Registration Pattern Inspection. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2003, pp:327-334 [Conf]
  7. Jiangang Cheng, Jie Tian, Hong Chen, Qun Ren, Xin Yang
    Fingerprint Enhancement Using Oriented Diffusion Filter. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2003, pp:164-171 [Conf]
  8. Anil K. Jain, Hong Chen, Silviu Minut
    Dental Biometrics: Human Identification Using Dental Radiographs. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2003, pp:429-437 [Conf]
  9. Unsang Park, Hong Chen, Anil K. Jain
    3D Model-Assisted Face Recognition in Video. [Citation Graph (0, 0)][DBLP]
    CRV, 2005, pp:322-329 [Conf]
  10. Hong Chen, Jieh Hsiang, Hwa-Chung Kong
    On Finite Representations of Infinite Sequences of Terms. [Citation Graph (0, 0)][DBLP]
    CTRS, 1990, pp:100-114 [Conf]
  11. Hong Chen, Zijian Xu, Ziqiang Liu, Song Chun Zhu
    Composite Templates for Cloth Modeling and Sketching. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:943-950 [Conf]
  12. Hong Chen, Song Chun Zhu
    A Generative Model of Human Hair for Hair Sketching. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2005, pp:74-81 [Conf]
  13. Ziqiang Liu, Hong Chen, Heung-Yeung Shum
    An Efficient Approach to Learning Inhomogeneous Gibbs Model. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2003, pp:425-431 [Conf]
  14. Zijian Xu, Hong Chen, Song Chun Zhu
    A High Resolution Grammatical Model for Face Representation and Sketching. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2005, pp:470-477 [Conf]
  15. Zhongwen Li, Hong Chen, Shui Yu
    Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems. [Citation Graph (0, 0)][DBLP]
    DATE, 2006, pp:678-683 [Conf]
  16. Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, Hong Chen, Omaima Nomir, Jindan Zhou, Robert Howell, Hany H. Ammar, Mohamed Abdel-Mottaleb, Anil K. Jain
    Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  17. Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, Hong Chen, Omaima Nomir, Jindan Zhou, Robert Howell, Hany H. Ammar, Mohamed Abdel-Mottaleb, Anil K. Jain
    A Web Based Tool for an Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  18. Fan Wang, Andrew Lim, Hong Chen
    Flexible Demand Assignment Problem. [Citation Graph (0, 0)][DBLP]
    ECAI, 2004, pp:698-704 [Conf]
  19. Yang Xiang, Zhongwen Li, Hong Chen
    Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:181-188 [Conf]
  20. Ning Zhang 0003, Hong Chen, Yu Wang, Shi-Jun Cheng, Ming-Feng Xiong
    Odaies: Ontology-driven Adaptive Web Information Extraction System. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:454-460 [Conf]
  21. Xiaoguang Lu, Hong Chen, Anil K. Jain
    Multimodal Facial Gender and Ethnicity Identification. [Citation Graph (0, 0)][DBLP]
    ICB, 2006, pp:554-561 [Conf]
  22. Jiangang Cheng, Jie Tian, Hong Chen
    Fingerprint Minutiae Matching with Orientation and Ridge. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:351-358 [Conf]
  23. Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Haj-Said, Hong Chen, Omaima Nomir, Jindan Zhou, Robert Howell, Hany H. Ammar, Mohamed Abdel-Mottaleb, Anil K. Jain
    Towards an Automated Dental Identification System (ADIS). [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:789-796 [Conf]
  24. Hong Chen, Ying-Qing Xu, Heung-Yeung Shum, Song Chun Zhu, Nan-Ning Zheng
    Example-Based Facial Sketch Generation with Non-parametric Sampling. [Citation Graph (0, 0)][DBLP]
    ICCV, 2001, pp:433-438 [Conf]
  25. Hong Chen, Louis-François Pau
    Individual Telecommunications Tariffs in Chinese Communities: History as a Mirror of the Future, and Relevance for Mobile Service Development in China. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:777-782 [Conf]
  26. Hong Chen, Gary E. Ford
    An FIR Image Interpolation Filter Design Method Based on Properties of Human Vision. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1994, pp:581-585 [Conf]
  27. Michael E. Farmer, Xiaoguang Lu, Hong Chen, Anil K. Jain
    Robust motion-based image segmentation using fusion. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3375-3378 [Conf]
  28. Hong Chen, Louis-François Pau
    Individual Tariffs for Mobile Services: Theoretical Framework and a Computational Case in Mobile Music. [Citation Graph (0, 0)][DBLP]
    ICMB, 2006, pp:5- [Conf]
  29. Louis-François Pau, Hong Chen, P. van de Coterlet, Rob Zuidwijk
    Introduction of 3rd Generation Wireless Services in a Multi-Enterprise VPN Environment: Case of the Port of Rotterdam. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:643-646 [Conf]
  30. Hong Chen, Anil K. Jain
    Tooth Contour Extraction for Matching Dental Radiographs. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2004, pp:522-525 [Conf]
  31. Huiguang He, Jie Tian, Jing Wang, Hong Chen, X. P. Zhang
    Improved MSEL and its Medical Application. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2002, pp:597-600 [Conf]
  32. Zhongwen Li, Yang Xiang, Hong Chen
    Performance Optimization of Checkpointing Schemes with Task Duplication. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:671-677 [Conf]
  33. Zhi-jun Xie, Chen Hong, Cuiping Li
    An Efficient Algorithm for Frequent Itemset Mining on Data Streams. [Citation Graph (0, 0)][DBLP]
    Industrial Conference on Data Mining, 2006, pp:474-491 [Conf]
  34. Hong Chen
    Compound Brushing. [Citation Graph (0, 0)][DBLP]
    INFOVIS, 2003, pp:- [Conf]
  35. Hong Chen, Brett C. Tjaden, Lonnie R. Welch, Carl Bruggeman, Lu Tong, Barbara Pfarr
    Monitoring Network QoS in a Dynamic Real-Time System. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  36. Hong Chen, Ruey-Wen Liu
    An on-line unsupervised learning machine for adaptive feature extraction. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:535-538 [Conf]
  37. Hong Chen, Nan-Ning Zheng, Lin Liang, Yan Li, Ying-Qing Xu, Heung-Yeung Shum
    PicToon: a personalized image-based cartoon system. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2002, pp:171-178 [Conf]
  38. Hong Chen, Ziqiang Liu, Chuck Rose, Yingqing Xu, Heung-Yeung Shum, David Salesin
    Example-based composite sketching of human portraits. [Citation Graph (0, 0)][DBLP]
    NPAR, 2004, pp:95-153 [Conf]
  39. Lin Liang, Hong Chen, Ying-Qing Xu, Heung-Yeung Shum
    Example-Based Caricature Generation with Exaggeration. [Citation Graph (0, 0)][DBLP]
    Pacific Conference on Computer Graphics and Applications, 2002, pp:386-393 [Conf]
  40. Julia A. Johnson, Mengchi Liu, Hong Chen
    Unification of Knowledge Discovery and Data Mining Using Rough Sets Approach in a Real-World Application. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2000, pp:330-337 [Conf]
  41. Hong Chen, Ninghui Li
    Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:130-138 [Conf]
  42. Andrei State, Jonathan McAllister, Ulrich Neumann, Hong Chen, Tim J. Cullip, David T. Chen, Henry Fuchs
    Interactive Volume Visualization on a Heterogeneous Message-Passing Multicomputer. [Citation Graph (0, 0)][DBLP]
    SI3D, 1995, pp:69-74 [Conf]
  43. Hong Chen, Enhua Wu
    An efficient radiosity solution for bump texture generation. [Citation Graph (0, 0)][DBLP]
    SIGGRAPH, 1990, pp:125-134 [Conf]
  44. Ninghui Li, Ziqing Mao, Hong Chen
    Usable Mandatory Integrity Protection for Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:164-178 [Conf]
  45. Ping Wah Wong, Hong Chen, Zhongjue Tang
    On steganalysis of plus-minus one embedding of continuous-tone images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:643-652 [Conf]
  46. Andrei State, David T. Chen, Chris Tector, Andrew Brandt, Hong Chen, Ryutarou Ohbuchi, Michael Bajura, Henry Fuchs
    Case Study: Observing a Volume Rendered Fetus within a Pregnant Patient. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 1994, pp:364-368 [Conf]
  47. Hong Chen, Anil K. Jain
    Dental Biometrics: Alignment and Matching of Dental Radiographs. [Citation Graph (0, 0)][DBLP]
    WACV/MOTION, 2005, pp:316-321 [Conf]
  48. Xiaohua Sun, Fansheng Kong, Hong Chen
    Using Quantitative Association Rules in Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:822-827 [Conf]
  49. Hong Chen, Jieh Hsiang
    Recurrence Domains: Their Unification and Application to Logic Programming [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:122, n:1, pp:45-69 [Journal]
  50. Hong Chen
    Compound brushing explained. [Citation Graph (0, 0)][DBLP]
    Information Visualization, 2004, v:3, n:2, pp:96-108 [Journal]
  51. Ling Chen, Gencai Chen, Hong Chen, Jack March, Steve Benford, Zhi-Geng Pan
    An HCI method to improve the human performance reduced by local-lag mechanism. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 2007, v:19, n:2, pp:215-224 [Journal]
  52. Hong Chen, Ling Chen, Gencai Chen
    Effects of Local-Lag Mechanism on Task Performance in a Desktop CVE System. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:3, pp:396-401 [Journal]
  53. Shan Wang, Xiaoyong Du, Xiaofeng Meng, Hong Chen
    Database Research: Achievements and Challenges. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:823-837 [Journal]
  54. Hong Chen, Hanqin Zhang
    Diffusion Approximations for Some Multiclass Queueing Networks with FIFO Service Disciplines. [Citation Graph (0, 0)][DBLP]
    Math. Oper. Res., 2000, v:25, n:4, pp:679-707 [Journal]
  55. Hong Chen, Yat-Wah Wan
    Capacity competition of make-to-order firms. [Citation Graph (0, 0)][DBLP]
    Oper. Res. Lett., 2005, v:33, n:2, pp:187-194 [Journal]
  56. Hong Chen, Hanqin Zhang
    Diffusion approximations for Kumar-Seidman network under a priority service discipline. [Citation Graph (0, 0)][DBLP]
    Oper. Res. Lett., 1998, v:23, n:3-5, pp:171-181 [Journal]
  57. Heng Qing Ye, Hong Chen
    Lyapunov method for the stability of fluid networks. [Citation Graph (0, 0)][DBLP]
    Oper. Res. Lett., 2001, v:28, n:3, pp:125-136 [Journal]
  58. Hong Chen, Anil K. Jain
    Dental Biometrics: Alignment and Matching of Dental Radiographs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2005, v:27, n:8, pp:1319-1326 [Journal]
  59. Hong Chen, Song Chun Zhu
    A Generative Sketch Model for Human Hair Analysis and Synthesis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:7, pp:1025-1040 [Journal]
  60. Yuliang He, Jie Tian, Liang Li, Hong Chen, Xin Yang
    Fingerprint Matching Based on Global Comprehensive Similarity. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:6, pp:850-862 [Journal]
  61. Anil K. Jain, Hong Chen
    Matching of dental X-ray images for human identification. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2004, v:37, n:7, pp:1519-1532 [Journal]
  62. Hong Chen, Offer Kella, Gideon Weiss
    Fluid approximations for a processor-sharing queue. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1997, v:27, n:1-2, pp:99-125 [Journal]
  63. Hong Chen, Xinyang Shen
    Computing the Stationary Distribution of an SRBM in an Orthant with Applications to Queueing Networks. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2003, v:45, n:1, pp:27-45 [Journal]
  64. Hong Chen, Heng Qing Ye
    Existence Condition for the Diffusion Approximations of Multiclass Priority Queueing Networks. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2001, v:38, n:4, pp:435-470 [Journal]
  65. Hong Chen, Hanqin Zhang
    A sufficient condition and a necessary condition for the diffusion approximations of multiclass queueing networks under priority service disciplines. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2000, v:34, n:1-4, pp:237-268 [Journal]
  66. Hong Chen, Hanqin Zhang
    Diffusion Approximations for Re-Entrant Lines with a First-Buffer-First-Served Priority Discipline. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1996, v:23, n:, pp:177-195 [Journal]
  67. Xinyang Shen, Hong Chen, J. G. Dai, Wanyang Dai
    The Finite Element Method for Computing the Stationary Distribution of an SRBM in a Hypercube with Applications to Finite Buffer Queueing Networks. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2002, v:42, n:1, pp:33-62 [Journal]
  68. Katsuya Hakozaki, Hideaki Kanai, Katsunori Ishikawa, Hong Chen, Katsushi Izawa
    Conceptual design of a virtual library for personal use. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 1999, v:30, n:3, pp:43-51 [Journal]
  69. V. Ralph Algazi, Gary E. Ford, Hong Chen
    Linear filtering of images based on properties of vision. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1995, v:4, n:10, pp:1460-1464 [Journal]
  70. Lu Tong, Carl Bruggeman, Brett C. Tjaden, Hong Chen, Lonnie R. Welch
    Specification and Modeling of Network Resources in Dynamic, Distributed Real-time System. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2001, pp:395-400 [Conf]
  71. Haifeng Li, Hong Chen
    GraSeq : A Novel Approximate Mining Approach of Sequential Patterns over Data Stream. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:401-411 [Conf]
  72. Xin Li, Bin Li, Hong Chen, Xianji Wang, Zhengquan Zhuang
    Full-Space LDA With Evolutionary Selection for Face Recognition. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1097-1105 [Conf]
  73. Wencong Zhang, Hong Chen, Peng Yao, Bin Li, Zhenquan Zhuang
    Precise Eye Localization with AdaBoost and Fast Radial Symmetry. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:1068-1077 [Conf]
  74. Yongxuan Lai, Hong Chen, Cuiping Li
    Processing the v-KNN Queries inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:69- [Conf]
  75. Xiaowen Li, Xiang Xie, Xinkai Chen, GuoLin Li, Li Zhang, Zhihua Wang, Hong Chen
    Design and Implementation of a Low Complexity Near-lossless Image Compression Method for Wireless Endoscopy Capsule System. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1321-1324 [Conf]
  76. Xin-Kai Chen, GuoLin Li, Xiang Xie, Xiaowen Li, Zhihua Wang, Hong Chen
    A Low Power Digital Baseband for Wireless Endoscope Capsule. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2355-2358 [Conf]
  77. Hong Chen, Chen Jia, Chun Zhang, Zhihua Wang, Chunsheng Liu
    Power Harvesting With PZT Ceramics. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:557-560 [Conf]
  78. Xiaobo Fan, Ting-Ting Xie, Cuiping Li, Hong Chen
    MRST - An Efficient Monitoring Technology of Summarization on Stream Data. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:2, pp:190-196 [Journal]

  79. Moment+: Mining Closed Frequent Itemsets over Data Stream. [Citation Graph (, )][DBLP]


  80. DC-Tree: An Algorithm for Skyline Query on Data Streams. [Citation Graph (, )][DBLP]


  81. Mining Top-n Local Outliers in Constrained Spatial Networks. [Citation Graph (, )][DBLP]


  82. A Temporal Dominant Relationship Analysis Method. [Citation Graph (, )][DBLP]


  83. Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies. [Citation Graph (, )][DBLP]


  84. 08043 Summary -- Perspectives Workshop: Telecommunication Economics. [Citation Graph (, )][DBLP]


  85. Maintaining the Dominant Representatives on Data Streams. [Citation Graph (, )][DBLP]


  86. A Multiple Level Sequential Pattern Mining Model over Data Stream. [Citation Graph (, )][DBLP]


  87. On the Security of Delegation in Access Control Systems. [Citation Graph (, )][DBLP]


  88. Access Control Friendly Query Verification for Outsourced Data Publishing. [Citation Graph (, )][DBLP]


  89. Analysis of Graph-Based Semi-supervised Regression. [Citation Graph (, )][DBLP]


  90. A Spatial Overlapping Based Similarity Measure Applied to Hierarchical Clustering. [Citation Graph (, )][DBLP]


  91. Dynamic Partial Coverage Based Feature Selection Method. [Citation Graph (, )][DBLP]


  92. On Efficient Processing of Multiple KNN Queries in Constrained Spatial Networks. [Citation Graph (, )][DBLP]


  93. Guaranteed Cost Tracking Scheme for Wheeled Mobile Robot with Actuator Saturations via T-S Fuzzy Model. [Citation Graph (, )][DBLP]


  94. What-if Analysis in MOLAP Environments. [Citation Graph (, )][DBLP]


  95. Region Extreme Value Query in Sensor Networks. [Citation Graph (, )][DBLP]


  96. A framework for spotting anomaly. [Citation Graph (, )][DBLP]


  97. An improved Fuzzy C Means clustering algorithm and its application in traffic condition recognition. [Citation Graph (, )][DBLP]


  98. Efficient computation of monochromatic reverse top-k queries. [Citation Graph (, )][DBLP]


  99. Energy-Efficient Fault-Tolerant Mechanism for Clustered Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  100. Individual Tariffs for Mobile Service Bundles - A Negotiation Calculation Tool. [Citation Graph (, )][DBLP]


  101. Particle Swarm Optimization-Based Extremum Seeking Control. [Citation Graph (, )][DBLP]


  102. Low-power IC design for a wireless BCI system. [Citation Graph (, )][DBLP]


  103. Integrated Radial Basis Function Networks with Adaptive Residual Subsampling Training Method for Approximation and Solving PDEs. [Citation Graph (, )][DBLP]


  104. Parallel SimRank computation on large graphs with iterative aggregation. [Citation Graph (, )][DBLP]


  105. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. [Citation Graph (, )][DBLP]


  106. Multi-Source Skyline Queries Processing in Multi-Dimensional Space. [Citation Graph (, )][DBLP]


  107. Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. [Citation Graph (, )][DBLP]


  108. Mining roles with semantic meanings. [Citation Graph (, )][DBLP]


  109. Trojan horse resistant discretionary access control. [Citation Graph (, )][DBLP]


  110. Towards analyzing complex operating system access control configurations. [Citation Graph (, )][DBLP]


  111. Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap. [Citation Graph (, )][DBLP]


  112. Mining Approximate Closed Frequent Itemsets over Stream. [Citation Graph (, )][DBLP]


  113. Optimization Framework for Distributed Clustering Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  114. PDA: A Flexible and Efficient Personal Decision Assistant. [Citation Graph (, )][DBLP]


  115. In-Network Execution of External Join for Sensor Networks. [Citation Graph (, )][DBLP]


  116. Efficient Incremental Computation of CUBE in Multiple Versions What-If Analysis. [Citation Graph (, )][DBLP]


  117. The Tradeoff of Delta Table Merging and Re-writing Algorithms in What-If Analysis Application. [Citation Graph (, )][DBLP]


  118. Incremental Computation for MEDIAN Cubes in What-If Analysis. [Citation Graph (, )][DBLP]


  119. Fountain-Code Aided File Transfer in 802.11 WLANs. [Citation Graph (, )][DBLP]


  120. Multi-Level Turbo Decoding Assisted Soft Combining Aided Hybrid ARQ. [Citation Graph (, )][DBLP]


  121. Residue objects: a challenge to web browser security. [Citation Graph (, )][DBLP]


  122. DSOSW: A Deleting Strategy in Mining Frequent Itemsets over Sliding Window of Stream. [Citation Graph (, )][DBLP]


  123. Dynamic balanced storage in wireless sensor networks. [Citation Graph (, )][DBLP]


  124. An Improved LOS Method for Implementing Visibility Analysis of 3D Complex Landscapes. [Citation Graph (, )][DBLP]


  125. Study on the Chaotic Wave. [Citation Graph (, )][DBLP]


  126. An approach to integral input-to-state stabilization via satisficing strategy. [Citation Graph (, )][DBLP]


  127. Energy-level based Routing Algorithm of Multi-sink Sensor Networks. [Citation Graph (, )][DBLP]


  128. A reduced-order nonlinear clutch pressure observer for automatic transmission using ISS. [Citation Graph (, )][DBLP]


  129. Clutch slip control of Automatic Transmission using nonlinear method. [Citation Graph (, )][DBLP]


  130. Nonlinear model predictive control for idle speed control of SI engine. [Citation Graph (, )][DBLP]


  131. Hypothetical Queries on Multidimensional Dataset. [Citation Graph (, )][DBLP]


  132. A New Controller Controlling the Synchronous Communication between Different Chua. [Citation Graph (, )][DBLP]


  133. Efficient Computation of Reverse Skyline on Data Stream. [Citation Graph (, )][DBLP]


  134. Energy Efficient Approximate Top-k Range Queries in Sensor Networks. [Citation Graph (, )][DBLP]


  135. Price Competition for Color TV Supply Chain Based on Stackelberg and Repeated Model Game Theory. [Citation Graph (, )][DBLP]


  136. The Output Competition for Color TV Supply Chain Based on Game Theory. [Citation Graph (, )][DBLP]


  137. Access Control Policy Based on Behavior Patterns. [Citation Graph (, )][DBLP]


  138. A Fuzzy GMDH Network and its Application in Traffic Flow Forecasting. [Citation Graph (, )][DBLP]


  139. Behavior Safety Integration Management and Control System for Coal Enterprises. [Citation Graph (, )][DBLP]


  140. Numerical solution of PDEs via integrated radial basis function networks with adaptive training algorithm. [Citation Graph (, )][DBLP]


  141. Mining non-derivable frequent itemsets over data stream. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.647secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002