The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yan Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ye Li, Yan Chen, Jia-Huan Li
    Research on dynamic supply chain network. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:379-384 [Conf]
  2. Patricia Charlton, Yan Chen, E. H. Mamdani, Olle Olsson, Jeremy V. Pitt, Fergal Somers, Annika Waern
    An Open Agent Architecture for Integrating Multimedia Services. [Citation Graph (0, 0)][DBLP]
    Agents, 1997, pp:522-523 [Conf]
  3. Yan Chen, Zeng-zhi Li, Zhi-gang Liao
    ACDN: Active Content Distribution Network. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:1015-1020 [Conf]
  4. John Kubiatowicz, David Bindel, Yan Chen, Steven E. Czerwinski, Patrick R. Eaton, Dennis Geels, Ramakrishna Gummadi, Sean C. Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Y. Zhao
    OceanStore: An Architecture for Global-Scale Persistent Storage. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:190-201 [Conf]
  5. Yan Chen, Jianbo Ou, Yu Jiang, Xiaofeng Meng
    HStar - A Semantic Repository for Large Scale OWL Documents. [Citation Graph (0, 0)][DBLP]
    ASWC, 2006, pp:415-428 [Conf]
  6. Yan Chen, Zeng-zhi Li, Zhi-gang Liao, Yun-lan Wang
    A Request-Based Approach to Maintain Object Consistency in Content Distribution Network. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:95-100 [Conf]
  7. Zhi-gang Liao, Zeng-zhi Li, Tao Zhan, Yan Chen
    Active Network Approach for Web Caching. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:260-265 [Conf]
  8. Yan Chen, Qing-hong Zhu, Arie E. Kaufman, Shigeru Muraki
    Physically-based Animation of Volumetric Objects. [Citation Graph (0, 0)][DBLP]
    CA, 1998, pp:154-160 [Conf]
  9. Yan Chen, Xuan Du, Xuegong Zhou, Chenglian Peng
    An Automatic Coverage Analysis for SystemC Using UML and Aspect-Oriented Technology. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2004, pp:398-405 [Conf]
  10. Bo Zhou, Yonghui Chen, Weidong Qiu, Yan Chen, Chenglian Peng
    Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:636-645 [Conf]
  11. Yan Chen, Sanjay Kumar Madria, Sourav S. Bhowmick
    DiffXML: Change Detection in XML Data. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2004, pp:289-301 [Conf]
  12. Yan Chen, Sanjay Kumar Madria, Kalpdrum Passi, Sourav S. Bhowmick
    Efficient Processing of XPath Queries Using Indexes. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:721-730 [Conf]
  13. Rui Ding, Xiaodong Liu, Yan Chen
    The Fuzzy Clustering Algorithm Based on AFS Topology. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:89-98 [Conf]
  14. Tao Zhan, Xingshe Zhou, Zhi-gang Liao, Yan Chen
    Active Link: Status Detection Mechanism for Distributed Service Based on Active Networks. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:345-350 [Conf]
  15. Yan Chen, Yi-Ping Phoebe Chen, Jihan Zhu
    Real-Time Gene-Expression Extraction with Fast Classification (FC) Networks. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2004, pp:883-892 [Conf]
  16. Yan Chen, Graham Leedham
    Independent Component Analysis Segmentation Algorithm. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:680-684 [Conf]
  17. Graham Leedham, Yan Chen, Kalyan Takru, Joie Hadi Nata Tan, Li Mian
    Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2003, pp:859-0 [Conf]
  18. Yan Gao, Zhichun Li, Yan Chen
    A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:39- [Conf]
  19. Zhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan
    A Study of Secure Communications between Mobile Objects. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:377-383 [Conf]
  20. Yufei Sun, Yan Chen, Yuzhi Zhang, Yanxia Li
    Automated Seeded Region Growing Method for Document Image Binarization Based on Topographic Features. [Citation Graph (0, 0)][DBLP]
    ICIAR (2), 2004, pp:200-208 [Conf]
  21. Chun-Hou Zheng, Li Shang, Yan Chen, Zhi-Kai Huang
    Penalized Independent Component Discriminant Method for Tumor Classification. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:494-503 [Conf]
  22. Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz
    Quantifying Network Denial of Service: A Location Service Case Study. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:340-351 [Conf]
  23. Yan Chen, Xiaoyan Sun, Feng Wu, Zhengkai Liu, Shipeng Li
    Spatio-temporal video error concealment using priority-ranked region-matching. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:1050-1053 [Conf]
  24. Jimin Liang, Yan Chen, Haihong Hu, Heng Zhao
    Appearance-Based Gait Recognition Using Independent Component Analysis. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:371-380 [Conf]
  25. Yan Chen, Lili Qiu, Weiyu Chen, Luan Nguyen, Randy H. Katz
    Clustering Web Content for Efficient Replication. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:165-174 [Conf]
  26. Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
    Efficient Hop ID based Routing for Sparse Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:179-190 [Conf]
  27. Yan Chen, Graham Leedham
    The Multistage Approach to Information Extraction in Degraded Document Images. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2004, pp:445-448 [Conf]
  28. Robert T. Schweller, Ashish Gupta, Elliot Parsons, Yan Chen
    Reversible sketches for efficient and accurate change detection over network data streams. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:207-212 [Conf]
  29. Yan Chen, David Bindel, Randy H. Katz
    Tomography-based overlay network monitoring. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:216-231 [Conf]
  30. Balachander Krishnamurthy, Subhabrata Sen, Yin Zhang, Yan Chen
    Sketch-based change detection: methods, evaluation, and applications. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:234-247 [Conf]
  31. Yan Chen, Randy H. Katz, John Kubiatowicz
    Dynamic Replica Placement for Scalable Content Delivery. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:306-318 [Conf]
  32. Lili Qu, Yan Chen
    The Research on RBF Network Structure Optimization and the Application in Transportation Prediction. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:682-687 [Conf]
  33. Yan Chen, Zhiwei Qu, Zhenhua Zhang, Boon-Lock Yeo
    Data Redundancy and Compression Methods for a Disk-Based Network Backup System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:778-785 [Conf]
  34. Yan Chen, Xinyuan Fan, Jian Jiao, Dongmin Wang
    Smart Active Object: A New Object-Oriented Programming Paradigm for Developing Multithreaded Applications. [Citation Graph (0, 0)][DBLP]
    Metainformatics, 2002, pp:90-99 [Conf]
  35. Xiaopeng Fan, Oscar C. Au, Yan Chen, Jiantao Zhou
    Heegard-Berger Video Coding Using LMMSE Estimator. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:122-130 [Conf]
  36. Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica
    The SAHARA Model for Service Composition across Multiple Providers. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:1-14 [Conf]
  37. Yan Chen, Randy H. Katz, John Kubiatowicz
    SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:282-296 [Conf]
  38. Yan Chen, David Bindel, Hanhee Song, Randy H. Katz
    An algebraic approach to practical and scalable overlay network monitoring. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:55-66 [Conf]
  39. Yao Zhao, Yan Chen, David Bindel
    Towards unbiased end-to-end network diagnosis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:219-230 [Conf]
  40. Yao Zhao, Yan Chen, David Bindel
    Towards deterministic network diagnosis. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:387-388 [Conf]
  41. Xiaofeng Meng, Yu Jiang, Yan Chen, Haixun Wang
    XSeq: An Index Infrastructure for Tree Pattern Queries. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2004, pp:941-942 [Conf]
  42. Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez
    Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:32-47 [Conf]
  43. F. Maxwell Harper, Xin Li, Yan Chen, Joseph A. Konstan
    An Economic Model of User Rating in an Online Recommender System. [Citation Graph (0, 0)][DBLP]
    User Modeling, 2005, pp:307-316 [Conf]
  44. Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
    IDGraphs: Intrusion Detection and Analysis Using Histographs. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:5- [Conf]
  45. Shengping He, Qin Zheng, Yan Chen
    Web Pre-fetching Using Adaptive Weight Hybrid-Order Markov Model. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:313-318 [Conf]
  46. XiaoFeng Wang, Jianbo Ou, Xiaofeng Meng, Yan Chen
    Abox Inference for Large Scale OWL-Lite Data. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:30- [Conf]
  47. Yan Chen
    An efficient search algorithm for partially ordered sets. [Citation Graph (0, 0)][DBLP]
    ACST, 2006, pp:91-94 [Conf]
  48. Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
    IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:28-39 [Journal]
  49. Qing-hong Zhu, Yan Chen, Arie E. Kaufman
    Real-time Biomechanically-based Muscle Volume Deformation using FEM. [Citation Graph (0, 0)][DBLP]
    Comput. Graph. Forum, 1998, v:17, n:3, pp:275-284 [Journal]
  50. M. Stella Atkins, Yan Chen, Florina Olariu
    Experiences: Overcoming Data Transfer Bottlenecks across SUN-Transputer Interfaces. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1992, v:5, n:2, pp:159-192 [Journal]
  51. Chun-Hou Zheng, Yan Chen, Xiu-Xia Li, Yi-Xue Li, Yun-Ping Zhu
    Tumor classification based on independent component analysis. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:2, pp:297-310 [Journal]
  52. Sanjay Kumar Madria, Yan Chen, Kalpdrum Passi, Sourav S. Bhowmick
    Efficient processing of XPath queries using indexes. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2007, v:32, n:1, pp:131-159 [Journal]
  53. Cun Xu, Yan Chen
    Classifying image texture with statistical landscape features. [Citation Graph (0, 0)][DBLP]
    Pattern Anal. Appl., 2006, v:8, n:4, pp:321-331 [Journal]
  54. Yan Chen, Ruming Yin, Patrick J. Flynn, Shira Broschat
    Aggressive region growing for speckle reduction in ultrasound images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2003, v:24, n:4-5, pp:677-691 [Journal]
  55. Yan Chen, Khian Hao Lim, Randy H. Katz, Chris Overton
    On the stability of network distance estimation. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2002, v:30, n:2, pp:21-30 [Journal]
  56. Robert J. Calin-Jageman, Akshaye Dhawan, Hong Yang, Hsiu-Chung Wang, Hao Tian, Piyaphol Phoungphol, Chad Frederick, Janaka Balasooriya, Yan Chen, Sushil K. Prasad, Rajshekhar Sunderraman, Ying Zhu, Paul S. Katz
    Development of NeuronBank: A Federation of Customizable Knowledge Bases of Neuronal Circuitry. [Citation Graph (0, 0)][DBLP]
    IEEE SCW, 2007, pp:114-121 [Conf]
  57. Yan Chen, Shingo Mabu, Kotaro Hirasawa, Jinglu Hu
    Trading rules on stock markets using genetic network programming with sarsa learning. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:1503- [Conf]
  58. Shingo Mabu, Yan Chen, Kotaro Hirasawa, Jinglu Hu
    Genetic network programming with actor-critic and its application to stock trading model. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:2263- [Conf]
  59. Yan Chen, Lixian Huang, Lulu Li, Qi Luo, Ying Wang, Jing Xu
    The Experimental Approaches of Assessing the Consistency of User Interface. [Citation Graph (0, 0)][DBLP]
    HCI (1), 2007, pp:420-427 [Conf]
  60. Yan Chen, Tracy Ross, Val Mitchell
    The Need for Technology to Support Creative Information Sharing Whilst Mobile: Identified Activities and Relationship Groups. [Citation Graph (0, 0)][DBLP]
    HCI (15), 2007, pp:50-59 [Conf]
  61. Yan Chen, Qing Luan, Houqiang Li, Oscar C. Au
    Sketch-Guided Texture-Based Image Inpainting. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1997-2000 [Conf]
  62. Yao Zhao, Yan Chen
    A Suite of Schemes for User-Level Network Diagnosis without Infrastructure. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2171-2179 [Conf]
  63. G. Lu, Y. Chen, Stefan Birrer, Fabián E. Bustamante, C. Y. Cheung, X. Li
    End-to-End Inference of Router Packet Forwarding Priority. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1784-1792 [Conf]
  64. Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik
    Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  65. Yan Chen, Oscar C. Au, Chi-Wang Ho, Jiantao Zhou
    Spatio-temporal boundary matching algorithm for temporal error concealment. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  66. Kan Takeuchi, John Lin, Yan Chen, Thomas A. Finholt
    Shake it up baby: scheduling with package auctions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2007, pp:113- [Conf]
  67. Guanding Yu, Zhaoyang Zhang, Yan Chen, Peiliang Qiu
    An Efficient Resource Allocation Algorithm for OFDMA Systems with Multiple Services. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  68. Yue Wang, Michael Halper, Hua Min, Yehoshua Perl, Yan Chen, Kent A. Spackman
    Structural methodologies for auditing SNOMED. [Citation Graph (0, 0)][DBLP]
    Journal of Biomedical Informatics, 2007, v:40, n:5, pp:561-581 [Journal]
  69. Yao Zhao, Yan Chen, Bo Li, Qian Zhang
    Hop ID: A Virtual Coordinate-Based Routing for Sparse Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:9, pp:1075-1089 [Journal]

  70. Research on Numerical Module Identification Approaches. [Citation Graph (, )][DBLP]


  71. A Method of Adaptive Neuron Model (AUILS) and Its Application. [Citation Graph (, )][DBLP]


  72. Formal Verification for High-Assurance Behavioral Synthesis. [Citation Graph (, )][DBLP]


  73. Automating analysis of large-scale botnet probing events. [Citation Graph (, )][DBLP]


  74. Re-examining price as a predictor of answer quality in an online q&a site. [Citation Graph (, )][DBLP]


  75. Botnet Research Survey. [Citation Graph (, )][DBLP]


  76. Fuzzy ontology models using intuitionistic fuzzy set for knowledge sharing on the semantic web. [Citation Graph (, )][DBLP]


  77. ESIDE - embedded system integrated design environment based on Eclipse platform. [Citation Graph (, )][DBLP]


  78. SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks. [Citation Graph (, )][DBLP]


  79. Fast on-line real-time scheduling algorithm for reconfigurable computing. [Citation Graph (, )][DBLP]


  80. Optimizing automatic abstraction refinement for generalized symbolic trajectory evaluation. [Citation Graph (, )][DBLP]


  81. Social Comparisons and Contributions to Online Communities: A Field Experiment on MovieLens. [Citation Graph (, )][DBLP]


  82. Pixel Structure Based on Hausdorff Distance for Human Detection in Outdoor Environments. [Citation Graph (, )][DBLP]


  83. Subspace Analysis Methods plus Motion History Image for Human Action Recognition. [Citation Graph (, )][DBLP]


  84. Exception triggered DoS attacks on wireless networks. [Citation Graph (, )][DBLP]


  85. Automatic Abstraction Refinement for Generalized Symbolic Trajectory Evaluation. [Citation Graph (, )][DBLP]


  86. A Weight Entropy k-Means Algorithm for Clustering Dataset with Mixed Numeric and Categorical Data. [Citation Graph (, )][DBLP]


  87. Definition of Management Zones of Soil Nutrients Based on Spatial Analysis in Cotton Field. [Citation Graph (, )][DBLP]


  88. Knowledge-based interactive design for men's suit. [Citation Graph (, )][DBLP]


  89. Construction of portfolio optimization system using genetic network programming with control nodes. [Citation Graph (, )][DBLP]


  90. Stock trading strategies by genetic network programming with flag nodes. [Citation Graph (, )][DBLP]


  91. Varying portfolio construction of stocks using genetic network programming with control nodes. [Citation Graph (, )][DBLP]


  92. Computer-Based Learning to Improve Breast Cancer Detection Skills. [Citation Graph (, )][DBLP]


  93. Solving Sum and Product Riddle via BDD-Based Model Checking. [Citation Graph (, )][DBLP]


  94. A Novel Algorithm for Faults Acquiring and Locating on Fiber Optic Cable Line. [Citation Graph (, )][DBLP]


  95. Nonrestrictive Concept-Acquisition by Representational Redescription. [Citation Graph (, )][DBLP]


  96. DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement. [Citation Graph (, )][DBLP]


  97. Human Action Recognition by Radon Transform. [Citation Graph (, )][DBLP]


  98. Intelligent Computing Applications Based on Eye Gaze: Their Role in Medical Image Interpretation. [Citation Graph (, )][DBLP]


  99. On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT). [Citation Graph (, )][DBLP]


  100. Adaptively Switching Between Directional Interpolation and Region Matching for Spatial Error Concealment Based on DCT Coefficients. [Citation Graph (, )][DBLP]


  101. Maximum a Posteriori Based (MAP-Based) Video Denoising VIA Rate Distortion Optimization. [Citation Graph (, )][DBLP]


  102. Wyner-Ziv Successive Refinement of Video and Rate Distortion Analysis. [Citation Graph (, )][DBLP]


  103. Knowledge Acquisition Approach Based on Rough Set and Artificial Neural Network in Product Design Process. [Citation Graph (, )][DBLP]


  104. Study on the Problem of Assessment Level of Experts in Multi-attribute Group Decision Making. [Citation Graph (, )][DBLP]


  105. Internet Cache Pollution Attacks and Countermeasures. [Citation Graph (, )][DBLP]


  106. Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. [Citation Graph (, )][DBLP]


  107. Automated Promotion Machine: Emerging IS for the Retail Industry in China. [Citation Graph (, )][DBLP]


  108. A Study on Self-adaptive Heterogeneous Data Integration Systems. [Citation Graph (, )][DBLP]


  109. The Research and Application of Web Services in Enterprise Application Integration. [Citation Graph (, )][DBLP]


  110. Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method. [Citation Graph (, )][DBLP]


  111. Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints. [Citation Graph (, )][DBLP]


  112. Measurement and Diagnosis of Address Misconfigured P2P Traffic. [Citation Graph (, )][DBLP]


  113. Evaluating Potential Routing Diversity for Internet Failure Recovery. [Citation Graph (, )][DBLP]


  114. Bidirectionally decodable Wyner-Ziv video coding. [Citation Graph (, )][DBLP]


  115. A Hybrid MCDM Method for Route Selection of Multimodal Transportation Network. [Citation Graph (, )][DBLP]


  116. Information Integration Approach to Vendor Selection Group Decision Making under Multiple Criteria. [Citation Graph (, )][DBLP]


  117. Mammographic Interpretation Training: How Could Low Cost Display Devices Help? [Citation Graph (, )][DBLP]


  118. BotGraph: Large Scale Spamming Botnet Detection. [Citation Graph (, )][DBLP]


  119. WebProphet: Automating Performance Prediction for Web Services. [Citation Graph (, )][DBLP]


  120. Social Comparisons to Motivate Contributions to an Online Community. [Citation Graph (, )][DBLP]


  121. CEAL: a C-based language for self-adjusting computation. [Citation Graph (, )][DBLP]


  122. Exploring Concepts' Semantic Relations for Clustering-Based Query Senses Disambiguation. [Citation Graph (, )][DBLP]


  123. Generic and automatic address configuration for data center networks. [Citation Graph (, )][DBLP]


  124. NetShield: massive semantics-based vulnerability signature matching for high-speed networks. [Citation Graph (, )][DBLP]


  125. A Portfolio Selection Model using Genetic Relation Algorithm and Genetic Network Programming. [Citation Graph (, )][DBLP]


  126. Neural Network and Genetic Algorithm-based Hybrid Approach to Dynamic Job Shop Scheduling Problem. [Citation Graph (, )][DBLP]


  127. Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers. [Citation Graph (, )][DBLP]


  128. A Query Substitution-Search Result Refinement Approach for Long Query Web Searches. [Citation Graph (, )][DBLP]


  129. study on human behaviour retrieval. [Citation Graph (, )][DBLP]


  130. A Novel Resource Allocation Algorithm for Real-time Services in Multiuser OFDM Systems. [Citation Graph (, )][DBLP]


  131. Stock trading rules using genetic network programming with actor-critic. [Citation Graph (, )][DBLP]


  132. Genetic network programming with sarsa learning and its application to creating stock trading rules. [Citation Graph (, )][DBLP]


  133. Real Time Updating Genetic Network Programming for adapting to the change of stock prices. [Citation Graph (, )][DBLP]


  134. Constructing portfolio investment strategy based on Time Adapting Genetic Network Programming. [Citation Graph (, )][DBLP]


  135. Filtering Spam by Using Factors Hyperbolic Tree. [Citation Graph (, )][DBLP]


  136. On the Eyeshots of BGP Vantage Points. [Citation Graph (, )][DBLP]


  137. Sequence-matching-based feature extraction with applications to signature verification. [Citation Graph (, )][DBLP]


  138. A word language model based contextual language processing on Chinese character recognition. [Citation Graph (, )][DBLP]


  139. Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users. [Citation Graph (, )][DBLP]


  140. A Monte Carlo Reliability Study of the Assessment of Chemotherapy Responses in Ovarian Cancer Treatment. [Citation Graph (, )][DBLP]


  141. Dynamic Modeling of Large Scale Heavy Duty Grippers Based on the Response Dead Zone of Counteracting Force. [Citation Graph (, )][DBLP]


  142. Real-Time Simulation System of Virtual Picking Manipulator Based on Parametric Design. [Citation Graph (, )][DBLP]


  143. Study of Modeling and Simulating for Picking Manipulator Based on Modelica. [Citation Graph (, )][DBLP]


  144. Extracting key postures in a human action video sequence. [Citation Graph (, )][DBLP]


  145. Pedestrian detection using hybrid statistical feature. [Citation Graph (, )][DBLP]


  146. Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks. [Citation Graph (, )][DBLP]


  147. Biomedical Image Processing: A Cross-Discipline Course for Undergraduate Computer Science and Technology Major. [Citation Graph (, )][DBLP]


  148. Using dynamic programming to match human behavior sequences. [Citation Graph (, )][DBLP]


  149. Low complexity precoder design for delay sensitive multi-stream MIMO systems. [Citation Graph (, )][DBLP]


  150. Power-Aware Cooperative Relay Selection Strategies in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  151. Fuzzy Clustering Ensemble Algorithm for Partitioning Categorical Data. [Citation Graph (, )][DBLP]


  152. Trade Surplus Analysis Using Self-Organizing Data Mining Based on GMDH Principle. [Citation Graph (, )][DBLP]


  153. Simultaneous RD-optimized rate control and video de-noising. [Citation Graph (, )][DBLP]


  154. A game-theoretic framework for multi-user multimedia rate allocation. [Citation Graph (, )][DBLP]


  155. Risk-distortion analysis for video collusion attack. [Citation Graph (, )][DBLP]


  156. An Embedded Intrusion Detection System Model for Application Program. [Citation Graph (, )][DBLP]


  157. Pollution attacks and defenses for Internet caching systems. [Citation Graph (, )][DBLP]


  158. FAD and SPA: End-to-end link-level loss rate inference without infrastructure. [Citation Graph (, )][DBLP]


  159. HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency. [Citation Graph (, )][DBLP]


  160. A model of portfolio optimization using time adapting genetic network programming. [Citation Graph (, )][DBLP]


  161. Constructing Linear Codes with Good Joint Spectra [Citation Graph (, )][DBLP]


  162. Overlaid Cellular and Mobile Ad Hoc Networks [Citation Graph (, )][DBLP]


  163. Spectrum Sharing Between Cellular and Mobile Ad Hoc Networks: Transmission-Capacity Trade-Off [Citation Graph (, )][DBLP]


  164. Delay-Optimal Power and Precoder Adaptation for Multi-stream MIMO Systems [Citation Graph (, )][DBLP]


  165. Constructing Linear Codes with Good Spectra [Citation Graph (, )][DBLP]


  166. Protocol design and stability/delay analysis of half-duplex buffered cognitive relay systems [Citation Graph (, )][DBLP]


  167. Some results on the spectral radii of bicyclic graphs. [Citation Graph (, )][DBLP]


Search in 1.615secs, Finished in 1.620secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002