Search the dblp DataBase
Bo Yang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yu Li , Meiyun Zuo , Bo Yang Analysis and design of e-supermarket shopping recommender system. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:777-779 [Conf ] Bo Yang , Hongjiao Fu , Meiyun Zuo The integration mechanism of IT outsourcing partnership. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:801-803 [Conf ] Bo Yang , Meiyun Zuo , Xiantao Yao A case study of disaster backup outsourcing of SDB and Hi Sun. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:795-797 [Conf ] Bo Yang Self-Organizing Network Evolving Model for Mining Network Community Structure. [Citation Graph (0, 0)][DBLP ] ADMA, 2006, pp:404-415 [Conf ] Yuehui Chen , Jiwen Dong , Bo Yang Automatic Design of Hierarchical TS-FS Model Using Ant Programming and PSO Algorithm. [Citation Graph (0, 0)][DBLP ] AIMSA, 2004, pp:285-294 [Conf ] Bo Yang , Ali R. Hurson Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:629-634 [Conf ] Zhonglai Wang , Jingqi Xiong , Qiang Miao , Bo Yang , Dan Ling New Hybrid Real-Coded Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] Australian Conference on Artificial Intelligence, 2006, pp:1221-1225 [Conf ] Hongyu Zhang , Stan Jarzabek , Bo Yang Quality Prediction and Assessment for Product Lines. [Citation Graph (0, 0)][DBLP ] CAiSE, 2003, pp:681-695 [Conf ] Bo Yang , Ali R. Hurson Cooperative caching for k-NN search in ad hoc networks. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:333-334 [Conf ] Xixiang Lv , Bo Yang Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:1092-1097 [Conf ] Yuqing Zhang , Zhiling Wang , Bo Yang The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:137-142 [Conf ] Bo Yang , Ramesh Karri Power optimization for universal hash function data path using divide-and-concatenate technique. [Citation Graph (0, 0)][DBLP ] CODES+ISSS, 2005, pp:219-224 [Conf ] Jun Liu , Bo Yang , Wei Lu A Web Services based Communication Services Framework for Collaborative Work. [Citation Graph (0, 0)][DBLP ] Computer Supported Activity Coordination, 2005, pp:109-117 [Conf ] Bo Yang , Xiangbo Ze , Luning Liu A New Task Assignment Approach in Concurrent Engineering. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:499-504 [Conf ] Jing Li , Tan Yan , Bo Yang , Juebang Yu , Chunhui Li A packing algorithm for non-manhattan hexagon/triangle placement design by using an adaptive o-tree representation. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:646-651 [Conf ] Bo Yang , Ramesh Karri , David A. McGrew Divide-and-concatenate: an architecture level optimization technique for universal hash functions. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:614-617 [Conf ] Bo Yang , Kaijie Wu , Ramesh Karri Secure scan: a design-for-test architecture for crypto chips. [Citation Graph (0, 0)][DBLP ] DAC, 2005, pp:135-140 [Conf ] Yuehui Chen , Bo Yang , Ajith Abraham Optimal design of hierarchical wavelet networks for time-series forecasting. [Citation Graph (0, 0)][DBLP ] ESANN, 2006, pp:155-160 [Conf ] Bo Yang , Nikhil Joshi , Ramesh Karri A constant array multiplier core generator with dynamic partial evaluation architecture selection (abstract only). [Citation Graph (0, 0)][DBLP ] FPGA, 2005, pp:280- [Conf ] Bo Yang , Ramesh Karri , David A. McGrew Divide and concatenate: a scalable hardware architecture for universal MAC. [Citation Graph (0, 0)][DBLP ] FPGA, 2004, pp:258- [Conf ] Yuehui Chen , Ajith Abraham , Ju Yang , Bo Yang Hybrid Methods for Stock Index Modeling. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:1067-1070 [Conf ] Yuqing Zhang , Xiuying Liu , Bo Yang Running-mode Analysis of the SSL Protocol. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2005, pp:308-311 [Conf ] Yuan Zhang , Bo Yang Delay-Constrained Multicasting with Power-Control in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:529-538 [Conf ] Bo Yang , Shixiong Zhu , Yumin Wang Unconditionally-Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:35-41 [Conf ] Yuehui Chen , Mingjun Liu , Bo Yang Breast Cancer Detection Using Hierarchical B-Spline Networks. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2006, pp:25-28 [Conf ] Ye Tao , Hong-Zhong Huang , Bo Yang An Interactive Preference-Weight Genetic Algorithm for Multi-criterion Satisficing Optimization. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2006, pp:643-652 [Conf ] Bo Yang , Yadong Wang , Xiaohong Su Research and Design of Distributed Neural Networks with Chip Training Algorithm. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2005, pp:213-216 [Conf ] Bo Yang , Jianxin Liao , Xiaomin Zhu Two-Level Proxy: The Media Streaming Cache Architecture for GPRS Mobile Network. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:852-861 [Conf ] Yuehui Chen , Yan Wang , Bo Yang Evolving Hierarchical RBF Neural Networks for Breast Cancer Detection. [Citation Graph (0, 0)][DBLP ] ICONIP (3), 2006, pp:137-144 [Conf ] Bo Yang , Lizhi Peng , Yuehui Chen , Hanxing Liu , Runzhang Yuan A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICONIP (3), 2006, pp:209-216 [Conf ] Bo Yang , Ali R. Hurson A Content-Aware Multimedia Accessing Model in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2005, pp:613-619 [Conf ] Hasan Ural , Bo Yang Modeling Software for Accurate Data Flow Representation. [Citation Graph (0, 0)][DBLP ] ICSE, 1993, pp:277-286 [Conf ] Yuehui Chen , Bo Yang , Jiwen Dong Evolving Flexible Neural Networks Using Ant Programming and PSO Algorithm. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2004, pp:211-216 [Conf ] Bo Yang , Xinping Guan A Neural Network Adaptive Controller for Explicit Congestion Control with Time Delay. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2004, pp:71-76 [Conf ] Wenbo Zhang , Bo Yang , Beihong Jin , Ningjing Chen , Tao Huang Performance Tuning for Application Server OnceAS. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:451-462 [Conf ] Bo Yang , Kaijie Wu , Ramesh Karri Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard. [Citation Graph (0, 0)][DBLP ] ITC, 2004, pp:339-344 [Conf ] Bo Yang , Ali R. Hurson Similarity Search in Ad Hoc Networks Using Semantic-Based Caching. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:115-122 [Conf ] Bo Yang , Ali R. Hurson , Yu Jiao On the Content Predictability of Cooperative Image Caching in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] MDM, 2006, pp:8- [Conf ] Hong Cai , Wei Lu , Bo Yang , Lihua Tang Session Initiation Protocol and Web Services for Next Generation Multimedia Applications. [Citation Graph (0, 0)][DBLP ] ISMSE, 2002, pp:70-0 [Conf ] Bo Yang , Ali R. Hurson Content-aware search of multimedia data in ad hoc networks. [Citation Graph (0, 0)][DBLP ] MSWiM, 2005, pp:103-110 [Conf ] Bo Yang , Ali R. Hurson Multimedia Semantics Integration Using Linguistic Model. [Citation Graph (0, 0)][DBLP ] PAKDD, 2006, pp:679-688 [Conf ] Naian Liu , Xiaohui Li , Changxing Pei , Bo Yang Delay Character of a Novel Architecture for IEEE 802.16 Systems. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:293-296 [Conf ] Xixiang Lv , Bo Yang , Changxing Pei Efficient Traitor Tracing Scheme Based On NTRU. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:120-124 [Conf ] He Huang , Jin Wang , Bo Yang , Peng Li Multi-Class MPLS Resilience Mechanism Supporting Traffic Engineering. [Citation Graph (0, 0)][DBLP ] PDCAT, 2006, pp:393-398 [Conf ] Yuehui Chen , Bo Yang , Jin Zhou Automatic Design of Hierarchical RBF Networks for System Identification. [Citation Graph (0, 0)][DBLP ] PRICAI, 2006, pp:1191-1195 [Conf ] Bo Yang , Han Li , Yi Li , Shaojun Yang A Hybrid Intrusion Detection Strategy Used for Web Security. [Citation Graph (0, 0)][DBLP ] RSFDGrC, 2003, pp:730-733 [Conf ] Wei-Ming Lin , Wei Xie , Bo Yang Performance analysis for parallel solutions to generic search problems. [Citation Graph (0, 0)][DBLP ] SAC, 1997, pp:422-430 [Conf ] Bo Yang , Hasan Ural Protocol Conformance Test Generation Using Multiple UIO Sequences With Overlapping. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1990, pp:118-125 [Conf ] Bo Yang , Ali R. Hurson Supporting Semantic-Based Multimedia Data Access in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2005, pp:264-269 [Conf ] Bo Yang , Ali R. Hurson , Yu Jiao , Thomas E. Potok Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2006, pp:332-338 [Conf ] Jiachun Wu , Hao Zhang , Jianxin Liao , Xiaomin Zhu , Bo Yang Modeling and Analysis for an Enhanced Three-Tier Dynamic Location Management in 3G. [Citation Graph (0, 0)][DBLP ] WASA, 2006, pp:652-663 [Conf ] Weimin Zheng , Fengzhou Zheng , Bo Yang , Yanling Wang A Java Virtual Machine Design Based on Hybrid Concurrent Compilation Model. [Citation Graph (0, 0)][DBLP ] TOOLS (36), 2000, pp:18-23 [Conf ] Lin Cong , Bo Yang , Yang Chen , Guohan Lu , Beixing Deng , Xing Li , Ye Wang NTS6: IPv6 based Network Topology Service System of CERNET2. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1010-1015 [Conf ] Bo Yang , Gang Feng , Chengnian Long , Xinping Guan Maximum lifetime rate control and random access in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:18, pp:3844-3855 [Journal ] Bo Yang , Tong Zhang , Changxing Pei The effect of side-information on smooth entropy. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:136, n:1, pp:151-157 [Journal ] Yuehui Chen , Bo Yang , Jiwen Dong Nonlinear System Modelling Via Optimal Design Of Neural Trees. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 2004, v:14, n:2, pp:125-137 [Journal ] Yuehui Chen , Bo Yang , Jiwen Dong Time-series prediction using a local linear wavelet neural network. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2006, v:69, n:4-6, pp:449-465 [Journal ] Yuehui Chen , Bo Yang , Ajith Abraham Flexible neural trees ensemble for stock index modeling. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2007, v:70, n:4-6, pp:697-703 [Journal ] Yuehui Chen , Ajith Abraham , Bo Yang Feature selection and classification using flexible neural tree. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2006, v:70, n:1-3, pp:305-313 [Journal ] Yong Li , Bo Yang , Xiang Hua An Efficient Anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Hasan Ural , Bo Yang A Structural Test Selection Criterion. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1988, v:28, n:3, pp:157-163 [Journal ] Yuehui Chen , Bo Yang , Jiwen Dong , Ajith Abraham Time-series forecasting using flexible neural tree model. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2005, v:174, n:3-4, pp:219-235 [Journal ] Shesheng Gao , Zhenlong Zhang , Bo Yang The random weighting estimate of quantile process. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2004, v:164, n:1-4, pp:139-146 [Journal ] Zhigang Zhu , Guangyou Xu , Bo Yang , Dingji Shi , Xueyin Lin VISATRAM: a real-time vision system for automatic traffic monitoring. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2000, v:18, n:10, pp:781-794 [Journal ] Ma Jun , Bo Yang , Shaohan Ma A Practical Algorithm for the Minimum Rectilinear Steiner Tree. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2000, v:15, n:1, pp:96-99 [Journal ] Bo Yang , Fengzhou Zheng , Dingxing Wang , Weimin Zheng Interactive and Symbolic Data Dependence Analysis Based on Ranges of Expressions. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:2, pp:160-171 [Journal ] Bo Yang , Da-you Liu Force-Based Incremental Algorithm for Mining Community Structure in Dynamic Network. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:3, pp:393-400 [Journal ] Xinping Guan , Bo Yang , Chengnian Long , Zhixin Liu Congestion control based on optimal problem for long range dependence network. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:3, pp:215-226 [Journal ] Bo Yang , Liu Dongsu , Yumin Wang An anonymity-revoking e-payment system with a smart card. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2002, v:3, n:4, pp:291-296 [Journal ] Bo Yang , Ali R. Hurson Similarity-based clustering strategy for mobile ad hoc multimedia databases. [Citation Graph (0, 0)][DBLP ] Mobile Information Systems, 2005, v:1, n:4, pp:253-273 [Journal ] Kun Yang , Xin Guo , Alex Galis , Bo Yang , Dayou Liu Towards efficient resource on-demand in Grid Computing. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2003, v:37, n:2, pp:37-43 [Journal ] Nikhil Joshi , Jayachandran Sundararajan , Kaijie Wu , Bo Yang , Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2006, v:55, n:10, pp:1230-1239 [Journal ] Bo Yang , Ramesh Karri , David A. McGrew Divide-and-concatenate: an architecture-level optimization technique for universal hash functions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:11, pp:1740-1747 [Journal ] Bo Yang , Kaijie Wu , Ramesh Karri Secure Scan: A Design-for-Test Architecture for Crypto Chips. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:10, pp:2287-2293 [Journal ] Min Xie , Bo Yang A Study of the Effect of Imperfect Debugging on Software Development Cost. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:5, pp:471-473 [Journal ] Darshan Sonecha , Bo Yang , Ramesh Karri , David A. McGrew High speed architectures for Leviathan: a binary tree based stream cipher. [Citation Graph (0, 0)][DBLP ] Microprocessors and Microsystems, 2004, v:28, n:10, pp:573-584 [Journal ] Bo Yang , Yadong Wang , Xiaohong Su , Xianglong Tang Neural Networks' Distributed Cooperative Learning Strategy Based on Agent and Chips. [Citation Graph (0, 0)][DBLP ] Journal of Computer Research and Development, 2006, v:43, n:12, pp:2096-2103 [Journal ] Jiafei Li , Dayou Liu , Bo Yang Process Mining: Extending alpha -Algorithm to Mine Duplicate Tasks in Process Logs. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM Workshops, 2007, pp:396-407 [Conf ] Yong Yu , Bo Yang , Xinyi Huang , Mingwu Zhang Efficient Identity-Based Signcryption Scheme for Multiple Receivers. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:13-21 [Conf ] Bo Yang , Yong Yu , Fagen Li , Ying Sun Provably Secure Identity-Based Threshold Unsigncryption Scheme. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:114-122 [Conf ] Bo Yang , Yun-ping Chen , Zun-lian Zhao , Qi-ye Han A Novel DC Nodal Pricing Method Based on Linear Programming in Competitive Electricity Market. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:1012-1015 [Conf ] Bo Yang , Yun-ping Chen , Zun-lian Zhao , Qi-ye Han Forecasting of Market Clearing Price by Using GA Based Neural Network. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2007, pp:1278-1286 [Conf ] Bo Yang , Hao Wang , Liang Liu , Qian Ma , Ying Chen , Hui Lei Research and Implementation of Knowledge-Enhanced Information Services. [Citation Graph (0, 0)][DBLP ] ICSOC, 2007, pp:462-473 [Conf ] Chung-Ching Shen , Roni Kupershtok , Bo Yang , Felice Maria Vanin , Xi Shao , Datta Sheth , Neil Goldsman , Quirino Balzano , Shuvra S. Bhattacharyya Compact, Low Power Wireless Sensor Network System for Line Crossing Recognition. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:2506-2509 [Conf ] Lin Wang , Bo Yang , Zhenxiang Chen , Ajith Abraham , Lizhi Peng A Novel Improvement of Neural Network Classification Using Further Division of Partition Space. [Citation Graph (0, 0)][DBLP ] IWINAC (1), 2007, pp:214-223 [Conf ] Xueliang Liu , Tao Mei , Xian-Sheng Hua , Bo Yang , He-Qin Zhou Video collage. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2007, pp:461-462 [Conf ] Bo Yang , Jiming Liu An Efficient Probabilistic Approach to Network Community Mining. [Citation Graph (0, 0)][DBLP ] RSKT, 2007, pp:267-275 [Conf ] Tao Mei , Bo Yang , Xian-Sheng Hua , Linjun Yang , Shi-Qiang Yang , Shipeng Li VideoReach: an online video recommendation system. [Citation Graph (0, 0)][DBLP ] SIGIR, 2007, pp:767-768 [Conf ] Yi Liu , Mingxiu Li , Bo Yang , Depei Qian , Weiguo Wu Handover for Seamless Stream Media in Mobile IPv6 Network. [Citation Graph (0, 0)][DBLP ] WWIC, 2007, pp:55-66 [Conf ] Bo Yang , Jiming Liu An Autonomy Oriented Computing (AOC) Approach to Distributed Network Community Mining. [Citation Graph (0, 0)][DBLP ] SASO, 2007, pp:151-160 [Conf ] Xiaofeng Tong , Tao Wang , Wenlong Li , Yimin Zhang , Bo Yang , Fei Wang , Lifeng Sun , Shiqiang Yang A Three-Level Scheme for Real-Time Ball Tracking. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:161-171 [Conf ] Bo Yang , Da-you Liu A Heuristic Clustering Algorithm for Mining Communities in Signed Networks. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:2, pp:320-328 [Journal ] Bo Yang , Zhongliang Jing A Simple Method to Build Oversampled Filter Banks and Tight Frames. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2007, v:16, n:11, pp:2682-2687 [Journal ] Bo Yang , Ali R. Hurson Semantic-Aware and QoS-Aware Image Caching in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:12, pp:1694-1707 [Journal ] Bo Yang , William Cheung , Jiming Liu Community Mining from Signed Social Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:10, pp:1333-1348 [Journal ] O. Gaudoin , Bo Yang , Min Xie A simple goodness-of-fit test for the power-law process, based on the Duane plot. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Reliability, 2003, v:52, n:1, pp:69-74 [Journal ] A Novel Rate Control Scheme for H.264/AVC Based on Scene Change. [Citation Graph (, )][DBLP ] A Novel Two-Server Password Authentication Scheme with Provable Security. [Citation Graph (, )][DBLP ] X-RIME: Cloud-Based Large Scale Social Network Analysis. [Citation Graph (, )][DBLP ] Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. [Citation Graph (, )][DBLP ] A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square. [Citation Graph (, )][DBLP ] Efficient Certificateless Strong Designated Verifier Signature Scheme. [Citation Graph (, )][DBLP ] A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card. [Citation Graph (, )][DBLP ] Online video recommendation based on multimodal fusion and relevance feedback. [Citation Graph (, )][DBLP ] Co-DARFAD - the Collaborative Mechanical Product Design System. [Citation Graph (, )][DBLP ] A flow-based network monitoring system used for CSCW in design. [Citation Graph (, )][DBLP ] Adaptive Lifting Scheme for Image Compression. [Citation Graph (, )][DBLP ] An Efficient Frequent Pattern Mining Algorithm. [Citation Graph (, )][DBLP ] Network Traffic Classification Based on Error-Correcting Output Codes and NN Ensemble. [Citation Graph (, )][DBLP ] Probability-possibility transformation for small sample size data. [Citation Graph (, )][DBLP ] STI stress aware placement optimization based on geometric programming. [Citation Graph (, )][DBLP ] Incremental buffer insertion and module resizing algorithm using geometric programming. [Citation Graph (, )][DBLP ] High Accuracy and Reliability Integrated Navigation Method for Long-Endurance Aircraft. [Citation Graph (, )][DBLP ] Cooperative Caching for Multimedia Data Access in Sensor Networks. [Citation Graph (, )][DBLP ] Event Detection in Video Stream. [Citation Graph (, )][DBLP ] Rule-Based On-Line Feature Interaction Detection for IMS Call Control Services. [Citation Graph (, )][DBLP ] Flow Management for SIP Application Servers. [Citation Graph (, )][DBLP ] Knowledge Enhanced IT Service Management. [Citation Graph (, )][DBLP ] Research on Sampling Methods in Particle Filtering Based upon Microstructure of State Variable. [Citation Graph (, )][DBLP ] Analysis and Improvement of an ID-Based Anonymous Signcryption Model. [Citation Graph (, )][DBLP ] Multiple Kernel Learning Using Regularized Ho-Kashyap Classifier in Empirical Kernel Mapping Space. [Citation Graph (, )][DBLP ] Identification for Orange Quality with FTIR-CWT-SVM. [Citation Graph (, )][DBLP ] Influence of Organizational Boundary on Psychological Empowerment in Multi-organization Network. [Citation Graph (, )][DBLP ] Footprint Calculation for a Reusable Launch Vehicle Based on Dynamics Programming. [Citation Graph (, )][DBLP ] Traffic classification using probabilistic neural networks. [Citation Graph (, )][DBLP ] Design and development of a 3-axis MRI-compatible force sensor. [Citation Graph (, )][DBLP ] Management as a Service for IT Service Management. [Citation Graph (, )][DBLP ] Progressive Content-Sensitive Data Retrieval in Sensor Networks. [Citation Graph (, )][DBLP ] Applying Knowledge Sharing for Business Intelligence Collaboration. [Citation Graph (, )][DBLP ] Analysis of E-Government Outsourcing. [Citation Graph (, )][DBLP ] Rate-based SIP flow management for SLA satisfaction. [Citation Graph (, )][DBLP ] Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. [Citation Graph (, )][DBLP ] Fast Shape Optimization of Metallization Patterns for DMOS Based Driver. [Citation Graph (, )][DBLP ] Free-Shaped Video Collage. [Citation Graph (, )][DBLP ] Testing-Resource Allocation for Redundant Software Systems. [Citation Graph (, )][DBLP ] ID-based threshold signature and mediated signature schemes. [Citation Graph (, )][DBLP ] A Reputation System with Privacy and Incentive. [Citation Graph (, )][DBLP ] Using Trust Metric to Detect Malicious Behaviors in WSNs. [Citation Graph (, )][DBLP ] A provably secure ID-based mediated signcryption scheme. [Citation Graph (, )][DBLP ] On Modularity of Social Network Communities: The Spectral Characterization. [Citation Graph (, )][DBLP ] Automatic Semantic Web Service Composition via Agent Intention Execution in AgentSpeak. [Citation Graph (, )][DBLP ] Hermite Transform Based Orientation Estimation In Directional Texture. [Citation Graph (, )][DBLP ] A Novel Fast Mode Decision Scheme for Spatial Scalable Video Coding. [Citation Graph (, )][DBLP ] Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. [Citation Graph (, )][DBLP ] Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. [Citation Graph (, )][DBLP ] Typhoon Cloud Image Enhancement by Differential Evolution Algorithm and Arc-Tangent Transformation. [Citation Graph (, )][DBLP ] A Linear In-situ Algorithm for the Power of Cyclic Permutation. [Citation Graph (, )][DBLP ] Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. [Citation Graph (, )][DBLP ] SIP Parsing Offload: Design and Performance. [Citation Graph (, )][DBLP ] Data collection system for link analysis. [Citation Graph (, )][DBLP ] A Reduction Method of Three-Dimensional Point Cloud. [Citation Graph (, )][DBLP ] Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. [Citation Graph (, )][DBLP ] Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application. [Citation Graph (, )][DBLP ] Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. [Citation Graph (, )][DBLP ] Hybrid Neurocomputing for Breast Cancer Detection. [Citation Graph (, )][DBLP ] A Bayesian knowledge engineering framework for service management. [Citation Graph (, )][DBLP ] Knowledge-enhanced change audit for configuration management. [Citation Graph (, )][DBLP ] TANSO: A componentized distributed service foundation in cloud environment. [Citation Graph (, )][DBLP ] A Particle Filtering for 3D Human Hand Tracking. [Citation Graph (, )][DBLP ] Random Access in Wireless Ad Hoc Networks for Throughput Maximization. [Citation Graph (, )][DBLP ] Global stability with time delay in optimization flow control. [Citation Graph (, )][DBLP ] Hermite Transform Based Operators for Orientation Estimation. [Citation Graph (, )][DBLP ] What can linear state feedback accomplish for nonlinear systems? [Citation Graph (, )][DBLP ] Fair resource allocation using bargaining over OFDMA relay networks. [Citation Graph (, )][DBLP ] Performance Evaluation of Cloud Service Considering Fault Recovery. [Citation Graph (, )][DBLP ] The Techno-Economic Analysis of Reducing NOx of Industrial Boiler by Recycled Flue Gas. [Citation Graph (, )][DBLP ] A Context-Aware Service Matchmaking Method Using Description Logic. [Citation Graph (, )][DBLP ] A Multi-Agent Based Decentralized Algorithm for Social Network Community Mining. [Citation Graph (, )][DBLP ] New Algorithm for Computing the Core Based on Information Entropy. [Citation Graph (, )][DBLP ] The Robust Likelihood Model of State Measurement and Its Applications in Articulated Object Tracking. [Citation Graph (, )][DBLP ] Bus Travel Transit Path Query Algorithm Based on Ant Algorithm. [Citation Graph (, )][DBLP ] Research of Integrative GNC Design Simulation for Cruise Missile. [Citation Graph (, )][DBLP ] Topic mining on web-shared videos. [Citation Graph (, )][DBLP ] An autonomy-oriented computing approach to community mining in distributed and dynamic networks. [Citation Graph (, )][DBLP ] Online hybrid traffic classifier for Peer-to-Peer systems based on network processors. [Citation Graph (, )][DBLP ] BLogo: a tool for visualization of bias in biological sequences. [Citation Graph (, )][DBLP ] Distributed power control and random access for spectrum sharing with QoS constraint. [Citation Graph (, )][DBLP ] A Unified Framework for Pricing Credit and Equity Derivatives [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.030secs