The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chwan-Hwa John Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chwan-Hwa John Wu, Jyun-Hwei Tsai
    An Asynchronous Relaxation Method for the Parallel Simulation of the Learning of Recurrent Neural Networks. [Citation Graph (0, 0)][DBLP]
    PPSC, 1991, pp:174-179 [Conf]
  2. Chwan-Hwa John Wu, Fongray Frank Young, Nian-Feng Tzeng
    Shorten Turnaround Time for Two-Dimensional Plasma Processing Simulations via Vectorization and Parallelization Techniques. [Citation Graph (0, 0)][DBLP]
    PPSC, 1995, pp:237-238 [Conf]
  3. Fongray Frank Young, Chwan-Hwa John Wu
    A Fully-Vectorized Code for Nonequilibrium RF Glow Discharge Modeling and its Parallel Processing on a Cray X-MP. [Citation Graph (0, 0)][DBLP]
    SC, 1992, pp:424-432 [Conf]
  4. Fongray Frank Young, Chwan-Hwa John Wu
    Using dipole receptive fields for the reconstruction of printed characters. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 1994, v:6, n:3, pp:327-342 [Journal]
  5. Chwan-Hwa John Wu, Chia-Jiu Wang, Heng-Ming Tai
    Application of Exponential Hetero-Associative Memory on Frequency Classifier. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1990, v:35, n:6, pp:305-311 [Journal]
  6. Chwan-Hwa John Wu, Jyun-Hwei Tsai
    Concurrent Asynchronous Learning Algorithms for Massively Parallel Recurrent Neural Networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1992, v:14, n:3, pp:345-353 [Journal]
  7. Nian-Feng Tzeng, Po-Jen Chuang, Chwan-Hwa John Wu
    Creating Disjoint Paths in Gamma Interconnection Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1993, v:42, n:10, pp:1247-1252 [Journal]

  8. Intrusion-resilient, DDoS-resistant and agent-assisted network security system. [Citation Graph (, )][DBLP]


  9. Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). [Citation Graph (, )][DBLP]


  10. Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. [Citation Graph (, )][DBLP]


  11. Defending against data forwarding misbehavior in sensor networks by quasimultipath technique: models and simulation. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002