The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhi Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao
    PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:357-362 [Conf]
  2. Bo Yu, Jianqing Ma, Zhi Wang, Dilin Mao, Chuanshan Gao
    Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:196-205 [Conf]
  3. Feng Xia, Zhi Wang, Youxian Sun
    Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:117-125 [Conf]
  4. Lei Zhang, Zhi Wang
    Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:463-469 [Conf]
  5. Zhi Wang, Qi Chen, Chuanshan Gao
    Implementing Grid Computing over Mobile Ad-Hoc Networks based on Mobile Agent. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:321-326 [Conf]
  6. Shanbin Li, Zhi Wang, Youxian Sun
    Guaranteed Cost Control of Networked Control Systems: An LMI Approach. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:130-136 [Conf]
  7. Hongxia Yin, Zhi Wang, Youxian Sun
    Enhanced WFQ Algorithm with (m, k)-Firm Guarantee. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:339-346 [Conf]
  8. Ruizhong Lin, Zhi Wang, Yanjun Li, Youxian Sun
    A Scalable Energy Efficient Medium Access Control Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:568-577 [Conf]
  9. Xingfa Shen, Zhi Wang, Peng Jiang, Ruizhong Lin, Youxian Sun
    Connectivity and RSSI Based Localization Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:578-587 [Conf]
  10. Feng Xia, Xingfa Shen, Liping Liu, Zhi Wang, Youxian Sun
    Fuzzy Logic Based Feedback Scheduler for Embedded Control Systems. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:453-462 [Conf]
  11. Zhi Wang, Qi Chen, Chuanshan Gao
    A Proactive Service Request Broker for PC-based Grid Computing. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:603-610 [Conf]
  12. Saman S. Abeysekera, Zhi Wang
    Performance of the pulse pair method with an optimal lag value for frequency estimation in fading channels. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:1734-1737 [Conf]
  13. Marek A. Perkowski, Malgorzata Marek-Sadowska, Lech Józwiak, Tadeusz Luba, Stan Grygiel, Miroslawa Nowicka, Rahul Malvi, Zhi Wang, Jin S. Zhang
    Decomposition of Multiple-Valued Relations . [Citation Graph (0, 0)][DBLP]
    ISMVL, 1997, pp:13-18 [Conf]
  14. Zhi Wang, Bo Yu, Chuanshan Gao
    On Service-Oriented Network Measurement Architecture with Mobile Agent. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:66-77 [Conf]
  15. Liping Liu, Feng Xia, Zhi Wang, Jiming Chen, Youxian Sun
    Deployment Issues in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:239-248 [Conf]
  16. Xiaohua Dai, Feng Xia, Zhi Wang, Youxian Sun
    A Survey of Intelligent Information Processing in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:123-132 [Conf]
  17. Jiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun
    Extended DBP for (m, k)-Firm Based QoS. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:357-365 [Conf]
  18. Feng Xia, Zhi Wang, Youxian Sun
    Design and evaluation of event-driven networked real-time control systems with IEC function blocks. [Citation Graph (0, 0)][DBLP]
    SMC (6), 2004, pp:5148-5153 [Conf]
  19. Xiaohua Dai, Feng Xia, Zhi Wang, Youxian Sun
    An Energy-Efficient In-Network Aggregation Query Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:255-258 [Conf]
  20. Zhi Wang, Bo Yu, Qi Chen, Chuanshan Gao
    Wireless Grid Computing over Mobile Ad-Hoc Networks with Mobile Agent. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:113- [Conf]
  21. Zhi Wang, Bo Zhang
    Quotient space model of hierarchical query-by-humming system. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:671-674 [Conf]
  22. Junping Qiu, Jingquan Chen, Zhi Wang
    An analysis of backlink counts and Web Impact Factorsfor Chinese university websites. [Citation Graph (0, 0)][DBLP]
    Scientometrics, 2004, v:60, n:3, pp:463-473 [Journal]
  23. Zhi Wang, Saman S. Abeysekera
    Frequency estimation via multiple lags of correlations in the presence of broadband colored noise. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2006, v:86, n:11, pp:3371-3387 [Journal]
  24. Weibin Pei, Zhongliang Chen, Chunhao Feng, Zhi Wang
    Design and Implementation of a Plain Grid Monitoring and Information Service. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:277-284 [Conf]

  25. Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]


  26. A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks. [Citation Graph (, )][DBLP]


  27. ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]


  28. Denial-of-Service Attacks on Host-Based Generic Unpackers. [Citation Graph (, )][DBLP]


  29. A Novel Event-Oriented Segment-of-Interest Discovery Method for Surveillance Video. [Citation Graph (, )][DBLP]


  30. Equivalent Conversion Calculation of Straight Bevel Gear Mesh Stiffness. [Citation Graph (, )][DBLP]


  31. Relative Positions Within Small Teams of Mobile Units. [Citation Graph (, )][DBLP]


  32. Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]


  33. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. [Citation Graph (, )][DBLP]


  34. Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs. [Citation Graph (, )][DBLP]


  36. Defeating return-oriented rootkits with "Return-Less" kernels. [Citation Graph (, )][DBLP]


  37. Connectivity-aware motion control among autonomous mobile units. [Citation Graph (, )][DBLP]


  38. Tracking and Predicting Moving Targets in Hierarchical Sensor Networks. [Citation Graph (, )][DBLP]


  39. Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  40. The Effect of Internal Cash Flow on the Investment of Chinese Listed Companies. [Citation Graph (, )][DBLP]


  41. Extraction of features from airborne Lidar and onboard image data for future driver assistance systems. [Citation Graph (, )][DBLP]


  42. Identification of inclined buildings from aerial LIDAR Data for disaster management. [Citation Graph (, )][DBLP]


  43. Geodesics-based topographical feature extraction from airborne Lidar data for disaster management. [Citation Graph (, )][DBLP]


Search in 0.068secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002