|
Search the dblp DataBase
Feng Zhu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan, J. Wenny Rahayu
Multiple Entity Types Wireless Broadcast Database System. [Citation Graph (0, 0)][DBLP] AINA, 2007, pp:179-186 [Conf]
- Wei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul
Rapid Verification of Embedded Systems Using Patterns. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:466-471 [Conf]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
Facilitating Secure Ad hoc Service Discovery in Public Environments. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:433-0 [Conf]
- Feng Zhu, Wei-Tek Tsai
Framework-Oriented Analysis. [Citation Graph (0, 0)][DBLP] COMPSAC, 1998, pp:324-329 [Conf]
- Wei-Tek Tsai, Feng Zhu, Lian Yu, Raymond A. Paul, Chun Fan
Verification Patterns for Rapid Embedded System Verification. [Citation Graph (0, 0)][DBLP] Embedded Systems and Applications, 2003, pp:310-316 [Conf]
- Chuanjiang Luo, Feng Zhu, Zelin Shi
Reliable Omnidirectional Depth Map Generation for Indoor Mobile Robot Navigation Via a Single Perspective Camera. [Citation Graph (0, 0)][DBLP] ICAT, 2006, pp:1283-1292 [Conf]
- Tingbo Hou, Junwen Wang, Feng Zhu, Zelin Shi
3D Reconstruction Based on Pseudo-Linearization and Errors-in-Variables Model. [Citation Graph (0, 0)][DBLP] ICAT Workshops, 2006, pp:104-109 [Conf]
- Feng Zhu, Bao-An Guo
A multiplication-addition structure against differential attack. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:247-257 [Conf]
- Duncan S. Wong, Agnes Hui Chan, Feng Zhu
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:827-834 [Conf]
- Feili Hou, Feng Zhu
Filter Algorithm for 3D Pose Estimation of Maneuvering Target. [Citation Graph (0, 0)][DBLP] ICPR (2), 2004, pp:140-144 [Conf]
- Tingbo Hou, Feng Zhu, Zelin Shi
Estimation of the Fundamental Matrix Based on EV Mode. [Citation Graph (0, 0)][DBLP] ICPR (1), 2006, pp:679-682 [Conf]
- Duncan S. Wong, Agnes Hui Chan, Feng Zhu
More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:375-387 [Conf]
- Feng Zhu, Xiaowei Sun, Betty Salzberg, Svein-Olaf Hvasshovd
Supporting Load Balancing and Efficient Reorganization During System Scaling. [Citation Graph (0, 0)][DBLP] IPDPS, 2005, pp:- [Conf]
- Feng Zhu, Shouli Yan, Jingyu Hu, Edgar Sánchez-Sinencio
Feedforward reversed nested Miller compensation techniques for three-stage amplifiers. [Citation Graph (0, 0)][DBLP] ISCAS (3), 2005, pp:2575-2578 [Conf]
- Yafeng Hu, Feng Zhu, Hairong Lv, Xianda Zhang
Handwritten Digit Recognition Using Low Rank Approximation Based Competitive Neural Network. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:287-292 [Conf]
- Yafeng Hu, Feng Zhu, Xianda Zhang
A Novel Approach for License Plate Recognition Using Subspace Projection and Probabilistic Neural Network. [Citation Graph (0, 0)][DBLP] ISNN (2), 2005, pp:216-221 [Conf]
- Chuanjiang Luo, Liancheng Su, Feng Zhu, Zelin Shi
A Versatile Method for Omnidirectional Stereo Camera Calibration Based on BP Algorithm. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:383-389 [Conf]
- Feng Zhu, Yafeng Hu, Saiyi Wang, Peng Wei
The BP Network for Carrier Frequency Offset Estimation in OFDM-Based WLANs. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:144-149 [Conf]
- Feng Zhu, Yafeng Hu, Xianda Zhang, Deguang Xie
Hidden Markov Model Networks for Multiaspect Discriminative Features Extraction from Radar Targets. [Citation Graph (0, 0)][DBLP] ISNN (1), 2006, pp:1406-1411 [Conf]
- Feng Zhu, Sanjai Rayadurgam, Wei-Tek Tsai
Automating Regression Testing for Real-Time Software in a Distributed Environment. [Citation Graph (0, 0)][DBLP] ISORC, 1998, pp:373-382 [Conf]
- Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:150-161 [Conf]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. [Citation Graph (0, 0)][DBLP] PerCom, 2003, pp:235-242 [Conf]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
PrudentExposure: A Private and User-centric Service Discovery Protocol. [Citation Graph (0, 0)][DBLP] PerCom, 2004, pp:329-340 [Conf]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
The Master Key: A Private Authentication Approach for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] PerCom, 2006, pp:212-221 [Conf]
- Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] PerCom, 2005, pp:225-234 [Conf]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
Facilitating secure ad hoc service discovery in public environments. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:76, n:1, pp:45-54 [Journal]
- Wei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul
Rapid Embedded System Testing Using Verification Patterns. [Citation Graph (0, 0)][DBLP] IEEE Software, 2005, v:22, n:4, pp:68-75 [Journal]
- Feng Zhu, Matt W. Mutka, Lionel M. Ni
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:418-429 [Journal]
- Yang Du, Tian Xia, Yufei Tao, Donghui Zhang, Feng Zhu
On Multidimensional k-Anonymity with Local Recoding Generalization. [Citation Graph (0, 0)][DBLP] ICDE, 2007, pp:1422-1424 [Conf]
- Lei He, Chuanjiang Luo, Yanfeng Geng, Feng Zhu, Yingming Hao
Reliable Depth Map Regeneration Via a Novel Omnidirectional Stereo Sensor. [Citation Graph (0, 0)][DBLP] ISVC (1), 2007, pp:278-287 [Conf]
- Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
Private and Secure Service Discovery via Progressive and Probabilistic Exposure. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:11, pp:1565-1577 [Journal]
Approximation Algorithms for Key Management in Secure Multicast. [Citation Graph (, )][DBLP]
Depth Map Regeneration via Improved Graph Cuts Using a Novel Omnidirectional Stereo Sensor. [Citation Graph (, )][DBLP]
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. [Citation Graph (, )][DBLP]
A Comparative Study on Pose Estimation for Monocular Vision and Binocular Vision Without Modeling. [Citation Graph (, )][DBLP]
Structural Elucidation of Three Anthraquinones from a Marine-Derived Mangrove Endophytic Fungus (Isolate 1850). [Citation Graph (, )][DBLP]
A high-precision binocular method for model-based pose estimation. [Citation Graph (, )][DBLP]
Automation technique of software internationalization and localization based on lexical analysis. [Citation Graph (, )][DBLP]
Research of multi-level data exchange mechanism based on Land and Resource E-government. [Citation Graph (, )][DBLP]
Solving the generalized Sylvester matrix equation AV + BW = EVF via a Kronecker map. [Citation Graph (, )][DBLP]
Approximation Algorithms for Key Management in Secure Multicast [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|