The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Feng Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan, J. Wenny Rahayu
    Multiple Entity Types Wireless Broadcast Database System. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:179-186 [Conf]
  2. Wei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul
    Rapid Verification of Embedded Systems Using Patterns. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:466-471 [Conf]
  3. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    Facilitating Secure Ad hoc Service Discovery in Public Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:433-0 [Conf]
  4. Feng Zhu, Wei-Tek Tsai
    Framework-Oriented Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1998, pp:324-329 [Conf]
  5. Wei-Tek Tsai, Feng Zhu, Lian Yu, Raymond A. Paul, Chun Fan
    Verification Patterns for Rapid Embedded System Verification. [Citation Graph (0, 0)][DBLP]
    Embedded Systems and Applications, 2003, pp:310-316 [Conf]
  6. Chuanjiang Luo, Feng Zhu, Zelin Shi
    Reliable Omnidirectional Depth Map Generation for Indoor Mobile Robot Navigation Via a Single Perspective Camera. [Citation Graph (0, 0)][DBLP]
    ICAT, 2006, pp:1283-1292 [Conf]
  7. Tingbo Hou, Junwen Wang, Feng Zhu, Zelin Shi
    3D Reconstruction Based on Pseudo-Linearization and Errors-in-Variables Model. [Citation Graph (0, 0)][DBLP]
    ICAT Workshops, 2006, pp:104-109 [Conf]
  8. Feng Zhu, Bao-An Guo
    A multiplication-addition structure against differential attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:247-257 [Conf]
  9. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:827-834 [Conf]
  10. Feili Hou, Feng Zhu
    Filter Algorithm for 3D Pose Estimation of Maneuvering Target. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2004, pp:140-144 [Conf]
  11. Tingbo Hou, Feng Zhu, Zelin Shi
    Estimation of the Fundamental Matrix Based on EV Mode. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:679-682 [Conf]
  12. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:375-387 [Conf]
  13. Feng Zhu, Xiaowei Sun, Betty Salzberg, Svein-Olaf Hvasshovd
    Supporting Load Balancing and Efficient Reorganization During System Scaling. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  14. Feng Zhu, Shouli Yan, Jingyu Hu, Edgar Sánchez-Sinencio
    Feedforward reversed nested Miller compensation techniques for three-stage amplifiers. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2575-2578 [Conf]
  15. Yafeng Hu, Feng Zhu, Hairong Lv, Xianda Zhang
    Handwritten Digit Recognition Using Low Rank Approximation Based Competitive Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:287-292 [Conf]
  16. Yafeng Hu, Feng Zhu, Xianda Zhang
    A Novel Approach for License Plate Recognition Using Subspace Projection and Probabilistic Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2005, pp:216-221 [Conf]
  17. Chuanjiang Luo, Liancheng Su, Feng Zhu, Zelin Shi
    A Versatile Method for Omnidirectional Stereo Camera Calibration Based on BP Algorithm. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:383-389 [Conf]
  18. Feng Zhu, Yafeng Hu, Saiyi Wang, Peng Wei
    The BP Network for Carrier Frequency Offset Estimation in OFDM-Based WLANs. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:144-149 [Conf]
  19. Feng Zhu, Yafeng Hu, Xianda Zhang, Deguang Xie
    Hidden Markov Model Networks for Multiaspect Discriminative Features Extraction from Radar Targets. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:1406-1411 [Conf]
  20. Feng Zhu, Sanjai Rayadurgam, Wei-Tek Tsai
    Automating Regression Testing for Real-Time Software in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    ISORC, 1998, pp:373-382 [Conf]
  21. Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
    Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:150-161 [Conf]
  22. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. [Citation Graph (0, 0)][DBLP]
    PerCom, 2003, pp:235-242 [Conf]
  23. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    PrudentExposure: A Private and User-centric Service Discovery Protocol. [Citation Graph (0, 0)][DBLP]
    PerCom, 2004, pp:329-340 [Conf]
  24. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    The Master Key: A Private Authentication Approach for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    PerCom, 2006, pp:212-221 [Conf]
  25. Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
    Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    PerCom, 2005, pp:225-234 [Conf]
  26. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    Facilitating secure ad hoc service discovery in public environments. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:1, pp:45-54 [Journal]
  27. Wei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul
    Rapid Embedded System Testing Using Verification Patterns. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2005, v:22, n:4, pp:68-75 [Journal]
  28. Feng Zhu, Matt W. Mutka, Lionel M. Ni
    A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:418-429 [Journal]
  29. Yang Du, Tian Xia, Yufei Tao, Donghui Zhang, Feng Zhu
    On Multidimensional k-Anonymity with Local Recoding Generalization. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:1422-1424 [Conf]
  30. Lei He, Chuanjiang Luo, Yanfeng Geng, Feng Zhu, Yingming Hao
    Reliable Depth Map Regeneration Via a Novel Omnidirectional Stereo Sensor. [Citation Graph (0, 0)][DBLP]
    ISVC (1), 2007, pp:278-287 [Conf]
  31. Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
    Private and Secure Service Discovery via Progressive and Probabilistic Exposure. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:11, pp:1565-1577 [Journal]

  32. Approximation Algorithms for Key Management in Secure Multicast. [Citation Graph (, )][DBLP]


  33. Depth Map Regeneration via Improved Graph Cuts Using a Novel Omnidirectional Stereo Sensor. [Citation Graph (, )][DBLP]


  34. RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  35. A Comparative Study on Pose Estimation for Monocular Vision and Binocular Vision Without Modeling. [Citation Graph (, )][DBLP]


  36. Structural Elucidation of Three Anthraquinones from a Marine-Derived Mangrove Endophytic Fungus (Isolate 1850). [Citation Graph (, )][DBLP]


  37. A high-precision binocular method for model-based pose estimation. [Citation Graph (, )][DBLP]


  38. Automation technique of software internationalization and localization based on lexical analysis. [Citation Graph (, )][DBLP]


  39. Research of multi-level data exchange mechanism based on Land and Resource E-government. [Citation Graph (, )][DBLP]


  40. Solving the generalized Sylvester matrix equation AV + BW = EVF via a Kronecker map. [Citation Graph (, )][DBLP]


  41. Approximation Algorithms for Key Management in Secure Multicast [Citation Graph (, )][DBLP]


Search in 0.080secs, Finished in 0.081secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002