Search the dblp DataBase
Yun Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
C. Mohan , Donald J. Haderle , Yun Wang , Josephine M. Cheng Single Table Access Using Multiple Indexes: Optimization, Execution, and Concurrency Control Techniques. [Citation Graph (30, 17)][DBLP ] EDBT, 1990, pp:29-43 [Conf ] Josephine M. Cheng , Donald J. Haderle , Richard Hedges , Balakrishna R. Iyer , Ted Messinger , C. Mohan , Yun Wang An Efficient Hybrid Join Algorithm: A DB2 Prototype. [Citation Graph (13, 8)][DBLP ] ICDE, 1991, pp:171-180 [Conf ] Peter Gassner , Guy M. Lohman , K. Bernhard Schiefer , Yun Wang Query Optimization in the IBM DB2 Family. [Citation Graph (9, 14)][DBLP ] IEEE Data Eng. Bull., 1993, v:16, n:4, pp:4-18 [Journal ] C. Mohan , Hamid Pirahesh , W. Grace Tang , Yun Wang Parallelism in Relational Database Management Systems. [Citation Graph (7, 0)][DBLP ] IBM Systems Journal, 1994, v:33, n:2, pp:349-371 [Journal ] Yun Wang Experience from a Real Life Query Optimizer. [Citation Graph (3, 0)][DBLP ] SIGMOD Conference, 1992, pp:286- [Conf ] Yun Wang DB2 Query Parallelism: Staging and Implementation. [Citation Graph (2, 1)][DBLP ] VLDB, 1995, pp:686-691 [Conf ] Yun Wang Facets: a new algorithm for extracting 3-D surface from volume data. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1995, pp:136-142 [Conf ] Yun Wang , Francisco Vilar Brasileiro , Emmanuelle Anceaume , Fabíola Greve , Michel Hurfin Avoiding Priority Inversion on the Processing of Requests by Active Replicated Servers. [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:97-106 [Conf ] Han Su , Yun Wang A Novel Secure Routing System in Overlay Environment. [Citation Graph (0, 0)][DBLP ] GCC, 2005, pp:129-135 [Conf ] SongXia Hao , Xichang Zhong , Yun Wang EFSM-based Testing Strategy for APIs Test of Embedded OS. [Citation Graph (0, 0)][DBLP ] ICESS, 2004, pp:522-527 [Conf ] Yun Wang A comprehensive approach to teaching CS238 (visual basic programming). [Citation Graph (0, 0)][DBLP ] IRMA Conference, 2000, pp:660-661 [Conf ] Manas Saksena , Panagiota Karvelas , Yun Wang Automatic Synthesis of Multi-Tasking Implementations from Real-Time Object-Oriented Models. [Citation Graph (0, 0)][DBLP ] ISORC, 2000, pp:360-367 [Conf ] Leonid Baraz , Tevi Devor , Orna Etzion , Shalom Goldenberg , Alex Skaletsky , Yun Wang , Yigel Zemach IA-32 Execution Layer: a two-phase dynamic translator designed to support IA-32 applications on Itanium-based systems. [Citation Graph (0, 0)][DBLP ] MICRO, 2003, pp:191-204 [Conf ] Kai Li , Yun Wang A Method to Organize A Small-World Based Publish/Subscribe Network In Large-Scale Environment. [Citation Graph (0, 0)][DBLP ] PDPTA, 2006, pp:1043-1049 [Conf ] Yun Wang , Manas Saksena Scheduling Fixed-Priority Tasks with Preemption Threshold. [Citation Graph (0, 0)][DBLP ] RTCSA, 1999, pp:328-0 [Conf ] Weidong Chen , Jyh-Herng Chow , You-Chin Fuh , Jean Grandbois , Michelle Jou , Nelson Mendonça Mattos , Brian T. Tran , Yun Wang High Level Indexing of User-Defined Types. [Citation Graph (0, 22)][DBLP ] VLDB, 1999, pp:554-564 [Conf ] Junling Wang , Yun Wang A Robust Load Balancing Pattern for Grid Computing. [Citation Graph (0, 0)][DBLP ] SKG, 2005, pp:52- [Conf ] Yun Wang A multinomial logistic regression modeling approach for anomaly intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:662-674 [Journal ] Yun Wang , Emmanuelle Anceaume , Francisco Vilar Brasileiro , Fabíola Greve , Michel Hurfin Solving the Group Priority Inversion Problem in a Timed Asynchronous System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:8, pp:900-915 [Journal ] Yun Wang , Rao Zheng , Yan-Jiang Qiao Modeling, Learning and Simulating Biological Cells with Entity Grammar. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:138-141 [Conf ] Yun Wang Recent database challenges in China on data consolidation and integration. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2007, pp:898- [Conf ] Chaohao Xu , Jianhui Li , Tao Bao , Yun Wang , Bo Huang Metadata driven memory optimizations in dynamic binary translator. [Citation Graph (0, 0)][DBLP ] VEE, 2007, pp:148-157 [Conf ] Yun Wang , Inyoung Kim , Gaston Mbateng , Shih-Yieh Ho A latent class modeling approach to detect network intrusion. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:93-100 [Journal ] An Improved Intermediate Value Theorem and Rough Fix-Point Theorem of Roughly Continuous Discrete Functions. [Citation Graph (, )][DBLP ] The Theory and Application of Rough Integration in Rough Function Model. [Citation Graph (, )][DBLP ] Rough Derivatives in Rough Function Model and Their Application. [Citation Graph (, )][DBLP ] Order-Based Decision Rules Acquisition in Continuous-Valued Decision Information Systems. [Citation Graph (, )][DBLP ] Notes for rough derivatives and rough continuity in rough function model. [Citation Graph (, )][DBLP ] On Data Fusion and Lifetime Constraints in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Nonblocking Approach for Reaching an Agreement on Request Total Orders. [Citation Graph (, )][DBLP ] Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks. [Citation Graph (, )][DBLP ] Boundary recognition in sensor networks by building relative contours. [Citation Graph (, )][DBLP ] Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Enterprise Modelling Based Services Orchestration. [Citation Graph (, )][DBLP ] Scalable Real-Time System Design using Preemption Thresholds. [Citation Graph (, )][DBLP ] Visual Zen art: aesthetic cognitive dissonance in Japanese dry stone garden measured in visual PageRank. [Citation Graph (, )][DBLP ] Spam Filtering System based on Rough Set and Bayesian Classifier. [Citation Graph (, )][DBLP ] Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. [Citation Graph (, )][DBLP ] The Determinants of Passenger Load Factor for Chinese Airline Industry. [Citation Graph (, )][DBLP ] Contamination Level and Speciation of Heavy Metals in Sediments from Yundang Lake, Xiamen. [Citation Graph (, )][DBLP ] Recoverability of Erasure Codes Based and Intensively Written Storage Systems. [Citation Graph (, )][DBLP ] Quantitative identification of the information pattern for tourist attractions in the internet space: A case study in Beijing, China. [Citation Graph (, )][DBLP ] Search in 0.042secs, Finished in 0.045secs