The SCEAS System
Navigation Menu

Search the dblp DataBase


Yun Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. C. Mohan, Donald J. Haderle, Yun Wang, Josephine M. Cheng
    Single Table Access Using Multiple Indexes: Optimization, Execution, and Concurrency Control Techniques. [Citation Graph (30, 17)][DBLP]
    EDBT, 1990, pp:29-43 [Conf]
  2. Josephine M. Cheng, Donald J. Haderle, Richard Hedges, Balakrishna R. Iyer, Ted Messinger, C. Mohan, Yun Wang
    An Efficient Hybrid Join Algorithm: A DB2 Prototype. [Citation Graph (13, 8)][DBLP]
    ICDE, 1991, pp:171-180 [Conf]
  3. Peter Gassner, Guy M. Lohman, K. Bernhard Schiefer, Yun Wang
    Query Optimization in the IBM DB2 Family. [Citation Graph (9, 14)][DBLP]
    IEEE Data Eng. Bull., 1993, v:16, n:4, pp:4-18 [Journal]
  4. C. Mohan, Hamid Pirahesh, W. Grace Tang, Yun Wang
    Parallelism in Relational Database Management Systems. [Citation Graph (7, 0)][DBLP]
    IBM Systems Journal, 1994, v:33, n:2, pp:349-371 [Journal]
  5. Yun Wang
    Experience from a Real Life Query Optimizer. [Citation Graph (3, 0)][DBLP]
    SIGMOD Conference, 1992, pp:286- [Conf]
  6. Yun Wang
    DB2 Query Parallelism: Staging and Implementation. [Citation Graph (2, 1)][DBLP]
    VLDB, 1995, pp:686-691 [Conf]
  7. Yun Wang
    Facets: a new algorithm for extracting 3-D surface from volume data. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1995, pp:136-142 [Conf]
  8. Yun Wang, Francisco Vilar Brasileiro, Emmanuelle Anceaume, Fabíola Greve, Michel Hurfin
    Avoiding Priority Inversion on the Processing of Requests by Active Replicated Servers. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:97-106 [Conf]
  9. Han Su, Yun Wang
    A Novel Secure Routing System in Overlay Environment. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:129-135 [Conf]
  10. SongXia Hao, Xichang Zhong, Yun Wang
    EFSM-based Testing Strategy for APIs Test of Embedded OS. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:522-527 [Conf]
  11. Yun Wang
    A comprehensive approach to teaching CS238 (visual basic programming). [Citation Graph (0, 0)][DBLP]
    IRMA Conference, 2000, pp:660-661 [Conf]
  12. Manas Saksena, Panagiota Karvelas, Yun Wang
    Automatic Synthesis of Multi-Tasking Implementations from Real-Time Object-Oriented Models. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:360-367 [Conf]
  13. Leonid Baraz, Tevi Devor, Orna Etzion, Shalom Goldenberg, Alex Skaletsky, Yun Wang, Yigel Zemach
    IA-32 Execution Layer: a two-phase dynamic translator designed to support IA-32 applications on Itanium-based systems. [Citation Graph (0, 0)][DBLP]
    MICRO, 2003, pp:191-204 [Conf]
  14. Kai Li, Yun Wang
    A Method to Organize A Small-World Based Publish/Subscribe Network In Large-Scale Environment. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2006, pp:1043-1049 [Conf]
  15. Yun Wang, Manas Saksena
    Scheduling Fixed-Priority Tasks with Preemption Threshold. [Citation Graph (0, 0)][DBLP]
    RTCSA, 1999, pp:328-0 [Conf]
  16. Weidong Chen, Jyh-Herng Chow, You-Chin Fuh, Jean Grandbois, Michelle Jou, Nelson Mendonça Mattos, Brian T. Tran, Yun Wang
    High Level Indexing of User-Defined Types. [Citation Graph (0, 22)][DBLP]
    VLDB, 1999, pp:554-564 [Conf]
  17. Junling Wang, Yun Wang
    A Robust Load Balancing Pattern for Grid Computing. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:52- [Conf]
  18. Yun Wang
    A multinomial logistic regression modeling approach for anomaly intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:662-674 [Journal]
  19. Yun Wang, Emmanuelle Anceaume, Francisco Vilar Brasileiro, Fabíola Greve, Michel Hurfin
    Solving the Group Priority Inversion Problem in a Timed Asynchronous System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:8, pp:900-915 [Journal]
  20. Yun Wang, Rao Zheng, Yan-Jiang Qiao
    Modeling, Learning and Simulating Biological Cells with Entity Grammar. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:138-141 [Conf]
  21. Yun Wang
    Recent database challenges in China on data consolidation and integration. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:898- [Conf]
  22. Chaohao Xu, Jianhui Li, Tao Bao, Yun Wang, Bo Huang
    Metadata driven memory optimizations in dynamic binary translator. [Citation Graph (0, 0)][DBLP]
    VEE, 2007, pp:148-157 [Conf]
  23. Yun Wang, Inyoung Kim, Gaston Mbateng, Shih-Yieh Ho
    A latent class modeling approach to detect network intrusion. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:30, n:1, pp:93-100 [Journal]

  24. An Improved Intermediate Value Theorem and Rough Fix-Point Theorem of Roughly Continuous Discrete Functions. [Citation Graph (, )][DBLP]

  25. The Theory and Application of Rough Integration in Rough Function Model. [Citation Graph (, )][DBLP]

  26. Rough Derivatives in Rough Function Model and Their Application. [Citation Graph (, )][DBLP]

  27. Order-Based Decision Rules Acquisition in Continuous-Valued Decision Information Systems. [Citation Graph (, )][DBLP]

  28. Notes for rough derivatives and rough continuity in rough function model. [Citation Graph (, )][DBLP]

  29. On Data Fusion and Lifetime Constraints in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  30. A Nonblocking Approach for Reaching an Agreement on Request Total Orders. [Citation Graph (, )][DBLP]

  31. Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks. [Citation Graph (, )][DBLP]

  32. Boundary recognition in sensor networks by building relative contours. [Citation Graph (, )][DBLP]

  33. Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  34. Enterprise Modelling Based Services Orchestration. [Citation Graph (, )][DBLP]

  35. Scalable Real-Time System Design using Preemption Thresholds. [Citation Graph (, )][DBLP]

  36. Visual Zen art: aesthetic cognitive dissonance in Japanese dry stone garden measured in visual PageRank. [Citation Graph (, )][DBLP]

  37. Spam Filtering System based on Rough Set and Bayesian Classifier. [Citation Graph (, )][DBLP]

  38. Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  39. A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. [Citation Graph (, )][DBLP]

  40. The Determinants of Passenger Load Factor for Chinese Airline Industry. [Citation Graph (, )][DBLP]

  41. Contamination Level and Speciation of Heavy Metals in Sediments from Yundang Lake, Xiamen. [Citation Graph (, )][DBLP]

  42. Recoverability of Erasure Codes Based and Intensively Written Storage Systems. [Citation Graph (, )][DBLP]

  43. Quantitative identification of the information pattern for tourist attractions in the internet space: A case study in Beijing, China. [Citation Graph (, )][DBLP]

Search in 0.104secs, Finished in 0.105secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002