The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jin Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jin Yang, Elke D. Lange
    SYSTRAN on AltaVista: A User Study on Real-Time Machine Translation on the Internet. [Citation Graph (0, 0)][DBLP]
    AMTA, 1998, pp:275-285 [Conf]
  2. John Weisgerber, Jin Yang, Pete Fisher
    Pacific Rim Portable Translator. [Citation Graph (0, 0)][DBLP]
    AMTA, 2000, pp:196-201 [Conf]
  3. Xiushan Feng, Alan J. Hu, Jin Yang
    Partitioned model checking from software specifications. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:583-587 [Conf]
  4. Jin Yang, Avi Puder
    Tightly integrate dynamic verification with formal verification: a GSTE based approach. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:327-330 [Conf]
  5. Guowu Yang, Jin Yang, William N. N. Hung, Xiaoyu Song
    Implication of assertion graphs in GSTE. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:1060-1063 [Conf]
  6. Jin Yang
    Verification Challenges and Opportunities in the New Era of Microprocessor Design. [Citation Graph (0, 0)][DBLP]
    ATVA, 2006, pp:6-7 [Conf]
  7. Jin Yang, Carl-Johan H. Seger
    Compositional Specification and Model Checking in GSTE. [Citation Graph (0, 0)][DBLP]
    CAV, 2004, pp:216-228 [Conf]
  8. Alan J. Hu, Jeremy Casas, Jin Yang
    Reasoning about GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP]
    CHARME, 2003, pp:170-184 [Conf]
  9. William N. N. Hung, Xiaoyu Song, Guowu Yang, Jin Yang, Marek A. Perkowski
    Quantum logic synthesis by symbolic reachability analysis. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:838-841 [Conf]
  10. Jin Yang, Andreas Tiemeyer
    Lazy symbolic model checking. [Citation Graph (0, 0)][DBLP]
    DAC, 2000, pp:35-38 [Conf]
  11. Peter Au, John Darlington, Moustafa Ghanem, Yike Guo, Hing Wing To, Jin Yang
    Co-ordinating Heterogeneous Parallel Computation. [Citation Graph (0, 0)][DBLP]
    Euro-Par, Vol. I, 1996, pp:601-614 [Conf]
  12. John Darlington, Yike Guo, Hing Wing To, Jin Yang
    Functional Skeletons for Parallel Coordination. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1995, pp:55-66 [Conf]
  13. Jin Yang, Carl-Johan H. Seger
    Generalized Symbolic Trajectory Evaluation - Abstraction in Action. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2002, pp:70-87 [Conf]
  14. Jin Yang, Jiannong Cao, Weigang Wu, Cheng-Zhong Xu
    A Framework for Transactional Mobile Agent Execution. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:1002-1008 [Conf]
  15. Jin Yang, Jiannong Cao, Weigang Wu
    Checkpoint Placement Algorithms for Mobile Agent System. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:339-346 [Conf]
  16. Jin Yang, Ming Huang
    A Case Study on Research Assistant System From Knowledge Management Perspective. [Citation Graph (0, 0)][DBLP]
    CELDA, 2004, pp:241-248 [Conf]
  17. Jin Yang, Jiannong Cao, Weigang Wu, Cheng-Zhong Xu
    Parallel Algorithms for Fault-Tolerant Mobile Agent Execution. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:246-256 [Conf]
  18. Alan J. Hu, Jeremy Casas, Jin Yang
    Efficient Generation of Monitor Circuits for GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2003, pp:154-160 [Conf]
  19. Jin Yang, Amit Goel
    GSTE through a case study. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2002, pp:534-541 [Conf]
  20. Kelvin Ng, Alan J. Hu, Jin Yang
    Generating Monitor Circuits for Simulation-Friendly GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP]
    ICCD, 2004, pp:409-416 [Conf]
  21. Jin Yang, Carl-Johan H. Seger
    Introduction to Generalized Symbolic Trajectory Evaluation. [Citation Graph (0, 0)][DBLP]
    ICCD, 2001, pp:360-367 [Conf]
  22. Jiannong Cao, Liang Zhang, Jin Yang, Sajal K. Das
    A Reliable Mobile Agent Communication Protocol. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:468-475 [Conf]
  23. Juanru Wang, Songzheng Zhao, Jin Yang
    Study on the Cultivation of Core Competence Based on Tacit Knowledge. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:987-989 [Conf]
  24. Jiannong Cao, Jin Yang, Wai Ting Chan, Chengzhong Xu
    Exception Handling in Distributed Workflow Systems Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:48-55 [Conf]
  25. Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu
    Immunity and Mobile Agent Based Grid Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:651-659 [Conf]
  26. Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni
    NASC: A Novel Approach for Spam Classification. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:672-681 [Conf]
  27. Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong
    An Immunity-Based Dynamic Multilayer Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:641-650 [Conf]
  28. Zhixiang Yin, Jianzhong Cui, Jin Yang, Jin Xu
    DNA Computing Model of the Integer Linear Programming Problem Based on Molecular Beacon. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:238-247 [Conf]
  29. Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu
    Grid Intrusion Detection Based on Immune Agent. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:73-82 [Conf]
  30. Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao
    Family Gene Based Grid Trust Model. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:110-113 [Conf]
  31. Jin Yang, Ioannis Kriaras
    Wireless VoIP: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP]
    MDA, 1999, pp:3-13 [Conf]
  32. Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal
    A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PDP, 2006, pp:64-72 [Conf]
  33. John Darlington, Yike Guo, Hing Wing To, Jin Yang
    Parallel Skeletons for Structured Composition. [Citation Graph (0, 0)][DBLP]
    PPOPP, 1995, pp:19-28 [Conf]
  34. Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun
    Immunity and Mobile Agent Based Intrusion Detection for Grid. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:187-198 [Conf]
  35. Jin Yang, Aloysius K. Mok, Douglas A. Stuart
    A new generation modechart verifie. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 1995, pp:116-125 [Conf]
  36. Jin Yang, Aloysius K. Mok, Farn Wang
    Symbolic Model Checking for Event-Driven Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1993, pp:23-33 [Conf]
  37. SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang
    Immune-Based Dynamic Intrusion Response Model. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:96-103 [Conf]
  38. Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang
    An Immune Mobile Agent Based Grid Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:112-119 [Conf]
  39. Guowu Yang, Jin Yang, Xiaoyu Song, Fei Xie
    Maximal Models of Assertion Graph in GSTE. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:684-693 [Conf]
  40. Jin Yang, Jiannong Cao, Weigang Wu
    CIC: An Integrated Approach to Checkpointing in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:4- [Conf]
  41. William N. N. Hung, Xiaoyu Song, Guowu Yang, Jin Yang, Marek A. Perkowski
    Optimal synthesis of multiple output Boolean functions using a set of quantum gates by symbolic reachability analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:9, pp:1652-1663 [Journal]
  42. Michael L. Blinov, Jin Yang, James R. Faeder, William S. Hlavacek
    Graph Theory for Rule-Based Modeling of Biochemical Networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:89-106 [Journal]
  43. Jin Yang, Aloysius K. Mok, Farn Wang
    Symboloc Model Checking for Event-Driven Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1997, v:19, n:2, pp:386-412 [Journal]
  44. Zhixiang Yin, Jianzhong Cui, Jin Yang
    A Surface-Based DNA Computing for the Positive Integer Linear Programming Problem. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:1-9 [Conf]
  45. Zhixiang Yin, Jin Yang, Jianzhong Cui, Jiaxiu Zhang
    Evolutionary Model for Sequence Generation. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:10-17 [Conf]
  46. Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal
    Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:8, pp:1055-1070 [Journal]
  47. Jin Yang, Carl-Johan H. Seger
    Introduction to generalized symbolic trajectory evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2003, v:11, n:3, pp:345-353 [Journal]

  48. Formal Verification for High-Assurance Behavioral Synthesis. [Citation Graph (, )][DBLP]


  49. Tighter Integration of Rule-Based and Statistical MT in Serial System Combination. [Citation Graph (, )][DBLP]


  50. Optimizing automatic abstraction refinement for generalized symbolic trajectory evaluation. [Citation Graph (, )][DBLP]


  51. Optimizing equivalence checking for behavioral synthesis. [Citation Graph (, )][DBLP]


  52. BackSpace: Formal Analysis for Post-Silicon Debug. [Citation Graph (, )][DBLP]


  53. Automatic Abstraction Refinement for Generalized Symbolic Trajectory Evaluation. [Citation Graph (, )][DBLP]


  54. Molecular Computation: Solving 3-Vertex-Colourability Problem. [Citation Graph (, )][DBLP]


  55. Improved Method for Network Danger Evaluation Based on Immunology Principle. [Citation Graph (, )][DBLP]


  56. Gossip-Based Data Fusion Framework for Radio Resource Map. [Citation Graph (, )][DBLP]


  57. Inter-Cell Interference Modeling for OFDMA Systems with Beamforming. [Citation Graph (, )][DBLP]


  58. The notification based approach to implementing failure detectors in distributed systems. [Citation Graph (, )][DBLP]


  59. Application of blind system identification in acoustic source location. [Citation Graph (, )][DBLP]


  60. Analyzing amplify-and-forward and decode-and-forward cooperative strategies in Wyner's channel model. [Citation Graph (, )][DBLP]


  61. Using One-at-a-Time Sensitivity Analysis Designs for Genetic Algorithm Solving Continuous Network Design Problems. [Citation Graph (, )][DBLP]


  62. Efficient global checkpointing algorithms for mobile agents. [Citation Graph (, )][DBLP]


  63. A Non-Cooperative Method for Path Loss Estimation in Femtocell Networks [Citation Graph (, )][DBLP]


Search in 0.248secs, Finished in 0.251secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002