Search the dblp DataBase
Jin Yang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jin Yang , Elke D. Lange SYSTRAN on AltaVista: A User Study on Real-Time Machine Translation on the Internet. [Citation Graph (0, 0)][DBLP ] AMTA, 1998, pp:275-285 [Conf ] John Weisgerber , Jin Yang , Pete Fisher Pacific Rim Portable Translator. [Citation Graph (0, 0)][DBLP ] AMTA, 2000, pp:196-201 [Conf ] Xiushan Feng , Alan J. Hu , Jin Yang Partitioned model checking from software specifications. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2005, pp:583-587 [Conf ] Jin Yang , Avi Puder Tightly integrate dynamic verification with formal verification: a GSTE based approach. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2005, pp:327-330 [Conf ] Guowu Yang , Jin Yang , William N. N. Hung , Xiaoyu Song Implication of assertion graphs in GSTE. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2005, pp:1060-1063 [Conf ] Jin Yang Verification Challenges and Opportunities in the New Era of Microprocessor Design. [Citation Graph (0, 0)][DBLP ] ATVA, 2006, pp:6-7 [Conf ] Jin Yang , Carl-Johan H. Seger Compositional Specification and Model Checking in GSTE. [Citation Graph (0, 0)][DBLP ] CAV, 2004, pp:216-228 [Conf ] Alan J. Hu , Jeremy Casas , Jin Yang Reasoning about GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP ] CHARME, 2003, pp:170-184 [Conf ] William N. N. Hung , Xiaoyu Song , Guowu Yang , Jin Yang , Marek A. Perkowski Quantum logic synthesis by symbolic reachability analysis. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:838-841 [Conf ] Jin Yang , Andreas Tiemeyer Lazy symbolic model checking. [Citation Graph (0, 0)][DBLP ] DAC, 2000, pp:35-38 [Conf ] Peter Au , John Darlington , Moustafa Ghanem , Yike Guo , Hing Wing To , Jin Yang Co-ordinating Heterogeneous Parallel Computation. [Citation Graph (0, 0)][DBLP ] Euro-Par, Vol. I, 1996, pp:601-614 [Conf ] John Darlington , Yike Guo , Hing Wing To , Jin Yang Functional Skeletons for Parallel Coordination. [Citation Graph (0, 0)][DBLP ] Euro-Par, 1995, pp:55-66 [Conf ] Jin Yang , Carl-Johan H. Seger Generalized Symbolic Trajectory Evaluation - Abstraction in Action. [Citation Graph (0, 0)][DBLP ] FMCAD, 2002, pp:70-87 [Conf ] Jin Yang , Jiannong Cao , Weigang Wu , Cheng-Zhong Xu A Framework for Transactional Mobile Agent Execution. [Citation Graph (0, 0)][DBLP ] GCC, 2005, pp:1002-1008 [Conf ] Jin Yang , Jiannong Cao , Weigang Wu Checkpoint Placement Algorithms for Mobile Agent System. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:339-346 [Conf ] Jin Yang , Ming Huang A Case Study on Research Assistant System From Knowledge Management Perspective. [Citation Graph (0, 0)][DBLP ] CELDA, 2004, pp:241-248 [Conf ] Jin Yang , Jiannong Cao , Weigang Wu , Cheng-Zhong Xu Parallel Algorithms for Fault-Tolerant Mobile Agent Execution. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:246-256 [Conf ] Alan J. Hu , Jeremy Casas , Jin Yang Efficient Generation of Monitor Circuits for GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP ] ICCAD, 2003, pp:154-160 [Conf ] Jin Yang , Amit Goel GSTE through a case study. [Citation Graph (0, 0)][DBLP ] ICCAD, 2002, pp:534-541 [Conf ] Kelvin Ng , Alan J. Hu , Jin Yang Generating Monitor Circuits for Simulation-Friendly GSTE Assertion Graphs. [Citation Graph (0, 0)][DBLP ] ICCD, 2004, pp:409-416 [Conf ] Jin Yang , Carl-Johan H. Seger Introduction to Generalized Symbolic Trajectory Evaluation. [Citation Graph (0, 0)][DBLP ] ICCD, 2001, pp:360-367 [Conf ] Jiannong Cao , Liang Zhang , Jin Yang , Sajal K. Das A Reliable Mobile Agent Communication Protocol. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:468-475 [Conf ] Juanru Wang , Songzheng Zhao , Jin Yang Study on the Cultivation of Core Competence Based on Tacit Knowledge. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:987-989 [Conf ] Jiannong Cao , Jin Yang , Wai Ting Chan , Chengzhong Xu Exception Handling in Distributed Workflow Systems Using Mobile Agents. [Citation Graph (0, 0)][DBLP ] ICEBE, 2005, pp:48-55 [Conf ] Xun Gong , Tao Li , Gang Liang , Tiefang Wang , Jin Yang , Xiaoqin Hu Immunity and Mobile Agent Based Grid Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:651-659 [Conf ] Gang Liang , Tao Li , Xun Gong , Yaping Jiang , Jin Yang , Jiancheng Ni NASC: A Novel Approach for Spam Classification. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:672-681 [Conf ] Gang Liang , Tao Li , Jiancheng Ni , Yaping Jiang , Jin Yang , Xun Gong An Immunity-Based Dynamic Multilayer Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:641-650 [Conf ] Zhixiang Yin , Jianzhong Cui , Jin Yang , Jin Xu DNA Computing Model of the Integer Linear Programming Problem Based on Molecular Beacon. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:238-247 [Conf ] Xun Gong , Tao Li , Tiefang Wang , Jin Yang , Gang Liang , Xiaoqin Hu Grid Intrusion Detection Based on Immune Agent. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2006, pp:73-82 [Conf ] Tiefang Wang , Tao Li , Xun Gong , Jin Yang , Xiaoqin Hu , Diangang Wang , Hui Zhao Family Gene Based Grid Trust Model. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2006, pp:110-113 [Conf ] Jin Yang , Ioannis Kriaras Wireless VoIP: Opportunities and Challenges. [Citation Graph (0, 0)][DBLP ] MDA, 1999, pp:3-13 [Conf ] Weigang Wu , Jiannong Cao , Jin Yang , Michel Raynal A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] PDP, 2006, pp:64-72 [Conf ] John Darlington , Yike Guo , Hing Wing To , Jin Yang Parallel Skeletons for Structured Composition. [Citation Graph (0, 0)][DBLP ] PPOPP, 1995, pp:19-28 [Conf ] Xun Gong , Tao Li , Ji Lu , Tiefang Wang , Gang Liang , Jin Yang , Feixian Sun Immunity and Mobile Agent Based Intrusion Detection for Grid. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:187-198 [Conf ] Jin Yang , Aloysius K. Mok , Douglas A. Stuart A new generation modechart verifie. [Citation Graph (0, 0)][DBLP ] IEEE Real Time Technology and Applications Symposium, 1995, pp:116-125 [Conf ] Jin Yang , Aloysius K. Mok , Farn Wang Symbolic Model Checking for Event-Driven Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1993, pp:23-33 [Conf ] SunJun Liu , Tao Li , Kui Zhao , Jin Yang , Xun Gong , Jianhua Zhang Immune-Based Dynamic Intrusion Response Model. [Citation Graph (0, 0)][DBLP ] SEAL, 2006, pp:96-103 [Conf ] Xun Gong , Tao Li , Tiefang Wang , Jin Yang , SunJun Liu , Gang Liang An Immune Mobile Agent Based Grid Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] SEAL, 2006, pp:112-119 [Conf ] Guowu Yang , Jin Yang , Xiaoyu Song , Fei Xie Maximal Models of Assertion Graph in GSTE. [Citation Graph (0, 0)][DBLP ] TAMC, 2006, pp:684-693 [Conf ] Jin Yang , Jiannong Cao , Weigang Wu CIC: An Integrated Approach to Checkpointing in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:4- [Conf ] William N. N. Hung , Xiaoyu Song , Guowu Yang , Jin Yang , Marek A. Perkowski Optimal synthesis of multiple output Boolean functions using a set of quantum gates by symbolic reachability analysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:9, pp:1652-1663 [Journal ] Michael L. Blinov , Jin Yang , James R. Faeder , William S. Hlavacek Graph Theory for Rule-Based Modeling of Biochemical Networks. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:89-106 [Journal ] Jin Yang , Aloysius K. Mok , Farn Wang Symboloc Model Checking for Event-Driven Real-Time Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1997, v:19, n:2, pp:386-412 [Journal ] Zhixiang Yin , Jianzhong Cui , Jin Yang A Surface-Based DNA Computing for the Positive Integer Linear Programming Problem. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2007, pp:1-9 [Conf ] Zhixiang Yin , Jin Yang , Jianzhong Cui , Jiaxiu Zhang Evolutionary Model for Sequence Generation. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2007, pp:10-17 [Conf ] Weigang Wu , Jiannong Cao , Jin Yang , Michel Raynal Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:8, pp:1055-1070 [Journal ] Jin Yang , Carl-Johan H. Seger Introduction to generalized symbolic trajectory evaluation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2003, v:11, n:3, pp:345-353 [Journal ] Formal Verification for High-Assurance Behavioral Synthesis. [Citation Graph (, )][DBLP ] Tighter Integration of Rule-Based and Statistical MT in Serial System Combination. [Citation Graph (, )][DBLP ] Optimizing automatic abstraction refinement for generalized symbolic trajectory evaluation. [Citation Graph (, )][DBLP ] Optimizing equivalence checking for behavioral synthesis. [Citation Graph (, )][DBLP ] BackSpace: Formal Analysis for Post-Silicon Debug. [Citation Graph (, )][DBLP ] Automatic Abstraction Refinement for Generalized Symbolic Trajectory Evaluation. [Citation Graph (, )][DBLP ] Molecular Computation: Solving 3-Vertex-Colourability Problem. [Citation Graph (, )][DBLP ] Improved Method for Network Danger Evaluation Based on Immunology Principle. [Citation Graph (, )][DBLP ] Gossip-Based Data Fusion Framework for Radio Resource Map. [Citation Graph (, )][DBLP ] Inter-Cell Interference Modeling for OFDMA Systems with Beamforming. [Citation Graph (, )][DBLP ] The notification based approach to implementing failure detectors in distributed systems. [Citation Graph (, )][DBLP ] Application of blind system identification in acoustic source location. [Citation Graph (, )][DBLP ] Analyzing amplify-and-forward and decode-and-forward cooperative strategies in Wyner's channel model. [Citation Graph (, )][DBLP ] Using One-at-a-Time Sensitivity Analysis Designs for Genetic Algorithm Solving Continuous Network Design Problems. [Citation Graph (, )][DBLP ] Efficient global checkpointing algorithms for mobile agents. [Citation Graph (, )][DBLP ] A Non-Cooperative Method for Path Loss Estimation in Femtocell Networks [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs