The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ju Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ju Wang, Jeremy Cooper, Hongsik Choi
    On the channel modelling and transmission power control for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:792-793 [Conf]
  2. Ju Wang, Hongsik Choi, Esther A. Hughes
    Efficient route establishment and maintenance in wireless sensor networks with mobile base stations. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:343-349 [Conf]
  3. Ju Wang, Jonathan C. L. Liu, Yuehao Cen
    Analysis of Soft Handoff Algorithms with Dynamic Spreading WCDMA System. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:737-742 [Conf]
  4. Ju Wang, Jinmiao Li, Greg Butler
    Implementing the PostgreSQL Query Optimizer within the OPT++ Framework. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:262-272 [Conf]
  5. Ju Wang, Jonathan Liu
    Hybrid Uplink Scheduling in an Integrated 3G/WLAN Network with Relaying. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:558-563 [Conf]
  6. A. S. Abraham, Ju Wang, Jonathan C. L. Liu
    Bandwidth-aware video encoding with adaptive image scaling. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:157-160 [Conf]
  7. Ju Wang, A. R. Steele, Jonathan C. L. Liu
    Efficient integration of watermarking with MPEG compression. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:911-914 [Conf]
  8. Wei Li, Ningchuan Shen, Ju Wang
    R-calculus: A Logical Approach for Knowledge Base Maintenance. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1994, pp:375-381 [Conf]
  9. Jianguo Lu, Shengrui Wang, Ju Wang
    An Experiment on the Matching and Reuse of XML Schemas. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:273-284 [Conf]
  10. Ju Wang, Esther A. Hugh, Hong-Si Choi
    An Efficient Multicast Scheme with Orthogonal CTS Encoding in Wireless Network. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:649-654 [Conf]
  11. Yuefei Sui, Ju Wang, Jian Yuncheng
    The Entropy of Rough Relations in Rough Relational Databases. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:566-570 [Conf]
  12. Keyun Hu, Yuefei Sui, Ju Wang, Yuchang Lu
    Rough Set Theory under the Similarity Relations. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:405-409 [Conf]
  13. Ju Wang, Jonathan C. L. Liu, Joseph Lin
    A Partition-Based Parallel MPEG-2 Software Decoder. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:1009-1012 [Conf]
  14. Keyun Hu, Yuefei Sui, Yuchang Lu, Ju Wang, Chunyi Shi
    Concept Approximation in Concept Lattice. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2001, pp:167-173 [Conf]
  15. Zhongzhi Shi, Ju Wang, Hu Cao
    The Security Mechanism In Multiagent System AOSDE. [Citation Graph (0, 0)][DBLP]
    PRIMA, 1999, pp:62-71 [Conf]
  16. Yuefei Sui, Youming Xia, Ju Wang
    The Information Entropy of Rough Relational Databases. [Citation Graph (0, 0)][DBLP]
    RSFDGrC, 2003, pp:320-324 [Conf]
  17. Ju Wang, Jonathan C. L. Liu
    Interference Minimization and Uplink Relaying for a 3G/WLAN Network. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:388-395 [Conf]
  18. Shengrui Wang, Jianguo Lu, Ju Wang
    Approximate Common Structures in XML Schema Matching. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:900-905 [Conf]
  19. Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
    The entropia virtual machine for desktop grids. [Citation Graph (0, 0)][DBLP]
    VEE, 2005, pp:186-196 [Conf]
  20. Chun-Ting Zhang, Ju Wang, Ren Zhang
    Using a Euclid Distance Discriminant Method to Find Protein Coding Genes in the Yeast Genome. [Citation Graph (0, 0)][DBLP]
    Computers & Chemistry, 2002, v:26, n:3, pp:195-206 [Journal]
  21. Ju Wang, Andrew A. Chien
    Understanding when location-hiding using overlay networks is feasible. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:6, pp:763-780 [Journal]
  22. Ju Wang, Mehmet Ali Elicin, Jonathan C. L. Liu
    Multimedia Support for Wireless W-CDMA with Dynamic Spreading. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:4, pp:355-370 [Journal]

  23. Computing the Number Restriction Deduced from the Existential Restriction in Description Logic with Primitive Negation, Existential Restriction and Number Restriction. [Citation Graph (, )][DBLP]


  24. Efficient Wireless Multicast Protocol with Orthogonal CTS Modulation Supporting Video Conferencing. [Citation Graph (, )][DBLP]


  25. An iterative power allocation algorithm in OFDM system based on power relaxation. [Citation Graph (, )][DBLP]


  26. Content-based block watermarking against cumulative and temporal attack. [Citation Graph (, )][DBLP]


  27. Analysis of a Fast Power Allocation Algorithm for Multiuser OFDM Systems. [Citation Graph (, )][DBLP]


  28. Video Authentication against Correlation Analysis Attack in Wireless Network. [Citation Graph (, )][DBLP]


  29. The Dual Spatial Connectives of Separation Logic. [Citation Graph (, )][DBLP]


  30. Haptic-Visual Interaction Training System for Refueling Aircraft. [Citation Graph (, )][DBLP]


  31. Active and Passive Control of an Exoskeleton with Cable Transmission for Hand Rehabilitation. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002