The SCEAS System
Navigation Menu

Search the dblp DataBase


Yong Jiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Jiang
    DSMRouter: A DiffServ-Based Multicast Router. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2006, pp:598-601 [Conf]
  2. Steve Gwizdala, Yong Jiang, Václav Rajlich
    JTracker - A Tool for Change Propagation in Java. [Citation Graph (0, 0)][DBLP]
    CSMR, 2003, pp:223-229 [Conf]
  3. Yan-ning Huang, Yong Jiang
    Firewall Design: Understandable, Designable and Testable. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:272-278 [Conf]
  4. Jyotishman Pathak, Yong Jiang, Vasant Honavar, James D. McCalley
    Condition Data Aggregation with Application to Failure Rate Calculation of Power Transformers. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  5. Yong Jiang, Jianping Wu
    Proportional Differentiated Services for End-to-End Traffic Control. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:672-681 [Conf]
  6. Yong Jiang, Hongguang Wang, Lijin Fang, Mingyang Zhao
    Motion Planning for Climbing Robot Based on Hybrid Navigation. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:91-100 [Conf]
  7. Yong Jiang, Chuang Lin, Jianping Wu, Xiaoxia Sun
    Integrated Performance Evaluating Criteria for Network Traffic Control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:438-443 [Conf]
  8. Yong Jiang, Björn Pehrson, Runtong Zhang
    Measuring and Evaluating the Current BGP Policy Model. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1167-1171 [Conf]
  9. Yong Jiang, Shaochun Xu
    An improved method for concept location during Program Comprehension. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:106-111 [Conf]
  10. Shaochun Xu, Yong Jiang
    Case Studies of Constructivist Learning in Incremental Software Development and Software Reuse. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:120-127 [Conf]
  11. Yong Jiang, Jie Li, Shoichi Nishimura
    A General Stochastic Model for Dynamic Locking in Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:3, pp:308-319 [Journal]
  12. Shu-Tao Xia, Fang-Wei Fu, Yong Jiang, San Ling
    The Probability of Undetected Error for Binary Constant-Weight Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3364-3373 [Journal]

  13. A New Out-Of-Band Power Suppression Scheme by Extending Effective Cyclic-Prefix of OFDM. [Citation Graph (, )][DBLP]

  14. A Novel Approach to Fault Detection and Identification in Suction Foot Control of a Climbing Robot. [Citation Graph (, )][DBLP]

  15. Path planning for inchworm-like robot moving in narrow space. [Citation Graph (, )][DBLP]

  16. A Combined Logistic and Model Based Approach for Fault Detection and Identification in a Climbing Robot. [Citation Graph (, )][DBLP]

  17. Research on Emergency Management Information System of Qinghai-Tibet Railway Line. [Citation Graph (, )][DBLP]

  18. A knowledge-driven approach to biomedical document conceptualization. [Citation Graph (, )][DBLP]

  19. Stopping Set Distributions of Some Linear Codes [Citation Graph (, )][DBLP]

  20. On the minimum average distance of binary constant weight codes. [Citation Graph (, )][DBLP]

Search in 0.253secs, Finished in 0.254secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002