Search the dblp DataBase
Y. Dong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
H. W. Go , P. Y. Chan , Y. Dong , Ai Fen Sui , Siu-Ming Yiu , Lucas Chi Kwong Hui , Victor O. K. Li Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf ] Hans Wilhelm Schüßler , Y. Dong Messung und Modellierung von schwach nichtlinearen Systemen. [Citation Graph (0, 0)][DBLP ] ASST, 1990, pp:2-7 [Conf ] Danny Crookes , T. John Brown , Y. Dong , G. McAleese , Philip J. Morrow , D. K. Roantree , Ivor T. A. Spence A Self-Optimising Coprocessor Model for Portable Image Processing. [Citation Graph (0, 0)][DBLP ] Euro-Par, Vol. II, 1996, pp:213-216 [Conf ] Gilbert R. Hillman , Hemant Tagare , Karin W. Elder , D. M. Stoner , Rita M. Patterson , C. L. Nicodemus , S. F. Viegas , Y. Dong Location and Geometric Description of Carpal Bones in CT Images. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1994, pp:397-401 [Conf ] H. W. Go , Y. Dong , Lucas Chi Kwong Hui , Siu-Ming Yiu , Victor O. K. Li Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:202-209 [Conf ] Y. Dong , Ajoy Opal An overview on computer-aided analysis techniques for sigma-delta modulators. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2001, pp:423-426 [Conf ] Y. Dong , Gilbert R. Hillman Three-dimensional reconstruction of irregular shapes based on a fitted mesh of contours. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2001, v:19, n:3, pp:165-176 [Journal ] Y. Dong , Ai Fen Sui , Siu-Ming Yiu , Victor O. K. Li , Lucas Chi Kwong Hui Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal ] Image-based Visual Servoing of a Real Robot Using a Quaternion Formulation. [Citation Graph (, )][DBLP ] Chained Threshold Proxy Signature without and with Supervision. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs