The SCEAS System
Navigation Menu

Search the dblp DataBase


Y. Dong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li
    Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf]
  2. Hans Wilhelm Schüßler, Y. Dong
    Messung und Modellierung von schwach nichtlinearen Systemen. [Citation Graph (0, 0)][DBLP]
    ASST, 1990, pp:2-7 [Conf]
  3. Danny Crookes, T. John Brown, Y. Dong, G. McAleese, Philip J. Morrow, D. K. Roantree, Ivor T. A. Spence
    A Self-Optimising Coprocessor Model for Portable Image Processing. [Citation Graph (0, 0)][DBLP]
    Euro-Par, Vol. II, 1996, pp:213-216 [Conf]
  4. Gilbert R. Hillman, Hemant Tagare, Karin W. Elder, D. M. Stoner, Rita M. Patterson, C. L. Nicodemus, S. F. Viegas, Y. Dong
    Location and Geometric Description of Carpal Bones in CT Images. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1994, pp:397-401 [Conf]
  5. H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li
    Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:202-209 [Conf]
  6. Y. Dong, Ajoy Opal
    An overview on computer-aided analysis techniques for sigma-delta modulators. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:423-426 [Conf]
  7. Y. Dong, Gilbert R. Hillman
    Three-dimensional reconstruction of irregular shapes based on a fitted mesh of contours. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2001, v:19, n:3, pp:165-176 [Journal]
  8. Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui
    Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal]

  9. Image-based Visual Servoing of a Real Robot Using a Quaternion Formulation. [Citation Graph (, )][DBLP]

  10. Chained Threshold Proxy Signature without and with Supervision. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002