The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuan Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuan Zhang, Venu Dasigi
    A Test Bed for Information Retrieval Experimentation. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 2003, pp:1191-1196 [Conf]
  2. Jian Kang, Yuan Zhang, Jiu-bin Ju
    Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:342-353 [Conf]
  3. Yuan Zhang, Bo Yang
    Delay-Constrained Multicasting with Power-Control in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:529-538 [Conf]
  4. Yuan Zhang, Wen Gao, Huifang Sun, Qingming Huang, Yan Lu
    Error resilience video coding in H.264 encoder with potential distortion tracking. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:163-166 [Conf]
  5. Yuan Zhang, Moon-Jung Chung, Hyun Kim
    Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:197-214 [Conf]
  6. Li Su, Yuan Zhang, Wen Gao, Qingming Huang, Yan Lu
    Improved error concealment algorithms based on H.264/AVC non-normative decoder. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1671-1674 [Conf]
  7. Ruzhi Xu, Yunjiao Xue, Peiyao Nie, Yuan Zhang, Desheng Li
    Research on CMMI-based Software Process Metrics. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:391-397 [Conf]
  8. Kui Gao, Wen Gao, Simin He, Peng Gao, Yuan Zhang
    Real-time scheduling on scalable media stream delivery. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:824-827 [Conf]
  9. Jian Kang, Yuan Zhang, Jiu-bin Ju
    A Formalized Taxonomy of DDoS Attacks Based on Similarity. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:717-719 [Conf]
  10. Yuan Zhang, Wenwu Wu, Xinghai Yang
    A Cross-Layer Optimization for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:976-985 [Conf]
  11. Yuan Zhang, Qingming Huang, Yan Lu, Wen Gao
    Optimum End-to-End Distortion Estimation for Error Resilient Video Coding. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:513-520 [Conf]
  12. Yuan Zhang, Weirong Zhu, Fei Chen, Ziang Hu, Guang R. Gao
    Sequential Consistency Revisit: The Sufficient Condition and Method to Reason the Consistency Model of a Multiprocessor-on-a-Chip Architecture. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2005, pp:13-19 [Conf]
  13. Yuan Zhang, Vugranam C. Sreedhar, Weirong Zhu, Vivek Sarkar, Guang R. Gao
    Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections. [Citation Graph (0, 0)][DBLP]
    PPOPP, 2007, pp:146-147 [Conf]
  14. Yuan Zhang, Evelyn Duesterwald
    Barrier matching for programs with textually unaligned barriers. [Citation Graph (0, 0)][DBLP]
    PPOPP, 2007, pp:194-204 [Conf]
  15. Yuan Zhang, Shouning Qu
    Joint Power Control and Channel Assignment Algorithms for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:270-279 [Conf]
  16. Kui Gao, Wen Gao, Simin He, Yuan Zhang
    Real-time scheduling and online resource allocation on scalable streaming media server. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:544-551 [Conf]
  17. Yuan Zhang, Richard J. Enbody, John R. Lloyd
    Proactive, content-aware, sensitive data protection framework for enterprises. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:34-40 [Conf]
  18. Yuan Zhang, Reza Hoshyar, Rahim Tafazolli
    Channel estimation for MC-CDMA with compensation of synchronization errors. [Citation Graph (0, 0)][DBLP]
    VTC Fall (2), 2004, pp:808-812 [Conf]
  19. Jing-Fa Xiao, Ze-Sheng Li, Miao Sun, Yuan Zhang, Chia-Chung Sun
    Homology modeling and molecular dynamics study of GSK3/SHAGGY-like kinase. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2004, v:28, n:3, pp:179-188 [Journal]
  20. Yuan Zhang, Nan Zheng, Pei Hao, Ying Cao, Yang Zhong
    A molecular docking model of SARS-CoV S1 protein in complex with its receptor, human ACE2. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2005, v:29, n:3, pp:254-257 [Journal]
  21. Yuan Zhang, Nan Zheng, Yang Zhong
    Computational characterization and design of SARS coronavirus receptor recognition and antibody neutralization. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2007, v:31, n:2, pp:129-133 [Journal]
  22. Yuan Zhang, Nan Zheng, Peng Nan, Ying Cao, Masami Hasegawa, Yang Zhong
    Computational simulation of interactions between SARS coronavirus spike mutants and host species-specific receptors. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2007, v:31, n:2, pp:134-137 [Journal]
  23. Jong-Moon Chung, Seung-Won Han, Moses Lynn George, Yuan Zhang, Theepa Sudha Natarajan
    A Wireless Instructor System for Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP). [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2005, v:7, n:1, pp:85-102 [Journal]
  24. Kui Gao, Wen Gao, Simin He, Yuan Zhang
    Real-time scheduling based on imprecise computation for scalable streaming media system over the Internet. [Citation Graph (0, 0)][DBLP]
    Real-Time Imaging, 2004, v:10, n:5, pp:307-313 [Journal]
  25. Yuan Zhang, Jian Guo Lei, Shao Pu Zhang
    A new family of almost difference sets and some necessary conditions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2052-2061 [Journal]
  26. Kui Gao, Wen Gao, Simin He, Yuan Zhang
    Real-time smoothing for network adaptive video streaming. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2005, v:16, n:4-5, pp:512-526 [Journal]
  27. Min Xie, Youren Wang, Li Wang, Yuan Zhang
    Design on Operator-Based Reconfigurable Hardware Architecture and Cell Circuit. [Citation Graph (0, 0)][DBLP]
    ICES, 2007, pp:140-150 [Conf]
  28. Yuan Zhang, Youren Wang, Shanshan Yang, Min Xie
    Design of a Cell in Embryonic Systems with Improved Efficiency and Fault-Tolerance. [Citation Graph (0, 0)][DBLP]
    ICES, 2007, pp:129-139 [Conf]

  29. A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. A tag recommendation system for folksonomy. [Citation Graph (, )][DBLP]


  31. Optimize Algorithm of Decision Tree Based on Rough Sets Hierarchical Attributes. [Citation Graph (, )][DBLP]


  32. The Study of Fusing the Data Facing Environment Monitoring. [Citation Graph (, )][DBLP]


  33. Perceptual Relevance Measure for Generic Shape Coding. [Citation Graph (, )][DBLP]


  34. A Study on Achievable Rates for Source-Destination Pair in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Detection of microcalcifications in mammograms using multi-chromosome Cartesian genetic programming. [Citation Graph (, )][DBLP]


  36. Security Threats in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  37. Memory State Feedback Stabilization for Time-Varying Delayed Neural Networks Systems. [Citation Graph (, )][DBLP]


  38. Concurrency Analysis for Shared Memory Programs with Textually Unaligned Barriers. [Citation Graph (, )][DBLP]


  39. Minimum Lock Assignment: A Method for Exploiting Concurrency among Critical Sections. [Citation Graph (, )][DBLP]


  40. Base Station Localization in Search of Empty Spectrum Spaces in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  41. Research on CGF Entity Model Based on Factory Mechanism. [Citation Graph (, )][DBLP]


  42. Making the Best Use of Landsat MSS Images for Land Use/Cover Change Analysis. [Citation Graph (, )][DBLP]


  43. A location-based push service architecture with clustering method. [Citation Graph (, )][DBLP]


  44. A Study on a General Model of Information Fusion Networks. [Citation Graph (, )][DBLP]


  45. A New Method of Feature Selection for Information Fusion Based on the Game Theory. [Citation Graph (, )][DBLP]


  46. A Digest and Pattern Matching-Based Intrusion Detection Engine. [Citation Graph (, )][DBLP]


  47. On constructions for two dimensional balanced sampling plan excluding contiguous units with block size four. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002