Search the dblp DataBase
Yu Chen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yu Chen , Zhenqiang Jiao , Jun Xie , Zhihui Du , Peng Liu , Ziyu Zhu A High Performance Design and Implementation of the Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP ] APPT, 2003, pp:125-135 [Conf ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky Monte-Carlo algorithms for layout density control. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2000, pp:523-528 [Conf ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky Hierarchical dummy fill for process uniformity. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2001, pp:139-144 [Conf ] Yu Chen , Trupti Joshi , Ying Xu , Dong Xu Towards Automated Derivation of Biological Pathways Using High-Throughput Biological Data. [Citation Graph (0, 0)][DBLP ] BIBE, 2003, pp:18-25 [Conf ] Yu Chen , Qionghai Dai Dynamic Feedback and Elastic Scheduling Model for Flexible Workload Management. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2003, pp:421-425 [Conf ] Maria Lin , David W. Walker , Yu Chen , Jason W. Jones A grid-based problem solving environment for GECEM. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:686-693 [Conf ] Yu Chen , Xiaoge Wang , Zhenqiang Jiao , Jun Xie , Zhihui Du , Sanli Li MyVIA: A Design and Implementation of the High Performance Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP ] CLUSTER, 2002, pp:160-0 [Conf ] Yu Chen , Puneet Gupta , Andrew B. Kahng Performance-impact limited area fill synthesis. [Citation Graph (0, 0)][DBLP ] DAC, 2003, pp:22-27 [Conf ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky Practical iterated fill synthesis for CMP uniformity. [Citation Graph (0, 0)][DBLP ] DAC, 2000, pp:671-674 [Conf ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky , Yuhong Zheng Area Fill Generation With Inherent Data Volume Reduction. [Citation Graph (0, 0)][DBLP ] DATE, 2003, pp:10868-10875 [Conf ] Yu Chen , Jennifer L. Welch Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] DIAL-M, 2002, pp:34-42 [Conf ] Hongliang Gu , Yuanchun Shi , Guangyou Xu , Yu Chen A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2005, pp:51-60 [Conf ] Yu Chen , Ajoy Kumar Datta , Sébastien Tixeuil Stabilizing Inter-domain Routing in the Internet (Research Note). [Citation Graph (0, 0)][DBLP ] Euro-Par, 2002, pp:749-752 [Conf ] Zhihui Du , Francis C. M. Lau , Cho-Li Wang , Wai-kin Lam , He Chuan , Xiaoge Wang , Yu Chen , Sanli Li Design of an OGSA-Based MetaService Architecture. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:167-174 [Conf ] Yu Chen , Qionghai Dai MONSTER: A Media-on-Demand Servicing System Based on P2P Networks. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:634-641 [Conf ] Yu Chen , Qionghai Dai MoDast: A MoD System Based on P2P Networks. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:843-846 [Conf ] Xi Wang , Xu Liu , Xiaoge Wang , Yu Chen A Middleware Based Mobile Scientific Computing System - MobileLab. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:1013-1016 [Conf ] Hongliang Gu , Yuanchun Shi , Yu Chen , Bibo Wang , Wenfeng Jiang Cicada: A Highly-Precise Easy-Embedded and Omni-Directional Indoor Location Sensing System. [Citation Graph (0, 0)][DBLP ] GPC, 2006, pp:385-394 [Conf ] Dorothy G. Dologite , Meiqi Fang , Yu Chen , Robert J. Mockler The Changing Role of Information Systems in Chinese State-Owned Organizations. [Citation Graph (0, 0)][DBLP ] HICSS (4), 1996, pp:474-0 [Conf ] Xiangping Meng , Robert Babuska , Lucian Busoniu , Yu Chen , Wanyu Tan An Improved Multiagent Reinforcement Learning Algorithm. [Citation Graph (0, 0)][DBLP ] IAT, 2005, pp:337-343 [Conf ] Wenfeng Jiang , Yu Chen , Yuanchun Shi , Yunfeng Sun The Design and Implementation of the Cicada Wireless Sensor Network Indoor Localization System. [Citation Graph (0, 0)][DBLP ] ICAT Workshops, 2006, pp:536-541 [Conf ] Kai Hwang , Yu-Kwong Kwok , Shanshan Song , Min Cai , Yu Chen , Ying Chen , Runfang Zhou , Xiaosong Lou GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2005, pp:187-195 [Conf ] Yu Chen , Andrew B. Kahng , Gang Qu , Alexander Zelikovsky The associative-skew clock routing problem. [Citation Graph (0, 0)][DBLP ] ICCAD, 1999, pp:168-172 [Conf ] Yu-Kwong Kwok , Rohit Tripathi , Yu Chen , Kai Hwang HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:423-432 [Conf ] Yu Chen , Yu-Kwong Kwok , Kai Hwang MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:123-129 [Conf ] Bibo Wang , Yu Chen , Hongliang Gu , Jian Yang , Tan Zhao Two Energy-Efficient, Timesaving Improvement Mechanisms of Network Reprogramming in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] ICESS, 2005, pp:473-483 [Conf ] Shuo Kang , Huayong Wang , Yu Chen , Xiaoge Wang , Yiqi Dai Skyeye: An Instruction Simulator with Energy Awareness. [Citation Graph (0, 0)][DBLP ] ICESS, 2004, pp:456-461 [Conf ] Yu Chen , Qian Fang , Zhihui Du , Zhenchun Huang , Sanli Li TH-SMS: Security Management System in Advanced Computational Infrastructure. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:398-407 [Conf ] Hwayong Joung , Edward K. Wong , Yu Chen , Seung P. Kim Document Image Compression using Straight Line Extraction and Block Context Model. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1998, pp:530-534 [Conf ] Zheng Zhang , Yu Chen , Shiding Lin , Bo-Ying Lu , Shuming Shi , Xing Xie , Chun Yuan P2P Resource Pool and Its Application to Optimize Wide-Area Application Level Multicasting. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2004, pp:273-281 [Conf ] Kuo Zhang , Yanni Wu , Zhenkun Zheng , Xiaoge Wang , Yu Chen A Component-Based Reflective Middleware Approach to Context-Aware Adaptive Systems. [Citation Graph (0, 0)][DBLP ] ICWE, 2005, pp:429-434 [Conf ] Hongliang Gu , Yuanchun Shi , Guangyou Xu , Yu Chen A Core Model Supporting Location-Aware Computing in Smart Classroom. [Citation Graph (0, 0)][DBLP ] ICWL, 2005, pp:1-13 [Conf ] Yu Chen , H. Han , X. Wang Two-tiered architecture of IS in WWW environment. [Citation Graph (0, 0)][DBLP ] Information Systems in the WWW Environment, 1998, pp:239-257 [Conf ] C. Bandela , Yu Chen , Andrew B. Kahng , Ion I. Mandoiu , Alexander Zelikovsky Auctions with Buyer Preferences. [Citation Graph (0, 0)][DBLP ] Information Systems: The e-Business Challenge, 2002, pp:223-238 [Conf ] Yu Chen , Natong Zhang , Yanfeng Zhang A new queuing and scheduling model under DiffServ architecture. [Citation Graph (0, 0)][DBLP ] IRI, 2003, pp:436-443 [Conf ] Yu Chen , Wei Jyh Heng Automatic synchronization of speech transcript and slides in presentation. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:568-571 [Conf ] Yu Chen , Thomas C. Henderson S-NETS: Smart Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISER, 2000, pp:81-90 [Conf ] Yu Chen , Wesley W. Chu Database Security Protection Via Inference Detection. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:452-458 [Conf ] Wenlong Li , Haibo Lin , Yu Chen , Zhizhong Tang Increasing Software-Pipelined Loops in the Itanium-Like Architecture. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:947-951 [Conf ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky Closing the smoothness and uniformity gap in area fill synthesis. [Citation Graph (0, 0)][DBLP ] ISPD, 2002, pp:137-142 [Conf ] Xudong Niu , Yan Song , Bo Li , Wei Bian , Yadong Tao , Feng Liu , Jinhua Hu , Yu Chen , Frank He Tests on Symmetry and Continuity between BSIM4 and BSIM5. [Citation Graph (0, 0)][DBLP ] ISQED, 2007, pp:263-268 [Conf ] Yu Chen , Gerald C. Gannod , James S. Collofello , Hessam S. Sarjoughian Using Simulation to Facilitate the Study of Software Product Line Evolution. [Citation Graph (0, 0)][DBLP ] IWPSE, 2004, pp:103-112 [Conf ] Yu Chen , Kai Hwang , Yu-Kwong Kwok Filtering of Shrew DDoS Attacks in Frequency Domain. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:786-793 [Conf ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:159-172 [Conf ] Edward Altman , Yu Chen , Wai Chong Low Semantic exploration of lecture videos. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2002, pp:416-417 [Conf ] Yu Chen , Eric Fleury Latency of Event Reporting in Duty-Cycled Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:711-723 [Conf ] Yu Chen , Jennifer L. Welch Location-based broadcasting for dense mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] MSWiM, 2005, pp:63-70 [Conf ] Yu Chen , Eric Fleury Duplicate Address Detection in Wireless Ad Hoc Networks Using Wireless Nature. [Citation Graph (0, 0)][DBLP ] Networking, 2006, pp:415-426 [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:245-258 [Conf ] Yu Chen , Dong Xu Genome-Scale Protein Function Prediction in Yeast Saccharomyces cerevisiae Through Integrating Multiple Sources of High-Throughput Data. [Citation Graph (0, 0)][DBLP ] Pacific Symposium on Biocomputing, 2005, pp:- [Conf ] Yu Chen , Qian Fang , Zhihui Du , Sanli Li TH-MPI: OS Kernel Integrated Fault Tolerant MPI. [Citation Graph (0, 0)][DBLP ] PVM/MPI, 2001, pp:75-82 [Conf ] Xiufen Zou , Yu Chen , Zishu Pan Modeling and Optimization of the Specificity in Cell Signaling Pathways Based on a High Performance Multi-objective Evolutionary Algorithm. [Citation Graph (0, 0)][DBLP ] SEAL, 2006, pp:774-781 [Conf ] Helen J. Wang , John C. Platt , Yu Chen , Ruyun Zhang , Yi-Min Wang PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2004, pp:398-399 [Conf ] Yu Chen , Dong Xu Prediction of Protein Dispensability through Integrated Analysis of Multiple-Source High-Throughput Data. [Citation Graph (0, 0)][DBLP ] SNPD, 2004, pp:158-166 [Conf ] Huayong Wang , Yu Chen , Yiqi Dai A Soft Real-Time Web News Classification System with Double Control Loops. [Citation Graph (0, 0)][DBLP ] WAIM, 2005, pp:81-90 [Conf ] Qin Zhu , Yu Chen , Piotr Kaminski , Anke Weber , Holger M. Kienle , Hausi A. Müller Leveraging Visio for Adoption-Centric Reverse Engineering Tools. [Citation Graph (0, 0)][DBLP ] WCRE, 2003, pp:270-274 [Conf ] Yu Chen , Wei Chen Brief Announcement: Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance. [Citation Graph (0, 0)][DBLP ] DISC, 2006, pp:563-565 [Conf ] Yu Chen , Wei-Ying Ma , HongJiang Zhang Detecting web page structure for adaptive viewing on small form factor devices. [Citation Graph (0, 0)][DBLP ] WWW, 2003, pp:225-233 [Conf ] Wei-Ying Ma , Xing Xie , Chun Yuan , Yu Chen , Zheng Zhang , HongJiang Zhang Media Companion: Delivering Content-oriented Web Services to Internet Media. [Citation Graph (0, 0)][DBLP ] WWW (Posters), 2003, pp:- [Conf ] Chun Yuan , Yu Chen , Zheng Zhang Evaluation of edge caching/offloading for dynamic content delivery. [Citation Graph (0, 0)][DBLP ] WWW, 2003, pp:461-471 [Conf ] Yu Chen , Zhaohui Wu , Yunhe Pan Intelligent Multimedia Presentation System: An Object-Oriented Approach. [Citation Graph (0, 0)][DBLP ] TOOLS (24), 1997, pp:304-309 [Conf ] Yu Chen , Gordon M. Crippen An iterative refinement algorithm for consistency based multiple structural alignment methods. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2006, v:22, n:17, pp:2087-2093 [Journal ] Yu Chen , Dong Xu Understanding protein dispensability through machine-learning analysis of high-throughput data. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2005, v:21, n:5, pp:575-581 [Journal ] Min Cai , Kai Hwang , Yu-Kwong Kwok , Shanshan Song , Yu Chen Collaborative Internet Worm Containment. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:25-33 [Journal ] Yubo Miao , Chong Ser Chong , Taichong Chai , Yu Chen , Quanbo Zou , Tie Yan , Chew-Kiat Heng , Tit Meng Lim Flip-Chip Packaged Micro-Plate For Low Cost Thermal Multiplexing. [Citation Graph (0, 0)][DBLP ] International Journal of Computational Engineering Science, 2003, v:4, n:2, pp:235-238 [Journal ] Yubo Miao , Yu Chen , Quanbo Zou , Janak Singh , Tie Yan , Chew-Kiat Heng , Tit Meng Lim Low Cost Micro-Pcr Array And Micro-Fluidic Integration On Single Silicon Chip. [Citation Graph (0, 0)][DBLP ] International Journal of Computational Engineering Science, 2003, v:4, n:2, pp:231-234 [Journal ] Yu Chen , Xing Xie , Wei-Ying Ma , HongJiang Zhang Adapting Web Pages for Small-Screen Devices. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2005, v:9, n:1, pp:50-56 [Journal ] Weida Tong , David R. Lowis , Roger Perkins , Yu Chen , William J. Welsh , Dean W. Goddette , Trevor W. Heritage , Daniel M. Sheehan Evaluation of Quantitative Structure-Activity Relationship Methods for Large-Scale Prediction of Chemicals Binding to the Estrogen Receptor. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1998, v:38, n:4, pp:669-677 [Journal ] Yu Chen , Ajoy Kumar Datta , Sébastien Tixeuil Stabilizing inter-domain routing in the Internet. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:1, pp:21-37 [Journal ] Yu Chen , Jennifer L. Welch Self-stabilizing dynamic mutual exclusion for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2005, v:65, n:9, pp:1072-1089 [Journal ] Yu Chen , Kai Hwang Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1137-1151 [Journal ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal ] Zheng Zhang , Qiao Lian , Shiding Lin , Wei Chen , Yu Chen , Chao Jin BitVault: a highly reliable distributed data retention platform. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2007, v:41, n:2, pp:27-36 [Journal ] Yu Chen , Gerald C. Gannod , James S. Collofello A software product line process simulator. [Citation Graph (0, 0)][DBLP ] Software Process: Improvement and Practice, 2006, v:11, n:4, pp:385-409 [Journal ] Dale E. Parson , David J. Murray , Yu Chen Object-oriented design patterns for debugging heterogeneous languages and virtual machines. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2005, v:35, n:3, pp:255-279 [Journal ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky Area fill synthesis for uniform layout density. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2002, v:21, n:10, pp:1132-1147 [Journal ] Yu Chen , Andrew B. Kahng , Gabriel Robins , Alexander Zelikovsky , Yuhong Zheng Compressible area fill synthesis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:8, pp:1169-1187 [Journal ] Robert N. Smith , Yu Chen , Sourav Bhattacharya Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:5, pp:1307-1315 [Journal ] Chun Yuan , Yu Chen , Zheng Zhang Evaluation of Edge Caching/Offloading for Dynamic Content Delivery. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:11, pp:1411-1423 [Journal ] Navneet Malpani , Yu Chen , Nitin H. Vaidya , Jennifer L. Welch Distributed Token Circulation in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2005, v:4, n:2, pp:154-165 [Journal ] Y. Sakazaki , S. Masuda , J. Onishi , Yu Chen , Hirotada Ohashi The modeling of colloidal fluids by the real-coded lattice gas. [Citation Graph (0, 0)][DBLP ] Mathematics and Computers in Simulation, 2006, v:72, n:2-6, pp:184-189 [Journal ] Tao Wei , Jian Mao , Wei Zou , Yu Chen Structuring 2-way Branches in Binary Executables. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2007, pp:115-118 [Conf ] Ruonan Li , Yu Chen , Xudong Zhang Fast Robust Eigen-Background Updating for Foreground Detection. [Citation Graph (0, 0)][DBLP ] ICIP, 2006, pp:1833-1836 [Conf ] Yu Chen , Eric Fleury A Distributed Policy Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:1559-1567 [Conf ] Yu Chen , Eric Fleury , Violet R. Syrotiuk Topology-Transparent Duty Cycling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1-10 [Conf ] Shuo Tang , Yu Chen , Zheng Zhang Machine Bank: Own Your Virtual Personal Computer. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1-10 [Conf ] Wei Chen , Jialin Zhang , Yu Chen , Xuezheng Liu Partition approach to failure detectors for k-set agreement. [Citation Graph (0, 0)][DBLP ] PODC, 2007, pp:306-307 [Conf ] Tao Wei , Jian Mao , Wei Zou , Yu Chen A New Algorithm for Identifying Loops in Decompilation. [Citation Graph (0, 0)][DBLP ] SAS, 2007, pp:170-183 [Conf ] Yu Chen , Wei Chen Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance. [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:97-113 [Conf ] Wei Chen , Jialin Zhang , Yu Chen , Xuezheng Liu Weakening Failure Detectors for k -Set Agreement Via the Partition Approach. [Citation Graph (0, 0)][DBLP ] DISC, 2007, pp:123-138 [Conf ] Yu Chen , Cathy Kriloff Dominant regions in noncrystallographic hyperplane arrangements. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 2007, v:114, n:5, pp:789-808 [Journal ] Yu Chen , Lars Henning Pedersen , Wesley W. Chu , Jorn Olsen Drug exposure side effects from mining pregnancy data. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2007, v:9, n:1, pp:22-29 [Journal ] Yu Chen , Fuxin Zhang Code reordering on limited branch offset. [Citation Graph (0, 0)][DBLP ] TACO, 2007, v:4, n:2, pp:- [Journal ] Yu Chen , Kai Hwang , Wei-Shinn Ku Collaborative Detection of DDoS Attacks over Multiple Network Domains. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:12, pp:1649-1662 [Journal ] A Comparative Study of Correlation Measurements for Searching Similar Tags. [Citation Graph (, )][DBLP ] How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. [Citation Graph (, )][DBLP ] A comparative study of multilinear principal component analysis for face recognition. [Citation Graph (, )][DBLP ] A robust segmentation approach to iris recognition based on video. [Citation Graph (, )][DBLP ] MMIR: Mining Multi-scale Intervention Rules in Sub-Complex System. [Citation Graph (, )][DBLP ] Identity-based encryption based on DHIES. [Citation Graph (, )][DBLP ] Study of ASP service lifecycle management technologies for networked manufacturing system. [Citation Graph (, )][DBLP ] Sketching in the air: A vision-based system for 3D object design. [Citation Graph (, )][DBLP ] 3D reconstruction of curved objects from single 2D line drawings. [Citation Graph (, )][DBLP ] When ABE Meets RSS. [Citation Graph (, )][DBLP ] Backbone-based Scheduling for Data Dissemination in Wireless Sensor Networks with Mobile Sinks. [Citation Graph (, )][DBLP ] Inferring 3D Shapes and Deformations from Single Views. [Citation Graph (, )][DBLP ] IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [Citation Graph (, )][DBLP ] CDA: A Novel Clustering Delegate Algorithm Based on Minority Protection. [Citation Graph (, )][DBLP ] CTSC: Core-Tag Oriented Spectral Clustering Algorithm on Web2.0 Tags. [Citation Graph (, )][DBLP ] Feature Extraction of Finger-vein Image Based on Morphologic Algorithm. [Citation Graph (, )][DBLP ] Study of active power filter based on intelligent dynamic follow harmonic objective function. [Citation Graph (, )][DBLP ] An evolvability-enhanced artificial embryogeny for generating network structures. [Citation Graph (, )][DBLP ] Data Sharing Analysis of Emerging Parallel Media Mining Workloads. [Citation Graph (, )][DBLP ] Network Externality Products C & Competition Strategy: An Experimental Economics Approach. [Citation Graph (, )][DBLP ] Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks. [Citation Graph (, )][DBLP ] A Divide-and-Conquer Approach to 3D Object Reconstruction from Line Drawings. [Citation Graph (, )][DBLP ] A Cellular Automatic Method for the Edge Detection of Images. [Citation Graph (, )][DBLP ] Dynamic Identification and Visualization of Gene Regulatory Networks from Time-Series Gene Expression Profiles. [Citation Graph (, )][DBLP ] Interaction design of children's mobile phone for enhancing cognitive ability. [Citation Graph (, )][DBLP ] Semi-supervised discriminant analysis based on UDP regularization. [Citation Graph (, )][DBLP ] Collective Intelligence in Knowledge Management. [Citation Graph (, )][DBLP ] A Model of Collaborative Knowledge-Building Based on Web2.0. [Citation Graph (, )][DBLP ] IOS Enabled Business Process Transformation: A Case Study in China. [Citation Graph (, )][DBLP ] Enterprise Niche and E-Business Strategy. [Citation Graph (, )][DBLP ] Iris Recognition Based on Wavelet Neural Network Transform System. [Citation Graph (, )][DBLP ] B Spline Wavelet Based Medical Image Edge Extraction. [Citation Graph (, )][DBLP ] The Application of Orthogonal Wavelet Packets Based on 2v-SVM to Medical Image Fusion. [Citation Graph (, )][DBLP ] Efficient shared cache management through sharing-aware replacement and streaming-aware insertion policy. [Citation Graph (, )][DBLP ] A New Unconstrained Iris Image Analysis and Segmentation Method in Biometrics. [Citation Graph (, )][DBLP ] Scaling OLTP applications on commodity multi-core platforms. [Citation Graph (, )][DBLP ] Scalability comparison of commodity operating systems on multi-cores. [Citation Graph (, )][DBLP ] Understanding the Memory Behavior of Emerging Multi-core Workloads. [Citation Graph (, )][DBLP ] Reinventing Lock Modeling for Multi-Core Systems. [Citation Graph (, )][DBLP ] Scalable Address Allocation Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Intersecting Multilingual Data for Faster and Better Statistical Translations. [Citation Graph (, )][DBLP ] Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. [Citation Graph (, )][DBLP ] Failure Detectors and Extended Paxos for k-Set Agreement. [Citation Graph (, )][DBLP ] Fairness and Interactivity of Three CPU Schedulers in Linux. [Citation Graph (, )][DBLP ] Software outsourcing in beijing: Basics, trends and implications. [Citation Graph (, )][DBLP ] Knowledge-based approach to video content classification. [Citation Graph (, )][DBLP ] Intervention Events Detection and Prediction in Data Streams. [Citation Graph (, )][DBLP ] A New Noise Tolerant Segmentation Approach to Nonideal Iris Image with Optimized Computational Speed. [Citation Graph (, )][DBLP ] A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. [Citation Graph (, )][DBLP ] A Bandwidth Estimation Model for Multiplexed E-MBMS Services. [Citation Graph (, )][DBLP ] Statistical Multiplexing for LTE MBMS in Dynamic Service Deployment. [Citation Graph (, )][DBLP ] An Improved Relay Selection Scheme in Half-Duplex Relay Channels. [Citation Graph (, )][DBLP ] Cellular Based Machine to Machine Communication with un-peer2peer protocol stacks. [Citation Graph (, )][DBLP ] Performance assessment of DMOEA-DD with CEC 2009 MOEA competition test instances. [Citation Graph (, )][DBLP ] Multi-Layered Networks for Visualizing the Interactions between Heterogeneous Proteins. [Citation Graph (, )][DBLP ] Identifying Functional Groups by Finding Cliques and Near-Cliques in Protein Interaction Networks. [Citation Graph (, )][DBLP ] Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions. [Citation Graph (, )][DBLP ] Adaptive Gene Expression Programming Algorithm Based on Cloud Model. [Citation Graph (, )][DBLP ] A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination. [Citation Graph (, )][DBLP ] Malicious node detection in wireless sensor networks using weighted trust evaluation. [Citation Graph (, )][DBLP ] Harmonic Detection in Electric Power System Based on Wavelet Multi-resolution Analysis. [Citation Graph (, )][DBLP ] Theory and Application of School-Based Education Quality Evaluation Model Constructed from Improved AHP Method. [Citation Graph (, )][DBLP ] Algorithm Description of Generalized Binary Linked List. [Citation Graph (, )][DBLP ] Dynamics of Research Team Formation in Complex Networks. [Citation Graph (, )][DBLP ] Research and Design of Multi-channel Programmable Anti-aliasing Filter Circuit. [Citation Graph (, )][DBLP ] Realization of Wavelet Soft Threshold De-noising Technology Based on Visual Instrument. [Citation Graph (, )][DBLP ] Integrating a Rule-based with a Hierarchical Translation System. [Citation Graph (, )][DBLP ] MultiUN: A Multilingual Corpus from United Nation Documents. [Citation Graph (, )][DBLP ] Improving Statistical Machine Translation Efficiency by Triangulation. [Citation Graph (, )][DBLP ] A Novel Barzilai-Borwein Image Reconstruction Algorithm for Electrical Capacitance Tomography System. [Citation Graph (, )][DBLP ] A Novel Principal Component Analysis Flow Pattern Identification Algorithm for Electrical Capacitance Tomography System. [Citation Graph (, )][DBLP ] A Fast, Direct Algorithm for the Lippmann-Schwinger Integral Equation in Two Dimensions. [Citation Graph (, )][DBLP ] Integrative 3D modelling of complex carving surface. [Citation Graph (, )][DBLP ] Special issue series for information systems research in China: guest editorial. [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.774secs