The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yu Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu Chen, Zhenqiang Jiao, Jun Xie, Zhihui Du, Peng Liu, Ziyu Zhu
    A High Performance Design and Implementation of the Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:125-135 [Conf]
  2. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky
    Monte-Carlo algorithms for layout density control. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2000, pp:523-528 [Conf]
  3. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky
    Hierarchical dummy fill for process uniformity. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2001, pp:139-144 [Conf]
  4. Yu Chen, Trupti Joshi, Ying Xu, Dong Xu
    Towards Automated Derivation of Biological Pathways Using High-Throughput Biological Data. [Citation Graph (0, 0)][DBLP]
    BIBE, 2003, pp:18-25 [Conf]
  5. Yu Chen, Qionghai Dai
    Dynamic Feedback and Elastic Scheduling Model for Flexible Workload Management. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:421-425 [Conf]
  6. Maria Lin, David W. Walker, Yu Chen, Jason W. Jones
    A grid-based problem solving environment for GECEM. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:686-693 [Conf]
  7. Yu Chen, Xiaoge Wang, Zhenqiang Jiao, Jun Xie, Zhihui Du, Sanli Li
    MyVIA: A Design and Implementation of the High Performance Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP]
    CLUSTER, 2002, pp:160-0 [Conf]
  8. Yu Chen, Puneet Gupta, Andrew B. Kahng
    Performance-impact limited area fill synthesis. [Citation Graph (0, 0)][DBLP]
    DAC, 2003, pp:22-27 [Conf]
  9. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky
    Practical iterated fill synthesis for CMP uniformity. [Citation Graph (0, 0)][DBLP]
    DAC, 2000, pp:671-674 [Conf]
  10. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky, Yuhong Zheng
    Area Fill Generation With Inherent Data Volume Reduction. [Citation Graph (0, 0)][DBLP]
    DATE, 2003, pp:10868-10875 [Conf]
  11. Yu Chen, Jennifer L. Welch
    Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    DIAL-M, 2002, pp:34-42 [Conf]
  12. Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen
    A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:51-60 [Conf]
  13. Yu Chen, Ajoy Kumar Datta, Sébastien Tixeuil
    Stabilizing Inter-domain Routing in the Internet (Research Note). [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2002, pp:749-752 [Conf]
  14. Zhihui Du, Francis C. M. Lau, Cho-Li Wang, Wai-kin Lam, He Chuan, Xiaoge Wang, Yu Chen, Sanli Li
    Design of an OGSA-Based MetaService Architecture. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:167-174 [Conf]
  15. Yu Chen, Qionghai Dai
    MONSTER: A Media-on-Demand Servicing System Based on P2P Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:634-641 [Conf]
  16. Yu Chen, Qionghai Dai
    MoDast: A MoD System Based on P2P Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:843-846 [Conf]
  17. Xi Wang, Xu Liu, Xiaoge Wang, Yu Chen
    A Middleware Based Mobile Scientific Computing System - MobileLab. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:1013-1016 [Conf]
  18. Hongliang Gu, Yuanchun Shi, Yu Chen, Bibo Wang, Wenfeng Jiang
    Cicada: A Highly-Precise Easy-Embedded and Omni-Directional Indoor Location Sensing System. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:385-394 [Conf]
  19. Dorothy G. Dologite, Meiqi Fang, Yu Chen, Robert J. Mockler
    The Changing Role of Information Systems in Chinese State-Owned Organizations. [Citation Graph (0, 0)][DBLP]
    HICSS (4), 1996, pp:474-0 [Conf]
  20. Xiangping Meng, Robert Babuska, Lucian Busoniu, Yu Chen, Wanyu Tan
    An Improved Multiagent Reinforcement Learning Algorithm. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:337-343 [Conf]
  21. Wenfeng Jiang, Yu Chen, Yuanchun Shi, Yunfeng Sun
    The Design and Implementation of the Cicada Wireless Sensor Network Indoor Localization System. [Citation Graph (0, 0)][DBLP]
    ICAT Workshops, 2006, pp:536-541 [Conf]
  22. Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou
    GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:187-195 [Conf]
  23. Yu Chen, Andrew B. Kahng, Gang Qu, Alexander Zelikovsky
    The associative-skew clock routing problem. [Citation Graph (0, 0)][DBLP]
    ICCAD, 1999, pp:168-172 [Conf]
  24. Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, Kai Hwang
    HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:423-432 [Conf]
  25. Yu Chen, Yu-Kwong Kwok, Kai Hwang
    MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:123-129 [Conf]
  26. Bibo Wang, Yu Chen, Hongliang Gu, Jian Yang, Tan Zhao
    Two Energy-Efficient, Timesaving Improvement Mechanisms of Network Reprogramming in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICESS, 2005, pp:473-483 [Conf]
  27. Shuo Kang, Huayong Wang, Yu Chen, Xiaoge Wang, Yiqi Dai
    Skyeye: An Instruction Simulator with Energy Awareness. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:456-461 [Conf]
  28. Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li
    TH-SMS: Security Management System in Advanced Computational Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:398-407 [Conf]
  29. Hwayong Joung, Edward K. Wong, Yu Chen, Seung P. Kim
    Document Image Compression using Straight Line Extraction and Block Context Model. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:530-534 [Conf]
  30. Zheng Zhang, Yu Chen, Shiding Lin, Bo-Ying Lu, Shuming Shi, Xing Xie, Chun Yuan
    P2P Resource Pool and Its Application to Optimize Wide-Area Application Level Multicasting. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:273-281 [Conf]
  31. Kuo Zhang, Yanni Wu, Zhenkun Zheng, Xiaoge Wang, Yu Chen
    A Component-Based Reflective Middleware Approach to Context-Aware Adaptive Systems. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:429-434 [Conf]
  32. Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen
    A Core Model Supporting Location-Aware Computing in Smart Classroom. [Citation Graph (0, 0)][DBLP]
    ICWL, 2005, pp:1-13 [Conf]
  33. Yu Chen, H. Han, X. Wang
    Two-tiered architecture of IS in WWW environment. [Citation Graph (0, 0)][DBLP]
    Information Systems in the WWW Environment, 1998, pp:239-257 [Conf]
  34. C. Bandela, Yu Chen, Andrew B. Kahng, Ion I. Mandoiu, Alexander Zelikovsky
    Auctions with Buyer Preferences. [Citation Graph (0, 0)][DBLP]
    Information Systems: The e-Business Challenge, 2002, pp:223-238 [Conf]
  35. Yu Chen, Natong Zhang, Yanfeng Zhang
    A new queuing and scheduling model under DiffServ architecture. [Citation Graph (0, 0)][DBLP]
    IRI, 2003, pp:436-443 [Conf]
  36. Yu Chen, Wei Jyh Heng
    Automatic synchronization of speech transcript and slides in presentation. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:568-571 [Conf]
  37. Yu Chen, Thomas C. Henderson
    S-NETS: Smart Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISER, 2000, pp:81-90 [Conf]
  38. Yu Chen, Wesley W. Chu
    Database Security Protection Via Inference Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:452-458 [Conf]
  39. Wenlong Li, Haibo Lin, Yu Chen, Zhizhong Tang
    Increasing Software-Pipelined Loops in the Itanium-Like Architecture. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:947-951 [Conf]
  40. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky
    Closing the smoothness and uniformity gap in area fill synthesis. [Citation Graph (0, 0)][DBLP]
    ISPD, 2002, pp:137-142 [Conf]
  41. Xudong Niu, Yan Song, Bo Li, Wei Bian, Yadong Tao, Feng Liu, Jinhua Hu, Yu Chen, Frank He
    Tests on Symmetry and Continuity between BSIM4 and BSIM5. [Citation Graph (0, 0)][DBLP]
    ISQED, 2007, pp:263-268 [Conf]
  42. Yu Chen, Gerald C. Gannod, James S. Collofello, Hessam S. Sarjoughian
    Using Simulation to Facilitate the Study of Software Product Line Evolution. [Citation Graph (0, 0)][DBLP]
    IWPSE, 2004, pp:103-112 [Conf]
  43. Yu Chen, Kai Hwang, Yu-Kwong Kwok
    Filtering of Shrew DDoS Attacks in Frequency Domain. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:786-793 [Conf]
  44. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  45. Edward Altman, Yu Chen, Wai Chong Low
    Semantic exploration of lecture videos. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2002, pp:416-417 [Conf]
  46. Yu Chen, Eric Fleury
    Latency of Event Reporting in Duty-Cycled Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:711-723 [Conf]
  47. Yu Chen, Jennifer L. Welch
    Location-based broadcasting for dense mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2005, pp:63-70 [Conf]
  48. Yu Chen, Eric Fleury
    Duplicate Address Detection in Wireless Ad Hoc Networks Using Wireless Nature. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:415-426 [Conf]
  49. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    Automatic Misconfiguration Troubleshooting with PeerPressure. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:245-258 [Conf]
  50. Yu Chen, Dong Xu
    Genome-Scale Protein Function Prediction in Yeast Saccharomyces cerevisiae Through Integrating Multiple Sources of High-Throughput Data. [Citation Graph (0, 0)][DBLP]
    Pacific Symposium on Biocomputing, 2005, pp:- [Conf]
  51. Yu Chen, Qian Fang, Zhihui Du, Sanli Li
    TH-MPI: OS Kernel Integrated Fault Tolerant MPI. [Citation Graph (0, 0)][DBLP]
    PVM/MPI, 2001, pp:75-82 [Conf]
  52. Xiufen Zou, Yu Chen, Zishu Pan
    Modeling and Optimization of the Specificity in Cell Signaling Pathways Based on a High Performance Multi-objective Evolutionary Algorithm. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:774-781 [Conf]
  53. Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang
    PeerPressure for automatic troubleshooting. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:398-399 [Conf]
  54. Yu Chen, Dong Xu
    Prediction of Protein Dispensability through Integrated Analysis of Multiple-Source High-Throughput Data. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:158-166 [Conf]
  55. Huayong Wang, Yu Chen, Yiqi Dai
    A Soft Real-Time Web News Classification System with Double Control Loops. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:81-90 [Conf]
  56. Qin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holger M. Kienle, Hausi A. Müller
    Leveraging Visio for Adoption-Centric Reverse Engineering Tools. [Citation Graph (0, 0)][DBLP]
    WCRE, 2003, pp:270-274 [Conf]
  57. Yu Chen, Wei Chen
    Brief Announcement: Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance. [Citation Graph (0, 0)][DBLP]
    DISC, 2006, pp:563-565 [Conf]
  58. Yu Chen, Wei-Ying Ma, HongJiang Zhang
    Detecting web page structure for adaptive viewing on small form factor devices. [Citation Graph (0, 0)][DBLP]
    WWW, 2003, pp:225-233 [Conf]
  59. Wei-Ying Ma, Xing Xie, Chun Yuan, Yu Chen, Zheng Zhang, HongJiang Zhang
    Media Companion: Delivering Content-oriented Web Services to Internet Media. [Citation Graph (0, 0)][DBLP]
    WWW (Posters), 2003, pp:- [Conf]
  60. Chun Yuan, Yu Chen, Zheng Zhang
    Evaluation of edge caching/offloading for dynamic content delivery. [Citation Graph (0, 0)][DBLP]
    WWW, 2003, pp:461-471 [Conf]
  61. Yu Chen, Zhaohui Wu, Yunhe Pan
    Intelligent Multimedia Presentation System: An Object-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:304-309 [Conf]
  62. Yu Chen, Gordon M. Crippen
    An iterative refinement algorithm for consistency based multiple structural alignment methods. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2006, v:22, n:17, pp:2087-2093 [Journal]
  63. Yu Chen, Dong Xu
    Understanding protein dispensability through machine-learning analysis of high-throughput data. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2005, v:21, n:5, pp:575-581 [Journal]
  64. Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen
    Collaborative Internet Worm Containment. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:25-33 [Journal]
  65. Yubo Miao, Chong Ser Chong, Taichong Chai, Yu Chen, Quanbo Zou, Tie Yan, Chew-Kiat Heng, Tit Meng Lim
    Flip-Chip Packaged Micro-Plate For Low Cost Thermal Multiplexing. [Citation Graph (0, 0)][DBLP]
    International Journal of Computational Engineering Science, 2003, v:4, n:2, pp:235-238 [Journal]
  66. Yubo Miao, Yu Chen, Quanbo Zou, Janak Singh, Tie Yan, Chew-Kiat Heng, Tit Meng Lim
    Low Cost Micro-Pcr Array And Micro-Fluidic Integration On Single Silicon Chip. [Citation Graph (0, 0)][DBLP]
    International Journal of Computational Engineering Science, 2003, v:4, n:2, pp:231-234 [Journal]
  67. Yu Chen, Xing Xie, Wei-Ying Ma, HongJiang Zhang
    Adapting Web Pages for Small-Screen Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2005, v:9, n:1, pp:50-56 [Journal]
  68. Weida Tong, David R. Lowis, Roger Perkins, Yu Chen, William J. Welsh, Dean W. Goddette, Trevor W. Heritage, Daniel M. Sheehan
    Evaluation of Quantitative Structure-Activity Relationship Methods for Large-Scale Prediction of Chemicals Binding to the Estrogen Receptor. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1998, v:38, n:4, pp:669-677 [Journal]
  69. Yu Chen, Ajoy Kumar Datta, Sébastien Tixeuil
    Stabilizing inter-domain routing in the Internet. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2005, v:14, n:1, pp:21-37 [Journal]
  70. Yu Chen, Jennifer L. Welch
    Self-stabilizing dynamic mutual exclusion for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:9, pp:1072-1089 [Journal]
  71. Yu Chen, Kai Hwang
    Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1137-1151 [Journal]
  72. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]
  73. Zheng Zhang, Qiao Lian, Shiding Lin, Wei Chen, Yu Chen, Chao Jin
    BitVault: a highly reliable distributed data retention platform. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2007, v:41, n:2, pp:27-36 [Journal]
  74. Yu Chen, Gerald C. Gannod, James S. Collofello
    A software product line process simulator. [Citation Graph (0, 0)][DBLP]
    Software Process: Improvement and Practice, 2006, v:11, n:4, pp:385-409 [Journal]
  75. Dale E. Parson, David J. Murray, Yu Chen
    Object-oriented design patterns for debugging heterogeneous languages and virtual machines. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:3, pp:255-279 [Journal]
  76. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky
    Area fill synthesis for uniform layout density. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2002, v:21, n:10, pp:1132-1147 [Journal]
  77. Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexander Zelikovsky, Yuhong Zheng
    Compressible area fill synthesis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:8, pp:1169-1187 [Journal]
  78. Robert N. Smith, Yu Chen, Sourav Bhattacharya
    Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:5, pp:1307-1315 [Journal]
  79. Chun Yuan, Yu Chen, Zheng Zhang
    Evaluation of Edge Caching/Offloading for Dynamic Content Delivery. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:11, pp:1411-1423 [Journal]
  80. Navneet Malpani, Yu Chen, Nitin H. Vaidya, Jennifer L. Welch
    Distributed Token Circulation in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2005, v:4, n:2, pp:154-165 [Journal]
  81. Y. Sakazaki, S. Masuda, J. Onishi, Yu Chen, Hirotada Ohashi
    The modeling of colloidal fluids by the real-coded lattice gas. [Citation Graph (0, 0)][DBLP]
    Mathematics and Computers in Simulation, 2006, v:72, n:2-6, pp:184-189 [Journal]
  82. Tao Wei, Jian Mao, Wei Zou, Yu Chen
    Structuring 2-way Branches in Binary Executables. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:115-118 [Conf]
  83. Ruonan Li, Yu Chen, Xudong Zhang
    Fast Robust Eigen-Background Updating for Foreground Detection. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1833-1836 [Conf]
  84. Yu Chen, Eric Fleury
    A Distributed Policy Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1559-1567 [Conf]
  85. Yu Chen, Eric Fleury, Violet R. Syrotiuk
    Topology-Transparent Duty Cycling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]
  86. Shuo Tang, Yu Chen, Zheng Zhang
    Machine Bank: Own Your Virtual Personal Computer. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]
  87. Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu
    Partition approach to failure detectors for k-set agreement. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:306-307 [Conf]
  88. Tao Wei, Jian Mao, Wei Zou, Yu Chen
    A New Algorithm for Identifying Loops in Decompilation. [Citation Graph (0, 0)][DBLP]
    SAS, 2007, pp:170-183 [Conf]
  89. Yu Chen, Wei Chen
    Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:97-113 [Conf]
  90. Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu
    Weakening Failure Detectors for k -Set Agreement Via the Partition Approach. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:123-138 [Conf]
  91. Yu Chen, Cathy Kriloff
    Dominant regions in noncrystallographic hyperplane arrangements. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2007, v:114, n:5, pp:789-808 [Journal]
  92. Yu Chen, Lars Henning Pedersen, Wesley W. Chu, Jorn Olsen
    Drug exposure side effects from mining pregnancy data. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2007, v:9, n:1, pp:22-29 [Journal]
  93. Yu Chen, Fuxin Zhang
    Code reordering on limited branch offset. [Citation Graph (0, 0)][DBLP]
    TACO, 2007, v:4, n:2, pp:- [Journal]
  94. Yu Chen, Kai Hwang, Wei-Shinn Ku
    Collaborative Detection of DDoS Attacks over Multiple Network Domains. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:12, pp:1649-1662 [Journal]

  95. A Comparative Study of Correlation Measurements for Searching Similar Tags. [Citation Graph (, )][DBLP]


  96. How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. [Citation Graph (, )][DBLP]


  97. A comparative study of multilinear principal component analysis for face recognition. [Citation Graph (, )][DBLP]


  98. A robust segmentation approach to iris recognition based on video. [Citation Graph (, )][DBLP]


  99. MMIR: Mining Multi-scale Intervention Rules in Sub-Complex System. [Citation Graph (, )][DBLP]


  100. Identity-based encryption based on DHIES. [Citation Graph (, )][DBLP]


  101. Study of ASP service lifecycle management technologies for networked manufacturing system. [Citation Graph (, )][DBLP]


  102. Sketching in the air: A vision-based system for 3D object design. [Citation Graph (, )][DBLP]


  103. 3D reconstruction of curved objects from single 2D line drawings. [Citation Graph (, )][DBLP]


  104. When ABE Meets RSS. [Citation Graph (, )][DBLP]


  105. Backbone-based Scheduling for Data Dissemination in Wireless Sensor Networks with Mobile Sinks. [Citation Graph (, )][DBLP]


  106. Inferring 3D Shapes and Deformations from Single Views. [Citation Graph (, )][DBLP]


  107. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [Citation Graph (, )][DBLP]


  108. CDA: A Novel Clustering Delegate Algorithm Based on Minority Protection. [Citation Graph (, )][DBLP]


  109. CTSC: Core-Tag Oriented Spectral Clustering Algorithm on Web2.0 Tags. [Citation Graph (, )][DBLP]


  110. Feature Extraction of Finger-vein Image Based on Morphologic Algorithm. [Citation Graph (, )][DBLP]


  111. Study of active power filter based on intelligent dynamic follow harmonic objective function. [Citation Graph (, )][DBLP]


  112. An evolvability-enhanced artificial embryogeny for generating network structures. [Citation Graph (, )][DBLP]


  113. Data Sharing Analysis of Emerging Parallel Media Mining Workloads. [Citation Graph (, )][DBLP]


  114. Network Externality Products C & Competition Strategy: An Experimental Economics Approach. [Citation Graph (, )][DBLP]


  115. Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks. [Citation Graph (, )][DBLP]


  116. A Divide-and-Conquer Approach to 3D Object Reconstruction from Line Drawings. [Citation Graph (, )][DBLP]


  117. A Cellular Automatic Method for the Edge Detection of Images. [Citation Graph (, )][DBLP]


  118. Dynamic Identification and Visualization of Gene Regulatory Networks from Time-Series Gene Expression Profiles. [Citation Graph (, )][DBLP]


  119. Interaction design of children's mobile phone for enhancing cognitive ability. [Citation Graph (, )][DBLP]


  120. Semi-supervised discriminant analysis based on UDP regularization. [Citation Graph (, )][DBLP]


  121. Collective Intelligence in Knowledge Management. [Citation Graph (, )][DBLP]


  122. A Model of Collaborative Knowledge-Building Based on Web2.0. [Citation Graph (, )][DBLP]


  123. IOS Enabled Business Process Transformation: A Case Study in China. [Citation Graph (, )][DBLP]


  124. Enterprise Niche and E-Business Strategy. [Citation Graph (, )][DBLP]


  125. Iris Recognition Based on Wavelet Neural Network Transform System. [Citation Graph (, )][DBLP]


  126. B Spline Wavelet Based Medical Image Edge Extraction. [Citation Graph (, )][DBLP]


  127. The Application of Orthogonal Wavelet Packets Based on 2v-SVM to Medical Image Fusion. [Citation Graph (, )][DBLP]


  128. Efficient shared cache management through sharing-aware replacement and streaming-aware insertion policy. [Citation Graph (, )][DBLP]


  129. A New Unconstrained Iris Image Analysis and Segmentation Method in Biometrics. [Citation Graph (, )][DBLP]


  130. Scaling OLTP applications on commodity multi-core platforms. [Citation Graph (, )][DBLP]


  131. Scalability comparison of commodity operating systems on multi-cores. [Citation Graph (, )][DBLP]


  132. Understanding the Memory Behavior of Emerging Multi-core Workloads. [Citation Graph (, )][DBLP]


  133. Reinventing Lock Modeling for Multi-Core Systems. [Citation Graph (, )][DBLP]


  134. Scalable Address Allocation Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  135. Intersecting Multilingual Data for Faster and Better Statistical Translations. [Citation Graph (, )][DBLP]


  136. Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. [Citation Graph (, )][DBLP]


  137. Failure Detectors and Extended Paxos for k-Set Agreement. [Citation Graph (, )][DBLP]


  138. Fairness and Interactivity of Three CPU Schedulers in Linux. [Citation Graph (, )][DBLP]


  139. Software outsourcing in beijing: Basics, trends and implications. [Citation Graph (, )][DBLP]


  140. Knowledge-based approach to video content classification. [Citation Graph (, )][DBLP]


  141. Intervention Events Detection and Prediction in Data Streams. [Citation Graph (, )][DBLP]


  142. A New Noise Tolerant Segmentation Approach to Nonideal Iris Image with Optimized Computational Speed. [Citation Graph (, )][DBLP]


  143. A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. [Citation Graph (, )][DBLP]


  144. A Bandwidth Estimation Model for Multiplexed E-MBMS Services. [Citation Graph (, )][DBLP]


  145. Statistical Multiplexing for LTE MBMS in Dynamic Service Deployment. [Citation Graph (, )][DBLP]


  146. An Improved Relay Selection Scheme in Half-Duplex Relay Channels. [Citation Graph (, )][DBLP]


  147. Cellular Based Machine to Machine Communication with un-peer2peer protocol stacks. [Citation Graph (, )][DBLP]


  148. Performance assessment of DMOEA-DD with CEC 2009 MOEA competition test instances. [Citation Graph (, )][DBLP]


  149. Multi-Layered Networks for Visualizing the Interactions between Heterogeneous Proteins. [Citation Graph (, )][DBLP]


  150. Identifying Functional Groups by Finding Cliques and Near-Cliques in Protein Interaction Networks. [Citation Graph (, )][DBLP]


  151. Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions. [Citation Graph (, )][DBLP]


  152. Adaptive Gene Expression Programming Algorithm Based on Cloud Model. [Citation Graph (, )][DBLP]


  153. A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination. [Citation Graph (, )][DBLP]


  154. Malicious node detection in wireless sensor networks using weighted trust evaluation. [Citation Graph (, )][DBLP]


  155. Harmonic Detection in Electric Power System Based on Wavelet Multi-resolution Analysis. [Citation Graph (, )][DBLP]


  156. Theory and Application of School-Based Education Quality Evaluation Model Constructed from Improved AHP Method. [Citation Graph (, )][DBLP]


  157. Algorithm Description of Generalized Binary Linked List. [Citation Graph (, )][DBLP]


  158. Dynamics of Research Team Formation in Complex Networks. [Citation Graph (, )][DBLP]


  159. Research and Design of Multi-channel Programmable Anti-aliasing Filter Circuit. [Citation Graph (, )][DBLP]


  160. Realization of Wavelet Soft Threshold De-noising Technology Based on Visual Instrument. [Citation Graph (, )][DBLP]


  161. Integrating a Rule-based with a Hierarchical Translation System. [Citation Graph (, )][DBLP]


  162. MultiUN: A Multilingual Corpus from United Nation Documents. [Citation Graph (, )][DBLP]


  163. Improving Statistical Machine Translation Efficiency by Triangulation. [Citation Graph (, )][DBLP]


  164. A Novel Barzilai-Borwein Image Reconstruction Algorithm for Electrical Capacitance Tomography System. [Citation Graph (, )][DBLP]


  165. A Novel Principal Component Analysis Flow Pattern Identification Algorithm for Electrical Capacitance Tomography System. [Citation Graph (, )][DBLP]


  166. A Fast, Direct Algorithm for the Lippmann-Schwinger Integral Equation in Two Dimensions. [Citation Graph (, )][DBLP]


  167. Integrative 3D modelling of complex carving surface. [Citation Graph (, )][DBLP]


  168. Special issue series for information systems research in China: guest editorial. [Citation Graph (, )][DBLP]


Search in 0.344secs, Finished in 0.353secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002