The SCEAS System
Navigation Menu

Search the dblp DataBase


Feng Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Chen, Shaoyun Li, William Cheng-Chung Chu
    Feature Analysis for Service-Oriented Reengineering. [Citation Graph (0, 0)][DBLP]
    APSEC, 2005, pp:201-208 [Conf]
  2. Ruimin Liu, Feng Chen, Hongji Yang, William C. Chu, Yu-Bin Lai
    Agent-Based Web Services Evolution for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:726-731 [Conf]
  3. Azadeh Farzan, Feng Chen, José Meseguer, Grigore Rosu
    Formal Analysis of Java Programs in JavaFAN. [Citation Graph (0, 0)][DBLP]
    CAV, 2004, pp:501-505 [Conf]
  4. Feng Chen, Qianxiang Wang, Hong Mei, Fuqing Yang
    An Architecture-Based Approach for Component-Oriented Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:450-458 [Conf]
  5. Feng Chen, Hongji Yang, He Guo, Baowen Xu
    Agentification for Web Services. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:514-519 [Conf]
  6. He Guo, Feng Chen, Yuxin Wang, Yuanyuan Sun
    A Reusable Software Architecture Model for Manufactory Management Information System. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:469-471 [Conf]
  7. Feng Chen, Hongji Yang, Bing Qiao, William Cheng-Chung Chu
    A Formal Model Driven Approach to Dependable Software Evolution. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:205-214 [Conf]
  8. Zheng Gao, Feng Chen, Benjamin Belzer, John D. Villasenor
    A Comparison of the Z, E8, and Leech Lattices for Image Subband Quantization. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1995, pp:312-321 [Conf]
  9. Song Jiang, Xiaoning Ding, Feng Chen, Enhua Tan, Xiaodong Zhang
    DULO: An Effective Buffer Cache Management Scheme to Exploit Both Temporal and Spatial Localities. [Citation Graph (0, 0)][DBLP]
    FAST, 2005, pp:- [Conf]
  10. Feng Chen, Marcelo d'Amorim, Grigore Rosu
    A Formal Monitoring-Based Framework for Software Development and Analysis. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2004, pp:357-372 [Conf]
  11. Hong Mei, Feng Chen, Qianxiang Wang, Yao-Dong Feng
    ABC/ADL: An ADL Supporting Component Composition. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2002, pp:38-47 [Conf]
  12. Nikolai Tillmann, Feng Chen, Wolfram Schulte
    Discovering Likely Method Specifications. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2006, pp:717-736 [Conf]
  13. Feng Chen, Zheng Gao, John D. Villasenor
    A lattice vector quantizer for generalized Gaussian sources. [Citation Graph (0, 0)][DBLP]
    ICIP, 1995, pp:105-108 [Conf]
  14. Feng Chen, XiaoTong Yuan, ShuTang Yang
    Joint feature-spatial-measure space: a new approach to highly efficient probabilistic object tracking. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:406-409 [Conf]
  15. Yongbin Li, Feng Chen, Wenli Xu, Youtian Du
    Gaussian-Based Codebook Model for Video Background Subtraction. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:762-765 [Conf]
  16. Youtian Du, Feng Chen, Wenli Xu, Yongbin Li
    Recognizing Interaction Activities using Dynamic Bayesian Network. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:618-621 [Conf]
  17. Qianxiang Wang, Feng Chen, Hong Mei, Fuqing Yang
    An Application Server to Support Online Evolution. [Citation Graph (0, 0)][DBLP]
    ICSM, 2002, pp:131-140 [Conf]
  18. Feng Chen, Song Jiang, Xiaodong Zhang
    SmartSaver: turning flash drive into a disk energy saver for mobile computers. [Citation Graph (0, 0)][DBLP]
    ISLPED, 2006, pp:412-417 [Conf]
  19. Mingfeng Wang, Zhi Geng, Miqu Wang, Feng Chen, Weijun Ding, Ming Liu
    Combination of Network Construction and Cluster Analysis and Its Application to Traditional Chinese Medicine. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:777-785 [Conf]
  20. Galen Faidley, Jayme Hero, Kukjin Lee, Bernard Lwakabamba, Robert D. Walstrom, Feng Chen, Julie A. Dickerson, Diane T. Rover, Robert J. Weber, Carolina Cruz-Neira
    Developing an Integrated Wireless System for Fully Immersive Virtual Reality Environments. [Citation Graph (0, 0)][DBLP]
    ISWC, 2004, pp:178-179 [Conf]
  21. Grigore Rosu, Feng Chen
    Certifying Measurement Unit Safety Polic. [Citation Graph (0, 0)][DBLP]
    ASE, 2003, pp:304-309 [Conf]
  22. Shichao Zhang, Feng Chen, Xindong Wu, Chengqi Zhang
    Identifying bridging rules between conceptual clusters. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:815-820 [Conf]
  23. Youtian Du, Feng Chen, Wenli Xu, Weidong Zhang
    Interacting Activity Recognition Using Hierarchical Durational-State Dynamic Bayesian Network. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:185-192 [Conf]
  24. He Guo, Chunyan Guo, Feng Chen, Hongji Yang
    Wrapping Client-Server Application to Web Services for Internet Computing. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:366-370 [Conf]
  25. Feng Chen, Falko Dressler, Armin Heindl
    End-to-end performance characteristics in energy-aware wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2006, pp:41-47 [Conf]
  26. Ping Wu, Ji Xu, Feng Chen, Jiangchuan Liu, Jihui Zhang, Bo Li
    On the Use of Sender Adaptation to Improve Stability and Fairness for Layered Video Multicast. [Citation Graph (0, 0)][DBLP]
    QoS-IP, 2003, pp:347-357 [Conf]
  27. Feng Chen, Grigore Rosu, Ram Prasad Venkatesan
    Rule-Based Analysis of Dimensional Safety. [Citation Graph (0, 0)][DBLP]
    RTA, 2003, pp:197-207 [Conf]
  28. Feng Chen, Grigore Rosu
    Parametric and Termination-Sensitive Control Dependence. [Citation Graph (0, 0)][DBLP]
    SAS, 2006, pp:387-404 [Conf]
  29. Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
    Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution. [Citation Graph (0, 0)][DBLP]
    SEKE, 2005, pp:336-341 [Conf]
  30. Feng Chen, Grigore Rosu
    Java-MOP: A Monitoring Oriented Programming Environment for Java. [Citation Graph (0, 0)][DBLP]
    TACAS, 2005, pp:546-550 [Conf]
  31. Song Jiang, Feng Chen, Xiaodong Zhang
    CLOCK-Pro: An Effective Improvement of the CLOCK Replacement. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:323-336 [Conf]
  32. Suchendra M. Bhandarkar, Feng Chen
    Similarity Analysis of Video Sequences Using an Artificial Neural Network. [Citation Graph (0, 0)][DBLP]
    Appl. Intell., 2005, v:22, n:3, pp:251-275 [Journal]
  33. Joshua S. Yuan, Ann Reed, Feng Chen, C. Neal Stewart Jr.
    Statistical analysis of real-time PCR data. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2006, v:7, n:, pp:85- [Journal]
  34. Feng Chen, Grigore Rosu
    Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:89, n:2, pp:- [Journal]
  35. Feng Chen, Marcelo d'Amorim, Grigore Rosu
    Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:144, n:4, pp:3-20 [Journal]
  36. Feng Chen, Aaron J. Mackey, Christian J. Stoeckert Jr., David S. Roos
    OrthoMCL-DB: querying a comprehensive multi-species collection of ortholog groups. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2006, v:34, n:Database-Issue, pp:363-368 [Journal]
  37. Feng Chen, Zheng Gao, John D. Villasenor
    Lattice vector quantization of generalized Gaussian sources. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:1, pp:92-103 [Journal]
  38. Dong Tian, Shuyu Chen, Feng Chen
    A Dynamic Fault Detection Algorithm under Grid Environments. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1870-1875 [Journal]
  39. Feng Chen, Grigore Rosu
    Parametric and Sliced Causality. [Citation Graph (0, 0)][DBLP]
    CAV, 2007, pp:240-253 [Conf]
  40. Feng Chen, Hongji Yang
    Model Oriented Evolutionary Redocumentation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:543-548 [Conf]
  41. Feng Chen, Song Jiang, Weisong Shi, Weikuan Yu
    FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:10- [Conf]
  42. Lan Du, Hongwei Liu, Zheng Bao, Feng Chen
    A Novel Feature Vector Using Complex HRRP for Radar Target Recognition. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:1303-1309 [Conf]
  43. Yuehui Chen, Qiang Wu, Feng Chen
    An IP and GEP Based Dynamic Decision Model for Stock Market Forecasting. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:473-479 [Conf]
  44. Feng Chen, Grigore Rosu
    Mop: an efficient and generic runtime verification framework. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2007, pp:569-588 [Conf]
  45. Weidong Zhang, Feng Chen, Wenli Xu, Zisheng Cao
    Decomposition in Hidden Markov Models for Activity Recognition. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:232-241 [Conf]
  46. Xiaoning Ding, Song Jiang, Feng Chen
    A buffer cache management scheme exploiting both temporal and spatial localities. [Citation Graph (0, 0)][DBLP]
    TOS, 2007, v:3, n:2, pp:- [Journal]

  47. Dependent advice: a general approach to optimizing history-based aspects. [Citation Graph (, )][DBLP]

  48. A framework for estimating complex probability density structures in data streams. [Citation Graph (, )][DBLP]

  49. A Fast and Robust People Counting Method in Video Surveillance. [Citation Graph (, )][DBLP]

  50. An Ontology-Based Approach for GUI Testing. [Citation Graph (, )][DBLP]

  51. Service Identification via Ontology Mapping. [Citation Graph (, )][DBLP]

  52. The Application of Data Mining Technique in Data Analyzing and Processing of Liquid Propellant Rocket Engine Test. [Citation Graph (, )][DBLP]

  53. The computing method and it's application of fuzzy knowledge weight based on rough set theory. [Citation Graph (, )][DBLP]

  54. HOMES: highway operation monitoring and evaluation system. [Citation Graph (, )][DBLP]

  55. Evolving MIMO Flexible Neural Trees for Nonlinear System Identification. [Citation Graph (, )][DBLP]

  56. Available Bandwidth in Multirate and Multihop Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  57. On Locally Linear Classification by Pairwise Coupling. [Citation Graph (, )][DBLP]

  58. Probability-Based Coverage Algorithm for 3D Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  59. An Algorithm of Coverage Control for Wireless Sensor Networks in 3D Underwater Surveillance Systems. [Citation Graph (, )][DBLP]

  60. A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings. [Citation Graph (, )][DBLP]

  61. Real-Time Video Intelligent Surveillance System. [Citation Graph (, )][DBLP]

  62. Deformation modeling using global medial representation structures and evaluation by biset mesh matching. [Citation Graph (, )][DBLP]

  63. Distortion metric for robust 3D point cloud transmission. [Citation Graph (, )][DBLP]

  64. Visual tracking by appearance modeling and sparse representation. [Citation Graph (, )][DBLP]

  65. jPredictor: a predictive runtime analysis tool for java. [Citation Graph (, )][DBLP]

  66. An Artificial Neural Networks Based Dynamic Decision Model for Time-Series Forecasting. [Citation Graph (, )][DBLP]

  67. An entropy-based method for assessing the number of spatial outliers. [Citation Graph (, )][DBLP]

  68. Caching for bursts (C-Burst): let hard disks sleep well and work energetically. [Citation Graph (, )][DBLP]

  69. PS-BC: power-saving considerations in design of buffer caches serving heterogeneous storage devices. [Citation Graph (, )][DBLP]

  70. Efficient Monitoring of Parametric Context-Free Patterns. [Citation Graph (, )][DBLP]

  71. Efficient Formalism-Independent Monitoring of Parametric Properties. [Citation Graph (, )][DBLP]

  72. GLS-SOD: a generalized local statistical approach for spatial outlier detection. [Citation Graph (, )][DBLP]

  73. An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks. [Citation Graph (, )][DBLP]

  74. Towards Global State Identification of Nodes in DHT Based Systems. [Citation Graph (, )][DBLP]

  75. Towards IEEE 802.15.4e: A study of performance aspects. [Citation Graph (, )][DBLP]

  76. OPTIMA: An Ontology-Based PlaTform-specIfic software Migration Approach. [Citation Graph (, )][DBLP]

  77. Developing Application Specific Ontology for Program Comprehension by Combining Domain Ontology with Code Ontology. [Citation Graph (, )][DBLP]

  78. An Ontology-based Model Driven Approach for a Music Learning System. [Citation Graph (, )][DBLP]

  79. An Ontology-based Approach to Portable Embedded System Development. [Citation Graph (, )][DBLP]

  80. Research and application of 3D engine in the simulation of natural scene. [Citation Graph (, )][DBLP]

  81. Understanding intrinsic characteristics and system implications of flash memory based solid state drives. [Citation Graph (, )][DBLP]

  82. Modeling of Device Collaboration Process Based on Petri Net. [Citation Graph (, )][DBLP]

  83. A QoS Meta-model of Large-Scale Device Collaboration. [Citation Graph (, )][DBLP]

  84. Parametric Trace Slicing and Monitoring. [Citation Graph (, )][DBLP]

  85. DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch. [Citation Graph (, )][DBLP]

  86. Towards Constraint Optimal Control of Greenhouse Climate. [Citation Graph (, )][DBLP]

  87. Fair Profit Allocation in the Spectrum Auction Using the Shapley Value. [Citation Graph (, )][DBLP]

  88. Real-time enabled IEEE 802.15.4 sensor networks in industrial automation. [Citation Graph (, )][DBLP]

  89. Synthesizing Monitors for Safety Properties: This Time with Calls and Returns. [Citation Graph (, )][DBLP]

  90. A Dynamic Graph Watermark Scheme of Tamper Resistance. [Citation Graph (, )][DBLP]

  91. An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. [Citation Graph (, )][DBLP]

  92. A Flexible Approach to Measuring Network Security Using Attack Graphs. [Citation Graph (, )][DBLP]

  93. An Opportunistic MAC in Multichannel Multiradio Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  94. Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. [Citation Graph (, )][DBLP]

  95. A Scalable Approach to Full Attack Graphs Generation. [Citation Graph (, )][DBLP]

  96. Network Access Control Mechanism Based on Locator/Identifier Split. [Citation Graph (, )][DBLP]

  97. Internal Structures and Design Models for Implementing TCP/IP Protocol Stack on Embedded Applications. [Citation Graph (, )][DBLP]

  98. A PAWL for Enhancing Strength and Endurance during Walking Using Interaction Force and Dynamical Information. [Citation Graph (, )][DBLP]

  99. Micromachined interferometric accelerometer fabricated using SGADER process. [Citation Graph (, )][DBLP]

  100. Exploitation of CBERS-02B as auxiliary data in recovering the Landsat7 ETM+ SLC-off image. [Citation Graph (, )][DBLP]

  101. Estimation of urbanization effect on climatic warming over the recent 30 years in Guangzhou, South China. [Citation Graph (, )][DBLP]

  102. Efficient monitoring of parametric context-free patterns. [Citation Graph (, )][DBLP]

  103. Minimizing makespan in two-stage hybrid cross docking scheduling problem. [Citation Graph (, )][DBLP]

  104. Two-phase heuristic algorithms for full truckloads multi-depot capacitated vehicle routing problem in carrier collaboration. [Citation Graph (, )][DBLP]

Search in 0.008secs, Finished in 0.011secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002