The SCEAS System
Navigation Menu

Search the dblp DataBase


Wei Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jian Xu, Wei Yu, Kexing Rui, Gregory Butler
    Use Case Refactoring: A Tool and a Case Study. [Citation Graph (0, 0)][DBLP]
    APSEC, 2004, pp:484-491 [Conf]
  2. Kin F. Li, Yali Wang, Shojiro Nishio, Wei Yu
    A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:195-206 [Conf]
  3. Wei Yu, Dawn N. Jutla, Shyamala C. Sivakumar
    A Churn-Strategy Alignment Model for Managers in Mobile Telecom. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:48-53 [Conf]
  4. Fangting Sun, David Fernández-Baca, Wei Yu
    Inverse Parametric Sequence Alignment. [Citation Graph (0, 0)][DBLP]
    COCOON, 2002, pp:97-106 [Conf]
  5. Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham
    On Recognizing Virtual Honeypots and Countermeasures. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:211-218 [Conf]
  6. Fangting Sun, Wei Yu
    Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2004, pp:565- [Conf]
  7. Wei Yu
    Integrated Rate Control and Entropy Coding for JPEG 2000. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2004, pp:152-161 [Conf]
  8. Wei Yu, Z. Meral Özsoyoglu, Gultekin Özsoyoglu
    XML Restructuring and Integration for Tabular Data. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:233-243 [Conf]
  9. Wei Yu
    Analyze the Worm-Based Attack in Large Scale P2P. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:308-309 [Conf]
  10. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
    Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:84-91 [Conf]
  11. Wei Yu, Jian Wang
    Distributed Bandwidth Allocation for the Virtual Private Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:486-488 [Conf]
  12. Wei Yu, John M. Cioffi
    FDMA Capacity of the Gaussian Multiple Access Channel With ISI. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1365-1369 [Conf]
  13. Shengbing Ren, Gregory Butler, Kexing Rui, Jian Xu, Wei Yu, Renhang Luo
    A Prototype Tool for Use Case Refactoring. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:173-178 [Conf]
  14. Kazuyuki Murase, Takaharu Wakida, Ryoichi Odagiri, Wei Yu, Hirotaka Akita, Tatsuya Asai
    Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences. [Citation Graph (0, 0)][DBLP]
    ICES, 1998, pp:280-286 [Conf]
  15. Ryoichi Odagiri, Wei Yu, Tatsuya Asai, Kazuyuki Murase
    Analysis of the Scenery Perceived by a Real Mobile Robot Khepera. [Citation Graph (0, 0)][DBLP]
    ICES, 1998, pp:295-302 [Conf]
  16. Qi Zhang, Sally A. Goldman, Wei Yu, Jason E. Fritts
    Content-Based Image Retrieval Using Multiple-Instance Learning. [Citation Graph (0, 0)][DBLP]
    ICML, 2002, pp:682-689 [Conf]
  17. Rubin Wang, Wei Yu
    A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2005, pp:490-498 [Conf]
  18. Wei Yu, Yan Sun, K. J. Ray Liu
    HADOF: defense against routing disruptions in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1252-1261 [Conf]
  19. Shiyi Mao, Pinxing Lin, Wei Yu
    A new insight to the ANN-based multitarget tracking data association. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:2423-2426 [Conf]
  20. Wei Yu
    P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:514-519 [Conf]
  21. Wei Yu, Jun Li, Greg Butler
    Refactoring Use Case Models on Episodes. [Citation Graph (0, 0)][DBLP]
    ASE, 2004, pp:328-331 [Conf]
  22. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
    DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
  23. Wei Yu, Ruibiao Qiu, Jason E. Fritts
    Advantages of motion-JPEG2000 in video processing. [Citation Graph (0, 0)][DBLP]
    VCIP, 2002, pp:635-645 [Conf]
  24. Shankar Pal, Istvan Cseri, Oliver Seeliger, Michael Rys, Gideon Schaller, Wei Yu, Dragan Tomic, Adrian Baras, Brandon Berg, Denis Churin, Eugene Kogan
    XQuery Implementation in a Relational Database System. [Citation Graph (0, 0)][DBLP]
    VLDB, 2005, pp:1175-1186 [Conf]
  25. Kin F. Li, Wei Yu, Shojiro Nishio, Yali Wang
    Finding the search engine that works for you. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:920-921 [Conf]
  26. Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan
    Effective query aggregation for data services in sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:18, pp:3733-3744 [Journal]
  27. Wei Yu, Sriram Chellappan, Dong Xuan
    P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2005, v:21, n:1, pp:209-219 [Journal]
  28. Fangting Sun, David Fernández-Baca, Wei Yu
    Inverse parametric sequence alignment. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2004, v:53, n:1, pp:36-54 [Journal]
  29. Wei Yu, Jian Wang
    Scalable network resource management for large scale Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2004, v:12, n:3-4, pp:263-285 [Journal]
  30. Raphael Cendrillon, Wei Yu, Marc Moonen, Jan Verlinden, Tom Bostoen
    Optimal multiuser spectrum balancing for digital subscriber lines. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2006, v:54, n:5, pp:922-933 [Journal]
  31. Wei Yu, John M. Cioffi
    Constant-power waterfilling: performance bound and low-complexity implementation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2006, v:54, n:1, pp:23-28 [Journal]
  32. Wei Yu, Raymond Lui
    Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2006, v:54, n:7, pp:1310-1322 [Journal]
  33. Wei Yu, David P. Varodayan, John M. Cioffi
    Trellis and convolutional precoding for transmitter-based interference presubtraction. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:7, pp:1220-1230 [Journal]
  34. Wei Yu, Fangting Sun, Jason E. Fritts
    Efficient rate control for JPEG-2000. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:5, pp:577-589 [Journal]
  35. Wei Yu
    Uplink-downlink duality via minimax duality. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:2, pp:361-374 [Journal]
  36. Wei Yu
    Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:2, pp:754-759 [Journal]
  37. Wei Yu, John M. Cioffi
    Sum Capacity of Gaussian Vector Broadcast Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:9, pp:1875-1892 [Journal]
  38. Wei Yu, Wonjong Rhee, Stephen Boyd, John M. Cioffi
    Iterative water-filling for Gaussian vector multiple-access channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:1, pp:145-152 [Journal]
  39. Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
    Distributed policy processing in active-service based infrastructures. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:7, pp:727-750 [Journal]
  40. Wei Yu, Bo Zheng, Rob Watson, Gérard Lachapelle
    Differential combining for acquiring weak GPS signals. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2007, v:87, n:5, pp:824-840 [Journal]
  41. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
    On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:235-244 [Conf]
  42. Zhu Ji, Wei Yu, K. J. Ray Liu
    An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  43. Yan L. Sun, Zhu Han, Wei Yu, K. J. Ray Liu
    A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  44. Wei Yu, Nan Zhang 0004, Wei Zhao
    Self-adaptive Worms and Countermeasures. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:548-562 [Conf]
  45. Mohamed Saad, Alberto Leon-Garcia, Wei Yu
    Rate Allocation under Network End-to-End Quality-of-Service Requirements. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  46. Jun Yuan, Wei Yu
    Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  47. Marko Aleksic, Peyman Razaghi, Wei Yu
    Capacity of a Class of Modulo-Sum Relay Channels [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  48. Peyman Razaghi, Wei Yu
    Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  49. Behrouz Khoshnevis, Wei Yu, Raviraj Adve
    Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  50. Wei Yu, Yan (Lindsay) Sun, K. J. Ray Liu
    Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:228-242 [Journal]
  51. Wei Yu, K. J. Ray Liu
    Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:5, pp:507-521 [Journal]

  52. Systems Modeling of Alveolar Morphogenesis In Vitro. [Citation Graph (, )][DBLP]

  53. A new cell counter based attack against tor. [Citation Graph (, )][DBLP]

  54. A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems. [Citation Graph (, )][DBLP]

  55. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]

  56. Distance Oracles for Sparse Graphs. [Citation Graph (, )][DBLP]

  57. Fuzzy bi-level optimal model and its application in oilfield development. [Citation Graph (, )][DBLP]

  58. Weak Laws of Large Numbers for fuzzy variables based on credibility measure. [Citation Graph (, )][DBLP]

  59. A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. [Citation Graph (, )][DBLP]

  60. A New Replay Attack Against Anonymous Communication Networks. [Citation Graph (, )][DBLP]

  61. The Digital Marauder's Map: A New Threat to Location Privacy. [Citation Graph (, )][DBLP]

  62. CAP: A Context-Aware Privacy Protection System for Location-Based Services. [Citation Graph (, )][DBLP]

  63. 3DLoc: Three Dimensional Wireless Localization Toolkit. [Citation Graph (, )][DBLP]

  64. OS_RANK: Structure Analysis for Ontology Ranking. [Citation Graph (, )][DBLP]

  65. Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server. [Citation Graph (, )][DBLP]

  66. Evaluation and Research on Green Strength of Reverse Logistics System. [Citation Graph (, )][DBLP]

  67. Real time stereo vision using exponential step cost aggregation on GPU. [Citation Graph (, )][DBLP]

  68. Parking space detection from video by augmenting training dataset. [Citation Graph (, )][DBLP]

  69. Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. [Citation Graph (, )][DBLP]

  70. Power modeling of a skid steered wheeled robotic ground vehicle. [Citation Graph (, )][DBLP]

  71. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]

  72. Blind Detection of Spread Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]

  73. On performance bottleneck of anonymous communication networks. [Citation Graph (, )][DBLP]

  74. Constraint-Based Learning of Distance Functions for Object Trajectories. [Citation Graph (, )][DBLP]

  75. THUIR at TREC 2005: Enterprise Track. [Citation Graph (, )][DBLP]

  76. Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. [Citation Graph (, )][DBLP]

  77. Grids-Based Data Parallel Computing for Learning Optimization in a Networked Learning Control Systems. [Citation Graph (, )][DBLP]

  78. Grassmannian beamforming for MIMO amplify-and-forward relaying. [Citation Graph (, )][DBLP]

  79. Coordinated beamforming for the multi-cell multi-antenna wireless system. [Citation Graph (, )][DBLP]

  80. Joint Power Control and Beamforming Codebook Design for MISO Channels with Limited Feedback. [Citation Graph (, )][DBLP]

  81. Discovering Entities Relationships on the Web. [Citation Graph (, )][DBLP]

  82. Dynamic modeling of a skid-steered wheeled vehicle with experimental verification. [Citation Graph (, )][DBLP]

  83. EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. [Citation Graph (, )][DBLP]

  84. Phenopedia and Genopedia: disease-centered and gene-centered views of the evolving knowledge of human genetic associations. [Citation Graph (, )][DBLP]

  85. An open source infrastructure for managing knowledge and finding potential collaborators in a domain-specific subset of PubMed, with an example from human genome epidemiology. [Citation Graph (, )][DBLP]

  86. GAPscreener: An automatic tool for screening human genetic association literature in PubMed using the support vector machine technique. [Citation Graph (, )][DBLP]

  87. Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseases. [Citation Graph (, )][DBLP]

  88. Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. [Citation Graph (, )][DBLP]

  89. Parity Forwarding for Multiple-Relay Networks [Citation Graph (, )][DBLP]

  90. Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels [Citation Graph (, )][DBLP]

  91. Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels [Citation Graph (, )][DBLP]

  92. Gaussian Z-Interference Channel with a Relay Link: Achievability Region and Asymptotic Sum Capacity [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.011secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002