Search the dblp DataBase
Wei Yu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jian Xu , Wei Yu , Kexing Rui , Gregory Butler Use Case Refactoring: A Tool and a Case Study. [Citation Graph (0, 0)][DBLP ] APSEC, 2004, pp:484-491 [Conf ] Kin F. Li , Yali Wang , Shojiro Nishio , Wei Yu A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web. [Citation Graph (0, 0)][DBLP ] APWeb, 2005, pp:195-206 [Conf ] Wei Yu , Dawn N. Jutla , Shyamala C. Sivakumar A Churn-Strategy Alignment Model for Managers in Mobile Telecom. [Citation Graph (0, 0)][DBLP ] CNSR, 2005, pp:48-53 [Conf ] Fangting Sun , David Fernández-Baca , Wei Yu Inverse Parametric Sequence Alignment. [Citation Graph (0, 0)][DBLP ] COCOON, 2002, pp:97-106 [Conf ] Xinwen Fu , Wei Yu , Dan Cheng , Xuejun Tan , Kevin Streff , Steve Graham On Recognizing Virtual Honeypots and Countermeasures. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:211-218 [Conf ] Fangting Sun , Wei Yu Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2004, pp:565- [Conf ] Wei Yu Integrated Rate Control and Entropy Coding for JPEG 2000. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2004, pp:152-161 [Conf ] Wei Yu , Z. Meral Özsoyoglu , Gultekin Özsoyoglu XML Restructuring and Integration for Tabular Data. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:233-243 [Conf ] Wei Yu Analyze the Worm-Based Attack in Large Scale P2P. [Citation Graph (0, 0)][DBLP ] HASE, 2004, pp:308-309 [Conf ] Wei Yu , Dong Xuan , Sandeep K. Reddy , Riccardo Bettati , Wei Zhao Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:84-91 [Conf ] Wei Yu , Jian Wang Distributed Bandwidth Allocation for the Virtual Private Network. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2003, pp:486-488 [Conf ] Wei Yu , John M. Cioffi FDMA Capacity of the Gaussian Multiple Access Channel With ISI. [Citation Graph (0, 0)][DBLP ] ICC (3), 2000, pp:1365-1369 [Conf ] Shengbing Ren , Gregory Butler , Kexing Rui , Jian Xu , Wei Yu , Renhang Luo A Prototype Tool for Use Case Refactoring. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2004, pp:173-178 [Conf ] Kazuyuki Murase , Takaharu Wakida , Ryoichi Odagiri , Wei Yu , Hirotaka Akita , Tatsuya Asai Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences. [Citation Graph (0, 0)][DBLP ] ICES, 1998, pp:280-286 [Conf ] Ryoichi Odagiri , Wei Yu , Tatsuya Asai , Kazuyuki Murase Analysis of the Scenery Perceived by a Real Mobile Robot Khepera. [Citation Graph (0, 0)][DBLP ] ICES, 1998, pp:295-302 [Conf ] Qi Zhang , Sally A. Goldman , Wei Yu , Jason E. Fritts Content-Based Image Retrieval Using Multiple-Instance Learning. [Citation Graph (0, 0)][DBLP ] ICML, 2002, pp:682-689 [Conf ] Rubin Wang , Wei Yu A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2005, pp:490-498 [Conf ] Wei Yu , Yan Sun , K. J. Ray Liu HADOF: defense against routing disruptions in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1252-1261 [Conf ] Shiyi Mao , Pinxing Lin , Wei Yu A new insight to the ANN-based multitarget tracking data association. [Citation Graph (0, 0)][DBLP ] ISCAS, 1993, pp:2423-2426 [Conf ] Wei Yu P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. [Citation Graph (0, 0)][DBLP ] ISPAN, 2004, pp:514-519 [Conf ] Wei Yu , Jun Li , Greg Butler Refactoring Use Case Models on Episodes. [Citation Graph (0, 0)][DBLP ] ASE, 2004, pp:328-331 [Conf ] Wei Yu , Xinwen Fu , Steve Graham , Dong Xuan , Wei Zhao DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf ] Wei Yu , Ruibiao Qiu , Jason E. Fritts Advantages of motion-JPEG2000 in video processing. [Citation Graph (0, 0)][DBLP ] VCIP, 2002, pp:635-645 [Conf ] Shankar Pal , Istvan Cseri , Oliver Seeliger , Michael Rys , Gideon Schaller , Wei Yu , Dragan Tomic , Adrian Baras , Brandon Berg , Denis Churin , Eugene Kogan XQuery Implementation in a Relational Database System. [Citation Graph (0, 0)][DBLP ] VLDB, 2005, pp:1175-1186 [Conf ] Kin F. Li , Wei Yu , Shojiro Nishio , Yali Wang Finding the search engine that works for you. [Citation Graph (0, 0)][DBLP ] WWW (Special interest tracks and posters), 2005, pp:920-921 [Conf ] Wei Yu , Thang Nam Le , Jangwon Lee , Dong Xuan Effective query aggregation for data services in sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:18, pp:3733-3744 [Journal ] Wei Yu , Sriram Chellappan , Dong Xuan P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2005, v:21, n:1, pp:209-219 [Journal ] Fangting Sun , David Fernández-Baca , Wei Yu Inverse parametric sequence alignment. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 2004, v:53, n:1, pp:36-54 [Journal ] Wei Yu , Jian Wang Scalable network resource management for large scale Virtual Private Networks. [Citation Graph (0, 0)][DBLP ] Simulation Modelling Practice and Theory, 2004, v:12, n:3-4, pp:263-285 [Journal ] Raphael Cendrillon , Wei Yu , Marc Moonen , Jan Verlinden , Tom Bostoen Optimal multiuser spectrum balancing for digital subscriber lines. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2006, v:54, n:5, pp:922-933 [Journal ] Wei Yu , John M. Cioffi Constant-power waterfilling: performance bound and low-complexity implementation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2006, v:54, n:1, pp:23-28 [Journal ] Wei Yu , Raymond Lui Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2006, v:54, n:7, pp:1310-1322 [Journal ] Wei Yu , David P. Varodayan , John M. Cioffi Trellis and convolutional precoding for transmitter-based interference presubtraction. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2005, v:53, n:7, pp:1220-1230 [Journal ] Wei Yu , Fangting Sun , Jason E. Fritts Efficient rate control for JPEG-2000. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:5, pp:577-589 [Journal ] Wei Yu Uplink-downlink duality via minimax duality. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:2, pp:361-374 [Journal ] Wei Yu Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:2, pp:754-759 [Journal ] Wei Yu , John M. Cioffi Sum Capacity of Gaussian Vector Broadcast Channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:9, pp:1875-1892 [Journal ] Wei Yu , Wonjong Rhee , Stephen Boyd , John M. Cioffi Iterative water-filling for Gaussian vector multiple-access channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:1, pp:145-152 [Journal ] Wei Yu , Sriram Chellappan , Dong Xuan , Wei Zhao Distributed policy processing in active-service based infrastructures. [Citation Graph (0, 0)][DBLP ] Int. J. Communication Systems, 2006, v:19, n:7, pp:727-750 [Journal ] Wei Yu , Bo Zheng , Rob Watson , Gérard Lachapelle Differential combining for acquiring weak GPS signals. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2007, v:87, n:5, pp:824-840 [Journal ] Wei Yu , Xun Wang , Prasad Calyam , Dong Xuan , Wei Zhao On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:235-244 [Conf ] Zhu Ji , Wei Yu , K. J. Ray Liu An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Yan L. Sun , Zhu Han , Wei Yu , K. J. Ray Liu A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Wei Yu , Nan Zhang 0004 , Wei Zhao Self-adaptive Worms and Countermeasures. [Citation Graph (0, 0)][DBLP ] SSS, 2006, pp:548-562 [Conf ] Mohamed Saad , Alberto Leon-Garcia , Wei Yu Rate Allocation under Network End-to-End Quality-of-Service Requirements. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Jun Yuan , Wei Yu Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Marko Aleksic , Peyman Razaghi , Wei Yu Capacity of a Class of Modulo-Sum Relay Channels [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Peyman Razaghi , Wei Yu Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Behrouz Khoshnevis , Wei Yu , Raviraj Adve Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Wei Yu , Yan (Lindsay) Sun , K. J. Ray Liu Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:228-242 [Journal ] Wei Yu , K. J. Ray Liu Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:5, pp:507-521 [Journal ] Systems Modeling of Alveolar Morphogenesis In Vitro. [Citation Graph (, )][DBLP ] A new cell counter based attack against tor. [Citation Graph (, )][DBLP ] A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems. [Citation Graph (, )][DBLP ] On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP ] Distance Oracles for Sparse Graphs. [Citation Graph (, )][DBLP ] Fuzzy bi-level optimal model and its application in oilfield development. [Citation Graph (, )][DBLP ] Weak Laws of Large Numbers for fuzzy variables based on credibility measure. [Citation Graph (, )][DBLP ] A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. [Citation Graph (, )][DBLP ] A New Replay Attack Against Anonymous Communication Networks. [Citation Graph (, )][DBLP ] The Digital Marauder's Map: A New Threat to Location Privacy. [Citation Graph (, )][DBLP ] CAP: A Context-Aware Privacy Protection System for Location-Based Services. [Citation Graph (, )][DBLP ] 3DLoc: Three Dimensional Wireless Localization Toolkit. [Citation Graph (, )][DBLP ] OS_RANK: Structure Analysis for Ontology Ranking. [Citation Graph (, )][DBLP ] Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server. [Citation Graph (, )][DBLP ] Evaluation and Research on Green Strength of Reverse Logistics System. [Citation Graph (, )][DBLP ] Real time stereo vision using exponential step cost aggregation on GPU. [Citation Graph (, )][DBLP ] Parking space detection from video by augmenting training dataset. [Citation Graph (, )][DBLP ] Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. [Citation Graph (, )][DBLP ] Power modeling of a skid steered wheeled robotic ground vehicle. [Citation Graph (, )][DBLP ] iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP ] Blind Detection of Spread Spectrum Flow Watermarks. [Citation Graph (, )][DBLP ] On performance bottleneck of anonymous communication networks. [Citation Graph (, )][DBLP ] Constraint-Based Learning of Distance Functions for Object Trajectories. [Citation Graph (, )][DBLP ] THUIR at TREC 2005: Enterprise Track. [Citation Graph (, )][DBLP ] Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. [Citation Graph (, )][DBLP ] Grids-Based Data Parallel Computing for Learning Optimization in a Networked Learning Control Systems. [Citation Graph (, )][DBLP ] Grassmannian beamforming for MIMO amplify-and-forward relaying. [Citation Graph (, )][DBLP ] Coordinated beamforming for the multi-cell multi-antenna wireless system. [Citation Graph (, )][DBLP ] Joint Power Control and Beamforming Codebook Design for MISO Channels with Limited Feedback. [Citation Graph (, )][DBLP ] Discovering Entities Relationships on the Web. [Citation Graph (, )][DBLP ] Dynamic modeling of a skid-steered wheeled vehicle with experimental verification. [Citation Graph (, )][DBLP ] EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. [Citation Graph (, )][DBLP ] Phenopedia and Genopedia: disease-centered and gene-centered views of the evolving knowledge of human genetic associations. [Citation Graph (, )][DBLP ] An open source infrastructure for managing knowledge and finding potential collaborators in a domain-specific subset of PubMed, with an example from human genome epidemiology. [Citation Graph (, )][DBLP ] GAPscreener: An automatic tool for screening human genetic association literature in PubMed using the support vector machine technique. [Citation Graph (, )][DBLP ] Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseases. [Citation Graph (, )][DBLP ] Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. [Citation Graph (, )][DBLP ] Parity Forwarding for Multiple-Relay Networks [Citation Graph (, )][DBLP ] Limited Feedback Multi-Antenna Quantization Codebook Design-Part I: Single-User Channels [Citation Graph (, )][DBLP ] Limited Feedback Multi-Antenna Quantization Codebook Design-Part II: Multiuser Channels [Citation Graph (, )][DBLP ] Gaussian Z-Interference Channel with a Relay Link: Achievability Region and Asymptotic Sum Capacity [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.011secs