The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dan Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Baoyan Song, Ge Yu, Dan Wang, Derong Shen, Guoren Wang
    An Efficient User Task Handling Mechanism Based on Dynamic Load-Balance for Workflow Systems. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:483-494 [Conf]
  2. Dan Wang, Ge Yu, Mingsong Lv, Baoyan Song, Derong Shen, Guoren Wang
    An Ant Algorithm Based Dynamic Routing Strategy for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:453-464 [Conf]
  3. Xiaochun Yang, Ge Yu, Guoren Wang, Dan Wang, Baoyan Song
    Constraints for Information Cooperation in Virtual Enterprise Systems. [Citation Graph (0, 0)][DBLP]
    CODAS, 2001, pp:175-182 [Conf]
  4. Dan Wang, Ge Yu, Baoyan Song, Derong Shen, Guoren Wang
    Study on SOAP-Based Mobile Agent Techniques. [Citation Graph (0, 0)][DBLP]
    EDCIS, 2002, pp:208-219 [Conf]
  5. Dan Wang, Qian Zhang, Jiangchuan Liu
    Self-Protection for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:67- [Conf]
  6. Dan Wang, Jin Wang
    Neural Network Based Robust Adaptive Control for a Class of Nonlinear Systems. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:898-903 [Conf]
  7. Dan Wang, Jie Huang
    A Neural Network Based Method for Solving Discrete-Time Nonlinear Output Regulation Problem in Sampled-Data Systems. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2004, pp:59-64 [Conf]
  8. Dan Wang, Funda Ergün, Zhan Xu
    Unicast and Multicast QoS Routing with Multiple Constraints. [Citation Graph (0, 0)][DBLP]
    QoS-IP, 2005, pp:481-494 [Conf]
  9. Dan Wang, Funda Ergün
    Path Protection with Pre-identification for MPLS Networks. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:46- [Conf]
  10. Lina Wang, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, Zhe Mei
    A Virtual Private Network for Virtual Enterprise Information Systems. [Citation Graph (0, 0)][DBLP]
    Web-Age Information Management, 2000, pp:165-176 [Conf]
  11. Dan Wang, Peizhong Lu
    Geometrically Invariant Watermark Using Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:465-468 [Conf]
  12. Yihong Ding, Xijian Ping, Min Hu, Dan Wang
    Range image segmentation based on randomized Hough transform. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2005, v:26, n:13, pp:2033-2041 [Journal]
  13. Shengping Zhang, Hongxun Yao, Yuqi Wan, Dan Wang
    Combining Global and Local Classifiers for Lipreading. [Citation Graph (0, 0)][DBLP]
    ACII, 2007, pp:733-734 [Conf]
  14. Huibo Lou, Chengxiong Mao, Jiming Lu, Dan Wang, Luonan Chen
    Double Three-Level Inverter Based Variable Frequency Drive with Minimal Total Harmonic Distortion Using Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:461-472 [Conf]
  15. Dan Wang, Qian Zhang, Jiangchuan Liu
    The self-protection problem in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:4, pp:- [Journal]

  16. BDIM-Based Optimal Design of Videoconferencing Service Infrastructure in Multi-SLA Environments. [Citation Graph (, )][DBLP]


  17. Towards Successive Privacy Protection in Sensor Networks. [Citation Graph (, )][DBLP]


  18. Mobile Filtering for Error-Bounded Data Collection in Sensor Networks. [Citation Graph (, )][DBLP]


  19. Sensor Node Localization Using Uncontrolled Events. [Citation Graph (, )][DBLP]


  20. Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing. [Citation Graph (, )][DBLP]


  21. Mobile Filter: Exploring Migration of Filters for Error-Bounded Data Collection in Sensor Networks. [Citation Graph (, )][DBLP]


  22. A novel two-tier Bayesian based method for hair segmentation. [Citation Graph (, )][DBLP]


  23. In vivo tracking of 3D organs using spherical harmonics and subspace clustering. [Citation Graph (, )][DBLP]


  24. Peer-to-Peer Asynchronous Video Streaming using Skip List. [Citation Graph (, )][DBLP]


  25. Research on trust evaluation of secure bootstrap in trusted computing based on fuzzy set theory. [Citation Graph (, )][DBLP]


  26. A Unique Multi-functional Landmark for Autonomous Navigation. [Citation Graph (, )][DBLP]


  27. Research on the Transformation of Display Format for Web Information. [Citation Graph (, )][DBLP]


  28. A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce. [Citation Graph (, )][DBLP]


  29. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. [Citation Graph (, )][DBLP]


  30. Double Mobility: Coverage of the Sea Surface with Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  31. Tracking with Unreliable Node Sequences. [Citation Graph (, )][DBLP]


  32. CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  33. High Quality Sensor Placement for SHM Systems: Refocusing on Application Demands. [Citation Graph (, )][DBLP]


  34. Sparse Representation of Deformable 3D Organs. [Citation Graph (, )][DBLP]


  35. Kriging Model combined with latin hypercube sampling for surrogate modeling of analog integrated circuit performance. [Citation Graph (, )][DBLP]


  36. Partial Network Coding: Theory and Application for Continuous Sensor Data Collection. [Citation Graph (, )][DBLP]


  37. Validation of Cone-Beam CT Measurements of Tumour Burden Using Three-Dimensional Histopathology: Initial Results For a Lumpectomy. [Citation Graph (, )][DBLP]


  38. Towards understanding the external links of video sharing sites: measurement and analysis. [Citation Graph (, )][DBLP]


  39. Dynamic flux balance analysis of metabolic networks using the penalty function methods. [Citation Graph (, )][DBLP]


  40. An Improved Sample Selection Algorithm in Fuzzy Decision Tree Induction. [Citation Graph (, )][DBLP]


  41. Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. [Citation Graph (, )][DBLP]


  42. Feedback and Resources Guided Mechanism for Adaptive Packet Sampling. [Citation Graph (, )][DBLP]


  43. Mobility-Assisted Sensor Networking for Field Coverage. [Citation Graph (, )][DBLP]


  44. Efficient Cooperative Spectrum Sensing in Cognitive Radio. [Citation Graph (, )][DBLP]


  45. Distributed Faulty Sensor Detection. [Citation Graph (, )][DBLP]


  46. A Measurement Study of External Links of YouTube. [Citation Graph (, )][DBLP]


  47. A Hippocampus CA3 Model with Autoassociative and Heteroassociative Memory Functions. [Citation Graph (, )][DBLP]


  48. Variable-base tacit communication: a new energy efficient communication scheme for sensor networks. [Citation Graph (, )][DBLP]


  49. Design and Implementation of a Data Stream Load Shedding Model. [Citation Graph (, )][DBLP]


  50. Adaptive dynamic surface control for a class of uncertain nonlinear systems in pure-feedback form. [Citation Graph (, )][DBLP]


  51. The Extensions of OWL on Properties Exclusion and the Corresponding Semantic Parser. [Citation Graph (, )][DBLP]


  52. A Novel GALS Single-Track Protocol Asynchronous Communication Circuits. [Citation Graph (, )][DBLP]


  53. UDEC-based Stability Analysis of the Goafs in Fragment Ore Section. [Citation Graph (, )][DBLP]


  54. Three dimensional Boolean operation based on L-Rep model. [Citation Graph (, )][DBLP]


  55. Peer-to-peer video-on-demand with scalable video coding. [Citation Graph (, )][DBLP]


  56. Support Vector Machines for Photometric Redshift Estimation from Broadband Photometry. [Citation Graph (, )][DBLP]


  57. The Internet Databases of the World Data Center for Geophysics, Beijing. [Citation Graph (, )][DBLP]


Search in 0.073secs, Finished in 0.075secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002