|
Search the dblp DataBase
Yanping Zhang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yu Huang, Sudhakar M. Reddy, Nilanjan Mukherjee, Chien-Chung Tsai, Omer Samman, Yahya Zaidan, Yanping Zhang, Wu-Tung Cheng
Constraint Driven Pin Mapping for Concurrent SOC Testing. [Citation Graph (0, 0)][DBLP] ASP-DAC, 2002, pp:511-516 [Conf]
- Shu Zhao, Yanping Zhang, Ling Zhang, Ping Zhang, Ying-chun Zhang
Probability Model of Covering Algorithm (PMCA). [Citation Graph (0, 0)][DBLP] ICIC (1), 2006, pp:440-444 [Conf]
- Yanping Zhang, Yuezhen Dai
Product Data Exchange Specification and its Implementation. [Citation Graph (0, 0)][DBLP] ITAMS, 1991, pp:309-314 [Conf]
- Ling Zhang, Tao Wu, Yanping Zhang
A Kernel Function Method in Clustering. [Citation Graph (0, 0)][DBLP] PAKDD, 2005, pp:38-42 [Conf]
- Yu Huang, Nilanjan Mukherjee, Chien-Chung Tsai, Omer Samman, Yahya Zaidan, Yanping Zhang, Wu-Tung Cheng, Sudhakar M. Reddy
Constraint Driven Pin Mapping for Concurrent SOC Testing. [Citation Graph (0, 0)][DBLP] VLSI Design, 2002, pp:511-516 [Conf]
- Shu Zhao, Yanping Zhang, Ling Zhang, Jie Chen, Zhong Wan, Ying-chun Zhang, Chen-xi Zhang
The quotient structure in granule computing. [Citation Graph (0, 0)][DBLP] GrC, 2005, pp:359-362 [Conf]
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]
Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|