The SCEAS System
Navigation Menu

Search the dblp DataBase


Yuan Luo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuan Luo, Marina L. Gavrilova, Mario Costa Sousa
    NPAR by Example: Line Drawing Facial Animation from Photographs. [Citation Graph (0, 0)][DBLP]
    CGIV, 2006, pp:514-521 [Conf]
  2. Yuan Luo, Marina L. Gavrilova
    Coarse Fingerprint Matching Based on Singular Points. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:425-433 [Conf]
  3. Zhaohui Cheng, Kenneth Chin, Yuan Luo
    Computing Migration Through Context Awareness and Context Transmission. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:386-394 [Conf]
  4. Furong Wang, Xuan Zou, Yuan Luo, Jiaxi Hu
    A Hierarchy Approach for Singular Point Detection in Fingerprint Images. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:359-365 [Conf]
  5. Yuan Luo, Marina L. Gavrilova
    3D Building Reconstruction from LIDAR Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2006, pp:431-439 [Conf]
  6. Chengfeng Wang, Marina L. Gavrilova, Yuan Luo, Jon G. Rokne
    An efficient algorithm for fingerprint matching. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:1034-1037 [Conf]
  7. Darryl N. Davis, Yuan Luo, Kecheng Liu
    Combining KADS with ZEUS to Develop a Multi-Agent E-Commerce Application. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2003, v:3, n:3-4, pp:315-335 [Journal]
  8. Yuan Luo, Wende Chen, A. J. Han Vinck
    The Determination of the Chain Good Weight Hierarchies with High Dimension. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2003, v:17, n:2, pp:196-209 [Journal]
  9. Fang-Wei Fu, Torleiv Kløve, Yuan Luo, Victor K. Wei
    On the Svanström bound for ternary constant-weight codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2061-2064 [Journal]
  10. Yuan Luo, Fang-Wei Fu, A. J. Han Vinck, Wende Chen
    On constant-composition codes over Zq. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:11, pp:3010-3016 [Journal]
  11. Yuan Luo, Fang-Wei Fu, Victor K.-W. Wei
    On the depth distribution of linear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2197-2203 [Journal]
  12. Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen
    Some new characters on the wire-tap channel of type II. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1222-1229 [Journal]
  13. Chaichana Mitrpant, A. J. Han Vinck, Yuan Luo
    An achievable region for the Gaussian wiretap channel with side information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2181-2190 [Journal]
  14. Bin Dai, Yuan Luo
    Wiretap Channel With Side Information [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  15. A Reasonable Approach for Defining Load Index in Parallel Computing. [Citation Graph (, )][DBLP]

  16. Information Distances over Clusters. [Citation Graph (, )][DBLP]

  17. Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance. [Citation Graph (, )][DBLP]

  18. A Resource Scheduling Strategy for Intrusion Detection on Multi-core Platform. [Citation Graph (, )][DBLP]

  19. Wiretap Channel with Side Information from Part of Encoder. [Citation Graph (, )][DBLP]

  20. Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid Database. [Citation Graph (, )][DBLP]

  21. Question Answering Experiments and Resources. [Citation Graph (, )][DBLP]

  22. Network-Based Analysis of Beijing SARS Data. [Citation Graph (, )][DBLP]

  23. 3D Facial Model Synthesis using Voronoi Approach. [Citation Graph (, )][DBLP]

  24. A BLP-Based Access Control Mechanism for the Virtual Machine System. [Citation Graph (, )][DBLP]

  25. Dynamic Malicious Code Detection Based on Binary Translator. [Citation Graph (, )][DBLP]

  26. A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. [Citation Graph (, )][DBLP]

  27. A de-identifier for medical discharge summaries. [Citation Graph (, )][DBLP]

  28. The relative generalized Hamming weight of linear q -ary codes and their subcodes. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002