The SCEAS System
Navigation Menu

Search the dblp DataBase


Yi Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yunsheng Liu, Hao Zhong, Yi Wang
    Capturing XML Constraints with Relational Schema. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:309-314 [Conf]
  2. Lin Chen, Minglu Li, Jian Cao, Yi Wang
    An ECA Rule-based Workflow Design Tool for Shanghai Grid. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:325-328 [Conf]
  3. Feilong Tang, Minglu Li, Chuliang Weng, Chongqing Zhang, Wenzhe Zhang, Hongyu Huang, Yi Wang
    Combining Wireless Sensor Network with Grid for Intelligent City Traffic. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:260-269 [Conf]
  4. Tingting Chen, Yi Wang, Binxing Fang, Jun Zheng
    Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:30- [Conf]
  5. Dongfeng Han, Wenhui Li, Xiaosuo Lu, Yi Wang, Xiaoqiang Zou
    Certain Object Segmentation Based on AdaBoost Learning and Nodes Aggregation Iterative Graph-Cuts. [Citation Graph (0, 0)][DBLP]
    AMDO, 2006, pp:196-202 [Conf]
  6. Tariq Riaz, Yi Wang, Kuo-Bin Li
    Multiple Sequence Alignment Using Tabu Search. [Citation Graph (0, 0)][DBLP]
    APBC, 2004, pp:223-232 [Conf]
  7. Feilong Tang, Minglu Li, Xinhua Yang, Yi Wang, Hongyu Huang, Hongzi Zhu
    Radio Frequency Identification (RFID) Based Reliable Applications for Enterprise Grid. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:516-524 [Conf]
  8. Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding
    Two Novel Packet Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:459-466 [Conf]
  9. Gang Qian, Jodi James, Todd Ingalls, Thanassis Rikakis, Stjepan Rajko, Yi Wang, Daniel Whiteley, Feng Guo
    Human Movement Analysis for Interactive Dance. [Citation Graph (0, 0)][DBLP]
    CIVR, 2006, pp:499-502 [Conf]
  10. Yi Wang, Jiankun Hu, Heiko Schröder
    A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields. [Citation Graph (0, 0)][DBLP]
    DICTA, 2005, pp:29- [Conf]
  11. Feng Hong, Minglu Li, Xinda Lu, Yi Wang, Jiadi Yu, Ying Li
    VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:1096-1106 [Conf]
  12. Feng Hong, Minglu Li, Xinda Lu, Jiadi Yu, Yi Wang, Ying Li
    HP-Chord: A Peer-to-Peer Overlay to Achieve Better Routing Efficiency by Exploiting Heterogeneity and Proximity. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:626-633 [Conf]
  13. Yi Wang, Minglu Li, Jian Cao, Feilong Tang, Lin Chen, Lei Cao
    An ECA-Rule-Based Workflow Management Approach for Web Services Composition. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:143-148 [Conf]
  14. Yi Wang, Jun Wu, Zhimin Du, Weiling Wu
    Performance of MMSE Multiuser Detection for Downlink CDMA. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:919-923 [Conf]
  15. Hongning Dai, Minglu Li, Linpeng Huang, Yi Wang, Feng Hong
    GRAMS: Grid Resource Analysis and Monitoring System. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:875-878 [Conf]
  16. Feng Hong, Minglu Li, Jiadi Yu, Yi Wang
    PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:806-811 [Conf]
  17. Yi Wang, Lizhu Zhou, Jianhua Feng, Jianyong Wang, Zhi-Qiang Liu
    Mining Complex Time-Series Data by Learning Markovian Models. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:1136-1140 [Conf]
  18. Dongfeng Han, Wenhui Li, Xiaosuo Lu, Tianzhu Wang, Yi Wang
    Automatic Segmentation Based on AdaBoost Learning and Graph-Cuts. [Citation Graph (0, 0)][DBLP]
    ICIAR (1), 2006, pp:215-225 [Conf]
  19. Dongfeng Han, Wenhui Li, Tianzhu Wang, Lingling Liu, Yi Wang
    Independent Components Analysis for Representation Interest Point Descriptors. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1219-1223 [Conf]
  20. Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
    Automated Detection of Breast Tumors in Ultrasonic Image Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:420-423 [Conf]
  21. Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
    Automated Detection of Breast Tumors in Ultrasonic Images Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:412-415 [Conf]
  22. Yi Wang, Zhi-Qiang Liu, Li-Zhu Zhou
    Automatic 3D Motion Synthesis with Time-Striding Hidden Markov Model. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:558-567 [Conf]
  23. Yi Wang, Guohan Lu, Xing Li
    A Study of Internet Packet Reordering. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:350-359 [Conf]
  24. Yi Wang, Hujun Yin, Li-Zhu Zhou, Zhi-Qiang Liu
    Real-Time Synthesis of 3D Animations by Learning Parametric Gaussians Using Self-Organizing Mixture Networks. [Citation Graph (0, 0)][DBLP]
    ICONIP (2), 2006, pp:671-678 [Conf]
  25. Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan
    Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications]. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:1226-1229 [Conf]
  26. Yi Wang, Shaozhi Ye, Xing Li
    Understanding Current IPv6 Performance: A Measurement Study. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:71-76 [Conf]
  27. Yi Wang, Huiwen Deng, Zheng Chen
    Adaptive Fuzzy Logic Controller with Rule-based Changeable Universe Of Discourse for a Nonlinear MIMO System. [Citation Graph (0, 0)][DBLP]
    ISDA, 2005, pp:8-13 [Conf]
  28. Dongfeng Han, Wenhui Li, Xiaosuo Lu, Yi Wang, Ming Li
    Representation Interest Point Using Empirical Mode Decomposition and Independent Components Analysis. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2006, pp:350-358 [Conf]
  29. Kesheng Wang, Per Alvestad, Yi Wang, Qingfeng Yuan, Minglun Fang, Lingiang Sun
    Using ANNs to Model Hot Extrusion Manufacturing Process. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:851-856 [Conf]
  30. Kesheng Wang, Resko Barna, Yi Wang, Maxim Boldin, Ove R. Hjelmervik
    Application of Artificial Neural Networks to Predicate Shale Content. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:1046-1051 [Conf]
  31. Lei Cao, Minglu Li, Jian Cao, Yi Wang
    Introduction to an Agent-Based Grid Workflow Management System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:559-568 [Conf]
  32. Jianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Yi Wang
    VMSIM: Virtual Machine Based a Full System Simulation Platform for Microprocessors' Functional Verification. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:245-249 [Conf]
  33. Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu
    FPGA based DPA-resistant Unified Architecture for Signcryption. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:571-572 [Conf]
  34. Yi Wang, Thomas Kunz
    Visualizing Mobile Agent Executions. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:103-114 [Conf]
  35. Yi Wang
    Real-Time Navigator Approach to Motion Problems in Coronary MRA. [Citation Graph (0, 0)][DBLP]
    MIAR, 2001, pp:44-0 [Conf]
  36. Yi Wang, Xin Fan, Houqiang Li, Zhengkai Liu, Mingjing Li
    An attention based spatial adaptation scheme for H.264 videos on mobiles. [Citation Graph (0, 0)][DBLP]
    MMM, 2006, pp:- [Conf]
  37. Feilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao, Yi Wang
    A Real-Time Transaction Approach for Grid Services: A Model and Algorithms. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:57-64 [Conf]
  38. Guang-Ming Hong, Chun Yuan, Yi Wang, Yuzhuo Zhong
    A Quality-Controllable Encryption for H.264/AVC Video Coding. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:510-517 [Conf]
  39. Yi Wang, Houqiang Li, Zhengkai Liu, Chang Wen Chen
    Attention Information Based Spatial Adaptation Framework for Browsing Videos Via Mobile Devices. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:788-797 [Conf]
  40. Kesheng Wang, Meng Tang, Yi Wang, Leif Estensen, P. A. Sollie, M. Pourjavad
    Knowledge-Based CAD/CAPP/CAM Integration System for Manufacturing. [Citation Graph (0, 0)][DBLP]
    PROLAMAT, 2001, pp:406-415 [Conf]
  41. Yi Wang, Masahiko Sakai
    Decidability of Termination for Semi-constructor TRSs, Left-Linear Shallow TRSs and Related Systems. [Citation Graph (0, 0)][DBLP]
    RTA, 2006, pp:343-356 [Conf]
  42. Yi Wang, Yang Xu, Zhenming Xu
    A two-phase method of approximate string match. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3371-3376 [Conf]
  43. Dongfeng Han, Wenhui Li, Xiaosuo Lu, Lin Li, Yi Wang
    Graph-Based Fast Image Segmentation. [Citation Graph (0, 0)][DBLP]
    SSPR/SPR, 2006, pp:468-474 [Conf]
  44. Yi Wang, Kunmi Otitoju, Tong Liu, Sijung Kim, Doug A. Bowman
    Evaluating the effects of real world distraction on user performance in virtual environments. [Citation Graph (0, 0)][DBLP]
    VRST, 2006, pp:19-26 [Conf]
  45. Yi Wang, Li-Zhu Zhou
    Extracting, Presenting and Browsing of Web Social Information. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:828-833 [Conf]
  46. Yi Wang, Li-Zhu Zhou, Jianhua Feng, Lei Xie, Chun Yuan
    2D/3D Web Visualization on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:536-547 [Conf]
  47. Zilin Song, Weihua Ai, Yi Wang, Liang Wu
    Service Search Strategy Based on Graph in Grid Environment. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:96- [Conf]
  48. Mats Gyllenberg, Ping Yan, Yi Wang
    A 3D competitive Lotka-Volterra system with three limit cycles: A falsification of a conjecture by Hofbauer and So. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2006, v:19, n:1, pp:1-7 [Journal]
  49. Yiyu Cheng, Yi Wang, Xuewei Wang
    A causal relationship discovery-based approach to identifying active components of herbal medicine. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2006, v:30, n:2, pp:148-154 [Journal]
  50. Yi Wang, Kuo-Bin Li
    An adaptive and iterative algorithm for refining multiple sequence alignment. [Citation Graph (0, 0)][DBLP]
    Computational Biology and Chemistry, 2004, v:28, n:2, pp:141-148 [Journal]
  51. Roger Jianxin Jiao, Yiyang Zhang, Yi Wang
    A heuristic genetic algorithm for product portfolio planning. [Citation Graph (0, 0)][DBLP]
    Computers & OR, 2007, v:34, n:6, pp:1777-1799 [Journal]
  52. Yi Wang
    Nested chain partitions of LYM posets. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2005, v:145, n:3, pp:403-497 [Journal]
  53. Yi Wang
    Notes on Chvátal's conjecture. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2002, v:247, n:1-3, pp:255-259 [Journal]
  54. Yi Wang, Yeong-Nan Yeh
    Proof of a conjecture on unimodality. [Citation Graph (0, 0)][DBLP]
    Eur. J. Comb., 2005, v:26, n:5, pp:617-627 [Journal]
  55. Yi Wang
    Proof of a Conjecture of Ehrenborg and Steingrímsson on Excedance Statistic. [Citation Graph (0, 0)][DBLP]
    Eur. J. Comb., 2002, v:23, n:3, pp:355-365 [Journal]
  56. Yi Wang, Houqiang Li, Xin Fan, Chang Wen Chen
    An Attention Based Spatial Adaptation Scheme for H.264 Videos on Mobiles. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:4, pp:565-584 [Journal]
  57. Yi Wang, Kuo-Bin Li
    Multiple Sequence Alignment Using an Exhaustive and Greedy Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Bioinformatics and Computational Biology, 2005, v:3, n:2, pp:243-256 [Journal]
  58. Yi Wang
    A Simple Proof of a Conjecture of Simion. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2002, v:100, n:2, pp:399-402 [Journal]
  59. Yi Wang, Yeong-Nan Yeh
    Polynomials with real zeros and Po'lya frequency sequences. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2005, v:109, n:1, pp:63-74 [Journal]
  60. Yi Wang, Yeong-Nan Yeh
    Log-concavity and LC-positivity. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 2007, v:114, n:2, pp:195-210 [Journal]
  61. Weifu Fang, Yi Wang, Yuesheng Xu
    An Implementation of Fast Wavelet Galerkin Methods for Integral Equations of the Second Kind. [Citation Graph (0, 0)][DBLP]
    J. Sci. Comput., 2004, v:20, n:2, pp:277-302 [Journal]
  62. Yi Wang, Zhi-Qiang Liu, Li-Zhu Zhou
    Key-styling: learning motion style for real-time synthesis of 3D animation. [Citation Graph (0, 0)][DBLP]
    Journal of Visualization and Computer Animation, 2006, v:17, n:3-4, pp:229-237 [Journal]
  63. Yi Wang, Jiankun Hu, Damien Phillips
    A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2007, v:29, n:4, pp:573-585 [Journal]
  64. Xiangyong Cheng, Iwaki Akiyama, Yi Wang, Kouichi Itoh
    Breast tumor diagnostic system using three-dimensional ultrasonic echography. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 1999, v:30, n:2, pp:1-10 [Journal]
  65. Anand S. Bedekar, Yi Wang, S. Krishnamoorthy, Sachin S. Siddhaye, Shankar Sundaram
    System-Level Simulation of Flow-Induced Dispersion in Lab-on-a-Chip Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:2, pp:294-304 [Journal]
  66. Yi Wang, Qiao Lin, Tamal Mukherjee
    Composable Behavioral Models and Schematic-Based Simulation of Electrokinetic Lab-on-a-Chip Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:2, pp:258-273 [Journal]
  67. Weiping Li, Xixian Chen, Yi Wang, Nobuhiro Miki
    Frequency and Symbol Rate Offset Compensating Algorithms for Simultaneous Estimation of Echo and Channel Responses. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:4, pp:1702-1708 [Journal]
  68. Xuegui Zhu, Yi Wang, Jianming Zan, Chuanbing Li
    Application of fractal theory in generation and refinement of finite element mesh. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:175, n:2, pp:1039-1045 [Journal]
  69. Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang
    Fingerprint images encryption via multi-scroll chaotic attractors. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:2, pp:931-939 [Journal]
  70. Yi Wang, Jiankun Hu, Fengling Han
    Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:2, pp:823-833 [Journal]
  71. Yi Wang, Jianhua Feng, Shi-Xia Liu
    Learn to Compress and Restore Sequential Data. [Citation Graph (0, 0)][DBLP]
    AAAI, 2007, pp:1912-1913 [Conf]
  72. Nevin Lianwen Zhang, Shihong Yuan, Tao Chen, Yi Wang
    Hierarchical Latent Class Models and Statistical Foundation for Traditional Chinese Medicine. [Citation Graph (0, 0)][DBLP]
    AIME, 2007, pp:139-143 [Conf]
  73. Yi Wang, Jianjun Zhao
    Specifying Pointcuts in AspectJ. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:5-10 [Conf]
  74. Yi Wang, Minglu Li, Jian Cao, Lin Chen, Feilong Tang, Xinhua Lin
    SGSP - A Workflow Based Middleware for Service-Oriented Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:807-814 [Conf]
  75. Feilong Tang, Minglu Li, Minyi Guo, Zhengwei Qi, Yi Wang, Yanqin Yang, Daqiang Zhang
    Transaction Management for Grid Workflow Applications. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:705-712 [Conf]
  76. Yi Wang, Fan Li, Jiguang Song
    Open Source Communities in China (Mainland): An Overview. [Citation Graph (0, 0)][DBLP]
    HCI (15), 2007, pp:465-474 [Conf]
  77. Melina Demertzi, Pedro C. Diniz, Mary W. Hall, Anna C. Gilbert, Yi Wang
    A Combined Hardware/Software Optimization Framework for Signal Representation and Recognition. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2007, pp:1230-1237 [Conf]
  78. Yi Wang, Dan Zhao
    Design and Implementation of Routing Scheme for Wireless Network-on-Chip. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1357-1360 [Conf]
  79. Yi Wang, Shi-Xia Liu, Jianhua Feng, Lizhu Zhou
    Mining Naturally Smooth Evolution of Clusters from Dynamic Data. [Citation Graph (0, 0)][DBLP]
    SDM, 2007, pp:- [Conf]
  80. Chen Tian, WenYu Liu, Jiang Jin, Yi Wang, Yijun Mo
    Localization and Synchronization for 3D Underwater Acoustic Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:622-631 [Conf]
  81. Maggie Cheng, Yadi Ma, Yi Wang
    Improving Channel Throughput of WLANs and Ad Hoc Networks Using Explicit Denial of Requests. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  82. Huihui Shi, Yi Wang, Haibing Guan, Alei Liang
    An intermediate language level optimization framework for dynamic binary translation. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 2007, v:42, n:5, pp:3-9 [Journal]
  83. Yi Wang, David M. Krum, Enylton Machado Coelho, Doug A. Bowman
    Contextualized Videos: Combining Videos with Environment Models to Support Situational Understanding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2007, v:13, n:6, pp:1568-1575 [Journal]
  84. Junhua Zhang, Yuanyuan Wang, Yi Dong, Yi Wang
    Ultrasonographic feature selection and pattern classification for cervical lymph nodes using support vector machines. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2007, v:88, n:1, pp:75-84 [Journal]

  85. BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. [Citation Graph (, )][DBLP]

  86. Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. [Citation Graph (, )][DBLP]

  87. SDMA: A Service-based Architecture for Data Mining Applications. [Citation Graph (, )][DBLP]

  88. Latent Tree Models and Approximate Inference in Bayesian Networks. [Citation Graph (, )][DBLP]

  89. PLDA: Parallel Latent Dirichlet Allocation for Large-Scale Applications. [Citation Graph (, )][DBLP]

  90. CommTracker: A Core-Based Algorithm of Tracking Community Evolution. [Citation Graph (, )][DBLP]

  91. DMGrid: A Data Mining System Based on Grid Computing. [Citation Graph (, )][DBLP]

  92. SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. [Citation Graph (, )][DBLP]

  93. Project Management Practices on Building Management Information System in IBM Global Business Service. [Citation Graph (, )][DBLP]

  94. Validating Software Reliability by Binary Translation. [Citation Graph (, )][DBLP]

  95. Software Outsourcing Subcontracting and Its Impacts: An Exploratory Investigation. [Citation Graph (, )][DBLP]

  96. Timing yield driven clock skew scheduling considering non-Gaussian distributions of critical path delays. [Citation Graph (, )][DBLP]

  97. Computation reuse in domain-specific optimization of signal recognition. [Citation Graph (, )][DBLP]

  98. An Automatic Configuration Algorithm for Distributed Service Process Engine Based on Fuzzy Control. [Citation Graph (, )][DBLP]

  99. Workflow Similarity Measure for Process Clustering in Grid. [Citation Graph (, )][DBLP]

  100. A Design of Airplane's Integrated Ground Directional System with Fuzzy Control. [Citation Graph (, )][DBLP]

  101. The mould-repair knowledge inducing for injection mould based on fuzzy rule induction using group method data handling. [Citation Graph (, )][DBLP]

  102. Hierarchical Classification of Web Pages Using Support Vector Machine. [Citation Graph (, )][DBLP]

  103. Research on Intelligent Distribution Control and Automation System. [Citation Graph (, )][DBLP]

  104. Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems. [Citation Graph (, )][DBLP]

  105. Generation of Reliable PINs from Fingerprints. [Citation Graph (, )][DBLP]

  106. Robust AMC Scheme Against Feedback Delay in Vehicular Environment. [Citation Graph (, )][DBLP]

  107. Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks. [Citation Graph (, )][DBLP]

  108. The design and synthesis of a synchronous and distributed MAC protocol for wireless network-on-chip. [Citation Graph (, )][DBLP]

  109. Exploiting Network Structure for Active Inference in Collective Classification. [Citation Graph (, )][DBLP]

  110. Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis. [Citation Graph (, )][DBLP]

  111. Hierarchical Classification of Business Information on the Web Using Incremental Learning. [Citation Graph (, )][DBLP]

  112. Designing Genetic Regulatory Network with Fuzzy Logic. [Citation Graph (, )][DBLP]

  113. IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. [Citation Graph (, )][DBLP]

  114. Super-resolution mosaicking of UAV surveillance video. [Citation Graph (, )][DBLP]

  115. Tracking occluded targets in high-similarity background: An online training, non-local appearance model and periodic hybrid particle filter with projective transformation. [Citation Graph (, )][DBLP]

  116. Off-Line Motion Description for Fast Video Stream Generation in MPEG-4 AVC/H.264. [Citation Graph (, )][DBLP]

  117. A Scheme for System Multiplexing and Program Component Identification. [Citation Graph (, )][DBLP]

  118. Variable Selection in Model-Based Clustering: To Do or To Facilitate. [Citation Graph (, )][DBLP]

  119. Reduce Time Synchronization Cost for High Latency and Resource-Constrained Sensor Networks. [Citation Graph (, )][DBLP]

  120. Sentiment text classification of customers reviews on the Web based on SVM. [Citation Graph (, )][DBLP]

  121. Clustering strategy of Wireless Sensor Networks based on improved Discrete Particle Swarm Optimization. [Citation Graph (, )][DBLP]

  122. XMT-GPU: A PRAM Architecture for Graphics Computation. [Citation Graph (, )][DBLP]

  123. Towards Minimum Traffic Cost and Minimum Response Latency: A Novel Dynamic Query Protocol in Unstructured P2P Networks. [Citation Graph (, )][DBLP]

  124. Wireless Mesh Sensor Networks in Pervasive Environment: a Reliable Architecture and Routing Protocol. [Citation Graph (, )][DBLP]

  125. Penalty policies in professional software development practice: a multi-method field study. [Citation Graph (, )][DBLP]

  126. What motivate software engineers to refactor source code? evidences from professional developers. [Citation Graph (, )][DBLP]

  127. Change Sequence Mining for Context Aware Service Process Customization. [Citation Graph (, )][DBLP]

  128. Cluster Based Location-Aware Routing Protocol for Large Scale Heterogeneous MANET. [Citation Graph (, )][DBLP]

  129. The potential of computation reuse in high-level optimization of a signal recognition system. [Citation Graph (, )][DBLP]

  130. Markov-optimal sensing policy for user state estimation in mobile devices. [Citation Graph (, )][DBLP]

  131. Adaptive Stochastic Collocation Method (ASCM) for Parameterized Statistical Timing Analysis with Quadratic Delay Model. [Citation Graph (, )][DBLP]

  132. Parallel community detection on large networks with propinquity dynamics. [Citation Graph (, )][DBLP]

  133. RNFTL: a reuse-aware NAND flash translation layer for flash memory. [Citation Graph (, )][DBLP]

  134. Infection spread in wireless networks with random and adversarial node mobilities. [Citation Graph (, )][DBLP]

  135. A framework of energy efficient mobile sensing for automatic user state recognition. [Citation Graph (, )][DBLP]

  136. How does project managers' personality matter?: building the linkage between project managers' personality and the success of software development projects. [Citation Graph (, )][DBLP]

  137. Web-Scale Image Annotation. [Citation Graph (, )][DBLP]

  138. Severity of Local Maxima for the EM Algorithm: Experiences with Hierarchical Latent Class Models. [Citation Graph (, )][DBLP]

  139. An Exploratory Investigation on Refactoring in Industrial Context. [Citation Graph (, )][DBLP]

  140. Optimal Task Scheduling by Removing Inter-Core Communication Overhead for Streaming Applications on MPSoC. [Citation Graph (, )][DBLP]

  141. Virtual routers on the move: live router migration as a network-management primitive. [Citation Graph (, )][DBLP]

  142. An exploratory study on China's software engineers' unpaid overtime working. [Citation Graph (, )][DBLP]

  143. Neighbor-specific BGP: more flexible routing policies while improving global stability. [Citation Graph (, )][DBLP]

  144. Robust Human Pose Recognition Using Unlabelled Markers. [Citation Graph (, )][DBLP]

  145. Overlapping Community Detection in Bipartite Networks. [Citation Graph (, )][DBLP]

  146. Relation Based Service Networks for Reliable Service Selection. [Citation Graph (, )][DBLP]

  147. Collaborative filtering for orkut communities: discovery of user latent behavior. [Citation Graph (, )][DBLP]

  148. To Create Adaptive Game Opponent by Using UCT. [Citation Graph (, )][DBLP]

  149. Game Player Strategy Pattern Recognition and How UCT Algorithms Apply Pre-knowledge of Player's Strategy to Improve Opponent AI. [Citation Graph (, )][DBLP]

  150. A Low Complexity Scheme for Adaptive MIMO-OFDM System. [Citation Graph (, )][DBLP]

  151. Effects of Virtual Carriers of Channel Estimation for OFDM Systems with Transmit Diversity. [Citation Graph (, )][DBLP]

  152. A New Constellation Shaping Method and Its Performance Evaluation in BICM-ID. [Citation Graph (, )][DBLP]

  153. A New Out-Of-Band Power Suppression Scheme by Extending Effective Cyclic-Prefix of OFDM. [Citation Graph (, )][DBLP]

  154. Distributed Antenna Systems with Power Adjusted Beam Switching. [Citation Graph (, )][DBLP]

  155. A Low-Cost Deadlock-Free Design of Minimal-Table Rerouted XY-Routing for Irregular Wireless NoCs. [Citation Graph (, )][DBLP]

  156. Practical Algorithms of Bandwidth Regulation for Rate-Based Switching. [Citation Graph (, )][DBLP]

  157. Improving BitTorrent Traffic Performance by Exploiting Geographic Locality. [Citation Graph (, )][DBLP]

  158. Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. [Citation Graph (, )][DBLP]

  159. An Efficient Algorithm for DPA-resistent RSA. [Citation Graph (, )][DBLP]

  160. Building the linkage between project managers' personality and success of software projects. [Citation Graph (, )][DBLP]

  161. Pfp: parallel fp-growth for query recommendation. [Citation Graph (, )][DBLP]

  162. A novel video coding scheme for mobile devices. [Citation Graph (, )][DBLP]

  163. A modular RCP for flexible interdomain route control. [Citation Graph (, )][DBLP]

  164. Multi-Shot Diffusion Weighted PROPELLER on 0.35T Open MRI System. [Citation Graph (, )][DBLP]

  165. An Authentication Protocol Applied to RFID Security Systems. [Citation Graph (, )][DBLP]

  166. A Low-Latency GTS Strategy in IEEE802.15.4 for Industrial Applications. [Citation Graph (, )][DBLP]

  167. A Reliable Routing for Industrial Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  168. Real-time social touch gesture recognition for sensate robots. [Citation Graph (, )][DBLP]

  169. Efficient Distributed Topology Control in 3-Dimensional Wireless Networks. [Citation Graph (, )][DBLP]

  170. Artificial Neural Network for Automatic Test Oracles Generation. [Citation Graph (, )][DBLP]

  171. CGSP-based Legacy Applications Execution and Coordination. [Citation Graph (, )][DBLP]

  172. A New Genetic Algorithm for Community Detection. [Citation Graph (, )][DBLP]

  173. Visual Analysis of Complex Networks and Community Structure. [Citation Graph (, )][DBLP]

  174. Loop scheduling with memory access reduction under register constraints for DSP applications. [Citation Graph (, )][DBLP]

  175. An ECA-Rule-Based Workflow Approach for Advance Resource Reservation in ShanghaiGrid. [Citation Graph (, )][DBLP]

  176. Signals Transform Circuit Based on Flexibility Technology and Its Hardware Implementation. [Citation Graph (, )][DBLP]

  177. Energy Consumption Control for Large Scale Sensor Networks Using Partition Energy Balanced Adaptive Clustering Hierarchy Scheme. [Citation Graph (, )][DBLP]

  178. Panorama recovery from noisy UAV surveillance video. [Citation Graph (, )][DBLP]

  179. Sensor fusion method using GPS/IMU data for fast UAV surveillance video frame registration. [Citation Graph (, )][DBLP]

  180. An Intelligent Model for Vulnerability Analysis Using Attack Graph. [Citation Graph (, )][DBLP]

  181. Research on Electric Power Steering System Based on Compound Control of CMAC and PID. [Citation Graph (, )][DBLP]

  182. Texture preservation in de-noising UAV surveillance video through multi-frame sampling. [Citation Graph (, )][DBLP]

  183. End-to-end performance measurement model on DiffServ domain in IPv6 network. [Citation Graph (, )][DBLP]

  184. DOA Estimation Using SVDSPM Method Based on Weighted Immune Genetic Algorithm. [Citation Graph (, )][DBLP]

  185. Latent tree models and diagnosis in traditional Chinese medicine. [Citation Graph (, )][DBLP]

  186. Quantification of directional and orientational selectivities of visual neurons to moving stimuli. [Citation Graph (, )][DBLP]

  187. DITOP: drug-induced toxicity related protein database. [Citation Graph (, )][DBLP]

  188. Novel statistical framework to identify differentially expressed genes allowing transcriptomic background differences. [Citation Graph (, )][DBLP]

  189. Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability [Citation Graph (, )][DBLP]

  190. Randomized hybrid linear modeling by local best-fit flats [Citation Graph (, )][DBLP]

  191. Progress Report of the World Data Center for Seismology, Beijing. [Citation Graph (, )][DBLP]

  192. First eigenvalue and first eigenvectors of a nonsingular unicyclic mixed graph. [Citation Graph (, )][DBLP]

  193. The Laplacian Spread of a Tree. [Citation Graph (, )][DBLP]

  194. Nonsingular mixed graphs with few eigenvalues greater than two. [Citation Graph (, )][DBLP]

  195. Undecidable Properties on Length-Two String Rewriting Systems. [Citation Graph (, )][DBLP]

Search in 0.134secs, Finished in 0.145secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002