The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peng Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jin Pan, Peng Wang, Wei Wang, Baile Shi, Genxing Yang
    Efficient Algorithms for Mining Maximal Frequent Concatenate Sequences in Biological Datasets. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:98-104 [Conf]
  2. Peng Wang, Zhao Yu, Cao Dazhong
    Research On Downlink Capacity For Broadband Wireless Access - VSFOFCDM. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:454-458 [Conf]
  3. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:17-32 [Conf]
  4. Dazhou Kang, Baowen Xu, Jianjiang Lu, Yanhui Li, Peng Wang
    Refined Approximation of Concepts in Ontology. [Citation Graph (0, 0)][DBLP]
    AI*IA, 2005, pp:82-85 [Conf]
  5. Jinbao Li, Jianzhong Li, Longjiang Guo, Peng Wang
    Power-Efficient Node Localization Algorithm in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:420-430 [Conf]
  6. Peng Wang, Baowen Xu, Jianjiang Lu, Dazhou Kang, Jin Zhou
    Mapping Ontology Relations: An Approach Based on Best Approximations. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:930-936 [Conf]
  7. Yong Yan, Peng Wang, Chen Wang, Haofeng Zhou, Wei Wang, Baile Shi
    ANNE: An Efficient Framework on View Selection Problem. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:384-394 [Conf]
  8. Peng Wang, Dengguo Feng, Wenling Wu
    HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:175-188 [Conf]
  9. Peng Wang, Rui Cai, Shi-Qiang Yang
    Tennis Video Analysis Based on Transformed Motion Vectors. [Citation Graph (0, 0)][DBLP]
    CIVR, 2004, pp:79-87 [Conf]
  10. David Hart, Douglas Grover, Matt Liggett, Richard Repasky, Corey Shields, Stephen Simms, Adam Sweeny, Peng Wang
    Distributed Parallel Computing Using Windows Desktop Systems. [Citation Graph (0, 0)][DBLP]
    CLADE, 2003, pp:34- [Conf]
  11. Yanhui Li, Baowen Xu, Jianjiang Lu, Dazhou Kang, Peng Wang
    A Family of Extended Fuzzy Description Logics. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:221-226 [Conf]
  12. Peng Wang, Zhengchang Su, PhuongAn Dam, Ying Xu
    A Knowledge Base for Computational Pathway Reconstruction. [Citation Graph (0, 0)][DBLP]
    CSB, 2004, pp:612-613 [Conf]
  13. Peng Wang, Zhengchang Su, Jun-tao Guo, Ying Xu
    Structural Analysis of FGFR1 Kinase Activation through Molecular Dynamics Simulation. [Citation Graph (0, 0)][DBLP]
    CSB, 2004, pp:700-701 [Conf]
  14. Peng Wang, Bo Yan, Juntao Guo, Chindo Hicks, Ying Xu
    Structural genomics analysis of alternative splicing and its application in modeling structures of alternatively spliced variants. [Citation Graph (0, 0)][DBLP]
    CSB Workshops, 2005, pp:217-0 [Conf]
  15. Peng Wang, Qiang Ji
    Learn Discriminant Features for Multi-View Face and Eye Detection. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2005, pp:373-379 [Conf]
  16. Peng Wang, Qiang Ji
    Performance Modeling and Prediction of Face Recognition Systems. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2006, pp:1566-1573 [Conf]
  17. Baowen Xu, Peng Wang, Jianjiang Lu, Yanhui Li, Dazhou Kang
    Bridge Ontology and Its Role in Semantic Annotation. [Citation Graph (0, 0)][DBLP]
    CW, 2004, pp:329-334 [Conf]
  18. Peng Wang, Jia Wang, Songyu Yu, Erkang Chen, Xiaokang Yang, Xiaodong Wang
    The Wyner-Ziv Rate-Distortion Function of Multivariate Gaussian Sources and Its Application in Distributed Video Coding. [Citation Graph (0, 0)][DBLP]
    DCC, 2007, pp:405- [Conf]
  19. Jianjiang Lu, Baowen Xu, Dazhou Kang, Yanhui Li, Peng Wang
    Approximations of Concept Based on Multielement Bounds. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:676-685 [Conf]
  20. Jianjiang Lu, Baowen Xu, Yanhui Li, Dazhou Kang, Peng Wang
    Extended Fuzzy ALCN and Its Tableau Algorithm. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:232-242 [Conf]
  21. Xian-Yong Fang, Fuli Wu, Bin Luo, Haifeng Zhao, Peng Wang
    Automatic Recognition of Noisy Code-39 Barcode. [Citation Graph (0, 0)][DBLP]
    ICAT Workshops, 2006, pp:79-82 [Conf]
  22. Ivan Osipkov, Peng Wang, Nicholas Hopper
    Robust Accounting in Decentralized P2P Storage Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:14- [Conf]
  23. Peng Wang, Haixun Wang, Xiaochen Wu, Wei Wang, Baile Shi
    On Reducing Classifier Granularity in Mining Concept-Drifting Data Streams. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:474-481 [Conf]
  24. Peng Wang, Haixun Wang, Wei Wang, Baile Shi, Philip S. Yu
    LOCI: Load Shedding through Class-Preserving Data Acquisition. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:701-710 [Conf]
  25. Baowen Xu, Peng Wang, Jianjiang Lu, Dazhou Kang, Yanhui Li
    A Framework for Managing Multiple Ontologies: The Function-Oriented Perspective. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:300-305 [Conf]
  26. Peng Wang, Rui Cai, Bin Li, Shi-Qiang Yang
    A pinhole camera modeling of motion vector field for tennis video analysis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:705-708 [Conf]
  27. Peng Wang, Rui Cai, Shi-Qiang Yang
    Contextual browsing for highlights in sports video. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1951-1954 [Conf]
  28. Peng Wang, Xun Zhang, Dongming Jin
    A Novel Multiplier for Achieving the Programmability of Cellular Neural Network. [Citation Graph (0, 0)][DBLP]
    ICONIP (3), 2006, pp:1199-1205 [Conf]
  29. Peng Wang, Qiang Ji
    Multi-View Face Detection under Complex Scene based on Combined SVMs. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2004, pp:179-182 [Conf]
  30. Peng Wang, Lam Cam Tran, Qiang Ji
    Improving Face Recognition by Online Image Alignment. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:311-314 [Conf]
  31. Baowen Xu, Peng Wang, Jianjiang Lu, Yanhui Li, Dazhou Kang
    Theory and Semantic Refinement of Bridge Ontology Based on Multi-Ontologies. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2004, pp:442-449 [Conf]
  32. Dazhou Kang, Peng Wang, Jianjiang Lu, Jixiang Jiang, Baowen Xu
    Logic-based Inference Detection in Querying XML Document. [Citation Graph (0, 0)][DBLP]
    IKE, 2005, pp:105-112 [Conf]
  33. Baowen Xu, Jixiang Jiang, Jianjiang Lu, Peng Wang
    Non-negative Matrix Factorization for Filtering Chinese and Oriental Language Document. [Citation Graph (0, 0)][DBLP]
    IKE, 2004, pp:192-196 [Conf]
  34. Peng Wang, Dengguo Feng, Wenling Wu
    Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:280-286 [Conf]
  35. Peng Wang, George W. Turner, Daniel A. Lauer, Matthew Allen, Stephen Simms, David Hart, Mary Papakhian, Craig A. Stewart
    LINPACK Performance on a Geographically Distributed Linux Cluster. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  36. Baowen Xu, Dazhou Kang, Jianjiang Lu, Peng Wang, Yanhui Li
    Equivalent Individuals on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    IRI, 2004, pp:253-258 [Conf]
  37. Peng Wang, Rui Cai, Shi-Qiang Yang
    Improving classification of video shots using information-theoretic co-clustering. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:964-967 [Conf]
  38. Peng Wang, Shiyuan Yang
    Soft fault test and diagnosis for analog circuits. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2188-2191 [Conf]
  39. Peng Wang, Baowen Xu, Jianjiang Lu, Dazhou Kang, Yanhui Li
    Manage Distributed Ontologies on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:1047-1054 [Conf]
  40. Peng Wang, Dengguo Feng, Wenling Wu
    On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:274-287 [Conf]
  41. Dazhou Kang, Jianjiang Lu, Baowen Xu, Peng Wang, Yanhui Li
    A Framework of Checking Subsumption Relations Between Composite Concepts in Different Ontologies. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:953-959 [Conf]
  42. Yanhui Li, Baowen Xu, Jianjiang Lu, Dazhou Kang, Peng Wang
    Extended Fuzzy Description Logic ALCN. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:896-902 [Conf]
  43. Peng Wang, Zhi-Qiang Liu, Shi-Qiang Yang
    A probabilistic template-based approach to discovering repetitive patterns in broadcast videos. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:407-410 [Conf]
  44. Peng Wang, David L. Mills
    A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:59-66 [Conf]
  45. Dazhou Kang, Baowen Xu, Jianjiang Lu, Peng Wang, Yanhui Li
    Extracting Sub-ontology from Multiple Ontologies. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2004, pp:731-740 [Conf]
  46. Peng Wang, Baowen Xu, Jianjiang Lu, Yanhui Li, Dazhou Kang
    Theory and Semi-automatic Generation of Bridge Ontology in Multi-ontologies Environment. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2004, pp:763-767 [Conf]
  47. Peng Wang, Rui Cai, Shi-Qiang Yang
    A Tennis Video Indexing Approach Through Pattern Discovery in Interactive Process. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2004, pp:49-56 [Conf]
  48. Bo Yan, Tong Zhou, Peng Wang, Zhijie Liu, Vincent A. Emanuele II, Victor Olman, Ying Xu
    A Point-Process Model for Rapid Identification of Post-Translational Modifications. [Citation Graph (0, 0)][DBLP]
    Pacific Symposium on Biocomputing, 2006, pp:327-338 [Conf]
  49. Peng Wang, Kai-Yuan Cai
    Representing Extended Finite State Machines for SDL by A Novel Control Model of Discrete Event Systems. [Citation Graph (0, 0)][DBLP]
    QSIC, 2006, pp:159-166 [Conf]
  50. Peng Wang, Qiang Ji
    Multi-View Face Tracking with Factorial and Switching HMM. [Citation Graph (0, 0)][DBLP]
    WACV/MOTION, 2005, pp:401-406 [Conf]
  51. Peng Wang, George J. Vachtsevanos
    Fault prognostics using dynamic wavelet neural networks. [Citation Graph (0, 0)][DBLP]
    AI EDAM, 2001, v:15, n:4, pp:349-365 [Journal]
  52. Yigang Cai, Xian Yang Li, Yile Wang, John B. Reid, Peng Wang
    IP multimedia subsystem online session charging call control. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2006, v:10, n:4, pp:117-132 [Journal]
  53. Victor Olman, Chindo Hicks, Peng Wang, Ying Xu
    Gene Expression Data Analysis in Subtypes of Ovarian Cancer Using Covariance Analysis. [Citation Graph (0, 0)][DBLP]
    J. Bioinformatics and Computational Biology, 2006, v:4, n:5, pp:999-1014 [Journal]
  54. Lei Yang, Peng Wang, Yilin Jiang, Jian Chen
    Studying the Explanatory Capacity of Artificial Neural Networks for Understanding Environmental Chemical Quantitative Structure-Activity Relationship Models. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Modeling, 2005, v:45, n:6, pp:1804-1811 [Journal]
  55. Xian-Yong Fang, Mingmin Zhang, Zhigeng Pan, Peng Wang
    A New Method of Manifold Mosaic for Large Displacement Images. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:2, pp:218-223 [Journal]
  56. Peng Wang, Qiang Ji, James L. Wayman
    Modeling and Predicting Face Recognition System Performance Based on Analysis of Similarity Scores. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2007, v:29, n:4, pp:665-670 [Journal]
  57. Peng Wang, Zhi-Qiang Liu, Shi-Qiang Yang
    Investigation on unsupervised clustering algorithms for video shot categorization. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2007, v:11, n:4, pp:355-360 [Journal]
  58. Guangmin Sun, Xinming Zhang, Peng Wang, Weixian Liu, Jeffrey Shiang Fu
    One-dimension range profile identification of radar targets based on a linear interpolation neural network. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:10, pp:2033-2040 [Journal]
  59. Peng Wang, Christian Köhler, Fred Barrett, Raquel Gur, Ruben Gur, Ragini Verma
    Quantifying Facial Expression Abnormality in Schizophrenia by Combining 2D and 3D Features. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  60. Peng Wang, Christian Köhler, Ragini Verma
    Estimating Cluster Overlap on Manifolds and its Application to Neuropsychiatric Disorders. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  61. Yanjun Zhao, Tao Wang, Peng Wang, Wei Hu, Yangzhou Du, Yimin Zhang, Guangyou Xu
    Scene Segmentation and Categorization Using NCuts. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  62. Stephan Bohacek, Peng Wang
    Toward Tractable Computation of the Capacity of Multi-Hop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2099-2107 [Conf]
  63. Peng Wang, David L. Mills
    Further Analysis of XCP Equilibrium Performance. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  64. Nan Hua, Yang Xu, Peng Wang, Depeng Jin, Lieguang Zeng
    A Practical Switch-Memory-Switch Architecture Emulating PIFO OQ. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  65. Peng Wang, Stephan Bohacek
    The Practical Performance of Subgradient Computational Techniques for Mesh Network Utility Optimization. [Citation Graph (0, 0)][DBLP]
    NET-COOP, 2007, pp:84-94 [Conf]
  66. Peng Wang, Haixun Wang, Xiaochen Wu, Wei Wang, Baile Shi
    A Low-Granularity Classifier for Data Streams with Concept Drifts and Biased Class Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:9, pp:1202-1213 [Journal]

  67. An Evolutive Algorithm for the Data Mining in Population Data Warehouse. [Citation Graph (, )][DBLP]


  68. The Research of an Improved Intelligent Algorithm to Process Network Blocking and Its Simulation. [Citation Graph (, )][DBLP]


  69. The Research of an Intelligent Agent to Process OLAP Service Over Statistical Data Warehouse. [Citation Graph (, )][DBLP]


  70. A Variant of the Trace Quotient Formulation for Dimensionality Reduction. [Citation Graph (, )][DBLP]


  71. On the Unprovable Security of 2-Key XCBC. [Citation Graph (, )][DBLP]


  72. An Effective Similarity Propagation Method for Matching Ontologies without Sufficient or Regular Linguistic Information. [Citation Graph (, )][DBLP]


  73. A gestural interaction design model for multi-touch displays. [Citation Graph (, )][DBLP]


  74. Security of Truncated MACs. [Citation Graph (, )][DBLP]


  75. An Access Control Model for Service Composite. [Citation Graph (, )][DBLP]


  76. Robust guidewire tracking in fluoroscopy. [Citation Graph (, )][DBLP]


  77. A Novel Multiple Description Video Codec Based on Slepian-Wolf Coding. [Citation Graph (, )][DBLP]


  78. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. [Citation Graph (, )][DBLP]


  79. Research on improved strategy of FDM algorithm. [Citation Graph (, )][DBLP]


  80. Simple and Fair Scheduling Algorithm for Combined Input-Crosspoint-Queued Switch. [Citation Graph (, )][DBLP]


  81. A QoS Architecture for IDMA-Based Multi-Service Wireless Networks. [Citation Graph (, )][DBLP]


  82. Authentication Tests Based on Test Type Matrix. [Citation Graph (, )][DBLP]


  83. On Detecting Subtle Pathology via Tissue Clustering of Multi-parametric Data using Affinity Propagation. [Citation Graph (, )][DBLP]


  84. NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network. [Citation Graph (, )][DBLP]


  85. Extended Models for Message Authentication. [Citation Graph (, )][DBLP]


  86. Convergence rate of structural risk minimization principle on quasi-probability space. [Citation Graph (, )][DBLP]


  87. An improved approach to feature selection. [Citation Graph (, )][DBLP]


  88. Numerical characteristics for average value of fuzzy variables. [Citation Graph (, )][DBLP]


  89. The bounds on the risk for real-valued loss functions on possibility space. [Citation Graph (, )][DBLP]


  90. A PH complex control system built-in correction factor. [Citation Graph (, )][DBLP]


  91. A Logical Framework for Fuzzy Quantifiers Part I: Basic Properties. [Citation Graph (, )][DBLP]


  92. Control information description model and processing mechanism in the trustworthy and controllable network. [Citation Graph (, )][DBLP]


  93. Describing Data with the Support Vector Shell in Distributed Environments. [Citation Graph (, )][DBLP]


  94. A Fuzzy Neural Network Based on Particle Swarm Optimization Applied in the Speech Recognition System. [Citation Graph (, )][DBLP]


  95. On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP]


  96. On Classifying Disease-Induced Patterns in the Brain Using Diffusion Tensor Images. [Citation Graph (, )][DBLP]


  97. Dynamic Layer Separation for Coronary DSA and Enhancement in Fluoroscopic Sequences. [Citation Graph (, )][DBLP]


  98. Graph Based Interactive Detection of Curve Structures in 2D Fluoroscopy. [Citation Graph (, )][DBLP]


  99. Data-Aware Clustering Hierarchy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  100. Communication models for throughput optimization in mesh networks. [Citation Graph (, )][DBLP]


  101. The design methodology of Phoenix cluster system software stack. [Citation Graph (, )][DBLP]


  102. LILY: the Results for the Ontology Alignment Contest OAEI 2007. [Citation Graph (, )][DBLP]


  103. Lily: Ontology Alignment Results for OAEI 2008. [Citation Graph (, )][DBLP]


  104. Lily: Ontology Alignment Results for OAEI 2009. [Citation Graph (, )][DBLP]


  105. An algorithmic approach to event summarization. [Citation Graph (, )][DBLP]


  106. Application of Concurrent Subspace Design to Shape Design of Automatic Underwater Vehicle*. [Citation Graph (, )][DBLP]


  107. Content-based video indexing and retrieval using the Radon transform and pattern matching. [Citation Graph (, )][DBLP]


  108. Power-Efficient Data Exchanging Algorithm in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  109. Isomorphism Between Information Tables for Tolerance and Classical Rough Sets. [Citation Graph (, )][DBLP]


  110. Transmission Strategies for Parallel Relay Networks Based on Superposition Coding. [Citation Graph (, )][DBLP]


  111. Power Allocation in OFDM-Based Cognitive Radio Systems. [Citation Graph (, )][DBLP]


  112. On Multi-User Gain in MIMO Systems with Rate Constraints. [Citation Graph (, )][DBLP]


  113. On Cellular Capacity with Base Station Cooperation. [Citation Graph (, )][DBLP]


  114. How Does Correlation Affect the Capacity of MIMO Systems with Rate Constraints? [Citation Graph (, )][DBLP]


  115. Wasp Algorithm for Dynamic Scheduling Based on Manufacturing Grid. [Citation Graph (, )][DBLP]


  116. Grey Relation Degree Analysis for the Facility’s Location of Logistics Distribution Network. [Citation Graph (, )][DBLP]


  117. Crucial Technology Research on Pipeline Jet Cleaning Robot. [Citation Graph (, )][DBLP]


  118. Modeling and Optimization of Crowd Guidance for Building Emergency Evacuation. [Citation Graph (, )][DBLP]


  119. Intelligent Robot Manipulator's Application in the Racking of Drill Pipe. [Citation Graph (, )][DBLP]


  120. Development of a multi-DOF exoskeleton based machine for injured fingers. [Citation Graph (, )][DBLP]


  121. On the practical complexity of solving the maximum weighted independent set problem for optimal scheduling in wireless networks. [Citation Graph (, )][DBLP]


  122. A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks. [Citation Graph (, )][DBLP]


  123. Regional Style Automatic Identification for Chinese Folk Songs. [Citation Graph (, )][DBLP]


  124. The Automatic Feed Control Based on OBP Neural Network. [Citation Graph (, )][DBLP]


  125. A Knowledge-Based Ant Colony Optimization for Flexible Job Shop Scheduling Problems. [Citation Graph (, )][DBLP]


  126. Automating document classification for the Immune Epitope Database. [Citation Graph (, )][DBLP]


  127. Implementation, performance, and science results from a 30.7 TFLOPS IBM BladeCenter cluster. [Citation Graph (, )][DBLP]


  128. Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms [Citation Graph (, )][DBLP]


  129. LACBoost and FisherBoost: Optimally Building Cascade Classifiers [Citation Graph (, )][DBLP]


  130. Optimally Training a Cascade Classifier [Citation Graph (, )][DBLP]


  131. Multi-view face and eye detection using discriminant features. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002