The SCEAS System
Navigation Menu

Search the dblp DataBase


Xun Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xun Wang, William G. Wee
    A Deformable Contour Method: Divide and Conquare Approach. [Citation Graph (0, 0)][DBLP]
    BIBE, 2000, pp:355-362 [Conf]
  2. Yingjie Tang, Lei He, Xun Wang, William G. Wee
    A Model Based Contour Searching Method. [Citation Graph (0, 0)][DBLP]
    BIBE, 2000, pp:347-354 [Conf]
  3. Xun Wang, Lei He, Chia Y. Han, William G. Wee
    Deformable contour method: a constrained optimization approach. [Citation Graph (0, 0)][DBLP]
    BMVC, 2002, pp:- [Conf]
  4. Xun Wang, Zhigang Peng, Feng Gao, William G. Wee
    A Model Set Based Object Segmentation Method Using Level Set Approach. [Citation Graph (0, 0)][DBLP]
    DICTA, 2003, pp:967-976 [Conf]
  5. Chunhua Ju, Xun Wang, Biwei Li
    Knowledge Representing and Clustering in e-Learning. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2006, pp:166-170 [Conf]
  6. Xun Wang, Weijun Xu, Wei-Guo Zhang, Maolin Hu
    Weighted Possibilistic Variance of Fuzzy Number and Its Application in Portfolio Theory. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:148-155 [Conf]
  7. Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan
    Sensor Network Configuration Under Physical Attacks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:23-32 [Conf]
  8. Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang
    Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:408-417 [Conf]
  9. Xun Wang, William G. Wee
    A New Deformable Contour Method. [Citation Graph (0, 0)][DBLP]
    ICIAP, 1999, pp:430-435 [Conf]
  10. Lei He, Chia Y. Han, Xun Wang, Xiaokun Li, William G. Wee
    A skeleton based shape matching and recovery approach. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2002, pp:789-792 [Conf]
  11. Xun Wang, Lei He, William G. Wee
    Constrained optimization: a geodesic snake approach. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:77-80 [Conf]
  12. Lei Zhang, Xun Wang, Nicholas Penwarden, Qiang Ji
    An Image Segmentation Framework Based on Patch Segmentation Fusion. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:187-190 [Conf]
  13. Xun Wang, Biwei Li
    Intelligent Knowledge Recommendation System Based on Web Log and Cache Data. [Citation Graph (0, 0)][DBLP]
    ICWL, 2006, pp:48-56 [Conf]
  14. Feng Gao, Xiaokun Li, Xun Wang, William G. Wee
    Wavelet Based Optimal Interpolating Deblocking Algorithm. [Citation Graph (0, 0)][DBLP]
    VISION, 2005, pp:100-106 [Conf]
  15. Xun Wang, Lei He, William G. Wee
    Deformable Contour Method: A Constrained Optimization Approach. [Citation Graph (0, 0)][DBLP]
    International Journal of Computer Vision, 2004, v:59, n:1, pp:87-108 [Journal]
  16. Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan
    On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:619-632 [Journal]
  17. Xun Wang, Lei He, Yingjie Tang, William G. Wee
    A divide and conquer deformable contour method with a model based searching algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2003, v:33, n:5, pp:738-751 [Journal]
  18. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
    On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:235-244 [Conf]
  19. Hua-Mao Gu, Xun Wang, Yun Ling, Jin-Qin Shi
    Building a Fuzzy Ontology of Edutainment Using OWL. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:591-594 [Conf]
  20. Pingkang Li, Xun Wang, Xiuxia Du
    Application Study on Monitoring a Large Power Plant Operation. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:212-221 [Conf]

  21. PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. [Citation Graph (, )][DBLP]

  22. Study of Game Scheme for Elementary Historical Education. [Citation Graph (, )][DBLP]

  23. A Fuzzy Ontology and Its Application to Computer Games. [Citation Graph (, )][DBLP]

  24. Auto-evaluation on urban road traffic atmospheric pollution based on gray class and fuzzy ISODATA. [Citation Graph (, )][DBLP]

  25. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]

  26. A Graphical Model for Risk Analysis and Management. [Citation Graph (, )][DBLP]

  27. Mean Field Annealing Deformable Contour Method: A Constrained Global Optimization Approach. [Citation Graph (, )][DBLP]

  28. A New Lossless Compression Algorithm for Vector Maps. [Citation Graph (, )][DBLP]

  29. A Robust Watermarking Scheme Based on Audio Features in Multiwavelet Domain. [Citation Graph (, )][DBLP]

  30. A Color Image Watermarking Scheme in Wavelet Domain Based on Support Vector Machines. [Citation Graph (, )][DBLP]

  31. Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. [Citation Graph (, )][DBLP]

  32. Behavioral Simulations in MapReduce [Citation Graph (, )][DBLP]

Search in 0.350secs, Finished in 0.352secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002