The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yu Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang
    Temporal Database Bibliography Update. [Citation Graph (2, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:338-366 [Conf]
  2. Jianqing Ma, Shiyong Zhang, YiPing Zhong, Yu Wu
    PEAN: A Public Key Authentication Scheme in Wireless Sensor and Actor Network. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:230- [Conf]
  3. Guo-Yin Wang, Jun Zhao, Jiu-Jiang An, Yu Wu
    Theoretical Study on Attribute Reduction of Rough Set Theory: Comparison of Algebra and Information Views. [Citation Graph (0, 0)][DBLP]
    IEEE ICCI, 2004, pp:148-155 [Conf]
  4. Zhong Qu, Junhao Wen, Dan Yang, Ling Xu, Yu Wu
    ART in Image Reconstruction with Narrow Fan-Beam Based on Data Mining. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:407-414 [Conf]
  5. Jie Bai, Yu Wu, Guoyin Wang, Simon X. Yang, Wenbin Qiu
    A Novel Intrusion Detection Model Based on Multi-layer Self-Organizing Maps and Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:255-260 [Conf]
  6. Zhengren Qin, Guoyin Wang, Yu Wu, Xiaorong Xue
    A Scalable Rough Set Knowledge Reduction Algorithm. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2004, pp:445-454 [Conf]
  7. Feng Hu, Guoyin Wang, Hai Huang, Yu Wu
    Incremental Attribute Reduction Based on Elementary Sets. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (1), 2005, pp:185-193 [Conf]
  8. Zhe Yuan, Yu Wu, Guoyin Wang, Jianbo Li
    A Global-Motion Analysis Method via Rough-Set-Based Video Pre-classification. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:323-332 [Conf]
  9. Zheng Zheng, Guoyin Wang, Yu Wu
    A Rough Set and Rule Tree Based Incremental Knowledge Acquisition Algorithm. [Citation Graph (0, 0)][DBLP]
    RSFDGrC, 2003, pp:122-129 [Conf]
  10. Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    An adaptive randomized search protocol in peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:533-537 [Conf]
  11. Jiujiang An, Guoyin Wang, Yu Wu
    A Learning Algorithm for Multiple Rule Trees. [Citation Graph (0, 0)][DBLP]
    Workshop on Web-based Support Systems, 2004, pp:13-19 [Conf]
  12. Qian Gao, Zhihuan Qiu, Yu Wu, Jing Tian, Yafei Dai
    An Interest-based P2P RDF Query Architecture. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:11- [Conf]
  13. Zhong Qu, Junhao Wen, Dan Yang, Yu Wu
    Algebraic reconstruction technique in image reconstruction with narrow fan-beam. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:622-625 [Conf]
  14. Jiujiang An, Guoyin Wang, Yu Wu, Quan Gan
    A rule generation algorithm based on granular computing. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:102-107 [Conf]
  15. Ting Wang, Yu Wu, Long Chen
    An Approach to Video Key-frame Extraction Based on Rough Set. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:590-596 [Conf]
  16. Guoyin Y. Wang, Jun Zhao, Jiu-Jiang An, Yu Wu
    A Comparative Study of Algebra Viewpoint and Information Viewpoint in Attribute Reduction. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:68, n:3, pp:289-301 [Journal]
  17. Zhe Yuan, Yu Wu, Guoyin Wang, Jianbo Li
    Motion-Information-Based Video Retrieval System Using Rough Pre-classification. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:306-333 [Journal]
  18. Yu Wu, Ling Xue, Chao Li, Zhang Xiong
    TDARS, a Fusion Based AR System for Machine Readable Travel Documents. [Citation Graph (0, 0)][DBLP]
    HCI (9), 2007, pp:1129-1138 [Conf]
  19. Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Brief Announcement: An Adaptive Randomised Searching Protocol in Peer-to-Peer Systems Based on Probabilistic Weak Quorum System. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:586-587 [Conf]
  20. Li Luo, Yu Wu, Guoyin Wang, Jie Bai
    A Video Pre-Classification Method with Multi-Layer Self-Organizing Maps and Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    ITSSA, 2006, v:2, n:2, pp:177-184 [Journal]

  21. A Novel Component-Based Model and Ranking Strategy in Constrained Evolutionary Optimization. [Citation Graph (, )][DBLP]


  22. Query Triggered Crawling Strategy: Build a Time Sensitive Vertical Search Engine. [Citation Graph (, )][DBLP]


  23. Parameter estimation for asymptotic regression model by particle swarm optimization. [Citation Graph (, )][DBLP]


  24. Opportunistic Scheduling for Delay Sensitive Flows in Wireless Networks. [Citation Graph (, )][DBLP]


  25. MWS-MCS: A Novel Multi-agent-assisted and WS-Management-based Composite Service Management Scheme. [Citation Graph (, )][DBLP]


  26. A Network Emergent Computing Model Based on Cellular Automaton. [Citation Graph (, )][DBLP]


  27. Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble Learning. [Citation Graph (, )][DBLP]


  28. Hybrid Particle Swarm Optimization Based on Thermodynamic Mechanism. [Citation Graph (, )][DBLP]


  29. VeXQuery: An XQuery Extension for MPEG-7 Vector-Based Feature Query. [Citation Graph (, )][DBLP]


  30. Modeling and Simulation on Information Propagation on Instant Messaging Network Based on Two-layer Scale-free Networks with Tunable Clustering. [Citation Graph (, )][DBLP]


  31. Bifurcating Periodic Solutions for a Single Delayed Neuron Model under Periodic Excitation. [Citation Graph (, )][DBLP]


  32. A novel differential evolution scheme combined with particle swarm intelligence. [Citation Graph (, )][DBLP]


  33. The Thermodynamic Particle Swarm Optimizer. [Citation Graph (, )][DBLP]


  34. An Analysis of the Behavior of Original Discrete Binary Particle Swarm Optimization on Trap Functions. [Citation Graph (, )][DBLP]


  35. WSDSNM3: A Web Services-based Distributed System and Network Management Middleware Model and Scheme. [Citation Graph (, )][DBLP]


  36. User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions. [Citation Graph (, )][DBLP]


  37. A new framework for intrusion detection based on rough set theory. [Citation Graph (, )][DBLP]


  38. A direct approach for incomplete information systems. [Citation Graph (, )][DBLP]


Search in 0.323secs, Finished in 0.324secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002