The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ping Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ping Wang, Ting Wang
    Adaptive Routing for Sensor Networks using Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:219- [Conf]
  2. Ping Wang, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu
    A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:889-893 [Conf]
  3. Tao Yang, Ping Wang, Wengang Zhai
    The Virtual Bandwidth Based ER Marking Algorithms for Flow Control in ATM Networks. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1999, pp:421-435 [Conf]
  4. Ping Wang, Binxing Fang, Xiao-chun Yun
    A New User-Habit Based Approach for Early Warning of Worms. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:212-219 [Conf]
  5. Chi-Chun Lo, Ping Wang, Kuo-Ming Chao
    Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:573-585 [Conf]
  6. Ping Wang, James M. Rehg
    A Modular Approach to the Analysis and Evaluation of Particle Filters for Figure Tracking. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:790-797 [Conf]
  7. Ping Wang, Richard Batiuk, Lewis C. Linker, Mary Ellen Ley
    Importance of Data Mining in the Assessment of Anoxic Problem from Estuarine Monitoring Data. [Citation Graph (0, 0)][DBLP]
    DMIN, 2006, pp:161-167 [Conf]
  8. Ping Wang, Lewis C. Linker, Carl Cerco, Gary Shenk, Richard Batiuk
    Recast of the Outputs of a Deterministic Model to Get a Better Estimate of Water Quality for Decision Makings. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:80-89 [Conf]
  9. Ping Wang, Lewis C. Linker, Keith N. Eshleman
    Dynamic Parameterization to Simulate DIN Export Due to Gypsy Moth Defoliation. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:30-38 [Conf]
  10. Raymond A. Heald, Ping Wang
    Variability in sub-100nm SRAM designs. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2004, pp:347-352 [Conf]
  11. Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Yinsheng Li
    A Fuzzy Model for Selection of QoS-Aware Web Services. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:585-593 [Conf]
  12. Ping Wang
    What Drives Waves in Information Systems: The Organizing Vision Perspective. [Citation Graph (0, 0)][DBLP]
    ICIS, 2001, pp:411-418 [Conf]
  13. Ping Wang, Neil C. Ramiller
    Community Learning in Information Technology Fashion. [Citation Graph (0, 0)][DBLP]
    ICIS, 2004, pp:39-52 [Conf]
  14. Xiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu
    Fast and Blind Restoration Scheme for the Initial States of LFSRs. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:192-198 [Conf]
  15. Ping Wang, Changsong Sun, Lijie Li
    Primary Research on Internetware Reliability Technology. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:424-428 [Conf]
  16. Ping Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu
    A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol Performance. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:745-754 [Conf]
  17. Ping Wang, Qingjie Zhao, Ruqing Yang
    Using Accelerated Evolutionary Programming in Self-turning Control for Uncertainty Systems. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:456-460 [Conf]
  18. Ping Wang, Hongzhong Huang, Ming J. Zuo, Weidong Wu, Chunsheng Liu
    Functional-Link Net Based Multiobjective Fuzzy Optimization. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2005, pp:800-804 [Conf]
  19. Ping Wang, Binxing Fang, Xiao-chun Yun
    Model and Estimation of Worm Propagation Under Network Partition. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:57-66 [Conf]
  20. David L. Black, Jeff Carter, George Feinberg, Rod MacDonald, Jim Van Sciver, Ping Wang, Shashi Mangalat, Eric Sheinbrood
    OSF/1 Virtual Memory Improvements. [Citation Graph (0, 0)][DBLP]
    USENIX MACH Symposium, 1991, pp:87-104 [Conf]
  21. Ping Wang, Peggy Li
    Parallel Computation and Visualization of 3D, Time-Dependent, Thermal Convective Flows. [Citation Graph (0, 0)][DBLP]
    PARA, 1998, pp:565-573 [Conf]
  22. Ping Wang, Binxing Fang, Xiao-chun Yun
    A New Approach to Automatically Detect Worms. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:259-263 [Conf]
  23. Xiong Yang, Jing Lu, Yuguang Zhu, Ping Wang
    Simulation and Evaluation of a New Algorithm of Worm Detection and Containment. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:448-453 [Conf]
  24. Yu Zou, Ping Wang
    Harmonic Detection Based Hopfield Neural Network Optimum Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:379-382 [Conf]
  25. Ping Wang, Xiangyang Luo, Fenlin Liu
    An Improved Secret Key Estimation Method for Sequential Steganography. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:396-402 [Conf]
  26. Qingxiang Wu, Ping Wang, Xi Huang, Shan Yan
    Adaptive discretizer for machine learning based on granular computing and rough sets. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:292-295 [Conf]
  27. Ping Wang
    An Upper Bound for the (n, 5)-cages. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 1997, v:47, n:, pp:- [Journal]
  28. Jian-Liang Wu, Ping Wang, Anthony J. W. Hilton
    Two sufficient conditions for a graph to be type 1. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2005, v:76, n:, pp:- [Journal]
  29. Baoguang Xu, Ping Wang, Jianfang Wang
    On the Connectivity of (4;g)-Cages. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2002, v:64, n:, pp:181-0 [Journal]
  30. Ping Wang, Baoguang Xu, Jianfang Wang
    A Note on the Edge-Connectivity of Cages. [Citation Graph (0, 0)][DBLP]
    Electr. J. Comb., 2003, v:10, n:, pp:- [Journal]
  31. Martin F. van Bommel, P. Wang
    Encoding multiple inheritance hierarchies for lattice operations. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:50, n:2, pp:175-194 [Journal]
  32. Ping Wang, Gerhard W. Dueck, S. MacMillan
    Using simulated annealing to construct extremal graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2001, v:235, n:1-3, pp:125-135 [Journal]
  33. Ping Wang, Lewis C. Linker
    A correction of DIN uptake simulation by Michaelis-Menton saturation kinetics in HSPF watershed model to improve DIN export simulation. [Citation Graph (0, 0)][DBLP]
    Environmental Modelling and Software, 2006, v:21, n:1, pp:45-60 [Journal]
  34. Chi-Chun Lo, Ping Wang, Kuo-Ming Chao
    A fuzzy group-preferences analysis method for new-product development. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2006, v:31, n:4, pp:826-834 [Journal]
  35. Hong-Zhong Huang, Ping Wang, Ming J. Zuo, Weidong Wu, Chunsheng Liu
    A fuzzy set based solution method for multiobjective optimal design problem of mechanical and structural systems using functional-link net. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 2006, v:15, n:3-4, pp:239-244 [Journal]
  36. Lingguang Song, Ping Wang, Simaan M. AbouRizk
    A virtual shop modeling system for industrial fabrication shops. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2006, v:14, n:5, pp:649-662 [Journal]
  37. Ping Wang, Xiaoping Wu
    OpenMP programming for a global inverse model. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 2002, v:10, n:3, pp:253-261 [Journal]
  38. Chaochun Qu, Ping Wang
    Optimization in production quota problem with convex cost function. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:177, n:2, pp:652-658 [Journal]
  39. Ping Wang, Lidan Shou, Gang Chen, Jinxiang Dong
    MIME: A Dynamic Index Scheme for Multi-dimensional Query in Mobile P2P Networks. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2007, pp:576-585 [Conf]
  40. Jinyuan Jia, Ping Wang, Sen Wang, Yuying Wang
    An Integer Incremental AOI Algorithm for Progressive Downloading of Large Scale VRML Environments. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2007, pp:711-722 [Conf]
  41. Jian-Liang Wu, Ping Wang
    A Linear Algorithm for Edge-Face Coloring Series-Parallel Graphs. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:389-396 [Conf]
  42. Delong Shang, Chi-Hoon Shin, Ping Wang, Fei Xia, Albert Koelmans, Myeong-Hoon Oh, Seongwoon Kim, Alexandre Yakovlev
    Asynchronous Functional Coupling for Low Power Sensor Network Processors. [Citation Graph (0, 0)][DBLP]
    PATMOS, 2007, pp:53-63 [Conf]
  43. Ping Wang, Hai Jiang, Weihua Zhuang
    A Dual Busy-Tone MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  44. Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Muhammad Younas
    A fuzzy outranking approach in risk analysis of web service security. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2007, v:10, n:1, pp:47-55 [Journal]
  45. Ping Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu
    A hierarchical multicast protocol in mobile IPv6 networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:30, n:1, pp:144-152 [Journal]
  46. Hai Jiang, Ping Wang, H. Vincent Poor, Weihua Zhuang
    Voice Service Support in Mobile Ad Hoc Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  47. Denis Hanson, Ping Wang, Leif K. Jørgensen
    On cages with given degree sets. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1992, v:101, n:1-3, pp:109-114 [Journal]

  48. Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model. [Citation Graph (, )][DBLP]


  49. Hierarchy Encoding with Multiple Genes. [Citation Graph (, )][DBLP]


  50. An Entropy Decision Model for Selection of QoS-Aware Services Provisioning. [Citation Graph (, )][DBLP]


  51. The Auto-Obtaining of the Knowledge about Developing Hailstone Weather. [Citation Graph (, )][DBLP]


  52. Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. [Citation Graph (, )][DBLP]


  53. Exploring the Relationships among ICTs: A Scalable Computational Approach Using KL Divergence and Hierarchical Clustering. [Citation Graph (, )][DBLP]


  54. An Analysis on Modes of Scientific and TechnologicaInformation Integration Services in the E- environment. [Citation Graph (, )][DBLP]


  55. Link Layer Priority Techniques for Real-Time Traffic in CDMA Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  56. A Collision-Free MAC Scheme for Multimedia Wireless Mesh Backbone. [Citation Graph (, )][DBLP]


  57. A Token-Based Scheduling Scheme for WLANs and Its Performance Analysis. [Citation Graph (, )][DBLP]


  58. Performance Analysis of a Distributed Wireless Access Scheme. [Citation Graph (, )][DBLP]


  59. On the Expected Complexity Analysis of a Generalized Sphere Decoding Algorithm for Underdetermined Linear Communication Systems. [Citation Graph (, )][DBLP]


  60. Voice Service Support over Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  61. Simulating Particulate Organic Advection along Bottom Slopes to Improve Simulation of Estuarine Hypoxia and Anoxia. [Citation Graph (, )][DBLP]


  62. Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN. [Citation Graph (, )][DBLP]


  63. A Reputation-Based Service Selection Scheme. [Citation Graph (, )][DBLP]


  64. Multi-class steganalysis for Jpeg stego algorithms. [Citation Graph (, )][DBLP]


  65. Detecting photographic composites using shadows. [Citation Graph (, )][DBLP]


  66. Detecting photographic composites using two-view geometrical constraints. [Citation Graph (, )][DBLP]


  67. Optimization and Analysis of Deformable Mirror Supporting Structure. [Citation Graph (, )][DBLP]


  68. Estimating chlorophyll content of rice under soil contamination stress using BPNN. [Citation Graph (, )][DBLP]


  69. A Research on the Project of Digital Comprehensive Capability Platform for Shipbuilding. [Citation Graph (, )][DBLP]


  70. Application of Bioinformatics in the Design of Gene Expression Microarrays. [Citation Graph (, )][DBLP]


  71. Steganalysis Based on Difference Image. [Citation Graph (, )][DBLP]


  72. Value Combination Technique for Image Authentication. [Citation Graph (, )][DBLP]


  73. Probabilistic Logic Operator based on Zero-order N/T-Norms Complete Clusters. [Citation Graph (, )][DBLP]


  74. A method to construct dynamic S-box based on chaotic map. [Citation Graph (, )][DBLP]


  75. A Noise Removal Model with Anisotropic Diffusion based on Visual Gradient. [Citation Graph (, )][DBLP]


  76. Performance of OFDM System on Link Simulation with Measured Outdoor Channels at 3.5GHz. [Citation Graph (, )][DBLP]


  77. Performance modeling on dynamic authentication data management in heterogeneous interworking networks. [Citation Graph (, )][DBLP]


  78. Voice Service Support in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  79. Secret Key Estimation for Image Sequential Steganograph in Transform Domain. [Citation Graph (, )][DBLP]


  80. Cross-Layer Cooperative Triple Busy Tone Multiple Access for Wireless Networks. [Citation Graph (, )][DBLP]


  81. Competitive Wireless Access for Data Streaming over Vehicle-to-Roadside Communications. [Citation Graph (, )][DBLP]


  82. The Design of Anti-collision Mechanism of UHF RFID System based on CDMA. [Citation Graph (, )][DBLP]


  83. Feature n-gram Set Based Software Zero-Watermarking. [Citation Graph (, )][DBLP]


  84. The Reliability Assessment of Legal Reasoning with Evidence Theory. [Citation Graph (, )][DBLP]


  85. Intelligent Knowledge Query Answering System Based on Short Message. [Citation Graph (, )][DBLP]


  86. Network Selection in Heterogeneous Wireless Networks: Evolution with Incomplete Information. [Citation Graph (, )][DBLP]


  87. Credit-Based Spectrum Sharing for Cognitive Mobile Multihop Relay Networks. [Citation Graph (, )][DBLP]


  88. Coalition Formation Games for Bandwidth Sharing in Vehicle-To-Roadside Communications. [Citation Graph (, )][DBLP]


  89. Performance analysis of the vehicular delay tolerant network. [Citation Graph (, )][DBLP]


  90. A hybrid DE-SQP algorithm with switching procedure for dynamic optimization. [Citation Graph (, )][DBLP]


  91. An Optimized Algorithm for Filtering the Noise in Weak Signal Based on TIDWT. [Citation Graph (, )][DBLP]


  92. Hiding Informationin in Java Class File. [Citation Graph (, )][DBLP]


  93. Research on Data Fusion Algorithm in ZigBee Protocol. [Citation Graph (, )][DBLP]


  94. Frequency-domain equalization and diversity combining for demodulate-and-forward cooperative systems. [Citation Graph (, )][DBLP]


  95. A New Data Gathering Algorithm Based on Mutual Supportability and Grey Prediction in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  96. Support Vector Regression Model of Currency Options Pricing with Stochastic Volatility Models and Forward Exchange Rate. [Citation Graph (, )][DBLP]


  97. An analysis model of botnet tracking based on ant colony optimization algorithm. [Citation Graph (, )][DBLP]


  98. QoS-aware mobile service transactions in a wireless environment. [Citation Graph (, )][DBLP]


  99. Equitable coloring planar graphs with large girth. [Citation Graph (, )][DBLP]


  100. List-edge and list-total colorings of graphs embedded on hyperbolic surfaces. [Citation Graph (, )][DBLP]


Search in 1.632secs, Finished in 1.640secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002