The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jian Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Z. Meral Özsoyoglu, Jian Wang
    A Keying Method for a Nested Relational Database Management System. [Citation Graph (1, 21)][DBLP]
    ICDE, 1992, pp:438-446 [Conf]
  2. Jian Wang, Keqing He
    Towards Representing FCA-based Ontologies in Semantic Web Rule Language. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:41- [Conf]
  3. Rad Silvera, Jian Wang, Ramaswamy Govindarajan, Guang R. Gao
    A Register Pressure Sensitive Instruction Scheduler for Dynamic Issue Processors. [Citation Graph (0, 0)][DBLP]
    IEEE PACT, 1997, pp:78-89 [Conf]
  4. Jian Wang, Jungsoon P. Yoo, Thomas J. Cheatham
    Efficient Reordering of C-PROLOG. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1993, pp:151-155 [Conf]
  5. Huiqiang Wang, Jian Wang, Guo-sheng Zhao
    A New Bio-inspired Model for Network Security and Its Application. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:756-759 [Conf]
  6. Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai
    A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ARCS, 2006, pp:422-434 [Conf]
  7. Jian Wang, Jun Tao, Xuan Zeng, Charles Chiang, Dian Zhou
    Analog circuit behavioral modeling via wavelet collocation method with auto-companding. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2004, pp:45-50 [Conf]
  8. Jian Wang, Guang R. Gao
    Pipelining-Dovetailing: A Transformation to Enhance Software Pipelining for Nested Loops. [Citation Graph (0, 0)][DBLP]
    CC, 1996, pp:1-17 [Conf]
  9. Erh-Wen Hu, Cyril Ku, Andrew Russo, Bogong Su, Jian Wang
    New DSP Benchmark based on Selectable Mode Vocoder (SMV). [Citation Graph (0, 0)][DBLP]
    CDES, 2006, pp:175-181 [Conf]
  10. Larry Hughes, Jian Wang
    Cartesian Core Routing and Cartesian Border Gateway Design. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:317-319 [Conf]
  11. Yu Dong, Niki Pissinou, Jian Wang
    Concurrency Handling in TCP. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:255-262 [Conf]
  12. Bogong Su, Chunyi Shi, Kehong Wang, Peng Hu, Hao Shi, Jian Wang
    The Architecture of a Distributed Knowledge Base System. [Citation Graph (0, 0)][DBLP]
    DS-3, 1988, pp:547-556 [Conf]
  13. Zhengyou Xia, Y. A. Hu, Jian Wang, Y.-C. Jiang, X. L. Qin
    Analyze and Guess Type of Piece in the Computer Game Intelligent System. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:1174-1183 [Conf]
  14. Changyong Niu, Jian Wang, Ruimin Shen
    A Topology Adaptation Protocol for Structured Superpeer Overlay Construction. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:953-958 [Conf]
  15. Yan Ma, Guoqing Li, Jian Wang, Dingsheng Liu
    The Performance Comparison and Evaluation of Parallel Platforms based on Throughput Model. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:482-486 [Conf]
  16. Jian Wang, Aobing Sun, Yongbo Li, Haitao Liu
    Programmable GPUs: New General Computing Resources Available for Desktop Grids. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:46-49 [Conf]
  17. Jian Wang, Mingyi He, Bangshu Xiong
    Research on Digitizing Processing of the Terracotta Warriors and Horses of the Qin Dynasty. [Citation Graph (0, 0)][DBLP]
    GMAG, 2003, pp:201-0 [Conf]
  18. Hai-Yin Xu, Dan Li, Jian Wang
    Implicit curve oriented inbetweening for motion animation. [Citation Graph (0, 0)][DBLP]
    GRAPHITE, 2006, pp:87-91 [Conf]
  19. Jian Wang, Dejiang Fu, Zhaoxia Jin, Shaosheng Li
    Design Methodology of Chinese User Interface Lessons from Windows 95/98. [Citation Graph (0, 0)][DBLP]
    HCI (1), 1999, pp:813-817 [Conf]
  20. Michael R. Hines, Jian Wang, Kartik Gopalan
    Distributed Anemone: Transparent Low-Latency Access to Remote Memory. [Citation Graph (0, 0)][DBLP]
    HiPC, 2006, pp:509-521 [Conf]
  21. Wei Yu, Jian Wang
    Distributed Bandwidth Allocation for the Virtual Private Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:486-488 [Conf]
  22. Jian Wang, V. Rao Vemuri, Biswanath Mukherjee, Wonhong Cho
    Improved Approaches for Cost-Effective Traffic Grooming in WDM Ring Networks: Non-Uniform Traffic and Bidirectional Ring. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1295-1299 [Conf]
  23. Guoqing Li, Yan Ma, Jian Wang, Dingsheng Liu
    Preliminary Through-Out Research on Parallel-Based Remote Sensing Image Processing. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:880-883 [Conf]
  24. Xin Li, Jian Wang, Lawrence T. Pileggi, Tun-Shih Chen, Wanju Chiang
    Performance-centering optimization for system-level analog design exploration. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2005, pp:422-429 [Conf]
  25. Yangfeng Su, Jian Wang, Xuan Zeng, Zhaojun Bai, Charles Chiang, Dian Zhou
    SAPOR: second-order Arnoldi method for passive order reduction of RCS circuits. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2004, pp:74-79 [Conf]
  26. Jian Wang, Zhen Yang, Jianjun Lei, Jun Guo
    A Novel Method for Rapid Speaker Adaptation Using Reference Support Speaker Selection. [Citation Graph (0, 0)][DBLP]
    ICCPOL, 2006, pp:450-456 [Conf]
  27. Jian Wang
    Pen Computing: Digital Ink and Printed Document. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:334- [Conf]
  28. Xiaoli Lu, R. Lynn Kirlin, Jian Wang
    Temporal impulsive noise excision in the range-Doppler map of HF radar. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:835-838 [Conf]
  29. Jian Wang, Kevin W. Bowyer, Thomas A. Sanocki, Sudeep Sarkar
    The Effect of Edge Strength on Object Recognition from Edge Images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1998, pp:45-49 [Conf]
  30. Jian Wang, Lein Harn, Hideki Imai
    Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:191-204 [Conf]
  31. Jian Wang, Ze-Nian Li
    Locale-Based Multiple Cue Algorithm For Object Segmentation. [Citation Graph (0, 0)][DBLP]
    ICME, 2001, pp:- [Conf]
  32. Yanheng Liu, Daxin Tian, Xuegang Yu, Jian Wang
    A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICONIP (3), 2006, pp:201-208 [Conf]
  33. Haiping Lu, Jian Wang, Alex C. Kot, Yun Q. Shi
    An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2002, pp:239-242 [Conf]
  34. Oren Masory, Jian Wang, Hanqi Zhuang
    On the Accuracy of a Stewart Platform - Part II: Kinematic Calibration and Compensation. [Citation Graph (0, 0)][DBLP]
    ICRA (1), 1993, pp:725-731 [Conf]
  35. Jian Wang, Oren Masory
    On the Accuracy of a Stewart Platform Part I: The Effect of Manufacturing Tolerances. [Citation Graph (0, 0)][DBLP]
    ICRA (1), 1993, pp:114-120 [Conf]
  36. Jian Wang, Andreas Krall, M. Anton Ertl, Christine Eisenbeis
    Trace Software Pipelining: A Novel Technique for Parallelization of Loops with Branches. [Citation Graph (0, 0)][DBLP]
    IFIP PACT, 1994, pp:359-362 [Conf]
  37. Jian Wang, Huiqiang Wang, Guo-sheng Zhao
    ERAS - an Emergency Response Algorithm for Survivability of Critical Services. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:97-100 [Conf]
  38. Guo-sheng Zhao, Huiqiang Wang, Jian Wang
    A Novel Quantitative Analysis Method for Network Survivability. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:30-33 [Conf]
  39. Ali Jerbi, Jian Wang, Shahram Shirani
    Error-resilient ROI coding using pre- and post-processing for video sequences. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2004, pp:757-760 [Conf]
  40. Jian Wang, Xuan Zeng, Wei Cai, Charles Chiang, Jiarong Tong, Dian Zhou
    Frequency domain wavelet method with GMRES for large-scale linear circuit simulation. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:321-324 [Conf]
  41. Daxin Tian, Yanheng Liu, Jian Wang
    SLNN: A Neural Network for Fuzzy Neural Network's Structure Learning. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:919-924 [Conf]
  42. Jiangfeng Wang, Feng Gao, Shaoyou Shi, Jian Wang
    A New Method for Distance and Relative Velocity Measurement in Vehicle Collision Warning System. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:1142-1147 [Conf]
  43. Zhengyou Xia, Yichuan Jiang, Jian Wang
    Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:640-641 [Conf]
  44. Jian Wang, Long-yun Kang, Bing-gang Cao
    A New Control Strategy of a Wind Power Generation and Flywheel Energy Storage Combined System. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:1370-1377 [Conf]
  45. Zhen Yang, Jun Guo, Weiran Xu, Xiangfei Nie, Jian Wang, Jianjun Lei
    Multi-scale Support Vector Machine for Regression Estimation. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:1030-1037 [Conf]
  46. Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
    Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:466-474 [Conf]
  47. Bogong Su, Jian Wang
    GURPR*: A New Global Software Pipelining Algorithm. [Citation Graph (0, 0)][DBLP]
    MICRO, 1991, pp:212-216 [Conf]
  48. Bogong Su, Shiyuan Ding, Jian Wang, Jinshi Xia
    Microcode compaction with timing constraints. [Citation Graph (0, 0)][DBLP]
    MICRO, 1987, pp:59-68 [Conf]
  49. Bogong Su, Shiyuan Ding, Jian Wang, Jinshi Xia
    GURPR - a method for global software pipelining. [Citation Graph (0, 0)][DBLP]
    MICRO, 1987, pp:88-96 [Conf]
  50. Bogong Su, Stanley Habib, Wei Zhao, Jian Wang, Youfeng Wu
    A study of pointer aliasing for software pipelining using run-time disambiguation. [Citation Graph (0, 0)][DBLP]
    MICRO, 1994, pp:112-117 [Conf]
  51. Bogong Su, Jian Wang, Zhizhong Tang, Wei Zhao, Yimin Wu
    A software pipelining based VLIW architecture and optimizing compiler. [Citation Graph (0, 0)][DBLP]
    MICRO, 1990, pp:17-27 [Conf]
  52. Bogong Su, Jian Wang, Jinshi Xia
    Global microcode compaction under timing constraints. [Citation Graph (0, 0)][DBLP]
    MICRO, 1988, pp:116-118 [Conf]
  53. Jian Wang, Andreas Krall, M. Anton Ertl, Christine Eisenbeis
    Software pipelining with register allocation and spilling. [Citation Graph (0, 0)][DBLP]
    MICRO, 1994, pp:95-99 [Conf]
  54. Jian Wang, Chang Wen Chen
    A Fast and Effective Block-Matching Error Concealment Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:458-465 [Conf]
  55. Antony I. T. Rowstron, Bem Bradshaw, Dave Cosby, Tim Edmonds, Steve Hodges, Andy Hopper, Steve Lloyd, Jian Wang, Stuart Wray
    The Cambridge University Robot Football Team Description. [Citation Graph (0, 0)][DBLP]
    RoboCup, 1998, pp:422-427 [Conf]
  56. Bogong Su, Jian Wang, Erh-Wen Hu, Joseph Manzano
    Software De-Pipelining Technique. [Citation Graph (0, 0)][DBLP]
    SCAM, 2004, pp:7-16 [Conf]
  57. Jinfeng Fan, Chenxi Shao, Yang Ouyang, Jian Wang, Shaobin Li, Zicai Wang
    Automatic Seizure Detection Based on Support Vector Machines with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:845-852 [Conf]
  58. Jian Wang, Jianjun Lei, Jun Guo, Zhen Yang
    SVM Based Speaker Selection Using GMM Supervector for Rapid Speaker Adaptation. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:617-624 [Conf]
  59. Jian Wang, Bernard J. Schroer, M. Carl Ziemke
    Understanding modular manufacturing in the apparel industry using simulation. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1991, pp:441-447 [Conf]
  60. Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang
    Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:661-664 [Conf]
  61. Huiqiang Wang, Jian Wang, Guo-sheng Zhao
    A Comprehensive Bio-inspired Model for Network Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:119- [Conf]
  62. Jianjun Lei, Jian Wang, Jun Guo, Gang Liu, Haifeng Shen
    Combining Log-Spectral Domain Compensation with MVA Feature Post-Processing for Robust Speech Recognition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:663-668 [Conf]
  63. Eileen Kraemer, Jian Wang, Jinhua Guo, Samuel Hopkins, Jonathan Arnold
    An analysis of gene-finding programs for Neurospora crassa. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2001, v:17, n:10, pp:901-912 [Journal]
  64. Jian Wang, Eileen Kraemer
    GFPE: gene-finding program evaluation. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2003, v:19, n:13, pp:1712-1713 [Journal]
  65. Zhengyou Xia, Jian Wang, Yichuan Jiang
    Design Quality of Security Service Negotiation Protocol. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2005, v:24, n:2, pp:- [Journal]
  66. Beiliang Du, Jian Wang
    Kl, k-factorization of complete bipartite graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2002, v:259, n:1-3, pp:301-306 [Journal]
  67. Jian Wang, Beiliang Du
    Kp, q-factorization of the complete bipartite graph Km, n. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:283, n:1-3, pp:283-287 [Journal]
  68. Jian Wang
    Human-computer interaction research and practice in China. [Citation Graph (0, 0)][DBLP]
    Interactions, 2003, v:10, n:2, pp:88-96 [Journal]
  69. Jian Wang, Yi-Hong Ding, Chia-Chung Sun
    Theoretical mechanistic study on the radical-molecule reactions of cyanomethylidyne with PH3, H2S, and HCl. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2006, v:27, n:14, pp:1756-1764 [Journal]
  70. Lin Jin, Yi-Hong Ding, Jian Wang, Chia-Chung Sun
    Reaction mechanism of the CCN radical with nitric oxide. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2006, v:27, n:7, pp:883-893 [Journal]
  71. Jian Wang, Yi-Hong Ding, Gong-Bing Wu, Chia-Chung Sun
    Gaseous reaction mechanism of C2F radical with water. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2006, v:27, n:3, pp:363-367 [Journal]
  72. Jing Wang, Ximiao He, Jue Ruan, Mingtao Dai, Jie Chen, Yong Zhang, Yafeng Hu, Chen Ye, Shengting Li, Lijuan Cong, Lin Fang, Bin Liu, Songgang Li, Jian Wang, David W. Burt, Gane Ka-Shu Wong, Jun Yu, Huanming Yang, Jun Wang
    ChickVD: a sequence variation database for the chicken genome. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2005, v:33, n:Database-Issue, pp:438-441 [Journal]
  73. Jing Wang, Qingyou Xia, Ximiao He, Mingtao Dai, Jue Ruan, Jie Chen, Guo Yu, Haifeng Yuan, Yafeng Hu, Ruiqiang Li, Tao Feng, Chen Ye, Cheng Lu, Jun Wang, Songgang Li, Gane Ka-Shu Wong, Huanming Yang, Jian Wang, Zhonghuai Xiang, Zeyang Zhou, Jun Yu
    SilkDB: a knowledgebase for silkworm biology and genomics. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2005, v:33, n:Database-Issue, pp:399-402 [Journal]
  74. Wenming Zhao, Jing Wang, Ximiao He, Xiaobing Huang, Yongzhi Jiao, Mingtao Dai, Shulin Wei, Jian Fu, Ye Chen, Xiaoyu Ren, Yong Zhang, Peixiang Ni, Jianguo Zhang, Songgang Li, Jian Wang, Gane Ka-Shu Wong, Hongyu Zhao, Jun Yu, Huanming Yang, Jun Wang
    BGI-RIS: an integrated information resource and comparative analysis workbench for rice genomics. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2004, v:32, n:Database-Issue, pp:377-382 [Journal]
  75. Suhua Chang, Jiajie Zhang, Xiaoyun Liao, Xinxing Zhu, Dahai Wang, Jiang Zhu, Tao Feng, Baoli Zhu, George F. Gao, Jian Wang, Huanming Yang, Jun Yu, Jing Wang
    Influenza Virus Database (IVDB): an integrated information resource and analysis platform for influenza virus research. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2007, v:35, n:Database-Issue, pp:376-380 [Journal]
  76. Jian Wang, Xiangyang Zhu, Masahiro Oya, Chun-Yi Su
    Robust motion tracking control of partially nonholonomic mechanical systems. [Citation Graph (0, 0)][DBLP]
    Robotics and Autonomous Systems, 2006, v:54, n:4, pp:332-341 [Journal]
  77. Wei Yu, Jian Wang
    Scalable network resource management for large scale Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2004, v:12, n:3-4, pp:263-285 [Journal]
  78. Vicki H. Allan, Bogong Su, Pantung Wijaya, Jian Wang
    Foresighted Instruction Scheduling Under Timing Constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:9, pp:1169-1172 [Journal]
  79. Ali Jerbi, Jian Wang, Shahram Shirani
    Error-resilient region-of-interest video coding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:9, pp:1175-1181 [Journal]
  80. Jian Wang, Changyong Niu, Ruimin Shen
    Scheduling Meetings in Distance Learning. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:580-589 [Conf]
  81. Jian Wang, Changyong Niu, Ruimin Shen
    Bandwidth-Aware Scheduling in Media Streaming Under Heterogeneous Bandwidth. [Citation Graph (0, 0)][DBLP]
    CDVE, 2007, pp:242-249 [Conf]
  82. Jian Wang, Xin Li, Lawrence T. Pileggi
    Parameterized Macromodeling for Analog System-Level Design Exploration. [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:940-943 [Conf]
  83. Dan Li, Hai-Yin Xu, Rui Huang, Jian Wang
    Kinematic Inbetweening for Motion Animation. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2007, pp:647-654 [Conf]
  84. Jian Wang, Keqing He, Bing Li, Wei Liu, Rong Peng
    Meta-models of Domain Modeling Framework for Networked Software. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:878-886 [Conf]
  85. Fang Huang, Dingsheng Liu, Peng Liu, Shaogang Wang, Yi Zeng, Guoqing Li, Wenyang Yu, Jian Wang, Lingjun Zhao, Lv Pang
    Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:642-649 [Conf]
  86. Guo-sheng Zhao, Huiqiang Wang, Jian Wang, Linshan Shen
    A Novel Situation Awareness Model for Network Systems' Security. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1077-1084 [Conf]
  87. Jian Wang, Changyong Niu, Ruimin Shen
    Randomized Approach for Target Coverage Scheduling in Directional Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICESS, 2007, pp:379-390 [Conf]
  88. Chunhui Zhang, Jian Wang, Shi Han, Mo Yi, Zhengyou Zhang
    Automatic Real-Time Barcode Localization in Complex Scenes. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:497-500 [Conf]
  89. Shuxiang Guo, Jian Wang, Jian Guo
    A Novel Type of Micropump Using Solenoid Actuator for Biomedical Applications. [Citation Graph (0, 0)][DBLP]
    ICRA, 2007, pp:654-659 [Conf]
  90. Jian Wang, Chun-Yi Su, Masahiro Oya
    Robust Motion Tracking Control of Partially Nonholonomic Mechanical Systems. [Citation Graph (0, 0)][DBLP]
    ICRA, 2004, pp:4608-4613 [Conf]
  91. Quansheng Ren, Jian Wang, Hongling Meng, Jianye Zhao
    An Adaptive Radar Target Signal Processing Scheme Based on AMTI Filter and Chaotic Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:88-95 [Conf]
  92. Jianye Zhao, Quansheng Ren, Jian Wang, Hongling Meng
    A New Approach for Image Restoration Based on CNN Processor. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:821-827 [Conf]
  93. Tingzhang Liu, Xiao Yang, Jian Wang
    Neural Network Inverse Control for Turning Complex Profile of Piston. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:619-627 [Conf]
  94. Shiwei Ma, Zhongjie Liu, Banghua Yang, Jian Wang
    Moving Target Detection and Labeling in Video Sequence Based on Spatial-Temporal Information Fusion. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:795-802 [Conf]
  95. Tinggao Qin, Xiaojin Zhu, Yanchun Chen, Jian Wang
    A Two-Phase Chaotic Neural Network Algorithm for Channel Assignment in Cellular Systems. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:540-550 [Conf]

  96. UBM Based Speaker Selection and Model Re-Estimation for Speaker Adaptation. [Citation Graph (, )][DBLP]


  97. Dynamic semantics of OWL-S in CSP-OZ. [Citation Graph (, )][DBLP]


  98. Large Matrix Multiplication on a Novel Heterogeneous Parallel DSP Architecture. [Citation Graph (, )][DBLP]


  99. Explorations in tag suggestion and query expansion. [Citation Graph (, )][DBLP]


  100. A New Remediation Model Based on Trusted Network. [Citation Graph (, )][DBLP]


  101. An Orthogonal Projection Approach for Blind Beamforming in Multipath CDMA Channels. [Citation Graph (, )][DBLP]


  102. SRAM parametric failure analysis. [Citation Graph (, )][DBLP]


  103. Novel Intelligent Direct Torque Control for Permanent Magnet Synchronous Motor Drive. [Citation Graph (, )][DBLP]


  104. Research on drilling parameters optimization based on case-based reasoning. [Citation Graph (, )][DBLP]


  105. Training fuzzy third-order hidden Markov models for matrix data. [Citation Graph (, )][DBLP]


  106. Study on the consumer satisfaction of agricultural insurance based on fuzzy comprehensive evaluation and Markov chain method. [Citation Graph (, )][DBLP]


  107. XenLoop: a transparent high performance inter-vm network loopback. [Citation Graph (, )][DBLP]


  108. Overcoming Geoinformatic Knowledge Fence: An Exploratory of Intelligent Geospatial Data Preparation within Spatial Analysis. [Citation Graph (, )][DBLP]


  109. Enriching Viewer Options in P2P Media Streaming Applications. [Citation Graph (, )][DBLP]


  110. Concern Oriented Business Process Modeling. [Citation Graph (, )][DBLP]


  111. Binary Sequences with Good Aperiodic Autocorrelations Using Cross-Entropy Method. [Citation Graph (, )][DBLP]


  112. A Discrete Particle Swarm Optimization for Solving Multiple Knapsack Problems. [Citation Graph (, )][DBLP]


  113. Analysis of nonseparable property of multi-valued multi-threshold neuron. [Citation Graph (, )][DBLP]


  114. A CMMS-Based Formal Conceptual Modeling Approach for Team Simulation and Training. [Citation Graph (, )][DBLP]


  115. An Adaptive MO-HGA for Resource-Constrained Transport Task Scheduling. [Citation Graph (, )][DBLP]


  116. Towards Individualized Requirements Specification Evolution for Networked Software Based on Aspect. [Citation Graph (, )][DBLP]


  117. Efficient power network analysis with complete inductive modeling. [Citation Graph (, )][DBLP]


  118. Towards Merging Goal Models of Networked Software. [Citation Graph (, )][DBLP]


  119. Counting ancestors to estimate authority. [Citation Graph (, )][DBLP]


  120. A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game. [Citation Graph (, )][DBLP]


  121. A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation. [Citation Graph (, )][DBLP]


  122. Generating Diagnostic Rules based on Rough-contrast Approach. [Citation Graph (, )][DBLP]


  123. Power analysis of Input-Queued and Crosspoint-Queued crossbar switches. [Citation Graph (, )][DBLP]


  124. Codeword to layer mapping for multiple layers MIMO systems. [Citation Graph (, )][DBLP]


  125. A dynamic priority arbiter for Network-on-Chip. [Citation Graph (, )][DBLP]


  126. An Area-Efficient Design for Modular Inversion in GF(2m). [Citation Graph (, )][DBLP]


  127. A new wavelet based ART network for texture classification. [Citation Graph (, )][DBLP]


  128. Similarity-based matching method for handwriting retrieval. [Citation Graph (, )][DBLP]


  129. Optical Manipulation of Azimuthally Polarized Beam Altered by Phase Plate. [Citation Graph (, )][DBLP]


  130. Focal Pattern of Hyperbolic-Cosine-Gaussian Beam with Optical Vortex. [Citation Graph (, )][DBLP]


  131. One New BRAS Model Based on Trusted Network. [Citation Graph (, )][DBLP]


  132. Combining Domain-Driven Approach with Requirement Assets for Networked Software Requirements Elicitation. [Citation Graph (, )][DBLP]


  133. Software Testing of China's Energy Based onthe Co-integration Model. [Citation Graph (, )][DBLP]


  134. Graphic Sharing Based on XML Technology: Analysis and Web Expression of DXF Graphic. [Citation Graph (, )][DBLP]


  135. Teaching Plan for Assembly Language and Programming: Conditional Directives and Macro Directives. [Citation Graph (, )][DBLP]


  136. Modeling Cascading Failures in Congested Internet. [Citation Graph (, )][DBLP]


  137. Implementing high definition video codec on TI DM6467 SOC. [Citation Graph (, )][DBLP]


  138. Analyzing amplify-and-forward and decode-and-forward cooperative strategies in Wyner's channel model. [Citation Graph (, )][DBLP]


  139. An Efficient Framework to Exploit Frequency Diversity in OFDM: Precoding with Adaptive Subcarrier Selection. [Citation Graph (, )][DBLP]


  140. Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'. [Citation Graph (, )][DBLP]


  141. A Survey on Privacy Preserving Data Mining. [Citation Graph (, )][DBLP]


  142. Mathematical Model for Multi-physical Process Coupling Analysis of Strip Hot Rolling. [Citation Graph (, )][DBLP]


  143. Empirical Analysis of the Market Risk of Chinese Open-Ended Funds Based on GARCH-VaR Models. [Citation Graph (, )][DBLP]


  144. The Algorithm of Track Occupied Identification Base on HMM. [Citation Graph (, )][DBLP]


  145. A Detection Method for Effective Silver Electrode Area of High Voltage Ceramic Capacitor Using Sobel-Zernike Moment Operator. [Citation Graph (, )][DBLP]


  146. Solenoid Actuator-based Novel Type of Micropump. [Citation Graph (, )][DBLP]


  147. A Robust Feature Normalization Algorithm for Automatic Speech Recognition. [Citation Graph (, )][DBLP]


  148. Fault tree analysis in city lifeline system operations and management-theory and application. [Citation Graph (, )][DBLP]


  149. MFI-3: An Enabler for Semantic Interoperation between Enterprise Information Resources. [Citation Graph (, )][DBLP]


  150. Using MPMR to Support Developing Web Service Applications for Enterprises. [Citation Graph (, )][DBLP]


  151. Towards Service-Oriented Semantic Interoperability Based on Connecting Ontologies. [Citation Graph (, )][DBLP]


  152. On Chip Temperature Sensors' Layout for Future Thermal Management. [Citation Graph (, )][DBLP]


  153. Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642. [Citation Graph (, )][DBLP]


  154. The Progress in Modeling Research of Urban Spheres of Influence in China. [Citation Graph (, )][DBLP]


  155. Practice of Game-Theoretical Methods and Panel Data Model in City Environmental Management. [Citation Graph (, )][DBLP]


  156. Analysis of Photovoltaic Charging System Based on MPPT. [Citation Graph (, )][DBLP]


  157. Kinematic modeling and calibration of a Stewart platform. [Citation Graph (, )][DBLP]


  158. Workspace evaluation of Stewart platforms. [Citation Graph (, )][DBLP]


  159. XenLoop: a transparent high performance inter-VM network loopback. [Citation Graph (, )][DBLP]


  160. Reasearch on Regional Differences Between China's Economic Growth and Export Trade Based on the Analysis of a Random Effects Model. [Citation Graph (, )][DBLP]


  161. Panel Data Analyses on FDI and China's Exports: 1995 - 2002. [Citation Graph (, )][DBLP]


  162. Intellectual Property Rights and Science and Technology Innovation in China: Evidence and Theory. [Citation Graph (, )][DBLP]


  163. The Current Key Problems and Potential Solutions for Geosciences Data Sharing in China. [Citation Graph (, )][DBLP]


  164. P5-factorization of complete bipartite graphs. [Citation Graph (, )][DBLP]


  165. Maximum bipartite subgraphs of cubic triangle-free planar graphs. [Citation Graph (, )][DBLP]


  166. Long cycles in 4-connected planar graphs. [Citation Graph (, )][DBLP]


Search in 0.275secs, Finished in 0.286secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002