Search the dblp DataBase
Lei Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Lei Wang , Zhiying Wang , Kui Dai An Approximate Method for Performance Evaluation of Asynchronous Pipeline Rings. [Citation Graph (0, 0)][DBLP ] CIT, 2006, pp:244- [Conf ] Lei Wang , Hongyi Lu , Kui Dai , Zhiying Wang TengYue-1TengYue: In Chinese means jump over.: A High Performance Embedded SoC. [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2004, pp:126-136 [Conf ] Lei Wang , Zhiying Wang , Kui Dai Cycle Period Analysis and Optimization of Timed Circuits. [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2006, pp:502-508 [Conf ] Lv-an Tang , Hongyan Li , Baojun Qiu , Meimei Li , Jianjun Wang , Lei Wang , Bin Zhou , Dongqing Yang , Shiwei Tang WISE: A Prototype for Ontology Driven Development of Web Information Systems. [Citation Graph (0, 0)][DBLP ] APWeb, 2006, pp:1163-1167 [Conf ] Lei Wang , Padmanabhan Krishnan A Framework for Checking Behavioral Compatibility for Component Selection. [Citation Graph (0, 0)][DBLP ] ASWEC, 2006, pp:49-60 [Conf ] Lei Wang , Sandeep K. Gupta , Melvin A. Breuer Modeling and Simulation for Crosstalk Aggravated by Weak-Bridge Defects between On-Chip Interconnects. [Citation Graph (0, 0)][DBLP ] Asian Test Symposium, 2004, pp:440-447 [Conf ] Lei Wang , Waibhav Tembe , Santosh Pande A Framework for Loop Distribution on Limited On-Chip Memory Processors. [Citation Graph (0, 0)][DBLP ] CC, 2000, pp:141-156 [Conf ] Jianfeng Zhan , Gengpu Liu , Lei Wang , Bibo Tu , Yi Jin , Yang Li , Yan Hao , Xuehai Hong , Dan Meng , Ninghui Sun PhoenixG: A Unified Management Framework for Industrial Information Grid. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:489-496 [Conf ] Lei Wang , Beiji Zou , Jiaguang Sun Facial Features Location by Analytic Boosted Cascade Detector. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:959-964 [Conf ] Xiaomin Chen , Mario Szegedy , Lei Wang Optimally Balanced Forward Degree Sequence. [Citation Graph (0, 0)][DBLP ] COCOON, 2005, pp:680-689 [Conf ] Lei Wang , Zhaohui Wu , Mingde Zhao Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2004, pp:148-153 [Conf ] Ying Pan , Lei Wang , Lu Zhang , Bing Xie , Fuqing Yang An Extended Approach to Improving the Semantic Interoperation Among Reuse Repositories. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:89-94 [Conf ] Zhaohui Wu , Lei Wang , Kougen Zheng A Reliable OS Kernel for Smart Sensors. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2004, pp:572-577 [Conf ] Huang-Ju Chen , Jyh-Ming Huang , Lei Wang Efficient and Secure Authentication Protocols for Mobile VoIP Communications. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:122-128 [Conf ] Hui Kong , Lei Wang , Eam Khwang Teoh , Jian-Gang Wang , Ronda Venkateswarlu A Framework of 2D Fisher Discriminant Analysis: Application to Face Recognition with Small Number of Training Samples. [Citation Graph (0, 0)][DBLP ] CVPR (2), 2005, pp:1083-1088 [Conf ] Lei Wang , Kap Luk Chan , Zhihua Zhang Bootstrapping SVM Active Learning by Incorporating Unlabelled Images for Image Retrieval. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2003, pp:629-634 [Conf ] Lei Wang , Béat Hirsbrunner PN-based Security Design for Data Storage. [Citation Graph (0, 0)][DBLP ] Databases and Applications, 2004, pp:299-304 [Conf ] Hongdong Li , Richard I. Hartley , Lei Wang Auto-Calibration of a Compound-Type Omnidirectional Camera. [Citation Graph (0, 0)][DBLP ] DICTA, 2005, pp:26- [Conf ] Wen Gao , Xinyu Liu , Lei Wang , Takashi Nanya A Reconfigurable High Availability Infrastructure in Cluster for Grid. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:576-583 [Conf ] Bhaskar Mukherjee , Lei Wang , Andrea Pacelli A practical approach to modeling skin effect in on-chip interconnects. [Citation Graph (0, 0)][DBLP ] ACM Great Lakes Symposium on VLSI, 2004, pp:266-270 [Conf ] Lei Wang , Michèle Courant A Novel Neural Network Based on Immunity. [Citation Graph (0, 0)][DBLP ] IC-AI, 2002, pp:147-153 [Conf ] Lei Wang , Peiyu Li , Zhaohui Wu , Shangjian Chen A Service Oriented Implementation of Distributed Status Monitoring and Fault Diagnosis Systems. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (1), 2005, pp:568-575 [Conf ] Shuo Wang , Lei Wang Exploiting soft redundancy for error-resilient on-chip memory design. [Citation Graph (0, 0)][DBLP ] ICCAD, 2006, pp:535-540 [Conf ] Lei Wang Error-tolerance memory Microarchitecture via Dynamic Multithreading. [Citation Graph (0, 0)][DBLP ] ICCD, 2005, pp:179-184 [Conf ] Lei Wang , Zhiping P. Chen , Xinhua H. Jiang DNA-Based Algorithm for 0-1 Planning Problem. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2005, pp:733-742 [Conf ] Lei Wang , Yan Gao , Kap Luk Chan , Ping Xue , Wei-Yun Yau Retrieval with Knowledge-driven Kernel Design: An Approach to Improving SVM-Based CBIR with Relevance Feedback. [Citation Graph (0, 0)][DBLP ] ICCV, 2005, pp:1355-1362 [Conf ] Padmanabhan Krishnan , Lai Wang Supporting Partial Component Matching. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:294-303 [Conf ] Lei Wang , Licheng Jiao An Immune Neural Network Used for Classification. [Citation Graph (0, 0)][DBLP ] ICDM, 2001, pp:657-658 [Conf ] Lei Wang , Padmanabhan Krishnan An Approach to Provisioning E-Commerce Applications with Commercial Components. [Citation Graph (0, 0)][DBLP ] ICEBE, 2006, pp:323-330 [Conf ] Lei Wang , Zhiping P. Chen , Xinhua H. Jiang Ringed Petersen Spheres Connected Hypercube Interconnection Networks. [Citation Graph (0, 0)][DBLP ] ICECCS, 2005, pp:127-131 [Conf ] Guoqing Yang , Minde Zhao , Lei Wang , Zhaohui Wu An OSEK COM Compliant Communication Model for Smart Vehicle Environment. [Citation Graph (0, 0)][DBLP ] ICESS, 2005, pp:430-440 [Conf ] Mingde Zhao , Zhaohui Wu , Guoqing Yang , Lei Wang , Wei Chen SmartOSEK: A Real-Time Operating System for Automotive Electronics. [Citation Graph (0, 0)][DBLP ] ICESS, 2004, pp:437-442 [Conf ] Lei Wang , Hongbing Ji , Xinbo Gao Image Segmentation by a Robust Clustering Algorithm Using Gaussian Estimator. [Citation Graph (0, 0)][DBLP ] ICIAR (1), 2004, pp:74-81 [Conf ] Xin Yuan , Lei Wang , Miaoliang Zhu Car Plate Localization Using Modified PCNN in Complicated Environment. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2006, pp:1116-1124 [Conf ] Xuchun Li , Lei Wang , Eric Sung Multi-label SVM active learning for image classification. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2207-2210 [Conf ] Lei Wang , James J. Clark Active Shape and Depth Extraction from Shadow Images. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1994, pp:550-553 [Conf ] Lei Wang , Kap Luk Chan , Yap Peng Tan Image retrieval with SVM active learning embedding Euclidean search. [Citation Graph (0, 0)][DBLP ] ICIP (1), 2003, pp:725-728 [Conf ] Lei Wang , Xu Liu , Steve Lin , Guangyou Xu , Heung-Yeung Shum Generic slow-motion replay detection in sports video. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:1585-1588 [Conf ] Lei Wang , Xu Liu , Lirong Xia , Guangyou Xu , Alfred M. Bruckstein Image orientation detection with integrated human perception cues (or which way is up). [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:539-542 [Conf ] Lei Wang , B. S. Manjunath A semantic representation for image retrieval. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:523-526 [Conf ] Hai Gao , Xiao-Dong Yu , Lei Wang , Ping Xue , Qi Tian Robust multi-level video representation using mean shift analysis. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:627-630 [Conf ] Yujun Zhang , Maoqing Lin , Fengfu Li , Lei Wang , Zhenhao Jin Synthesis and Characteration of Phenolic Resin/Montmorillonite Nanocomposites. [Citation Graph (0, 0)][DBLP ] ICMENS, 2004, pp:144-147 [Conf ] Chao-Xue Wang , Du-Wu Cui , Lei Wang , Zhu-Rong Wang A Novel Genetic Algorithm Based on Cure Mechanism of Traditional Chinese Medicine. [Citation Graph (0, 0)][DBLP ] ICNC (3), 2005, pp:86-92 [Conf ] Lei Wang , Yinling Nie , Weike Nie , Licheng Jiao Artificial Immune Strategies Improve the Security of Data Storage. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2005, pp:839-848 [Conf ] Liya Wang , Lei Wang , Yinling Nie A Novel Artificial Immune Network Model and Analysis on Its Dynamic Behavior and Stabilities. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2006, pp:83-91 [Conf ] Aize Cao , Qing Song , XuLei Yang , Lei Wang Breast Mass Segmentation based on Information Theory. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2004, pp:758-761 [Conf ] Lei Wang , Hongdong Li , Richard I. Hartley Video Local Pattern based Image Matching for Visual Mapping. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2006, pp:67-70 [Conf ] Lei Wang , Ping Xue , Kap Luk Chan Incorporating Prior Knowledge into SVM for Image Retrieval. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2004, pp:981-984 [Conf ] Yiming Wu , Kap Luk Chan , Lei Wang Face Recognition Based on Discriminative Manifold Learning. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2004, pp:171-174 [Conf ] Lei Wang , Kap Luk Chan Bayesian Learning for Image Retrieval Using Multiple Features. [Citation Graph (0, 0)][DBLP ] IDEAL, 2000, pp:473-478 [Conf ] Roxana Diaconescu , Lei Wang , Zachary Mouri , Matt Chu A Compiler and Runtime Infrastructure for Automatic Program Distribution. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Zhi-Hong Zhang , Dan Meng , Jianfeng Zhan , Lei Wang , Linping Wu , Huang Wei Easy and reliable cluster management: the self-management experience of Fire Phoenix. [Citation Graph (0, 0)][DBLP ] IPDPS, 2006, pp:- [Conf ] Lars S. Nyland , Jan Prins , Ru Huai Yun , Jan Hermans , Hye-Chung Kum , Lei Wang Modeling Dynamic Load Balancing in Molecular Dynamics to Achieve Scalable Parallel Execution. [Citation Graph (0, 0)][DBLP ] IRREGULAR, 1998, pp:356-365 [Conf ] Lei Wang An energy-efficient skew compensation technique for high-speed skew-sensitive signaling. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2005, pp:1658-1661 [Conf ] Lei Wang , Sherif H. K. Embabi Low voltage 2-path SC bandpass /spl Delta//spl Sigma/ modulator without bootstrapper. [Citation Graph (0, 0)][DBLP ] ISCAS (1), 2003, pp:933-936 [Conf ] Lei Wang , Naresh R. Shanbhag Noise-tolerant dynamic circuit design. [Citation Graph (0, 0)][DBLP ] ISCAS (1), 1999, pp:549-552 [Conf ] Lei Wang , Mingde Zhao , Zengwei Zheng , Zhaohui Wu Exact Best-Case End-to-End Response Time Analysis for Hard Real-Time Distributed Systems. [Citation Graph (0, 0)][DBLP ] ISCIS, 2005, pp:173-182 [Conf ] Kong-Aik Lee , Hanwu Sun , Rong Tong , Bin Ma , Minghui Dong , Changhuai You , Donglai Zhu , Chin-Wei Eugene Koh , Lei Wang , Tomi Kinnunen , Chng Eng Siong , Haizhou Li The IIR Submission to CSLP 2006 Speaker Recognition Evaluation. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:494-505 [Conf ] Haihong Liu , Xiaoyuan Wang , Derong Tan , Lei Wang Study on Traffic Information Fusion Algorithm Based on Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ISDA (1), 2006, pp:183-187 [Conf ] Lei Wang , Naresh R. Shanbhag Low-power AEC-based MIMO signal processing for gigabit ethernet 1000Base-T transceivers. [Citation Graph (0, 0)][DBLP ] ISLPED, 2001, pp:334-339 [Conf ] Shuo Wang , Lei Wang Thread-associative memory for multicore and multithreaded computing. [Citation Graph (0, 0)][DBLP ] ISLPED, 2006, pp:139-142 [Conf ] Peng Fu , Deyun Zhang , Lei Wang , Zhongxing Duan Intelligent Hierarchical Intrusion Detection System for Secure Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2005, pp:482-487 [Conf ] Wenwei Li , Dafang Zhang , Jinmin Yang , Gaogang Xie , Lei Wang A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2006, pp:184-189 [Conf ] Lei Wang , Yong Yang , Shixin Sun A New Approach of Network Intrusion Detection Using HVDM-Based SOM. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2005, pp:488-493 [Conf ] Lei Wang , Yinling Nie , Weike Nie , Licheng Jiao A Novel Classifier with the Immune-Training Based Wavelet Neural Network. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2005, pp:8-13 [Conf ] Lei Wang , Yinling Nie , Weike Nie , Licheng Jiao A Novel Model of Artificial Immune Network and Simulations on Its Dynamics. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2006, pp:909-914 [Conf ] Latifur Khan , Lei Wang Object Detection for Hierarchical Image Classification. [Citation Graph (0, 0)][DBLP ] Revised Papers from MDM/KDD and PAKDD/KDMCD, 2002, pp:36-49 [Conf ] Lei Wang , Latifur Khan , Casey Breen Object Boundary Detection For Ontology-Based Image Classification. [Citation Graph (0, 0)][DBLP ] MDM/KDD, 2002, pp:51-61 [Conf ] Lei Wang , Santosh Pande Data I/O Minimization for Loops on Limited Onchip Memory Processors. [Citation Graph (0, 0)][DBLP ] LCPC, 1999, pp:472-476 [Conf ] Lei Wang , Carl McCrosky Performance Comparison of Control Schemes for ABR Service in ATM LANs. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1997, pp:205-212 [Conf ] Lei Wang , Michael Lew , Guangyou Xu Offense based temporal segmentation for event detection in soccer video. [Citation Graph (0, 0)][DBLP ] Multimedia Information Retrieval, 2004, pp:259-266 [Conf ] Latifur Khan , Lei Wang Automatic Ontology Derivation Using Clustering for Image Classification. [Citation Graph (0, 0)][DBLP ] Multimedia Information Systems, 2002, pp:56-65 [Conf ] Yohan Jin , Lei Wang , Latifur Khan Improving Image Annotations Using WordNet. [Citation Graph (0, 0)][DBLP ] Multimedia Information Systems, 2005, pp:115-130 [Conf ] Yohan Jin , Latifur Khan , Lei Wang , Mamoun Awad Image annotations by combining multiple evidence & wordNet. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2005, pp:706-715 [Conf ] Lei Wang , Xuchun Li , Ping Xue , Kap Luk Chan A novel framework for SVM-based image retrieval on large databases. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2005, pp:487-490 [Conf ] Lei Wang , Li Liu , Latifur Khan Automatic image annotation and retrieval using subspace clustering algorithm. [Citation Graph (0, 0)][DBLP ] MMDB, 2004, pp:100-108 [Conf ] Xiao-Dong Yu , Lei Wang , Qi Tian , Ping Xue Multi-Level Video Representation with Application to Keyframe Extraction. [Citation Graph (0, 0)][DBLP ] MMM, 2004, pp:117-123 [Conf ] Bibo Tu , Ming Zou , Jianfeng Zhan , Lei Wang , Jianping Fan Design Patterns of Scalable Cluster System Software. [Citation Graph (0, 0)][DBLP ] PDCAT, 2006, pp:415-420 [Conf ] Ming Guo , Lei Wang , Xin Yuan Car Plate Localization Using Pulse Coupled Neural Network in Complicated Environment. [Citation Graph (0, 0)][DBLP ] PRICAI, 2006, pp:1206-1210 [Conf ] Wei Li , Lei Wang Real-Time Solution in Petroleum Industry's Cyber Data Acquisition Simulation System. [Citation Graph (0, 0)][DBLP ] RTCSA, 2005, pp:369-372 [Conf ] Lei Wang , Zhaohui Wu , Mingde Zhao , Guoqing Yang Fault Tolerant Scheduling for Fixed-Priority Tasks with Preemption Threshold. [Citation Graph (0, 0)][DBLP ] RTCSA, 2005, pp:220-225 [Conf ] Lei Wang , Xikun Sun Escape analysis for synchronization removal. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1419-1423 [Conf ] Lei Wang , Mingde Zhao , Zengwei Zheng , Zhaohui Wu End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed Systems. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2005, pp:233-245 [Conf ] Lei Wang , Daniela Mehandjiska-Stavreva An Initial Framework for Collaboration-Based Component Selection. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2004, pp:799-806 [Conf ] Ying Pan , Lei Wang , Lu Zhang , Bing Xie , Fuqing Yang Relevancy based semantic interoperation of reuse repositories. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 2004, pp:211-220 [Conf ] Lei Wang , Yaping Lin , Minsheng Tan , Chunyi Shi Research on Pairwise Key Establishment Model and Algorithm for Sensor Networks. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:883-892 [Conf ] Shahdad Irajpour , Shahin Nazarian , Lei Wang , Sandeep K. Gupta , Melvin A. Breuer Analyzing Crosstalk in the Presence of Weak Bridge Defects. [Citation Graph (0, 0)][DBLP ] VTS, 2003, pp:385-392 [Conf ] Lei Wang , Z. Zuo , Yunshi Xiao , Q. Wu The Research of Complex System Modeling Based on Fractal Conception. [Citation Graph (0, 0)][DBLP ] WAA, 2003, pp:171-176 [Conf ] Lei Wang , James R. Cordy , Thomas R. Dean Enhancing Security Using Legality Assertions. [Citation Graph (0, 0)][DBLP ] WCRE, 2005, pp:35-44 [Conf ] Jie Yang , Lei Wang , Song Zhang , Xin Sui , Ning Zhang 0003 , Zhuoqun Xu Building Domain Ontology Based on Web Data and Generic Ontology. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:686-689 [Conf ] Ning Zhang 0003 , Song Zhang , Lei Wang , Jie Yang , Zhuoqun Xu Offer Group Generation and Delayed Processing in Multi-Issue Negotiation. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:702-705 [Conf ] Shi An , Lei Wang , He Huang Analysis on Appearance Reasons of the Positive Feedback Traders. [Citation Graph (0, 0)][DBLP ] ICICIC (2), 2006, pp:478-482 [Conf ] James J. Clark , Lei Wang Active Shape-from-Shadows with Controlled Illuminant Trajectories. [Citation Graph (0, 0)][DBLP ] International Journal of Computer Vision, 2001, v:43, n:3, pp:141-166 [Journal ] Lei Wang , Kap Luk Chan , Xuejian Xiong A Sub-Vector Weighting Scheme for Image Retrieval with Relevance Feedback. [Citation Graph (0, 0)][DBLP ] Int. J. Image Graphics, 2002, v:2, n:2, pp:199-213 [Journal ] Yueming Lu , Qian Depei , Xu Bin , Lei Wang Active Network Supports for Mobile IP. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2001, v:16, n:6, pp:544-551 [Journal ] Yantai Shu , Guang-Hong Wang , Lei Wang , Oliver W. W. Yang , Yong-Jie Fan Provisioning QoS Guarantee by Multipath Routing and Reservation in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2004, v:19, n:2, pp:128-137 [Journal ] Lars S. Nyland , Jan Prins , Ru Huai Yun , Jan Hermans , Hye-Chung Kum , Lei Wang Achieving Scalable Parallel Molecular Dynamics Using Dynamic Spatial Domain Decomposition Techniques. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1997, v:47, n:2, pp:125-138 [Journal ] Lei Wang , Latifur Khan Automatic image annotation and retrieval using weighted feature selection. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2006, v:29, n:1, pp:55-71 [Journal ] Hui Kong , Lei Wang , Eam Khwang Teoh , Xuchun Li , Jian-Gang Wang , Ronda Venkateswarlu Generalized 2D principal component analysis for face image representation and recognition. [Citation Graph (0, 0)][DBLP ] Neural Networks, 2005, v:18, n:5-6, pp:585-594 [Journal ] Lei Wang , Kap Luk Chan A Dynamic Sub-vector Weighting Scheme for Image Retrieval with Relevance Feedback. [Citation Graph (0, 0)][DBLP ] Pattern Anal. Appl., 2003, v:6, n:3, pp:212-223 [Journal ] Lei Wang , Sing Bing Kang , Heung-Yeung Shum , Guangyou Xu Error Analysis of Pure Rotation-Based Self-Calibration. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2004, v:26, n:2, pp:275-280 [Journal ] Lei Wang , Carl McCrosky An Approximate Solution for Queuing Network Models of a Burst-Level Traffic Control Scheme in ATM WAN. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 1998, v:34, n:3, pp:125-145 [Journal ] Lei Wang , Jun Liu , Stan Z. Li MRF parameter estimation by MCMC method. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2000, v:33, n:11, pp:1919-1925 [Journal ] Lei Wang , Jun Liu Texture segmentation based on MRMRF modeling. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2000, v:21, n:2, pp:189-200 [Journal ] Lei Wang , Jun Liu Texture classification using multiresolution Markov random field models. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1999, v:20, n:2, pp:171-182 [Journal ] Chi Wa Leong , Weihua Zhuang , Yu Cheng , Lei Wang Call admission control for integrated on/off voice and best-effort data services in mobile cellular communications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2004, v:52, n:5, pp:778-790 [Journal ] Licheng Jiao , Lei Wang A novel genetic algorithm based on immunity. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2000, v:30, n:5, pp:552-561 [Journal ] Lei Wang , Kap Luk Chan , Ping Xue A criterion for optimizing kernel parameters in KBDA for image retrieval. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:3, pp:556-562 [Journal ] Xiao-Dong Yu , Lei Wang , Qi Tian , Ping Xue A novel multi-resolution video representation scheme based on kernel PCA. [Citation Graph (0, 0)][DBLP ] The Visual Computer, 2006, v:22, n:5, pp:357-370 [Journal ] Yong Li , Lei Wang , Rui Gong , Kui Dai , Zhiying Wang Research and Implementation of a 32-Bit Asynchronous Multiplier. [Citation Graph (0, 0)][DBLP ] Journal of Computer Research and Development, 2006, v:43, n:12, pp:2152-2157 [Journal ] Lei Wang Feature Subset Selection for Multi-class SVM Based Image Classification. [Citation Graph (0, 0)][DBLP ] ACCV (2), 2007, pp:145-154 [Conf ] Yuhang Zhang , Lei Wang , Richard I. Hartley , Hongdong Li Where's the Weet-Bix? [Citation Graph (0, 0)][DBLP ] ACCV (1), 2007, pp:800-810 [Conf ] Peifeng Li , Qiaoming Zhu , Lei Wang Recognizing Chinese Proper Nouns with Transformation-Based Learning and Ontology. [Citation Graph (0, 0)][DBLP ] AI*IA, 2007, pp:822-830 [Conf ] Gang Jin , Lei Wang , Zhiying Wang , Kui Dai An Optimal Design Method for De-synchronous Circuit Based on Control Graph. [Citation Graph (0, 0)][DBLP ] APPT, 2007, pp:70-79 [Conf ] Lei Wang Toward A Discriminative Codebook: Codeword Selection across Multi-resolution. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Feng-ying Xie , Zhi-guo Jiang , Lei Wang Skew Detection Algorithm for Form Document Based on Elongate Feature. [Citation Graph (0, 0)][DBLP ] EMMCVPR, 2007, pp:127-136 [Conf ] Yu Sasaki , Lei Wang , Kazuo Ohta , Noboru Kunihiro New Message Difference for MD4. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:329-348 [Conf ] Kun Huang , Lie Wang , Dafang Zhang , Yongwei Liu A Dynamic Quota-Based Peer Selection Strategy in BitTorrent. [Citation Graph (0, 0)][DBLP ] GCC, 2007, pp:267-274 [Conf ] Xiyang Liu , Lei Wang , Xiubin Zhu , Zhiwen Bai , Miao Zhang , Hehui Liu Fitness calculation approach for nested if-else construct in evolutionary testing. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:1141- [Conf ] Manoj Pandey , Roger Pack , Lei Wang , Qiuyi Duan , Daniel Zappala To Repair or Not To Repair: Helping Ad-hoc Routing Protocols to Distinguish Mobility from Congestion. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:2311-2315 [Conf ] Lei Wang , Junyan Ren , Wenjing Yin , Tingqian Chen , Jun Xu A High-Speed High-Resolution Low-Distortion CMOS Bootstrapped Switch. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:1721-1724 [Conf ] Lei Wang , Shuo Wang Adaptive timing for analysis of skew tolerance. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Lei Wang , N. Patel Reducing error accumulation effect in multithreaded memory systems. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Chunyu Zhao , Qinglei Chi , Lei Wang , Bangchun Wen A Model Predictive Control of a Grain Dryer with Four Stages Based on Recurrent Fuzzy Neural Network. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2007, pp:29-37 [Conf ] Lei Wang , Huading Jia , Shixin Sun A Fast and Accurate Progressive Algorithm for Training Transductive SVMs. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2007, pp:497-505 [Conf ] Ming Wen , Lu Wang , Lei Wang , Qing Zhuo , Wenyuan Wang Object Class Recognition Using SNoW with a Part Vocabulary. [Citation Graph (0, 0)][DBLP ] RSFDGrC, 2007, pp:526-533 [Conf ] Lei Wang , Haowei Shen , Zhe Chen , Yaping Lin Voronoi Tessellation Based Rapid Coverage Decision Algorithm for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] UIC, 2007, pp:495-502 [Conf ] Lei Wang , Shixin Sun , Kai Zhang A fast approximate algorithm for training L1 -SVMs in primal space. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2007, v:70, n:7-9, pp:1554-1560 [Journal ] Lei Wang , José Pineda de Gyvez , Edgar Sánchez-Sinencio Time multiplexed color image processing based on a CNN with cell-state outputs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 1998, v:6, n:2, pp:314-322 [Journal ] Lei Wang , Naresh R. Shanbhag Energy-efficiency bounds for deep submicron VLSI systems in the presence of noise. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2003, v:11, n:2, pp:254-269 [Journal ] Lei Wang , Naresh R. Shanbhag Low-power MIMO signal processing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. VLSI Syst., 2003, v:11, n:3, pp:434-445 [Journal ] Trust Mechanism in Distributed Access Control Model of P2P Networks. [Citation Graph (, )][DBLP ] Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Accelerating Linpack Performance with Mixed Precision Algorithm on CPU+GPGPU Heterogeneous Cluster. [Citation Graph (, )][DBLP ] A pharmacogenomic study on the polymorphic gene response to risperidone in schizophrenia patients. [Citation Graph (, )][DBLP ] Efficient Spectral Feature Selection with Minimum Redundancy. [Citation Graph (, )][DBLP ] A Scalable Algorithm for Learning a Mahalanobis Distance Metric. [Citation Graph (, )][DBLP ] Function Call Flow based Fitness Function Design in Evolutionary Testing. [Citation Graph (, )][DBLP ] Preimages for Step-Reduced SHA-2. [Citation Graph (, )][DBLP ] How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! [Citation Graph (, )][DBLP ] An Efficient Algorithm for the Longest Pattern Subsequence Problem. [Citation Graph (, )][DBLP ] A portable parallel finite element simulation system. [Citation Graph (, )][DBLP ] Detecting and Eliminating Potential Violations of Sequential Consistency for Concurrent C/C++ Programs. [Citation Graph (, )][DBLP ] An adaptive task creation strategy for work-stealing scheduling. [Citation Graph (, )][DBLP ] Achieving both high precision and high recall in near-duplicate detection. [Citation Graph (, )][DBLP ] An efficient clustering algorithm for large-scale topical web pages. [Citation Graph (, )][DBLP ] The Representation of Chinese Semantic Knowledge and its Application in the Document Copy Detection. [Citation Graph (, )][DBLP ] A layered design methodology of cluster system stack. [Citation Graph (, )][DBLP ] Long-Haul Transmission Performance in the Internet. [Citation Graph (, )][DBLP ] Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. [Citation Graph (, )][DBLP ] A Study of Side-Channel Effects in Reliability-Enhancing Techniques. [Citation Graph (, )][DBLP ] Multi-view Human Motion Capture with an Improved Deformation Skin Model. [Citation Graph (, )][DBLP ] Learning Cascaded Reduced-Set SVMs Using Linear Programming. [Citation Graph (, )][DBLP ] Handling Significant Scale Difference for Object Retrieval in a Supermarket. [Citation Graph (, )][DBLP ] Precise request tracing and performance debugging for multi-tier services of black boxes. [Citation Graph (, )][DBLP ] A Fast Algorithm for Creating a Compact and Discriminative Visual Codebook. [Citation Graph (, )][DBLP ] Fast Multi-labelling for Stereo Matching. [Citation Graph (, )][DBLP ] New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (, )][DBLP ] Approximability of Combinatorial Problems with Multi-agent Submodular Cost Functions. [Citation Graph (, )][DBLP ] Finding Preimages of Tiger Up to 23 Steps. [Citation Graph (, )][DBLP ] Feature Extraction Based on the Independent Component Analysis for Text Classification. [Citation Graph (, )][DBLP ] Hailstone Detection Based on Image Mining. [Citation Graph (, )][DBLP ] MU-MAQAS: A P2P based Model Updatable Mobile Automatic Q/A System. [Citation Graph (, )][DBLP ] A New Text Feature Conversion Method for Text Classification. [Citation Graph (, )][DBLP ] Online Constrained Pattern Detection over Streams. [Citation Graph (, )][DBLP ] SVM Model Based on Signal Transformation and its Applications in Oil Water-Flooded Identification. [Citation Graph (, )][DBLP ] Fuzzy Control Strategy of Sub-mini Underwater Robots in Rectifying Control. [Citation Graph (, )][DBLP ] Survey on game-theoretic information fusion. [Citation Graph (, )][DBLP ] Association based immune network for multimodal function optimization. [Citation Graph (, )][DBLP ] Manufacturing yield of QCA circuits by synthesized DNA self-assembled templates. [Citation Graph (, )][DBLP ] Noise-Aware Wavelength Assignment for Wavelength Switched Optical Networks. [Citation Graph (, )][DBLP ] Joint Performance Improvement and Error Tolerance for Memory Design Based on Soft Indexing. [Citation Graph (, )][DBLP ] Making register file resistant to power analysis attacks. [Citation Graph (, )][DBLP ] The Finite Element Analysis Based on ANSYS Pressure-Sensitive Conductive Rubber Three-Dimensional Tactile Sensor. [Citation Graph (, )][DBLP ] Background Subtraction using Incremental Subspace Learning. [Citation Graph (, )][DBLP ] Lossy to lossless image compression based on reversible integer DCT. [Citation Graph (, )][DBLP ] 3D medical image compression based on multiplierless low-complexity RKLT and shape-adaptive wavelet transform. [Citation Graph (, )][DBLP ] A Vector-Based Approach to Broadcast Audio Database Indexing and Retrieval. [Citation Graph (, )][DBLP ] Body Detection and Tracking with Hierarchical Scheme in Dynamic Scenes. [Citation Graph (, )][DBLP ] Query by humming via multiscale transportation distance in random query occurrence context. [Citation Graph (, )][DBLP ] Parallel particle filter algorithm in face tracking. [Citation Graph (, )][DBLP ] Efficient sparse self-similarity matrix construction for repeating sequence detection. [Citation Graph (, )][DBLP ] Fast face tracking using parallel particle filter algorithm. [Citation Graph (, )][DBLP ] A new parallel video understanding and retrieval system. [Citation Graph (, )][DBLP ] Parallel face analysis platform. [Citation Graph (, )][DBLP ] Illumination invariant sequential filtering human tracking. [Citation Graph (, )][DBLP ] An integration text extraction approach in video frame. [Citation Graph (, )][DBLP ] Design of a soil erosion prediction information system for Daqinghe Basin. [Citation Graph (, )][DBLP ] Simulation of energy and carbon fluxes over a typical cropland during the summer maize growing in the Yellow River irrigation region by use of SIB2. [Citation Graph (, )][DBLP ] The Application of Non-linear Regression Method to the Functional Connectivity during the Encoding and the Retrieval of Chinese Semantic Memory. [Citation Graph (, )][DBLP ] Fault Diagnosis of Regenerative Water Heater Based-On Multi-class Support Vector Machines. [Citation Graph (, )][DBLP ] A Symmetric Orthogonal FastICA Algorithm and Applications in EEG. [Citation Graph (, )][DBLP ] Comparative Study on Bionic Optimization Algorithms for Sewer Optimal Design. [Citation Graph (, )][DBLP ] Knowledge Points Organization Model based on AND/OR Graph in ICAI. [Citation Graph (, )][DBLP ] The study of norm vacuum for duplex pressure condenser based on support vector regression and genetic algorithm. [Citation Graph (, )][DBLP ] Automatic Partitioning of Object-Oriented Programs for Resource-Constrained Mobile Devices with Multiple Distribution Objectives. [Citation Graph (, )][DBLP ] Exploiting idle register classes for fast spill destination. [Citation Graph (, )][DBLP ] Linux kernels as complex networks: A novel method to study evolution. [Citation Graph (, )][DBLP ] A turbo codes optimization method using particle swarm algorithm. [Citation Graph (, )][DBLP ] Design of error-tolerant cache memory for multithreaded computing. [Citation Graph (, )][DBLP ] Programmable threshold voltage using quantum dot transistors for low-power mobile computing. [Citation Graph (, )][DBLP ] P2P Recommendation Trust Model. [Citation Graph (, )][DBLP ] Way-tagged cache: an energy-efficient L2 cache architecture under write-through policy. [Citation Graph (, )][DBLP ] Chaos Control of Lorenz System Using Small Gain Theorem. [Citation Graph (, )][DBLP ] Synchronization between Two Different Hyperchaotic Dynamical Systems Using Nonlinear Control. [Citation Graph (, )][DBLP ] Selective Ensemble Algorithms of Support Vector Machines Based on Constraint Projection. [Citation Graph (, )][DBLP ] Research and Application to Automatic Indexing. [Citation Graph (, )][DBLP ] Bit-Free Collision: Application to APOP Attack. [Citation Graph (, )][DBLP ] Concepts for Efficient and Reliable Multi-modal Breast Image Reading. [Citation Graph (, )][DBLP ] Regularized Discriminative Direction for Shape Difference Analysis. [Citation Graph (, )][DBLP ] Hippocampal Shape Classification Using Redundancy Constrained Feature Selection. [Citation Graph (, )][DBLP ] PSDBoost: Matrix-Generation Linear Programming for Positive Semidefinite Matrices Learning. [Citation Graph (, )][DBLP ] Discovering Prediction Model for Environmental Distribution Maps. [Citation Graph (, )][DBLP ] A Platform Implementation for Real Time Image Processing. [Citation Graph (, )][DBLP ] Adaptive Energy Diffusion for Blind Inverse Halftoning. [Citation Graph (, )][DBLP ] LiveBT: Providing Video-on-Demand Streaming Service over BitTorrent Systems. [Citation Graph (, )][DBLP ] Grid Unit: A Self-Managing Building Block for Grid System. [Citation Graph (, )][DBLP ] A Lightweight Sensor Network Management System Design. [Citation Graph (, )][DBLP ] Two Natural Heuristics for 3D Packing with Practical Loading Constraints. [Citation Graph (, )][DBLP ] An audio wiki supporting mobile collaboration. [Citation Graph (, )][DBLP ] The design methodology of Phoenix cluster system software stack. [Citation Graph (, )][DBLP ] In cloud, do MTC or HTC service providers benefit from the economies of scale? [Citation Graph (, )][DBLP ] Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. [Citation Graph (, )][DBLP ] The Design and Optimization of H.264 Encoder Based on the Nexperia Platform. [Citation Graph (, )][DBLP ] Eliminating Redundant Communication of Code Generation for Distributed Memory Machines. [Citation Graph (, )][DBLP ] Issues in managing image and video data. [Citation Graph (, )][DBLP ] Guided Informative Image Partitioning. [Citation Graph (, )][DBLP ] Research on Enterprise Track of TREC 2008. [Citation Graph (, )][DBLP ] Clustering and Visualizing Audiovisual Dataset on Mobile Devices in a Topic-Oriented Manner. [Citation Graph (, )][DBLP ] PASE: A Prototype for Ad-hoc Process-Aware Information System Declaratively Constructing Environment. [Citation Graph (, )][DBLP ] An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification. [Citation Graph (, )][DBLP ] Efficiency, Fairness and Competitiveness in Nash Bargaining Games. [Citation Graph (, )][DBLP ] Continuity Properties of Equilibria in Some Fisher and Arrow-Debreu Market Models. [Citation Graph (, )][DBLP ] Key Distribution for Group-based Sensor Deployment Using a Novel Interconnection Graph. [Citation Graph (, )][DBLP ] Link quality prediction for wireless devices with multiple radios. [Citation Graph (, )][DBLP ] Multi-path GEM for Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Robust Closed-Loop Control Algorithm for Mean Arterial Blood Pressure Regulation. [Citation Graph (, )][DBLP ] An Evaluation Method Based on Combinatorial Judgement Matrix. [Citation Graph (, )][DBLP ] Supplier Selection Based on Rough Sets and Analytic Hierarchy Process. [Citation Graph (, )][DBLP ] Joint Multiuser Precoding and Scheduling with Imperfect Channel State Information at the Transmitter. [Citation Graph (, )][DBLP ] Recursive partitioning multicast: A bandwidth-efficient routing for Networks-on-Chip. [Citation Graph (, )][DBLP ] An evolutionary algorithm with population immunity and its application on autonomous robot control. [Citation Graph (, )][DBLP ] Spectrum sensing for cognitive OFDM system using free probability theory. [Citation Graph (, )][DBLP ] SMAC-based proportional fairness backoff scheme in wireless sensor networks. [Citation Graph (, )][DBLP ] Improved cooperative spectrum sensing for cognitive radio under bandwidth constraints. [Citation Graph (, )][DBLP ] A calibration scheme based on pool adjacent violators for localization in wireless sensor networks. [Citation Graph (, )][DBLP ] Lattice-Based Artificial Endocrine System. [Citation Graph (, )][DBLP ] Virtual Burst Assembly - A Solution to Out-of-Sequence Delivery in Optical Burst Switching Networks. [Citation Graph (, )][DBLP ] A Hybrid Control Architecture for Connection Management in Translucent WDM Networks. [Citation Graph (, )][DBLP ] Parameter Setting and 2-D Stability Conditions for TCP/RED Networks. [Citation Graph (, )][DBLP ] Cooperative Spectrum Sensing Using Free Probability Theory. [Citation Graph (, )][DBLP ] Using Description Logics Reasoner for Ontology Matching. [Citation Graph (, )][DBLP ] A Pattern Matching Algorithm in P2P Mobile QA System Answer Extracting Process. [Citation Graph (, )][DBLP ] Mining and Visualizing Multimedia Dataset on Mobile Devices in a Topic-oriented Manner. [Citation Graph (, )][DBLP ] Kapa: A File Sharing System Based on HP2P. [Citation Graph (, )][DBLP ] MM-Correction: Meta-analysis-Based Multiple Hypotheses Correction in Omic Studies. [Citation Graph (, )][DBLP ] Context-aware application programming for mobile devices. [Citation Graph (, )][DBLP ] Research on the Clustering and Composition of P2P-Based Web Services. [Citation Graph (, )][DBLP ] Layer Key Management Scheme on Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. [Citation Graph (, )][DBLP ] Data Compression Algorithm Based on Hierarchical Cluster Model for Sensor Networks. [Citation Graph (, )][DBLP ] NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] The Algorithm of Obtaining Best Rules Based on Rough Set. [Citation Graph (, )][DBLP ] Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks. [Citation Graph (, )][DBLP ] Planning and Control of Biped Walking along Curved Paths on Unknown and Uneven Terrain. [Citation Graph (, )][DBLP ] An AIS-Based Service Match Model. [Citation Graph (, )][DBLP ] A Performance Model for Domino Mail Server. [Citation Graph (, )][DBLP ] Research on an Immune Mechanism Based Intelligent Spam Filter. [Citation Graph (, )][DBLP ] DECF: A Coarse-Grained Data-Parallel Programming Framework for Seismic Processing. [Citation Graph (, )][DBLP ] A Hybrid Method for Constructing Semi-structural Process in Knowledge-Intensive Information System. [Citation Graph (, )][DBLP ] Performance Bound Analysis and Retiming of Timed Circuits. [Citation Graph (, )][DBLP ] Research on Neighboring APs Discovery Methods in PnP WLAN. [Citation Graph (, )][DBLP ] A CCI-Feedback-Aided Scheduling Technique for MU-MIMO. [Citation Graph (, )][DBLP ] Evaluation Mode Research on Particle Swarm Optimization Algorithm. [Citation Graph (, )][DBLP ] Traffic Intelligent Optimization and Local Traffic-Flow Control Inside Shanghai-EXPO-Area. [Citation Graph (, )][DBLP ] Integrating Case based Reasoning and Explanation based Learning in an Apprentice Agent. [Citation Graph (, )][DBLP ] HxH: a hop-by-hop transport protocol for multi-hop wireless networks. [Citation Graph (, )][DBLP ] Measurement and Statistics of Application Business in Complex Internet. [Citation Graph (, )][DBLP ] Modeling and Robustness Analysis of Biochemical Networks of Glycerol Metabolism by Klebsiella Pneumoniae. [Citation Graph (, )][DBLP ] Modeling and Properties of Nonlinear Stochastic Dynamical System of Continuous Culture. [Citation Graph (, )][DBLP ] Parameter approximate dynamic optimization for PSO systems. [Citation Graph (, )][DBLP ] Cooperative OFDM for energy-efficient wireless sensor networks. [Citation Graph (, )][DBLP ] Defect-tolerant digital filtering with unreliable molecular electronics. [Citation Graph (, )][DBLP ] An Adaptive Spatial Error Concealment for H.264/AVC Video Stream. [Citation Graph (, )][DBLP ] The Design of Asynchronous Microprocessor Based on Optimized NCL_X Design-Flow. [Citation Graph (, )][DBLP ] A New Rights Processing Method for DRM Systems. [Citation Graph (, )][DBLP ] Traffic Localizing Strategy for Peer-to-Peer Systems. [Citation Graph (, )][DBLP ] Service View Description of a Service Oriented C4ISR Architecture Framework. [Citation Graph (, )][DBLP ] A New Description Language for Data-Driven Asynchronous Circuits and its Design Flow. [Citation Graph (, )][DBLP ] The Research on Controlling Method of Loom Warp Tension. [Citation Graph (, )][DBLP ] Low-complexity adaptive step size constrained constant modulus sg-based algorithms for blind adaptive beamforming. [Citation Graph (, )][DBLP ] Verifying the Consistency between Business Process Model and Data Model. [Citation Graph (, )][DBLP ] A Novel High-Density Single-Event Upset Hardened Configurable SRAM Applied to FPGA. [Citation Graph (, )][DBLP ] Prediction of Coal Mine Safety Level Based on LSSVM. [Citation Graph (, )][DBLP ] Application of SOA-based Business Process Management in Outage Management System. [Citation Graph (, )][DBLP ] Hybrid Neural Network Architecture for On-Line Learning [Citation Graph (, )][DBLP ] Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms [Citation Graph (, )][DBLP ] Positive Semidefinite Metric Learning with Boosting [Citation Graph (, )][DBLP ] Optimal Approximation Algorithms for Multi-agent Combinatorial Problems with Discounted Price Functions [Citation Graph (, )][DBLP ] Scalable Large-Margin Mahalanobis Distance Metric Learning [Citation Graph (, )][DBLP ] Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes [Citation Graph (, )][DBLP ] PhoenixCloud: Provisioning Resources for Heterogeneous Cloud Workloads [Citation Graph (, )][DBLP ] In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale? [Citation Graph (, )][DBLP ] Scalable Group Management in Large-Scale Virtualized Clusters [Citation Graph (, )][DBLP ] In Cloud, Can Scientific Communities Benefit from the Economies of Scale? [Citation Graph (, )][DBLP ] PhoenixCloud: Provisioning Resources for Heterogeneous Workloads in Cloud Computing [Citation Graph (, )][DBLP ] Single Parameter Combinatorial Auctions with Partially Public Valuations [Citation Graph (, )][DBLP ] Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes [Citation Graph (, )][DBLP ] PowerTracer: Tracing requests in multi-tier services to save cluster power consumption [Citation Graph (, )][DBLP ] Search in 0.147secs, Finished in 0.163secs