The SCEAS System
Navigation Menu

Search the dblp DataBase


Hong Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Meng Teo, Hong Wang, Seng Chuan Tay
    A Framework for Analyzing Parallel Simulation Performance. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 1999, pp:102-0 [Conf]
  2. Hong Wang, Yong Meng Teo, Seng Chuan Tay
    An Analytic Method for Predicting Simulation Parallelism. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2000, pp:211-218 [Conf]
  3. Jianhui Xing, Hong Wang, Shiyuan Yang
    Constructing Transparency Paths for IP Cores Using Greedy Searching Strategy. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2004, pp:14-19 [Conf]
  4. Wen-Chi Hou, Meng Su, Hongyan Zhang, Hong Wang
    An Optimal Construction of Invalidation Reports for Mobile Databases. [Citation Graph (0, 0)][DBLP]
    CIKM, 2001, pp:458-465 [Conf]
  5. Hong Wang, Dong Zhang
    MDA-based Development of E-Learning System. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:684-689 [Conf]
  6. Hong Wang, Wen-Xiu Zhang
    Relationships Between Concept Lattice and Rough Set. [Citation Graph (0, 0)][DBLP]
    ICAISC, 2006, pp:538-547 [Conf]
  7. Hong Wang, Zhiqiang Ma, Kenji Nakayama
    Effectiveness of Penalty Function in Solving the Subset Sum Problem. [Citation Graph (0, 0)][DBLP]
    International Conference on Evolutionary Computation, 1996, pp:422-425 [Conf]
  8. Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang
    Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:270-283 [Conf]
  9. Hong Wang, Dan Lin, Minqiang Li
    A Genetic Algorithm for Solving Fuzzy Resource-Constrained Project Scheduling. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:171-180 [Conf]
  10. Hong Wang, Dan Lin, Minqiang Li
    A Genetic Algorithm for Solving Resource-Constrained Project Scheduling Problem. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:185-193 [Conf]
  11. Hong Wang, Evangelos Kranakis
    Secure Wireless Payment Protocol. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:576-582 [Conf]
  12. Hong Wang, Yuqing Zhang, Dengguo Feng
    Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:297-310 [Conf]
  13. Ajay Gupta, Hong Wang
    Generalized Compressed Tree Machines. [Citation Graph (0, 0)][DBLP]
    IPPS, 1992, pp:95-102 [Conf]
  14. Junhui Zhou, Bernard Cousin, Hong Wang
    Dual-Video-Scheme Videoconferencing. [Citation Graph (0, 0)][DBLP]
    Multimedia Technology and Applications, 1996, pp:385-392 [Conf]
  15. Hongru Li, Wenxiu Zhang, Ping Xu, Hong Wang
    Rough Set Attribute Reduction in Decision Systems. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:135-140 [Conf]
  16. Ajay K. Gupta, Hong Wang
    On Embedding Ternary Trees into Boolean Hypercubes. [Citation Graph (0, 0)][DBLP]
    SPDP, 1992, pp:230-235 [Conf]
  17. Huyu Qu, Le Yi Wang, Ece Yaprak, Hong Wang, Yanlong Zhao
    Integrated Information Processing and Communications: Complexity Analysis. [Citation Graph (0, 0)][DBLP]
    Wireless and Optical Communications, 2006, pp:78-83 [Conf]
  18. Peixin Zhao, Hong Wang
    An EOQ Model for Multi-Item and Multi-Storehouse Based on New Hybrid Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:657-660 [Conf]
  19. Hong Wang
    On Independent Cycles in a Bipartite Graph. [Citation Graph (0, 0)][DBLP]
    Graphs and Combinatorics, 2001, v:17, n:1, pp:177-183 [Journal]
  20. Carolyn R. Watters, Hong Wang
    Rating news documents for similarity. [Citation Graph (0, 0)][DBLP]
    JASIS, 2000, v:51, n:9, pp:793-804 [Journal]
  21. Hong Wang
    On the Maximum Number of Independent Cycles in a Bipartite Graph. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. B, 1996, v:67, n:1, pp:152-164 [Journal]
  22. Ajay K. Gupta, Donald Nelson, Hong Wang
    Efficient embeddings of ternary trees into hypercubes. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2003, v:63, n:6, pp:619-629 [Journal]
  23. Perry H. Wang, Jamison D. Collins, Hong Wang, Dongkeun Kim, Bill Greene, Kai-Ming Chan, Aamir B. Yunus, Terry Sych, Stephen F. Moore, John Paul Shen
    Helper Threads via Virtual Multithreading. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2004, v:24, n:6, pp:74-82 [Journal]
  24. Hong Wang
    On Covering a Bipartite Graph with Cycles. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2001, v:15, n:1, pp:86-96 [Journal]
  25. Hong Wang, Tong Sun, Qing Yang
    Minimizing Area Cost of On-Chip Cache Memories by Caching Address Tags. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:11, pp:1187-1201 [Journal]
  26. A. Russell, Hong Wang
    How to fool an unbounded adversary with a short key. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:3, pp:1130-1140 [Journal]
  27. Qing Yang, Hong Wang
    A New Graph Approach to Minimizing Processor Fragmentation in Hypercube Multiprocessors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1993, v:4, n:10, pp:1165-1171 [Journal]
  28. Lei Guo, Hong Wang
    PID controller design for output PDFs of stochastic systems using linear matrix inequalities. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:1, pp:65-71 [Journal]
  29. Danhong Zhang, Hong Wang
    Disjoint directed quadrilaterals in a directed graph. [Citation Graph (0, 0)][DBLP]
    Journal of Graph Theory, 2005, v:50, n:2, pp:91-104 [Journal]
  30. Hong Wang
    Pentagons and cycle coverings. [Citation Graph (0, 0)][DBLP]
    Journal of Graph Theory, 2007, v:54, n:3, pp:194-208 [Journal]
  31. Jianhui Xing, Hong Wang, Shiyuan Yang
    Constructing IP cores' transparency paths for SoC test access using greedy search. [Citation Graph (0, 0)][DBLP]
    Microelectronics Reliability, 2006, v:46, n:7, pp:1199-1208 [Journal]
  32. Yuan Tian, Hong Wang
    Analysis of DC characteristics of GaAs double heterojunction bipolar transistors (DHBTs) with a pseudomorphic GaAsSb base. [Citation Graph (0, 0)][DBLP]
    Microelectronics Journal, 2006, v:37, n:1, pp:38-43 [Journal]
  33. Yuan Tian, Hong Wang
    Temperature dependence of DC characteristics of NpN InP/GaAsSb/InP double heterojunction bipolar transistors: an analytical study. [Citation Graph (0, 0)][DBLP]
    Microelectronics Journal, 2006, v:37, n:7, pp:595-600 [Journal]
  34. Ya Zhou, Jin-Tao Ma, Qun Hao, Hong Wang, Xian-Peng Liu
    A Novel Optical See-Through Head-Mounted Display with Occlusion and Intensity Matching Support. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2007, pp:56-62 [Conf]
  35. Jijie Xu, Michael Yu Wang, Hong Wang, Zexiang Li
    Force Analysis of Whole Hand Grasp by Multifingered Robotic Hand. [Citation Graph (0, 0)][DBLP]
    ICRA, 2007, pp:211-216 [Conf]
  36. Jian Meng, Dongjun Zhang, Tinghua Zhang, Hong Wang, Zexiang Li
    Accuracy Analysis of General Parallel Manipulators with Joint Clearance. [Citation Graph (0, 0)][DBLP]
    ICRA, 2007, pp:889-894 [Conf]
  37. Hong Wang, Wei-Zhi Wu
    Knowledge Reduction in Generalized Consistent Decision Formal Contexts. [Citation Graph (0, 0)][DBLP]
    RSKT, 2007, pp:364-371 [Conf]
  38. Xiaoyuan Zhu, Yongquan Yu, Hong Wang
    Research of Immune Neural Network Model Based on Extenics. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:18-27 [Conf]
  39. Hong Wang, Hiroyuki Takizawa, Hiroaki Kobayashi
    A dependable Peer-to-Peer computing platform. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:8, pp:939-955 [Journal]

  40. A Strong Migration Method of Mobile Agents Based on Java. [Citation Graph (, )][DBLP]

  41. The Design and Realization of Online Virtual Campus of NEU. [Citation Graph (, )][DBLP]

  42. From C to Python: Impact on Retention and Student Performance. [Citation Graph (, )][DBLP]

  43. A comparative study on inductive operators of fuzzy decision tree. [Citation Graph (, )][DBLP]

  44. K-means clustering with manifold. [Citation Graph (, )][DBLP]

  45. Dynamic Execution Strategy of Web Service Composition Based on e_SPDL and Service Container. [Citation Graph (, )][DBLP]

  46. A Case of Blending Learning in Computer Teaching - The Model and the Application. [Citation Graph (, )][DBLP]

  47. Research on Optimum Position for Straight Lines Model. [Citation Graph (, )][DBLP]

  48. Application of Data Mining in the Financial Data Forecasting. [Citation Graph (, )][DBLP]

  49. New Algorithm for Determining Object Attitude Based on Trapezoid Feature. [Citation Graph (, )][DBLP]

  50. Palmprint Recognition Combining LDA and the Center Band of Fourier Magnitude. [Citation Graph (, )][DBLP]

  51. Improved Competitive Code for Palmprint Recognition Using Simplified Gabor Filter. [Citation Graph (, )][DBLP]

  52. The Application of Intuitionistic Fuzzy Theory in Radar Target Identification. [Citation Graph (, )][DBLP]

  53. Supervised Isomap for Plant Leaf Image Classification. [Citation Graph (, )][DBLP]

  54. Attribute Reduction Based on the Extension Concept Lattice. [Citation Graph (, )][DBLP]

  55. The application of data mining in online bookstore. [Citation Graph (, )][DBLP]

  56. Detection Network Anomalies Based on Packet and Flow Analysis. [Citation Graph (, )][DBLP]

  57. An Entropy Based Algorithm to Find Critical Traffic Matrices. [Citation Graph (, )][DBLP]

  58. Identification method of gas-liquid two-phase flow regime based on distance evaluation. [Citation Graph (, )][DBLP]

  59. A solving algorithm for Target Assignment optimization model based on ACO. [Citation Graph (, )][DBLP]

  60. Quotient kinematics machines: Concept, analysis and synthesis. [Citation Graph (, )][DBLP]

  61. A Reliable & Efficient Multi-channel MAC Protocol Optimized for Industrial Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  62. Context and Contextual Reasoning from the Perspective of AI. [Citation Graph (, )][DBLP]

  63. Optimization algorithm of initial orbit based on internal penalty function method. [Citation Graph (, )][DBLP]

  64. Data association for target tracking by several passive sensors. [Citation Graph (, )][DBLP]

  65. Satellite recovery control strategy based on attitude error information fusion. [Citation Graph (, )][DBLP]

  66. A New Hybrid Genetic Algorithm for the Stochastic Loader Problem. [Citation Graph (, )][DBLP]

  67. Pipelined parallel test structure for mixed-signal SoCs. [Citation Graph (, )][DBLP]

  68. Image feature extraction for mobile processors. [Citation Graph (, )][DBLP]

  69. CUDA Based High Performance Adaptive 3D Voxel Growing for Lung CT Segmentation. [Citation Graph (, )][DBLP]

  70. A Research on Automaticity Optimization of KeyX Index in Native XML Database. [Citation Graph (, )][DBLP]

  71. The Effect of Dimension on Performance and Complexity Comparison of Torus Interconnection Networks. [Citation Graph (, )][DBLP]

  72. Large deviation methods for stochastic reachability. [Citation Graph (, )][DBLP]

  73. Anesthesia patient monitoring and control in wireless-based systems. [Citation Graph (, )][DBLP]

  74. Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space. [Citation Graph (, )][DBLP]

  75. A Novel Clustering and Verification Based Microarray Data Bi-clustering Method. [Citation Graph (, )][DBLP]

  76. The Boiler CAPP System Based on the Expert System Technology. [Citation Graph (, )][DBLP]

  77. The semantic similarity of the geo-information concept calculation model based on ontology. [Citation Graph (, )][DBLP]

  78. An hierarchical information entropy model for coverage estimation of coastal areas based on an adaptive Discrete Global Grid System. [Citation Graph (, )][DBLP]

  79. Connecting Migration Method in a Mobile Agent System. [Citation Graph (, )][DBLP]

  80. Prioritizing risk pathways: a novel association approach to searching for disease pathways fusing SNPs and pathways. [Citation Graph (, )][DBLP]

Search in 0.009secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002