|
Search the dblp DataBase
Liming Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Liming Wang, Chuan-Kun Wu
Authenticated Group Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:55-72 [Conf]
- Liming Wang, Houkuan Huang, Yumei Chai
Speculative Computation with Deadline and Its Resource Negotiation under Time Constraints. [Citation Graph (0, 0)][DBLP] IAT, 2004, pp:353-356 [Conf]
- ZhiLei Chai, ZhiQiang Tang, Liming Wang, Shi-liang Tu
An Effective Instruction Optimization Method for Embedded Real-Time Java Processor. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2005, pp:225-231 [Conf]
- Liming Wang, Jianbo Shi, Gang Song, I-Fan Shen
Object Detection Combining Recognition and Segmentation. [Citation Graph (0, 0)][DBLP] ACCV (1), 2007, pp:189-199 [Conf]
YAGP: Yet Another Graphical Password Strategy. [Citation Graph (, )][DBLP]
Against Spyware Using CAPTCHA in Graphical Password Scheme. [Citation Graph (, )][DBLP]
Contour Context Selection for Object Detection: A Set-to-Set Contour Matching Approach. [Citation Graph (, )][DBLP]
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords? [Citation Graph (, )][DBLP]
Grouping Contours Via a Related Image. [Citation Graph (, )][DBLP]
DTAD: A Dynamic Taint Analysis Detector for Information Security. [Citation Graph (, )][DBLP]
Finding Stuff on the Street. [Citation Graph (, )][DBLP]
Global stability for monotone tridiagonal systems with negative feedback. [Citation Graph (, )][DBLP]
Mapping Equivalence for Symbolic Sequences: Theory and Applications [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|