The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei Su: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su
    Lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:312-315 [Conf]
  2. T. Raju Damarla, Wei Su, Gerald T. Michael, Moon J. Chung, Charles E. Stroud
    A built-in self test scheme for VLSI. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 1995, pp:- [Conf]
  3. Wei Su, John A. Kosinski
    Analysis of Probability Density Function based Adaptive Modulation Techniques in Non-Cooperative Communication Environment. [Citation Graph (0, 0)][DBLP]
    Communication Systems and Applications, 2005, pp:46-51 [Conf]
  4. Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin
    Robust lossless image data hiding. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2199-2202 [Conf]
  5. Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su
    Reversible data hiding. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:912-915 [Conf]
  6. Zaihe Yu, Yun Q. Shi, Wei Su
    Symbol-rate estimation based on filter bank. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:1437-1440 [Conf]
  7. Dongdong Fu, Yun Q. Shi, Wei Su
    Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:177-187 [Conf]
  8. T. Raju Damarla, Moon J. Chung, Wei Su, Gerald T. Michael
    Faulty chip identification in a multi chip module system. [Citation Graph (0, 0)][DBLP]
    VTS, 1996, pp:254-259 [Conf]
  9. Wei Su, Hong Ma, Yuan Yan Tang, Michio Umeda
    Wavelet Transform Method of Waveform Estimation for Hilbert Transform of Fractional Stochastic Signals with Noise. [Citation Graph (0, 0)][DBLP]
    WAA, 2001, pp:296-304 [Conf]
  10. Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su
    Reversible data hiding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:3, pp:354-362 [Journal]
  11. Hong Li, Ali Abdi, Yeheskel Bar-Ness, Wei Su
    Array-based Linear Modulation Classifier with Two-Stage CFO Estimation in Fading Channels. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  12. Dekun Zou, Yun Q. Shi, Zhicheng Ni, Wei Su
    A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1294-1300 [Journal]

  13. Data Mining of Modulation Features Using Higher-Order Statistical Transform for Battlefield Awareness. [Citation Graph (, )][DBLP]


  14. Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree. [Citation Graph (, )][DBLP]


  15. A Web-Based Mathematical User Interface for E-Science System. [Citation Graph (, )][DBLP]


  16. Camera brand and model identification using moments of 1-D and 2-D characteristic functions. [Citation Graph (, )][DBLP]


  17. Steganalysis based on Markov Model of Thresholded Prediction-Error Image. [Citation Graph (, )][DBLP]


  18. Rake transform and edge statistics for image forgery detection. [Citation Graph (, )][DBLP]


  19. Production scheduling for virtual cellular manufacturing systems with workforce constraints using a hybrid algorithm. [Citation Graph (, )][DBLP]


  20. A constraint programming approach for production scheduling of multi-period virtual cellular manufacturing systems. [Citation Graph (, )][DBLP]


  21. Computer graphics identification using genetic algorithm. [Citation Graph (, )][DBLP]


  22. A machine learning based scheme for double JPEG compression detection. [Citation Graph (, )][DBLP]


  23. An On-line MathML Editing Tool for Web Applications. [Citation Graph (, )][DBLP]


  24. Steganalysis Versus Splicing Detection. [Citation Graph (, )][DBLP]


  25. Camera-Model Identification Using Markovian Transition Probability Matrix. [Citation Graph (, )][DBLP]


  26. Permu-pattern: discovery of mutable permutation patterns with proximity constraint. [Citation Graph (, )][DBLP]


  27. The Application of Support Vector Regression in the Dual-Axis Tilt Sensor Modeling. [Citation Graph (, )][DBLP]


  28. STC and BLAST MIMO Modulation Recognition. [Citation Graph (, )][DBLP]


  29. A New Radio Channel Allocation Strategy For WLAN APs With Power Control Capabilities. [Citation Graph (, )][DBLP]


  30. A Simple Method to Enhance the Detection of Second Order Cyclostationarity. [Citation Graph (, )][DBLP]


  31. Designing Supply Chain KPIs for Upper-Level Management. [Citation Graph (, )][DBLP]


  32. Research of BMP and PCB Image-position in the Digital Circuit Fault Diagnosis System. [Citation Graph (, )][DBLP]


  33. Research and Application of Intelligent Building System Integration Methods. [Citation Graph (, )][DBLP]


  34. Combination Design of I2C and Lon Buses Based on Bridge Mode. [Citation Graph (, )][DBLP]


  35. Design of a New Practical Expert Fuzzy Controller in Central Air Conditioning Control System. [Citation Graph (, )][DBLP]


  36. Design of VAV Energy Saving Air Conditioning System Based on Intelligent Control Network. [Citation Graph (, )][DBLP]


  37. ARCS-Motif: discovering correlated motifs from unaligned biological sequences. [Citation Graph (, )][DBLP]


  38. A gene pattern mining algorithm using interchangeable gene sets for prokaryotes. [Citation Graph (, )][DBLP]


  39. A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.326secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002