The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhao Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tien N. Nguyen, Zhao Zhang
    Component-oriented version management for hardware software co-design. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:357-360 [Conf]
  2. Souvik Ray, Zhao Zhang
    An Efficient Anonymity Protocol for Grid Computing. [Citation Graph (0, 0)][DBLP]
    GRID, 2004, pp:200-207 [Conf]
  3. Zhichun Zhu, Zhao Zhang
    A Performance Comparison of DRAM Memory System Optimizations for SMT Processors. [Citation Graph (0, 0)][DBLP]
    HPCA, 2005, pp:213-224 [Conf]
  4. Zhichun Zhu, Zhao Zhang, Xiaodong Zhang
    Fine-Grain Priority Scheduling on Multi-Channel Memory Systems. [Citation Graph (0, 0)][DBLP]
    HPCA, 2002, pp:107-116 [Conf]
  5. Yong Yan, Xiaodong Zhang, Zhao Zhang
    A memory-layout oriented run-time technique for locality optimization. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:189-0 [Conf]
  6. Zhao Zhang
    Neural Network Associator for Images and Their Chinese Characters. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2004, pp:1021-1024 [Conf]
  7. Souvik Ray, Zhao Zhang
    Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:63-74 [Conf]
  8. Wei Huang, Jiang Lin, Zhao Zhang, J. Morris Chang
    Towards Pairing Java Applications on SMT Processors. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:7-14 [Conf]
  9. Zhao Zhang, Randy H. Moss, William V. Stoecker
    A Novel Morphological Operator to Calculate Euler Number. [Citation Graph (0, 0)][DBLP]
    MIAR, 2001, pp:226-228 [Conf]
  10. Zhao Zhang, Zhichun Zhu, Xiaodong Zhang
    A permutation-based page interleaving scheme to reduce row-buffer conflicts and exploit data locality. [Citation Graph (0, 0)][DBLP]
    MICRO, 2000, pp:32-41 [Conf]
  11. Joseph Schneider, Mikel Bezdek, Ziyu Zhang, Zhao Zhang, Diane T. Rover
    A Platform FPGA-Based Hardware-Software Undergraduate Laboratory. [Citation Graph (0, 0)][DBLP]
    MSE, 2005, pp:53-54 [Conf]
  12. Meng-Shiou Wu, Ricky A. Kendall, Kyle Wright, Zhao Zhang
    Performance Modeling and Tuning Strategies of Mixed Mode Collective Communications. [Citation Graph (0, 0)][DBLP]
    SC, 2005, pp:45- [Conf]
  13. Zhao Zhang, Jixiang Meng
    Restricted Edge Connectivity of Edge Transitive Graphs. [Citation Graph (0, 0)][DBLP]
    Ars Comb., 2006, v:78, n:, pp:- [Journal]
  14. Zhao Zhang, Jixiang Meng
    On optimally-lambda(3) transitive graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:6, pp:1011-1018 [Journal]
  15. Jixiang Meng, Zhao Zhang
    Number of minimum vertex cuts in transitive graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2003, v:270, n:1-3, pp:310-316 [Journal]
  16. Baoyindureng Wu, Li Zhang, Zhao Zhang
    The transformation graph Gxyz when xyz=-++. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:296, n:2-3, pp:263-270 [Journal]
  17. Zhao Zhang, Jixiang Meng
    Semi-hyper-connected edge transitive graphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2006, v:306, n:7, pp:705-710 [Journal]
  18. Zhao Zhang, Jinjiang Yuan
    A proof of an inequality concerning k-restricted edge connectivity. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:304, n:1-3, pp:128-134 [Journal]
  19. Zhao Zhang, Jinjiang Yuan
    Degree conditions for restricted-edge-connectivity and isoperimetric-edge-connectivity to be optimal. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2007, v:307, n:2, pp:293-298 [Journal]
  20. Zhao Zhang, Zhichun Zhu, Xiaodong Zhang
    Breaking Address Mapping Symmetry at Multi-levels of Memory Heirarchy to Reduce DRAM Row-buffer Conflicts. [Citation Graph (0, 0)][DBLP]
    J. Instruction-Level Parallelism, 2001, v:3, n:, pp:- [Journal]
  21. Yong-Joon Park, Zhao Zhang, Gyungho Lee
    Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2006, v:26, n:4, pp:62-71 [Journal]
  22. Zhao Zhang, Zhichun Zhu, Xiaodong Zhang
    Cached DRAM for ILP Processor Memory Access Latency Reduction. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2001, v:21, n:4, pp:22-32 [Journal]
  23. Zhao Zhang, Zhichun Zhu, Xiaodong Zhang
    Design and Optimization of Large Size and Low Overhead Off-Chip Caches. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:7, pp:843-855 [Journal]
  24. Zhao Zhang, Hao Li
    Algorithms for long paths in graphs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:377, n:1-3, pp:25-34 [Journal]
  25. Zhao Zhang, William V. Stoecker, Randy H. Moss
    Border Detection on Digitized Skin Tumor Images. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Med. Imaging, 2000, v:19, n:11, pp:1128-1143 [Journal]
  26. Yong Yan, Xiaodong Zhang, Zhao Zhang
    Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:4, pp:357-374 [Journal]
  27. Zhao Zhang, Yirong Zheng, Aygul Mamut
    Nowhere-zero flows in tensor product of graphs. [Citation Graph (0, 0)][DBLP]
    Journal of Graph Theory, 2007, v:54, n:4, pp:284-292 [Journal]
  28. Souvik Ray, Giora Slutzki, Zhao Zhang
    Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:63- [Conf]
  29. Jiang Lin, Hongzhong Zheng, Zhichun Zhu, Howard David, Zhao Zhang
    Thermal modeling and management of DRAM memory systems. [Citation Graph (0, 0)][DBLP]
    ISCA, 2007, pp:312-322 [Conf]
  30. Zhao Zhang, Su Zhang, Wei Yang, Yazhu Chen, Hongtao Lu
    A New Segmentation Method Based on SVM for HIFU Image-Guided System. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:967-972 [Conf]

  31. Soft-OLP: Improving Hardware Cache Performance through Software-Controlled Object-Level Partitioning. [Citation Graph (, )][DBLP]

  32. An Efficient Hardware Support for Control Data Validation. [Citation Graph (, )][DBLP]

  33. Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. [Citation Graph (, )][DBLP]

  34. A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics Theory. [Citation Graph (, )][DBLP]

  35. (6+epsilon)-Approximation for Minimum Weight Dominating Set in Unit Disk Graphs. [Citation Graph (, )][DBLP]

  36. Three Approximation Algorithms for Energy-Efficient Query Dissemination in Sensor Database System. [Citation Graph (, )][DBLP]

  37. Gaining insights into multicore cache partitioning: Bridging the gap between simulation and real systems. [Citation Graph (, )][DBLP]

  38. Electronic Structure Calculations and Adaptation Scheme in Multi-core Computing Environments. [Citation Graph (, )][DBLP]

  39. SCUBE: A DoS-Resistant Distributed Search Protocol. [Citation Graph (, )][DBLP]

  40. Optimal Placements in Ring Network for Data Replicas in Distributed Database with MajorityVoting Protocol. [Citation Graph (, )][DBLP]

  41. Memory Access Scheduling Schemes for Systems with Multi-Core Processors. [Citation Graph (, )][DBLP]

  42. Minimum Power Strongly Connected Dominating Sets in Wireless Networks. [Citation Graph (, )][DBLP]

  43. A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks. [Citation Graph (, )][DBLP]

  44. Decoupled DIMM: building high-bandwidth memory system using low-speed DRAM devices. [Citation Graph (, )][DBLP]

  45. DRAM-Level Prefetching for Fully-Buffered DIMM: Design, Performance and Power Saving. [Citation Graph (, )][DBLP]

  46. Performance Characterization of Java Applications on SMT Processors. [Citation Graph (, )][DBLP]

  47. BotTracer: Execution-Based Bot-Like Malware Detection. [Citation Graph (, )][DBLP]

  48. Mini-rank: Adaptive DRAM architecture for improving memory power efficiency. [Citation Graph (, )][DBLP]

  49. An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables. [Citation Graph (, )][DBLP]

  50. Toward loosely coupled programming on petascale systems. [Citation Graph (, )][DBLP]

  51. Enabling software management for multicore caches with a lightweight hardware support. [Citation Graph (, )][DBLP]

  52. Software thermal management of dram memory for multicore systems. [Citation Graph (, )][DBLP]

  53. PTAS for Minimum Connected Dominating Set in Unit Ball Graph. [Citation Graph (, )][DBLP]

  54. Latency-Bounded Minimum Influential Node Selection in Social Networks. [Citation Graph (, )][DBLP]

  55. Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks. [Citation Graph (, )][DBLP]

  56. Orthogonal subspace based nonlinear correlation learning for supervised dimensionality reduction. [Citation Graph (, )][DBLP]

  57. Polynomial Time Approximation Scheme for Connected Vertex Cover in Unit Disk Graph. [Citation Graph (, )][DBLP]

  58. Minimally restricted edge connected graphs. [Citation Graph (, )][DBLP]

  59. A kind of conditional vertex connectivity of star graphs. [Citation Graph (, )][DBLP]

  60. Cyclic arc-connectivity in a Cartesian product digraph. [Citation Graph (, )][DBLP]

  61. Extremal properties of (1, f)-odd factors in graphs. [Citation Graph (, )][DBLP]

  62. Parallel Scripting for Applications at the Petascale and Beyond. [Citation Graph (, )][DBLP]

  63. Towards Loosely-Coupled Programming on Petascale Systems [Citation Graph (, )][DBLP]

  64. Enabling Loosely-Coupled Serial Job Execution on the IBM BlueGene/P Supercomputer and the SiCortex SC5832 [Citation Graph (, )][DBLP]

  65. Design and Evaluation of a Collective IO Model for Loosely Coupled Petascale Programming [Citation Graph (, )][DBLP]

  66. Super-connected edge transitive graphs. [Citation Graph (, )][DBLP]

  67. Super-connected arc-transitive digraphs. [Citation Graph (, )][DBLP]

  68. Minimally 3-restricted edge connected graphs. [Citation Graph (, )][DBLP]

  69. The existence and upper bound for two types of restricted connectivity. [Citation Graph (, )][DBLP]

  70. Double-super-connected digraphs. [Citation Graph (, )][DBLP]

  71. Sufficient conditions for restricted-edge-connectivity to be optimal. [Citation Graph (, )][DBLP]

  72. Extra edge connectivity and isoperimetric edge connectivity. [Citation Graph (, )][DBLP]

  73. Semi-hyper-connected vertex transitive graphs. [Citation Graph (, )][DBLP]

  74. On cyclic edge-connectivity of transitive graphs. [Citation Graph (, )][DBLP]

  75. Edges of degree k in minimally restricted k-edge connected graphs. [Citation Graph (, )][DBLP]

Search in 0.025secs, Finished in 0.030secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002