The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kang Yen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kang Yen, Ali Naqui, Jean Andrian
    Noise reduction in nonlinear time series using a library of wavelet bases. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:413-416 [Conf]
  2. J. H. Andrian, C. A. Edmonds, K. Yen, J. P. Stephens
    Applications of adaptive segmentation and orthogonal expansion to non-stationary signal processing. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:405-408 [Conf]
  3. Faisal Kaleem, Kang Yen
    Implementation of HDLC Based Serial Data Communication Using Java. [Citation Graph (0, 0)][DBLP]
    Communications in Computing, 2003, pp:316-0 [Conf]
  4. Fuji Ren, Shunji Mitsuyoshi, Kang Yen, Chengqing Zong, Hongbing Zhu
    An Estimate Method of the Minimum Entropy of Natural Languages. [Citation Graph (0, 0)][DBLP]
    CICLing, 2003, pp:382-392 [Conf]
  5. Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
    A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:56- [Conf]
  6. Hetal Jasani, Kang Yen, Kia Makki
    Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:203-212 [Conf]
  7. Kia Makki, Niki Pissinou, Jaydeep Punde, Kang Yen
    Predictive Routing Extensions to AODV to Support Quality of Service. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:343-349 [Conf]
  8. Fuji Ren, Kang Yen
    Estimating the Minimum Entropy of Chinese and Japanese Languages. [Citation Graph (0, 0)][DBLP]
    International Journal of Information Technology and Decision Making, 2005, v:4, n:4, pp:679-690 [Journal]

  9. Node Compromise Modeling and its Applications in Sensor Networks. [Citation Graph (, )][DBLP]


  10. A proactive secure routing algorithm defense against node compromise in sensor networks. [Citation Graph (, )][DBLP]


  11. Handling Data Imperfections in Classification Problems using a Belief Theory Approach. [Citation Graph (, )][DBLP]


  12. Buffer Management Algorithm Design and Implementation Based on Network Processors [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002