Search the dblp DataBase
Jian Tang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jian Tang , Jari Veijalainen Enforcing Inter-Task Dependencies in Transactional Workflows. [Citation Graph (4, 0)][DBLP ] CoopIS, 1995, pp:72-86 [Conf ] Jian Tang , N. Natarajan A Static Pessimistic Scheme for Handling Replicated Databases. [Citation Graph (3, 6)][DBLP ] SIGMOD Conference, 1989, pp:389-398 [Conf ] Jian Tang , San-Yih Hwang A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems. [Citation Graph (1, 12)][DBLP ] EDBT, 1998, pp:484-498 [Conf ] Jian Tang , N. Natarajan A Scheme for Maintaining Consistency and Availability of Replicated Files in a Partitioned Distributed System. [Citation Graph (1, 10)][DBLP ] ICDE, 1989, pp:530-537 [Conf ] Jian Tang Using Incremental Pruning to Increase the Efficiency of Dynamic Itemset Counting for Association Rules. [Citation Graph (0, 0)][DBLP ] CIKM, 1998, pp:273-280 [Conf ] Jian Tang , San-Yih Hwang Handling Uncertainties in Workflow Applications. [Citation Graph (0, 0)][DBLP ] CIKM, 1996, pp:269-276 [Conf ] Jian Tang , Jari Veijalainen Transaction-oriented Work-flow Concepts in Inter-Organizational Environments. [Citation Graph (0, 17)][DBLP ] CIKM, 1995, pp:250-259 [Conf ] Jian Tang Ad-Hoc Recovery in Workflows: A Formal Model and Some System Support Aspects. [Citation Graph (0, 0)][DBLP ] CoopIS, 1999, pp:222-233 [Conf ] San-Yih Hwang , Sun-Fa Ho , Jian Tang Mining Exception Instances to Facilitate Workflow Exception Handling. [Citation Graph (0, 7)][DBLP ] DASFAA, 1999, pp:45-52 [Conf ] Zhixiang Chen , Ada Wai-Chee Fu , Jian Tang On Complementarity of Cluster and Outlier Detection Schemes. [Citation Graph (0, 0)][DBLP ] DaWaK, 2003, pp:234-243 [Conf ] Xiao Bing Huang , Jian Tang A Method for Feature Selection on Microarray Data Using Support Vector Machine. [Citation Graph (0, 0)][DBLP ] DaWaK, 2006, pp:513-523 [Conf ] Jian Tang , San-Yih Hwang Coping with Mismatched Semantics of Dependencies in Workflow Applications. [Citation Graph (0, 0)][DBLP ] DEXA, 1996, pp:467-478 [Conf ] Jian Tang Voting Class - an Approach to Achieving High Availability for Replicated Data. [Citation Graph (0, 0)][DBLP ] DPDS, 1990, pp:146-156 [Conf ] Jian Tang , Ada Wai-Chee Fu Secure E-Commerce Transactions, Modeling and Implementation Aspects. [Citation Graph (0, 0)][DBLP ] DS-9, 2001, pp:53-67 [Conf ] Jian Tang , Jari Veijalainen Using Agents to Improve Security and to Assist in Negotiations for E-Commerce Transactions in Mobile Computing. [Citation Graph (0, 0)][DBLP ] HICSS, 2001, pp:- [Conf ] Jian Tang , Jari Veijalainen A Scheme to Enhance Reliability in Workflow Applications. [Citation Graph (0, 0)][DBLP ] IADT, 1998, pp:86-93 [Conf ] Hao Chen , Jian Tang An Efficient Method for Mutual Exclusion in Truly Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 1994, pp:97-104 [Conf ] Xiao Bing Huang , Jian Tang SPL: An Structured Pipeline Method for Frequent Remote Service Interactions in Bioinformatics Workflows. [Citation Graph (0, 0)][DBLP ] ICWS, 2005, pp:795-796 [Conf ] Zhixiang Chen , Jian Tang , Ada Wai-Chee Fu Modeling and Efficient Mining of Intentional Knowledge of Outliers. [Citation Graph (0, 0)][DBLP ] IDEAS, 2003, pp:44-53 [Conf ] Jian Tang , Xuemin Xing A Workflow Management Systems Architecture that Support Ad-Hoc Recoveries. [Citation Graph (0, 0)][DBLP ] IDEAS, 1999, pp:332-340 [Conf ] Jian Tang , Guoliang Xue , Christopher Chandler , Weiyi Zhang Interference-aware routing in multihop wireless networks using directional antennas. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:751-760 [Conf ] Weiyi Zhang , Guoliang Xue , Jian Tang , Krishnaiyan Thulasiraman Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:2702-2710 [Conf ] Ada Wai-Chee Fu , Renfrew W.-w. Kwong , Jian Tang Mining N -most Interesting Itemsets. [Citation Graph (0, 0)][DBLP ] ISMIS, 2000, pp:59-67 [Conf ] Jian Tang , Zengqi Sun , Jihong Zhu Using Ensemble Information in Swarming Artificial Neural Networks. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2005, pp:515-519 [Conf ] Jian Tang , Jihong Zhu , Zengqi Sun A Novel Path Planning Approach Based on AppART and Particle Swarm Optimization. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2005, pp:253-258 [Conf ] Jian Tang , Guoliang Xue , Weiyi Zhang Interference-aware topology control and QoS routing in multi-channel wireless mesh networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2005, pp:68-77 [Conf ] Chun Hung Cheng , Jian Tang , Ada Wai-Chee Fu , Irwin King Hierarchical Classification of Documents with Error Control. [Citation Graph (0, 0)][DBLP ] PAKDD, 2001, pp:433-443 [Conf ] Jian Tang , Zhixiang Chen , Ada Wai-Chee Fu , David Wai-Lok Cheung Enhancing Effectiveness of Outlier Detections for Low Density Patterns. [Citation Graph (0, 0)][DBLP ] PAKDD, 2002, pp:535-548 [Conf ] Jian Tang , Guoliang Xue , Christopher Chandler , Weiyi Zhang Link Scheduling with Power Control for Throughput Enhancement in Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:1- [Conf ] Jian Tang , Donglin Liang Improving the Modeling of Use Case Relationship. [Citation Graph (0, 0)][DBLP ] RE, 2006, pp:348-351 [Conf ] Jianlong Qi , Jian Tang Integrating gene ontology into discriminative powers of genes for feature selection in microarray data. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:430-434 [Conf ] Jingsong He , Xin Yao , Jian Tang Towards Intrinsic Evolvable Hardware for Predictive Lossless Image Compression. [Citation Graph (0, 0)][DBLP ] SEAL, 2006, pp:632-639 [Conf ] N. Natarajan , Jian Tang Synchronization of Redundant Computation in a Distributed System. [Citation Graph (0, 0)][DBLP ] SRDS, 1987, pp:139-148 [Conf ] Jian Tang Managing Replicated Data in Heterogeneous Database Systems. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1992, pp:12-19 [Conf ] Jian Tang , Shuigeng Zhou A Theoretic Framework for Answering XPath Queries Using Views. [Citation Graph (0, 0)][DBLP ] XSym, 2005, pp:18-33 [Conf ] Jian Tang , Bin Hao , Arunabha Sen Relay node placement in large scale wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:4, pp:490-501 [Journal ] Jian Tang On Multilevel Voting. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1994, v:8, n:1, pp:39-58 [Journal ] San-Yih Hwang , Jian Tang Consulting past exceptions to facilitate workflow exception handling. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2004, v:37, n:1, pp:49-69 [Journal ] Jian Tang , Ada Wai-Chee Fu , Jari Veijalainen Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2004, v:4, n:4, pp:393-413 [Journal ] Jian Tang , Jari Veijalainen Enforcement of Inter-Task Dependencies in Workflows, Characterization and Paradigm. [Citation Graph (0, 0)][DBLP ] Int. J. Cooperative Inf. Syst., 1998, v:7, n:1, pp:19-54 [Journal ] Jian Tang , N. Natarajan A scheme for increasing availability in partitioned replicated databases. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1991, v:53, n:1-2, pp:1-34 [Journal ] Jian Tang , Guoliang Xue , Weiyi Zhang Reliable Ad Hoc Routing Based on Mobility Prediction. [Citation Graph (0, 0)][DBLP ] J. Comb. Optim., 2006, v:11, n:1, pp:71-85 [Journal ] Jian Tang , Zhixiang Chen , Ada Wai-Chee Fu , David W. Cheung Capabilities of outlier detection schemes in large datasets, framework and methodologies. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2007, v:11, n:1, pp:45-84 [Journal ] Jian Tang , Vagan Y. Terziyan , Jari Veijalainen Distributed PIN Verification Scheme for Improving Security of Mobile Devices. [Citation Graph (0, 0)][DBLP ] MONET, 2003, v:8, n:2, pp:159-175 [Journal ] Jian Tang , N. Natarajan Obtaining Coteries That Optimize the Availability of Replicated Databases. [Citation Graph (0, 13)][DBLP ] IEEE Trans. Knowl. Data Eng., 1993, v:5, n:2, pp:309-321 [Journal ] Jian Tang , Guoliang Xue , Christopher Chandler Interference-aware routing and bandwidth allocation for QoS provisioning in multihop wireless networks. [Citation Graph (0, 0)][DBLP ] , 2005, v:, n:, pp:933-943 [Journal ] Jian Tang , Guoliang Xue , Weiyi Zhang Maximum Throughput and Fair Bandwidth Allocation in Multi-Channel Wireless Mesh Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] San-Yih Hwang , Haojun Wang , Jian Tang , Jaideep Srivastava A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:23, pp:5484-5503 [Journal ] Guoliang Xue , Arunabha Sen , Weiyi Zhang , Jian Tang , Krishnaiyan Thulasiraman Finding a path subject to many additive QoS constraints. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:201-211 [Journal ] Assignment problem in requirements driven agent collaboration and its implementation. [Citation Graph (, )][DBLP ] Gene Ontology Driven Feature Selection from Microarray Gene Expression Data. [Citation Graph (, )][DBLP ] A Probability-Based Framework for Dynamic Resource Scheduling in Grid Environment. [Citation Graph (, )][DBLP ] Multi-point Calibration Detecting Method of Non-linear Analogue Quantity. [Citation Graph (, )][DBLP ] Forecasting Increment Control Methods in Regulated Period for the Temperature of Beer Fermentation. [Citation Graph (, )][DBLP ] Requirement Driven Service Agent Collaboration and QoS Based Negotiation. [Citation Graph (, )][DBLP ] Joint Stream Control and Scheduling in Multihop Wireless Networks with MIMO Links. [Citation Graph (, )][DBLP ] Reliable Routing for Roadside to Vehicle Communications in Rural Areas. [Citation Graph (, )][DBLP ] Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios. [Citation Graph (, )][DBLP ] QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety. [Citation Graph (, )][DBLP ] A bottom-up approach for XML documents classification. [Citation Graph (, )][DBLP ] Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements. [Citation Graph (, )][DBLP ] Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints. [Citation Graph (, )][DBLP ] An Adaptive Channel Handoff Strategy for Opportunistic Spectrum Sharing in Cognitive Global Control Plane Architecture. [Citation Graph (, )][DBLP ] D3S: Debugging Deployed Distributed Systems. [Citation Graph (, )][DBLP ] R2: An Application-Level Kernel for Record and Replay. [Citation Graph (, )][DBLP ] Study on The Property of Training Samples and Learning Space with Genetic Algorithms. [Citation Graph (, )][DBLP ] A New Optimization Engine for the LSF Vector Quantization. [Citation Graph (, )][DBLP ] Users' Book-Loan Behaviors Analysis and Knowledge Dependency Mining. [Citation Graph (, )][DBLP ] QoS Routing in Wireless Mesh Networks with Cognitive Radios. [Citation Graph (, )][DBLP ] Dynamic Wavelength Routing in WDM Networks under Multiple Signal Quality Constraints. [Citation Graph (, )][DBLP ] Strong Barrier Coverage with Directional Sensors. [Citation Graph (, )][DBLP ] REPARE: Regenerator Placement and Routing Establishment in Translucent Networks. [Citation Graph (, )][DBLP ] Using Gene Ontology to Enhance Effectiveness of Similarity Measures for Microarray Data. [Citation Graph (, )][DBLP ] Requirement Driven Service Agent Coalition Formation and Negotiation. [Citation Graph (, )][DBLP ] Joint spectrum allocation and scheduling for fair spectrum sharing in cognitive radio wireless networks. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.029secs