The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ming-Shi Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kuo-Ming Chen, Yuan-Tsung Chen, Ming-Shi Wang
    Reconstruction and Fusion of Multi-modality Spinal Images. [Citation Graph (0, 0)][DBLP]
    CISST, 2004, pp:151-157 [Conf]
  2. Yu-Ju Shen, Ming-Shi Wang
    Neural Schemes for Elastically Deformable Models. [Citation Graph (0, 0)][DBLP]
    IICAI, 2003, pp:18-27 [Conf]
  3. Jung-Te Weng, Ming-Shi Wang
    Predicting Change Propagation in Software System with Data Mining Techniques. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  4. Chien-Chuan Lin, Ming-Shi Wang
    Practical Intrusion Detection Using Genetic-Clustering. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:720-721 [Conf]
  5. Pei-Fang Tsai, Ming-Shi Wang
    An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  6. Ming-Shi Wang, Jung-Te Weng
    Locating Matching Rules by Mining Software Change Log. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  7. Chih-Han Lin, Ming-Shi Wang, Chun-Cheng Wei, Lai-Yi Chu
    A Remote Parallel Computation System for Biomedical Data Visualization on the Grid. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  8. Jin-Guey Lee, Fong-Lin Jang, Ming-Shi Wang
    The Application of Infrared Imaging to Psychological Status Assessment - A Preliminary Study. [Citation Graph (0, 0)][DBLP]
    METMBS, 2004, pp:209-215 [Conf]
  9. Yueh-Min Huang, Meng-Yen Hsieh, Ming-Shi Wang
    Reliable transmission of multimedia streaming using a connection prediction scheme in cluster-based ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:2, pp:440-452 [Journal]
  10. Yu-Ju Shen, Ming-Shi Wang
    New resource management strategy for wireless cellular networks. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2006, v:32, n:1-3, pp:135-146 [Journal]

  11. Depth evaluation intrusion detection using Coloured Stochastic Petri Nets. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002