Chao Yang

According to our database1, Chao Yang
  • authored at least 253 papers between 1992 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Novel Variable Precision Reduction Approach to Comprehensive Knowledge Systems.
IEEE Trans. Cybernetics, 2018

Remote Sensing of Hydrological Changes in Tian-e-Zhou Oxbow Lake, an Ungauged Area of the Yangtze River Basin.
Remote Sensing, 2018

Scalable coding of 3D holoscopic image by using a sparse interlaced view image set and disparity map.
Multimedia Tools Appl., 2018

An improved SAO network-based method for technology trend analysis: A case study of graphene.
J. Informetrics, 2018

Biorthogonal Fourier transform for multichirp-rate signal detection over dispersive wireless channel.
EURASIP J. Wireless Comm. and Networking, 2018

Image Inpainting using Block-wise Procedural Training with Annealed Adversarial Counterpart.
CoRR, 2018

On the effectiveness of Monte Carlo for initial uncertainty forecasting in nonlinear dynamical systems.
Automatica, 2018

Normalized face image generation with perceptron generative adversarial networks.
Proceedings of the IEEE 4th International Conference on Identity, 2018

A Left-Looking Selected Inversion Algorithm and Task Parallelism on Shared Memory Systems.
Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region, 2018

2017
TensorBeat: Tensor Decomposition for Monitoring Multiperson Breathing Beats with Commodity WiFi.
ACM TIST, 2017

A Fault-Injection Strategy for Traction Drive Control Systems.
IEEE Trans. Industrial Electronics, 2017

Efficient Method for Scattering From Cylindrical Components of Vegetation and Its Potential Application to the Determination of Effective Permittivity.
IEEE Trans. Geoscience and Remote Sensing, 2017

Bit allocation for 3D video coding based on lagrangian multiplier adjustment.
Sig. Proc.: Image Comm., 2017

An Adaptive S-Method to Analyze Micro-Doppler Signals for Human Activity Classification.
Sensors, 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Security and Communication Networks, 2017

Requirement-oriented core technological components' identification based on SAO analysis.
Scientometrics, 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive and Mobile Computing, 2017

Application of VPM for Scattering From Tapered Cylindrical Components of Vegetation.
IEEE Geosci. Remote Sensing Lett., 2017

Robotic grasping using visual and tactile sensing.
Inf. Sci., 2017

A computational intelligent approach to multi-factor analysis of violent crime information system.
Enterprise IS, 2017

A new formula for the decycling number of regular graphs.
Discrete Mathematics, 2017

Adaptive Bit Allocation for 3D Video Coding.
CSSP, 2017

Image Inpainting using Multi-Scale Feature Image Translation.
CoRR, 2017

Shape Inpainting using 3D Generative Adversarial Network and Recurrent Convolutional Networks.
CoRR, 2017

TensorBeat: Tensor Decomposition for Monitoring Multi-Person Breathing Beats with Commodity WiFi.
CoRR, 2017

BRGP: a balanced RDF graph partitioning algorithm for cloud storage.
Concurrency and Computation: Practice and Experience, 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Computers & Electrical Engineering, 2017

Pricing, collecting and contract design in a reverse supply chain with incomplete information.
Computers & Industrial Engineering, 2017

The evolutionary dynamics of China's electric vehicle industry - Taxes vs. subsidies.
Computers & Industrial Engineering, 2017

LLR: a latent low-rank approach to colocalizing genetic risk variants in multiple GWAS.
Bioinformatics, 2017

A Multi-Perspective Method for Analysis of Cooperative Behaviors Among Industrial Devices of Smart Factory.
IEEE Access, 2017

Joint detection and decoding of polar-coded SCMA systems.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

A 3-Layer Method for Analysis of Cooperative Behaviors of Physical Devices in Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

CNN oriented fast QTBT partition algorithm for JVET intra coding.
Proceedings of the 2017 IEEE Visual Communications and Image Processing, 2017

The analysis on college students' physical fitness testing data - two cases study.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Learning to detect slip for stable grasping.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Daily metro origin-destination pattern recognition using dimensionality reduction and clustering methods.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Semantic boundary refinement by joint inference from edges and regions.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Shape Inpainting Using 3D Generative Adversarial Network and Recurrent Convolutional Networks.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Realistic Dynamic Facial Textures from a Single Image Using GANs.
Proceedings of the IEEE International Conference on Computer Vision, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

Coding of 3D holoscopic image by using spatial correlation of rendered view images.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

FP-MRBP: Fine-grained Parallel MapReduce Back Propagation Algorithm.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

ResBeat: Resilient Breathing Beats Monitoring with Realtime Bimodal CSI Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Optimization Factor Analysis of Large-Scale Join Queries on Different Platforms.
Proceedings of the Database Systems for Advanced Applications, 2017

High-Resolution Image Inpainting Using Multi-scale Neural Patch Synthesis.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

On the transient performance of Monte Carlo simulations for initial uncertainty forecasting.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

A Cooperative Co-evolutionary Approach for Large Scale Frequency Assignment Problem in TD-SCDMA.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Scattering From Inhomogeneous Dielectric Cylinders With Finite Length.
IEEE Trans. Geoscience and Remote Sensing, 2016

Fast depth map coding based on virtual view quality.
Sig. Proc.: Image Comm., 2016

3D holoscopic image coding scheme using HEVC with Gaussian process regression.
Sig. Proc.: Image Comm., 2016

Generalized Preconditioned Locally Harmonic Residual Method for Non-Hermitian Eigenproblems.
SIAM J. Scientific Computing, 2016

A Thick-Restart Lanczos Algorithm with Polynomial Filtering for Hermitian Eigenvalue Problems.
SIAM J. Scientific Computing, 2016

A new method to deduce counterexamples in secure routing protocols based on strand space model.
Security and Communication Networks, 2016

Trace-Penalty Minimization for Large-Scale Eigenspace Computation.
J. Sci. Comput., 2016

A Model Reference Adaptive Control/PID Compound Scheme on Disturbance Rejection for an Aerial Inertially Stabilized Platform.
J. Sensors, 2016

Analytical Model for Key Electrical Parameter of Superjunction VDMOS.
J. Low Power Electronics, 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Systems, 2016

Mining multiplex power-law distributions and retweeting patterns on twitter.
Journal of Intelligent and Fuzzy Systems, 2016

Position based key exchange: defnitions and implementations.
J. Comm. Inform. Networks, 2016

CsSNP: A Web-Based Tool for the Detecting of Comparative Segments SNPs.
Journal of Computational Biology, 2016

Perceptions of presidential candidates' personalities in twitter.
JASIST, 2016

A note on graph proper total colorings with many distinguishing constraints.
Inf. Process. Lett., 2016

Bounded synchronization of coupled Kuramoto oscillators with phase lags via distributed impulsive control.
Neurocomputing, 2016

Time-varying formation tracking of multiple manipulators via distributed finite-time control.
Neurocomputing, 2016

An asynchronous Geoprocessing Workflow and its application to an Antarctic ozone monitoring and mapping service.
Int. J. Digital Earth, 2016

High-Resolution Image Inpainting using Multi-Scale Neural Patch Synthesis.
CoRR, 2016

A hybrid approach for cooperative output regulation with sampled compensator.
CoRR, 2016

DeepSymmetry: Joint Symmetry and Depth Estimation using Deep Neural Networks.
CoRR, 2016

Time-varying formation tracking of multiple manipulators via distributed finite-time control.
CoRR, 2016

Task-space coordinated tracking of multiple heterogeneous manipulators via controller-estimator approaches.
CoRR, 2016

A grid based simulation environment for agent-based models with vast parameter spaces.
Cluster Computing, 2016

Novel high voltage RESURF AlGaN/GaN HEMT with charged buffer layer.
SCIENCE CHINA Information Sciences, 2016

Coincidence condition of two Bézier curves of an arbitrary degree.
Computers & Graphics, 2016

Adjacent vertex distinguishing total colorings of graphs with four distinguishing constraints.
Ars Comb., 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Pinscreen: 3D avatar from a single image.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016 - Emerging Technologies, 2016

Interference Modeling and Analysis in Heterogeneous Small-Cell Networks.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Stochastic Geometry Interference Model for 5G Heterogeneous Network.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

An intensive security architecture with multi-controller for SDN.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Polarimetric scattering from inhomogeneous dielectric cylinders of arbitrary finite length.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Depth map coding based on virtual view quality.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Mining and Modeling the Information Propagation in an Email Communication Network.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Research on Visualization Techniques in Large Scale Virtual Battlefield.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Efficient hardware architecture of deterministic MPA decoder for SCMA.
Proceedings of the 2016 IEEE Asia Pacific Conference on Circuits and Systems, 2016

Efficient hardware architecture of deterministic MPA decoder for SCMA.
Proceedings of the 2016 IEEE Asia Pacific Conference on Circuits and Systems, 2016

Convolutional neural networks at the interface of physical and digital data.
Proceedings of the 2016 IEEE Applied Imagery Pattern Recognition Workshop, 2016

2015
Resource Allocation for Semi-Elastic Applications With Outage Constraints in Cellular Networks.
IEEE Trans. Vehicular Technology, 2015

A Novel Coordinated Connection Access Control and Resource Allocation Framework for 4G Wireless Networks.
IEEE/ACM Trans. Netw., 2015

Iterative companding transform and filtering for reducing PAPR of OFDM signal.
IEEE Trans. Consumer Electronics, 2015

A Proximal Gradient Method for Ensemble Density Functional Theory.
SIAM J. Scientific Computing, 2015

Protocol Derivation System for the Needham-Schroeder family.
Security and Communication Networks, 2015

Provable ownership of files in deduplication cloud storage.
Security and Communication Networks, 2015

Remotely Sensed Trajectory Analysis of Channel Migration in Lower Jingjiang Reach during the Period of 1983-2013.
Remote Sensing, 2015

Self-orienting the cameras for maximizing the view-coverage ratio in camera sensor networks.
Pervasive and Mobile Computing, 2015

CAUSA 2.0: accurate and consistent evolutionary analysis of proteins using codon and amino acid unified sequence alignments.
PeerJ PrePrints, 2015

An Optimized Super-Junction VDMOS with Breakdown Voltage Over 600 V.
J. Low Power Electronics, 2015

An information guided framework for simulated annealing.
J. Global Optimization, 2015

A projected preconditioned conjugate gradient algorithm for computing many extreme eigenpairs of a Hermitian matrix.
J. Comput. Physics, 2015

Self-Binding Peptides: Folding or Binding?
Journal of Chemical Information and Modeling, 2015

Feature selection for classification with class-separability strategy and data envelopment analysis.
Neurocomputing, 2015

Advertising and Pricing Decisions in a Manufacturer-Retailer Channel with Demand and Cost Disruptions.
IJISSCM, 2015

A Brownian Agent Model for Analyzing Changes in a Nation's Product Space Structure.
IJIIT, 2015

Exact Hybrid Covariance Thresholding for Joint Graphical Lasso.
CoRR, 2015

Learning Scale Free Network by Node Specific Degree Prior.
CoRR, 2015

Universally composable secure positioning in the bounded retrieval model.
SCIENCE CHINA Information Sciences, 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc & Sensor Wireless Networks, 2015

A Smart Work Performance Measurement System for Police Officers.
IEEE Access, 2015

Virtual view distortion estimation for depth map coding.
Proceedings of the 2015 Visual Communications and Image Processing, 2015

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

Exact Hybrid Covariance Thresholding for Joint Graphical Lasso.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

Travelers' Risk Attitude Classification Method Based on Cumulative Prospect Theory and Experimental Results.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Semantic-Based Technology Trend Analysis.
Proceedings of the 10th International Conference on Intelligent Systems and Knowledge Engineering, 2015

A passive CMOS low-pass filter for high speed and high SNDR applications.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

FreshBreeze: A Data Flow Approach for Meeting DDDAS Challenges.
Proceedings of the International Conference on Computational Science, 2015

Research on image recognition method of foreign fibers in lint.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Based on the support vector machine for LUCC research in Binchuan of Yunnan Province.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

An evaluation of Monte Carlo for nonlinear initial uncertainty propagation in Keplerian mechanics.
Proceedings of the 18th International Conference on Information Fusion, 2015

Mining multiplex power-law distributions and retweeting patterns on twitter.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Using Personal Traits For Brand Preference Prediction.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

A Formal Approach for Modeling and Verification of Distributed Systems.
Proceedings of the Cloud Computing - 6th International Conference, 2015

A new hybrid error concealment for multi-view video.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
A network traffic flow model for motorway and urban highways.
JORS, 2014

Research and Implementation of Low Cost Arc Fault Circuit Interrupter.
JNW, 2014

Study on Supply Chain Disruption Management under Service Level Dependent Demand.
JNW, 2014

A new smoothness indicator for improving the weighted essentially non-oscillatory scheme.
J. Comput. Physics, 2014

A human-computer cooperative particle swarm optimization based immune algorithm for layout design.
Neurocomputing, 2014

Energy Efficiency Oriented Scheduling for Heterogeneous Cloud Systems.
IJGHPC, 2014

Feature selection for classification with class-separability strategy and data envelopment analysis.
CoRR, 2014

Low-rank SIFT: An Affine Invariant Feature for Place Recognition.
CoRR, 2014

A multiscale approach to network event identification using geolocated twitter data.
Computing, 2014

Direct simulation of the influence of the pore structure on the diffusion process in porous media.
Computers & Mathematics with Applications, 2014

Numerical simulation on the effect of welding parameters on welding residual stresses in T92/S30432 dissimilar welded pipe.
Advances in Engineering Software, 2014

Translating surveys to surveillance on social media: methodological challenges & solutions.
Proceedings of the ACM Web Science Conference, 2014

Connectivity-based virtual potential field localization in wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

A-R Exploit: An Automatic ROP Exploit Based on Long Sequence.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Vehicles Congestion Control in Transport Networks Using an Adaptive Weight Model.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Unsupervised broadcast news story segmentation using distance dependent Chinese restaurant processes.
Proceedings of the IEEE International Conference on Acoustics, 2014

A Grid Based Simulation Environment for Parallel Exploring Agent-Based Models with Vast Parameter Space.
Proceedings of the Human Centered Computing - First International Conference, 2014

Hyper-heuristic genetic algorithm for solving frequency assignment problem in TD-SCDMA.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Modeling the information propagation in an email communication network using an agent-based approach.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

Network Redundancy Elimination by Dynamic Buffer Allocation.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

ProvenanceLens: Service provenance management in the cloud.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

The University of Iowa at CLEF 2014: eHealth Task 3.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

Beyond Monte Carlo for the initial uncertainty propagation problem.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Downlink user selection and resource allocation for semi-elastic flows in an OFDM cell.
Wireless Networks, 2013

Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
IEEE Trans. Information Forensics and Security, 2013

A Combinatorial Perspective of the Protein Inference Problem.
IEEE/ACM Trans. Comput. Biology Bioinform., 2013

Unicorn: A System for Searching the Social Graph.
PVLDB, 2013

A Structural Method for Online Sketched Symbol Recognition.
JSW, 2013

Framework of A Hybrid Image Compression Algorithm for View-dependent Visualization.
JSW, 2013

Biomacromolecular quantitative structure-activity relationship (BioQSAR): a proof-of-concept study on the modeling, prediction and interpretation of protein-protein binding affinity.
Journal of Computer-Aided Molecular Design, 2013

Power and rate allocation for video conferencing in cellular networks.
EURASIP J. Wireless Comm. and Networking, 2013

Investigation of ecological factors controlling quality of flue-cured tobacco (Nicotiana tabacum L.) using classification methods.
Ecological Informatics, 2013

A Brownian Agent Model for Analyzing Changes in Product Space Structure in China.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013

Solving Road-Network Congestion Problems by a Multi-objective Optimization Algorithm with Brownian Agent Model.
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013

A 12-bit 200KS/s SAR ADC with a mixed switching scheme and integer-based split capacitor array.
Proceedings of the IEEE 11th International New Circuits and Systems Conference, 2013

An LTE transmitter using a class-A/B power mixer.
Proceedings of the 2013 IEEE International Solid-State Circuits Conference, 2013

Coordinated 4G connection access control and resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

Sharpness for texture retrieval in multiscale domain.
Proceedings of the International Conference on Advances in Computing, 2013

Neighbor Diversification-Based Collaborative Filtering for Improving Recommendation Lists.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Rough-fuzzy C-means using information entropy for discretized violent crimes data.
Proceedings of the 13th International Conference on Hybrid Intelligent Systems, 2013

A Server Friendly File Synchronization Mechanism for Cloud Storage.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

CATS: Characterizing automation of Twitter spammers.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

NOMAD: Towards non-intrusive moving-target defense against web bots.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

3D Reconstruction through Measure Based Image Selection.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Resource allocation for mobile video conferencing.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques.
IEEE Trans. Information Forensics and Security, 2012

Peptide Reranking with Protein-Peptide Correspondence and Precursor Peak Intensity Information.
IEEE/ACM Trans. Comput. Biology Bioinform., 2012

Pricing and production decisions in dual-channel supply chains with demand disruptions.
Computers & Industrial Engineering, 2012

Pattern-Oriented Inverse Simulation for Analyzing Social Problems: Family Strategies in Civil Service Examination in Imperial China.
Advances in Complex Systems, 2012

Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A hierarchical contour method for automatic 3D city reconstruction from LiDAR data.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Multi-knowledge extraction from violent crime datasets using swarm rough algorithm.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

A high quality event capture scheme for WSN-based structural health monitoring.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Characterization of linear network coding for pollution detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Parsing façade with rank-one approximation.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

Lexical and Machine Learning Approaches Toward Online Reputation Management.
Proceedings of the CLEF 2012 Evaluation Labs and Workshop, 2012

Detecting money-stealing apps in alternative Android markets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Automatic Adverse Drug Events Detection Using Letters to the Editor.
Proceedings of the AMIA 2012, 2012

2011
Application of fuzzy control method in a tunnel lighting system.
Mathematical and Computer Modelling, 2011

An Automatic Computer-Aided Detection Scheme for Pneumoconiosis on Digital Chest Radiographs.
J. Digital Imaging, 2011

A New Evaluation Model for Security Protocols.
JCM, 2011

Efficient greek estimation in generic swap-rate market models.
Algorithmic Finance, 2011

The University of Iowa at TREC 2011: Microblogs, Medical Records and Crowdsourcing.
Proceedings of The Twentieth Text REtrieval Conference, 2011

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Energy efficient clustering for WSN-based structural health monitoring.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Resource Allocation for Semi-Elastic Applications in Wireless Networks.
Proceedings of the Global Communications Conference, 2011

A security testing approach for WSN protocols based on object-oriented attack model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Optimization of Vehicle Routing Problem Based on Max-Min Ant System with Parameter Adaptation.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An Automated Black-box Testing Approach for WSN Security Protocols.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Protocol Derivation System for the Needham-Schroeder family.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Power and rate allocation for video conferencing in cellular networks.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

A brief review of signal processing issues in mass spectrometry-based proteomics studies.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Speed Sensorless Control for Induction Motor Drives with AI-Based MRAS.
PhD thesis, 2010

Linear and nonlinear multivariate regressions for determination sugar content of intact Gannan navel orange by Vis-NIR diffuse reflectance spectroscopy.
Mathematical and Computer Modelling, 2010

Optimization-Based Peptide Mass Fingerprinting for Protein Mixture Identification.
Journal of Computational Biology, 2010

An efficient simplification and real-time rendering algorithm for large-scale terrain.
IJCAT, 2010

An accessibility measure for the combined travel demand model.
SCIENCE CHINA Information Sciences, 2010

Automatic Control System for Highway Tunnel Lighting.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

LABTA: An Agent-Based Intelligent Teaching Assistant for Experiment Courses.
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010

The implementation of Wavelet Transform based on log-domain circuits.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Pattern-oriented inverse simulation for agent-based modeling: an analysis of family strategies.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Attacks and design of image recognition CAPTCHAs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Fully Integrated Seven-Order Frequency-Range Quadrature Sinusoid Signal Generator.
IEEE Trans. Instrumentation and Measurement, 2009

Amperometric Electrochemical Microsystem for a Miniaturized Protein Biosensor Array.
IEEE Trans. Biomed. Circuits and Systems, 2009

Agent-Based Simulation on Women's Role in a Family Line on Civil Service Examination in Chinese History.
J. Artificial Societies and Social Simulation, 2009

Sensitivity analysis of the combined travel demand model with applications.
European Journal of Operational Research, 2009

Bi-level programming model and hybrid genetic algorithm for flow interception problem with customer choice.
Computers & Mathematics with Applications, 2009

Comparison of public peak detection algorithms for MALDI mass spectrometry data analysis.
BMC Bioinformatics, 2009

Multi-service transmission in multiuser cooperative networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Sentiment Clustering: A Novel Method to Explore in the Blogosphere.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

Optimization-Based Peptide Mass Fingerprinting for Protein Mixture Identification.
Proceedings of the Research in Computational Molecular Biology, 2009

A Seamless Representation of Multi-scale Clouds.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Two-Phase Dynamic Reactive Power Optimization Based on Improved Genetic Algorithm.
Proceedings of the Advances in Neural Networks, 2009

Sinusoid Signal Generator for On-chip Impedance Spectroscopy.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Impedance-to-digital Converter for Sensor Array Microsystems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Chinese Blog Clustering by Hidden Sentiment Factors.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
Process/Temperature Variation Tolerant Precision Signal Strength Indicator.
IEEE Trans. on Circuits and Systems, 2008

Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wireless Comm. and Networking, 2008

Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Comparison of Induction Motor Speed Estimation Using Conventional MRAS and an AI-Based MRAS Parallel System.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

A Weighted Proportional Fair scheduling to maximize best-effort service utility in multicell network.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

2007
On the optimum capacity of capacity expansion problems.
Math. Meth. of OR, 2007

A sequential subspace learning method and its application to dynamic texture analysis.
Applied Mathematics and Computation, 2007

Precise RSSI with High Process Variation Tolerance.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Amperometric Readout and Electrode Array Chip for Bioelectrochemical Sensors.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

A Research on Issues Related to RFID Security and Privacy.
Proceedings of the Integration and Innovation Orient to E-Society, 2007

A Fuzzy Multi-objective Programming for Optimization of Reverse Logistics for Solid Waste through Genetic Algorithms.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Supply Chain Network Design Model for Deteriorating Items.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Models and algorithms for the screen line-based traffic-counting location problems.
Computers & OR, 2006

A Privacy Policy of P3P Based on Relational Database.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Study on Decision Model of Bottleneck Capacity Expansion with Fuzzy Demand.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Two Artificial Intelligence Heuristics in Solving Multiple Allocation Hub Maximal Covering Problem.
Proceedings of the Intelligent Computing, 2006

2004
Low-IF complex filter with transconductance networks.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Accurate Web Service Composition Using Global Data Schema.
Proceedings of the International Conference on Internet Computing, 2004

2003
Time-Memory Trade-Offs Using Sparse Matrix Methods for Large-Scale Eigenvalue Problems.
Proceedings of the Computational Science and Its Applications, 2003

2002
Large-Scale Normal Coordinate Analysis on Distributed Memory Parallel Systems.
IJHPCA, 2002

2001
Large-Scale Normal Coordinate Analysis for Molecular Structures.
SIAM J. Scientific Computing, 2001

A class of bottleneck expansion problems.
Computers & OR, 2001

1999
A Parallel Library for Large-Scale Sparse Eigenvalue Calculation on NEC SX-4.
Proceedings of the Ninth SIAM Conference on Parallel Processing for Scientific Computing, 1999

1998
ARPACK users' guide - solution of large-scale eigenvalue problems with implicitly restarted Arnoldi methods.
Software, environments, tools, SIAM, ISBN: 978-0-89871-407-4, 1998

1995
A column generation method for inverse shortest path problems.
Math. Meth. of OR, 1995

1992
Implementation of the Level 2 and 3 BLAS on the CRAY Y-MP and the CRAY-2.
The Journal of Supercomputing, 1992


  Loading...