Hua Chen

According to our database1, Hua Chen authored at least 180 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Periodic charging planning for a mobile WCE in wireless rechargeable sensor networks based on hybrid PSO and GA algorithm.
Appl. Soft Comput., 2019

2018
A Spectral Method for Stable Bispectrum Inversion With Application to Multireference Alignment.
IEEE Signal Process. Lett., 2018

Semantic image retrieval for complex queries using a knowledge parser.
Multimedia Tools Appl., 2018

A Novel CMOS CCCII with Wide Tunable Rx and Its Application.
Journal of Circuits, Systems, and Computers, 2018

Design of a broadband Ka-band MMIC LNA using deep negative feedback loop.
IEICE Electronic Express, 2018

Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.
IACR Cryptology ePrint Archive, 2018

Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptology ePrint Archive, 2018

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
SCIENCE CHINA Information Sciences, 2018

Defect characterization of amorphous silicon thin film solar cell based on low frequency noise.
SCIENCE CHINA Information Sciences, 2018

Circulating Current Analysis and Suppression for Module Grid-Connected Inverters Under Unbalanced Conditions.
IEEE Access, 2018

How Key Stakeholders Perceive a Smart Mobile Integrated Care System for the Elderly.
Proceedings of the Nursing Informatics 2018, 2018

Making the CARE Comprehensive Geriatric Assessment as the Core of a Total Mobile Long Term Care Support System in China.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

Block Modelling and Learning for Structure Analysis of Networks with Positive and Negative Links.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Data-Driven Vulnerability Pattern Analysis for Fuzzing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Lattice-Based Fault Attacks Against ECMQV.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

On Model-free Reinforcement Learning for Switched Linear Systems: A Subspace Clustering Approach.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Energy Management Problems Under Uncertainties for Grid-Connected Microgrids: A Chance Constrained Programming Approach.
IEEE Trans. Smart Grid, 2017

Isotropic Riemann Solver for a Nonconformal Discontinuous Galerkin Pseudospectral Time-Domain Algorithm.
IEEE Trans. Geoscience and Remote Sensing, 2017

Intruder Isolation on a General Road Network Under Partial Information.
IEEE Trans. Contr. Sys. Techn., 2017

Fractional-order gradient descent learning of BP neural networks with Caputo derivative.
Neural Networks, 2017

An improved extremal optimization based on the distribution knowledge of candidate solutions.
Natural Computing, 2017

On the Feasibility of Interference Alignment in the Cellular Network.
TIIS, 2017

0.3-4.4 GHz wideband CMOS frequency divide-by-1.5 with optimized CML-XOR gate.
IEICE Electronic Express, 2017

Efficient method of two-dimensional DOA estimation for coherent signals.
EURASIP J. Wireless Comm. and Networking, 2017

Two-dimensional DOA estimation of coherent sources using two parallel uniform linear arrays.
EURASIP J. Wireless Comm. and Networking, 2017

An improved pulse sequence and inversion algorithm of T2 spectrum.
Computer Physics Communications, 2017

An intelligent annotation-based image retrieval system based on RDF descriptions.
Computers & Electrical Engineering, 2017

On weak topology for optimal control of switched nonlinear systems.
Automatica, 2017

Convergence analysis of BP neural networks via sparse response regularization.
Appl. Soft Comput., 2017

Quantum-inspired evolutionary algorithm for large-scale MIMO detection.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Adaptive Length Sliding Window-Based Network Coding for Energy Efficient Algorithm in MANETs.
Proceedings of the Network and Parallel Computing, 2017

A Caputo-Type Fractional-Order Gradient Descent Learning of BP Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

A cruise control for electric vehicle based on ADRC controller considering driver's behavior.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A pupil tracking method based on particle filter.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

An Efficient Algorithm for Complex-Valued Neural Networks Through Training Input Weights.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Propagation characteristics in corridor scenario about typical radio wave.
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017

My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Robust distributed volt/var control of distribution systems.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

2016
Semiparametric Inference of the Complier Average Causal Effect with Nonignorable Missing Outcomes.
ACM TIST, 2016

Recognition of the Temperature Condition of a Rotary Kiln Using Dynamic Features of a Series of Blurry Flame Images.
IEEE Trans. Industrial Informatics, 2016

Energy-efficient hybrid split capacitor switching scheme for SAR ADCs.
IEICE Electronic Express, 2016

Joint inversion of T1-T2 spectrum combining the iterative truncated singular value decomposition and the parallel particle swarm optimization algorithms.
Computer Physics Communications, 2016

Single event upset rate modeling for ultra-deep submicron complementary metal-oxide-semiconductor devices.
SCIENCE CHINA Information Sciences, 2016

A sliding-mode-like design for model-free tracking of nonholonomic mobile robots.
Proceedings of the 14th International Workshop on Variable Structure Systems, 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Improved Fault Analysis on SIMON Block Cipher Family.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Performance Analysis of Sliding Window Network Coding in MANET.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

2015
A Genetic Algorithm for Energy-Efficient Based Multipath Routing in Wireless Sensor Networks.
Wireless Personal Communications, 2015

Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

The latest assessment for the reprocessed GDR product of HY-2A altimeter.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
A Novel Network Coding and Multi-path Routing Approach for Wireless Sensor Network.
Wireless Personal Communications, 2014

An Area-Efficient 96.5%-Peak-Efficiency Cross-Coupled Voltage Doubler With Minimum Supply of 0.8 V.
IEEE Trans. on Circuits and Systems, 2014

Wireless multicasting of video signals based on distributed compressed sensing.
Sig. Proc.: Image Comm., 2014

Efficient High-Rate Satellite Clock Estimation for PPP Ambiguity Resolution Using Carrier-Ranges.
Sensors, 2014

Multiscaling coefficients Technique for gain error Background Calibration in Pipelined ADC.
Journal of Circuits, Systems, and Computers, 2014

A dithering Technique for Sha_less Pipelined ADC.
Journal of Circuits, Systems, and Computers, 2014

A Signal Subspace Interference Alignment Scheme with Sum Rate Maximization and Altruistic-Egoistic Bayesian Gaming.
TIIS, 2014

SLNR-based User Scheduling in Multi-cell networks: from Multi-antenna to Large-Scale Antenna System.
TIIS, 2014

State-feedback stabilisation for stochastic non-holonomic mobile robots with uncertain visual servoing parameters.
Int. J. Systems Science, 2014

A comprehensive study of three dimensional tolerance analysis methods.
Computer-Aided Design, 2014

Recognition of sintering state in rotary kiln using a robust extreme learning machine.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

A Population-Based Extremal Optimization Algorithm with Knowledge-Based Mutation.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014

Towards Thwarting Data Leakage with Memory Page Access Interception.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Continuous-time intruder isolation using Unattended Ground Sensors on graphs.
Proceedings of the American Control Conference, 2014

2013
Efficient Media Access Control and Distributed Channel-aware Scheduling for Wireless Ad-Hoc Networks.
PhD thesis, 2013

Should Managers Use Team-Based Contests?
Management Science, 2013

Voxel Primitive Based Modeling and Simulating Method for Surface Micromachining Technology.
JSW, 2013

Distributed Opportunistic Scheduling for Wireless Ad-Hoc Networks with Block-Fading Model.
IEEE Journal on Selected Areas in Communications, 2013

Regularity of Traveling Free Surface Water Waves with Vorticity.
J. Nonlinear Science, 2013

Global Practical Stabilization for Non-holonomic Mobile Robots with Uncalibrated Visual Parameters by Using a Switching Controller.
IMA J. Math. Control & Information, 2013

A transient-improved low-dropout regulator with nested flipped voltage follower structure.
I. J. Circuit Theory and Applications, 2013

Queuing based optimal scheduling mechanism for QoE provisioning in cognitive radio relaying network.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

A General Method to Evaluate the Correlation of Randomness Tests.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

An Improved Wireless Video Multicast Based on Compressed Sensing.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Test Case Generation Technique for VMM Fuzzing.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

An Active Distributed Storage Strategy in Hybrid Clustered Opportunistic Networks.
Proceedings of the Pervasive Computing and the Networked World, 2013

Social-Based Hybrid Dissemination Strategy in Heterogeneous Opportunistic Networks.
Proceedings of the Pervasive Computing and the Networked World, 2013

An Incremental Chan-Vese Model for Fast Medical Image Segmentation.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

Integral Based Fault Attack on LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Finite-time stabilization of a class for nonlinear systems with dynamic feedback subject to input saturation.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Towards sharing disks between host OS and virtual machine with volume snapshot technology.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Intersample ripple resulting from discrete-time feedforward control.
Proceedings of the American Control Conference, 2013

2012
A Fast-Response Pseudo-PWM Buck Converter With PLL-Based Hysteresis Control.
IEEE Trans. VLSI Syst., 2012

Personalized Tooth Shape Estimation From Radiograph and Cast.
IEEE Trans. Biomed. Engineering, 2012

State-feedback stabilisation for stochastic non-holonomic systems with Markovian switching.
IJMIC, 2012

Network Coding-Based On-Demand Multipath Routing in MANET.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Reversing Engineering Data Structures in Binary Programs: Overview and Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Realizing Geometry Surface Modeling of Complicated Geological Object Based on Delaunay Triangulation.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

Bandwidth management for mobile media delivery.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A distributed opportunistic scheduling protocol for multi-channel wireless ad-hoc networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Designing Multiperson Tournaments with Asymmetric Contestants: An Experimental Study.
Management Science, 2011

Assigning real-time tasks to heterogeneous processors by applying ant colony optimization.
J. Parallel Distrib. Comput., 2011

Performance analysis of traffic behavior in base station network - from complex network's perspective.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Towards Detecting Thread Deadlock in Java Programs with JVM Introspection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Influencing Factors of Sports Consumption: Provincial Evidence in China.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Distributed Medium Access and Opportunistic Scheduling for Ad-Hoc Networks: An Analysis of the Constant Access Time Problem.
Proceedings of the Global Communications Conference, 2011

Communication network challenges for collaborative vehicles.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers.
JDCTA, 2010

An Efficient Blind Ring Signature Scheme without Pairings.
Proceedings of the Web-Age Information Management, 2010

Fractal and XML based watermarking for digital images.
Proceedings of the Second International Conference on Internet Multimedia Computing and Service, 2010

Impact of Network Information on the Management of Library E-Resources.
Proceedings of the E-business Technology and Strategy - International Conference, 2010

Plasmid DNA computing model of 0-1 programming problem.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

A Model for Cooperative Design Based on Multi-Agent System.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

2009
Performance optimization for web caching based on input modeling.
J. Comput. Meth. in Science and Engineering, 2009

A Novel ID-Based Anonymous Signcryption Scheme.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Provable Secure ID-Based Anonymous Signcryption Scheme.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

Load Balancing in Server Consolidation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Comment on a Digital Signature Scheme with Using Self-Certified Public Keys.
Proceedings of the International Forum on Information Technology and Applications, 2009

An Entropy-Based Fuzzy Controllers QoS Routing Algorithm in MANET.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Research on Properties of Level Space in the Level Wise Search Algorithm.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Application of Rough Set Theory to Multi-factor Medium and Long-period Runoff Prediction in Danjing Kou Reservoir.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Simplified Learning Algorithm of Incremental Bayesian.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Heuristic Method for Web-Service Program Security Testing.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

A Special Proxy Signature Scheme with Multi-warrant.
Proceedings of the Advances in Computer Science, 2009

Efficient and Provably Secure Self-certified Signature Scheme.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Data-Flow Based Analysis of Java Bytecode Vulnerability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Web Cache Adaptive Replacement Policy by LRU and LFU.
Proceedings of the 17th International Conference on Software Engineering and Data Engineering (SEDE-2008), June 30, 2008

Fine-Grained Security Model in Multi-Agent Communication.
Proceedings of the 2008 International Conference on Internet Computing, 2008

Application of Relevance Vector Machine to Downscale GCMs to Runoff in Hydrology.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Framework to Evaluate and Predict Performances in Virtual Machines Environment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Novel Technique for Improving Temperature Independency of Ring-ADC.
Proceedings of the Design, Automation and Test in Europe, 2008

2007
Vertically Aligned Carbon Nanofiber Architecture as a Multifunctional 3-D Neural Electrical Interface.
IEEE Trans. Biomed. Engineering, 2007

Pbqm: a Priority-Based Queue Management Method for Wireless Sensor Networks.
I. J. Information Acquisition, 2007

A Measure of the Girth Histogram for Improved Girth-Conditioning Construction of LDPC Codes.
IEEE Communications Letters, 2007

Structural Learning About Independence Graphs from Multiple Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Quasi-Static Energy Recovery Logic with Single Power-Clock Supply.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Cycle Accurate Verification of Synchronous Sequential Circuit Specified with UML 2.0 Modelling.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Cutting Tool Information Tracking and Management Technology for Manufacturing Execute System.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Research and Realization of Manufacturing Resource Information Integration and Sharing Based on XML Technology.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

The Predictive Control of Sintering Temperature in Rotary Kiln Based on Image Feedback and Soft Computing.
Proceedings of the Third International Conference on Natural Computation, 2007

Differential Fault Analysis on CLEFIA.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Hidden Markov Models with Multiple Observers.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

Distributed Density Estimation Using Non-parametric Statistics.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

An Effective Genetic Algorithm for Self-Inverse S-Boxes.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Dual Optimization Model of Fixture Design for the Thin-walled Workpiece.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

A Matrix Algorithm forWeb Cache Pre-fetching.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Real-time video object extraction for mixed reality applications.
PhD thesis, 2006

Identification of the Proliferation/Differentiation Switch in the Cellular Network of Multicellular Organisms.
PLoS Computational Biology, 2006

A Density Control Algorithm for Surveillance Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Object Detection for a Mobile Robot Using Mixed Reality.
Proceedings of the Interactive Technologies and Sociotechnical Systems, 2006

Novel view generation for a real-time captured video object.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2006

"Mixed Reality"- kann der Computer zum echten Helfer werden?
Proceedings of the Echtzeitsysteme im Alltag, 2006

Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

QoS Multicast Routing Algorithm in MANET: An Entropy-Based GA.
Proceedings of the Computational Intelligence, 2006

XML Security in Certificate Management.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

The Application of XML in the Denotation of Plant Diseases and Insect Pests Information.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

An Entropy-Based Stability QoS Routing with Priority Scheduler in MANET Using Fuzzy Controllers.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

Integrating a Real-Time Captured Object into Mixed Reality.
Proceedings of the 5th International Conference on Cyberworlds (CW 2006), 2006

A P2P Architecture for Supporting Group Communication in CSCW Systems.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Applying Ant Colony Optimization to the partitioned scheduling problem for heterogeneous multiprocessors.
SIGBED Review, 2005

The impact of recent climate fluctuation on potential productivity for crops in North-East China based on GIS technology.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Impacts of climate change on winter wheat production in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A comparison of university of Maryland 1km land cover dataset and a land cover dataset in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

An Intrusion Detection System for AODV.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic Algorithms.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Deployment of a Large-scale Peer-to-Peer Social Network.
Proceedings of the First USENIX Workshop on Real, Large Distributed Systems, 2004

Forest classification based on MODIS time series and vegetation phenology.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Cytotoxicity of Drug-Loaded Nanoparticles and Liposomes Carried by Aerosol "Cluster Bombs" in Lung Cancer Cells.
Proceedings of the 2004 International Conference on MEMS, 2004

An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
Proceedings of the Information Security and Cryptology, 2004

A sintering temperature detection and control method of alumina rotary kiln based on fuzzy data fusion.
Proceedings of the 8th International Conference on Control, 2004

An effective evolutionary strategy for bijective S-boxes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
MPI-CHECK: a tool for checking Fortran 90 MPI programs.
Concurrency and Computation: Practice and Experience, 2003

UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2001
On Existence of Global Solutions and Blow-Up to a System of Reaction-Diffusion Equations Modelling Chemotaxis.
SIAM J. Math. Analysis, 2001

1999
A knowledge-based dynamic job-scheduling in low-volume/high-variety manufacturing.
AI in Engineering, 1999

1998
Polarization Phase-Based Method For Material Classification In Computer Vision.
International Journal of Computer Vision, 1998

Restoration of images distorted by the atmosphere based on searching for Fried parameter.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

1997
New results and measurements related to some tasks in object-oriented dynamic image coding using CNN universal chips.
IEEE Trans. Circuits Syst. Video Techn., 1997

1996
SDL-TRAN - An interactive generator for formal description language SDL.
J. Comput. Sci. Technol., 1996


  Loading...