Jianfeng Wang

According to our database1, Jianfeng Wang authored at least 246 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

Effective approximation of high-dimensional space using neural networks.
J. Supercomput., 2022

A Pipeline Defect Inversion Method With Erratic MFL Signals Based on Cascading Abstract Features.
IEEE Trans. Instrum. Meas., 2022

TBDA-Net: A Task-Based Bias Domain Adaptation Network Under Industrial Small Samples.
IEEE Trans. Ind. Informatics, 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

Convolutional Neural Networks With Gated Recurrent Connections.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Modeling and control of a quadrotor tail-sitter unmanned aerial vehicles.
J. Syst. Control. Eng., 2022

Learning intents behind interactions with high-order graph for session-based intelligent recommendation.
J. Intell. Fuzzy Syst., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

NUWA-Infinity: Autoregressive over Autoregressive Generation for Infinite Visual Synthesis.
CoRR, 2022

Rethinking Bayesian Deep Learning Methods for Semi-Supervised Volumetric Medical Image Segmentation.
CoRR, 2022

ALL-MASK: A Reconfigurable Logic Locking Method for Multicore Architecture with Sequential-Instruction-Oriented Key.
CoRR, 2022

Coarse-to-Fine Vision-Language Pre-training with Fusion in the Backbone.
CoRR, 2022

Detection Hub: Unifying Object Detection Datasets via Query Adaptation on Language Embedding.
CoRR, 2022

GIT: A Generative Image-to-text Transformer for Vision and Language.
CoRR, 2022

The Overlooked Classifier in Human-Object Interaction Recognition.
CoRR, 2022

Learning compatibility knowledge for outfit recommendation with complementary clothing matching.
Comput. Commun., 2022

On the Zero Forcing Number and Spectral Radius of Graphs.
Electron. J. Comb., 2022

Spectral determination of graphs with one positive anti-adjacency eigenvalue.
Appl. Math. Comput., 2022

Spectral determinations and eccentricity matrix of graphs.
Adv. Appl. Math., 2022

Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

NP-Match: When Neural Processes meet Semi-Supervised Learning.
Proceedings of the International Conference on Machine Learning, 2022

An Empirical Study of GPT-3 for Few-Shot Knowledge-Based VQA.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Analytical Study of Stator Tooth Modulation on Electromagnetic Radial Force in Permanent Magnet Synchronous Machines.
IEEE Trans. Ind. Electron., 2021

Slippage-Dependent Teleoperation of Wheeled Mobile Robots on Soft Terrains.
IEEE Robotics Autom. Lett., 2021

Effects of winter climate on delays of high speed passenger trains in Botnia-Atlantica region.
J. Rail Transp. Plan. Manag., 2021

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

Neural networks trained with high-dimensional functions approximation data in high-dimensional space.
J. Intell. Fuzzy Syst., 2021

LLA: Loss-aware label assignment for dense pedestrian detection.
Neurocomputing, 2021

On the eigenvalues of eccentricity matrix of graphs.
Discret. Appl. Math., 2021

Secure deduplication with efficient user revocation in cloud storage.
Comput. Stand. Interfaces, 2021

Verifiable database supporting keyword searches with forward security.
Comput. Stand. Interfaces, 2021

Decoupling Object Detection from Human-Object Interaction Recognition.
CoRR, 2021

Injecting Semantic Concepts into End-to-End Image Captioning.
CoRR, 2021

Scaling Up Vision-Language Pre-training for Image Captioning.
CoRR, 2021

Crossing the Format Boundary of Text and Boxes: Towards Unified Vision-Language Modeling.
CoRR, 2021

Florence: A New Foundation Model for Computer Vision.
CoRR, 2021

UFO: A UniFied TransfOrmer for Vision-Language Representation Learning.
CoRR, 2021

An Empirical Study of Training End-to-End Vision-and-Language Transformers.
CoRR, 2021

Edge Prior Augmented Networks for Motion Deblurring on Naturally Blurry Images.
CoRR, 2021

Is Object Detection Necessary for Human-Object Interaction Recognition?
CoRR, 2021

Adversarial Feature Augmentation and Normalization for Visual Recognition.
CoRR, 2021

Galleon: Reshaping the Square Peg of NFV.
CoRR, 2021

Modeling analysis of ionic polymer-metal composites sensors with various sizes.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

A Novel Path Planning Approach with Bidirectional A* Algorithm Based on Road Characteristics.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

Learning Outfit Compatibility with Graph Attention Network and Visual-Semantic Embedding.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

SEED: Self-supervised Distillation For Visual Representation.
Proceedings of the 9th International Conference on Learning Representations, 2021

Design and Motion Analysis of a Pneumatic Soft Active Structure to Imitate Neck Muscle.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

End-to-End Semi-Supervised Object Detection with Soft Teacher.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Compressing Visual-linguistic Model via Knowledge Distillation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

NICE: Neural Image Commenting with Empathy.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

DSP Enabled, Amplitude Modulation Pilot Tone Based Optical Performance Monitoring in Coherent Systems.
Proceedings of the European Conference on Optical Communication, 2021

DAP: Detection-Aware Pre-Training With Weak Supervision.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

TAP: Text-Aware Pre-Training for Text-VQA and Text-Caption.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

End-to-End Object Detection With Fully Convolutional Network.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

RSG: A Simple but Effective Module for Learning Imbalanced Datasets.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Spallation Analysis of Concrete Under Pulse Load Based on Peridynamic Theory.
Wirel. Pers. Commun., 2020

Learning Context-Aware Outfit Recommendation.
Symmetry, 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

Tied gender condition for facial expression recognition with deep random forest.
J. Electronic Imaging, 2020

Blockchain-based public auditing and secure deduplication with fair arbitration.
Inf. Sci., 2020

Client-side ciphertext deduplication scheme with flexible access control.
Int. J. Comput. Sci. Eng., 2020

Efficient self-adaptive access control for personal medical data in emergency setting.
Int. J. Comput. Sci. Eng., 2020

Statistical inference for the block sparsity of complex-valued signals.
IET Signal Process., 2020

Graphs whose <i>A<sub>α</sub></i> radius does not exceed 2.
Discuss. Math. Graph Theory, 2020

Spectral properties of the eccentricity matrix of graphs.
Discret. Appl. Math., 2020

MiniVLM: A Smaller and Faster Vision-Language Model.
CoRR, 2020

AutoAssign: Differentiable Label Assignment for Dense Object Detection.
CoRR, 2020

Hashing-based Non-Maximum Suppression for Crowded Object Detection.
CoRR, 2020

Blockchain-based multiple groups data sharing with anonymity and traceability.
Sci. China Inf. Sci., 2020

Anchor Box Optimization for Object Detection.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

Pair-Wise Convolution Network with Transformers for Sequential Recommendation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Dynamic Graph Attention-Aware Networks for Session-Based Recommendation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Direct Nonlinear Noise Monitoring for In-Service Signals in Coherent Systems.
Proceedings of the European Conference on Optical Communications, 2020

Boosting Weakly Supervised Object Detection with Progressive Knowledge Transfer.
Proceedings of the Computer Vision - ECCV 2020, 2020

Label Distribution Learning on Auxiliary Label Space Graphs for Facial Expression Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Meeting SLOs in cross-platform NFV.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Towards efficient privacy-preserving encrypted image search in cloud computing.
Soft Comput., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

The maximum PI index of bicyclic graphs with even number of edges.
Inf. Process. Lett., 2019

Multi-device anonymous authentication.
Int. J. Inf. Sec., 2019

Large universe multi-authority attribute-based PHR sharing with user revocation.
Int. J. Comput. Sci. Eng., 2019

On the Eigenvalues Distribution in Threshold Graphs.
Graphs Comb., 2019

Graph energy based on the eccentricity matrix.
Discret. Math., 2019

Enhanced block sparse signal recovery based on q-ratio block constrained minimal singular values.
CoRR, 2019

Learning to Count Objects with Few Exemplar Annotations.
CoRR, 2019

WIDER Face and Pedestrian Challenge 2018: Methods and Results.
CoRR, 2019

The weighted vertex PI index of (<i>n, m</i>)-graphs with given diameter.
Appl. Math. Comput., 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing.
IEEE Access, 2019

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019

Kinematic Teleoperation of Wheeled Mobile Robot With Slippage Compensation on Soft Terrains.
IEEE Access, 2019

Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Facial Motion Prior Networks for Facial Expression Recognition.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Proceedings of the Computer Security - ESORICS 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

High Frequency Residual Learning for Multi-Scale Image Classification.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

Hierarchically Structured Reinforcement Learning for Topically Coherent Visual Story Generation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
First-Person Daily Activity Recognition With Manipulated Object Proposals and Non-Linear Feature Fusion.
IEEE Trans. Circuits Syst. Video Technol., 2018

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018

Verifiable memory leakage-resilient dynamic searchable encryption.
J. High Speed Networks, 2018

An efficient traceable data sharing scheme in cloud computing for mobile devices.
Int. J. High Perform. Comput. Netw., 2018

Efficient VLR group signatures for smart cards.
Int. J. Embed. Syst., 2018

The anti-adjacency matrix of a graph: Eccentricity matrix.
Discret. Appl. Math., 2018

The weighted vertex PI index of bicyclic graphs.
Discret. Appl. Math., 2018

Revisit Multinomial Logistic Regression in Deep Learning: Data Dependent Model Initialization for Image Recognition.
CoRR, 2018

SFace: An Efficient Network for Face Detection in Large Scale Variations.
CoRR, 2018

The impact of organisational support, technical support, and self-efficacy on faculty perceived benefits of using learning management system.
Behav. Inf. Technol., 2018

On the first reformulated Zagreb indices of graphs with a given clique number.
Ars Comb., 2018

Spectral characterizations of graphs with at most two (signless) Laplacian eigenvalues greater than 2.
Ars Comb., 2018

Open problems in the spectral theory of signed graphs.
Art Discret. Appl. Math., 2018

A Hybrid BP-VMP-EP Localization Algorithm for Passive MIMO Radar Networks.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Opportunistic Concurrency Transmission MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Multi-channel Parallel Negotiation MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Multi-Beam Multiple Access Scheme for Uplink Traffic of Wireless Virtual Reality with Millimeter-Wave Analog Beamforming.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

An Associated Deletion Scheme for Multi-copy in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

2017
Facial Age Estimation With Age Difference.
IEEE Trans. Image Process., 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Bounds on the PI index of unicyclic and bicyclic graphs with given girth.
Discret. Appl. Math., 2017

Face Attention Network: An Effective Face Detector for the Occluded Faces.
CoRR, 2017

Oriented Bicyclic Graphs with the First Five Large Skew Energies.
Ars Comb., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

Gated Recurrent Convolution Neural Network for OCR.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

An omnidirectional mobile operating robot based on mecanum wheel.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

An Indoor Precise Positioning Algorithm Using 60GHz Millimeter-Wave Based on the Optimal Path Search.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
A Distance-Computation-Free Search Scheme for Binary Code Databases.
IEEE Trans. Multim., 2016

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Height Profile Estimation of Power Lines Based on Two-Dimensional CSAR Imagery.
IEEE Geosci. Remote. Sens. Lett., 2016

Secure searchable encryption: a survey.
J. Commun. Inf. Networks, 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Sci. Eng., 2016

Model-based target decomposition with the π/4 mode compact polarimetry data.
Sci. China Inf. Sci., 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Study on fine feature description of multi-aspect SAR observations.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs.
Proceedings of the 2016 International Conference on Information Networking, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Optimized Cartesian K-Means.
IEEE Trans. Knowl. Data Eng., 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive Mob. Comput., 2015

Combinatorial Test Suites Generation Method Based on Fuzzy Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2015

Group $K$-Means.
CoRR, 2015

Secure Outsourcing of Modular Exponentiation with Single Untrusted Server.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A novel saliency-based object segmentation method for seriously degenerated images.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Online optimal power control of offshore oil-platform power systems based on interior point and fast branch-bound methods.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A novel stack package solution of AC-DC chip for high-power density adapters.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
A New Method for Multiple Finite-Element Models in Cosimulation With Electrical Circuit Using Machine Multiloop Modeling Scheme.
IEEE Trans. Ind. Electron., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

A 2.5-Mbps, 170-cm transmission distance IntraBody communication receiver front end design and its synchronization technique research.
Proceedings of the IEEE 57th International Midwest Symposium on Circuits and Systems, 2014

Optimized Distances for Binary Code Ranking.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

Online/Offline Attribute Based Signature.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Simplifying HOG arithmetic for speedy hardware realization.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014

2013
Zigbee light link and its applicationss.
IEEE Wirel. Commun., 2013

Oroxylin A Inhibits Hemolysis via Hindering the Self-Assembly of α-Hemolysin Heptameric Transmembrane Pore.
PLoS Comput. Biol., 2013

Security Analysis on a Timestamp-based Remote User Authentication Scheme.
J. Comput., 2013

Signless Laplacian eigenvalues and circumference of graphs.
Discret. Appl. Math., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

The impact of faculty perceived reconfigurability of learning management systems on effective teaching practices.
Comput. Educ., 2013

Almost every complement of a tadpole graph is not chromatically unique.
Ars Comb., 2013

Experimental comparison of terabit nyquist superchannel transmissions based on high and low baud rates.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Order preserving hashing for approximate nearest neighbor search.
Proceedings of the ACM Multimedia Conference, 2013

An efficiency-enhanced wireless power transfer system with segmented transmitting coils for endoscopic capsule.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2012
A Capacitor-Isolated LED Driver With Inherent Current Balance Capability.
IEEE Trans. Ind. Electron., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

3D scene reconstruction by multiple structured-light based commodity depth cameras.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Analysis of QoS Provisioning in Cognitive Radio Networks: A Case Study.
Wirel. Pers. Commun., 2011

Multimedia Cloud Computing.
IEEE Signal Process. Mag., 2011

The Influence of Information Control upon On-line Shopping Behavior.
Int. J. Technol. Hum. Interact., 2011

An Exploratory Study of How Technology Supports Communication in Multilingual Groups.
Int. J. e Collab., 2011

Emerging cognitive radio applications: A survey.
IEEE Commun. Mag., 2011

How to solve the polynomial ordinary differential equations.
Appl. Math. Comput., 2011

Text Clustering Based on LSA-HGSOM.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Applications, challenges, and prospective in emerging body area networking technologies.
IEEE Wirel. Commun., 2010

A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective.
J. Organ. End User Comput., 2010

A Study of the Impact of Individual Differences on Online Shopping.
Int. J. E Bus. Res., 2010

On the Index of Necklaces.
Graphs Comb., 2010

On the spectral characterizations of ∞-graphs.
Discret. Math., 2010

On the two largest Q-eigenvalues of graphs.
Discret. Math., 2010

Spectral Characterizations of Dumbbell Graphs.
Electron. J. Comb., 2010

Distance learning success - a perspective from socio-technical systems theory.
Behav. Inf. Technol., 2010

Some results on the signless Laplacians of graphs.
Appl. Math. Lett., 2010

A new approach for image retrieval with integrated Euclidean distance and rotational correlation.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Research and Design of General Report Form System.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

2009
Directional medium access control for ad hoc networks.
Wirel. Networks, 2009

Performance of a burst-frame-based CSMA/CA protocol: Analysis and enhancement.
Wirel. Networks, 2009

The cospectral equivalence classes of graphs having an isolated vertex.
Comput. Math. Appl., 2009

A new expression for the adjoint polynomial of a path.
Australas. J Comb., 2009

Services-Oriented CRM System and Enabling Technologies for Insurance Enterprises.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Feasibility Study of Sensing TV Whitespace with Local Quiet Zone.
Proceedings of the IEEE International Conference on Systems, 2009

Finite-Time Boundedness Analysis of a Class of Neutral Type Neural Networks with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Globally Exponentially Attractive Set and Synchronization of a Class of Chaotic Finance System.
Proceedings of the Advances in Neural Networks, 2009

A Case Study of QoS Provisioning in TV-Band Cognitive Radio Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
The chromatic equivalence class of graph <i>‾{B<sub>n-6, 12</sub>}</i>.
Discuss. Math. Graph Theory, 2008

A complete solution to the chromatic equivalence class of graph <i>I</i>.
Discret. Math., 2008

Trees with m-matchings and the fourth and fifth minimal Hosoya index.
Comput. Math. Appl., 2008

Covert Communication Based on Subliminal Channel in Broadcast Multi Signature.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Cognitive Radio Based Wireless Sensor Networks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Fan Fault Diagnosis System Based on Virtual Prototyping Technology.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Enhancing the performance of medium access control for WLANs with multi-beam access point.
IEEE Trans. Wirel. Commun., 2007

Maximum flow problem in wireless ad hoc networks with directional antennas.
Optim. Lett., 2007

System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX.
IEEE J. Sel. Areas Commun., 2007

Topic Effects on Process Gains and Losses in Electronic Meetings.
Inf. Resour. Manag. J., 2007

Achieving maximum flow in interference-aware wireless sensor networks with smart antennas.
Ad Hoc Networks, 2007

2006
Medium access control in mobile <i>ad hoc</i> networks: challenges and solutions.
Wirel. Commun. Mob. Comput., 2006

Providing statistical QoS guarantee for voice over IP in the IEEE 802.11 wireless LANs.
IEEE Wirel. Commun., 2006

DUCHA: A New Dual-Channel MAC Protocol for Multihop Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2006

OMAR: Utilizing Multiuser Diversity in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

The estimation of sample size in multi-stage sampling and its application in medical survey.
Appl. Math. Comput., 2006

Performance of a burst-frame-based CSMA/CA protocol for high data rate ultra-wideband networks: analysis and enhancement.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Open Wireless Software Radio on Common PC.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance and Analysis of CDM-FH-OFDMA for Broadband Wireless Systems.
Proceedings of the NETWORKING 2006, 2006

Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels.
Proceedings of the NETWORKING 2006, 2006

A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Receiver design for OFDM-CDMA systems with multiplexed STBC.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Uplink medium access control for WLANs with multi-beam access point.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Distributed packet scheduling for multihop flows in ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic packet Scheduling and Media Access control for wireless LANs and multi-hop ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic media access control and rate adaptation for wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

2001
Adaptive mobile multimedia QoS control and resource management.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Integrating information systems in electric utilities.
Proceedings of the IEEE International Conference on Systems, 2000


  Loading...