Jin Wang

According to our database1, Jin Wang
  • authored at least 393 papers between 1988 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.
The Journal of Supercomputing, 2018

Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network.
The Journal of Supercomputing, 2018

Wavelet-content-adaptive BP neural network-based deinterlacing algorithm.
Soft Comput., 2018

Equidistance constrained metric learning for person re-identification.
Pattern Recognition, 2018

mirTrans: a resource of transcriptional regulation on microRNAs for human cell lines.
Nucleic Acids Research, 2018

Packet loss rate mapped to the quality of experience.
Multimedia Tools Appl., 2018

An efficient implementation of 3D high-resolution imaging for large-scale seismic data with GPU/CPU heterogeneous parallel computing.
Computers & Geosciences, 2018

An Efficient Method to Transform SAT problems to Binary Integer Linear Programming Problem.
CoRR, 2018

Optimization and approximation methods for dynamic appointment scheduling with patient choices.
Computers & OR, 2018

Approximate dynamic programming approaches for appointment scheduling with patient preferences.
Artificial Intelligence in Medicine, 2018

GPI-Based Secrecy Rate Maximization Beamforming Scheme for Wireless Transmission With AN-Aided Directional Modulation.
IEEE Access, 2018

Optimal Spectrum Sensing Interval in MISO Cognitive Small Cell Networks.
IEEE Access, 2018

A Multi-objective Time-Linkage Approach for Dynamic Optimization Problems with Previous-Solution Displacement Restriction.
Proceedings of the Applications of Evolutionary Computation, 2018

2017
A unified framework for string similarity search with edit-distance constraint.
VLDB J., 2017

Pilot Optimization, Channel Estimation, and Optimal Detection for Full-Duplex OFDM Systems With IQ Imbalances.
IEEE Trans. Vehicular Technology, 2017

Stability Analysis and Controller Design of DC Microgrids With Constant Power Loads.
IEEE Trans. Smart Grid, 2017

Visual Servoing of Nonholonomic Mobile Robots With Uncalibrated Camera-to-Robot Parameters.
IEEE Trans. Industrial Electronics, 2017

DeepList: Learning Deep Features With Adaptive Listwise Constraint for Person Reidentification.
IEEE Trans. Circuits Syst. Video Techn., 2017

On Cloud Resources Consumption Shifting Scheme for Two Different Geographic Areas.
IEEE Systems Journal, 2017

Rational Design of Peptide-Functionalized Surface Plasmon Resonance Sensor for Specific Detection of TNT Explosive.
Sensors, 2017

Validation of the Significant Wave Height Product of HY-2 Altimeter.
Remote Sensing, 2017

Funneled potential and flux landscapes dictate the stabilities of both the states and the flow: Fission yeast cell cycle.
PLoS Computational Biology, 2017

Role of non-native electrostatic interactions in the coupled folding and binding of PUMA with Mcl-1.
PLoS Computational Biology, 2017

Neural signatures of phonological deficits in Chinese developmental dyslexia.
NeuroImage, 2017

Neural network-based position synchronised internal force control scheme for cooperative manipulator system.
Int. J. Systems Science, 2017

An improved recommendation algorithm for big data cloud service based on the trust in sociology.
Neurocomputing, 2017

Game Theory Based Real-Time Shop Floor Scheduling Strategy and Method for Cloud Manufacturing.
Int. J. Intell. Syst., 2017

TF-DMB: A traffic flow theory-based dynamic multi-hop broadcast protocol.
IJDSN, 2017

Information Landscape and Flux, Mutual Information Rate Decomposition and Connections to Entropy Production.
Entropy, 2017

A note on unimodular lattices with trivial automorphism groups.
Discrete Mathematics, 2017

Wiener filter-based wavelet domain denoising.
Displays, 2017

Filter-based Bayer Pattern CFA Demosaicking.
CSSP, 2017

GPI-based Secrecy Rate Maximization Beamforming Scheme for Wireless Transmission with AN-aided Directional Modulation.
CoRR, 2017

Pilot Optimization and Power Allocation for OFDM-based Full-duplex Relay Networks with IQ-imbalances.
CoRR, 2017

Sum-MSE performance gain of DFT-based channel estimator over frequency-domain LS one in full-duplex OFDM systems with colored interference.
CoRR, 2017

An improved anonymity model for big data security based on clustering algorithm.
Concurrency and Computation: Practice and Experience, 2017

A study of formative and continuous models for umbrella water curtain based on wall-attaching jets.
Cluster Computing, 2017

Compressed sensing-based time-domain channel estimator for full-duplex OFDM systems with IQ-imbalances.
SCIENCE CHINA Information Sciences, 2017

An age-structured model for cholera control with vaccination.
Applied Mathematics and Computation, 2017

Pilot Optimization and Power Allocation for OFDM-Based Full-Duplex Relay Networks With IQ-Imbalances.
IEEE Access, 2017

YNU-HPCC at EmoInt-2017: Using a CNN-LSTM Model for Sentiment Intensity Prediction.
Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, 2017

Depth map super-resolution via multiclass dictionary learning with geometrical directions.
Proceedings of the 2017 IEEE Visual Communications and Image Processing, 2017

A network state based reliability evaluation model for WSNs.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

YNU-HPCC at SemEval 2017 Task 4: Using A Multi-Channel CNN-LSTM Model for Sentiment Classification.
Proceedings of the 11th International Workshop on Semantic Evaluation, 2017

WOLoc: WiFi-only outdoor localization using crowdsensed hotspot labels.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

YNU-HPCC at IJCNLP-2017 Task 5: Multi-choice Question Answering in Exams Using an Attention-based LSTM Model.
Proceedings of the IJCNLP 2017, Shared Tasks, Taipei, Taiwan, November 27, 2017

YNU-HPCC at IJCNLP-2017 Task 4: Attention-based Bi-directional GRU Model for Customer Feedback Analysis Task of English.
Proceedings of the IJCNLP 2017, Shared Tasks, Taipei, Taiwan, November 27, 2017

YNU-HPCC at IJCNLP-2017 Task 1: Chinese Grammatical Error Diagnosis Using a Bi-directional LSTM-CRF Model.
Proceedings of the IJCNLP 2017, Shared Tasks, Taipei, Taiwan, November 27, 2017

Combining Knowledge with Deep Convolutional Neural Networks for Short Text Classification.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A new mining method to detect real time substance use events from wearable biosensor data stream.
Proceedings of the 2017 International Conference on Computing, 2017

A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Evaluate clustering performance and computational efficiency for PSO based fuzzy clustering methods in processing big imbalanced data.
Proceedings of the IEEE International Conference on Communications, 2017

A RBF Neural Network Based Data Aggregation Algorithm for Wireless Sensor Networks.
Proceedings of the Fuzzy Systems and Data Mining III, 2017

A New Multi-swarm Particle Swarm Optimization for Robust Optimization Over Time.
Proceedings of the Applications of Evolutionary Computation - 20th European Conference, 2017

Image Set Compression with Content Adaptive Sparse Dictionary.
Proceedings of the 2017 International Conference on Digital Image Computing: Techniques and Applications, 2017

A Survey of Recent Achievements for Wireless Sensor Networks Testbeds.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

A new application of data-driven soft sensor: Estimating individual biomass in mixed cultures.
Proceedings of the 2017 American Control Conference, 2017

Statistical process monitoring in the era of smart manufacturing.
Proceedings of the 2017 American Control Conference, 2017

2016
Optimal Coherent Combining Scheme for Relay Networks.
Wireless Personal Communications, 2016

Multilabel Classification via Co-Evolutionary Multilabel Hypernetwork.
IEEE Trans. Knowl. Data Eng., 2016

Design of a Superconducting Synchronous Generator With LTS Field Windings for 12 MW Offshore Direct-Drive Wind Turbines.
IEEE Trans. Industrial Electronics, 2016

Similarity Learning with Top-heavy Ranking Loss for Person Re-identification.
IEEE Signal Process. Lett., 2016

A novel flexible model for piracy and robbery assessment of merchant ship operations.
Rel. Eng. & Sys. Safety, 2016

A novel approach of collision assessment for coastal radar surveillance.
Rel. Eng. & Sys. Safety, 2016

Adaptive robust beamformer formulti-pair two-way relay networks with imperfect channel state information.
Frontiers of IT & EE, 2016

Spatial channel pairing based coherent combining for relay networks.
Frontiers of IT & EE, 2016

Incorporating specificity into optimization: evaluation of SPA using CSAR 2014 and CASF 2013 benchmarks.
Journal of Computer-Aided Molecular Design, 2016

A system dynamics approach for enhancing social behaviours regarding the reuse of packaging.
Expert Syst. Appl., 2016

Vehicle networking data-upload strategy based on mobile cloud services.
EURASIP J. Emb. Sys., 2016

Network overhead crowd management mechanism of virtual mobile Internet.
EURASIP J. Emb. Sys., 2016

Taylor series and adaptive directional selection for real time demosaicking.
Displays, 2016

Efficient block-sparse model-based algorithm for photoacoustic image reconstruction.
Biomed. Signal Proc. and Control, 2016

Identifying cell-specific microRNA transcriptional start sites.
Bioinformatics, 2016

Optimizing collaborative sparse dictionary for compressive light field photography.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

Study on Unbalance Magnetic Pull of the motorized spindle under different rotor eccentricities.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

Use of evidential reasoning for eliciting Bayesian subjective probabilities in human reliability analysis.
Proceedings of the 11th System of Systems Engineering Conference, 2016

Barehanded music: real-time hand interaction for virtual piano.
Proceedings of the 20th ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games, 2016

Hazard identification in chemical supply chains: The development of a novel taxonomy.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Current status and framework of China's inland passenger ship safety system.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Goldfish: In-Memory Massive Parallel Processing SQL Engine Based on Columnar Store.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Contextual Similarity Regularized Metric Learning for person re-identification.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Temporally aligned pooling representation for video-based person re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Ranking support for matched patterns over complex event streams: The CEPR system.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Realistic 3D Mesh Compression Based on Predicted Angle-Normal Images.
Proceedings of the 2016 Data Compression Conference, 2016

An Efficient Tool for Industrial Control System Security Analysis.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Chinese Grammatical Error Diagnosis Using Single Word Embedding.
Proceedings of the 3rd Workshop on Natural Language Processing Techniques for Educational Applications, 2016

2015
Ultra-dense small cell planning using cognitive radio network toward 5G.
IEEE Wireless Commun., 2015

The Universal Statistical Distributions of the Affinity, Equilibrium Constants, Kinetics and Specificity in Biomolecular Recognition.
PLoS Computational Biology, 2015

Hybrid additive multi-watermarking and decoding.
Multimedia Syst., 2015

Superresolution of Hyperspectral Image Using Advanced Nonlocal Means Filter and Iterative Back Projection.
J. Sensors, 2015

Optimal Reactive Power Allocation in Large-Scale Grid-Connected Photovoltaic Systems.
J. Optimization Theory and Applications, 2015

A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.
J. Medical Systems, 2015

Multivariate Mixtures of Normal Distributions: Properties, Random Vector Generation, Fitting, and as Models of Market Daily Changes.
INFORMS Journal on Computing, 2015

Dynamic appointment scheduling with patient preferences and choices.
Industrial Management and Data Systems, 2015

Performance of fiber delay-line buffers in asynchronous packet-based optical switching networks with wavelength conversion.
Int. J. Communication Systems, 2015

An efficient spatial deblocking of images with DCT compression.
Digital Signal Processing, 2015

Temporal Identification of Dysregulated Genes and Pathways in Clear Cell Renal Cell Carcinoma Based on Systematic Tracking of Disrupted Modules.
Comp. Math. Methods in Medicine, 2015

Adaptive dynamic programming algorithms for sequential appointment scheduling with patient preferences.
Artificial Intelligence in Medicine, 2015

Joint user association and ABS proportion optimization for load balancing in HetNet.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Real-Life Voice Activity Detection Based on Audio-Visual Alignment.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Privacy Requirement Modeling and Verification in Cloud Computing.
Proceedings of the Doctoral Symposium at the 18th ACM/IEEE International Conference of Model-Driven Engineering Languages and Systems 2015 (MoDELS 2015), 2015

Design and Implementation of Real-time Sobel Edge Detection on FPGA for Mobile Device Applications.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015

Signal sampling for efficient sparse representation of resting state FMRI data.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

An objective measurement of information value using application traces in infomediary: A case study of credit reporting system in China.
Proceedings of the 20th International Conference on Information Quality, 2015

Two birds with one stone: An efficient hierarchical framework for top-k and threshold-based string similarity search.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Reliable access control for multi-authority in cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Data protection based on multifunction digital watermark in wireless sensor network.
Proceedings of the International Carnahan Conference on Security Technology, 2015

A simulation study of the effect of transducer position on photoacoustic spectrum analysis for stochastic microstructure.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

Forecast the price of chemical products with multivariate data.
Proceedings of the 2015 International Conference on Behavioral, 2015

DeNet: An explicit distance ensemble model for person re-identification.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

2014
Design and Implementation of a Bidirectional Isolated Ćuk Converter for Low-Voltage and High-Current Automotive DC Source Applications.
IEEE Trans. Vehicular Technology, 2014

Towards Providing Scalable and Robust Privacy in Vehicular Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

On a Mathematical Model for Low-Rate Shrew DDoS.
IEEE Trans. Information Forensics and Security, 2014

De-Interlacing Algorithm Using Weighted Least Squares.
IEEE Trans. Circuits Syst. Video Techn., 2014

An Optimal Decisional Space for the Classification of Alzheimer's Disease and Mild Cognitive Impairment.
IEEE Trans. Biomed. Engineering, 2014

PolyUbiquitin Chain Linkage Topology Selects the Functions from the Underlying Binding Landscape.
PLoS Computational Biology, 2014

Specificity and Affinity Quantification of Flexible Recognition from Underlying Energy Landscape Topography.
PLoS Computational Biology, 2014

Dynamic Conformational Change Regulates the Protein-DNA Recognition: An Investigation on Binding of a Y-Family Polymerase to Its Target DNA.
PLoS Computational Biology, 2014

Self-organizing fuzzy optimal control for under-actuated systems.
J. Systems & Control Engineering, 2014

Towards a Fair and Efficient Packet Scheduling Scheme in Inter-Flow Network Coding.
J. Sensor and Actuator Networks, 2014

Numerical Simulation of Stability Analyzing for Unsaturated Slope with Rainfall Infiltration.
JNW, 2014

SCAR: A Coding-Aware Routing Protocol with Self-Recommendation in Static Wireless Ad Hoc Networks.
Journal Comp. Netw. and Communic., 2014

Evaluating electricity price volatility risk in competitive environment based on ARMAX-GARCHSK-EVT model.
IJCAT, 2014

HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle.
SCIENCE CHINA Information Sciences, 2014

Sketch2Jewelry: Semantic feature modeling for sketch-based jewelry design.
Computers & Graphics, 2014

Computing the basic reproductive numbers for epidemiological models in nonhomogeneous environments.
Applied Mathematics and Computation, 2014

Removing the inherent paradox of the Buffon's needle monte carlo simulation using fixed-point iteration method.
Proceedings of the 2014 Winter Simulation Conference, 2014

High-performance beamforming and spatial channel pairing schemes at relay station for AF-based multi-pair two-way relay networks.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Choreography Scenario-Based Test Data Generation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Study on time synchronization algorithm for structural health monitoring based on wireless sensor networks.
Proceedings of the Intelligent Systems and Applications, 2014

A Method of Signal Sparse in Wireless structural health monitoring based on Compressive Sensing.
Proceedings of the Intelligent Systems and Applications, 2014

Research of Clustering Routing Algorithm for Structural Health Monitoring Based on Wireless Sensor Networks.
Proceedings of the Intelligent Systems and Applications, 2014

A Fuzzy Control Theory and Neural Network Based Sensor Network Control System.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Automatic Ontology Construction Method Based on Web Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Attributed Based Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Oriented Group Provable Data Possession in Public Cloud.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Leakage Resilient Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Document Attribute-Based Keyword Search over Encrypted Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Data Access Control for Multi-authority Cloud Storage Systems.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Similarity Search Method for Encrypted Cloud Document.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Secure Storage of Data in Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Optimizing packet scheduling decisions with network coding.
Proceedings of the 21st International Conference on Telecommunications, 2014

Incoherent dictionary learning for sparse representation based image denoising.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Content distribution in wireless ad hoc networks with network coding.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Comparison of different variable selection methods for partial least squares soft sensor development.
Proceedings of the American Control Conference, 2014

Bounded Monte Carlo integration using Java.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Dijkstra's algorithm and Google maps.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Thermal Imaging as a Biometrics Approach to Facial Signature Authentication.
IEEE J. Biomedical and Health Informatics, 2013

Moving Least-Squares Method for Interlaced to Progressive Scanning Format Conversion.
IEEE Trans. Circuits Syst. Video Techn., 2013

Deinterlacing Using Taylor Series Expansion and Polynomial Regression.
IEEE Trans. Circuits Syst. Video Techn., 2013

Iterative second-order derivative-based deinterlacing algorithm.
Sig. Proc.: Image Comm., 2013

Incorporation of formal safety assessment and Bayesian network in navigational risk estimation of the Yangtze River.
Rel. Eng. & Sys. Safety, 2013

Modelling dwelling fire development and occupancy escape using Bayesian network.
Rel. Eng. & Sys. Safety, 2013

Block-to-Point Fine Registration in Terrestrial Laser Scanning.
Remote Sensing, 2013

Quantifying Cell Fate Decisions for Differentiation and Reprogramming of a Human Stem Cell Network: Landscape and Biological Paths.
PLoS Computational Biology, 2013

Blind Measurement of Blocking Artifacts of Images Based on Edge and Flat-region Detection.
JSW, 2013

Channel estimation and optimal training with the LMMSE criterion for OFDM-based two-way relay networks.
EURASIP J. Wireless Comm. and Networking, 2013

Characterization of regulatory features of housekeeping and tissue-specific regulators within tissue regulatory networks.
BMC Systems Biology, 2013

Specificity and affinity quantification of protein-protein interactions.
Bioinformatics, 2013

CePa: an R package for finding significant pathways weighted by multiple network centralities.
Bioinformatics, 2013

Ensemble of Cost-Sensitive Hypernetworks for Class-Imbalance Learning.
Proceedings of the IEEE International Conference on Systems, 2013

Order Optimization of Evolutionary Hypernetworks Using Genetic Algorithm.
Proceedings of the IEEE International Conference on Systems, 2013

Applying Threshold SMOTE Algoritwith Attribute Bagging to Imbalanced Datasets.
Proceedings of the Rough Sets and Knowledge Technology - 8th International Conference, 2013

Low rank recovery based image interpolation using local and nonlocal modeling.
Proceedings of the 30th Picture Coding Symposium, 2013

vRGW: Towards network function virtualization enabled by software defined networking.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Communication and remote control approaches to road surface carrying system.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Discovering the Relationship between Student Effort and Ability for Predicting the Performance of Technology-Assisted Learning in a Mathematics After-School Program.
Proceedings of the 6th International Conference on Educational Data Mining, 2013

Pattern Recognition of Big Nutritional Data in RCT.
Proceedings of the 8th International Conference on Body Area Networks, 2013

Improved state estimation for high-mix semiconductor manufacturing.
Proceedings of the American Control Conference, 2013

Elucidating xylose metabolism of scheffersomyces stipitis by integrating principal component analysis with flux balance analysis.
Proceedings of the American Control Conference, 2013

Quantification of valve stiction based on a semi-physical model.
Proceedings of the American Control Conference, 2013

Transient performance investigation of a self-driven adaptive thermostatic valve for single-phase space thermal control Loop.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

AutoMentor: Artificial Intelligent Mentor in Educational Game.
Proceedings of the Artificial Intelligence in Education - 16th International Conference, 2013

2012
Study on Global Optimization and Control Strategy Development for a PHEV Charging Facility.
IEEE Trans. Vehicular Technology, 2012

Datacenter at the Airport: Reasoning about Time-Dependent Parking Lot Occupancy.
IEEE Trans. Parallel Distrib. Syst., 2012

Robust Feedback Zoom Tracking for Digital Video Surveillance.
Sensors, 2012

Exploration of Multi-State Conformational Dynamics and Underlying Global Functional Landscape of Maltose Binding Protein.
PLoS Computational Biology, 2012

Importance of Electrostatic Interactions in the Association of Intrinsically Disordered Histone Chaperone Chz1 and Histone H2A.Z-H2B.
PLoS Computational Biology, 2012

A generalized multivariate kurtosis ordering and its applications.
J. Multivariate Analysis, 2012

Decision support framework for risk management on sea ports and terminals using fuzzy set theory and evidential reasoning approach.
Expert Syst. Appl., 2012

Application of MADM in a fuzzy environment for selecting the best barrier for offshore wells.
Expert Syst. Appl., 2012

Fuzzy incremental control algorithm of loop heat pipe cooling system for spacecraft applications.
Computers & Mathematics with Applications, 2012

Gene regulation is governed by a core network in hepatocellular carcinoma.
BMC Systems Biology, 2012

Centrality-based pathway enrichment: a systematic approach for finding significant pathways dominated by key genes.
BMC Systems Biology, 2012

Identification of trans-acting siRNAs and their regulatory cascades in grapevine.
Bioinformatics, 2012

The architecture of the gene regulatory networks of different tissues.
Bioinformatics, 2012

Convergence analysis of an iterative algorithm for a class of constrained dynamic problems.
Applied Mathematics and Computation, 2012

Data gathering in wireless sensor networks through intelligent compressive sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SCAR: A dynamic Coding-Aware Routing protocol.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

Efficient adaptive intra-field deinterlacing algorithm using bilateral filter.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

Inter Prediction Based on Low-rank Matrix Completion.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Silverlight-Based Distance Teaching Application.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Fast second-order derivative-based deinterlacing.
Proceedings of the IEEE international Symposium on Broadband Multimedia Systems and Broadcasting, 2012

No-reference image quality assessment for compressed images based on DCT coefficient distribution and PSNR estimation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

Statistics pattern analysis based virtual metrology for plasma etch processes.
Proceedings of the American Control Conference, 2012

2011
PHEV Charging Strategies for Maximized Energy Saving.
IEEE Trans. Vehicular Technology, 2011

Multi-Scaled Explorations of Binding-Induced Folding of Intrinsically Disordered Protein Inhibitor IA3 to its Target Enzyme.
PLoS Computational Biology, 2011

Sketch based garment modeling on an arbitrary view of a 3D virtual human model.
Journal of Zhejiang University - Science C, 2011

Sparse representation based down-sampling image compression.
J. Computational Applied Mathematics, 2011

Approximate TOPSIS for vessel selection under uncertain environment.
Expert Syst. Appl., 2011

Regulatory coordination of clustered microRNAs based on microRNA-transcription factor regulatory network.
BMC Systems Biology, 2011

A mutation degree model for the identification of transcriptional regulatory elements.
BMC Bioinformatics, 2011

'Non-destructive' biocomputing security system based on gas-controlled biofuel cell and potentially used for intelligent medical diagnostics.
Bioinformatics, 2011

A low-rank matrix completion based intra prediction for H.264/AVC.
Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011

Fast search for transmission section based on power component of line.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Combining active learning and semi-supervised for improving learning performance.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

A Real-Time Isoline Tracing Algorithm Based on CUDA.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Ring Signature Schemes from Lattice Basis Delegation.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation.
Proceedings of the Global Communications Conference, 2011

QoS Monitoring and Troubleshooting of a Large Scale IPTV Deployment.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

IPTV System Design: An ISP's Perspective.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Spatial modulation for single carrier wireless transmission systems.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Performance analysize of joint processing of sidelobe suppression and PAPR reduction in NC-OFDM systems.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Network coding-based 1+N protection scheme in hybrid wireless-optical broadband access networks.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Thwarting audio steganography attacks in cloud storage systems.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Depth Image-Based Temporal Error Concealment for 3-D Video Transmission.
IEEE Trans. Circuits Syst. Video Techn., 2010

Split Table Extension: A Low Complexity LVQ Extension Scheme in Low Bitrate Audio Coding.
IEEE Signal Process. Lett., 2010

The use of Bayesian network modelling for maintenance planning in a manufacturing industry.
Rel. Eng. & Sys. Safety, 2010

Research of an architecture of operating system kernel based on modularity concept.
Mathematical and Computer Modelling, 2010

The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification.
JCIT, 2010

The Overview of Text Representative Model.
JCIT, 2010

A highly accurate and computationally efficient approach for unconstrained iris segmentation.
Image Vision Comput., 2010

Multilinear principal component analysis for face recognition with fewer features.
Neurocomputing, 2010

Lattice-based Identity-Based Broadcast Encryption Scheme.
IACR Cryptology ePrint Archive, 2010

Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation.
IACR Cryptology ePrint Archive, 2010

Discussion on: "Closed-Loop Identification of MIMO Systems: A New Look at Identifiability and Experiment Design".
Eur. J. Control, 2010

Image Block Error Recovery Using Adaptive Patch_Based Inpainting.
Proceedings of the Computer Vision, Imaging and Computer Graphics. Theory and Applications, 2010

Adaptive Patch-based Inpainting for Image Block Recovery.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

Next-generation consumer audio application specific embedded processor.
Proceedings of the IEEE 8th Symposium on Application Specific Processors, 2010

A new relative entropy based app-DDoS detection method.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Application of niche genetic algorithm in the design of permanent magnet generator in automobile.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
Layered steered space-time codes using multi-dimensional sphere packing modulation.
IEEE Trans. Wireless Communications, 2009

Near-Capacity Three-Stage Turbo Detection of Irregular Convolutional Coded Joint Sphere-Packing Modulation and Space-Time Coding.
IEEE Trans. Communications, 2009

Methodology of using delay-time analysis for a manufacturing industry.
Rel. Eng. & Sys. Safety, 2009

A family of kurtosis orderings for multivariate distributions.
J. Multivariate Analysis, 2009

Pores-Preserving Face Cleaning Based on Improved Empirical Mode Decomposition.
J. Comput. Sci. Technol., 2009

A numerical algorithm for viscous incompressible interfacial flows.
J. Comput. Physics, 2009

Novel bi-transition metallic encapsulated naphthalene-like Si20 prismatic cage: A DFT investigation.
Journal of Computational Chemistry, 2009

Evolutionary design of combinational logic circuits using VRA processor.
IEICE Electronic Express, 2009

Use of hybrid multiple uncertain attribute decision making techniques in safety management.
Expert Syst. Appl., 2009

A new evidential trust model for open communities.
Computer Standards & Interfaces, 2009

Interactive 3D garment design with constrained contour curves and style curves.
Computer-Aided Design, 2009

A Method of Robust Stabilization for the Delay Neural Networks with Nonlinear Perturbations.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Stability for the Solution of a Class of Time-Delay Artificial Neural Networks.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Vehicle supervision system based on MEMS geomagnetic sensor.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Boron doped hydrogenated nanocrystalline silicon thin films prepared by layer-by-layer technique and its application in n-i-p flexible amorphous silicon thin film solar cells.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Advanced Bilinear Image Interpolation Based on Edge Features.
Proceedings of the First International Conference on Advances in Multimedia, 2009

Study on the Parameter Vibration of the Large-Span Cable-Stayed Bridges.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Modified Fast Principal Component Analysis.
Proceedings of the 2009 International Conference on Image Processing, 2009

Research on Resource Directory Service for Sharing Remote Sensing Data under Grid Environment.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

The Mathematic Method of Membership Conversion from Degree of Coordinates to Degree of Points.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Application of Artificial Neural Network to Predict the Hourly Cooling Load of an Office Building.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Numerical Investigation of Influence on Heat Transfer Performance of Direct Air Cooled Condenser under Different Wind Directions.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

3D Fashion Fast Modeling from Photographs.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Sketch-Based 3D Sleeve Modeling and Reusing Method for Garment CAD.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A New Method of Membership Conversion for Fuzzy Evaluation of the Oil Storage Safety.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
On the Performance and Complexity of Irregular Variable Length Codes for Near-Capacity Joint Source and Channel Coding.
IEEE Trans. Wireless Communications, 2008

Three-Stage Turbo MBER Multiuser Beamforming Receiver Using Irregular Convolutional Codes.
IEEE Trans. Vehicular Technology, 2008

Fuzzy Rule-Based Bayesian Reasoning Approach for Prioritization of Failures in FMEA.
IEEE Trans. Reliability, 2008

A novel spatial and temporal correlation integrated based motion-compensated interpolation for frame rate up-conversion.
IEEE Trans. Consumer Electronics, 2008

A Robust and Fast Non-Local Means Algorithm for Image Denoising.
J. Comput. Sci. Technol., 2008

Design and implementation of a virtual reconfigurable architecture for different applications of intrinsic evolvable hardware.
IET Computers & Digital Techniques, 2008

Distortion Optimization based Image Completion from a Large Displacement View.
Comput. Graph. Forum, 2008

Self-tuning of fuzzy belief rule bases for engineering system safety analysis.
Annals OR, 2008

Numerical study for a model of tumor virotherapy.
Applied Mathematics and Computation, 2008

Near-Capacity Irregular Bit-Interleaved Coded Modulation.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Near-Capacity Iteratively Decoded Space-Time Block Coding.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

New Adaptive Postprocessing to Remove Blocking Artifacts for DCT Coded Image.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

A novel frame recovery algorithm based on spatial and temporal correlation.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Spatial and temporal correlation based frame rate up-conversion.
Proceedings of the International Conference on Image Processing, 2008

Unveiling Near-Capacity Code Design: The Realization of Shannon's Communication Theory for MIMO Channels.
Proceedings of IEEE International Conference on Communications, 2008

Spatial error recovery using multi-directional inpainting.
Proceedings of the IEEE International Conference on Acoustics, 2008

An improved DMVE temporal error concealment.
Proceedings of the IEEE International Conference on Acoustics, 2008

433MHz Wireless Network Technology for Wireless Manufacturing.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A comparative study of multilinear principal component analysis for face recognition.
Proceedings of the 37th IEEE Applied Imagery Pattern Recognition Workshop, 2008

A robust segmentation approach to iris recognition based on video.
Proceedings of the 37th IEEE Applied Imagery Pattern Recognition Workshop, 2008

2007
Iteratively Decoded Variable Length Space-Time Coded Modulation: Code Construction and Convergence Analysis.
IEEE Trans. Wireless Communications, 2007

Joint Iterative Decoding of Trellis-Based VQ and TCM.
IEEE Trans. Wireless Communications, 2007

Robust Inventory Control System.
IEEE Trans. Contr. Sys. Techn., 2007

An Efficient Two-stage Error Detector Based on Syntax and Continuity.
IEEE Trans. Consumer Electronics, 2007

The application of the Six Sigma concept to port security process quality control.
Quality and Reliability Eng. Int., 2007

Potential Energy Landscape and Robustness of a Gene Regulatory Network: Toggle Switch.
PLoS Computational Biology, 2007

Inference and learning methodology of belief-rule-based expert system for pipeline leak detection.
Expert Syst. Appl., 2007

MED: a new non-supervised gene prediction algorithm for bacterial and archaeal genomes.
BMC Bioinformatics, 2007

Run-to-run control and state estimation in high-mix semiconductor manufacturing.
Annual Reviews in Control, 2007

On the accuracy of a numerical method for linear interfacial motion.
Applied Mathematics and Computation, 2007

Probabilistic Hierarchical Face Model for Feature Localization.
Proceedings of the 8th IEEE Workshop on Applications of Computer Vision (WACV 2007), 2007

An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and Map Equalization.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Exit Chart Aided Irregular Convolutional Code Design for Iterative Downlink SDMA Systems Using Imperfect Channel State Information.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Adaptive frame recovery based on motion activity.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Iteratively Decoded Irregular Variable Length Coding and Trellis Coded Modulation.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Towards Knowledge Extraction from Weblogs and Rule-Based Semantic Querying.
Proceedings of the Advances in Rule Interchange and Applications, International Symposium, 2007

A General Method of Mining Chinese Web Documents Based on GA&SA and Position-Factors.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Implementing Multi-VRC Cores to Evolve Combinational Logic Circuits in Parallel.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007

Performance Analysis of Iteratively Decoded Variable-Length Space-Time Coded Modulation.
Proceedings of IEEE International Conference on Communications, 2007

Near-Capacity Transceiver Design Using Exit-Curve Fitting: Three-Stage Turbo Detection of Irregular Convolutional Coded Joint Sphere-Packing Modulation and Space-Time Coding.
Proceedings of IEEE International Conference on Communications, 2007

Spatial Error Concealment Technique using Verge Points.
Proceedings of the IEEE International Conference on Acoustics, 2007

FPGA Implementation of Evolvable Characters Recognizer with Self-adaptive Mutation Rates.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Texture Gradients and Perceptual Constancy under Haptic Exploration.
Proceedings of the Second Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2007

A Robust and Fast Non-local Means Algorithm for Image Denoising.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
Belief Rule-Base Inference Methodology Using the Evidential Reasoning Approach - RIMER.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

Maritime Risk Assessment and its Current Status.
Quality and Reliability Eng. Int., 2006

Maritime Risk Modelling and Decision Making.
Quality and Reliability Eng. Int., 2006

Single-Molecule Dynamics Reveals Cooperative Binding-Folding in Protein Recognition.
PLoS Computational Biology, 2006

Funneled Landscape Leads to Robustness of Cell Networks: Yeast Cell Cycle.
PLoS Computational Biology, 2006

MACO: A Gapped-Alignment Scoring Tool for Comparing Transcription Factor Binding Sites.
In Silico Biology, 2006

Closed-loop subspace identification using the parity space.
Automatica, 2006

Generating multivariate mixture of normal distributions using a modified Cholesky decomposition.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Iterative Eualization and Source Decoding for Vector Quantized Sources.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Combined Serially Concatenated Codes and MMSE Equalization: An EXIT Chart Aided Perspective.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

An Iterative Detection Aided Unequal Error Protection Wv avelet Video Scheme Using Irregular Convolutional Codes.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Multi-Class MPLS Resilience Mechanism Supporting Traffic Engineering.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Synthesizing Variational Direction and Scale Texture on Planar Region.
Proceedings of the Advances in Multimedia Information Processing, 2006

Complete FPGA Implemented Evolvable Image Filters.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Introducing Partitioning Training Set Strategy to Intrinsic Incremental Evolution.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Neural Network Based Robust Adaptive Control for a Class of Nonlinear Systems.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Remote User Authentication Scheme Using Bilinear Pairings and ECC.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Fast Non-Local Algorithm for Image Denoising.
Proceedings of the International Conference on Image Processing, 2006

Object Geometry Based Error Resilient Video Coding.
Proceedings of the International Conference on Image Processing, 2006

CoMiner: An Effective Algorithm for Mining Competitors from the Web.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Automatic Foreground Extraction of Head Shoulder Images.
Proceedings of the Advances in Computer Graphics, 2006

A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

Web Scale Competitor Discovery Using Mutual Information.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
Lane keeping based on location technology.
IEEE Trans. Intelligent Transportation Systems, 2005

Image and video retexturing.
Journal of Visualization and Computer Animation, 2005

Setting up a Wireless Local Area Network (WLAN) for a healthcare system.
IJEH, 2005

A novel constrained texture mapping method based on harmonic map.
Computers & Graphics, 2005

Guaranteed cost control for uncertain singular systems with time-delay.
Proceedings of the IEEE International Conference on Systems, 2005

Prediction of Chaotic Time Series Using LS-SVM with Automatic Parameter Selection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Constrained Texture Mapping Method.
Proceedings of the Entertainment Computing, 2005

Fault Tolerant Control of Nonlinear Processes with Adaptive Diagonal Recurrent Neural Network Model.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Using Reconfigurable Architecture-Based Intrinsic Incremental Evolution to Evolve a Character Classification System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Multivariate Entropy Distance Method for Prokaryotic Gene Identification.
J. Bioinformatics and Computational Biology, 2004

Fuzzy Rule-Based Evidential Reasoning Approach for Safety Analysis.
Int. J. General Systems, 2004

Iterative construction of reversible variable-length codes and variable-length error-correcting codes.
IEEE Communications Letters, 2004

NED-2: an agent-based decision support system for forest ecosystem management.
Environmental Modelling and Software, 2004

Accuracy improvement for identifying translation initiation sites in microbial genomes.
Bioinformatics, 2004

Enrichment of transcriptional regulatory sites in non-coding genomic region.
Bioinformatics, 2004

An Output Tracking Control Strategy for Unknown Nonlinear Systems.
Applied Artificial Intelligence, 2004

An optimal learning method for constructing belief rule bases.
Proceedings of the IEEE International Conference on Systems, 2004

Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-Focus.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Joint iterative-detection of reversible variable-length coded Constant Bit Rate vector-quantized video and Coded Modulation.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs.
Proceedings of the Advances in Computer Science, 2004

User-Focus Based Personalization Recommendation for Text Information Retrieval.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Modified failure mode and effects analysis using approximate reasoning.
Rel. Eng. & Sys. Safety, 2003

RBF-based constrained texture mapping.
Computers & Graphics, 2003

Sensitivity identification enhanced control strategy for nonlinear process systems.
Computers & Chemical Engineering, 2003

The Evidential Reasoning approach for Inference in rule-based systems.
Proceedings of the IEEE International Conference on Systems, 2003

Human + agent: creating recombinant information.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Efficient Integration of PROLOG and Relational Databases in the NED Intelligent Information System.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003

Connecting Interface Metaphors to Support Creation of Path-Based Collections.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2003

On scale curves for nonparametric description of dispersion.
Proceedings of the Data Depth: Robust Multivariate Analysis, 2003

2002
Automatic Image-Based Pencil Sketch Rendering.
J. Comput. Sci. Technol., 2002

The Flexent® packet core access platform for CDMA2000* packet data.
Bell Labs Technical Journal, 2002

The NED IIS Project - Forest Ecosystem Management.
Proceedings of the Intelligent Information Processing, 2002

PROLOG/RDBMS Integration in the NED Intelligent Information System.
Proceedings of the On the Move to Meaningful Internet Systems, 2002, 2002

2001
A fuzzy-logic-based approach to qualitative safety modelling for marine systems.
Rel. Eng. & Sys. Safety, 2001

Knowledge-based spectroscopic assignment.
Data Knowl. Eng., 2001

Neural network enhanced output regulation in nonlinear systems.
Automatica, 2001

Generating daily changes in market variables using a multivariate mixture of normal distributions.
Proceedings of the 33nd conference on Winter simulation, 2001

Throughput analysis and rate adaptation for Infostation system.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

1998
Adaptive Control for Nonlinear Systems Using Decomposed Neural Network.
Cybernetics and Systems, 1998

A Parametric Version of Jackknife-after-Bootstrap.
Proceedings of the 30th conference on Winter simulation, WSC 1998, 1998

Optimum subarray configuration using genetic algorithms.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

Summarization-based Query Expansion in Information Retrieval.
Proceedings of the 36th Annual Meeting of the Association for Computational Linguistics and 17th International Conference on Computational Linguistics, 1998

1997
A subjective methodology for safety analysis of safety requirements specifications.
IEEE Trans. Fuzzy Systems, 1997

Approximation-assisted point estimation.
Oper. Res. Lett., 1997

A Knowledge-Based Controller Used in Process Control Systems.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 1997

Adaptive Pole Placement Control Algorithm for Nonlinear Systems.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 1997

A knowledge-based controller with fuzzy reasoning used in process control.
Int. J. Systems Science, 1997

Pid-like Controller Using a Modified Neural Network.
Int. J. Systems Science, 1997

Weighted Jackknife-after-Bootstrap: A Heuristic Approach.
Proceedings of the 29th conference on Winter simulation, 1997

Building Effective Queries In Natural Language Information Retrieval.
Proceedings of the 5th Applied Natural Language Processing Conference, 1997

1996
Integration of Document Detection and Information Extraction.
Proceedings of the TIPSTER TEXT PROGRAM PHASE II: Proceedings of a Workshop held at Vienna, 1996

A Self-Learning Universal Concept Spotter.
Proceedings of the 16th International Conference on Computational Linguistics, 1996

1995
On the Performance of Pure Adaptive Search.
Proceedings of the 27th conference on Winter simulation, 1995

1994
Weight smoothing to improve network generalization.
IEEE Trans. Neural Networks, 1994

Segmentation of merged characters by neural networks and shortest path.
Pattern Recognition, 1994

1993
Resolving multifont character confusion with neural networks.
Pattern Recognition, 1993

Monte Carlo estimation of Bayesian robustness.
Proceedings of the 25th Winter Simulation Conference, 1993

Segmentation of Merged Characters by Neural Networks and Shortest-Path.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

Parallel Construction of Minimal Perfect Hashing Functions with Neural Networks.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Syntactic Preferences For Robust Parsing With Semantic Preferences.
Proceedings of the 14th International Conference on Computational Linguistics, 1992

1991
Your Metaphor or Mine: Belief Ascription and Metaphor Interpretation.
Proceedings of the 12th International Joint Conference on Artificial Intelligence. Sydney, 1991

1990
Using Focusing Search Algorithms and a Strong Heuristic to Solve the Findpath Problem in Robotics.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990

1988
The Advantages of Using Depth and Breadth Components in Heuristic Search.
Proceedings of the Methodologies for Intelligent Systems, 1988


  Loading...