Li Yang

According to our database1, Li Yang authored at least 462 papers between 1989 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Data-Driven Event Detection of Power Systems Based on Unequal-Interval Reduction of PMU Data and Local Outlier Factor.
IEEE Trans. Smart Grid, 2020

An Optimal Locality-Aware Task Scheduling Algorithm Based on Bipartite Graph Modelling for Spark Applications.
IEEE Trans. Parallel Distrib. Syst., 2020

Designing Mission Abort Strategies Based on Early-Warning Information: Application to UAV.
IEEE Trans. Ind. Informatics, 2020

Word-Character Graph Convolution Network for Chinese Named Entity Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2020

Dynamic maintenance strategy with iteratively updated group information.
Reliab. Eng. Syst. Saf., 2020

Reliability analysis and condition-based maintenance optimization for a warm standby cooling system.
Reliab. Eng. Syst. Saf., 2020

A quantum related-key attack based on the Bernstein-Vazirani algorithm.
Quantum Inf. Process., 2020

An augmented Lagrangian proximal alternating method for sparse discrete optimization problems.
Numer. Algorithms, 2020

一种基于卫星网络的虚拟网络功能快速映射算法 (Virtual Network Function Fast Mapping Algorithm over Satellite Network).
计算机科学, 2020

异构无线网络中动态优先级接纳控制算法研究 (Study on Dynamic Priority Admission Control Algorithm in Heterogeneous Wireless Networks).
计算机科学, 2020

Dynamic memory-aware scheduling in spark computing environment.
J. Parallel Distributed Comput., 2020

Sparse BD-Net: A Multiplication-less DNN with Sparse Binarized Depth-wise Separable Convolution.
ACM J. Emerg. Technol. Comput. Syst., 2020

An Intelligent Security Defensive Model of SCADA Based on Multi-Agent in Oil and Gas Fields.
Int. J. Pattern Recognit. Artif. Intell., 2020

Stage-structured control on a class of predator-prey system in almost periodic environment.
Int. J. Control, 2020

Learn#: A Novel incremental learning method for text classification.
Expert Syst. Appl., 2020

Improved NSAF Algorithms with Variable Control Parameter Against Impulsive Noises.
Circuits Syst. Signal Process., 2020

On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice.
CoRR, 2020

Big Bird: Transformers for Longer Sequences.
CoRR, 2020

Development and performance evaluation of an electro-hydraulic downforce control system for planter row unit.
Comput. Electron. Agric., 2020

Investigation of a preliminary ventilation energy-recovery system for poultry houses.
Comput. Electron. Agric., 2020

A Mixed CVaR-Based Stochastic Information Gap Approach for Building Optimal Offering Strategies of a CSP Plant in Electricity Markets.
IEEE Access, 2020

Data-Driven Abnormity Assessment for Low-Voltage Power Consumption and Supplies Based on CRITIC and Improved Radar Chart Algorithms.
IEEE Access, 2020

Real-Time Visual Localization of the Picking Points for a Ridge-Planting Strawberry Harvesting Robot.
IEEE Access, 2020

Sentiment Analysis for E-Commerce Product Reviews in Chinese Based on Sentiment Lexicon and Deep Learning.
IEEE Access, 2020

TuningMalconv: Malware Detection With Not Just Raw Bytes.
IEEE Access, 2020

Graphical Topology Autonomic Identification Method for Human-Machine Interface Modelling Based on Quadratic Space Mapping.
IEEE Access, 2020

Facile Route for Low-temperature Eco-friendly Solution Processed ZnSnO Thin-film Transistors.
Proceedings of the 2020 IEEE International Reliability Physics Symposium, 2020

Network Intrusion Detection System as a Service in OpenStack Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

A Flexible Processing-in-Memory Accelerator for Dynamic Channel-Adaptive Deep Neural Networks.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

Improving Multimodal Named Entity Recognition via Entity Span Detection with Unified Multimodal Transformer.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Harmonious Coexistence of Structured Weight Pruning and Ternarization for Deep Neural Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Novel Resource Deployment Approach to Mobile Microlearning: From Energy-Saving Perspective.
Wirel. Commun. Mob. Comput., 2019

Risk-Constrained Day-Ahead Scheduling for Concentrating Solar Power Plants With Demand Response Using Info-Gap Theory.
IEEE Trans. Ind. Informatics, 2019

Periodic Solution for ∇ -Stochastic High-Order Hopfield Neural Networks with Time Delays on Time Scales.
Neural Process. Lett., 2019

An embedded implementation of CNN-based hand detection and orientation estimation algorithm.
Mach. Vis. Appl., 2019

代价敏感深度学习方法研究综述 (Survey on Cost-sensitive Deep Learning Methods).
计算机科学, 2019

A crisis information propagation model based on a competitive relation.
J. Ambient Intell. Humaniz. Comput., 2019

A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput., 2019

Witness indistinguishability and witness hiding against quantum attacks.
IET Information Security, 2019

Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty.
HCIS, 2019

CIRCexplorer3: A CLEAR Pipeline for Direct Comparison of Circular and Linear RNA Expression.
Genom. Proteom. Bioinform., 2019

Fast congestion-free consistent flow forwarding rules update in software defined networking.
Future Gener. Comput. Syst., 2019

A two-phase preventive maintenance policy considering imperfect repair and postponed replacement.
Eur. J. Oper. Res., 2019

Using Bernstein-Vazirani algorithm to attack block ciphers.
Des. Codes Cryptogr., 2019

One-way information reconciliation schemes of quantum key distribution.
Cybersecurity, 2019

Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness.
CoRR, 2019

Computer-aided Detection of Squamous Carcinoma of the Cervix in Whole Slide Images.
CoRR, 2019

Saliency Prediction on Omnidirectional Images with Generative Adversarial Imitation Learning.
CoRR, 2019

Online handwritten signature verification based on the most stable feature and partition.
Cluster Computing, 2019

A novel intelligent assessment method for SCADA information security risk based on causality analysis.
Cluster Computing, 2019

Spectrum sensing defending against PUE attack based on fractal dimension.
Cluster Computing, 2019

Fruit detection for strawberry harvesting robot in non-structural environment based on Mask-RCNN.
Comput. Electron. Agric., 2019

Development of a variable-rate seeding control system for corn planters Part I: Design and laboratory experiment.
Comput. Electron. Agric., 2019

Development of a variable-rate seeding control system for corn planters Part II: Field performance.
Comput. Electron. Agric., 2019

Investigation of bio-aerosol dispersion in a tunnel-ventilated poultry house.
Comput. Electron. Agric., 2019

Computational Fluid Dynamics aided investigation and optimization of a tunnel-ventilated poultry house in China.
Comput. Electron. Agric., 2019

Data-Driven Load Forecasting of Air Conditioners for Demand Response Using Levenberg-Marquardt Algorithm-Based ANN.
Big Data Cogn. Comput., 2019

Multistage Active Distribution Network Planning With Restricted Operation Scenario Selection.
IEEE Access, 2019

Optimal Scheduling of CCHP With Distributed Energy Resources Based on Water Cycle Algorithm.
IEEE Access, 2019

Disturbance Observer Based on Biologically Inspired Integral Sliding Mode Control for Trajectory Tracking of Mobile Robots.
IEEE Access, 2019

Optimal Bidding Strategy for a Power Producer Under Monthly Pre-Listing Balancing Mechanism in Actual Sequential Energy Dual-Market in China.
IEEE Access, 2019

An Energy Imbalance Settlement Mechanism Considering Decision-Making Strategy of Retailers Under Renewable Portfolio Standard.
IEEE Access, 2019

The Function Extension Method for SDN Controller Based on LightGBM.
Proceedings of the 2019 IEEE SmartWorld, 2019

Satellite Network Load Balancing Strategy for SDN/NFV Collaborative Deployment.
Proceedings of the 2019 IEEE SmartWorld, 2019

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019

An Automatic Crisis Information Recognition Model Based on BP Neural Network.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

BFO: Batch-File Operations on Massive Files for Consistent Performance Improvement.
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019

A Novel Deep Multi-Modal Feature Fusion Method for Celebrity Video Identification.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Feature Pyramid Based Attention for Cervical Image Classification.
Proceedings of the Multiscale Multimodal Medical Imaging - First International Workshop, 2019

i2Graph: An Incremental Iterative Computation Model for Large Scale Dynamic Graphs.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Resistive Switching Behavior of Solution-Processed AlOx, based RRAM with Ni and TiN Top Electrode at Low Annealing Temperatures.
Proceedings of the 2019 International SoC Design Conference, 2019

Text Watermarking for OOXML Format Documents Based on Color Transformation.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Information Hiding in OOXML Format Data based on the Splitting of Text Elements.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Model-Driven Dynamic Visualization of Spatiotemporal Data in GIS.
Proceedings of the Image and Graphics Technologies and Applications, 2019

Fall detection and recognition based on GCN and 2D Pose.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Multi-stage Real-time Human Head Pose Estimation.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

A Human-in-the-Loop Method for Developing Machine Learning Applications.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Road sludge detection and identification based on improved Yolov3.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Age-invariant Face Recognition Based on Sample Enhancement of Generative Adversarial Networks.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

An Lipreading Modle with DenseNet and E3D-LSTM.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Design of Simple Resistance Automatic Tester Based on STC89C52.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

Autonomous Cognitive GPR Based on Edge Computing and Reinforcement Learning.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Characteristics of Ni/AlOx/Pt RRAM devices with various dielectric fabrication temperatures.
Proceedings of the International Conference on IC Design and Technology, 2019

Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Fog Computing Framework for Cognitive Portable Ground Penetrating Radars.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Binarized Depthwise Separable Neural Network for Object Tracking in FPGA.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Visual Association Rules.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Scalable and fast SVM regression using modern hardware.
World Wide Web, 2018

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs.
IEEE Trans. Inf. Forensics Secur., 2018

A quantum algorithm to approximate the linear structures of Boolean functions.
Math. Struct. Comput. Sci., 2018

Rate control schemes for panoramic video coding.
J. Vis. Commun. Image Represent., 2018

An uniformizing method of MR image intensity transformation.
J. Vis. Commun. Image Represent., 2018

一种具有精确位姿的飞机CAD模型投影图像库设计方法 (Projection Image Library Design Method for Aircraft CAD Model with Accurate Pose).
计算机科学, 2018

Hemodynamic Solution Computation and Pathological Analysis in the Circle of Willis.
J. Medical Syst., 2018

Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.
J. Inf. Hiding Multim. Signal Process., 2018

Face Deduplication in Video Surveillance.
Int. J. Pattern Recognit. Artif. Intell., 2018

Green city: An efficient task joint execution strategy for mobile micro-learning.
Int. J. Distributed Sens. Networks, 2018

Optimization of a parameterized inexact Uzawa method for saddle point problems.
Int. J. Comput. Math., 2018

A voting scheme with post-quantum security based on physical laws.
IACR Cryptol. ePrint Arch., 2018

CIRCpedia v2: An Updated Database for Comprehensive Circular RNA Annotation and Expression Comparison.
Genom. Proteom. Bioinform., 2018

Mutual authenticated quantum no-key encryption scheme over private quantum channel.
Sci. China Inf. Sci., 2018

Development and performance evaluation of an electric-hydraulic control system for subsoiler with flexible tines.
Comput. Electron. Agric., 2018

DEM-CFD coupling simulation and optimization of an inside-filling air-blowing maize precision seed-metering device.
Comput. Electron. Agric., 2018

Maintenance policies for energy systems subject to complex failure processes and power purchasing agreement.
Comput. Ind. Eng., 2018

Image-Based Visibility Estimation Algorithm for Intelligent Transportation Systems.
IEEE Access, 2018

Aspect-based Financial Sentiment Analysis with Deep Neural Networks.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

An Indoor RFID Location Algorithm Based on Support Vector Regression and Particle Swarm Optimization.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Improved Quantum Key Distribution Networks Based on Blom-Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2018

An Energy-Aware and Time-Efficient Adaptive Multi-tree Anti-collision Protocol for RFID Systems.
Proceedings of the IEEE International Conference on RFID Technology & Application, 2018

A sorting algorithm for RFID tags moving on a conveyor belt.
Proceedings of the 2018 IEEE International Conference on RFID, 2018

MQRP: QoS Attribute Decision Optimization for Satellite Network Routing.
Proceedings of the 2018 IEEE International Conference on Networking, 2018

Memristor-based Neuromorphic Implementations for Artificial Neural Networks.
Proceedings of the International SoC Design Conference, 2018

Neuromorphic Properties of Memristor towards Artificial Intelligence.
Proceedings of the International SoC Design Conference, 2018

A Fully Onchip Binarized Convolutional Neural Network FPGA Impelmentation with Accurate Inference.
Proceedings of the International Symposium on Low Power Electronics and Design, 2018

Analysis of Influence of the foam supports to the low RCS targets measures.
Proceedings of the 2018 International Conference on Identification, 2018

A Comparative Study of Ensemble Support Vector Regression Methods for Short-term Load Forecasting.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

A Light CNN based Method for Hand Detection and Orientation Estimation.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Novel proximal group ADMM for placement considering fogging and proximity effects.
Proceedings of the International Conference on Computer-Aided Design, 2018

VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Train and Equip Firefighters with Cognitive Virtual and Augmented Reality.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Intelligent Crime Anomaly Detection in Smart Cities Using Deep Learning.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Securing GPR Data for Use in Smart Cities.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

Picture PassDoodle: Usability Study.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Downlink Subcarriers Required Analysis for Two-Hop OFDMA Cellular System.
Wireless Personal Communications, 2017

A Biocompatible Colorimetric Triphenylamine- Dicyanovinyl Conjugated Fluorescent Probe for Selective and Sensitive Detection of Cyanide Ion in Aqueous Media and Living Cells.
Sensors, 2017

Impacts of Land Cover and Seasonal Variation on Maximum Air Temperature Estimation Using MODIS Imagery.
Remote. Sens., 2017

Multifaceted roles of complementary sequences on circRNA formation.
Quant. Biol., 2017

A penalty PALM method for sparse portfolio selection problems.
Optimization Methods and Software, 2017

Blood circulation diseases treatment based on decentralized adaptive control.
J. Intell. Fuzzy Syst., 2017

Accurate van der Waals force field for gas adsorption in porous materials.
J. Comput. Chem., 2017

CLSTERS: A General System for Reducing Errors of Trajectories Under Challenging Localization Situations.
IMWUT, 2017

Defending shilling attacks in recommender systems using soft co-clustering.
IET Information Security, 2017

Block encryption of quantum messages.
IACR Cryptol. ePrint Arch., 2017

Robust fitting of mixtures of factor analyzers using the trimmed likelihood estimator.
Commun. Stat. Simul. Comput., 2017

Quantum impossible differential and truncated differential cryptanalysis.
CoRR, 2017

Quantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography.
CoRR, 2017

A parallel <i>k</i>-means clustering algorithm based on redundance elimination and extreme points optimization employing MapReduce.
Concurr. Comput. Pract. Exp., 2017

Erratum to: Qubit-wise teleportation and its application in public-key secret communication.
Sci. China Inf. Sci., 2017

Qubit-wise teleportation and its application in public-key secret communication.
Sci. China Inf. Sci., 2017

Trait anger and cyberbullying among young adults: A moderated mediation model of moral disengagement and moral identity.
Comput. Hum. Behav., 2017

Optimal maintenance policy considering maintenance errors for systems operating under performance-based contracts.
Comput. Ind. Eng., 2017

Power Saving Mechanism for Contention-Based M2M Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Big Data Analysis for Output of Chinese Research Papers Based on SCI.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2017

Index Tracking by Using Sparse Support Vector Regression.
Proceedings of the Intelligence Science and Big Data Engineering, 2017

Factorization for projective and metric reconstruction via truncated nuclear norm.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Scalable softmax loss for face verification.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Multi-task convolutional neural network for car attribute recognition.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Multi-pose face recognition by dynamic loss weights.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Single face image super-resolution using local training networks.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Real-time face detection during the night.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Difference networks and second-order difference networks.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Efficient key management for Big Data gathering in dynamic sensor networks.
Proceedings of the 2017 International Conference on Computing, 2017

A Secure Mobile Cloud Photo Storage System.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

A Software Reliability Combination Model Based on Genetic Optimization BP Neural Network.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

Malicious Behavior Analysis of Android GUI Based on ADB.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Theoretical Analysis of Penalized Maximum-Likelihood Patlak Parametric Image Reconstruction in Dynamic PET for Lesion Detection.
IEEE Trans. Medical Imaging, 2016

Bit-oriented quantum public-key encryption based on quantum perfect encryption.
Quantum Inf. Process., 2016

Existence and Stability of Pseudo Almost Periodic Solution for Neutral Type High-Order Hopfield Neural Networks with Delays in Leakage Terms on Time Scales.
Neural Process. Lett., 2016

Quantification of cracked area in thermal path of high-power multi-chip modules using transient thermal impedance measurement.
Microelectron. Reliab., 2016

SiC power MOSFETs performance, robustness and technology maturity.
Microelectron. Reliab., 2016

Image Edge Detection Based on Gaussian Mixture Model in Nonsubsampled Contourlet Domain.
J. Electr. Comput. Eng., 2016

Constructing Interconsistent, Reasonable, and Predictive Models for Both the Kinetic and Thermodynamic Properties of HIV-1 Protease Inhibitors.
J. Chem. Inf. Model., 2016

Are investors rational or perceptual in P2P lending?
Inf. Syst. E Bus. Manag., 2016

An identification method of D-S evidence conflict based on the measurement factors.
IJAMC, 2016

A token-based dynamic scheduled MAC protocol for health monitoring.
EURASIP J. Wireless Comm. and Networking, 2016

A web sentiment analysis method on fuzzy clustering for mobile social media users.
EURASIP J. Wireless Comm. and Networking, 2016

VOAuth: A solution to protect OAuth against phishing.
Comput. Ind., 2016

WBAN on NS-3: Novel implementation with high performance of IEEE 802.15.6.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Shape based co-segmentation repairing by segment evaluation and object proposals.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

Intensive positioning method based on RFID technology.
Proceedings of the 2016 Fourth International Conference on Ubiquitous Positioning, 2016

Maximizing Uniform Multicast Throughput in Multi-Channel Dense Wireless Sensor Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Practical Signature Scheme from \varGamma Γ -Protocol.
Proceedings of the Information Security Practice and Experience, 2016

An improved detection and feature retrieval method of anisotropic scattering for multi-aspect PolSAR data processing based on DRIA framework.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A lithium-ion battery RUL prognosis method using temperature changing rate.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

Trustworthiness calculation of composite Web service output data based on how provenance.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Online Appearance Manifold Learning for Video Classification and Clustering.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Visualizing High Dimensional Feature Space for Feature-Based Information Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

An incremental learning classification algorithm based on forgetting factor for eHealth networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Securing a Connected Mobile System for Healthcare.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Computation-Aided Analysis on Film Credits.
Proceedings of the 11th Annual International Conference of the Alliance of Digital Humanities Organizations, 2016

Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Nonconvex Compressed Sensing by Nature-Inspired Optimization Algorithms.
IEEE Trans. Cybern., 2015

Destination Prediction by Identifying and Clustering Prominent Features from Public Trajectory Datasets.
EAI Endorsed Trans. Scalable Inf. Syst., 2015

A Hybrid Lifetime Extended Directional Approach for WBANs.
Sensors, 2015

Global trends in DEM-related research from 1994 to 2013: a bibliometric analysis.
Scientometrics, 2015

A quantum algorithm for approximating the influences of Boolean functions and its applications.
Quantum Inf. Process., 2015

Square-mean almost periodic solution for stochastic Hopfield neural networks with time-varying delays on timescales.
Neural Computing and Applications, 2015

A homotopy method for nonlinear second-order cone programming.
Numer. Algorithms, 2015

Effect of aluminum concentration on the microstructure and mechanical properties of Sn-Cu-Al solder alloy.
Microelectron. Reliab., 2015

Hedging with Futures: Does Anything Beat the Naïve Hedging Strategy?
Manag. Sci., 2015

A homotopy method based on penalty function for nonlinear semidefinite programming.
J. Global Optimization, 2015

Existence and exponential stability of periodic solution for stochastic Hopfield neural networks on time scales.
Neurocomputing, 2015

Anti-periodic solution for impulsive BAM neural networks with time-varying leakage delays on time scales.
Neurocomputing, 2015

Mutual authenticated quantum no-key encryption scheme over private quantum channel.
CoRR, 2015

Quantum McEliece public-key encryption scheme.
CoRR, 2015

The Classification of Quantum Symmetric-Key Encryption Protocols.
CoRR, 2015

Indistinguishability and semantic security for quantum encryption scheme.
CoRR, 2015

A complete Classification of Quantum Public-key Encryption Protocols.
CoRR, 2015

Bit-oriented quantum public-key encryption.
CoRR, 2015

Quantum differential cryptanalysis to the block ciphers.
CoRR, 2015

CRFs based parallel biomedical named entity recognition algorithm employing MapReduce framework.
Cluster Computing, 2015

Advances in energy and environmental issues in China: theory, models, and applications.
Ann. Oper. Res., 2015

Wavelet de-noising with improved threshold method for bridge health monitoring.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Congestion control algorithm based on dual model control over satellite network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Managing Private Cars Usage from the Perspective of Owners.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

A Generalized Protocol for Mobile Authentication in Healthcare Systems.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Tacit Knowledge Mining Algorithm Based on Linguistic Truth-Valued Concept Lattice.
Proceedings of the 10th International Conference on Intelligent Systems and Knowledge Engineering, 2015

Theoretical analysis of lesion detectability in penalized maximum-likelihood patlak parametric image reconstruction using dynamic PET.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

Two-port network based bilateral control of a steer-by-wire system.
Proceedings of the IECON 2015, 2015

On energy-delay efficiency for WBAN: A multi-channel scheme.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

On Energy-Saving in E-Healthcare: A Directional MAC Protocol for WBAN.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

An Energy-Efficient 2R MAC Based on IEEE 802.15.6 for Health Monitoring.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Efficient Auto-Scaling Approach in the Telco Cloud Using Self-Learning Algorithm.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Multiple Attribute Group Decision Making Under Hesitant Fuzzy Environment.
Proceedings of the Outlooks and Insights on Group Decision and Negotiation, 2015

Visual Data Mining in Transportation Using Multiresolution Data Aggregation.
Proceedings of the Fuzzy System and Data Mining, 2015

A high-sensitivity ASK demodulator for passive UHF RFID tags with automatic voltage limitation and average voltage detection.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

A nanopower, high PSRR full CMOS voltage reference circuit consisting of subthreshold MOSFETs.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
Design and Performance Testing of a Multivendor IEC61850-9-2 Process Bus Based Protection Scheme.
IEEE Trans. Smart Grid, 2014

Existence of Compressible Bilayers in the Functionalized Cahn-Hilliard Equation.
SIAM J. Applied Dynamical Systems, 2014

A local structure adaptive super-resolution reconstruction method based on BTV regularization.
Multim. Tools Appl., 2014

Single pulse avalanche robustness and repetitive stress ageing of SiC power MOSFETs.
Microelectron. Reliab., 2014

Exploring feature sets for two-phase biomedical named entity recognition using semi-CRFs.
Knowl. Inf. Syst., 2014

Subangstrom Accuracy in pHLA-I Modeling by Rosetta FlexPepDock Refinement Protocol.
J. Chem. Inf. Model., 2014

Distributionally Robust Return-Risk Optimization Models and Their Applications.
J. Appl. Math., 2014

C<sup>n</sup>-Almost Periodic Functions and an Application to a Lasota-Wazewska Model on Time Scales.
J. Appl. Math., 2014

Existence and Exponential Stability of Equilibrium Point for Fuzzy BAM Neural Networks with Infinitely Distributed Delays and Impulses on Time Scales.
J. Appl. Math., 2014

Learning Mobile Security with Labware.
IEEE Secur. Priv., 2014

A quantum algorithm for approximating the influences of Boolean functions.
CoRR, 2014

Almost automorphic solution for neutral type high-order Hopfield neural networks with delays in leakage terms on time scales.
Appl. Math. Comput., 2014

A dynamic spectrum re-allocation scheme in GSM and LTE co-existed networks.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Optimized stacking order for 3D-stacked ICs considering the probability and cost of failed bonding.
Proceedings of the Technical Papers of 2014 International Symposium on VLSI Design, 2014

How to Improve Divergent Thinking Capability by Information Technology and Extenics.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Speed following control for differential steering of 4WID electric vehicle.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Low Rank Global Geometric Consistency for Partial-Duplicate Image Search.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

L1-norm global geometric consistency for partial-duplicate image retrieval.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Consistency checking in access control.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Improving Representation of Land-use Maps Derived from Object-oriented Image Classification.
Trans. GIS, 2013

High temperature gate-bias and reverse-bias tests on SiC MOSFETs.
Microelectron. Reliab., 2013

Regional differences of environmental efficiency of China's energy utilization and environmental regulation cost based on provincial panel data and DEA method.
Math. Comput. Model., 2013

Pulse Wave K Value Averaging Computation and Pathological Diagnosis.
JCP, 2013

Comparison of two simulation methods to compute solvation free energies and partition coefficients.
J. Comput. Chem., 2013

Combined QSAR and molecule docking studies on predicting P-glycoprotein inhibitors.
J. Comput. Aided Mol. Des., 2013

Almost Periodic Solutions for Neutral-Type BAM Neural Networks with Delays on Time Scales.
J. Appl. Math., 2013

A Fuzzy Multicriteria Group Decision-Making Method with New Entropy of Interval-Valued Intuitionistic Fuzzy Sets.
J. Appl. Math., 2013

Influence of rotating speed on the coupled bending and torsional vibrations of turbo-generator unit with rub-impact.
Int. J. Online Eng., 2013

A Combination Algorithm of Multiple Lattice-Valued Concept Lattices.
Int. J. Comput. Intell. Syst., 2013

Post-quantum security of encrypted key exchange protocol
CoRR, 2013

Distributed quantum election scheme
CoRR, 2013

Investigating the linear structure of Boolean functions based on Simon's period-finding quantum algorithm.
CoRR, 2013

Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding.
CoRR, 2013

A homotopy method for nonlinear semidefinite programming.
Comput. Optim. Appl., 2013

Proportional sharing and DEA in allocating the fixed cost.
Appl. Math. Comput., 2013

Strong convergence theorems of total quasi-ϕ-asymptotically nonexpansive semi-groups in Banach spaces.
Appl. Math. Comput., 2013

Carrier Aggregation Based Interference Coordination for LTE-A Macro-Pico HetNet.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Auditory Context Recognition Combining Discriminative and Generative Models.
Proceedings of the Advances in Multimedia Information Processing - PCM 2013, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Teaching business analytics.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Entity authentication in a mobile-cloud environment.
Proceedings of the Cyber Security and Information Intelligence, 2013

Research of Data Provenance Semantic Annotation for Dependency Analysis.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

2012
A Fast Algorithm for Multidimensional Ellipsoid-Specific Fitting by Minimizing a New Defined Vector Norm of Residuals Using Semidefinite Programming.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Tail nonlinearly transformed risk measure and its application.
OR Spectr., 2012

Improving SVM through a Risk Decision Rule Running on MATLAB.
J. Softw., 2012

Application of Entropy-weight Fuzzy Comprehensive Evaluation Method in Post Safety Competency Appraisal of Special Operation Staff in Coal Enterprises.
J. Softw., 2012

Prediction of Water Inrush from Coal Floor Based on Small Sample Data Mining Technology and Realization Using MATLAB.
J. Softw., 2012

Guest Editorial.
J. Softw., 2012

Research of Wireless Sensor Routing Algorithm Based on Uneven Clustering.
J. Networks, 2012

Scenario tree generation approaches using K-means and LP moment matching methods.
J. Comput. Appl. Math., 2012

The Split Common Fixed Point Problem for Total Asymptotically Strictly Pseudocontractive Mappings.
J. Appl. Math., 2012

A note on quantum McEliece public-key cryptosystem
CoRR, 2012

On Quantum Turing Machine Halting Deterministically
CoRR, 2012

Tacit knowledge mining algorithm based on linguistic truth-valued concept lattice
CoRR, 2012

Hybrid projection method for generalized mixed equilibrium problem and fixed point problem of infinite family of asymptotically quasi-ϕ-nonexpansive mappings in Banach spaces.
Appl. Math. Comput., 2012

Demiclosed principle and Δ-convergence theorems for total asymptotically nonexpansive mappings in CAT(0) spaces.
Appl. Math. Comput., 2012

Automatic Neighbor Relation Penetration Probability Prediction.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Regularization design for breast lesion detection in penalized maximum likelihood image reconstruction.
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012

Ambulatory real-time micro-sensor motion capture.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

Direct least square fitting of ellipsoids.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Ensemble symbol recognition with Hough forest.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

The application of improved evolutionary strategy algorithm in optimization.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Auditory context classification using random forests.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Exploring Covert Channel in Android Platform.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

The Construction of Music Domain Ontology.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Research on FNN-based security defence architecture model of scada network.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System.
Proceedings of the Web Technologies and Applications, 2012

The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNN.
Proceedings of the Web Technologies and Applications, 2012

Trilateral Filtering-Based Retinex for Image Enhancement.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Distance-preserving dimensionality reduction.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2011

A time-domain physics-of-failure model for the lifetime prediction of wire bond interconnects.
Microelectron. Reliab., 2011

Microstructural evolution of ultrasonically bonded high purity Al wire during extended range thermal cycling.
Microelectron. Reliab., 2011

Postoptimality for mean-risk stochastic mixed-integer programs and its application.
Math. Methods Oper. Res., 2011

Multi-source Information Fusion Based on Data Driven.
J. Softw., 2011

Economic Development and Financial Support for Coal Resource Cities.
JCP, 2011

Mine Ventilation Optimization Analysis and Airflow Control Based on Harmony Annealing Search.
JCP, 2011

A Bayesian Belief Net Model to Evaluating Organizational Safety Risks.
JCP, 2011

Guest Editorial.
JCP, 2011

Anti-periodic solutions for a class of Cohen-Grossberg neural networks with time-varying delays on time scales.
Int. J. Syst. Sci., 2011

Bin-Packing Algorithms for periodic Task Scheduling.
Int. J. Pattern Recognit. Artif. Intell., 2011

Laser Measurement Key Technologies and Application in Robot Autonomous Navigation.
Int. J. Pattern Recognit. Artif. Intell., 2011

A Novel Group Signature Scheme Based on MPKC.
IACR Cryptol. ePrint Arch., 2011

Predicting disease-associated substitution of a single amino acid by analyzing residue interactions.
BMC Bioinform., 2011

Toward an improved discrimination of outer membrane proteins using a sequence-based approach.
Biosyst., 2011

Approximation theorems for total quasi-ϕ-asymptotically nonexpansive mappings with applications.
Appl. Math. Comput., 2011

A stochastic differential equation model for spectrum utilization.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Unsupervised Russian POS Tagging with Appropriate Context.
Proceedings of the Text, Speech and Dialogue - 14th International Conference, 2011

Traffic-Aware Spectrum Assignment in Wireless Networks.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Environmental sound classification for scene recognition using local discriminant bases and HMM.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Performance assessment of a IEC 61850-9-2 based protection scheme for a transmission substation.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

The Non-signal Intersection Traffic Behavior Analysis Based on Game Theory.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011

Research and Implementation of Safe Production and Quality Traceability System for Fruit.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

Visualization of Virtual Plants Growth Based on Open L-System.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

Real-Time Detection of Covert Channels in Highly Virtualized Environments.
Proceedings of the Critical Infrastructure Protection V, 2011

The Relationship between the Newborn Rats' Hypoxic-Ischemic Brain Damage and Heart Beat Interval Information.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Research on Milling Globoidal Indexing Cam Based on Pro / NC.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Visual Mining Intrusion Behaviors by Using Swarm Technology.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

A Parts-Based Multi-scale Method for Symbol Recognition.
Proceedings of the Graphics Recognition. New Trends and Challenges, 2011

The design and implementation of MDF incoming power disturbance alarm system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Business Strategies Selection of Aviation Passenger Transportation Enterprises Based on High Speed Railway Competition.
Proceedings of the Advances in Computer Science, 2011

Usable protection to healthcare application.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Attacker behavior analysis in multi-stage attack detection system.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Network covert channels on the Android platform.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Research and Simulation on Grid Resources Location.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Study of the Eye-tracking Methods Based on Video.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Application of Internet of Things in the Community Security Management.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Validation of stochastic traffic flow model with microscopic traffic simulation.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2011

Camera Resectioning from Image Edges with the L<sub>∞</sub>-Norm Using Linear Programming.
Proceedings of the British Machine Vision Conference, 2011

Dual Trust Secure protocol for cluster-based wireless sensor networks.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Progress Towards the First Wireless Sensor Networks Consisting of Inkjet-Printed, Paper-Based RFID-Enabled Sensor Tags.
Proceedings of the IEEE, 2010

Decision Making with Uncertainty Information Based on Lattice-Valued Fuzzy Concept Lattice.
J. UCS, 2010

Coal Mine Safety Evaluation with V-Fold Cross-Validation and BP Neural Network.
JCP, 2010

A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections.
Int. J. Inf. Secur. Priv., 2010

A decision method based on uncertainty reasoning of linguistic truth-valued concept lattice.
Int. J. General Systems, 2010

Periodic Solutions for a Class of Fuzzy BAM Neural Networks with Distributed Delays and Variable Coefficients.
Int. J. Bifurc. Chaos, 2010

Distributive equations of implications based on nilpotent triangular norms.
Int. J. Approx. Reason., 2010

Corrigendum to "Using fuzzy theory and information entropy for water quality assessment in three Gorges region, China" [Expert Systems with Applications 37 (3) (2010) 2517-2521].
Expert Syst. Appl., 2010

Using fuzzy theory and information entropy for water quality assessment in Three Gorges region, China.
Expert Syst. Appl., 2010

Stronger convergence theorems for an infinite family of uniformly quasi-Lipschitzian mappings in convex metric spaces.
Appl. Math. Comput., 2010

A system of mixed equilibrium problems, fixed point problems of strictly pseudo-contractive mappings and nonexpansive semi-groups.
Appl. Math. Comput., 2010

Alerts Analysis and Visualization in Network-based Intrusion Detection Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

NPA-BT: A Network Performance Aware BitTorrent Traffic Optimization Mechanism.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Analysis of Mine Ventilation Network Based on Harmony Search.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Innovative CS capstone projects on green energy applications with WSN in a box.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

A method for designing S-box based on chaotic neural network.
Proceedings of the Sixth International Conference on Natural Computation, 2010

The study about fingerprint recognition based on orthogonal transforms.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Application of ETSIAT to the toxicity prediction of aliphatic alcohols.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Multistage attack detection system for network administrators using data mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Alerts visualization and clustering in network-based intrusion detection.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Two-phase biomedical named entity recognition based on semi-CRFs.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Implementing Medical CT Algorithms on Stand-alone FPGA Based Systems Using an Efficient Workflow with SysGen and Simulink.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Design and Development of Radio Frequency Identification (RFID) and RFID-Enabled Sensors on Flexible Low Cost Substrates
Synthesis Lectures on RF/Microwaves, Morgan & Claypool Publishers, 2009

Visual Association Rules.
Proceedings of the Encyclopedia of Database Systems, 2009

Incremental Isometric Embedding of High-Dimensional Data Using Connected Neighborhood Graphs.
IEEE Trans. Pattern Anal. Mach. Intell., 2009

Formation Mechanism of Green Strategic Alliances and Its Cooperative System for Coal-Mining Eco-Industrial Parks Based on Synthetic Decision Support System.
JCP, 2009

Bifurcation of nontrivial periodic solutions for a biochemical model with impulsive perturbations.
Appl. Math. Comput., 2009

Multiresolution data aggregation for analytical exploration of large relational data.
Proceedings of the Visualization and Data Analysis, 2009

The Wrong Analysis of the Price Forecast Model Based on Fractal Theory in Commodity Price Forecasting.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

Teaching database security and auditing.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Ehancing the Implementation of Adaboost Algorithm on a DSP-Based Platform.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Generalizable Features Help Semantic Role Labeling.
Proceedings of the 23rd Pacific Asia Conference on Language, Information and Computation, 2009

Extreme-low power NaOCl sensor using EG-CNTs as Sensing Element.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

A Linking Mechanism to Integrate Components of a Visualization Framework.
Proceedings of the 13th International Conference on Information Visualisation, 2009

Non-model self-learning control of nonlinear system.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An extended version of scaled small gain condition.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

The Application of Non-linear Regression Method to the Functional Connectivity during the Encoding and the Retrieval of Chinese Semantic Memory.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Predicting Available Bandwidth of Internet Path with Ultra Metric Space-Based Approaches.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The "Green" Ultimate Solution for an Ever Improving Life Quality and Safety?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Research on the Design of the Categorization System for Moving Information in Video Stream and Its Implementation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Footprint Splatting for Interactive Visualization of Large Data Sets.
Proceedings of the 2009 International Conference on Computer Graphics & Virtual Reality, 2009

Practical Quantum No-key Protocol with Identification.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Visual Exploration of Frequent Itemsets and Association Rules.
Proceedings of the Visual Data Mining - Theory, Techniques and Tools for Visual Analytics, 2008

Visual Database.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Passivity and Optimal Control of Descriptor Biological Complex Systems.
IEEE Trans. Autom. Control., 2008

Alignment of Overlapping Locally Scaled Patches for Multidimensional Scaling and Dimensionality Reduction.
IEEE Trans. Pattern Anal. Mach. Intell., 2008

SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors.
Int. J. Inf. Secur. Priv., 2008

Vision-based Fuzzy Coordination Control for Multiple Robots.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Conductive Inkjet-Printed Wireless Sensor Nodes on Flexible Low-Cost Paper-Based Substrates.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2008

Partner Selection and Evaluation in Virtual Research Center Based on Trapezoidal Fuzzy AHP.
Proceedings of the Advances in Neural Networks, 2008

The Chaos-Based Shuffled Frog Leaping Algorithm and Its Application.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Observation-Based Multi-robot Cooperative Formation Control.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Design and Realization of AHP Toolbox in MATLAB.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

An Algorithm for Acquiring PRN Code in DSSS System Based on Sub-sampling.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Ontology and Metadata for E-learning Based on Grid.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Detection of Changes in Transitive Associations by Shortest-path Analysis of Protein Interaction Networks Integrated with Gene Expression Profiles.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Fuzzy-neuro position/force control for robotic manipulators with uncertainties.
Soft Comput., 2007

MIPSPlantsDB - plant database resource for integrative and comparative plant genome research.
Nucleic Acids Res., 2007

Optimal Wavelength Sharing Policies in OBS Networks Subject to QoS Constraints.
IEEE J. Sel. Areas Commun., 2007

Generalized wavelength sharing policies for absolute QoS guarantees in OBS networks.
IEEE J. Sel. Areas Commun., 2007

Efficient and accurate numerical methods for the Klein-Gordon-Schrödinger equations.
J. Comput. Phys., 2007

New invariant of DNA sequence based on 3DD-curves and its application on phylogeny.
J. Comput. Chem., 2007

Energy Efficiency Analysis of a Scroll-type Air Motor Based on a Simplified Mathematical Model.
Proceedings of the World Congress on Engineering, 2007

Motion Detection Based On Accumulative Optical Flow and Double Background Filtering.
Proceedings of the World Congress on Engineering, 2007

Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive Sensing and Vehicle Security.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Inkjet-Printed RFID Tags on Paper-based Substrates for UHF "Cognitive Intelligence" Applications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Gene Identification Based on Geometrical Representation of DNA Sequence.
Proceedings of the Third International Conference on Natural Computation, 2007

A Method for Gene Identification by Dynamic Feature Choosing.
Proceedings of the Digital Human Modeling, 2007

Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Building k-Connected Neighborhood Graphs for Isometric Data Embedding.
IEEE Trans. Pattern Anal. Mach. Intell., 2006

Who will you ask? An empirical study of interpersonal task information seeking.
J. Assoc. Inf. Sci. Technol., 2006

A Biologically Inspired Shape Representation Model Based on Part Decomposition.
Proceedings of the International Joint Conference on Neural Networks, 2006

Incremental Construction of Neighborhood Graphs for Nonlinear Dimensionality Reduction.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Building Connected Neighborhood Graphs for Locally Linear Embedding.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Dynamic Wavelength Sharing Policies for Absolute QoS in OBS Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Formal Representation and Transformation of DTDs to Sem-ODM Semantic Schemas.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006

Semi-automatic Ground Truth Generation for Chart Image Recognition.
Proceedings of the Document Analysis Systems VII, 7th International Workshop, 2006

A Framework for Absolute QoS Guarantees in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

SecCMP: a secure chip-multiprocessor architecture.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
Pruning and Visualizing Generalized Association Rules in Parallel Coordinates.
IEEE Trans. Knowl. Data Eng., 2005

Teaching digital noise and noise margin issues in engineering education.
IEEE Trans. Educ., 2005

Building <i>k</i>-edge-connected neighborhood graph for distance-based data projection.
Pattern Recognit. Lett., 2005

Building k Edge-Disjoint Spanning Trees of Minimum Total Length for Isometric Data Embedding.
IEEE Trans. Pattern Anal. Mach. Intell., 2005

Theoretical studies on the electronic and optical properties of two new alternating fluorene/carbazole copolymers.
J. Comput. Chem., 2005

Path Switching in OBS Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Building connected neighborhood graphs for isometric data embedding.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

An Effective Two-Stage Neural Network Model and Its Application on Flood Loss Prediction.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Grassland ecosystem services and their economic evaluation in qinghai-tibetan plateau based on RS and GIS.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Spatio-temporal changes of land use in jinghe watershed.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Research on Wavelet Domain Fractal Coding in Digital Watermarking.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Data embedding techniques and applications.
Proceedings of the Second International Workshop on Computer Vision meets Databases, 2005

Transforming Sem-ODM semantic schemas to DTDs.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Distance-preserving projection of high dimensional data.
Pattern Recognit. Lett., 2004

Distance-preserving mapping of patterns to 3-space.
Pattern Recognit. Lett., 2004

Distance-Preserving Projection of High-Dimensional Data for Nonlinear Dimensionality Reduction.
IEEE Trans. Pattern Anal. Mach. Intell., 2004

A flexible and effective XML storage and retrieval system.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Mining Short Association Rules with One Database Scan.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

XQuery Translation to Sem-SQL.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Evaluation of Distance-Based Techniques for Data Projection and Dimensionality Reduction.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

k-Edge Connected Neighborhood Graph for Geodesic Distance Estimation and Nonlinear Data Projection.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Sammon's Nonlinear Mapping Using Geodesic Distances.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A Unified Model of Optical and Physical Dot Gain in Printing.
Proceedings of the Second European Conference on Colour in Graphics, Imaging, and Vision, 2004

2003
Visual Exploration of Large Relational Data Sets through 3D Projections and Footprint Splatting.
IEEE Trans. Knowl. Data Eng., 2003

Web-Based Interactive 3D Visualization for Computer Graphics Education.
IJDET, 2003

Enhanced Techniques for Current Balanced Logic in Mixed-Signal ICs.
Proceedings of the 2003 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2003), 2003

Analyzing Internal-Switching Induced Simultaneous Switching Noise.
Proceedings of the 4th International Symposium on Quality of Electronic Design (ISQED 2003), 2003

Design of enhancement current-balanced logic for mixed-signal ICs.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Visualizing Many-to-Many Association Rules.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003

Use of Web-Based Live Demos in Computer Science Courses.
Proceedings of the Advances in Web-Based Learning, 2003

Dynamic Clustering of Web Search Results.
Proceedings of the Computational Science and Its Applications, 2003

Visualizing Frequent Itemsets, Association Rules, and Sequential Patterns in Parallel Coordinates.
Proceedings of the Computational Science and Its Applications, 2003

Visualizing Large Relational Datasets by Combining Grand Tour with Footprint Splatting of High Dimensional Data Cubes.
Proceedings of the Computational Science and Its Applications, 2003

A decoupling technique for CMOS strong-coupled structures.
Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, 2003

Exploring Feature Space for Image Retrieval.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

2002
Tetrahedron Mapping of Points from N-Space to Three-Space.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
XML Wrapper: Storing and Retrieving XML Documents Using Semantic Binary Object-Oriented Database (Sem-ODB).
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

2000
Light Scattering and Ink Penetration Effects on Tone Reproduction.
Proceedings of the PICS 2000: Image Processing, 2000

Interactive exploration of very large relational datasets through 3D dynamic projections.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

Ink penetration and its effects on printing.
Proceedings of the Color Imaging: Device-Independent Color, 2000

n23Tool: a Tool for Exploring Large Relational Data Sets Through 3D Dynamic Projections.
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000

1999
3D Grand Tour for Multidimensional Data and Clusters.
Proceedings of the Advances in Intelligent Data Analysis, Third International Symposium, 1999

1997
Towards a Semantic Image Database System.
Data Knowl. Eng., 1997

Empirical Results on Anytime Propositional Reasoning .
Proceedings of the 9th International Conference on Tools with Artificial Intelligence, 1997

1995
Towards restructuring and normalization of types in databases.
J. Comput. Sci. Technol., 1995

1994
A Hypertext Query Language for Images.
SIGMOD Rec., 1994

1989
QPF A versatile query language for a knowledge-based geographical information system.
Int. J. Geogr. Inf. Sci., 1989


  Loading...