Li Yang

According to our database1, Li Yang authored at least 412 papers between 1989 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Novel Resource Deployment Approach to Mobile Microlearning: From Energy-Saving Perspective.
Wireless Communications and Mobile Computing, 2019

Fingerprint Protected Password Authentication Protocol.
Security and Communication Networks, 2019

Periodic Solution for ∇ -Stochastic High-Order Hopfield Neural Networks with Time Delays on Time Scales.
Neural Processing Letters, 2019

An embedded implementation of CNN-based hand detection and orientation estimation algorithm.
Mach. Vis. Appl., 2019

Inference attack in Android Activity based on program fingerprint.
J. Network and Computer Applications, 2019

A crisis information propagation model based on a competitive relation.
J. Ambient Intelligence and Humanized Computing, 2019

A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intelligence and Humanized Computing, 2019

Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty.
HCIS, 2019

Fast congestion-free consistent flow forwarding rules update in software defined networking.
Future Generation Comp. Syst., 2019

A two-phase preventive maintenance policy considering imperfect repair and postponed replacement.
European Journal of Operational Research, 2019

Using Bernstein-Vazirani algorithm to attack block ciphers.
Des. Codes Cryptogr., 2019

One-way information reconciliation schemes of quantum key distribution.
Cybersecurity, 2019

Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness.
CoRR, 2019

Computer-aided Detection of Squamous Carcinoma of the Cervix in Whole Slide Images.
CoRR, 2019

Saliency Prediction on Omnidirectional Images with Generative Adversarial Imitation Learning.
CoRR, 2019

Online handwritten signature verification based on the most stable feature and partition.
Cluster Computing, 2019

Fruit detection for strawberry harvesting robot in non-structural environment based on Mask-RCNN.
Computers and Electronics in Agriculture, 2019

Development of a variable-rate seeding control system for corn planters Part I: Design and laboratory experiment.
Computers and Electronics in Agriculture, 2019

Development of a variable-rate seeding control system for corn planters Part II: Field performance.
Computers and Electronics in Agriculture, 2019

Computational Fluid Dynamics aided investigation and optimization of a tunnel-ventilated poultry house in China.
Computers and Electronics in Agriculture, 2019

Multistage Active Distribution Network Planning With Restricted Operation Scenario Selection.
IEEE Access, 2019

Optimal Scheduling of CCHP With Distributed Energy Resources Based on Water Cycle Algorithm.
IEEE Access, 2019

Disturbance Observer Based on Biologically Inspired Integral Sliding Mode Control for Trajectory Tracking of Mobile Robots.
IEEE Access, 2019

Optimal Bidding Strategy for a Power Producer Under Monthly Pre-Listing Balancing Mechanism in Actual Sequential Energy Dual-Market in China.
IEEE Access, 2019

An Energy Imbalance Settlement Mechanism Considering Decision-Making Strategy of Retailers Under Renewable Portfolio Standard.
IEEE Access, 2019

Text Watermarking for OOXML Format Documents Based on Color Transformation.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Information Hiding in OOXML Format Data based on the Splitting of Text Elements.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Model-Driven Dynamic Visualization of Spatiotemporal Data in GIS.
Proceedings of the Image and Graphics Technologies and Applications, 2019

Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Fog Computing Framework for Cognitive Portable Ground Penetrating Radars.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Binarized Depthwise Separable Neural Network for Object Tracking in FPGA.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Scalable and fast SVM regression using modern hardware.
World Wide Web, 2018

Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing.
Wireless Communications and Mobile Computing, 2018

A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs.
IEEE Trans. Information Forensics and Security, 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Network, 2018

A quantum algorithm to approximate the linear structures of Boolean functions.
Mathematical Structures in Computer Science, 2018

Rate control schemes for panoramic video coding.
J. Visual Communication and Image Representation, 2018

An uniformizing method of MR image intensity transformation.
J. Visual Communication and Image Representation, 2018

Hemodynamic Solution Computation and Pathological Analysis in the Circle of Willis.
J. Medical Systems, 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intelligence and Humanized Computing, 2018

Face Deduplication in Video Surveillance.
IJPRAI, 2018

Green city: An efficient task joint execution strategy for mobile micro-learning.
IJDSN, 2018

Optimization of a parameterized inexact Uzawa method for saddle point problems.
Int. J. Comput. Math., 2018

A voting scheme with post-quantum security based on physical laws.
IACR Cryptology ePrint Archive, 2018

CIRCpedia v2: An Updated Database for Comprehensive Circular RNA Annotation and Expression Comparison.
Genomics, Proteomics & Bioinformatics, 2018

Block encryption of quantum messages.
CoRR, 2018

A quantum related-key attack based on Bernstein-Vazirani algorithm.
CoRR, 2018

A voting scheme with post-quantum security based on physical laws.
CoRR, 2018

SADUS: Secure data deletion in user space for mobile devices.
Computers & Security, 2018

Mutual authenticated quantum no-key encryption scheme over private quantum channel.
SCIENCE CHINA Information Sciences, 2018

Development and performance evaluation of an electric-hydraulic control system for subsoiler with flexible tines.
Computers and Electronics in Agriculture, 2018

DEM-CFD coupling simulation and optimization of an inside-filling air-blowing maize precision seed-metering device.
Computers and Electronics in Agriculture, 2018

Maintenance policies for energy systems subject to complex failure processes and power purchasing agreement.
Computers & Industrial Engineering, 2018

Image-Based Visibility Estimation Algorithm for Intelligent Transportation Systems.
IEEE Access, 2018

Aspect-based Financial Sentiment Analysis with Deep Neural Networks.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

An Indoor RFID Location Algorithm Based on Support Vector Regression and Particle Swarm Optimization.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Improved Quantum Key Distribution Networks Based on Blom-Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2018

A sorting algorithm for RFID tags moving on a conveyor belt.
Proceedings of the 2018 IEEE International Conference on RFID, 2018

MQRP: QoS Attribute Decision Optimization for Satellite Network Routing.
Proceedings of the 2018 IEEE International Conference on Networking, 2018

Memristor-based Neuromorphic Implementations for Artificial Neural Networks.
Proceedings of the International SoC Design Conference, 2018

Neuromorphic Properties of Memristor towards Artificial Intelligence.
Proceedings of the International SoC Design Conference, 2018

A Fully Onchip Binarized Convolutional Neural Network FPGA Impelmentation with Accurate Inference.
Proceedings of the International Symposium on Low Power Electronics and Design, 2018

Analysis of Influence of the foam supports to the low RCS targets measures.
Proceedings of the 2018 International Conference on Identification, 2018

A Comparative Study of Ensemble Support Vector Regression Methods for Short-term Load Forecasting.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

A Light CNN based Method for Hand Detection and Orientation Estimation.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Novel proximal group ADMM for placement considering fogging and proximity effects.
Proceedings of the International Conference on Computer-Aided Design, 2018

VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Train and Equip Firefighters with Cognitive Virtual and Augmented Reality.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Intelligent Crime Anomaly Detection in Smart Cities Using Deep Learning.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Securing GPR Data for Use in Smart Cities.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

Picture PassDoodle: Usability Study.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Downlink Subcarriers Required Analysis for Two-Hop OFDMA Cellular System.
Wireless Personal Communications, 2017

A Biocompatible Colorimetric Triphenylamine- Dicyanovinyl Conjugated Fluorescent Probe for Selective and Sensitive Detection of Cyanide Ion in Aqueous Media and Living Cells.
Sensors, 2017

Impacts of Land Cover and Seasonal Variation on Maximum Air Temperature Estimation Using MODIS Imagery.
Remote Sensing, 2017

A penalty PALM method for sparse portfolio selection problems.
Optimization Methods and Software, 2017

Blood circulation diseases treatment based on decentralized adaptive control.
Journal of Intelligent and Fuzzy Systems, 2017

Accurate van der Waals force field for gas adsorption in porous materials.
Journal of Computational Chemistry, 2017

CLSTERS: A General System for Reducing Errors of Trajectories Under Challenging Localization Situations.
IMWUT, 2017

Defending shilling attacks in recommender systems using soft co-clustering.
IET Information Security, 2017

Block encryption of quantum messages.
IACR Cryptology ePrint Archive, 2017

Robust fitting of mixtures of factor analyzers using the trimmed likelihood estimator.
Communications in Statistics - Simulation and Computation, 2017

Quantum impossible differential and truncated differential cryptanalysis.
CoRR, 2017

Using Bernstein-Vazirani Algorithm to Attack Block Ciphers.
CoRR, 2017

Quantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography.
CoRR, 2017

A parallel k-means clustering algorithm based on redundance elimination and extreme points optimization employing MapReduce.
Concurrency and Computation: Practice and Experience, 2017

Erratum to: Qubit-wise teleportation and its application in public-key secret communication.
SCIENCE CHINA Information Sciences, 2017

Qubit-wise teleportation and its application in public-key secret communication.
SCIENCE CHINA Information Sciences, 2017

Trait anger and cyberbullying among young adults: A moderated mediation model of moral disengagement and moral identity.
Computers in Human Behavior, 2017

Optimal maintenance policy considering maintenance errors for systems operating under performance-based contracts.
Computers & Industrial Engineering, 2017

Power Saving Mechanism for Contention-Based M2M Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Big Data Analysis for Output of Chinese Research Papers Based on SCI.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2017

Index Tracking by Using Sparse Support Vector Regression.
Proceedings of the Intelligence Science and Big Data Engineering, 2017

Factorization for projective and metric reconstruction via truncated nuclear norm.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Scalable softmax loss for face verification.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Multi-task convolutional neural network for car attribute recognition.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Multi-pose face recognition by dynamic loss weights.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Single face image super-resolution using local training networks.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Real-time face detection during the night.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Difference networks and second-order difference networks.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Efficient key management for Big Data gathering in dynamic sensor networks.
Proceedings of the 2017 International Conference on Computing, 2017

A Secure Mobile Cloud Photo Storage System.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

A Software Reliability Combination Model Based on Genetic Optimization BP Neural Network.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

Malicious Behavior Analysis of Android GUI Based on ADB.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Theoretical Analysis of Penalized Maximum-Likelihood Patlak Parametric Image Reconstruction in Dynamic PET for Lesion Detection.
IEEE Trans. Med. Imaging, 2016

Bit-oriented quantum public-key encryption based on quantum perfect encryption.
Quantum Information Processing, 2016

Existence and Stability of Pseudo Almost Periodic Solution for Neutral Type High-Order Hopfield Neural Networks with Delays in Leakage Terms on Time Scales.
Neural Processing Letters, 2016

Quantification of cracked area in thermal path of high-power multi-chip modules using transient thermal impedance measurement.
Microelectronics Reliability, 2016

SiC power MOSFETs performance, robustness and technology maturity.
Microelectronics Reliability, 2016

Image Edge Detection Based on Gaussian Mixture Model in Nonsubsampled Contourlet Domain.
J. Electrical and Computer Engineering, 2016

Constructing Interconsistent, Reasonable, and Predictive Models for Both the Kinetic and Thermodynamic Properties of HIV-1 Protease Inhibitors.
Journal of Chemical Information and Modeling, 2016

Are investors rational or perceptual in P2P lending?
Inf. Syst. E-Business Management, 2016

An identification method of D-S evidence conflict based on the measurement factors.
IJAMC, 2016

A token-based dynamic scheduled MAC protocol for health monitoring.
EURASIP J. Wireless Comm. and Networking, 2016

A web sentiment analysis method on fuzzy clustering for mobile social media users.
EURASIP J. Wireless Comm. and Networking, 2016

VOAuth: A solution to protect OAuth against phishing.
Computers in Industry, 2016

WBAN on NS-3: Novel implementation with high performance of IEEE 802.15.6.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Shape based co-segmentation repairing by segment evaluation and object proposals.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

Intensive positioning method based on RFID technology.
Proceedings of the 2016 Fourth International Conference on Ubiquitous Positioning, 2016

Maximizing Uniform Multicast Throughput in Multi-Channel Dense Wireless Sensor Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Practical Signature Scheme from \varGamma Γ -Protocol.
Proceedings of the Information Security Practice and Experience, 2016

An improved detection and feature retrieval method of anisotropic scattering for multi-aspect PolSAR data processing based on DRIA framework.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A lithium-ion battery RUL prognosis method using temperature changing rate.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

Trustworthiness calculation of composite Web service output data based on how provenance.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Online Appearance Manifold Learning for Video Classification and Clustering.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Visualizing High Dimensional Feature Space for Feature-Based Information Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

An incremental learning classification algorithm based on forgetting factor for eHealth networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Securing a Connected Mobile System for Healthcare.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Computation-Aided Analysis on Film Credits.
Proceedings of the Digital Humanities 2016, 2016

Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Nonconvex Compressed Sensing by Nature-Inspired Optimization Algorithms.
IEEE Trans. Cybernetics, 2015

Destination Prediction by Identifying and Clustering Prominent Features from Public Trajectory Datasets.
EAI Endorsed Trans. Scalable Information Systems, 2015

A Hybrid Lifetime Extended Directional Approach for WBANs.
Sensors, 2015

Global trends in DEM-related research from 1994 to 2013: a bibliometric analysis.
Scientometrics, 2015

A quantum algorithm for approximating the influences of Boolean functions and its applications.
Quantum Information Processing, 2015

Square-mean almost periodic solution for stochastic Hopfield neural networks with time-varying delays on timescales.
Neural Computing and Applications, 2015

A homotopy method for nonlinear second-order cone programming.
Numerical Algorithms, 2015

Effect of aluminum concentration on the microstructure and mechanical properties of Sn-Cu-Al solder alloy.
Microelectronics Reliability, 2015

Hedging with Futures: Does Anything Beat the Naïve Hedging Strategy?
Management Science, 2015

A homotopy method based on penalty function for nonlinear semidefinite programming.
J. Global Optimization, 2015

Existence and exponential stability of periodic solution for stochastic Hopfield neural networks on time scales.
Neurocomputing, 2015

Anti-periodic solution for impulsive BAM neural networks with time-varying leakage delays on time scales.
Neurocomputing, 2015

Mutual authenticated quantum no-key encryption scheme over private quantum channel.
CoRR, 2015

Quantum McEliece public-key encryption scheme.
CoRR, 2015

The Classification of Quantum Symmetric-Key Encryption Protocols.
CoRR, 2015

Indistinguishability and semantic security for quantum encryption scheme.
CoRR, 2015

A complete Classification of Quantum Public-key Encryption Protocols.
CoRR, 2015

Bit-oriented quantum public-key encryption.
CoRR, 2015

Quantum differential cryptanalysis to the block ciphers.
CoRR, 2015

CRFs based parallel biomedical named entity recognition algorithm employing MapReduce framework.
Cluster Computing, 2015

Advances in energy and environmental issues in China: theory, models, and applications.
Annals OR, 2015

Wavelet de-noising with improved threshold method for bridge health monitoring.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Congestion control algorithm based on dual model control over satellite network.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Managing Private Cars Usage from the Perspective of Owners.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

A Generalized Protocol for Mobile Authentication in Healthcare Systems.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Tacit Knowledge Mining Algorithm Based on Linguistic Truth-Valued Concept Lattice.
Proceedings of the 10th International Conference on Intelligent Systems and Knowledge Engineering, 2015

Theoretical analysis of lesion detectability in penalized maximum-likelihood patlak parametric image reconstruction using dynamic PET.
Proceedings of the 12th IEEE International Symposium on Biomedical Imaging, 2015

Two-port network based bilateral control of a steer-by-wire system.
Proceedings of the IECON 2015, 2015

On energy-delay efficiency for WBAN: A multi-channel scheme.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

On Energy-Saving in E-Healthcare: A Directional MAC Protocol for WBAN.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

An Energy-Efficient 2R MAC Based on IEEE 802.15.6 for Health Monitoring.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Efficient Auto-Scaling Approach in the Telco Cloud Using Self-Learning Algorithm.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Multiple Attribute Group Decision Making Under Hesitant Fuzzy Environment.
Proceedings of the Outlooks and Insights on Group Decision and Negotiation, 2015

Visual Data Mining in Transportation Using Multiresolution Data Aggregation.
Proceedings of the Fuzzy System and Data Mining, 2015

A high-sensitivity ASK demodulator for passive UHF RFID tags with automatic voltage limitation and average voltage detection.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

A nanopower, high PSRR full CMOS voltage reference circuit consisting of subthreshold MOSFETs.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
Design and Performance Testing of a Multivendor IEC61850-9-2 Process Bus Based Protection Scheme.
IEEE Trans. Smart Grid, 2014

Existence of Compressible Bilayers in the Functionalized Cahn-Hilliard Equation.
SIAM J. Applied Dynamical Systems, 2014

A local structure adaptive super-resolution reconstruction method based on BTV regularization.
Multimedia Tools Appl., 2014

Single pulse avalanche robustness and repetitive stress ageing of SiC power MOSFETs.
Microelectronics Reliability, 2014

Exploring feature sets for two-phase biomedical named entity recognition using semi-CRFs.
Knowl. Inf. Syst., 2014

Subangstrom Accuracy in pHLA-I Modeling by Rosetta FlexPepDock Refinement Protocol.
Journal of Chemical Information and Modeling, 2014

Distributionally Robust Return-Risk Optimization Models and Their Applications.
J. Applied Mathematics, 2014

Cn-Almost Periodic Functions and an Application to a Lasota-Wazewska Model on Time Scales.
J. Applied Mathematics, 2014

Existence and Exponential Stability of Equilibrium Point for Fuzzy BAM Neural Networks with Infinitely Distributed Delays and Impulses on Time Scales.
J. Applied Mathematics, 2014

Learning Mobile Security with Labware.
IEEE Security & Privacy, 2014

A quantum algorithm for approximating the influences of Boolean functions.
CoRR, 2014

Almost automorphic solution for neutral type high-order Hopfield neural networks with delays in leakage terms on time scales.
Applied Mathematics and Computation, 2014

A dynamic spectrum re-allocation scheme in GSM and LTE co-existed networks.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Optimized stacking order for 3D-stacked ICs considering the probability and cost of failed bonding.
Proceedings of the Technical Papers of 2014 International Symposium on VLSI Design, 2014

How to Improve Divergent Thinking Capability by Information Technology and Extenics.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Speed following control for differential steering of 4WID electric vehicle.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Low Rank Global Geometric Consistency for Partial-Duplicate Image Search.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

L1-norm global geometric consistency for partial-duplicate image retrieval.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Consistency checking in access control.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Improving Representation of Land-use Maps Derived from Object-oriented Image Classification.
Trans. GIS, 2013

High temperature gate-bias and reverse-bias tests on SiC MOSFETs.
Microelectronics Reliability, 2013

Regional differences of environmental efficiency of China's energy utilization and environmental regulation cost based on provincial panel data and DEA method.
Mathematical and Computer Modelling, 2013

Pulse Wave K Value Averaging Computation and Pathological Diagnosis.
JCP, 2013

Comparison of two simulation methods to compute solvation free energies and partition coefficients.
Journal of Computational Chemistry, 2013

Combined QSAR and molecule docking studies on predicting P-glycoprotein inhibitors.
Journal of Computer-Aided Molecular Design, 2013

Almost Periodic Solutions for Neutral-Type BAM Neural Networks with Delays on Time Scales.
J. Applied Mathematics, 2013

A Fuzzy Multicriteria Group Decision-Making Method with New Entropy of Interval-Valued Intuitionistic Fuzzy Sets.
J. Applied Mathematics, 2013

Influence of rotating speed on the coupled bending and torsional vibrations of turbo-generator unit with rub-impact.
Int. J. Online Eng., 2013

A Combination Algorithm of Multiple Lattice-Valued Concept Lattices.
Int. J. Comput. Intell. Syst., 2013

Post-quantum security of encrypted key exchange protocol
CoRR, 2013

Distributed quantum election scheme
CoRR, 2013

Investigating the linear structure of Boolean functions based on Simon's period-finding quantum algorithm.
CoRR, 2013

Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding.
CoRR, 2013

A homotopy method for nonlinear semidefinite programming.
Comp. Opt. and Appl., 2013

Proportional sharing and DEA in allocating the fixed cost.
Applied Mathematics and Computation, 2013

Strong convergence theorems of total quasi-ϕ-asymptotically nonexpansive semi-groups in Banach spaces.
Applied Mathematics and Computation, 2013

Carrier Aggregation Based Interference Coordination for LTE-A Macro-Pico HetNet.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Auditory Context Recognition Combining Discriminative and Generative Models.
Proceedings of the Advances in Multimedia Information Processing - PCM 2013, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Teaching business analytics.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Entity authentication in a mobile-cloud environment.
Proceedings of the Cyber Security and Information Intelligence, 2013

Research of Data Provenance Semantic Annotation for Dependency Analysis.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

2012
A Fast Algorithm for Multidimensional Ellipsoid-Specific Fitting by Minimizing a New Defined Vector Norm of Residuals Using Semidefinite Programming.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Tail nonlinearly transformed risk measure and its application.
OR Spectrum, 2012

Improving SVM through a Risk Decision Rule Running on MATLAB.
JSW, 2012

Application of Entropy-weight Fuzzy Comprehensive Evaluation Method in Post Safety Competency Appraisal of Special Operation Staff in Coal Enterprises.
JSW, 2012

Prediction of Water Inrush from Coal Floor Based on Small Sample Data Mining Technology and Realization Using MATLAB.
JSW, 2012

Guest Editorial.
JSW, 2012

Research of Wireless Sensor Routing Algorithm Based on Uneven Clustering.
JNW, 2012

Scenario tree generation approaches using K-means and LP moment matching methods.
J. Computational Applied Mathematics, 2012

The Split Common Fixed Point Problem for Total Asymptotically Strictly Pseudocontractive Mappings.
J. Applied Mathematics, 2012

A note on quantum McEliece public-key cryptosystem
CoRR, 2012

On Quantum Turing Machine Halting Deterministically
CoRR, 2012

Tacit knowledge mining algorithm based on linguistic truth-valued concept lattice
CoRR, 2012

Hybrid projection method for generalized mixed equilibrium problem and fixed point problem of infinite family of asymptotically quasi-ϕ-nonexpansive mappings in Banach spaces.
Applied Mathematics and Computation, 2012

Demiclosed principle and Δ-convergence theorems for total asymptotically nonexpansive mappings in CAT(0) spaces.
Applied Mathematics and Computation, 2012

Automatic Neighbor Relation Penetration Probability Prediction.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Regularization design for breast lesion detection in penalized maximum likelihood image reconstruction.
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012

Ambulatory real-time micro-sensor motion capture.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

Direct least square fitting of ellipsoids.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Ensemble symbol recognition with Hough forest.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

The application of improved evolutionary strategy algorithm in optimization.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Auditory context classification using random forests.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Exploring Covert Channel in Android Platform.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

The Construction of Music Domain Ontology.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Research on FNN-based security defence architecture model of scada network.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System.
Proceedings of the Web Technologies and Applications, 2012

The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNN.
Proceedings of the Web Technologies and Applications, 2012

Trilateral Filtering-Based Retinex for Image Enhancement.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Distance-preserving dimensionality reduction.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2011

A time-domain physics-of-failure model for the lifetime prediction of wire bond interconnects.
Microelectronics Reliability, 2011

Microstructural evolution of ultrasonically bonded high purity Al wire during extended range thermal cycling.
Microelectronics Reliability, 2011

Postoptimality for mean-risk stochastic mixed-integer programs and its application.
Math. Meth. of OR, 2011

Multi-source Information Fusion Based on Data Driven.
JSW, 2011

Economic Development and Financial Support for Coal Resource Cities.
JCP, 2011

Mine Ventilation Optimization Analysis and Airflow Control Based on Harmony Annealing Search.
JCP, 2011

A Bayesian Belief Net Model to Evaluating Organizational Safety Risks.
JCP, 2011

Guest Editorial.
JCP, 2011

Anti-periodic solutions for a class of Cohen-Grossberg neural networks with time-varying delays on time scales.
Int. J. Systems Science, 2011

Bin-Packing Algorithms for periodic Task Scheduling.
IJPRAI, 2011

Laser Measurement Key Technologies and Application in Robot Autonomous Navigation.
IJPRAI, 2011

A Novel Group Signature Scheme Based on MPKC.
IACR Cryptology ePrint Archive, 2011

Predicting disease-associated substitution of a single amino acid by analyzing residue interactions.
BMC Bioinformatics, 2011

Toward an improved discrimination of outer membrane proteins using a sequence-based approach.
Biosystems, 2011

Approximation theorems for total quasi-ϕ-asymptotically nonexpansive mappings with applications.
Applied Mathematics and Computation, 2011

A stochastic differential equation model for spectrum utilization.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Unsupervised Russian POS Tagging with Appropriate Context.
Proceedings of the Text, Speech and Dialogue - 14th International Conference, 2011

Traffic-Aware Spectrum Assignment in Wireless Networks.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Environmental sound classification for scene recognition using local discriminant bases and HMM.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

A Novel Group Signature Scheme Based on MPKC.
Proceedings of the Information Security Practice and Experience, 2011

Performance assessment of a IEC 61850-9-2 based protection scheme for a transmission substation.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

The Non-signal Intersection Traffic Behavior Analysis Based on Game Theory.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011

Research and Implementation of Safe Production and Quality Traceability System for Fruit.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

Visualization of Virtual Plants Growth Based on Open L-System.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

Real-Time Detection of Covert Channels in Highly Virtualized Environments.
Proceedings of the Critical Infrastructure Protection V, 2011

The Relationship between the Newborn Rats' Hypoxic-Ischemic Brain Damage and Heart Beat Interval Information.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Research on Milling Globoidal Indexing Cam Based on Pro / NC.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Visual Mining Intrusion Behaviors by Using Swarm Technology.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

A Parts-Based Multi-scale Method for Symbol Recognition.
Proceedings of the Graphics Recognition. New Trends and Challenges, 2011

The design and implementation of MDF incoming power disturbance alarm system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Business Strategies Selection of Aviation Passenger Transportation Enterprises Based on High Speed Railway Competition.
Proceedings of the Advances in Computer Science, 2011

Usable protection to healthcare application.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Attacker behavior analysis in multi-stage attack detection system.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Network covert channels on the Android platform.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Research and Simulation on Grid Resources Location.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Study of the Eye-tracking Methods Based on Video.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Application of Internet of Things in the Community Security Management.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Validation of stochastic traffic flow model with microscopic traffic simulation.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2011

Camera Resectioning from Image Edges with the L-Norm Using Linear Programming.
Proceedings of the British Machine Vision Conference, 2011

Dual Trust Secure protocol for cluster-based wireless sensor networks.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Progress Towards the First Wireless Sensor Networks Consisting of Inkjet-Printed, Paper-Based RFID-Enabled Sensor Tags.
Proceedings of the IEEE, 2010

Decision Making with Uncertainty Information Based on Lattice-Valued Fuzzy Concept Lattice.
J. UCS, 2010

Coal Mine Safety Evaluation with V-Fold Cross-Validation and BP Neural Network.
JCP, 2010

A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections.
IJISP, 2010

A decision method based on uncertainty reasoning of linguistic truth-valued concept lattice.
Int. J. General Systems, 2010

Periodic Solutions for a Class of Fuzzy BAM Neural Networks with Distributed Delays and Variable Coefficients.
I. J. Bifurcation and Chaos, 2010

Distributive equations of implications based on nilpotent triangular norms.
Int. J. Approx. Reasoning, 2010

Corrigendum to "Using fuzzy theory and information entropy for water quality assessment in three Gorges region, China" [Expert Systems with Applications 37 (3) (2010) 2517-2521].
Expert Syst. Appl., 2010

Using fuzzy theory and information entropy for water quality assessment in Three Gorges region, China.
Expert Syst. Appl., 2010

Stronger convergence theorems for an infinite family of uniformly quasi-Lipschitzian mappings in convex metric spaces.
Applied Mathematics and Computation, 2010

A system of mixed equilibrium problems, fixed point problems of strictly pseudo-contractive mappings and nonexpansive semi-groups.
Applied Mathematics and Computation, 2010

Alerts Analysis and Visualization in Network-based Intrusion Detection Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

NPA-BT: A Network Performance Aware BitTorrent Traffic Optimization Mechanism.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Analysis of Mine Ventilation Network Based on Harmony Search.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Innovative CS capstone projects on green energy applications with WSN in a box.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

A method for designing S-box based on chaotic neural network.
Proceedings of the Sixth International Conference on Natural Computation, 2010

The study about fingerprint recognition based on orthogonal transforms.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Application of ETSIAT to the toxicity prediction of aliphatic alcohols.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Multistage attack detection system for network administrators using data mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Alerts visualization and clustering in network-based intrusion detection.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Two-phase biomedical named entity recognition based on semi-CRFs.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Implementing Medical CT Algorithms on Stand-alone FPGA Based Systems Using an Efficient Workflow with SysGen and Simulink.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Design and Development of Radio Frequency Identification (RFID) and RFID-Enabled Sensors on Flexible Low Cost Substrates
Synthesis Lectures on RF/Microwaves, Morgan & Claypool Publishers, 2009

Visual Association Rules.
Proceedings of the Encyclopedia of Database Systems, 2009

Incremental Isometric Embedding of High-Dimensional Data Using Connected Neighborhood Graphs.
IEEE Trans. Pattern Anal. Mach. Intell., 2009

Formation Mechanism of Green Strategic Alliances and Its Cooperative System for Coal-Mining Eco-Industrial Parks Based on Synthetic Decision Support System.
JCP, 2009

Bifurcation of nontrivial periodic solutions for a biochemical model with impulsive perturbations.
Applied Mathematics and Computation, 2009

Multiresolution data aggregation for analytical exploration of large relational data.
Proceedings of the Visualization and Data Analysis, 2009

The Wrong Analysis of the Price Forecast Model Based on Fractal Theory in Commodity Price Forecasting.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

Teaching database security and auditing.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Ehancing the Implementation of Adaboost Algorithm on a DSP-Based Platform.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Generalizable Features Help Semantic Role Labeling.
Proceedings of the 23rd Pacific Asia Conference on Language, Information and Computation, 2009

Extreme-low power NaOCl sensor using EG-CNTs as Sensing Element.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

A Linking Mechanism to Integrate Components of a Visualization Framework.
Proceedings of the 13th International Conference on Information Visualisation, 2009

Non-model self-learning control of nonlinear system.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

An extended version of scaled small gain condition.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

The Application of Non-linear Regression Method to the Functional Connectivity during the Encoding and the Retrieval of Chinese Semantic Memory.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Predicting Available Bandwidth of Internet Path with Ultra Metric Space-Based Approaches.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The "Green" Ultimate Solution for an Ever Improving Life Quality and Safety?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Design and Implementation of a High Resolution Localization System for In-Vivo Capsule Endoscopy.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Research on the Design of the Categorization System for Moving Information in Video Stream and Its Implementation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Footprint Splatting for Interactive Visualization of Large Data Sets.
Proceedings of the 2009 International Conference on Computer Graphics & Virtual Reality, 2009

Practical Quantum No-key Protocol with Identification.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Visual Exploration of Frequent Itemsets and Association Rules.
Proceedings of the Visual Data Mining - Theory, Techniques and Tools for Visual Analytics, 2008

Visual Database.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Passivity and Optimal Control of Descriptor Biological Complex Systems.
IEEE Trans. Automat. Contr., 2008

Alignment of Overlapping Locally Scaled Patches for Multidimensional Scaling and Dimensionality Reduction.
IEEE Trans. Pattern Anal. Mach. Intell., 2008

SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors.
IJISP, 2008

Vision-based Fuzzy Coordination Control for Multiple Robots.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Conductive Inkjet-Printed Wireless Sensor Nodes on Flexible Low-Cost Paper-Based Substrates.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2008

Partner Selection and Evaluation in Virtual Research Center Based on Trapezoidal Fuzzy AHP.
Proceedings of the Advances in Neural Networks, 2008

The Chaos-Based Shuffled Frog Leaping Algorithm and Its Application.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Observation-Based Multi-robot Cooperative Formation Control.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Design and Realization of AHP Toolbox in MATLAB.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

An Algorithm for Acquiring PRN Code in DSSS System Based on Sub-sampling.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Ontology and Metadata for E-learning Based on Grid.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Detection of Changes in Transitive Associations by Shortest-path Analysis of Protein Interaction Networks Integrated with Gene Expression Profiles.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Fuzzy-neuro position/force control for robotic manipulators with uncertainties.
Soft Comput., 2007

MIPSPlantsDB - plant database resource for integrative and comparative plant genome research.
Nucleic Acids Research, 2007

Optimal Wavelength Sharing Policies in OBS Networks Subject to QoS Constraints.
IEEE Journal on Selected Areas in Communications, 2007

Generalized wavelength sharing policies for absolute QoS guarantees in OBS networks.
IEEE Journal on Selected Areas in Communications, 2007

Efficient and accurate numerical methods for the Klein-Gordon-Schrödinger equations.
J. Comput. Physics, 2007

New invariant of DNA sequence based on 3DD-curves and its application on phylogeny.
Journal of Computational Chemistry, 2007

Energy Efficiency Analysis of a Scroll-type Air Motor Based on a Simplified Mathematical Model.
Proceedings of the World Congress on Engineering, 2007

Motion Detection Based On Accumulative Optical Flow and Double Background Filtering.
Proceedings of the World Congress on Engineering, 2007

Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive Sensing and Vehicle Security.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Inkjet-Printed RFID Tags on Paper-based Substrates for UHF "Cognitive Intelligence" Applications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Gene Identification Based on Geometrical Representation of DNA Sequence.
Proceedings of the Third International Conference on Natural Computation, 2007

A Method for Gene Identification by Dynamic Feature Choosing.
Proceedings of the Digital Human Modeling, 2007

Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Building k-Connected Neighborhood Graphs for Isometric Data Embedding.
IEEE Trans. Pattern Anal. Mach. Intell., 2006

Who will you ask? An empirical study of interpersonal task information seeking.
JASIST, 2006

A Biologically Inspired Shape Representation Model Based on Part Decomposition.
Proceedings of the International Joint Conference on Neural Networks, 2006

Incremental Construction of Neighborhood Graphs for Nonlinear Dimensionality Reduction.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Building Connected Neighborhood Graphs for Locally Linear Embedding.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Dynamic Wavelength Sharing Policies for Absolute QoS in OBS Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Formal Representation and Transformation of DTDs to Sem-ODM Semantic Schemas.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006

Semi-automatic Ground Truth Generation for Chart Image Recognition.
Proceedings of the Document Analysis Systems VII, 7th International Workshop, 2006

A Framework for Absolute QoS Guarantees in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

SecCMP: a secure chip-multiprocessor architecture.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
Pruning and Visualizing Generalized Association Rules in Parallel Coordinates.
IEEE Trans. Knowl. Data Eng., 2005

Teaching digital noise and noise margin issues in engineering education.
IEEE Trans. Education, 2005

Building k-edge-connected neighborhood graph for distance-based data projection.
Pattern Recognition Letters, 2005

Building k Edge-Disjoint Spanning Trees of Minimum Total Length for Isometric Data Embedding.
IEEE Trans. Pattern Anal. Mach. Intell., 2005

Theoretical studies on the electronic and optical properties of two new alternating fluorene/carbazole copolymers.
Journal of Computational Chemistry, 2005

Path Switching in OBS Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Building connected neighborhood graphs for isometric data embedding.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

An Effective Two-Stage Neural Network Model and Its Application on Flood Loss Prediction.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Grassland ecosystem services and their economic evaluation in qinghai-tibetan plateau based on RS and GIS.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Spatio-temporal changes of land use in jinghe watershed.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Research on Wavelet Domain Fractal Coding in Digital Watermarking.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Data embedding techniques and applications.
Proceedings of the Second International Workshop on Computer Vision meets Databases, 2005

Transforming Sem-ODM semantic schemas to DTDs.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Distance-preserving projection of high dimensional data.
Pattern Recognition Letters, 2004

Distance-preserving mapping of patterns to 3-space.
Pattern Recognition Letters, 2004

Distance-Preserving Projection of High-Dimensional Data for Nonlinear Dimensionality Reduction.
IEEE Trans. Pattern Anal. Mach. Intell., 2004

A flexible and effective XML storage and retrieval system.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Mining Short Association Rules with One Database Scan.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

XQuery Translation to Sem-SQL.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Evaluation of Distance-Based Techniques for Data Projection and Dimensionality Reduction.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

k-Edge Connected Neighborhood Graph for Geodesic Distance Estimation and Nonlinear Data Projection.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Sammon's Nonlinear Mapping Using Geodesic Distances.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A Unified Model of Optical and Physical Dot Gain in Printing.
Proceedings of the Second European Conference on Colour in Graphics, Imaging, and Vision, 2004

2003
Visual Exploration of Large Relational Data Sets through 3D Projections and Footprint Splatting.
IEEE Trans. Knowl. Data Eng., 2003

Web-Based Interactive 3D Visualization for Computer Graphics Education.
IJDET, 2003

Enhanced Techniques for Current Balanced Logic in Mixed-Signal ICs.
Proceedings of the 2003 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2003), 2003

Analyzing Internal-Switching Induced Simultaneous Switching Noise.
Proceedings of the 4th International Symposium on Quality of Electronic Design (ISQED 2003), 2003

Design of enhancement current-balanced logic for mixed-signal ICs.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Visualizing Many-to-Many Association Rules.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'03, June 23, 2003

Use of Web-Based Live Demos in Computer Science Courses.
Proceedings of the Advances in Web-Based Learning, 2003

Dynamic Clustering of Web Search Results.
Proceedings of the Computational Science and Its Applications, 2003

Visualizing Frequent Itemsets, Association Rules, and Sequential Patterns in Parallel Coordinates.
Proceedings of the Computational Science and Its Applications, 2003

Visualizing Large Relational Datasets by Combining Grand Tour with Footprint Splatting of High Dimensional Data Cubes.
Proceedings of the Computational Science and Its Applications, 2003

A decoupling technique for CMOS strong-coupled structures.
Proceedings of the 13th ACM Great Lakes Symposium on VLSI 2003, 2003

Exploring Feature Space for Image Retrieval.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

2002
Web-Based Interactive 3D Visualization for Computer Graphics Education.
Proceedings of the Advances in Web-Based Learning, First International Conference, 2002

Tetrahedron Mapping of Points from N-Space to Three-Space.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
XML Wrapper: Storing and Retrieving XML Documents Using Semantic Binary Object-Oriented Database (Sem-ODB).
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

2000
Light Scattering and Ink Penetration Effects on Tone Reproduction.
Proceedings of the PICS 2000: Image Processing, 2000

Interactive exploration of very large relational datasets through 3D dynamic projections.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

Ink penetration and its effects on printing.
Proceedings of the Color Imaging: Device-Independent Color, 2000

n23Tool: a Tool for Exploring Large Relational Data Sets Through 3D Dynamic Projections.
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000

1999
3D Grand Tour for Multidimensional Data and Clusters.
Proceedings of the Advances in Intelligent Data Analysis, Third International Symposium, 1999

1997
Towards a Semantic Image Database System.
Data Knowl. Eng., 1997

Empirical Results on Anytime Propositional Reasoning .
Proceedings of the 9th International Conference on Tools with Artificial Intelligence, 1997

1995
Towards restructuring and normalization of types in databases.
J. Comput. Sci. Technol., 1995

1994
A Hypertext Query Language for Images.
SIGMOD Record, 1994

1989
QPF A versatile query language for a knowledge-based geographical information system.
International Journal of Geographical Information Science, 1989


  Loading...