Nan Zhang

According to our database1, Nan Zhang
  • authored at least 255 papers between 2004 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Scatterer Localization Using Large-Scale Antenna Arrays Based on a Spherical Wave-Front Parametric Model.
IEEE Trans. Wireless Communications, 2017

Dynamic Resource Allocation for Energy Efficient Transmission in Digital Subscriber Lines.
IEEE Trans. Signal Processing, 2017

Geometry-Based Trajectory Planning of a 3-3 Cable-Suspended Parallel Robot.
IEEE Trans. Robotics, 2017

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
Soft Comput., 2017

Noise Attenuation Performance of a Helmholtz Resonator Array Consist of Several Periodic Parts.
Sensors, 2017

Maintenance analysis of a two-component load-sharing system.
Rel. Eng. & Sys. Safety, 2017

Twin support vector machine: theory, algorithm and applications.
Neural Computing and Applications, 2017

Unsupervised extreme learning machine with representational features.
Int. J. Machine Learning & Cybernetics, 2017

Unsupervised and semi-supervised extreme learning machine with wavelet kernel for high dimensional data.
Memetic Computing, 2017

Citation personal display: A case study of personal websites by physicists in 11 well-known universities.
Journal of Documentation, 2017

A game-theoretic evaluation of an ISP business model in caching.
Information Systems Frontiers, 2017

Design of a fractional-order PID controller for a pumped storage unit using a gravitational search algorithm based on the Cauchy and Gaussian mutation.
Inf. Sci., 2017

Attribute reduction for sequential three-way decisions under dynamic granulation.
Int. J. Approx. Reasoning, 2017

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Security & Privacy, 2017

The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context.
Information & Management, 2017

What factors drive open innovation in China's public sector? A case study of official document exchange via microblogging (ODEM) in Haining.
Government Information Quarterly, 2017

Sufficient dimension reduction using Hilbert-Schmidt independence criterion.
Computational Statistics & Data Analysis, 2017

Network Slicing for Service-Oriented Networks Under Resource Constraints.
CoRR, 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Citation personal display: A case study of personal websites by physicists in 11 well-known universities.
CoRR, 2017

Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017

Research on Point-wise Gated Deep Networks.
Appl. Soft Comput., 2017

Design of a fuzzy-PID controller for a nonlinear hydraulic turbine governing system by using a novel gravitational search algorithm based on Cauchy mutation and mass weighting.
Appl. Soft Comput., 2017

Review of the Fault Mechanism and Diagnostic Techniques for the Range Extender Hybrid Electric Vehicle.
IEEE Access, 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Virtual SIMO Measurement-Based Angular Characterization in High-Speed Railway Scenarios.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

SmartAuth: User-Centered Authorization for the Internet of Things.
Proceedings of the 26th USENIX Security Symposium, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Attribute Reduction in Utility-Based Decision-Theoretic Rough Set Models.
Proceedings of the Rough Sets - International Joint Conference, 2017

Covering-Based Optimistic Multigranulation Decision-Theoretic Rough Sets Based on Maximal Descriptors.
Proceedings of the Rough Sets - International Joint Conference, 2017

Fast intra coding unit size decision for HEVC with GPU based keypoint detection.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

Traffic engineering for backhaul networks with wireless link scheduling.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Cross-Sector Collaboration and Information Integration in Local Government One-Stop Services Centres: The Experiences and Lessons from a Case Studies in China.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

On data integrity attacks against route guidance in transportation-based cyber-physical systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Millimeter-wave CMOS PLL using a push-push oscillator.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
Crawling Hidden Objects with kNN Queries.
IEEE Trans. Knowl. Data Eng., 2016

Anytime Characteristics of Protograph-Based LDPC Convolutional Codes.
IEEE Trans. Communications, 2016

Micro-Doppler Signal Time-Frequency Algorithm Based on STFRFT.
Sensors, 2016

Security in wearable communications.
IEEE Network, 2016

Incremental extreme learning machine based on deep feature embedded.
Int. J. Machine Learning & Cybernetics, 2016

A mixed-strategy based gravitational search algorithm for parameter identification of hydraulic turbine governing system.
Knowl.-Based Syst., 2016

Semantic search for public opinions on urban affairs: A probabilistic topic modeling-based approach.
Inf. Process. Manage., 2016

Cost efficiency of mobile in-network caching.
Int. Journal of Network Management, 2016

The governance strategies for public emergencies on social media and their effects: a case study based on the microblog data.
Electronic Markets, 2016

Parameter identification of a nonlinear model of hydraulic turbine governing system with an elastic water hammer based on a modified gravitational search algorithm.
Eng. Appl. of AI, 2016

Weight Uncertainty in Boltzmann Machine.
Cognitive Computation, 2016

Self-adaptive Extreme Learning Machine Optimized by Rough Set Theory and Affinity Propagation Clustering.
Cognitive Computation, 2016

RMI-DRE: a redundancy-maximizing identification scheme for data redundancy elimination.
SCIENCE CHINA Information Sciences, 2016

A field survey system for land consolidation based on 3S and speech recognition technology.
Computers and Electronics in Agriculture, 2016

Bifurcation control of high-dimensional nonlinear chemical processes using an extended washout-filter algorithm.
Computers & Chemical Engineering, 2016

Operational optimisation of centrifugal compressors in multilevel refrigeration cycles.
Computers & Chemical Engineering, 2016

PAFSV: A Formal Framework for Specification and Analysis of SystemVerilog.
Computing and Informatics, 2016

Multi layer ELM-RBF for multi-label learning.
Appl. Soft Comput., 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Iterative Path Clustering for Software Fault Localization.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Public Opinion Analysis based on Probabilistic Topic Modeling and Deep Learning.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Urban pluvial flood risk assessment based on scenario simulation.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

GPU based sample adaptive offset parameter decision and perceptual optimization for HEVC.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Reconstruction of azimuth signal for multichannel HRWS SAR imaging based on periodic extension.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Boltzmann Machine and its Applications in Image Recognition.
Proceedings of the Intelligent Information Processing VIII, 2016

Rough Neighborhood Covering Reduction for robust classification.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Continuous Vigilance Estimation Using LSTM Neural Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Compact and robust video fingerprinting using sparse represented features.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

Crawling hidden objects with kNN queries.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Cost Modeling of a Network Service Provider Cloud Platform.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Optimal Resource Allocation for Energy Efficient Transmission in DSL.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Technology Symbolization: Exploring the Political Mechanism of IT Implementation in Local e-Government Projects.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Structure-driven Adaptive Non-local Filter for High Efficiency Video Coding (HEVC).
Proceedings of the 2016 Data Compression Conference, 2016

Adaptive Motion Vector Resolution Scheme for Enhanced Video Coding.
Proceedings of the 2016 Data Compression Conference, 2016

Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Wrist pulse recognition based on multi-fractal spectrum.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
JetScope: Reliable and Interactive Analytics at Cloud Scale.
PVLDB, 2015

Effects of endothelium, stent design and deployment on the nitric oxide transport in stented artery: a potential role in stent restenosis and thrombosis.
Med. Biol. Engineering and Computing, 2015

Adaptive ensemble with trust networks and collaborative recommendations.
Knowl. Inf. Syst., 2015

A hybrid Wavelet Neural Network and Switching Particle Swarm Optimization algorithm for face direction recognition.
Neurocomputing, 2015

Task-technology fit in workplaces: theoretical framework and empirical analysis in the context of mobile government.
IJMC, 2015

RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Information Security, 2015

Performance estimation of finite-length repeat-accumulate codes.
IET Communications, 2015

Prediction of Common-Mode Radiated Emission of PCB with an Attached Cable Using Imbalance Difference Model.
IEICE Transactions, 2015

A Fuse-and-Forward Protocol for Two-Way Relaying Networks With Relay Having Its Own Broadcasting Information.
IEEE Communications Letters, 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wireless Comm. and Networking, 2015

Key e-government issues in China: an empirical study based on the orientation-maturity framework.
Electronic Commerce Research, 2015

Understanding the continued use of intra-organizational blogs: An adaptive habituation model.
Computers in Human Behavior, 2015

Dynamic Channel Modeling for an Indoor Scenario at 23.5 GHz.
IEEE Access, 2015

Parallel intra coding for HEVC on CPU plus GPU platform.
Proceedings of the 2015 Visual Communications and Image Processing, 2015

An optimized probability estimation model for binary arithmetic coding.
Proceedings of the 2015 Visual Communications and Image Processing, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Detecting Overlapping Communities with Triangle-Based Rough Local Expansion Method.
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015

Distributed space-time block coding in multi-way amplify-and-forward relaying networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

45GHz propagation channel modeling for an indoor conference scenario.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Adaptive boundary dependent transform optimization for HEVC.
Proceedings of the 2015 Picture Coding Symposium, 2015

Cost efficiency of SDN in LTE-based mobile networks: Case Finland.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Anytime properties of protograph-based repeat-accumulate codes.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Linking virtual and real-world identities.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Image guided label map propagation in video sequences.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Fine-Grained Change Detection of Misaligned Scenes with Varied Illuminations.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

WARAS: An adaptive WSN multipath selection model inspired by metabolism behaviors of Escherichia Coli.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protograph-based anytime reliable channel coding design.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Voting Based Seeding Algorithm for Overlapping Community Detection.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

A fast handwritten numeral recognition framework based on peak densities.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Memory-Hazard-Aware K-Buffer Algorithm for Order-Independent Transparency Rendering.
IEEE Trans. Vis. Comput. Graph., 2014

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Optimal entropy-constrained non-uniform scalar quantizer design for low bit-rate pixel domain DVC.
Multimedia Tools Appl., 2014

Median-mean line based discriminant analysis.
Neurocomputing, 2014

Histogram of visual words based on locally adaptive regression kernels descriptors for image feature extraction.
Neurocomputing, 2014

Reliability Analysis of Unrepairable Systems with k-out-of-m: G Subsystems Subject to Suspended Animation.
Communications in Statistics - Simulation and Computation, 2014

The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Uncertainty Measures in Interval-Valued Information Systems.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Knowledge Granulation in Interval-Valued Information Systems Based on Maximal Consistent Blocks.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Performance evaluation of interference cancellation using a generalized-array-manifold model.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Measuring civic Awareness and Validating IT's Impact on E-Paticipation: an Empirical Study on a G2C Platform Adoption in China.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Delay exponent of variable-length random binning for point-to-point transmission.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

The Orientation-Maturity Framework for Understanding the E-Government Key Issues in China.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Measurement-based angular characterization for 72 GHz propagation channels in indoor environments.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
Software Reliability Analysis using Queuing-based Model with Testing Effort.
JSW, 2013

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme.
IEEE Journal on Selected Areas in Communications, 2013

Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model.
J. Applied Mathematics, 2013

Parameter Estimation of Photovoltaic Models via Cuckoo Search.
J. Applied Mathematics, 2013

Low-rank representation based discriminative projection for robust feature extraction.
Neurocomputing, 2013

Dual-polarized channel characterization based on measurements in in-service UMTS networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Channel maps and stochastic models in elevation based on measurements in operating networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Design of training-aided transmission schemes for the DC-STBC based two-way relaying network.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Distributed collaborative space-time block codes for two-way relaying network.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Saturn: A Fast Keyword kNN Search System in Road Networks.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

System-Level Channel Modeling Based on Active Measurements from a Public 3G/UMTS Network.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

TsingNUS: a location-based service system towards live city.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

The Catalyzing Factors of Official Documents Exchange via Microblogging in Public Sectors: A Case Study based on the T-O-E Framework.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Porting LooCI Components into Zigduino.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

DEM: Direct Estimation Method for Photovoltaic Maximum Power Point Tracking.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Personal authentication using the fingerprints of intra-body radio propagation channels.
Proceedings of the 7th International Symposium on Medical Information and Communication Technology, 2013

Low-cost global MPPT scheme for Photovoltaic systems under partially shaded conditions.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

A hybrid MPPT method for Photovoltaic systems via estimation and revision method.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

ISP business models in caching.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Design and evaluation of triple voting system based dual CPU (TVSDC).
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Content adaptive in-loop depth map filter for HEVC based 3DV coding.
Proceedings of the IEEE International Conference on Acoustics, 2013

Implied Volatilities of S&P 100 Index with Applications to Financial Market.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Parallel Generation of Optimal Mortgage Refinancing Threshold Rates.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Design and optimization of a planar UWB antenna.
Proceedings of the East-West Design & Test Symposium, 2013

Video delivery over next generation cellular networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Protocol Specification Inference Based on Keywords Identification.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

Research of Environment Data in Coal Mining Analysis Based on the Association Rule Mining.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2012
A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-Vector Multiplication.
IEEE Trans. Parallel Distrib. Syst., 2012

Component-based global k-NN classifier for small sample size problems.
Pattern Recognition Letters, 2012

Graded rough set model based on two universes and its properties.
Knowl.-Based Syst., 2012

Risk identification and conduction model for financial institution IT outsourcing in China.
Information Technology and Management, 2012

Set-theoretic Approaches to Granular Computing.
Fundam. Inform., 2012

What dose Online Wholesalers Care? Analysis of Text Comments Based on Aliexpress Data.
Proceedings of the 11th Wuhan International Conference on E-Business, 2012

Polaris: A Fingerprint-Based Localization System over Wireless Networks.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Safe mathare: a mobile system for women's safe commutes in the slums.
Proceedings of the Mobile HCI '12, 2012

Classification of Three Wine Varieties Based on ELM and PCA.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

Ambulatory real-time micro-sensor motion capture.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

The research on micro-blog public opinion index and the application of prototype system.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

DTMB-GPS software receiver for urban and indoor positioning.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A Tussle Analysis for Information-Centric Networking Architectures.
Proceedings of the Future Internet, 2012

RIKE: Using Revocable Identities to Support Key Escrow in PKIs.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Orientation-Preserving Rod Elements for Real-Time Thin-Shell Simulation.
IEEE Trans. Vis. Comput. Graph., 2011

The Role of Web 2.0 Applications on Niche Culture Diffusion: An Empirical Study on the Influence of Online Forums on Fans of Rock Music Bands.
Online Information Review, 2011

Resolving a L2-prefetch-caused parallel nonscaling on Intel Core microarchitecture.
J. Parallel Distrib. Comput., 2011

A Self-adapted Anycast Routing Algorithm Based on Mobile Agent in Wireless Sensor Network.
JNW, 2011

Why adoption and use behavior of IT/IS cannot last? - two studies in China.
Information Systems Frontiers, 2011

The Topological Analysis of Urban Transit System as a Small-World Network.
Int. J. Computational Intelligence Systems, 2011

Applicable Prevention Method of Braess Paradox in Urban Traffic Flow Guidance System.
Int. J. Computational Intelligence Systems, 2011

Diverse reduct subspaces based co-training for partially labeled data.
Int. J. Approx. Reasoning, 2011

SER Analysis of the Mobile-Relay-Based M2M Communication over Double Nakagami-m Fading Channels.
IEEE Communications Letters, 2011

Kernel feature selection to fuse multi-spectral MRI images for brain tumor segmentation.
Computer Vision and Image Understanding, 2011

Parallel Binomial American Option Pricing with (and without) Transaction Costs
CoRR, 2011

Improved spatial aided low delay Wyner-Ziv video coding by wavelet shrinkage.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

Joint just noticeable difference model based on depth perception for stereoscopic images.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Relationship Privacy Preservation in Publishing Online Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Exploring Different Roles between Service Expectation and Technology Expectation In Citizen's E-Government Continuance Adoption: An Extended Expectation-Confirmation Model.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

Phenomenological Model of Laser-Tissue Interaction with Application to Benign Prostatic Hyperplasia (BPH) Simulation.
Proceedings of the Medicine Meets Virtual Reality 18 - NextMed, 2011

Laser Surgery Simulation Platform: Toward Full-Procedure Training and Rehearsal for Benign Prostatic Hyperplasia (BPH) Therapy.
Proceedings of the Medicine Meets Virtual Reality 18 - NextMed, 2011

Image fusion for following-up brain tumor evolution.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

Task-Technology Fit in Mobile Work: Exploring the Links between Task Attributes and Technology Characteristics.
Proceedings of the International Conference on Mobile Business (ICMB 2011), 2011

Understanding the Impact of Internet Media on Patient-Clinician Trust: Model Development and Research Design.
Proceedings of the International Conference on Information Systems, 2011

Privacy in Online Social Networks.
Proceedings of the International Conference on Information Systems, 2011

Two-Sidedness of Internet Content Delivery.
Proceedings of the 10th Conference of Telecommunication, 2011

The Application of Robot Performance Technology in Physical Education.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

The effects of mechanical stimulation on proliferation and CTGF expression of human lung fibroblast.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

A 60GHz power amplifier using 90-nm RF-CMOS technology.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

Parallel Binomial Valuation of American Options with Proportional Transaction Costs.
Proceedings of the Advanced Parallel Processing Technologies - 9th International Symposium, 2011

Contourlet-Based Error-Amended Sharp Edge Scheme for Image Zooming.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
Volumetric Modeling in Laser BPH Therapy Simulation.
IEEE Trans. Vis. Comput. Graph., 2010

Using an integrated feature set to generalize and justify the Chinese-to-English transferring rule of the 'ZHE' aspect.
Journal of Zhejiang University - Science C, 2010

User Attitude Towards Mandatory Use of Information Systems: A Chinese Cultural Perspective.
JGIM, 2010

Computing Optimised Parallel Speeded-Up Robust Features (P-SURF) on Multi-Core Processors.
International Journal of Parallel Programming, 2010

Modeling of tsunami waves and atmospheric swirling flows with graphics processing unit (GPU) and radial basis functions (RBF).
Concurrency and Computation: Practice and Experience, 2010

Set-Theoretic Models of Granular Structures.
Proceedings of the Rough Set and Knowledge Technology - 5th International Conference, 2010

Understanding Cross-Sector Collaboration in E-Government Development: Theoretical Consideration Based on Extended Bryson's Framework.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

Fusion and classification of multi-source images by SVM with selected features in a kernel space.
Proceedings of the 2nd International Conference on Image Processing Theory Tools and Applications, 2010

Medium optimization of antifungal metabolites produced by Bacillus globisporus A95 using response surface methodology.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Theorizing a Two-Sided Adoption Model for Mobile Marketing Platforms.
Proceedings of the International Conference on Information Systems, 2010

Adoption of Open Source Software in Governmental Context: a Positivistic Case Study in China.
Proceedings of the International Conference on Information Systems, 2010

Generalized Relation Based Knowledge Discovery in Interval-valued Information Systems.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Discrete Flatness for Non Linear Systems FDI.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Hierarchical rough decision theoretic framework for text classification.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
A Novel Operating System on Chip with Information Security Support for Embedded System.
JSW, 2009

Impact of Perceived Fit on E-Government User Evaluation: A Study with a Chinese Cultural Context.
JGIM, 2009

Web-Based Group Decision Support for Crisis Management.
IJISCRAM, 2009

A variational approach to analyzing catalytic reactions in short monoliths.
Computers & Mathematics with Applications, 2009

A Tightly Coupled Network-on-Chip Router Architecture.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

A Discrete Mechanics Framework for Real Time Virtual Surgical Simulations with Application to Virtual Laparoscopic Nephrectomy.
Proceedings of the Medicine Meets Virtual Reality 17 - NextMed: Design for/the Well Being, 2009

Exponential Stability of Impulsive Hopfield Neural Networks with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Transmission Network Expansion Planning Based on Mind Evolutionary Computation.
Proceedings of the Advances in Neural Networks, 2009

Shape-Based Depth Map Coding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Multi-kernel SVM based classification for brain tumor segmentation of MRI multi-sequence.
Proceedings of the International Conference on Image Processing, 2009

Computing Parallel Speeded-Up Robust Features (P-SURF) via POSIX Threads.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Compression-Induced Rendering Distortion Analysis for Texture/Depth Rate Allocation in 3D Video Compression.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

Knowledge reduction in interval-valued information systems.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
Exploration of TCM Masters Knowledge Mining.
J. Systems Science & Complexity, 2008

Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation.
IEICE Transactions, 2008

DynaCAS: Computational Experiments and Decision Support for ITS.
IEEE Intelligent Systems, 2008

The Cultural Perspective of Mobile Government Terminal Acceptance - an Exploratory Study in China.
Proceedings of the Pacific Asia Conference on Information Systems, 2008

An Image Indexing and Searching System Based Both on Keyword and Content.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

A Virus Detection Framework based on SPMOS.
Proceedings of the International Conference on Embedded Software and Systems, 2008

2D to 3D convertion based on edge defocus and segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2008

Heterogeneous Multi-core Design for Information Retrieval Efficiency on the Vector Space Model.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Software Design for Real-Time Control System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Graph-Based Method for Image Segmentation in Cross-Region.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Temperature Control for the Thermal Cycling of Polymerase Chain Reaction.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Advanced fault diagnosis techniques and their role in preventing cascading blackouts.
PhD thesis, 2007

TCM masters miner for knowledge transfer.
Proceedings of the IEEE International Conference on Systems, 2007

A rhyme of the Tang Dynasty.
Proceedings of the 34. International Conference on Computer Graphics and Interactive Techniques, 2007

Towards Comprehensive Privacy Protection in Data Clustering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Diffusion and Evaluation of E-Government Systems: A Field Study in China.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

On the Communication Complexity of Privacy-Preserving Information Sharing Protocols.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Exploration of TCM Masters Knowledge Mining.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol.
Proceedings of IEEE International Conference on Communications, 2007

Fault Detection Using Differential Flatness in Flight Guidance Systems.
Proceedings of the First International Conference on Complex, 2007

2006
Exploiting multiuser diversity in reservation random access.
IEEE Trans. Wireless Communications, 2006

The Performance of Multiuser Diversity Scheduling for MIMO Channels With Spatially Correlated Fading.
IEEE Trans. Communications, 2006

A Computing Model for Concept Fusing and Document Classification.
Proceedings of the 2006 International Conference on Semantics, 2006

Simultaneous Localization and Mapping Using Invariant Natural Features.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

Active Mobile Robot Simultaneous Localization and Mapping.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

An Immune Evolutionary Algorithm Based on Chaos Mutation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

An Optimal Independent Component Analysis Approach for Functional Magnetic Resonance Imaging Data.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Degree Pre-Reserved Hierarchical Tree for Multimedia Multicast.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Ermdclime: Enabling Real-time Multimedia Discussion for Collaborative Learning in Mobile Environment.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Study on Navigating Path Identification by Fuzzy Neural Network.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Impact of Node Cheating on Gossip-Based Protocol.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
The Structure Principle of silicon Micromachined Gyroscope Driven by the Rotating Carrier.
I. J. Information Acquisition, 2005

Evaluating the temporal correlation of MIMO channel capacities.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Multiuser diversity scheduling in MIMO systems with correlated fading.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Functional magnetic resonance imaging based on Wiener filter over wavelet domain.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...