Ning Chen

According to our database1, Ning Chen authored at least 276 papers between 1985 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Parking-Area-Assisted Spider-Web Routing Protocol for Emergency Data in Urban VANET.
IEEE Trans. Vehicular Technology, 2020

Discriminating two non-orthogonal states against decoherence by feedback control.
Quantum Information Processing, 2020

UMMS: Efficient Superpixel Segmentation Driven by a Mixture of Spatially Constrained Uniform Distribution.
IEICE Transactions, 2020

A hybrid prediction model with a selectively updating strategy for iron removal process in zinc hydrometallurgy.
SCIENCE CHINA Information Sciences, 2020

Estimating the State-of-Charge of Lithium-Ion Battery Using an H-Infinity Observer Based on Electrochemical Impedance Model.
IEEE Access, 2020

2019
Enhanced Feature Summarizing for Effective Cover Song Identification.
IEEE/ACM Trans. Audio, Speech & Language Processing, 2019

New Approximate Distributions for the Generalized Likelihood Ratio Test Detection in Passive Radar.
IEEE Signal Process. Lett., 2019

Fuzzy Clustering Algorithm with Non-Neighborhood Spatial Information for Surface Roughness Measurement Based on the Reflected Aliasing Images.
Sensors, 2019

Explorations on visual localization from active to passive.
Multimedia Tools Appl., 2019

Music similarity model based on CRP fusion and Multi-Kernel Integration.
Multimedia Tools Appl., 2019

Ontology-based venous thromboembolism risk assessment model developing from medical records.
BMC Med. Inf. & Decision Making, 2019

The experimental study about laser-induced dizziness effect of medium-wave infrared seeker which based on image processing.
J. Vis. Commun. Image Represent., 2019

CI-SNF: Exploiting contextual information to improve SNF based information retrieval.
Inf. Fusion, 2019

Route Prediction for Instant Delivery.
IMWUT, 2019

Shaping graph pattern mining for financial risk.
Neurocomputing, 2019

Data fusion based on-line product quality evaluation of ternary cathode material cyber-physical systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Multi-label learning vector quantization for semi-supervised classification.
Intell. Data Anal., 2019

Secretary markets with local information.
Distributed Computing, 2019

Learn to Segment Retinal Lesions and Beyond.
CoRR, 2019

Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness.
CoRR, 2019

An Intelligent Robust Networking Mechanism for the Internet of Things.
IEEE Communications Magazine, 2019

Application of computational intelligence technologies in emergency management: a literature review.
Artif. Intell. Rev., 2019

Transferable Adversarial Attacks for Image and Video Object Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Data Fusion Based On-Line Product Quality Evaluation for the Manufacturing Process of Ternary Cathode Material.
Proceedings of the IECON 2019, 2019

When Learning Joins Edge: Real-Time Proportional Computation Offloading via Deep Reinforcement Learning.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

Improving Adversarial Robustness via Promoting Ensemble Diversity.
Proceedings of the 36th International Conference on Machine Learning, 2019

Computer-aided Diagnosis of Ambulatory Electrocardiograms via ASRS: Active-Selection-Random-Selection.
Proceedings of the 2019 IEEE International Conference on Healthcare Informatics, 2019

DCMN: Double Core Memory Network for Patient Outcome Prediction with Multimodal Data.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Adaptive Small Cells Clustering based on Many-to-Many Swap Matching for Ultra-Dense Networks.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

An Incremental Broad Learning Approach for Semi-Supervised Classification.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

How Robust is Your Automatic Diagnosis Model?
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

DeepTriager: A Neural Attention Model for Emergency Triage with Electronic Health Records.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Bone Age Assessment by Deep Convolutional Neural Networks Combined with Clinical TW3-RUS.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
Visually enhanced situation awareness for complex manufacturing facility monitoring in smart factories.
J. Vis. Lang. Comput., 2018

Temperature Prediction Model for Roller Kiln by ALD-Based Double Locally Weighted Kernel Principal Component Regression.
IEEE Trans. Instrumentation and Measurement, 2018

Time-varying bang-bang property of time optimal controls for heat equation and its application.
Syst. Control. Lett., 2018

Reversed Sketch: A scalable and comparable shape representation.
Pattern Recognit., 2018

Collaborative strategy for visual object tracking.
Multimedia Tools Appl., 2018

Fusing similarity functions for cover song identification.
Multimedia Tools Appl., 2018

Semi-monolayer cover rough set: Concept, property and granular algorithm.
Inf. Sci., 2018

Optimization of selective ensemble for cost-sensitive classification: An empirical study.
Intelligent Decision Technologies, 2018

New Estimators for Primary Channel Gain in Cognitive Radio Networks.
IEEE Communications Letters, 2018

Dropout training for SVMs with data augmentation.
Frontiers Comput. Sci., 2018

The research about high-dynamic and low-gray target image differential capture technology based on laser active detection.
EURASIP J. Image and Video Processing, 2018

How Can Heterogeneous Internet of Things Build Our Future: A Survey.
IEEE Communications Surveys and Tutorials, 2018

Community-Aware Data Propagation with Small World Feature for Internet of Vehicles.
IEEE Communications Magazine, 2018

Biological and climate factors co-regulated spatial-temporal dynamics of vegetation autumn phenology on the Tibetan Plateau.
Int. J. Appl. Earth Obs. Geoinformation, 2018

Implementing multiple identities in IMS/VoLTE networks using implicit registration.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Message Passing Stein Variational Gradient Descent.
Proceedings of the 35th International Conference on Machine Learning, 2018

A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network.
Proceedings of the 2nd IEEE International Conference on Fog and Edge Computing, 2018

RFIDCam: a RFID-Aided Visual Tracking System.
Proceedings of the 2018 International Conference on Control, 2018

Research on the Impact of Wind Power Generation with Energy Storage System on Grid Frequency Stability.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

Study on Energy Storage System Participating in Frequency Regulation of Wind Farm Based on Polyline Fuzzy Neural Network.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

Ontology-based Venous Thromboembolism Risk Factors Mining and Model Developing from Medical Records.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Worst-Case Mechanism Design via Bayesian Analysis.
SIAM J. Comput., 2017

Improve credit scoring using transfer of learned knowledge from self-organizing map.
Neural Computing and Applications, 2017

Campus Intelligent Safety Supervision System Based on RFID.
Int. J. Online Eng., 2017

Financial credit risk assessment via learning-based hashing.
Intelligent Decision Technologies, 2017

Game-Theoretic Optimization of Bilateral Contract Transaction for Generation Companies and Large Consumers with Incomplete Information.
Entropy, 2017

Two-layer similarity fusion model for cover song identification.
EURASIP J. Audio, Speech and Music Processing, 2017

Fast Statistical Timing Analysis for Circuits with Post-Silicon Tunable Clock Buffers.
CoRR, 2017

Predicting enhancers with deep convolutional neural networks.
BMC Bioinformatics, 2017

Chromatin accessibility prediction via convolutional long short-term memory networks with k-mer embedding.
Bioinformatics, 2017

DACE: a scalable DP-means algorithm for clustering extremely large sequence data.
Bioinformatics, 2017

Heterogeneous ad hoc networks: Architectures, advances and challenges.
Ad Hoc Networks, 2017

Enabling Smart Urban Surveillance at The Edge.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

High-Level Music Descriptor Extraction Algorithm Based on Combination of Multi-Channel CNNs and LSTM.
Proceedings of the 18th International Society for Music Information Retrieval Conference, 2017

Online anomalous vehicle detection at the edge using multidimensional SSA.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Cake Cutting: Envy and Truth.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

SMART: Sponsored mobile app recommendation by balancing app downloads and appstore profit.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

An implementation of infants' gut microbiome maturation analyses by 16s rRNA from stool samples in extraction solution of room temperature.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Patient outcome prediction via convolutional neural networks based on multi-granularity medical concept embedding.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Learning Attributes from the Crowdsourced Relative Labels.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Matching Market Equilibrium Algorithms.
Encyclopedia of Algorithms, 2016

Trial and Error Algorithms.
Encyclopedia of Algorithms, 2016

Early DIRECT Mode Decision for MVC Using MB Mode Homogeneity and RD Cost Correlation.
TBC, 2016

Feature sparsity analysis for i-vector based speaker verification.
Speech Commun., 2016

A Dynamically Quantum Particle Swarm Optimization Algorithm with Adaptive Mutation.
JSW, 2016

ERGID: An efficient routing protocol for emergency response Internet of Things.
J. Netw. Comput. Appl., 2016

On revenue maximization with sharp multi-unit demands.
J. Comb. Optim., 2016

Motion Simulation in Virtual Basketball Shooting Teaching System.
Int. J. Online Eng., 2016

Towards tangible benefits of corporate failure prediction with business sector: A comparative study.
Intelligent Decision Technologies, 2016

Financial credit risk assessment: a recent review.
Artif. Intell. Rev., 2016

Mobile App Tagging.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

mLDM: A New Hierarchical Bayesian Statistical Model for Sparse Microbial Association Discovery.
Proceedings of the Research in Computational Molecular Biology - 20th Annual Conference, 2016

The design of DC constant current power supply in magnetic controllable transformer based on BUCK topology.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

The inrush current analysis and restraining method of energizing no-load transformer.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

Poster Abstract: Smart Urban Surveillance Using Fog Computing.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Dynamic Urban Surveillance Video Stream Processing Using Fog Computing.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

DeepEnhancer: Predicting enhancers by convolutional neural networks.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Nonlinear Feature Extraction with Max-Margin Data Shifting.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Incentives for Strategic Behavior in Fisher Market Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Discriminative Nonparametric Latent Feature Relational Models with Data Augmentation.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
STAR: Stack Trace Based Automatic Crash Reproduction via Symbolic Execution.
IEEE Trans. Software Eng., 2015

Discriminative Relational Topic Models.
IEEE Trans. Pattern Anal. Mach. Intell., 2015

Dynamics of Profit-Sharing Games.
Internet Mathematics, 2015

Aggregated local models via subspace clustering.
Intelligent Decision Technologies, 2015

Comparative study of classifier ensembles for cost-sensitive credit risk assessment.
Intell. Data Anal., 2015

Dropout Training for SVMs with Data Augmentation.
CoRR, 2015

SimApp: A Framework for Detecting Similar Mobile Applications by Online Kernel Learning.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015

Sparsity Analysis and Compensation for i-Vector Based Speaker Verification.
Proceedings of the Speech and Computer - 17th International Conference, 2015

Competitive Analysis via Benchmark Decomposition.
Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015

Modified Perceptual Linear Prediction Liftered Cepstrum (MPLPLC) Model for Pop Cover Song Recognition.
Proceedings of the 16th International Society for Music Information Retrieval Conference, 2015

Solving Linear Programming with Constraints Unknown.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

A Structural Pattern Mining Approach for Credit Risk Assessment.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

2014
Learning Harmonium Models With Infinite Latent Features.
IEEE Trans. Neural Netw. Learning Syst., 2014

Envy-free pricing in multi-item markets.
ACM Trans. Algorithms, 2014

Truthful Generalized Assignments via Stable Matching.
Math. Oper. Res., 2014

Trajectory prediction control for digital control DC-DC converters with fast transient response.
Microelectron. J., 2014

Bayesian inference with posterior regularization and applications to infinite latent SVMs.
J. Mach. Learn. Res., 2014

Gibbs max-margin topic models with data augmentation.
J. Mach. Learn. Res., 2014

Design of Wind-solar Complementary Power System Based on Progressive Fuzzy Control.
JCP, 2014

Dynamical Behavior for a Food-Chain Model with Impulsive Harvest and Digest Delay.
J. Applied Mathematics, 2014

Schema Design of Communication Module in Highway Monitoring System: A Case Study.
Int. J. Online Eng., 2014

Auctions for social lending: A theoretical analysis.
Games Econ. Behav., 2014

Software process evaluation: a machine learning framework with application to defect management process.
Empirical Software Engineering, 2014

Optimal competitive auctions.
Proceedings of the Symposium on Theory of Computing, 2014

Max-margin latent feature relational models for entity-attribute networks.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

AR-miner: mining informative reviews for developers from mobile app marketplace.
Proceedings of the 36th International Conference on Software Engineering, 2014

Hashing for Financial Credit Risk Analysis.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Dropout Training for Support Vector Machines.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
On Timing Model Extraction and Hierarchical Statistical Timing Analysis.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2013

Influence of class distribution on cost-sensitive learning: A case study of bankruptcy analysis.
Intell. Data Anal., 2013

Clustering and visualization of bankruptcy trajectory using self-organizing map.
Expert Syst. Appl., 2013

Improved monaural speech segregation based on computational auditory scene analysis.
EURASIP J. Audio, Speech and Music Processing, 2013

Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection.
Digit. Signal Process., 2013

Mining Crash Fix Patterns.
CoRR, 2013

Decentralized design of interconnected H∞ feedback control systems with quantized signals.
Applied Mathematics and Computer Science, 2013

Improved Approximation Algorithms for the Spanning Star Forest Problem.
Algorithmica, 2013

Trial and error in influential social networks.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Mining explicit rules for software process evaluation.
Proceedings of the International Conference on Software and System Process, 2013

Generalized Relational Topic Models with Data Augmentation.
Proceedings of the IJCAI 2013, 2013

Gibbs Max-Margin Topic Models with Fast Sampling Algorithms.
Proceedings of the 30th International Conference on Machine Learning, 2013

A Consensus Approach for Combining Multiple Classifiers in Cost-Sensitive Bankruptcy Prediction.
Proceedings of the Adaptive and Natural Computing Algorithms, 2013

2012
Rank Metric Decoder Architectures for Random Linear Network Coding With Error Control.
IEEE Trans. VLSI Syst., 2012

Statistical Timing Analysis for Latch-Controlled Circuits With Reduced Iterations and Graph Transformations.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2012

Large-Margin Predictive Latent Subspace Learning for Multiview Data Analysis.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Iterative timing analysis based on nonlinear and interdependent flipflop modelling.
IET Circuits, Devices & Systems, 2012

Enhanced default risk models with SVM+.
Expert Syst. Appl., 2012

On the Complexity of Trial and Error.
Electronic Colloquium on Computational Complexity (ECCC), 2012

Bayesian Inference with Posterior Regularization and Infinite Latent Support Vector Machines
CoRR, 2012

A robust hashing algorithm based on SURF for video copy detection.
Comput. Secur., 2012

Budget feasible mechanism design: from prior-free to bayesian.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

On Computing Pareto Stable Assignments.
Proceedings of the 29th International Symposium on Theoretical Aspects of Computer Science, 2012

Puzzle-based automatic testing: bringing humans into the loop by solving puzzles.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Credit Scoring for SME Using a Manifold Supervised Learning Algorithm.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2012, 2012

Biclustering and Subspace Learning with Regularization for Financial Risk Analysis.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Incentive Ratios of Fisher Markets.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Computing the Nucleolus of Matching, Cover and Clique Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Optimal Proportional Cake Cutting with Connected Pieces.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Composite Cyclotomic Fourier Transforms With Reduced Complexities.
IEEE Trans. Signal Processing, 2011

Optimal Envy-Free Pricing with Metric Substitutability.
SIAM J. Comput., 2011

A note on k-shortest paths problem.
Journal of Graph Theory, 2011

Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients.
IET Information Security, 2011

A stable credit rating model based on learning vector quantization.
Intell. Data Anal., 2011

A genetic algorithm-based approach to cost-sensitive bankruptcy prediction.
Expert Syst. Appl., 2011

Budget Feasible Mechanism Design via Random Sampling
CoRR, 2011

Mechanism Design without Money via Stable Matching
CoRR, 2011

On Nash Dynamics of Matching Market Equilibria
CoRR, 2011

Challenges in Automatic Testing.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

On the Approximability of Budget Feasible Mechanisms.
Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, 2011

Computation and Incentives of Competitive Equilibria in a Matching Market.
Proceedings of the Algorithmic Game Theory, 4th International Symposium, 2011

Iterative Timing Analysis Considering Interdependency of Setup and Hold Times.
Proceedings of the Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation, 2011

Timing Modeling of Flipflops Considering Aging Effects.
Proceedings of the Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation, 2011

Infinite Latent SVM for Classification and Multi-task Learning.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Conditional topical coding: an efficient topic model conditioned on rich features.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Software process evaluation: A machine learning approach.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Situational awareness on disruption management: A system information propagation approach.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Analysis of cyberspace security situational awareness based on fuzz reason.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Graph weighted subspace learning models in bankruptcy.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

A Market Clearing Solution for Social Lending.
Proceedings of the IJCAI 2011, 2011

GATE: game-based testing environment.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Infinite SVM: a Dirichlet Process Mixture of Large-margin Kernel Machines.
Proceedings of the 28th International Conference on Machine Learning, 2011

Fast statistical timing analysis for circuits with Post-Silicon Tunable clock buffers.
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011

How Profitable Are Strategic Behaviors in a Market?
Proceedings of the Algorithms - ESA 2011, 2011

Bankruptcy Trajectory Analysis on French Companies Using Self-Organizing Map.
Proceedings of the Progress in Artificial Intelligence, 2011

2010
Dynamic pricing for impatient bidders.
ACM Trans. Algorithms, 2010

An unbiased LSSVM model for classification and regression.
Soft Comput., 2010

Competitive equilibria in matching markets with budgets.
SIGecom Exchanges, 2010

Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation.
IET Communications, 2010

Prime Factor Cyclotomic Fourier Transforms with Reduced Complexity over Finite Fields
CoRR, 2010

Predictive Subspace Learning for Multi-view Data: a Large Margin Approach.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

A New Traffic Data-Fusion Approach Based on Evidence Theory Coupled with Fuzzy Rough Sets.
Proceedings of the Information and Automation - International Symposium, 2010

Packet Loss Concealment for compressed audio stream using sinusoidal frequency estimation.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Fast statistical timing analysis of latch-controlled circuits for arbitrary clock periods.
Proceedings of the 2010 International Conference on Computer-Aided Design, 2010

Weighted Learning Vector Quantization to Cost-Sensitive Learning.
Proceedings of the Artificial Neural Networks - ICANN 2010, 2010

Research on geographic information sharing in different cultural backgrounds.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Frugal Mechanism Design via Spectral Techniques.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Strongly Stable Assignment.
Proceedings of the Algorithms, 2010

Pareto stability in matching marketplaces.
Proceedings of the Behavioral and Quantitative Game Theory, 2010

2009
Cyclotomic FFTs With Reduced Additive Complexities Based on a Novel Common Subexpression Elimination Algorithm.
IEEE Trans. Signal Processing, 2009

Memory-efficient and high-throughput decoding of quasi-cyclic LDPC codes.
IEEE Trans. Communications, 2009

Reduced-Complexity Reed-Solomon Decoders Based on Cyclotomic FFTs.
IEEE Signal Process. Lett., 2009

On the Approximability of Influence in Social Networks.
SIAM J. Discrete Math., 2009

An adaptive PNN-DS approach to classification using multi-sensor information fusion.
Neural Computing and Applications, 2009

A Study on Decentralized H Feedback Control Systems with Local Quantizers.
Kybernetika, 2009

Robust Decentralized H2 Control of Multi-Channel Descriptor Systems with Norm-Bounded Parametric Uncertainties.
Kybernetika, 2009

Periodic and almost periodic solution for a non-autonomous epidemic predator-prey system with time-delay.
Appl. Math. Comput., 2009

Refining the Cost of Cheap Labor in Set System Auctions.
Proceedings of the Internet and Network Economics, 5th International Workshop, 2009

Rank metric decoder architectures for noncoherent error control in random network coding.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2009

Social lending.
Proceedings of the Proceedings 10th ACM Conference on Electronic Commerce (EC-2009), 2009

Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate.
Proceedings of the Advances in Information Security and Assurance, 2009

An Anomaly Detection and Analysis Method for Network Traffic Based on Correlation Coefficient Matrix.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

High-performance Designs of AES Transformations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Extended Kernel Self-Organizing Map Clustering Algorithm.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Combined Forecast Model of Gas Load Based on Grey Theory.
Proceedings of the Fuzzy Information and Engineering, 2009

Fuzzy Optimization Design of Gas Pipeline.
Proceedings of the Fuzzy Information and Engineering, 2009

A Fuzzy Path Selection Power-Based for MANET.
Proceedings of the Fuzzy Information and Engineering, 2009

The Role of Data Mining Techniques in Emergency Management.
Proceedings of the ICEIS 2009, 2009

Sensitivity based parameter reduction for statistical analysis of circuit performance.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Timing model extraction for sequential circuits considering process variations.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

Speech Hashing Algorithm Based on Short-Time Stability.
Proceedings of the Artificial Neural Networks, 2009

Approximating Matches Made in Heaven.
Proceedings of the Automata, Languages and Programming, 36th International Colloquium, 2009

Bankruptcy Prediction based on Independent Component Analysis.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Extending Learning Vector Quantization for Classifying Data with Categorical Values.
Proceedings of the Agents and Artificial Intelligence - International Conference, 2009

A Batch Learning Vector Quantization Algorithm for Categorical Data.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Construction of Ribavirin Engineering Bacteria.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Cost-Sensitive Learning Vector Quantization for Financial Distress Prediction.
Proceedings of the Progress in Artificial Intelligence, 2009

On hierarchical statistical static timing analysis.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Optimal Overlapped Message Passing Decoding of Quasi-Cyclic LDPC Codes.
IEEE Trans. VLSI Syst., 2008

Memory Efficient Decoder Architectures for Quasi-Cyclic LDPC Codes.
IEEE Trans. on Circuits and Systems, 2008

Deterministic Decentralized Search in Random Graphs.
Internet Mathematics, 2008

Complexity Analysis of Reed-Solomon Decoding over GF(2m) without Using Syndromes.
EURASIP J. Wireless Comm. and Networking, 2008

A Robust Zero-Watermarking Algorithm for Audio.
EURASIP J. Adv. Sig. Proc., 2008

Cyclotomic FFT of Length 2047 Based on a Novel 11-point Cyclic Convolution
CoRR, 2008

Complexity Analysis of Reed-Solomon Decoding over GF(2^m) Without Using Syndromes
CoRR, 2008

Walrasian Equilibrium: Hardness, Approximations and Tractable Instances.
Algorithmica, 2008

A Sparse Sampling Method for Classification Based on Likelihood Factor.
Proceedings of the Advances in Neural Networks, 2008

Compact designs of mixcolumns and subbytes using a novel common subexpression elimination algorithm.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier Transform.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Controlled Clipper Method to Reduce PAPR by Tone Reservation in OFDM System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Decentralized Generalized H2 Control of Multi-Channel Uncertain Systems with Time-Delays.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A multipurpose audio watermarking scheme for copyright protection and content authentication.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

ANN-modeled-classification based on Pi-Calculus.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

A Fuzzy and Hybrid Clustering Framework Using Self-Organizing Map.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Reduced-Complexity Cyclotomic FFT and Its Application in Reed-Solomon Decoding
CoRR, 2007

A cellular model for three-dimensional snow crystallization.
Comput. Graph., 2007

Generalized Binet dynamics.
Comput. Graph., 2007

Best analogs for replacing missing image data.
Comput. Graph., 2007

Cheap labor can be expensive.
Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2007

Reduced-Complexity Cyclotomic FFT and Its Application to Reed-Solomon Decoding.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Complexity Analysis of The GAO Algorithm.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Robust decentralized H∞ control of multi-channel discrete-time descriptor systems with time-delays.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Robust decentralized H control of multi-channel uncertain descriptor systems with time-delay.
Proceedings of the IEEE International Conference on Control Applications, 2007

2006
Assignment Problems in Rental Markets.
Proceedings of the Internet and Network Economics, Second International Workshop, 2006

Partly Parallel Overlapped Sum-Product Decoder Architectures for Quasi-Cyclic LDPC Codes.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2006

Parallel turbo-sum-product decoder architecture for quasi-cyclic LDPC codes.
Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30, 2006

2005
Automatic Authentication Technique Based on Supervised ART-2 and Polynomial Spline Pyramid Algorithm.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

An Extension of Self-organizing Maps to Categorical Data.
Proceedings of the Progress in Artificial Intelligence, 2005

2004
Memorizable Interactive Proof and Zero-Knowledge Proof Systems.
J. Comput. Sci. Technol., 2004

On complexity of single-minded auction.
J. Comput. Syst. Sci., 2004

Approximation for Dominating Set Problem with Measure Functions.
Computers and Artificial Intelligence, 2004

Fully Truthful Mechanisms.
Proceedings of the SOFSEM 2004: Theory and Practice of Computer Science, 2004

Dynamic Price Sequence and Incentive Compatibility (Extended Abstract).
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

Fisher Equilibrium Price with a Class of Concave Utility Functions.
Proceedings of the Algorithms, 2004

Fuzzy Classification Using Self-Organizing Map and Learning Vector Quantization.
Proceedings of the Data Mining and Knowledge Management, 2004

2003
A Web Service-based approach for data mining in distributed environments.
Proceedings of the Web Services: Modeling, 2003

Combinatorial auction across independent markets (extended abstract).
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

A Secure and One-Time-Password Based Computer Authentication System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Double Auction in Two-Level Markets.
Proceedings of the Computational Science - ICCS 2003, 2003

Border Detection on Remote Sensing Satellite Data Using Self-Organizing Maps.
Proceedings of the Progress in Artificial Intelligence, 2003

Incentive Compatible Mechanism Based on Linear Pricing Scheme for Single-Minded Auction.
Proceedings of the Advances in Computing Science, 2003

2002
M and J sets from Newton's transformation of the transcendental mapping F(z)=ezw+c with vcps.
Comput. Graph., 2002

A Case Study of the EJB Security: Combining Declarative, Role-based Access Control with Programmatic Application-specific Proxy Security Checks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

2001
A Fast Algorithm for Mining Sequential Patterns from Large Databases.
J. Comput. Sci. Technol., 2001

A graph-based clustering algorithm in large transaction databases.
Intell. Data Anal., 2001

2000
General Mandelbrot sets and Julia sets with color symmetry from equivariant mappings of the modular group.
Comput. Graph., 2000

1999
A Neural Network Assisted Navigation Tool in Teleoperation of Robot Arm Manipulator.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Bud-Sequence conjecture on M fractal image and M-J conjecture between C and Z planes from z >-- zw+c(w=alpha+i beta).
Comput. Graph., 1998

1997
Touch-driven robot control using a tactile Jacobian.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

1996
Local object shape from tactile sensing.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

1995
Edge tracking using tactile servo.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, 1995

Efficient edge detection from tactile data.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, 1995

1992
Robot Path Planner : A Neural Networks Approach.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 1992

1985
Manipulator maneuvering by feedback linearization with saturating inputs.
Proceedings of the 1985 IEEE International Conference on Robotics and Automation, 1985


  Loading...