Tao Feng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials.
J. Cloud Comput., December, 2024

Research on satellite data-driven algorithm for ground-level ozone concentration inversion: case of Yunnan, China.
Earth Sci. Informatics, April, 2024

A Non-Stationary Channel Model for 6G Multi-UAV Cooperative Communication.
IEEE Trans. Wirel. Commun., February, 2024

RT-GCN: Gaussian-based spatiotemporal graph convolutional network for robust traffic prediction.
Inf. Fusion, February, 2024

Integrating train service route design with passenger flow allocation for an urban rail transit line.
Eur. J. Oper. Res., February, 2024

2023
USC-ENet: a high-efficiency model for the diagnosis of liver tumors combining B-mode ultrasound and clinical data.
Health Inf. Sci. Syst., December, 2023

Miniaturized Single-Ended-to-Balanced Filtering Power Divider With High Selectivity Based on Tri-Mode Resonator.
IEEE Trans. Circuits Syst. II Express Briefs, November, 2023

A few-shot rare wildlife image classification method based on style migration data augmentation.
Ecol. Informatics, November, 2023

Fast Kalman filter synchronization algorithm for cooperative synchronization in time sensitive networks.
Digit. Signal Process., November, 2023

pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning in Industrial Edge-Cloud Collaborative Network.
IEEE Trans. Netw. Serv. Manag., September, 2023

A Fast Magnetic Flux Density Measurement Method With Skip-Echo Acquired Turbo Spin Echo (SATE).
IEEE Trans. Biomed. Eng., July, 2023

Contact Tracing and Epidemic Intervention via Deep Reinforcement Learning.
ACM Trans. Knowl. Discov. Data, April, 2023

Area-Based CFAR Target Detection for Automotive Millimeter-Wave Radar.
IEEE Trans. Veh. Technol., March, 2023

Simulation Implementation and Verification of a Security Framework for ICS Based on SPD.
Autom. Control. Comput. Sci., February, 2023

An intelligent zero trust secure framework for software defined networking.
PeerJ Comput. Sci., 2023

Scattered Mountainous Area Building Extraction From an Open Satellite Imagery Dataset.
IEEE Geosci. Remote. Sens. Lett., 2023

A novel approach to employment quality evaluation of college graduates with probabilistic linguistic MAGDM.
J. Intell. Fuzzy Syst., 2023

A spatial-frequency-temporal feature extraction network for change detection in synthetic aperture radar images<sup>1</sup>.
J. Intell. Fuzzy Syst., 2023

InstructVideo: Instructing Video Diffusion Models with Human Feedback.
CoRR, 2023

Molecular De Novo Design through Transformer-based Reinforcement Learning.
CoRR, 2023

CITING: Large Language Models Create Curriculum for Instruction Tuning.
CoRR, 2023

IS2N: Intent-Driven Security Software-Defined Network with Blockchain.
CoRR, 2023

Towards Efficient Deep Hashing Retrieval: Condensing Your Data via Feature-Embedding Matching.
CoRR, 2023

Refined Response Distillation for Class-Incremental Player Detection.
CoRR, 2023

SRNIC: A Scalable Architecture for RDMA NICs.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

GAT-MF: Graph Attention Mean Field for Very Large Scale Multi-Agent Reinforcement Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

ILRoute: A Graph-based Imitation Learning Method to Unveil Riders' Routing Strategies in Food Delivery Service.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Resilience In-Band Control Path Routing in Blockchain-Based Multi-Domain SDN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

RLIPv2: Fast Scaling of Relational Language-Image Pre-training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Space-Time Non-Stationary and Consistent Model for 6G Multi-UAV Cooperative Channels.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

A Chained Forwarding Mechanism for Large Messages.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Diversity-aware Deep Ranking Network for Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

DeepLA: A deep learning-based model for predicting protein function from protein sequence and evolutionary information.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Enhanced Multi-Relationships Integration Graph Convolutional Network for Inferring Substitutable and Complementary Items.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Mixed-Bouncing Based Non-Stationary Model for 6G Massive MIMO mmWave UAV Channels.
IEEE Trans. Commun., 2022

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection.
Secur. Commun. Networks, 2022

Identifying players in broadcast videos using graph convolutional network.
Pattern Recognit., 2022

CT-GCN: a phishing identification model for blockchain cryptocurrency transactions.
Int. J. Inf. Sec., 2022

Multi-vehicle multi-sensor occupancy grid map fusion in vehicular networks.
IET Commun., 2022

Progressive Learning without Forgetting.
CoRR, 2022

Targeted Demand Response: Formulation, LMP Implications, and Fast Algorithms.
CoRR, 2022

Linear codes associated with the Desarguesian ovoids in Q<sup>+</sup>(7, q).
CoRR, 2022

Human action recognition using a depth sequence key-frames based on discriminative collaborative representation classifier for healthcare analytics.
Comput. Sci. Inf. Syst., 2022

A quantitative framework for network resilience evaluation using Dynamic Bayesian Network.
Comput. Commun., 2022

TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI.
Comput. Commun., 2022

Implementing efficient attribute encryption in IoV under cloud environments.
Comput. Networks, 2022

SEEG-Net: An explainable and deep learning-based cross-subject pathological activity detection method for drug-resistant epilepsy.
Comput. Biol. Medicine, 2022

P-LFA: A Novel LFA-Based Percolation Fast Rerouting Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Software Technology Status Management under the Trend of Ship Informatization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Tiara: A Scalable and Efficient Hardware Acceleration Architecture for Stateful Layer-4 Load Balancing.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

RLIP: Relational Language-Image Pre-training for Human-Object Interaction Detection.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Precise Mobility Intervention for Epidemic Control Using Unobservable Information via Deep Reinforcement Learning.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

A Cross-patient SEEG Epileptic Signal Detection Method Based on Adaptive Feature Fusion of Brain Network Features and Single-Channel Features.
Proceedings of the 9th International Conference on Biomedical and Bioinformatics Engineering, 2022

Lightweight Edge-side Fault Diagnosis Based on Knowledge Distillation.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022

A Multi-scale Ensemble Learning Model for Cellular Traffic Prediction.
Proceedings of the IEEE Global Communications Conference, 2022

Reviving the economy while saving lives: a deep reinforcement learning approach for smart POI reopening.
Proceedings of the 30th International Conference on Advances in Geographic Information Systems, 2022

Overcoming Catastrophic Forgetting in Incremental Object Detection via Elastic Response Distillation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Adaptive Packet Scheduling Algorithm for Time-Sensitive Service based on DTP and Reinforcement Learning.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.
Secur. Commun. Networks, 2021

Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT.
Secur. Commun. Networks, 2021

Secure Data Collaborative Computing Scheme Based on Blockchain.
Secur. Commun. Networks, 2021

Weighted Information Models for the Quantitative Prediction and Evaluation of the Geothermal Anomaly Area in the Plateau: A Case Study of the Sichuan-Tibet Railway.
Remote. Sens., 2021

Challenges and opportunities for information integration applications in the data-enabled construction systems.
Microprocess. Microsystems, 2021

Simulation of Human Ear Recognition Sound Direction Based on Convolutional Neural Network.
J. Intell. Syst., 2021

MobileNet-Yolo based wildlife detection model: A case study in Yunnan Tongbiguan Nature Reserve, China.
J. Intell. Fuzzy Syst., 2021

Segmentation of overlapping chromosome images using U-Net with improved dilated convolutions.
J. Intell. Fuzzy Syst., 2021

Abnormal sound detection of washing machines based on convolution neural network in production environment.
Int. J. Wirel. Mob. Comput., 2021

Group signature with time-bound keys and unforgeability of expiry time for smart cities.
EURASIP J. Wirel. Commun. Netw., 2021

Response-based Distillation for Incremental Object Detection.
CoRR, 2021

Deep Reinforcement Learning for Demand Driven Services in Logistics and Transportation Systems: A Survey.
CoRR, 2021

Reinforced Contact Tracing and Epidemic Intervention.
CoRR, 2021

A weighted K-member clustering algorithm for K-anonymization.
Computing, 2021

A weighted intrusion detection model of dynamic selection.
Appl. Intell., 2021

Entropy-Defined Direct Batch Growing Hierarchical Self-Organizing Mapping for Efficient Network Anomaly Detection.
IEEE Access, 2021

Few-Shot Conversational Dense Retrieval.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Content Popularity Prediction Based on Integrated Features and Federated Learning.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

Towards Mask-robust Face Recognition.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

HMM-LSTM for Proactive Traffic Prediction in 6G Wireless Networks.
Proceedings of the 21st International Conference on Communication Technology, 2021

A Hybrid Chain and A Double-Tuple Variable Bulk Arrival and Static Bulk Service Model.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Blockchain-Enabled Parallel Learning in Industrial Edge-Cloud Network: a Fuzzy DPoSt-PBFT Approach.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
A Double-Branch Surface Detection System for Armatures in Vibration Motors with Miniature Volume Based on ResNet-101 and FPN.
Sensors, 2020

Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles.
Int. J. Netw. Secur., 2020

A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles.
Int. J. Netw. Secur., 2020

Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk.
Int. J. Netw. Secur., 2020

Exploring Changes in Land Surface Temperature Possibly Associated with Earthquake: Case of the April 2015 Nepal Mw 7.9 Earthquake.
Entropy, 2020

Differential Private Spatial Decomposition and Location Publishing Based on Unbalanced Quadtree Partition Algorithm.
IEEE Access, 2020

Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection.
IEEE Access, 2020

Fault Diagnosis Strategy for Complex Systems Based on Multi-Source Heterogeneous Information Under Epistemic Uncertainty.
IEEE Access, 2020

FEM Simulation of Charge Accumulation Behaviours on Polyimide Surface in 10 kV Negative High-Voltage Corona Polarization Process.
IEEE Access, 2020

Visualizing and Interpreting RNN Models in URL-based Phishing Detection.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

An Improved Collaborative Filtering Recommendation Algorithm Based on Fusion Time Factor.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

2019
An Industrial Micro-Defect Diagnosis System via Intelligent Segmentation Region.
Sensors, 2019

Research on privacy enhancement scheme of blockchain transactions.
Secur. Priv., 2019

Upper Ocean Response to Two Sequential Tropical Cyclones over the Northwestern Pacific Ocean.
Remote. Sens., 2019

Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing.
Int. J. Netw. Secur., 2019

A Searchable CP-ABE Privacy Preserving Scheme.
Int. J. Netw. Secur., 2019

Fast assimilation of frequently acquired 4D seismic data for reservoir history matching.
Comput. Geosci., 2019

Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection.
IEEE Access, 2019

Optimal VMD-Based Signal Denoising for Laser Radar via Hausdorff Distance and Wavelet Transform.
IEEE Access, 2019

A Character-Level BiGRU-Attention for Phishing Classification.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Improving Question Classification with Hybrid Networks.
Proceedings of the International Conference on Asian Language Processing, 2019

Formal Verification of 5G-EAP-TLS Authentication Protocol.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

Character-Aware Low-Resource Neural Machine Translation with Weight Sharing and Pre-training.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

FPD: A New Algorithm for Iris Matching and Evaluation Based on Frequency-modulated Phase Difference.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
A New Access Control System Based on CP-ABE in Named Data Networking.
Int. J. Netw. Secur., 2018

A based on blinded CP-ABE searchable encryption cloud storage service scheme.
Int. J. Commun. Syst., 2018

Multiuser access control searchable privacy-preserving scheme in cloud storage.
Int. J. Commun. Syst., 2018

Research on trusted DNP3-BAE protocol based on hash chain.
EURASIP J. Wirel. Commun. Netw., 2018

Model Checking Optimal Infinite-Horizon Control for Probabilistic Gene Regulatory Networks.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

Optimal Sensor Placement Based on System Reliability Criterion Under Epistemic Uncertainty.
IEEE Access, 2018

ODP: An Infrastructure for On-Demand Service Profiling.
Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, 2018

An Efficient and Anonymous KP-ABE Scheme with Keyword Search.
Proceedings of the Information Science and Applications 2018, 2018

Research on Privacy Preserving of Searchable Encryption.
Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference, 2018

An Indoor Sound Source Localization Dataset for Machine Learning.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

HAASD: A dataset of Household Appliances Abnormal Sound Detection.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Improving Low-Resource Neural Machine Translation with Weight Sharing.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2018

2017
Flexible distributed heterogeneous computing in traffic noise mapping.
Comput. Environ. Urban Syst., 2017

Multimodal Data fusion for SRGPS antenna motion error reduction.
Multim. Tools Appl., 2017

Multimodal data fusion for SB-JPALS status prediction under antenna motion fault mode.
Neurocomputing, 2017

An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage.
Int. J. Commun. Syst., 2017

A handheld diagnostic system for 6LoWPAN networks.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

EigenTrust for Hierarchically Structured Chord.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Design of a CMOS System-on-Chip for Passive, Near-Field Ultrasonic Energy Harvesting and Back-Telemetry.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Secure Content Delivery Scheme Based on Yaksha System for CCMANETs.
J. Commun., 2016

Publish/subscribe scheme for content centric MANETs.
Comput. Sci. Inf. Syst., 2016

Characterizing apple picking patterns for robotic harvesting.
Comput. Electron. Agric., 2016

Effective Multi-stream Joining in Apache Samza Framework.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Self-Powered Monitoring of Repeated Head Impacts Using Time-Dilation Energy Measurement Circuit.
IEEE Trans. Biomed. Circuits Syst., 2015

A new method of formalizing anonymity based on protocol composition logic.
Secur. Commun. Networks, 2015

Differentiation of Eight Commercial Mushrooms by Electronic Nose and Gas Chromatography-Mass Spectrometry.
J. Sensors, 2015

Feasibility of B-mode diagnostic ultrasonic energy transfer and telemetry to a cm<sup>2</sup> sized deep-tissue implant.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Hybrid SDN architecture to integrate with legacy control and management plane: An experiences-based study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDN.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

A memory capacity model for high performing data-filtering applications in Samza framework.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Hybrid CMOS Rectifier Based on Synergistic RF-Piezoelectric Energy Scavenging.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

A method of eliminating the signal-dependent random noise from the raw CMOS image sensor data based on Kalman filter.
Signal Process., 2014

The preconditioned Jacobian-free Newton-Krylov methods for nonequilibrium radiation diffusion equations.
J. Comput. Appl. Math., 2014

Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design.
CoRR, 2014

Key parameters generation of the navigation data of GPS Simulator.
CoRR, 2014

Fast, Low-Memory Algorithm for Construction of Nanosecond Level Snapshots of Financial Markets.
Proceedings of the Annual Conference of the Extreme Science and Engineering Discovery Environment, 2014

Joint allocation and scheduling of network resource for multiple control applications in SDN.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A communication protocol of man overboard system based on BeiDou.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Analysis on a Multi-objective Binary Disperse Bacterial Colony Chemotaxis Algorithm and Its Convergence.
Proceedings of the Advances in Swarm Intelligence - 5th International Conference, 2014

Performing software defined route-based IP spoofing filtering with SEFA.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
On linearization and preconditioning for radiation diffusion coupled to material thermal conduction equations.
J. Comput. Phys., 2013

The Development and Change of Teachers' Strategic Knowledge in Teachers' Online Community of Practice.
Int. J. Asian Bus. Inf. Manag., 2013

Quantum channels from association schemes
CoRR, 2013

Situational Awareness for Improving Network Resilience Management.
Proceedings of the Information Security Practice and Experience, 2013

2012
A characterization of two-weight projective cyclic codes
CoRR, 2012

Gene, pathway and network frameworks to identify epistatic interactions of single nucleotide polymorphisms derived from GWAS data.
BMC Syst. Biol., 2012

Querying Provenance for Ranking and Recommending.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Analysis and design of high efficiency inductive power-links using a novel matching strategy.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

Artificial Emotion Model of Child Playmate Robot Based on a Combined Method.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

TUNOS: A novel SDN-oriented networking operating system.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Networking as a Service: a Cloud-based Network Architecture.
J. Networks, 2011

On finite difference approximation of a matrix-vector product in the Jacobian-free Newton-Krylov method.
J. Comput. Appl. Math., 2011

Jupiter: transparent augmentation of smartphone capabilities through cloud computing.
Proceedings of the 3rd ACM SOSP Workshop on Networking, 2011

OpenRouter: OpenFlow extension and implementation based on a commercial router.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

A SOOA Based Distributed Computing Mechanism for Road Traffic Noise Mapping.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Under-determined blind source separation based on sub-band division.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

A quick survey on selected approaches for preparing programmable networks.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Reliability Modeling and Analysis of Clockless Wave Pipeline Core for Embedded Combinational Logic Design.
IEEE Trans. Instrum. Meas., 2010

Nonexistence of Some (945, 177, 33)-difference Sets.
Ars Comb., 2010

Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010

Predicting High-level Music Semantics Using Social Tags via Ontology-based Reasoning.
Proceedings of the 11th International Society for Music Information Retrieval Conference, 2010

Changeable Threshold Signature Scheme Based on Lattice Theory.
Proceedings of the International Conference on E-Business and E-Government, 2010

The embedded GIS technology in LBS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A quickly constructing strategy for mathematical model based on mathematical templates in embedded GIS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

2009
UC-Secure Source Routing Protocol.
IACR Cryptol. ePrint Arch., 2009

Note On (m, 2, m-1, m-2/2) Relative Difference Sets.
Ars Comb., 2009

Impact of Wireless IEEE802.11n Encryption Methods on Network Performance of Operating Systems.
Proceedings of the Second International Conference on Emerging Trends in Engineering & Technology, 2009

2008
Statistical analysis of mobile radio reception: an extension of clarke's model.
IEEE Trans. Commun., 2008

A new approach for UC security concurrent deniable authentication.
Sci. China Ser. F Inf. Sci., 2008

An efficient method to identify differentially expressed genes in microarray experiments.
Bioinform., 2008

Adaptive finite element methods for the identification of distributed parameters in elliptic equation.
Adv. Comput. Math., 2008

SMNDP: A Practical and Provably Secure Multi-path Source Routing.
Proceedings of the MSN 2008, 2008

A Secure and Efficient Group Key Agreement for Ad Hoc Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
Stochastic Differential Equation Theory Applied to Wireless Channels.
IEEE Trans. Commun., 2007

Influenza Virus Database (IVDB): an integrated information resource and analysis platform for influenza virus research.
Nucleic Acids Res., 2007

Relative (p<sup>a</sup>, p<sup>b</sup>, p<sup>a</sup>, p<sup>a-b</sup>)-difference sets in p-subgroups of SL(n, K).
Finite Fields Their Appl., 2007

2006
Adaptive Finite Element Methods for the Identification of Elastic Constants.
J. Sci. Comput., 2006

2005
SilkDB: a knowledgebase for silkworm biology and genomics.
Nucleic Acids Res., 2005

2004
Reliability Modeling and Assurance of Clockless Wave Pipeline.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004

Fault tolerant clockless wave pipeline design.
Proceedings of the First Conference on Computing Frontiers, 2004

2003
Correction and rectification of light fields.
Comput. Graph., 2003

Hardware/Software Co-Reliability of Field Reconfigurable Multi-Processor-Memory Systems with Redundant Bus.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Yield Modeling and Analysis of a Clockless Asynchronous Wave Pipeline with Pulse Faults.
Proceedings of the 18th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2003), 2003

2002
Stereo Computation Using Radial Adaptive Windows.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2000
Spatio-Temporal Segmentation for Video Surveillance.
Proceedings of the 15th International Conference on Pattern Recognition, 2000


  Loading...