Wenli Wang

According to our database1, Wenli Wang authored at least 25 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-preserving Computational Geometry.
I. J. Network Security, 2019

A Frequency Multiplication Method Based on Extracting Harmonic From Narrow Pulse.
IEEE Access, 2019

2018
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines.
I. J. Network Security, 2018

Partially Observable Reinforcement Learning for Intelligent Transportation Systems.
CoRR, 2018

A Method for Detecting Flower Collision Based on Spherical Projection.
Proceedings of the Image and Graphics Technologies and Applications, 2018

Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Hybrid Pre-Log and Post-Log Image Reconstruction for Computed Tomography.
IEEE Trans. Med. Imaging, 2017

Authenticity and Social Media.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Reality Video vs. Video Modeling-A Case Study in Patient Education.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
In Bed with Technology? Peril, Promise, and Prudence.
CAIS, 2015

A Review on Leaf Temperature Sensor: Measurement Methods and Application.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Building a Contemplative IS Workforce through Promoting Mindfulness in IS Design-A Case Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2013
Adaptive Curve Tailoring.
Proceedings of the Information Sciences and Systems 2013, 2013

Where is the Wisdom We Have Lost in Technology?
Proceedings of the 19th Americas Conference on Information Systems, 2013

2011
Management of Change to Ensure IS Success: A Longitudinal Study.
Proceedings of the International Conference on Information Systems, 2011

Monitoring ultradian changes in cardiorespiratory control in obstructive sleep apnea syndrome.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

2010
Deterring Adolescent Dependency on Text Messaging: A Conceptual Model and Framework for Behavior Control.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2008
The Benefits of Unexpected Informal Customer Support from Vendors in Online Communities.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Binary Vickrey auction - A robust and efficient multi-unit sealed-bid online auction protocol against buyer multi-identity bidding.
Decision Support Systems, 2007

2006
Buy-price English auction.
J. Economic Theory, 2006

2005
To the Question "Does IT Matter?" Hollywood Answers "Yes".
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2002
Shill Bidding In Multi-Round Online Auctions.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions.
Int. J. Electronic Commerce, 2001

2000
E-Process Design and Assurance Using Model Checking.
IEEE Computer, 2000

Economic mechanism design for securing online auctions.
Proceedings of the Twenty-First International Conference on Information Systems, 2000


  Loading...