The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John A. Stankovic, Wei Zhao
    On Real-Time Transactions. [Citation Graph (12, 0)][DBLP]
    SIGMOD Record, 1988, v:17, n:1, pp:4-18 [Journal]
  2. Wei Zhao, Krithi Ramamritham, John A. Stankovic
    Preemptive Scheduling Under Time and Resource Constraints. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:8, pp:949-960 [Journal]
  3. Wei Zhao, Krithi Ramamritham, John A. Stankovic
    Scheduling Tasks with Resource Requirements in Hard Real-Time Systems. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:5, pp:564-577 [Journal]
  4. Jane W.-S. Liu, Kwei-Jay Lin, Wei Kuan Shih, Albert Chuang-shi Yu, Jen-Yao Chung, Wei Zhao
    Algorithms for Scheduling Imprecise Computations. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1991, v:24, n:5, pp:58-68 [Journal]
  5. Wei Zhao, Krithi Ramamritham
    Virtual Time CSMA Protocols for Hard Real-Time Communication. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:8, pp:938-952 [Journal]
  6. Wei Zhao, Barrett R. Bryant, Fei Cao, Kamal Bhattacharya, Rainer Hauser
    Transforming Business Process Models: Enabling Programming at a Higher Level. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:173-180 [Conf]
  7. Jianjia Wu, Dan Cheng, Wei Zhao
    Detecting Grid-Abuse Attacks by Source-based Monitoring. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:565-571 [Conf]
  8. Xia Chen, Minqiang Li, Wei Zhao, Ding-Yi Chen
    Discovering Conceptual Page Hierarchy of a Web Site from User Traversal History. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:536-543 [Conf]
  9. Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
    Understanding How the Requirements Are Implemented in Source Code. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:68-77 [Conf]
  10. Chuan He, Guan Qin, Mi Lu, Wei Zhao
    An Efficient Implementation of High-Accuracy Finite Difference Computing Engine on FPGAs. [Citation Graph (0, 0)][DBLP]
    ASAP, 2006, pp:95-98 [Conf]
  11. Ming Li, Shengquan Wang, Wei Zhao
    A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:541-550 [Conf]
  12. Wei Zhao, Paul Mischel, Marc Carlson, Bin Zhang, Stanley Nelson, Steve Horvath
    A Network-Based Gene Screening Approach For Improving the Validation Success of Microarrays. [Citation Graph (0, 0)][DBLP]
    BIOCOMP, 2006, pp:458-464 [Conf]
  13. Wei Zhao, Chang-Hyun Jo
    A Compiler Design for the Agent-Based Programming Language. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2003, pp:393-396 [Conf]
  14. Ming Li, Wei Zhao
    A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:267-272 [Conf]
  15. Jie Zhou, Wei Zhao, Chao Huang, Jiejun Wang
    Spatial Correlation and SER Performance Analysis of Circular Antenna Array. [Citation Graph (0, 0)][DBLP]
    CNSR, 2006, pp:89-94 [Conf]
  16. Lianguan Shen, Mujun Li, Wei Zhao, Ziqiang Zhou, You Li, Mei Wu, Jinjin Zheng
    Web Based Cooperative Virtual Product Design Environment Shared by Designers and Customers. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:384-393 [Conf]
  17. Wei Zhao, Lianguan Shen, Mujun Li, Jinjin Zheng
    Approach of Interactive Operation of VRML Model in Virtual Collaborative Design. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:1168-1172 [Conf]
  18. Wei Zhao, Christos A. Papachristou
    Testing DSP Cores Based on Self-Test Programs. [Citation Graph (0, 0)][DBLP]
    DATE, 1998, pp:166-172 [Conf]
  19. Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao
    Asymmetric Code Design for Remote Multiterminal Source Coding. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2004, pp:572- [Conf]
  20. Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao
    On Multiterminal Source Code Design. [Citation Graph (0, 0)][DBLP]
    DCC, 2005, pp:43-52 [Conf]
  21. Nan Zhang 0004, Wei Zhao, Jianer Chen
    Cardinality-based inference control in OLAP systems: an information theoretic approach. [Citation Graph (0, 0)][DBLP]
    DOLAP, 2004, pp:59-64 [Conf]
  22. Wei Zhao, Barrett R. Bryant, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston
    Automated Glue/Wrapper Code Generation in Integration of Distributed and Heterogeneous Software Components. [Citation Graph (0, 0)][DBLP]
    EDOC, 2004, pp:275-285 [Conf]
  23. Chuan He, Wei Zhao, Mi Lu
    FPGA-Based High-Order Finite Difference Algorithm for 2D Acoustic Wave Propagation Problems. [Citation Graph (0, 0)][DBLP]
    ERSA, 2005, pp:267-273 [Conf]
  24. Chuan He, Guan Qin, Mi Lu, Wei Zhao
    Group-Alignment based Accurate Floating-Point Summation on FPGAs. [Citation Graph (0, 0)][DBLP]
    ERSA, 2006, pp:136-142 [Conf]
  25. He Chuan, Wei Zhao, Mi Lu
    Time Domain Numerical Simulation for Transient Waves on Reconfigurable Coprocessor Platform. [Citation Graph (0, 0)][DBLP]
    FCCM, 2005, pp:127-136 [Conf]
  26. Chuan He, Guan Qin, Mi Lu, Wei Zhao
    An Optimized Finite Difference Computing Engine on FPGAs. [Citation Graph (0, 0)][DBLP]
    FCCM, 2006, pp:283-284 [Conf]
  27. Weidong Bao, Jiangfeng Wang, Wei Zhao, Maojun Zhang
    VECON: a Cooperative Event Detection System for Video Sensor Grid. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:266-269 [Conf]
  28. Tarun Sairam, Wei Zhao, Yu Cao
    Optimizing finfet technology for high-speed and low-power design. [Citation Graph (0, 0)][DBLP]
    ACM Great Lakes Symposium on VLSI, 2007, pp:73-77 [Conf]
  29. Guoqing Mo, Wei Zhao, Haixia Cao, Jianshe Dong
    Multi-agent Interaction Based Collaborative P2P System for Fighting Spam. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:428-431 [Conf]
  30. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:188-195 [Conf]
  31. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
    Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:84-91 [Conf]
  32. Wei Zhao, Marwan Krunz, Satish K. Tripathi
    Efficient Transport of Stored Video Using Stream Scheduling and Window-Based Traffic Envelopes. [Citation Graph (0, 0)][DBLP]
    ICC (2), 1997, pp:793-797 [Conf]
  33. Jan Mandel, Lynn S. Bennethum, Mingshi Chen, Janice L. Coen, Craig C. Douglas, Leopoldo P. Franca, Craig J. Johns, Minjeong Kim, Andrew V. Knyazev, Robert Kremens, Vaibhav Kulkarni, Guan Qin, Anthony Vodacek, Jianjia Wu, Wei Zhao, Adam Zornes
    Towards a Dynamic Data Driven Application System for Wildfire Simulation. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:632-639 [Conf]
  34. Jan Mandel, Mingshi Chen, Leopoldo P. Franca, Craig J. Johns, A. Puhalskii, Janice L. Coen, Craig C. Douglas, Robert Kremens, Anthony Vodacek, Wei Zhao
    A Note on Dynamic Data Driven Wildfire Modeling. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:725-731 [Conf]
  35. Wei Zhao, Christos A. Papachristou
    Architectural partitioning of control memory for application specific programmable processors. [Citation Graph (0, 0)][DBLP]
    ICCAD, 1995, pp:521-526 [Conf]
  36. Wei Zhao, Christos A. Papachristou
    Synthesis of reusable DSP cores based on multiple behaviors. [Citation Graph (0, 0)][DBLP]
    ICCAD, 1996, pp:103-108 [Conf]
  37. Chris Martin, Wei Zhao, Graeme Doherty, Andrew Bohonis
    GARTL: A Real-time Programming Language Based on Multi-version Computation. [Citation Graph (0, 0)][DBLP]
    ICCL, 1990, pp:107-115 [Conf]
  38. Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao
    SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:452-461 [Conf]
  39. Gopal Agrawal, Biao Chen, Wei Zhao, Sadegh Davari
    Guaranteeing Synchronous Message Deadlines with the Timed Token Protocol. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:468-475 [Conf]
  40. Biao Chen, H. Li, Wei Zhao
    Meeting Delay Requirements in Computer Networks with Wormhole Routing. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:125-132 [Conf]
  41. Biao Chen, Anirudha Sahoo, Wei Zhao, Amitava Raha
    Connection-Oriented Communications for Real-Time Applications in FDDI-ATM-FDDI Heterogeneous Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  42. Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
    Scalable QoS Guaranteed Communication Services for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:180-187 [Conf]
  43. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:340-0 [Conf]
  44. Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Marking Attacks in Wireless Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:493-503 [Conf]
  45. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:257-0 [Conf]
  46. Weijia Jia, Hanxing Wang, Maoning Tang, Wei Zhao
    Effective Delay Control for High Rate Heterogeneous Real-time Flows. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:367-0 [Conf]
  47. Sanjay Kamat, Wei Zhao
    Real-Time Schedulability of Two Token Ring Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1993, pp:347-354 [Conf]
  48. Amitava Raha, Sanjay Kamat, Wei Zhao
    Guaranteeing End-to-End Deadlines in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1995, pp:60-68 [Conf]
  49. Krithi Ramamritham, John A. Stankovic, Wei Zhao
    Meta-Level Control in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1987, pp:10-17 [Conf]
  50. Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao
    On the Confidential Auditing of Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:600-607 [Conf]
  51. Shengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao
    Providing Statistical Delay Guarantees in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:48-55 [Conf]
  52. Wei Zhao, John A. Stankovic, Krithi Ramamritham
    A Multi-Access Window Protocol for Transmission of Time Constrained Messages. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1988, pp:384-392 [Conf]
  53. Dan Cheng, Zhibin Mai, Jianjia Wu, Guan Qin, Wei Zhao
    A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:631-638 [Conf]
  54. Amitava Raha, Nicholas Malcolm, Wei Zhao
    Hard real-time communications with weighted round robin service in ATM local area networks. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:96-0 [Conf]
  55. Wei Zhao, Marc Willebeek-LeMair, Prasoon Tiwari
    Efficient Adaptive Media Scaling and Streaming of Layered Multimedia in Heterogeneous Environment. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:377-381 [Conf]
  56. Amitava Raha, Sanjay Kamat, Wei Zhao
    Using traffic regulation to meet end-to-end deadlines in ATM LANs. [Citation Graph (0, 0)][DBLP]
    ICNP, 1995, pp:152-0 [Conf]
  57. Wei Zhao, Satish K. Tripathi
    Routing guaranteed quality of service connections in integrated services packet networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 1997, pp:175-182 [Conf]
  58. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
    Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2003, pp:483-492 [Conf]
  59. Weijia Jia, Gaochao Xu, Dong Xuan, Wei Zhao
    An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP]
    ICPP, 1999, pp:508-515 [Conf]
  60. Weijia Jia, Gaochao Xu, Wei Zhao
    Integrated Routing for Multicast and Anycast Messages. [Citation Graph (0, 0)][DBLP]
    ICPP, 2001, pp:561-570 [Conf]
  61. Chengzhi Li, Riccardo Bettati, Wei Zhao
    Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:432-440 [Conf]
  62. Chengzhi Li, Riccardo Bettati, Wei Zhao
    New Delay Analysis in High Speed Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 1999, pp:454-461 [Conf]
  63. Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
    Utilization-Based Admission Control for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICPP, 2000, pp:251-0 [Conf]
  64. Dong Xuan, Weijia Jia, Wei Zhao
    Routing Algorithms for Anycast Messages. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:122-0 [Conf]
  65. Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yang
    SNIAFL: Towards a Static Non-Interactive Approach to Feature Location. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:293-303 [Conf]
  66. Wei Zhao, Lu Zhang, Dan Hao, Hong Mei, Jiasu Sun
    Alternative Scalable Algorithms for Lattice-Based Feature Location. [Citation Graph (0, 0)][DBLP]
    ICSM, 2004, pp:528- [Conf]
  67. Wei Zhao, Lu Zhang, Hong Mei, Jiasu Sun
    Requirements Guided Dynamic Software Clustering. [Citation Graph (0, 0)][DBLP]
    ICSM, 2005, pp:605-608 [Conf]
  68. Wei Zhao, Ying Liu, Jun Zhu, Hui Su
    Towards Facilitating Development of SOA Application with Design Metrics. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2006, pp:569-580 [Conf]
  69. Fei Cao, Barrett R. Bryant, Shih-Hsi Liu, Wei Zhao
    A Non-Invasive Approach to Dynamic Web Services Provisioning. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:229-236 [Conf]
  70. Fei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston
    A Meta-Modeling Approach to Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:796-799 [Conf]
  71. Riccardo Bettati, Wei Zhao, D. Teodor
    Real-time Intrusion Detection and Suppression in ATM Networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:111-118 [Conf]
  72. Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
    Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:266-281 [Conf]
  73. Gopal Agrawal, Biao Chen, Wei Zhao
    Local Synchronous Capacity Allocation Schemes for Guaranteeing Message Deadlines with the Timed Token Protocol. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1993, pp:186-193 [Conf]
  74. Sanjay Kamat, Gopal Agrawal, Wei Zhao
    On Available Bandwidth in FDDI-Based Reconfigurable Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:1390-1397 [Conf]
  75. Chengzhi Li, Amitava Raha, Wei Zhao
    Stability in ATM Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:160-167 [Conf]
  76. Nicholas Malcolm, Wei Zhao, Chris J. Barter
    Guarantee Protocols for Communication in Distributed Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1990, pp:1078-1086 [Conf]
  77. Amitava Raha, Sanjay Kamat, Wei Zhao
    Admission Control for Hard Real-Time Connections in ATM LANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1996, pp:180-188 [Conf]
  78. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:669-678 [Conf]
  79. Yong Xiong, Jyh-Charn Liu, Kang G. Shin, Wei Zhao
    On the Modeling and Optimization of Discontinuous Network Congestion Control Systems. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  80. Lijun Yao, Wei Zhao
    Performance of an Extended IEEE 802.5 Protocol in Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1991, pp:469-478 [Conf]
  81. Wei Zhao, Taruni Seth, Michelle Y. Kim, Marc Willebeek-LeMair
    Optimal Bandwidth/Delay Tradeoff for Feasible-Region-Based Scalabel Multimedia Scheduling. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1131-1138 [Conf]
  82. Kexiang Wang, Hong Qin, Paul R. Fisher, Wei Zhao
    Automatic registration of mammograms using texture-based anisotropic features. [Citation Graph (0, 0)][DBLP]
    ISBI, 2006, pp:864-867 [Conf]
  83. Wei Zhao, Yu Cao
    New Generation of Predictive Technology Model for Sub-45nm Design Exploration. [Citation Graph (0, 0)][DBLP]
    ISQED, 2006, pp:585-590 [Conf]
  84. Dan Hao, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun
    A similarity-aware approach to testing based fault localization. [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:291-294 [Conf]
  85. Nan Zhang 0004, Shengquan Wang, Wei Zhao
    A new scheme on privacy-preserving data classification. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:374-383 [Conf]
  86. Fang Feng, Sanjay Kamat, Wei Zhao
    Guaranteeing application-to-application deadlines in distributed real-time systems. [Citation Graph (0, 0)][DBLP]
    LCN, 1995, pp:296-0 [Conf]
  87. Fang Feng, Cen Li, Amitava Raha, Shiqian Yu, Wei Zhao
    Modeling and Regulation of Host Traffic in ATM Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1996, pp:458-467 [Conf]
  88. Weijia Jia, Pui-on Au, Gaochao Xu, Wei Zhao
    Scalable Multicast Routing Protocol Using Anycast and Hierarchical-Trees. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:572-584 [Conf]
  89. Amitava Raha, Nicholas Malcolm, Wei Zhao
    Performance Evaluation of Admission Policies in ATM Based Embedded Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    LCN, 1994, pp:129-138 [Conf]
  90. Bogong Su, Stanley Habib, Wei Zhao, Jian Wang, Youfeng Wu
    A study of pointer aliasing for software pipelining using run-time disambiguation. [Citation Graph (0, 0)][DBLP]
    MICRO, 1994, pp:112-117 [Conf]
  91. Bogong Su, Jian Wang, Zhizhong Tang, Wei Zhao, Yimin Wu
    A software pipelining based VLIW architecture and optimizing compiler. [Citation Graph (0, 0)][DBLP]
    MICRO, 1990, pp:17-27 [Conf]
  92. Bogong Su, Wei Zhao, Zhizhong Tang, Stanley Habib
    A VLIW architecture for optimal execution of branch-intensive loops. [Citation Graph (0, 0)][DBLP]
    MICRO, 1992, pp:119-124 [Conf]
  93. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    A Study of Providing Statistical QoS in a Differentiated Sevices Network. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:297-304 [Conf]
  94. Wei Zhao
    Effectiveness of Traffic Camouflaging over Computer Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:7- [Conf]
  95. Beum-Seuk Lee, Xiaoqing Wu, Fei Cao, Shih-Hsi Liu, Wei Zhao, Chunmin Yang, Barrett R. Bryant, Jeffrey G. Gray
    T-Clipse: an integrated development environment for two-level grammar. [Citation Graph (0, 0)][DBLP]
    OOPSLA Workshop on Eclipse Technology eXchange, 2003, pp:89-93 [Conf]
  96. Wei Zhao
    A language based formalism for domain driven development. [Citation Graph (0, 0)][DBLP]
    OOPSLA Companion, 2003, pp:130-131 [Conf]
  97. Wei Zhao
    A language based formalism for domain driven development. [Citation Graph (0, 0)][DBLP]
    OOPSLA Companion, 2003, pp:388-389 [Conf]
  98. Nan Zhang 0004, Wei Zhao, Jianer Chen
    Performance Measurements for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:43-49 [Conf]
  99. Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Correlation Attacks and Countermeasures in Mix Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:207-225 [Conf]
  100. Nan Zhang 0004, Shengquan Wang, Wei Zhao
    A New Scheme on Privacy Preserving Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:484-495 [Conf]
  101. Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan, Wei Zhao
    Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2002, pp:266-275 [Conf]
  102. Shengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao
    Real-Time Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time and Embedded Technology and Applications Symposium, 2005, pp:428-437 [Conf]
  103. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2001, pp:127-129 [Conf]
  104. Jianjia Wu, Jyh-Charn Liu, Wei Zhao
    On Schedulability Bounds of Static Priority Schedulers. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time and Embedded Technology and Applications Symposium, 2005, pp:529-540 [Conf]
  105. B. Devalla, Riccardo Bettati, Wei Zhao
    Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . [Citation Graph (0, 0)][DBLP]
    RTCSA, 1999, pp:340-347 [Conf]
  106. Biao Chen, Sanjay Kamat, Wei Zhao
    Fault-tolerant Real-Time Communication in FDDI-Based Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1995, pp:141-151 [Conf]
  107. Sanjay Kamat, Nicholas Malcolm, Wei Zhao
    Performance Evaluation of a Bandwidth Allocation Scheme for Guaranteeing Synchronous Messages with Arbitrary Deadlines in an FDDI Network. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1993, pp:34-43 [Conf]
  108. Chengzhi Li, Riccardo Bettati, Wei Zhao
    Static priority scheduling for ATM networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1997, pp:264-273 [Conf]
  109. Joseph Kee-Yin Ng, Shibin Song, Wei Zhao
    Integrated delay analysis of regulated ATM switch. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1997, pp:285-0 [Conf]
  110. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 2001, pp:289-298 [Conf]
  111. Wei Zhao, Krithi Ramamritham
    Distributed Scheduling Using Bidding and Focused Addressing. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1985, pp:103-111 [Conf]
  112. Wei Zhao, Krithi Ramamritham
    A Virtual Time CSMA Protocol for Hard Real Time Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1986, pp:120-127 [Conf]
  113. Wei Zhao, John A. Stankovic
    Performance Analysis of FCFS and Improved FCFS Scheduling Algorithms for Dynamic Real-Time Computer Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1989, pp:156-165 [Conf]
  114. Fei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston
    Marshaling and unmarshaling models using the entity-relationship model. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1553-1557 [Conf]
  115. Wei Zhao, Barrett R. Bryant, Fei Cao, Rajeev R. Raje, Mikhail Auguston, Carol C. Burt, Andrew M. Olson
    Grammatically Interpreting Feature Compositions. [Citation Graph (0, 0)][DBLP]
    SEKE, 2004, pp:185-191 [Conf]
  116. Simin He, Shutao Sun, Wei Zhao, Yanfeng Zheng, Wen Gao
    Smooth switching problem in buffered crossbar switches. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:386-387 [Conf]
  117. Wei Zhao, Satish K. Tripathi
    Bandwidth-Efficient Continuous Media Streaming Through Optimal Multiplexing. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:13-22 [Conf]
  118. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
    DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
  119. Nan Zhang 0004, Wei Zhao
    Distributed Privacy Preserving Information Sharing. [Citation Graph (0, 0)][DBLP]
    VLDB, 2005, pp:889-900 [Conf]
  120. Ashish Sharma, Xinlian Liu, Paul Miller, Aiichiro Nakano, Rajiv K. Kalia, Priya Vashishta, Wei Zhao, Timothy Campbell, Andy Haas
    Immersive and Interactive Exploration of Billion-Atom Systems. [Citation Graph (0, 0)][DBLP]
    VR, 2002, pp:217-223 [Conf]
  121. Seong-ryong Kang, Hoh Peter In, Wei Zhao
    SmartClick: An Enabler for Human-Centered Wireless Web Service. [Citation Graph (0, 0)][DBLP]
    WECWIS, 2002, pp:187-194 [Conf]
  122. Ming Li, Weijia Jia, Wei Zhao
    A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks. [Citation Graph (0, 0)][DBLP]
    WISE, 2000, pp:480-485 [Conf]
  123. Wei Zhao, Ying Q. Chen, George Casella, James M. Cheverud, Rongling Wu
    A non-stationary model for functional mapping of complex traits. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2005, v:21, n:10, pp:2469-2477 [Journal]
  124. Ming Chao, Yinghua Shen, Wei Zhao
    Solid modelling based on polyhedron approach. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1992, v:16, n:1, pp:101-105 [Journal]
  125. Biao Chen, Sanjay Kamat, Wei Zhao
    Fault-Tolerant, Real-Time Communication in FDDI-Based Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:4, pp:83-90 [Journal]
  126. Nicholas Malcolm, Wei Zhao
    The Timed-Token Protocol for Real-Time Communications. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1994, v:27, n:1, pp:35-41 [Journal]
  127. Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng
    Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    International Journal of Information Technology and Decision Making, 2003, v:2, n:3, pp:397-405 [Journal]
  128. Joseph Kee-Yin Ng, Shibin Song, Wei Zhao
    Statistical delay analysis on an ATM switch with self-similar input traffic. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:74, n:3-4, pp:163-173 [Journal]
  129. Weijia Jia, Hanxing Wang, Wanqing Tu, Wei Zhao
    A New delay control method for real-time flows. [Citation Graph (0, 0)][DBLP]
    J. Comb. Optim., 2006, v:12, n:1-2, pp:127-149 [Journal]
  130. Abbas H. Hassin, Xianglong Tang, Jiafeng Liu, Wei Zhao
    Printed Arabic Character Recognition Using HMM. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:4, pp:538-543 [Journal]
  131. Weijia Jia, Gaochao Xu, Wei Zhao, Pui-on Au
    Efficient Internet Multicast Routing Using Anycast Path Selection. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:4, pp:- [Journal]
  132. Ming Li, Weijia Jia, Wei Zhao
    Simulation of Long-Range Dependent Traffic and a Simulator of TCP Arrival Traffic. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2001, v:2, n:3, pp:305-315 [Journal]
  133. Shengquan Wang, Dong Xuan, Wei Zhao
    Analyzing and enhancing the resilience of structured peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:2, pp:207-219 [Journal]
  134. Wei Zhao, Rahim Tafazolli, Barry G. Evans
    Internetwork Handover Performance Analysis in a GSM-Satellite Integrated Mobile Communication System. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:8, pp:1657-1671 [Journal]
  135. Edwin K. P. Chong, Wei Zhao
    Performance evaluation of scheduling algorithms for imprecise computer systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1991, v:15, n:3, pp:261-277 [Journal]
  136. Wei Zhao, Krithi Ramamritham
    Simple and integrated heuristic algorithms for scheduling tasks with time and resource constraints. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1987, v:7, n:3, pp:195-205 [Journal]
  137. Fei Cao, Barrett R. Bryant, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston, Wei Zhao, Carol C. Burt
    A Non-Invasive Approach to Assertive and Autonomous Dynamic Component Composition in the Service-Oriented Paradigm. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:10, pp:1645-1675 [Journal]
  138. Wei Zhao, Satish K. Tripathi
    A Resource Reservation Scheme for Synchronized Distributed Multimedia Sessions. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 1998, v:7, n:1/2, pp:133-146 [Journal]
  139. Doreen Ware, Pankaj Jaiswal, Junjian Ni, Xiaokang Pan, Kuan Chang, Kenneth Clark, Leonid Teytelman, Steven Schmidt, Wei Zhao, Samuel Cartinhour, Susan McCouch, Lincoln Stein
    Gramene: a resource for comparative grass genomics. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2002, v:30, n:1, pp:103-105 [Journal]
  140. Pankaj Jaiswal, Junjian Ni, Immanuel Yap, Doreen Ware, William Spooner, Ken Youens-Clark, Liya Ren, Chengzhi Liang, Wei Zhao, Kiran Ratnapu, Benjamin Faga, Payan Canaran, Molly Fogleman, Claire Hebbard, Shuly Avraham, Steven Schmidt, Terry M. Casstevens, Edward S. Buckler, Lincoln Stein, Susan McCouch
    Gramene: a bird's eye view of cereal genomes. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2006, v:34, n:Database-Issue, pp:717-723 [Journal]
  141. Wei Zhao, Payan Canaran, Rebecca Jurkuta, Theresa Fulton, Jeffrey Glaubitz, Edward S. Buckler, John Doebley, Brandon Gaut, Major Goodman, Jim Holland, Stephen Kresovich, Michael D. McMullen, Lincoln Stein, Doreen Ware
    Panzea: a database and resource for molecular and functional diversity in the maize genome. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2006, v:34, n:Database-Issue, pp:752-757 [Journal]
  142. Weijia Jia, Wanqing Tu, Wei Zhao, Gaochao Xu
    Multi-shared-trees based multicast routing control protocol using anycast selection. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms Appl., 2005, v:20, n:1, pp:69-84 [Journal]
  143. Ashish Sharma, Aiichiro Nakano, Rajiv K. Kalia, Priya Vashishta, Sanjay Kodiyalam, Paul Miller, Wei Zhao, Xinlian Liu, Timothy Campbell, Andy Haas
    Immersive and Interactive Exploration of Billion-Atom Systems. [Citation Graph (0, 0)][DBLP]
    Presence, 2003, v:12, n:1, pp:85-95 [Journal]
  144. Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li
    Utilization-Based Admission Control for Scalable Real-Time Communication. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2003, v:24, n:2, pp:171-202 [Journal]
  145. Nicholas Malcolm, Sanjay Kamat, Wei Zhao
    Real-Time Communication in FDDI Networks. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1996, v:10, n:1, pp:75-107 [Journal]
  146. Nicholas Malcolm, Wei Zhao
    Hard Real-Time Communication in Multiple-Access Networks. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1995, v:8, n:1, pp:35-77 [Journal]
  147. Joseph Kee-Yin Ng, Shibin Song, Wei Zhao
    Integrated End-to-End Delay Analysis for Regulated ATM Networks. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2003, v:25, n:1, pp:93-124 [Journal]
  148. Wei Zhao
    Challenges in Design and Implementation of Middlewares for Real-Time Systems: Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2001, v:20, n:2, pp:115-116 [Journal]
  149. Wei Zhao
    Guest Editor's Introduction - Special Issue on Real-Time Computing Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1989, v:23, n:3, pp:12-13 [Journal]
  150. Gopal Agrawal, Biao Chen, Wei Zhao, Sadegh Davari
    Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1994, v:43, n:3, pp:327-339 [Journal]
  151. Amitava Raha, Sanjay Kamat, Xiaohua Jia, Wei Zhao
    Using Traffic Regulation to Meet End-to-End Deadlines in ATM Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:9, pp:917-935 [Journal]
  152. Krithi Ramamritham, John A. Stankovic, Wei Zhao
    Distributed Scheduling of Tasks with Deadlines and Resource Requirements. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1989, v:38, n:8, pp:1110-1123 [Journal]
  153. Wei Zhao, John A. Stankovic, Krithi Ramamritham
    A Window Protocol for Transmission of Time-Constrained Messages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1990, v:39, n:9, pp:1186-1203 [Journal]
  154. Marwan Krunz, Wei Zhao, Ibrahim Matta
    Scheduling and bandwidth allocation for the distribution of archived video in VOD systems. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1998, v:9, n:3-4, pp:335-355 [Journal]
  155. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing absolute differentiated services for real-time applications in static-priority scheduling networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:326-339 [Journal]
  156. Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yang
    SNIAFL: Towards a static noninteractive approach to feature location. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:2, pp:195-226 [Journal]
  157. Weijia Jia, Dong Xuan, Wanqing Tu, Lidong Lin, Wei Zhao
    Distributed Admission Control for Anycast Flows. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:8, pp:673-686 [Journal]
  158. Weijia Jia, Wei Zhao, Dong Xuan, Gaochao Xu
    An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:10, pp:984-1000 [Journal]
  159. Sanjay Kamat, Wei Zhao
    An Efficient Optimal Reconfiguration Algorithm for FDDI-Based Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:4, pp:411-424 [Journal]
  160. Rabi N. Mahapatra, Wei Zhao
    An Energy-Efficient Slack Distribution Technique for Multimode Distributed Real-Time Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:7, pp:650-662 [Journal]
  161. Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao
    Design and Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:3, pp:276-288 [Journal]
  162. Dong Xuan, Weijia Jia, Wei Zhao, HongWen Zhu
    A Routing Protocol for Anycast Messages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:6, pp:571-588 [Journal]
  163. Wei Zhao
    Guest Editorial: Special Section on Security in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:817- [Journal]
  164. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  165. Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
    Distributed policy processing in active-service based infrastructures. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:7, pp:727-750 [Journal]
  166. Chuan He, Guan Qin, Mi Lu, Wei Zhao
    Optimized high-order finite difference wave equations modeling on reconfigurable computing platform. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2007, v:31, n:2, pp:103-115 [Journal]
  167. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
    On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:235-244 [Conf]
  168. Lianguan Shen, Wei Zhao, Mujun Li, Jinjin Zheng
    A New Method for Customer-Oriented Virtual Collaborative Design with VRML Product Model. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected Papers), 2006, pp:197-206 [Conf]
  169. Min Chen, Wei Zhao, Frank Liu, Yu Cao
    Fast statistical circuit analysis with finite-point based transistor model. [Citation Graph (0, 0)][DBLP]
    DATE, 2007, pp:1391-1396 [Conf]
  170. Wei Yu, Nan Zhang 0004, Wei Zhao
    Self-adaptive Worms and Countermeasures. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:548-562 [Conf]
  171. Wei Zhao, Yu Cao
    Predictive technology model for nano-CMOS design exploration. [Citation Graph (0, 0)][DBLP]
    JETC, 2007, v:3, n:1, pp:- [Journal]
  172. Jie Li, Xianglong Tang, Wei Zhao, Jianhua Huang
    A new framework for identifying differentially expressed genes. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:11, pp:3249-3262 [Journal]
  173. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal]

  174. Creating the Cryptograph Index by Query Frequencies in DAS Models. [Citation Graph (, )][DBLP]


  175. Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases. [Citation Graph (, )][DBLP]


  176. Research of a Digital Image Watermarking Algorithm Resisting Geometrical Attacks in Fourier Domain. [Citation Graph (, )][DBLP]


  177. Provably Secure Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  178. Towards Call for Testing: An Application to User Acceptance Testing of Web Applications. [Citation Graph (, )][DBLP]


  179. A Synchronous Collaborative Environment for Engineering Design Education. [Citation Graph (, )][DBLP]


  180. Custumer oriented virtual cooperative product design. [Citation Graph (, )][DBLP]


  181. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]


  182. Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System. [Citation Graph (, )][DBLP]


  183. Parallel Collision Detection Algorithm Based on OBB Tree and MapReduce. [Citation Graph (, )][DBLP]


  184. Research on Collision Detection Algorithm Based on Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  185. Pedagogical Strategy Model in Adaptive Learning System Focusing on Learning Styles. [Citation Graph (, )][DBLP]


  186. High-Precision BLAS on FPGA-enhanced Computers. [Citation Graph (, )][DBLP]


  187. A New Method of the Automatically Marked Chinese Part of Speech Based on Gaussian Prior Smoothing Maximum Entropy Model. [Citation Graph (, )][DBLP]


  188. A New Replay Attack Against Anonymous Communication Networks. [Citation Graph (, )][DBLP]


  189. Modeling of layout-dependent stress effect in CMOS design. [Citation Graph (, )][DBLP]


  190. Web based Collaborative Environment for Engineering Graphics Education. [Citation Graph (, )][DBLP]


  191. A comparative study of three token ring protocols for real-time communications. [Citation Graph (, )][DBLP]


  192. The Digital Marauder's Map: A New Threat to Location Privacy. [Citation Graph (, )][DBLP]


  193. CAP: A Context-Aware Privacy Protection System for Location-Based Services. [Citation Graph (, )][DBLP]


  194. Design and Analysis of a New GPS Algorithm. [Citation Graph (, )][DBLP]


  195. Multiterminal Video Coding. [Citation Graph (, )][DBLP]


  196. The relationship between prorerty-oriented concept lattice and partition. [Citation Graph (, )][DBLP]


  197. Methods to construct several kinds of concept lattices. [Citation Graph (, )][DBLP]


  198. The Symbiosis Evolution Model of Innovation Poles in Regional Innovation System: Evolution of Regional Innovation System Depends on Symbiosis Coefficient. [Citation Graph (, )][DBLP]


  199. Artificial neural network analysis for the eco-economic system of Ningbo City. [Citation Graph (, )][DBLP]


  200. A Lightweight Approach to Partially Reuse Existing Component-Based System in Service-Oriented Environment. [Citation Graph (, )][DBLP]


  201. Toward the Development of Contextually Aware Business Applications via Model-Driven Transformations. [Citation Graph (, )][DBLP]


  202. A Statistical Spam Filtering Scheme Based on Grid Platform. [Citation Graph (, )][DBLP]


  203. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]


  204. Pattern Mutation in Wireless Sensor Deployment. [Citation Graph (, )][DBLP]


  205. Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design. [Citation Graph (, )][DBLP]


  206. Image Artifact in Digital Breast Tomosynthesis and Its Dependence on System and Reconstruction Parameters. [Citation Graph (, )][DBLP]


  207. Optimization of Tomosynthesis Acquisition Parameters: Angular Range and Number of Projections. [Citation Graph (, )][DBLP]


  208. Breast Structural Noise in Digital Breast Tomosynthesis and Its Dependence on Reconstruction Methods. [Citation Graph (, )][DBLP]


  209. Towards Selecting Test Data Using Topological Structure of Boolean Expressions. [Citation Graph (, )][DBLP]


  210. The Reduction Theory of Object Oriented Concept Lattices and Property Oriented Concept Lattices. [Citation Graph (, )][DBLP]


  211. Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers. [Citation Graph (, )][DBLP]


  212. Optimal synchronous capacity allocation for hard real-time communications with the timed token protocol. [Citation Graph (, )][DBLP]


  213. Feature suppression based CAD mesh model simplification. [Citation Graph (, )][DBLP]


  214. A Bidirectional Adaptive Sequential Gaussian Approximation for MIMO Systems. [Citation Graph (, )][DBLP]


  215. Exploring Topological Structure of Boolean Expressions for Test Data Selection. [Citation Graph (, )][DBLP]


  216. H-WSNMS: A Web-Based Heterogeneous Wireless Sensor Networks Management System Architecture. [Citation Graph (, )][DBLP]


  217. Bioinformatics Analysis of the Envelope Glycoprotein and Construction of Infectious RNA Transcripts of Dengue Virus. [Citation Graph (, )][DBLP]


  218. Numerical Study on the Mathematical Model of the Cardiac Electrical Conduction. [Citation Graph (, )][DBLP]


  219. XOR Hashing Algorithms to Measured Flows at the High-Speed Link. [Citation Graph (, )][DBLP]


  220. Development and depth control of biomimetic robotic fish. [Citation Graph (, )][DBLP]


  221. Development of Multi-mode Biomimetic Robotic Fish Based on Central Pattern Generator. [Citation Graph (, )][DBLP]


  222. Modified Huang-Wang's Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  223. A micro visual servo system for biological cell manipulation: overview and new developments. [Citation Graph (, )][DBLP]


  224. An experimental observation of uncoupling of multi-DOF PZT actuators in a compliant mechanism. [Citation Graph (, )][DBLP]


  225. A Systematic Probabilistic Approach for Estimation in Dense Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  226. Development of a flipper propelled turtle-like underwater robot and its CPG-based control algorithm. [Citation Graph (, )][DBLP]


  227. Neural-based control of modular robotic fish with multiple propulsors. [Citation Graph (, )][DBLP]


  228. Leader-following formation control of multiple vision-based autonomous robotic fish. [Citation Graph (, )][DBLP]


  229. Construction and Central Pattern Generator-Based Control of a Flipper-Actuated Turtle-Like Underwater Robot. [Citation Graph (, )][DBLP]


  230. A statistical framework to evaluate virtual screening. [Citation Graph (, )][DBLP]


  231. An approach to B-rep model simplification based on region suppression. [Citation Graph (, )][DBLP]


  232. Privacy-Preserving Data Mining Systems. [Citation Graph (, )][DBLP]


Search in 0.030secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002