Jianhua Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Resource Management for QoS-Guaranteed Marine Data Feedback Based on Space-Air-Ground-Sea Network.
IEEE Syst. J., September, 2024

Accurate estimation of 6-DoF tooth pose in 3D intraoral scans for dental applications using deep learning.
Frontiers Inf. Technol. Electron. Eng., September, 2024

Pre-Stability Control for In-Wheel-Motor-Driven Electric Vehicles With Dynamic State Prediction.
IEEE Trans. Intell. Veh., March, 2024

Lossless contention ultraviolet MAC protocol based on dynamic bandwidth allocation.
J. Opt. Commun. Netw., 2024

Active collision avoidance for teleoperated multi-segment continuum robots toward minimally invasive surgery.
Int. J. Robotics Res., 2024

DCS Chain: A Flexible Private Blockchain System.
CoRR, 2024

A generative adversarial learning strategy for spatial inspection of compaction quality.
Adv. Eng. Informatics, 2024

DPLE: A Privacy-Enhanced and Straggler-Resilient Distributed Learning Framework for Smart Cloud.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

Reputation-Aware Incentive Mechanism of Federated Learning: A Mean Field Game Approach.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

MixFormer: An End-To-End UAV Image-Matching Network Based on Mixed Attention Mechanism.
Proceedings of the IGARSS 2024, 2024

A Multimodal-Based Feature Generalization Model for Binocular Stereo Matching.
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024

TCMIDP: A Comprehensive Database of Traditional Chinese Medicine for Network Pharmacology Research.
Proceedings of the Database and Expert Systems Applications, 2024

2023
Thyroidkeeper: a healthcare management system for patients with thyroid diseases.
Health Inf. Sci. Syst., December, 2023

A Differential Fault Attack on Security Vehicle System Applied SIMON Block Cipher.
IEEE Trans. Intell. Transp. Syst., November, 2023

Depth Edge and Structure Optimization-Based End-to-End Self-Supervised Stereo Matching.
Int. J. Pattern Recognit. Artif. Intell., October, 2023

Refined education mechanism based on edge computing for college student management.
Evol. Intell., October, 2023

From qualitative to quantitative: the state of the art and challenges for plant synthetic biology.
Quant. Biol., September, 2023

Depth Information Precise Completion-GAN: A Precisely Guided Method for Completing Ill Regions in Depth Maps.
Remote. Sens., July, 2023

VM performance-aware virtual machine migration method based on ant colony optimization in cloud environment.
J. Parallel Distributed Comput., June, 2023

TCMFVis: A visual analytics system toward bridging together traditional Chinese medicine and modern medicine.
Vis. Informatics, March, 2023

Reinforcement-Learning-Based Dynamic Opinion Maximization Framework in Signed Social Networks.
IEEE Trans. Cogn. Dev. Syst., March, 2023

Ultraviolet random access collaborative networking protocol based on time division multiple access.
JOCN, 2023

A positive and unlabeled learning framework based on extreme learning machine for drug-drug interactions discovery.
J. Ambient Intell. Humaniz. Comput., 2023

Wide & deep generative adversarial networks for recommendation system.
Intell. Data Anal., 2023

From Cluster Assumption to Graph Convolution: Graph-based Semi-Supervised Learning Revisited.
CoRR, 2023

Third-Harmonic Current Injection Control of Five-Phase Permanent-Magnet Synchronous Motor Based on Third-Harmonic Current Reference Online Identification.
IEEE Access, 2023

HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Multi-Level ACE-based IoT Knowledge Sharing for Personalized Privacy-Preserving Federated Learning.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

2022
Characteristics and control methods of uneven deformation and failure of mining roadway roof in intelligent transportation system.
Microprocess. Microsystems, July, 2022

Road Garbage Segmentation With Deep Supervision and High Fusion Network for Cleaning Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

A Compact FBG-Based Triaxial Force Sensor With Parallel Helical Beams for Robotic-Assisted Surgery.
IEEE Trans. Instrum. Meas., 2022

Current Sensor Fault-Tolerant Control for Five-Phase PMSM Drives Based on Third-Harmonic Space.
IEEE Trans. Ind. Electron., 2022

Sensorless Control of Five-Phase Permanent-Magnet Synchronous Motor Based on Third-Harmonic Space.
IEEE Trans. Ind. Electron., 2022

Molecular Docking for Ligand-Receptor Binding Process Based on Heterogeneous Computing.
Sci. Program., 2022

Shape Sensing for Continuum Robots by Capturing Passive Tendon Displacements With Image Sensors.
IEEE Robotics Autom. Lett., 2022

Learning to Detect Salient Object With Multi-Source Weak Supervision.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

SwinOCSR: end-to-end optical chemical structure recognition using a Swin Transformer.
J. Cheminformatics, 2022

A time-aware attention model for prediction of acute kidney injury after pediatric cardiac surgery.
J. Am. Medical Informatics Assoc., 2022

An efficient differential fault attack against SIMON key schedule.
J. Inf. Secur. Appl., 2022

Multi-omics molecular biomarkers and database of osteoarthritis.
Database J. Biol. Databases Curation, 2022

Automatic Smart Contract Generation with Knowledge Extraction and Unified Modeling Language.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

An X-band Microwave Thermoelectric Power Detector in 0.18-μm CMOS Technology.
Proceedings of the 2022 IEEE Sensors, Dallas, TX, USA, October 30 - Nov. 2, 2022, 2022

Inferring Potential Drug-Target Interactions using Multiple Similarities and Network Consistency Projection.
Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition, 2022

An Energy-Efficient Task Scheduling Method for CPU-GPU Heterogeneous Cloud.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

VM Performance Optimization Virtual Machine Migration Method Based on Ant Colony Optimization in Cloud.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Design and Optimization of RF Impedance Matching Network Based on ADS and SIwave.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Design of AI-Based TCM Prescription Analysis Applet.
Proceedings of the 3rd Asia Conference on Computers and Communications, 2022

2021
Road Garbage Segmentation and Cleanliness Assessment Based on Semantic Segmentation Network for Cleaning Vehicles.
IEEE Trans. Veh. Technol., 2021

Numerical Study of Local Scour around a Submarine Pipeline with a Spoiler Using a Symmetry Boundary Condition.
Symmetry, 2021

Abnormal Detection of Cash-Out Groups in IoT Based Payment.
Sensors, 2021

Improving Movement-Related Cortical Potential Detection at the EEG Source Domain.
Proceedings of the 10th International IEEE/EMBS Conference on Neural Engineering, 2021

Analysis and Validation for Kinematic and Physiological Data of VR Training System.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2021

An Energy Efficiency Evaluation Scheme of IPHC over CSMA and TSCH in 6LoWPAN Networks.
Proceedings of the ICNCC 2021: The 10th International Conference on Networks, Communication and Computing, Beijing, China, December 10, 2021

Efficient Unsupervised Monocular Depth Estimation with Inter-Frame Depth Interpolation.
Proceedings of the Image and Graphics - 11th International Conference, 2021

The Ninth Visual Object Tracking VOT2021 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Video Annotation for Visual Tracking via Selection and Refinement.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Product Recommendation Algorithm for Score Prediction Based on Joint Feature Vector Extraction.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

nPTAS: A Novel Platform for Text Annotation and Service.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

A Novel Method of SOC Estimation based on Neural Network.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Optimizing the post-processing of online evolution reconstruction in quantum communication.
Quantum Inf. Process., 2020

Evolution reconstruction of deviate Bell states by extending the novel Fourier-based method.
Quantum Inf. Process., 2020

A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks.
Peer-to-Peer Netw. Appl., 2020

Low-Dose X-ray CT Reconstruction Algorithm Using Shearlet Sparse Regularization.
J. Medical Imaging Health Informatics, 2020

An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Hierarchical Graph Transformer-Based Deep Learning Model for Large-Scale Multi-Label Text Classification.
IEEE Access, 2020

The Research on Aperture Averaging of Modulating Retro-Reflector Optical Communication.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Lower Limb Balance Rehabilitation of Post-stroke Patients Using an Evaluating and Training Combined Augmented Reality System.
Proceedings of the 2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2020

Design and Modeling of a Parallel Shifted-Routing Cable-Driven Continuum Manipulator for Endometrial Regeneration Surgery.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

The Eighth Visual Object Tracking VOT2020 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020

High-Performance Long-Term Tracking With Meta-Updater.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
A novel differential fault analysis using two-byte fault model on AES Key schedule.
IET Circuits Devices Syst., 2019

Salient Object Detection With Residual Refinement Network.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Saliency Detection with Stepwise Aggregation Network.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

State-of-charge Estimation of Batteries Based on Open-circuit Voltage and Time Series Neural Network.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

The Seventh Visual Object Tracking VOT2019 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Visual Tracking via Adaptive Spatially-Regularized Correlation Filters.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Rotational Direction Detection Using Tactile Sensor and External Camera.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2019

2018
Predicting human gaze with multi-level information.
Signal Process., 2018

Design and Fabrication of a Miniaturized GMI Magnetic Sensor Based on Amorphous Wire by MEMS Technology.
Sensors, 2018

Asynchronous Group Authentication Based on Geometric Approach.
Secur. Commun. Networks, 2018

Failure mode analysis of MEMS suspended inductors under mechanical shock.
Microelectron. Reliab., 2018

Topology generation and performance enhancement based on channel assignment optimization for hybrid wireless NoC with large system size.
Microprocess. Microsystems, 2018

网络化作战指控信息链柔性度量模型 (Flexibility Measurement Model of Command and Control Information Chain for Networked Operations).
计算机科学, 2018

基于节点修复的网络化指挥信息系统弹性分析模型 (Resilience Analysis Model of Networked Command Information System Based on Node Repairability).
计算机科学, 2018

An Irregular Topology Generation Using Power-Interference Co-Optimization for Hybrid Application-Specific Wireless NoC.
J. Circuits Syst. Comput., 2018

Shape Descriptor-Based Local Contour Profile Registration and Measurement for Flexible Automotive Sealing Strips.
J. Comput. Inf. Sci. Eng., 2018

Fast Image Search with Pixel-Based Deep Learning Framework via Efficient Compact Binary Code and Addictive Latent Layer.
Int. J. Pattern Recognit. Artif. Intell., 2018

Approximately Nearest Neighborhood Image Search Using Unsupervised Hashing via Homogeneous Kernels.
Complex., 2018

Agile convolutional neural network for pulmonary nodule classification using CT images.
Int. J. Comput. Assist. Radiol. Surg., 2018

Classification of botnet families based on features self-learning under Network Traffic Censorship.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

End-to-end pixelwise surface normal estimation with convolutional neural networks and shape reconstruction using GelSight sensor.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

GelSlim: A High-Resolution, Compact, Robust, and Calibrated Tactile-sensing Finger.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Slip Detection with Combined Tactile and Visual Information.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

2017
Using Thermal-Aware VM Migration Mechanism for High-Availability Cloud Computing.
Wirel. Pers. Commun., 2017

Revealing the Gap Between Skills of Students and the Evolving Skills Required by the Industry of Information and Communication Technology.
Int. J. Softw. Eng. Knowl. Eng., 2017

Deep Learning-Based Food Calorie Estimation Method in Dietary Assessment.
CoRR, 2017

Computer vision-based food calorie estimation: dataset, method, and experiment.
CoRR, 2017

Transient Dynamics Simulation of Airflow in a CT-Scanned Human Airway Tree: More or Fewer Terminal Bronchi?
Comput. Math. Methods Medicine, 2017

Large-scale image similarity search optimization based on multi-core architecture.
Proceedings of the 13th International Conference on Natural Computation, 2017

Error distribution modeling of embedded sensors on smartphones by using laser ranger.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Molecular Docking Simulation Based on CPU-GPU Heterogeneous Computing.
Proceedings of the Advanced Parallel Processing Technologies, 2017

2016
Representing expectation values of projectors as series for evolution reconstruction.
Quantum Inf. Process., 2016

基于信息流的作战体系结构建模 (Operational Architecture Modeling Based on Information Flow).
计算机科学, 2016

基于模体的网络化作战信息流转动态超图模型 (Networked Operational Information Flowing Dynamic Hypergraph Model Based on Motif).
计算机科学, 2016

基于云模型的军事航空通信频谱共享信任机制研究 (Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model).
计算机科学, 2016

基于身份加密的装备密钥分布式生成算法 (Military Equipment's Distributed Key-generating Algorithm for Identity-based Cryptography).
计算机科学, 2016

Saliency detection via extreme learning machine.
Neurocomputing, 2016

Multi-feature tracking via adaptive weights.
Neurocomputing, 2016

Low-delay parallel Chien search architecture for RS decoder.
IEICE Electron. Express, 2016

Terrain mapping under extreme light conditions with direct stereo matching method through aggregating matching costs by weight.
Adv. Robotics, 2016

Thread Progress Aware Block Migration for Dynamic NUCA.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Pancreatic malformations as seen in congenital syndromes - Developmental perspective with an alternative view.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2015
High-performance adaptive hybrid wireless NoC architecture based on improved congestion measurement.
IEICE Electron. Express, 2015

Survey on cyberspace security.
Sci. China Inf. Sci., 2015

In-field self-calibration of robotic manipulator using stereo camera: application to Humanitarian Demining Robot.
Adv. Robotics, 2015

Quantum key distribution with silent active polarization compensation without a reference optical beam.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

A novel Fibonacci windows model for finding emerging patterns over online data stream.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Fast image search with deep convolutional neural networks and efficient hashing codes.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Supervised hashing binary code with deep CNN for image retrieval.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

Hand-Eye calibration using stereo camera through pure rotations -fitting circular arc in 3D space with joint angle constraint-.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
Improving Delay Performance for Time-Critical Communications in VANET.
J. Mobile Multimedia, 2014

Multi-instance Learning Using Information Entropy Theory for Image Retrieval.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Remote Sensing Image Classification Based on Hybrid Entropy and L1 Norm.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Research on the Anti-perspective Correction Algorithm of QR Barcode.
J. Digit. Inf. Manag., 2013

Morphological segmentation of 2-D barcode gray scale image.
J. Comput., 2013

Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map.
IET Inf. Secur., 2013

Integrated Network Service to Enhance Multicast Communication.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
OMIM data - standardized input and pair-wise comparison.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A novel semi-supervised Multi-Instance learning approach for scene recognition.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Efficient Stereo Matching by Local Linear Filtering and Improved Dynamic Programming.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

2011
Genetic Network Programming-Sarsa with Subroutines for Trading Rules on Stock Markets.
J. Adv. Comput. Intell. Intell. Informatics, 2011

Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A sub-pixel edge detection approach based on orthogonal moment.
Proceedings of the 3rd International Conference on Awareness Science and Technology, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010

Time-domain sending rate and response function of eXplicit Control Protocol.
Telecommun. Syst., 2010

A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol.
Int. J. Netw. Secur., 2010

GNP-Sarsa with subroutines for trading rules on stock markets.
Proceedings of the IEEE International Conference on Systems, 2010

Application framework of Web Service based on metadata-principle and practice.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

An novel modified extraction method of MPEG-7 visual descriptor for image retrieval.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Human-Oriented Image Retrieval of Optimized Multi-feature via Genetic Algorithm.
Proceedings of the Information Computing and Applications - First International Conference, 2010

An Improved Artificial Potential Field Algorithm for Virtual Human Path Planning.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

2009
Remarks on Zhang-Kim's Key Authentication Scheme.
Int. J. Netw. Secur., 2009

Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Commun. Lett., 2009

Democratic group signatures with collective traceability.
Comput. Electr. Eng., 2009

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Performance Analysis of Authentication Method for Proxy Mobile IP Protocol.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

TLC: An Informatics Approach to Enable Patients to Initiate Tailored Lifestyle Conversations with Providers at the Point of Care.
Proceedings of the AMIA 2009, 2009

Developing a Web Platform for Health Promotion and Wellness Driven by and for the Harlem Community.
Proceedings of the AMIA 2009, 2009

2008
Constructing Efficient Certificateless Public Key Encryption with Pairing.
Int. J. Netw. Secur., 2008

Formal Protocol Design of ESIKE Based on Authentication Tests.
Int. J. Netw. Secur., 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptol. ePrint Arch., 2008

The optimization scheme for EOD robot based on supervising control architecture.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

A Novel 3-DOF HIP Exoskeleton for Kinematically Establishing Animal Model of Avascular Necrosis of the Femoral Head.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Design and Analysis of an XCP-TCP Gateway.
Proceedings of the 2008 International Conference on Information Networking, 2008

Adaptive workflow based on SOA and its application in Tourism Information Change Management.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Trajectory Tracking Control of Wheeled Mobile Robots Based on the Artificial Potential Field.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Novel Clone Selection Algorithm with Reconfigurable Search Space Ability and Its Application.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A New Blind Steganalysis Method for JPEG Images.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Net Cluster: A Net-Reduction-Based Clustering Preprocessing Algorithm for Partitioning and Placement.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007

Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy.
IACR Cryptol. ePrint Arch., 2007

Solid-based CAPP for surface micromachined MEMS devices.
Comput. Aided Des., 2007

Information Grid Instant Service and its application in tourism.
Proceedings of the IEEE International Conference on Systems, 2007

Method on Network Information System Security Assessment Based on Rough Set.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Adaptive Privacy Preserving Data Mining Model under Distributed Environment.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Modes of Real-Time Content Transformation for Web Intermediaries in Active Network.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Medication Reconciliation Using Natural Language Processing and Controlled Terminologies.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

An effective clustering algorithm for mixed-size placement.
Proceedings of the 2007 International Symposium on Physical Design, 2007

Two Clustering Preprocessing Techniques for Large-Scale Circuits.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Point Stabilization of Wheeled Mobile Robots Based on Artificial Potential Field and Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Clustering algorithms for circuit partitioning and placement problems.
Proceedings of the 18th European Conference on Circuit Theory and Design, 2007

The Multi-view Information Bottleneck Clustering.
Proceedings of the Advances in Databases: Concepts, 2007

Auditing Dynamic Links to Online Information Resources.
Proceedings of the AMIA 2007, 2007

Digital Partnerships for Health: Steps to develop a community-specific health portal aimed at promoting health and well-being.
Proceedings of the AMIA 2007, 2007

Redesign of the Columbia University Infobutton Manager.
Proceedings of the AMIA 2007, 2007

A General Attribute based RBAC Model for Web Service.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
A connectivity based clustering algorithm with application to VLSI circuit partitioning.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

A Structural Study and Hyperedge Clustering Technique for Large Scale Circuits.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2006

An Extended Role-Based Access Control for Web Services.
Proceedings of the SECRYPT 2006, 2006

Security Protocol Analysis with Improved Authentication Tests.
Proceedings of the Information Security Practice and Experience, 2006

Net cluster: a net-reduction based clustering preprocessing algorithm.
Proceedings of the 2006 International Symposium on Physical Design, 2006

A Dynamic Capacity Assignment Approach for EJB Instance Pools.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Knowledge base based Analysis of Security Situational Awareness.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Semantic Grid Security Solutions Based on Knowledge Base.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

An HMM-Based Approach to Automatic Phrasing for Mandarin Text-to-Speech Synthesis.
Proceedings of the ACL 2006, 2006

2005
A simple protocol for deniable authentication based on ElGamal cryptography.
Networks, 2005

Provable Efficient Certificateless Public Key Encryption.
IACR Cryptol. ePrint Arch., 2005

Security analysis and improvement of a user-friendly remote authentication protocol.
Appl. Math. Comput., 2005

An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Modes of Real-Time Content Transformation for Web Intermediaries in Active Network.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

A Multivalue Eigenvalue Based Circuit Partitioning Technique.
Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 2005

A Structure Based Clustering Algorithm with Applications to VLSI Physical Design.
Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 2005

Recurrent Networks for Integrated Navigation.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Methodology of Quantitative Risk Assessment for Information System Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Semantic knowledge in word completion.
Proceedings of the ACM SIGACCESS Conference on Computers and Accessibility, 2005

Analysis of Polarity Information in Medical Text.
Proceedings of the AMIA 2005, 2005

2004
Security improvement on a timestamp-based password authentication scheme.
IEEE Trans. Consumer Electron., 2004

Practical Considerations for Exploiting the World Wide Web to Create Infobuttons.
Proceedings of the MEDINFO 2004, 2004

Anonymous Micropayments Authentication(AMA) in Mobile Data Network.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Compensatory Algorithm for Fingerprint Recognition.
Proceedings of the Biometric Authentication, First International Conference, 2004

Stability analysis for circulant systems and switched circulant systems.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
Cryptanalysis of an enhanced timestamp-based password authentication scheme.
Comput. Secur., 2003

Fingerprint matching using ANFIS.
Proceedings of the IEEE International Conference on Systems, 2003

Use of Online Resources While Using a Clinical Information System.
Proceedings of the AMIA 2003, 2003

Sharing Infobuttons to Resolve Clinicians' Information Needs.
Proceedings of the AMIA 2003, 2003

2002
Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction.
J. Comput. Sci. Technol., 2002

An enhancement of timestamp-based password authentication scheme.
Comput. Secur., 2002

Theoretical, empirical and practical approaches to resolving the unmet information needs of clinical information system users.
Proceedings of the AMIA 2002, 2002

2001
MI-HEART: a Comprehensive Management System to Deliver, Monitor and Measure Efficacy of Individualized Web-based Education.
Proceedings of the AMIA 2001, 2001

Harnessing Web Information Technologies for Secure, Adaptive and Individualized Health Communications.
Proceedings of the AMIA 2001, 2001

2000
An evaluation of patient access to their electronic medical records via the World Wide Web.
Proceedings of the AMIA 2000, 2000


  Loading...