Xiaojun Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
Verifiable attribute-based multi-keyword search scheme with sensitive information hiding for cloud-assisted e-healthcare sharing systems.
Theor. Comput. Sci., 2025
2024
Blockchain-Based Proxy-Oriented Data Integrity Checking Mechanism in Cloud-Assisted Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., November, 2024
Multiresolution Hierarchical Target Detection in High-Resolution Maritime Surveillance Radars.
IEEE Trans. Aerosp. Electron. Syst., October, 2024
Smooth and Robust Current Control of PMSMs With Decoupling-Type Extended State Observers.
IEEE Trans. Ind. Electron., September, 2024
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024
A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum.
Cryptogr. Commun., May, 2024
Long-time adaptive coherent detection of small targets in sea clutter by fast inversion algorithm of block tridiagonal speckle covariance matrices.
Signal Process., April, 2024
Remote. Sens., April, 2024
J. Real Time Image Process., April, 2024
A depthwise separable CNN-based interpretable feature extraction network for automatic pathological voice detection.
Biomed. Signal Process. Control., February, 2024
Compound-Gaussian Model with Nakagami-Distributed Textures for High-Resolution Sea Clutter at Medium/High Grazing Angles.
Remote. Sens., January, 2024
Meaning-making in virtual learning environment enabled educational innovations: a 13-year longitudinal case study.
Interact. Learn. Environ., January, 2024
IEEE Trans. Instrum. Meas., 2024
Disturbance-observer-based control for non-homogeneous semi-Markov jump systems with time-varying delays.
J. Frankl. Inst., 2024
Fine-grained encrypted data aggregation mechanism with fault tolerance in edge-assisted smart grids.
J. Inf. Secur. Appl., 2024
Secure intermittent impulsive consensus control for fractional-order multiagent systems under denial-of-service and deception attacks.
Inf. Sci., 2024
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024
Digit. Signal Process., 2024
ACAC-OGF: Anonymous Certificateless Access Control Protocol for Digital Oil and Gas Field System Management Platform.
IEEE Access, 2024
DC-Bus Capacitor Discharge Method Based on Bleeder and Windings for Electric Vehicles in Emergency.
IEEE Access, 2024
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024
Proceedings of the 6th International Conference on Internet of Things, 2024
Proceedings of the 6th International Conference on Internet of Things, 2024
Mechanical Structure and Control System Design of Wall-Climbing and Obstacle-Crossing Robot with Magnetic Adsorption.
Proceedings of the 8th International Conference on Robotics, Control and Automation, 2024
2023
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation.
Peer Peer Netw. Appl., November, 2023
<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023
A country's national culture affects virtual learning environment adoption in higher education: a systematic review (2001-2020).
Interact. Learn. Environ., October, 2023
Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things.
IEEE Syst. J., September, 2023
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023
Symmetry, April, 2023
Symmetry, March, 2023
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023
Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023
Similar or Unknown Fault Mode Detection of Aircraft Fuel Pump Using Transfer Learning With Subdomain Adaption.
IEEE Trans. Instrum. Meas., 2023
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government.
J. Syst. Archit., 2023
Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems.
J. Syst. Archit., 2023
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023
Predicting possible antiviral drugs against COVID-19 based on Laplacian regularised least squares and similarity kernel fusion.
Int. J. Comput. Sci. Eng., 2023
CoRR, 2023
Torque-Type Backlash Inverse Control for an Electromechanical Actuator With Active Disturbance Rejection.
IEEE Access, 2023
EERP: An energy-efficient and reliable routing protocol for underwater acoustic wireless networks.
Proceedings of the 17th International Conference on Underwater Networks & Systems, 2023
Proceedings of the 2023 3rd International Conference on Big Data, 2023
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Practical Attribute-Based Multi-keyword Search Scheme with Sensitive Information Hiding for Cloud Storage Systems.
Proceedings of the Combinatorial Optimization and Applications, 2023
Proceedings of the 15th IEEE International Conference on ASIC, 2023
2022
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
New Infinite Family of Sequences Almost Over Q<sub>8</sub> With Ideal Autocorrelation.
IEEE Trans. Inf. Theory, 2022
Metrological Traceability of High Polarization Extinction Ratio (PER) Based on Precision Coaxial Rotating Polarization-Maintaining Fiber.
IEEE Trans. Instrum. Meas., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Hybrid Event-Triggered and Impulsive Control Strategy for Multiagent Systems With Switching Topologies.
IEEE Trans. Cybern., 2022
Magnetic Circuit Analysis of Halbach Array and Improvement of Permanent Magnetic Adsorption Device for Wall-Climbing Robot.
Symmetry, 2022
Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme With Reward Mechanism.
IEEE Syst. J., 2022
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022
Target Enclosing and Coverage Control for Quadrotors with Constraints and Time-Varying Delays: A Neural Adaptive Fault-Tolerant Formation Control Approach.
Sensors, 2022
IEEE Geosci. Remote. Sens. Lett., 2022
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022
Adaptive fuzzy control for quasi-synchronization of uncertain complex dynamical networks with time-varying topology via event-triggered communication strategy.
Inf. Sci., 2022
Fixed-time synchronization of fractional-order complex-valued neural networks with time-varying delay via sliding mode control.
Neurocomputing, 2022
Implementation of fitness and health management system utilising deep learning neural network and internet of things technology.
Int. J. Grid Util. Comput., 2022
An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder.
IEEE Commun. Lett., 2022
An Enhanced Belief Propagation Flipping Decoder for Polar Codes with Stepping Strategy.
Entropy, 2022
Role of perceived self-efficacy in automated project allocation: Measuring university students' perceptions of justice in interdisciplinary project-based learning.
Comput. Hum. Behav., 2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 8th International Conference on Systems and Informatics, 2022
Reliability analysis of electric hydraulic servo system of large-caliber naval gun based on GO-FLOW methodology.
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022
Research on fault type diagnosis method of transmission line based on multi-source information fusion of operation inspection and control platform.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022
A Surface-Ship Trajectory Data Compression Algorithm based on Douglas-Peucker Algorithm.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022
The Influence of Threshold on Sliding Window Algorithm for Surface-Ship Trajectory Compression.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
Lightweight Many-to-Many Anonymous Authenticated Key Agreement Scheme for Intelligent Vehicular Ad-hoc Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks.
Wirel. Pers. Commun., 2021
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021
Application of human motion recognition utilizing deep learning and smart wearable device in sports.
Int. J. Syst. Assur. Eng. Manag., 2021
J. Syst. Archit., 2021
Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective.
J. Manag. Inf. Syst., 2021
New fractional-order integral inequalities: Application to fractional-order systems with time-varying delay.
J. Frankl. Inst., 2021
Event-triggered consensus strategy for uncertain topological fractional-order multiagent systems based on Takagi-Sugeno fuzzy models.
Inf. Sci., 2021
Delay-dependent consensus criteria for fractional-order Takagi-Sugeno fuzzy multi-agent systems with time delay.
Inf. Sci., 2021
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021
Entropy, 2021
Robust Control of Winding-Based DC-Bus Capacitor Discharge for PMSM Drives in Electric Vehicles.
IEEE Access, 2021
A New Decomposition-Based Many-Objective Algorithm Based on Adaptive Reference Vectors and Fractional Dominance Relation.
IEEE Access, 2021
DC-Bus Capacitor Maximum Power Discharge Strategy for EV-PMSM Drive System With Small Safe Current.
IEEE Access, 2021
Resilient Security Filtering for Networked Switched Systems With Event-Driven Measurements.
IEEE Access, 2021
IEEE Access, 2021
Design of Quadruped robot single-leg system by Ionic polymer metal composites actuators array.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021
Topological and Optimal Design of Grasping Manipulator for Obstacle Crossing Vehicle with Foldable Operating Arm.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021
Reliability analysis and calculation of large caliber naval gun recoil process based on GO methodology and multi-state combination.
Proceedings of the 3rd International Conference on Artificial Intelligence and Advanced Manufacture, 2021
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021
2020
Self-Calibrated Absolute Thickness Measurement of Opaque Specimen Based on Differential White Light Interferometry.
IEEE Trans. Instrum. Meas., 2020
Delay-Dependent Fuzzy Sampled-Data Synchronization of T-S Fuzzy Complex Networks With Multiple Couplings.
IEEE Trans. Fuzzy Syst., 2020
Optimization Design and Flexible Detection Method of Wall-Climbing Robot System with Multiple Sensors Integration for Magnetic Particle Testing.
Sensors, 2020
Disturbance Recognition and Collision Detection of Manipulator Based on Momentum Observer.
Sensors, 2020
Further results on finite-time synchronization of delayed inertial memristive neural networks via a novel analysis method.
Neural Networks, 2020
MIS Q., 2020
Predictive analysis of impact hazard level of coal rock mass based on fuzzy inference network.
J. Intell. Fuzzy Syst., 2020
Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems.
J. Inf. Secur. Appl., 2020
Efficient light-weight private auditing scheme for cloud-based wireless body area networks.
Int. J. Electron. Secur. Digit. Forensics, 2020
Discriminant analysis of mine quake type and intensity based on a deep neural network.
Int. J. Comput. Integr. Manuf., 2020
Adv. Robotics, 2020
Finite-time stability for fractional-order complex-valued neural networks with time delay.
Appl. Math. Comput., 2020
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs.
IEEE Access, 2020
Proceedings of The 12th Language Resources and Evaluation Conference, 2020
Proceedings of the 5th IEEE International Conference on Intelligent Transportation Engineering, 2020
Influence of Microcultural Information Flow on the Value Education in American Universities and its Countermeasures.
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020
2019
Proceedings of the Using Comparable Corpora for Under-Resourced Areas of Machine Translation, 2019
Distributed Measurement of Polarization Characteristics for a Multifunctional Integrated Optical Chip: A Review.
IEEE Trans. Instrum. Meas., 2019
Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive Mob. Comput., 2019
A Risk Mitigation Framework for Information Technology Projects: A Cultural Contingency Perspective.
J. Manag. Inf. Syst., 2019
J. Artif. Intell. Res., 2019
An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2019
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019
Neurocomputing, 2019
Global synchronization of time-invariant uncertainty fractional-order neural networks with time delay.
Neurocomputing, 2019
Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS.
Int. J. Electron. Secur. Digit. Forensics, 2019
New reliable nonuniform sampling control for uncertain chaotic neural networks under Markov switching topologies.
Appl. Math. Comput., 2019
IEEE Access, 2019
The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System.
IEEE Access, 2019
Co-Channel Multi-Signal Modulation Classification Based on Convolution Neural Network.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019
Proceedings of the Wireless and Satellite Systems, 2019
Proceedings of the 6th International Conference on Systems and Informatics, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Direct Adaptive Fault-tolerant Control of Satellite Attitude based on Back-stepping and Neural Network.
Proceedings of the CAA Symposium on Fault Detection, 2019
Robust Fault Tolerant Control of Airship Residence Based on Lossless Separation Operator<sup>*</sup>.
Proceedings of the CAA Symposium on Fault Detection, 2019
2018
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wirel. Pers. Commun., 2018
Wirel. Commun. Mob. Comput., 2018
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Secur. Commun. Networks, 2018
Microelectron. Reliab., 2018
Int. J. Web Grid Serv., 2018
Neurocomputing, 2018
Int. J. Electron. Secur. Digit. Forensics, 2018
An improved authentication protocol-based dynamic identity for multi-server environments.
Int. J. Distributed Sens. Networks, 2018
AIS Trans. Hum. Comput. Interact., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018
Proceedings of the 2018 IEEE International Conference on Signal Processing, 2018
Proceedings of the 5th International Conference on Systems and Informatics, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Communications, Signal Processing, and Systems, 2018
Proceedings of the Communications, Signal Processing, and Systems, 2018
2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017
A Nomological Network of Knowledge Management System Use: Antecedents and Consequences.
MIS Q., 2017
MIS Q., 2017
Exponential response electrical pole-changing method for a five-phase induction machine with a current sliding mode control strategy.
Frontiers Inf. Technol. Electron. Eng., 2017
J. Sensors, 2017
J. Sensors, 2017
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the First International Workshop on Human-centered Sensing, 2017
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017
Proceedings of the 4th International Conference on Systems and Informatics, 2017
Proceedings of the 4th International Conference on Systems and Informatics, 2017
Proceedings of the 4th International Conference on Systems and Informatics, 2017
Is Socializing Loyalty Programs a Good Idea? - Empirical Evidence from a Large Quick Service Restaurant Chain.
Proceedings of the International Conference on Information Systems, 2017
A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Secur. Commun. Networks, 2016
智能主体的等级BDI(信念、愿望和意图)模型 (Graded Belief-Desire-Intention (BDI) Models for Agent Architectures).
计算机科学, 2016
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Inf., 2016
PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
Int. J. Netw. Secur., 2016
Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
Foot end trajectory with small oscillation generation method of the adjustable stiffness active flexible joint robot.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016
Proceedings of the NAACL HLT 2016, 2016
Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, 2016
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016
Proceedings of the 12th International Conference on Natural Computation, 2016
Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the 9th International Congress on Image and Signal Processing, 2016
2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015
Manag. Sci., 2015
计算机科学, 2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015
J. Comput. Methods Sci. Eng., 2015
J. Inf. Secur. Appl., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability.
Eur. J. Inf. Syst., 2015
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015
The DCU Discourse Parser for Connective, Argument Identification and Explicit Sense Classification.
Proceedings of the 19th Conference on Computational Natural Language Learning: Shared Task, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Chengqing Zong: Statistical natural language processing (second edition) - Tsinghua University Press, 2013, xxxv+570pp.
Mach. Transl., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014
Comput. Electr. Eng., 2014
Development of a lower limb rehabilitation robot based on free gait and virtual reality.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014
Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014
Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
Explaining Employee Job Performance: The Role of Online and Offline Workplace Communication Networks.
MIS Q., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Rehabilitative motion planning for upper limb rehabilitation robot based on virtual reality.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Proceedings of the IEEE International Conference on Information and Automation, 2013
Reconstruction of bidirectional predicted residual for stereoscopic video based on compressed sensing.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013
2012
Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic Logic.
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the Health Informatics: Building a Healthcare Future Through Trusted Information, 2012
2011
J. Assoc. Inf. Syst., 2011
"Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation.
Inf. Syst. Res., 2011
Michael W. Berry and Jacob Kogan (eds.): Text mining: applications and theory - John Wiley and Sons, Ltd, 2010, xiv + 207 pp, £55.00/€66.00, hardcover, ISBN: 978-0-470-74982-1.
Inf. Retr., 2011
DFKI Hybrid Machine Translation System for WMT 2011 - On the Integration of SMT and RBMT.
Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011
'Just What the Doctor Ordered': A Revised UTAUT for EMR System Adoption and Use by Doctors.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
2010
Genom. Proteom. Bioinform., 2010
Basing on the olfaction and vision information fusion for robot's odor source localization.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
Constructing Performance Management Information System for Academic Staff: A Model for Research-intensive Universities.
Proceedings of the International Conference on E-Business and E-Government, 2010
Designing Collaborative Systems for Better Knowledge Management and Team Performance.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010
2009
Role of collective ownership and coding standards in coordinating expertise in software project teams.
Eur. J. Inf. Syst., 2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the Complex Sciences, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values.
Inf. Syst. Frontiers, 2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Students Interactions and Course Performance: Impacts of Online and Offline Networks.
Proceedings of the International Conference on Information Systems, 2008
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
The Fourier Spectrum Analysis of Optical Feedback Self-Mixing Signal under Weak and Moderate Feedback.
Proceedings of the 4th IEEE International Symposium on Electronic Design, 2008
2007
Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes.
Proceedings of the Knowledge Science, 2007
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007
2006
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006
2005
Dingxi prefecture of Gansu Province's development of rainwater collection and water-saving irrigation to combat the arid environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Research on the effects of land use change on ecosystem services value of Loess Plateau - a case study of Longxi County.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
A study on remote sensing key technologies of national monitoring resource, ecological and environment.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
2004
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004
2003
From MSC to SDL: Overview and an Application to the Autonomous Shuttle Transport System.
Proceedings of the Scenarios: Models, 2003