2009 | ||
---|---|---|
49 | EE | Hai Huang, Zhenfu Cao: An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. ASIACCS 2009: 333-342 |
2008 | ||
48 | EE | Qianping Wang, Hai Huang, Xiaolong Su, Houquan Liu, Zhoufang Xiao: Design and optimization of beacon nodes for localization in mobile application. CSCWD 2008: 571-576 |
47 | EE | Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang: Automatic Software Fault Diagnosis by Exploiting Application Signatures. LISA 2008: 23-39 |
46 | EE | Hai Huang, Chengfei Liu, Xiaofang Zhou: Computing Relaxed Answers on RDF Databases. WISE 2008: 163-175 |
2007 | ||
45 | EE | Hai Huang, Helmut Mayer: Extraction of 3D Unfoliaged Trees from Image Sequences Via a Generative Statistical Approach. DAGM-Symposium 2007: 385-394 |
44 | EE | Jing Zhang, Hai Huang: Federate Job Mapping Strategy in Grid-Based Virtual Wargame Collaborative Environment. Edutainment 2007: 947-956 |
43 | EE | Lei Tian, Liyan Han, Hai Huang: Multi-objective Optimal Public Investment: An Extended Model and Genetic Algorithm-Based Case Study. ICANNGA (1) 2007: 314-322 |
42 | EE | Hai Huang, Raymond B. Jennings III, Yaoping Ruan, Ramendra K. Sahoo, Sambit Sahu, Anees Shaikh: PDA: A Tool for Automated Problem Determination. LISA 2007: 153-166 |
41 | EE | Hai Huang, Kang G. Shin: Partial Disk Failures: Using Software to Analyze Physical Damage. MSST 2007: 185-198 |
40 | EE | Hai Huang, Zengxin Wei, Shengwei Yao: The proof of the sufficient descent condition of the Wei-Yao-Liu conjugate gradient method under the strong Wolfe-Powell line search. Applied Mathematics and Computation 189(2): 1241-1245 (2007) |
39 | EE | Shengwei Yao, Zengxin Wei, Hai Huang: A note about WYL's conjugate gradient method and its applications. Applied Mathematics and Computation 191(2): 381-388 (2007) |
2006 | ||
38 | EE | Hai Huang, Wei Wu, Xin Tang, Zhong Zhou: Federate Migration in Grid-Based Virtual Wargame Collaborative Environment. Edutainment 2006: 606-615 |
37 | EE | Tian Lei, Liu Lieli, Liyan Han, Hai Huang: A Genetic Algorithm-Based Double-Objective Multi-constraint Optimal Cross-Region Cross-Sector Public Investment Model. ICNC (2) 2006: 470-479 |
36 | EE | Ke Zhang, Hai Huang, Jianming Zhang: MPC-Based Control Methodology in Networked Control Systems. SEAL 2006: 814-820 |
35 | EE | Hai Huang, Wei-Tek Tsai, Yinong Chen: Binary analysis and automated hot patching for Web-based applications. Information & Software Technology 48(12): 1148-1158 (2006) |
34 | EE | Hai Huang, Jiaqiang Pan: Speech pitch determination based on Hilbert-Huang transform. Signal Processing 86(4): 792-803 (2006) |
2005 | ||
33 | EE | Hongbo Xie, Hai Huang, Zhizhong Wang: Multiple Feature Domains Information Fusion for Computer-Aided Clinical Electromyography. CAIP 2005: 304-312 |
32 | EE | Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Huang, Xinyu Zhou, Xiao Wei: Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services. COMPSAC (1) 2005: 101-106 |
31 | EE | Hai Huang, Wei-Tek Tsai, Yinong Chen: Autonomous Hot Patching for Web-Based Applications. COMPSAC (2) 2005: 51-56 |
30 | EE | Wei-Tek Tsai, Yinong Chen, Dawei Zhang, Hai Huang: Voting Multi-Dimensional Data with Deviations for Web Services under Group Testing. ICDCS Workshops 2005: 65-71 |
29 | EE | Hongbo Xie, Hai Huang, Zhizhong Wang: Neural Networks Combination by Fuzzy Integral in Clinical Electromyography. ICNC (3) 2005: 1142-1151 |
28 | EE | Wei Wu, Hai Huang, Zhong Zhou, Zhongshu Liu: A Genetic Algorithm-Based Routing Service for Simulation Grid. ICNC (3) 2005: 772-781 |
27 | EE | Hai Huang, Kang G. Shin, Charles Lefurgy, Tom W. Keller: Improving energy efficiency by making DRAM less randomly accessed. ISLPED 2005: 393-398 |
26 | EE | Hai Huang, Wei-Tek Tsai, Raymond A. Paul: Proof Slicing with Application to Model Checking Web Services. ISORC 2005: 292-299 |
25 | EE | Hai Huang, Wei-Tek Tsai, Raymond A. Paul, Yinong Chen: Automated Model Checking and Testing for Composite Web Services. ISORC 2005: 300-307 |
24 | EE | Feng Hu, Guoyin Wang, Hai Huang, Yu Wu: Incremental Attribute Reduction Based on Elementary Sets. RSFDGrC (1) 2005: 185-193 |
23 | EE | Hai Huang, Wanda Hung, Kang G. Shin: FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. SOSP 2005: 263-276 |
22 | EE | Xin Feng, Hai Huang: A Fuzzy-Set-Based Reconstructed Phase Space Method for Idenitification of Temporal Patterns in Complex Time Series. IEEE Trans. Knowl. Data Eng. 17(5): 601-613 (2005) |
21 | EE | Hai Huang, Andréa W. Richa, Michael Segal: Dynamic Coverage in Ad-Hoc Sensor Networks. MONET 10(1-2): 9-17 (2005) |
2004 | ||
20 | EE | Wei-Tek Tsai, Yinong Chen, Zhibin Cao, Xiaoying Bai, Hai Huang, Raymond A. Paul: Testing Web Services Using Progressive Group Testing. AWCC 2004: 314-322 |
19 | EE | Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin Cao, Hai Huang: Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing. COMPSAC 2004: 554-559 |
18 | EE | Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Ning Liao, Hai Huang: Cooperative and Group Testing in Verification of Dynamic Composite Web Services. COMPSAC Workshops 2004: 170-173 |
17 | EE | Hai Huang, Shaofeng Wang, Yan Zhang, Wei Wu: Resource Discovery Mechanism for Large-Scale Distributed Simulation Oriented Data Grid. GCC 2004: 431-439 |
16 | Wei-Tek Tsai, Dawei Zhang, Yinong Chen, Hai Huang, Raymond A. Paul, Ning Liao: A software reliability model for web services. IASTED Conf. on Software Engineering and Applications 2004: 144-149 | |
15 | EE | Hai Huang, Kang G. Shin, Charles Lefurgy, Karthick Rajamani, Tom W. Keller, Eric Van Hensbergen, Freeman L. Rawson III: Software-Hardware Cooperative Power Management for Main Memory. PACS 2004: 61-77 |
14 | EE | Hai Huang, Andréa W. Richa, Michael Segal: Approximation Algorithms for the Mobile Piercing Set Problem with Applications to Clustering in Ad-Hoc Networks. MONET 9(2): 151-161 (2004) |
2003 | ||
13 | EE | Lijun Li, Hai Huang, Carl Tropper: DVS: An Object-Oriented Framework for Distributed Verilog Simulation. PADS 2003: 173-180 |
12 | EE | Hai Huang, Padmanabhan Pillai, Kang G. Shin: Design and Implementation of Power-Aware Virtual Memory. USENIX Annual Technical Conference, General Track 2003: 57-70 |
11 | EE | Hai Huang, Claudia Keser, Jonathan W. Leland, Jason Shachat: Trust, the Internet, and the digital divide. IBM Systems Journal 42(3): 507-518 (2003) |
2002 | ||
10 | EE | Hai Huang, Andréa W. Richa, Michael Segal: Approximation algorithms for the mobile piercing set problem with applications to clustering in ad-hoc networks. DIAL-M 2002: 52-61 |
9 | EE | Hai Huang, Padmanabhan Pillai, Kang G. Shin: Improving Wait-Free Algorithms for Interprocess Communication in Embedded Real-Time Systems. USENIX Annual Technical Conference, General Track 2002: 303-316 |
2000 | ||
8 | EE | Mu-Chun Su, Yi-Yuan Chen, Kuo-Hua Wang, Chee-Yuen Tew, Hai Huang: 3D arm movement recognition using syntactic pattern recognition. AI in Engineering 14(2): 113-118 (2000) |
1999 | ||
7 | EE | Hai Huang, Wei-Tek Tsai: VSAM conversion for COBOL programs. Journal of Software Maintenance 11(5): 311-337 (1999) |
1998 | ||
6 | EE | Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiaoping Chen, Yamin Wang, Jianhua Sun: Business rule extraction techniques for COBOL programs. Journal of Software Maintenance 10(1): 3-35 (1998) |
1996 | ||
5 | EE | Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiaoping Chen, Yamin Wang, Jianhua Sun: Business Rule Extraction from Legacy Code. COMPSAC 1996: 162-167 |
4 | EE | Xiaoping Chen, Wei-Tek Tsai, Hai Huang, Mustafa H. Poonawala, Sanjai Rayadurgam, Yamin Wang: Omega - an integrated environment for C++ program maintenance. ICSM 1996: 114- |
3 | Hai Huang, Wei-Tek Tsai, Satish Subramanian: Generalized Program Slicing for Software Maintenance. SEKE 1996: 261-268 | |
1992 | ||
2 | EE | Hai Huang, Kazuo Sugihara, Isao Miyamoto: A Rule-Based Tool for Reverse Engineering from Source Code to Graphical Models. SEKE 1992: 178-185 |
1982 | ||
1 | Harold J. Kushner, Hai Huang: Diffusion approximations for the analysis of digital phase locked loops. IEEE Transactions on Information Theory 28(2): 384- (1982) |