2009 |
49 | EE | Hai Huang,
Zhenfu Cao:
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem.
ASIACCS 2009: 333-342 |
2008 |
48 | EE | Qianping Wang,
Hai Huang,
Xiaolong Su,
Houquan Liu,
Zhoufang Xiao:
Design and optimization of beacon nodes for localization in mobile application.
CSCWD 2008: 571-576 |
47 | EE | Xiaoning Ding,
Hai Huang,
Yaoping Ruan,
Anees Shaikh,
Xiaodong Zhang:
Automatic Software Fault Diagnosis by Exploiting Application Signatures.
LISA 2008: 23-39 |
46 | EE | Hai Huang,
Chengfei Liu,
Xiaofang Zhou:
Computing Relaxed Answers on RDF Databases.
WISE 2008: 163-175 |
2007 |
45 | EE | Hai Huang,
Helmut Mayer:
Extraction of 3D Unfoliaged Trees from Image Sequences Via a Generative Statistical Approach.
DAGM-Symposium 2007: 385-394 |
44 | EE | Jing Zhang,
Hai Huang:
Federate Job Mapping Strategy in Grid-Based Virtual Wargame Collaborative Environment.
Edutainment 2007: 947-956 |
43 | EE | Lei Tian,
Liyan Han,
Hai Huang:
Multi-objective Optimal Public Investment: An Extended Model and Genetic Algorithm-Based Case Study.
ICANNGA (1) 2007: 314-322 |
42 | EE | Hai Huang,
Raymond B. Jennings III,
Yaoping Ruan,
Ramendra K. Sahoo,
Sambit Sahu,
Anees Shaikh:
PDA: A Tool for Automated Problem Determination.
LISA 2007: 153-166 |
41 | EE | Hai Huang,
Kang G. Shin:
Partial Disk Failures: Using Software to Analyze Physical Damage.
MSST 2007: 185-198 |
40 | EE | Hai Huang,
Zengxin Wei,
Shengwei Yao:
The proof of the sufficient descent condition of the Wei-Yao-Liu conjugate gradient method under the strong Wolfe-Powell line search.
Applied Mathematics and Computation 189(2): 1241-1245 (2007) |
39 | EE | Shengwei Yao,
Zengxin Wei,
Hai Huang:
A note about WYL's conjugate gradient method and its applications.
Applied Mathematics and Computation 191(2): 381-388 (2007) |
2006 |
38 | EE | Hai Huang,
Wei Wu,
Xin Tang,
Zhong Zhou:
Federate Migration in Grid-Based Virtual Wargame Collaborative Environment.
Edutainment 2006: 606-615 |
37 | EE | Tian Lei,
Liu Lieli,
Liyan Han,
Hai Huang:
A Genetic Algorithm-Based Double-Objective Multi-constraint Optimal Cross-Region Cross-Sector Public Investment Model.
ICNC (2) 2006: 470-479 |
36 | EE | Ke Zhang,
Hai Huang,
Jianming Zhang:
MPC-Based Control Methodology in Networked Control Systems.
SEAL 2006: 814-820 |
35 | EE | Hai Huang,
Wei-Tek Tsai,
Yinong Chen:
Binary analysis and automated hot patching for Web-based applications.
Information & Software Technology 48(12): 1148-1158 (2006) |
34 | EE | Hai Huang,
Jiaqiang Pan:
Speech pitch determination based on Hilbert-Huang transform.
Signal Processing 86(4): 792-803 (2006) |
2005 |
33 | EE | Hongbo Xie,
Hai Huang,
Zhizhong Wang:
Multiple Feature Domains Information Fusion for Computer-Aided Clinical Electromyography.
CAIP 2005: 304-312 |
32 | EE | Wei-Tek Tsai,
Yinong Chen,
Raymond A. Paul,
Hai Huang,
Xinyu Zhou,
Xiao Wei:
Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services.
COMPSAC (1) 2005: 101-106 |
31 | EE | Hai Huang,
Wei-Tek Tsai,
Yinong Chen:
Autonomous Hot Patching for Web-Based Applications.
COMPSAC (2) 2005: 51-56 |
30 | EE | Wei-Tek Tsai,
Yinong Chen,
Dawei Zhang,
Hai Huang:
Voting Multi-Dimensional Data with Deviations for Web Services under Group Testing.
ICDCS Workshops 2005: 65-71 |
29 | EE | Hongbo Xie,
Hai Huang,
Zhizhong Wang:
Neural Networks Combination by Fuzzy Integral in Clinical Electromyography.
ICNC (3) 2005: 1142-1151 |
28 | EE | Wei Wu,
Hai Huang,
Zhong Zhou,
Zhongshu Liu:
A Genetic Algorithm-Based Routing Service for Simulation Grid.
ICNC (3) 2005: 772-781 |
27 | EE | Hai Huang,
Kang G. Shin,
Charles Lefurgy,
Tom W. Keller:
Improving energy efficiency by making DRAM less randomly accessed.
ISLPED 2005: 393-398 |
26 | EE | Hai Huang,
Wei-Tek Tsai,
Raymond A. Paul:
Proof Slicing with Application to Model Checking Web Services.
ISORC 2005: 292-299 |
25 | EE | Hai Huang,
Wei-Tek Tsai,
Raymond A. Paul,
Yinong Chen:
Automated Model Checking and Testing for Composite Web Services.
ISORC 2005: 300-307 |
24 | EE | Feng Hu,
Guoyin Wang,
Hai Huang,
Yu Wu:
Incremental Attribute Reduction Based on Elementary Sets.
RSFDGrC (1) 2005: 185-193 |
23 | EE | Hai Huang,
Wanda Hung,
Kang G. Shin:
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption.
SOSP 2005: 263-276 |
22 | EE | Xin Feng,
Hai Huang:
A Fuzzy-Set-Based Reconstructed Phase Space Method for Idenitification of Temporal Patterns in Complex Time Series.
IEEE Trans. Knowl. Data Eng. 17(5): 601-613 (2005) |
21 | EE | Hai Huang,
Andréa W. Richa,
Michael Segal:
Dynamic Coverage in Ad-Hoc Sensor Networks.
MONET 10(1-2): 9-17 (2005) |
2004 |
20 | EE | Wei-Tek Tsai,
Yinong Chen,
Zhibin Cao,
Xiaoying Bai,
Hai Huang,
Raymond A. Paul:
Testing Web Services Using Progressive Group Testing.
AWCC 2004: 314-322 |
19 | EE | Wei-Tek Tsai,
Weiwei Song,
Raymond A. Paul,
Zhibin Cao,
Hai Huang:
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing.
COMPSAC 2004: 554-559 |
18 | EE | Wei-Tek Tsai,
Yinong Chen,
Raymond A. Paul,
Ning Liao,
Hai Huang:
Cooperative and Group Testing in Verification of Dynamic Composite Web Services.
COMPSAC Workshops 2004: 170-173 |
17 | EE | Hai Huang,
Shaofeng Wang,
Yan Zhang,
Wei Wu:
Resource Discovery Mechanism for Large-Scale Distributed Simulation Oriented Data Grid.
GCC 2004: 431-439 |
16 | | Wei-Tek Tsai,
Dawei Zhang,
Yinong Chen,
Hai Huang,
Raymond A. Paul,
Ning Liao:
A software reliability model for web services.
IASTED Conf. on Software Engineering and Applications 2004: 144-149 |
15 | EE | Hai Huang,
Kang G. Shin,
Charles Lefurgy,
Karthick Rajamani,
Tom W. Keller,
Eric Van Hensbergen,
Freeman L. Rawson III:
Software-Hardware Cooperative Power Management for Main Memory.
PACS 2004: 61-77 |
14 | EE | Hai Huang,
Andréa W. Richa,
Michael Segal:
Approximation Algorithms for the Mobile Piercing Set Problem with Applications to Clustering in Ad-Hoc Networks.
MONET 9(2): 151-161 (2004) |
2003 |
13 | EE | Lijun Li,
Hai Huang,
Carl Tropper:
DVS: An Object-Oriented Framework for Distributed Verilog Simulation.
PADS 2003: 173-180 |
12 | EE | Hai Huang,
Padmanabhan Pillai,
Kang G. Shin:
Design and Implementation of Power-Aware Virtual Memory.
USENIX Annual Technical Conference, General Track 2003: 57-70 |
11 | EE | Hai Huang,
Claudia Keser,
Jonathan W. Leland,
Jason Shachat:
Trust, the Internet, and the digital divide.
IBM Systems Journal 42(3): 507-518 (2003) |
2002 |
10 | EE | Hai Huang,
Andréa W. Richa,
Michael Segal:
Approximation algorithms for the mobile piercing set problem with applications to clustering in ad-hoc networks.
DIAL-M 2002: 52-61 |
9 | EE | Hai Huang,
Padmanabhan Pillai,
Kang G. Shin:
Improving Wait-Free Algorithms for Interprocess Communication in Embedded Real-Time Systems.
USENIX Annual Technical Conference, General Track 2002: 303-316 |
2000 |
8 | EE | Mu-Chun Su,
Yi-Yuan Chen,
Kuo-Hua Wang,
Chee-Yuen Tew,
Hai Huang:
3D arm movement recognition using syntactic pattern recognition.
AI in Engineering 14(2): 113-118 (2000) |
1999 |
7 | EE | Hai Huang,
Wei-Tek Tsai:
VSAM conversion for COBOL programs.
Journal of Software Maintenance 11(5): 311-337 (1999) |
1998 |
6 | EE | Hai Huang,
Wei-Tek Tsai,
Sourav Bhattacharya,
Xiaoping Chen,
Yamin Wang,
Jianhua Sun:
Business rule extraction techniques for COBOL programs.
Journal of Software Maintenance 10(1): 3-35 (1998) |
1996 |
5 | EE | Hai Huang,
Wei-Tek Tsai,
Sourav Bhattacharya,
Xiaoping Chen,
Yamin Wang,
Jianhua Sun:
Business Rule Extraction from Legacy Code.
COMPSAC 1996: 162-167 |
4 | EE | Xiaoping Chen,
Wei-Tek Tsai,
Hai Huang,
Mustafa H. Poonawala,
Sanjai Rayadurgam,
Yamin Wang:
Omega - an integrated environment for C++ program maintenance.
ICSM 1996: 114- |
3 | | Hai Huang,
Wei-Tek Tsai,
Satish Subramanian:
Generalized Program Slicing for Software Maintenance.
SEKE 1996: 261-268 |
1992 |
2 | EE | Hai Huang,
Kazuo Sugihara,
Isao Miyamoto:
A Rule-Based Tool for Reverse Engineering from Source Code to Graphical Models.
SEKE 1992: 178-185 |
1982 |
1 | | Harold J. Kushner,
Hai Huang:
Diffusion approximations for the analysis of digital phase locked loops.
IEEE Transactions on Information Theory 28(2): 384- (1982) |