2009 | ||
---|---|---|
39 | EE | Sameer Singh, Wei Ren, Maneesha Singh: A Novel Approach to Spatio-Temporal Video Analysis and Retrieval. MIRAGE 2009: 106-115 |
38 | EE | Wei Ren, Qing Zhao, Drasvin Cheowtirakul, Ananthram Swami: Connectivity of Cognitive Radio Networks: Proximity vs. Opportunity CoRR abs/0903.1684: (2009) |
2008 | ||
37 | EE | Wei Ren, Guiying Yan, Guohui Lin, Caifeng Du, Xiaofeng Han: Detecting Community Structure by Network Vectorization. COCOON 2008: 245-254 |
36 | EE | Wei Ren, Gang Chen, Zhonghua Yang, Junhong Zhou, Jing-Bing Zhang, Chor Ping Low, David Chen, Chengzheng Sun: Semantic enhanced rule driven workflow execution in Collaborative Virtual Enterprise. ICARCV 2008: 910-915 |
35 | EE | Wei Ren, Kui Ren, Wenjing Lou: Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393 |
34 | EE | Wei Ren, Gang Chen, Haifeng Shen, Zhonghua Yang, Jing-Bing Zhang, Chor Ping Low, David Chen, Chengzheng Sun: Dynamic Self-Healing for Service Flows with Semantic Web Services. Web Intelligence 2008: 598-604 |
33 | EE | Wei Ren: Synchronization of coupled harmonic oscillators with local interaction. Automatica 44(12): 3195-3200 (2008) |
32 | EE | Wei Ren, Qing Zhao, Ananthram Swami: Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway CoRR abs/0809.0533: (2008) |
31 | EE | Wei Ren, Nathan Sorensen: Distributed coordination architecture for multi-robot formation control. Robotics and Autonomous Systems 56(4): 324-333 (2008) |
2007 | ||
30 | EE | Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, Jun Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography. ICC 2007: 1570-1575 |
29 | EE | Wei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang: IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. ITNG 2007: 102-110 |
28 | EE | Wei Ren, Haiyang Chao, William Bourgeous, Nathan Sorensen, YangQuan Chen: Experimental implementation and validation of consensus algorithms on a mobile actuator and sensor network platform. SMC 2007: 171-176 |
27 | EE | Wei Ren: Trajectory tracking control for a miniature fixed-wing unmanned air vehicle. Int. J. Systems Science 38(4): 361-368 (2007) |
26 | EE | Wei Ren: On Constrained Nonlinear Tracking Control of a Small Fixed-wing UAV. Journal of Intelligent and Robotic Systems 48(4): 525-537 (2007) |
2006 | ||
25 | EE | Yi Shi, Zhipeng Cai, Lizhe Xu, Wei Ren, Randy Goebel, Guohui Lin: A Model-Free Greedy Gene Selection for Microarray Sample Class Prediction. CIBCB 2006: 1-8 |
24 | EE | Wei Ren, Hai Jin: A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks. Edutainment 2006: 805-809 |
23 | EE | Xingwei Wang, Jinghong Liu, Wei Ren, Min Huang, Nan Gao: A Job Assignment Method Based on Auction Model and Genetic Algorithm for Grid Computing. GCC Workshops 2006: 44-48 |
22 | Wei Ren, Paul Weal, Maneesha Singh, Sameer Singh: Visual Information Retrieval: Minerva Video Benchmark. SPPRA 2006: 256-261 | |
21 | EE | Wei Ren: Modeling Network Forensics Behavior. J. Digital Forensic Practice 1(1): 57-65 (2006) |
20 | EE | Wei Ren, Tenghong Liu, Hai Jin: Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. Journal of Computer Research and Development 43(11): 1927-1932 (2006) |
2005 | ||
19 | EE | Wei Ren, Hai Jin: Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . AINA 2005: 177-182 |
18 | EE | Wei Ren, Sameer Singh: An Automated Video Annotation System. ICAPR (2) 2005: 693-700 |
17 | EE | Wei Ren, Hai Jin, Tenghong Liu: Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. ISM 2005: 707-712 |
16 | EE | Wei Ren, Hai Jin: A Recursion Nearness Based Method for Characterizing IP Address. PDCAT 2005: 665-669 |
15 | EE | Wei Ren, Hai Jin: Honeynet based distributed adaptive network forensics and active real time investigation. SAC 2005: 302-303 |
2004 | ||
14 | Wei Ren, Dan Liu: Fractal Curve Interpolation Algorithm in the Scene of Navigation Simulator. CISST 2004: 39-42 | |
13 | Wei Ren: On the Novel Network Forensics Perspective of Enhanced E-Business Security. ICEB 2004: 1355-1360 | |
12 | EE | Wei Ren, Sameer Singh: Video Sequence Matching with Spatio-Temporal Constraints. ICPR (3) 2004: 834-837 |
11 | EE | Wei Ren, Sameer Singh: Automatic Video Shot Boundary Detection Using Machine Learning.. IDEAL 2004: 285-292 |
10 | Wei Ren: On a Network Forensics Model For Information Security. ISTA 2004: 229-234 | |
9 | Wei Ren: On A Reference Model of Distributed Cooperative Network, Forensics System. iiWAS 2004 | |
8 | EE | Zhuoqin Yang, Qishao Lu, Huaguang Gu, Wei Ren: Gwn-Induced bursting, Spiking, and Random subthreshold Impulsing oscillation before Hopf bifurcations in the Chay Model. I. J. Bifurcation and Chaos 14(12): 4143-4159 (2004) |
7 | EE | Li Li, Huaguang Gu, Minghao Yang, Zhiqiang Liu, Wei Ren: A Series of bifurcation Scenarios in the Firing Pattern Transitions in an Experimental Neural pacemaker. I. J. Bifurcation and Chaos 14(5): 1813-1817 (2004) |
2000 | ||
6 | Sunan Huang, Wei Ren, Steven C. Chan: Design and performance evaluation of mixed manual and automated control traffic. IEEE Transactions on Systems, Man, and Cybernetics, Part A 30(6): 661-673 (2000) | |
1999 | ||
5 | EE | Sunan Huang, Steven C. Chan, Wei Ren: Mixture of Automatically- and Manually-controlled Vehicles in Intelligent Transport Systems. Journal of Intelligent and Robotic Systems 24(2): 175-205 (1999) |
4 | EE | Sunan Huang, Wei Ren: Vehicle longitudinal control using throttles and brakes. Robotics and Autonomous Systems 26(4): 241-253 (1999) |
1998 | ||
3 | EE | Sunan Huang, Wei Ren: Autonomous Intelligent Cruise Control with Actuator Delays. Journal of Intelligent and Robotic Systems 23(1): 27-43 (1998) |
1997 | ||
2 | EE | Sunan Huang, Wei Ren: New results on the robust bounds of linear uncertain systems. Int. J. Systems Science 28(2): 141-144 (1997) |
1 | EE | Sunan Huang, Wei Ren: Design of vehicle following control systems with actuator delays. Int. J. Systems Science 28(2): 145-151 (1997) |