dblp.uni-trier.dewww.uni-trier.de

Dongsheng Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
56 Barbara M. Chapman, Weimin Zheng, Guang R. Gao, Mitsuhisa Sato, Eduard Ayguadé, Dongsheng Wang: A Practical Programming Model for the Multi-Core Era, 3rd International Workshop on OpenMP, IWOMP 2007, Beijing, China, June 3-7, 2007, Proceedings Springer 2008
55EEYouhui Zhang, Hongyi Wang, Yu Gu, Dongsheng Wang: IDRS: Combining File-level Intrusion Detection with Block-level Data Recovery based on iSCSI. ARES 2008: 630-635
54EEYanan Cao, Cungen Cao, Liangjun Zang, Yao Zhu, Shi Wang, Dongsheng Wang: Acquiring Commonsense Knowledge about Properties of Concepts from Text. FSKD (4) 2008: 155-159
53EETian Song, Wei Zhang, Dongsheng Wang, Yibo Xue: A Memory Efficient Multiple Pattern Matching Architecture for Network Security. INFOCOM 2008: 166-170
52EEGuomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang: A new framework for the design and analysis of identity-based identification schemes. Theor. Comput. Sci. 407(1-3): 370-388 (2008)
2007
51EEGuomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang: A More Natural Way to Construct Identity-Based Identification Schemes. ACNS 2007: 307-322
50EETian Song, Dongsheng Wang, Meizhi Hu, Yibo Xue: n-Cube Model for Cluster Computing and Its Evaluation. APPT 2007: 340-351
49EEPeng Li, Dongsheng Wang, Haixia Wang, Meijuan Lu, Weimin Zheng: LIRAC: Using Live Range Information to Optimize Memory Access. ARCS 2007: 28-42
48EEChaoguang Men, Zhenpeng Xu, Dongsheng Wang: An Efficient Handoff Strategy for Mobile Computing Checkpoint System. EUC 2007: 410-421
47EEChaoguang Men, Yongqian Lu, Dongsheng Wang: A MAC Protocol with Little Idle Listening for Wireless Sensor Networks. EUC Workshops 2007: 115-123
46EETian Song, Zhizhong Tang, Dongsheng Wang: Multilevel Pattern Matching Architecture for Network Intrusion Detection and Prevention System. ICESS 2007: 604-614
45EEHuanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang: Tourist: Self-Adaptive Structured Overlay. ICN 2007: 30
44EEHaixia Wang, Dongsheng Wang, Peng Li, Jinglei Wang, XianPing Fu: Exploit Temporal Locality of Shared Data in SRC Enabled CMP. NPC 2007: 384-393
43EEXianPing Fu, Dequn Liang, Dongsheng Wang: A New Video Compression Algorithm for Very Low Bandwidth Using Curve Fitting Method. VISUAL 2007: 223-229
42EEMingqing Zheng, Weiwei Xiong, Dapeng Ju, Dongsheng Wang: T-Archive: A Novel HSM-Based Data Archive System. Data Science Journal 6: 441-444 (2007)
41EEOana G. Cula, Kristin J. Dana, Dinesh K. Pai, Dongsheng Wang: Polarization Multiplexing and Demultiplexing for Appearance-Based Modeling. IEEE Trans. Pattern Anal. Mach. Intell. 29(2): 362-367 (2007)
2006
40EEPeng Li, Dongsheng Wang, Songliu Guo, Tao Tian, Weimin Zheng: Live Range Aware Cache Architecture. Asia-Pacific Computer Systems Architecture Conference 2006: 409-415
39EEHaixia Wang, Dongsheng Wang, Peng Li: Acceleration Techniques for Chip-Multiprocessor Simulator Debug. Asia-Pacific Computer Systems Architecture Conference 2006: 509-515
38EEJunda Liu, Lin Ning, Yibo Xue, Dongsheng Wang: PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. DASC 2006: 308-314
37EEChaoguang Men, Dongsheng Wang, Yunlong Zhao: An Efficient Computing-Checkpoint Based Coordinated Checkpoint Algorithm. EUC 2006: 99-109
36EEYouhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng: Seamless Peripherals Integration for Network Computers based on the Reversed Server Message Block Protocol. ICNS 2006: 112
35EEYouhui Zhang, Dongsheng Wang: Research on Object-Storage-Based Intrusion Detection. ICPADS (1) 2006: 68-78
34EEYouhui Zhang, Yu Gu, Hongyi Wang, Dongsheng Wang: Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage. SBAC-PAD 2006: 185-192
2005
33EEHongliang Yu, Weimin Zheng, Dongsheng Wang, Haitao Dong, Lu Li: CAPU: Enhancing P2P File Sharing System with Capacity Aware Topology. APPT 2005: 214-225
32EEPeter Suaris, Dongsheng Wang, Nan-Chi Chou: A practical cut-based physical retiming algorithm for field programmable gate arrays. ASP-DAC 2005: 1027-1030
31EEYouhui Zhang, Liu Dong, Yu Gu, Dongsheng Wang: Exploring Design Space Using Transaction Level Models. Asia-Pacific Computer Systems Architecture Conference 2005: 589-599
30EEOana G. Cula, Kristin J. Dana, Dinesh K. Pai, Dongsheng Wang: Polarization Multiplexing for Bidirectional Imaging. CVPR (2) 2005: 1116-1123
29EEYongquan Ma, Dongsheng Wang: An Approach to Fair Resource Sharing in Peer-to-Peer Systems. ICN (2) 2005: 643-652
28EEGuangming Dong, Jin Chen, Xuanyang Lei, Zuogui Ning, Dongsheng Wang, Xiongxiang Wang: Global-Based Structure Damage Detection Using LVQ Neural Network and Bispectrum Analysis. ISNN (3) 2005: 531-537
27EENing Ning, Dongsheng Wang, Yongquan Ma, Jinfeng Hu, Jing Sun, Chongnan Gao, Weimin Zheng: Genius: Peer-to-Peer Location-Aware Gossip Using Network Coordinates. International Conference on Computational Science (3) 2005: 163-170
26 Tian Song, Lu Li, Dongsheng Wang, Zhizhong Tang: Service Roaming Based Distributed Environment for Mobile Computing. PSC 2005: 78-84
2004
25EEWenbin Yao, Dongsheng Wang, Weimin Zheng: A Fault-Tolerant Single-Chip Multiprocessor. Asia-Pacific Computer Systems Architecture Conference 2004: 137-145
24EEHaitao Dong, Weimin Zheng, Dongsheng Wang: Janus: Build Gnutella-Like File Sharing System over Structured Overlay. GCC 2004: 511-518
23EEMing Li, Jinfeng Hu, Haitao Dong, Dongsheng Wang, Weimin Zheng: Gemini: Probabilistic Routing Algorithm in Structured P2P Overlay. GCC 2004: 519-526
22EEYouhui Zhang, Dongsheng Wang, Chongnan Gao, Weimin Zheng: A JDO Storage Cluster Based on Object Devices. GCC Workshops 2004: 187-194
21EEYouhui Zhang, Dongsheng Wang, Jinglei Wang, Weimin Zheng: Using Model-Based Test Program Generator for Simulation Validation. ICESS 2004: 549-556
20EEJinfeng Hu, Ming Li, Weimin Zheng, Dongsheng Wang, Ning Ning, Haitao Dong: SmartBoa: Constructing p2p Overlay Network in the Heterogeneous Internet Using Irregular Routing Tables. IPTPS 2004: 278-287
19EEYouhui Zhang, Dongsheng Wang, Weimin Zheng: Parallel Checkpoint/Recovery on Cluster of IA-64 Computers. ISPA 2004: 212-216
18EEJinfeng Hu, Haitao Dong, Weimin Zheng, Dongsheng Wang, Ming Li: Twins: 2-hop Structured Overlay with High Scalability. International Conference on Computational Science 2004: 174-183
2003
17EEPeter Suaris, Dongsheng Wang, Pei-Ning Guo, Nan-Chi Chou: A physical retiming algorithm for field programmable gate arrays. FPGA 2003: 247
16 Yihua Xu, Dongsheng Wang, Heung-Yeung Shum, Songde Ma: Dynamic depth recovery using belief propagation. ICIP (1) 2003: 385-388
15EEDongsheng Wang, Peter Suaris, Nan-Chi Chou: A Practical ASIC Methdology for Flexible Clock Tree Synthesis with Routing Blockages. PATMOS 2003: 511-519
2002
14EEYihua Xu, Dongsheng Wang, Tao Feng, Harry Shum: Stereo Computation Using Radial Adaptive Windows. ICPR (3) 2002: 595-598
13 Yun Mao, Youhui Zhang, Dongsheng Wang, Weimin Zheng: LND: A Reliable Multi-Tier Storage Device in NOW. Operating Systems Review 36(1): 70-80 (2002)
12EEYouhui Zhang, Dongsheng Wang: A checkpoint-based high availability run-time system for Windows NT clusters. Operating Systems Review 36(2): 12-18 (2002)
2001
11 Qizhi Wang, Dongsheng Wang, Min Tan: Characterization of the Analytical Boundary of the Workspace for 3-6 SPS Parallel Manipulator. ICRA 2001: 3755-3759
10EEYun Mao, Kang Chen, Dongsheng Wang, Weimin Zheng: Cluster-based online monitoring system of web traffic. WIDM 2001: 47-53
9EEYun Mao, Kang Chen, Dongsheng Wang, Weimin Zheng, Xiaotie Deng: MOT: Memory Online Tracing of Web Information System. WISE (1) 2001: 271-277
8 Youhui Zhang, Dongsheng Wang, Weimin Zheng: Transparent Checkpointing and Rollback Recovery Mechanism for Windows NT Applications. Operating Systems Review 35(2): 78-85 (2001)
1999
7EEDongsheng Wang, Ping Zhang, Chung-Kuan Cheng, Arunabha Sen: A Performance-Driven I/O Pin Routing Algorithm. ASP-DAC 1999: 129-132
6 Dan Pei, Dongsheng Wang, Youhui Zhang, Meiming Shen: Quasi-Asynchronous Migration: A Novel Migration Protocol for PVM Tasks. Operating Systems Review 33(2): 5-14 (1999)
1998
5EEZhen Guo, He Li, Shuling Guo, Dongsheng Wang: Design and Simulation of a RISC-Based 32-bit Embedded On-Board Computer. Asian Test Symposium 1998: 413-
4EEDongsheng Wang, Ernest S. Kuh: A Performance-Driven MCM Router with Special Consideration of Crosstalk Reduction. DATE 1998: 466-470
1997
3EETianxiong Xue, Ernest S. Kuh, Dongsheng Wang: Post global routing crosstalk synthesis. IEEE Trans. on CAD of Integrated Circuits and Systems 16(12): 1418-1430 (1997)
1996
2EEDongsheng Wang, Ernest S. Kuh: Performance-Driven Interconnect Global Routing. Great Lakes Symposium on VLSI 1996: 132-136
1EETianxiong Xue, Ernest S. Kuh, Dongsheng Wang: Post global routing crosstalk risk estimation and reduction. ICCAD 1996: 302-309

Coauthor Index

1Eduard Ayguadé [56]
2Cungen Cao [54]
3Yanan Cao [54]
4Barbara M. Chapman [56]
5Jin Chen [28]
6Jing Chen [51] [52]
7Kang Chen [9] [10]
8Chung-Kuan Cheng [7]
9Nan-Chi Chou [15] [17] [32]
10Oana G. Cula [30] [41]
11Kristin J. Dana [30] [41]
12Xiaotie Deng [9] [51] [52]
13Guangming Dong [28]
14Haitao Dong [18] [20] [23] [24] [33]
15Liu Dong [31]
16Tao Feng [14]
17XianPing Fu [43] [44]
18Chongnan Gao [22] [27]
19Guang R. Gao [56]
20Yu Gu [31] [34] [55]
21Pei-Ning Guo [17]
22Shuling Guo [5]
23Songliu Guo [40]
24Zhen Guo [5]
25Chunhui Hong [45]
26Jinfeng Hu [18] [20] [23] [27] [45]
27Meizhi Hu [50]
28Dapeng Ju [42]
29Ernest S. Kuh [1] [2] [3] [4]
30Xuanyang Lei [28]
31He Li [5]
32Lu Li [26] [33]
33Ming Li [18] [20] [23]
34Peng Li [36] [39] [40] [44] [49]
35Dequn Liang [43]
36Junda Liu [38]
37Meijuan Lu [49]
38Yongqian Lu [47]
39Songde Ma [16]
40Yongquan Ma [27] [29]
41Yun Mao [9] [10] [13]
42Chaoguang Men [37] [47] [48]
43Lin Ning [38]
44Ning Ning [20] [27]
45Zuogui Ning [28]
46Dinesh K. Pai [30] [41]
47Dan Pei [6]
48Mitsuhisa Sato [56]
49Arunabha Sen [7]
50Meiming Shen [6]
51Harry Shum (Heung-Yeung Shum) [14] [16]
52Tian Song [26] [46] [50] [53]
53Peter Suaris (Peter Ramyalal Suaris) [15] [17] [32]
54Jing Sun [27]
55Min Tan [11]
56Zhizhong Tang [26] [46]
57Tao Tian [40]
58Haixia Wang [39] [44] [49]
59Hongyi Wang [34] [55]
60Jinglei Wang [21] [44]
61Qizhi Wang [11]
62Shi Wang [54]
63Xiongxiang Wang [28]
64Duncan S. Wong [51] [52]
65Weiwei Xiong [42]
66Yihua Xu [14] [16]
67Zhenpeng Xu [48]
68Tianxiong Xue [1] [3]
69Yibo Xue [38] [50] [53]
70Guomin Yang [51] [52]
71Wenbin Yao [25]
72Hongliang Yu [33]
73Liangjun Zang [54]
74Huanan Zhang [45]
75Ping Zhang [7]
76Wei Zhang [53]
77Youhui Zhang [6] [8] [12] [13] [19] [21] [22] [31] [34] [35] [36] [55]
78Yunlong Zhao [37]
79Mingqing Zheng [42]
80Weimin Zheng [8] [9] [10] [13] [18] [19] [20] [21] [22] [23] [24] [25] [27] [33] [36] [40] [49] [56]
81Yao Zhu [54]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)