dblp.uni-trier.dewww.uni-trier.de

Ke Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
147EENoman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung: Privacy-preserving data mashup. EDBT 2009: 228-239
146EEKe Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong: FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139
145EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061
144EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu: Preserving Individual Privacy in Serial Data Publishing CoRR abs/0903.0682: (2009)
143EERaymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009)
2008
142EEWei Cheng, Ke Wang, Xiuying Zhang: A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. CSSE (4) 2008: 190-193
141EEBenjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Anonymity for continuous data publishing. EDBT 2008: 264-275
140EEXinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen: OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667
139EEYabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114
138EEKe Wang, James Nga-Kwok Liu, Weimin Ma: A Study on the Reliability of Case-Based Reasoning Systems. ICDM Workshops 2008: 60-68
137EEBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51
136EEYabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu: Anonymizing transaction databases for publication. KDD 2008: 767-775
135EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008)
134EEWeimin Ma, Shao-Hua Tang, Ke Wang: Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties. IJPRAI 22(1): 195-206 (2008)
2007
133EEWeimin Ma, Ting Gao, Ke Wang: On the On-Line k -Taxi Problem with Limited Look Ahead. COCOA 2007: 72-80
132EERong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88
131EEWeimin Ma, Ke Wang: On the On-Line Weighted k-Taxi Problem. ESCAPE 2007: 152-162
130EEKe Wang, Wei Wang, Yan Zhuang: Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. ISNN (1) 2007: 834-842
129EERaymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Mining favorable facets. KDD 2007: 804-813
128EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Summarizing Review Scores of "Unequal" Reviewers. SDM 2007
127EEJian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang: Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5
126EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554
125EEYabo Xu, Ke Wang, Benyu Zhang, Zheng Chen: Privacy-enhancing personalized web search. WWW 2007: 591-600
124EELing Bai, Ke Wang: A diffusive single-species model with periodic coefficients and its optimal harvesting policy. Applied Mathematics and Computation 187(2): 873-882 (2007)
123EETao Jiang, Ah-Hwee Tan, Ke Wang: Mining Generalized Associations of Semantic Relations from Textual Web Content. IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007)
122EEBenjamin C. M. Fung, Ke Wang, Philip S. Yu: Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007)
121EEKe Wang, Chuanhua You: A note on identifying generalized diagonally dominant matrices. Int. J. Comput. Math. 84(12): 1863-1870 (2007)
120EEKe Wang, Benjamin C. M. Fung, Philip S. Yu: Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007)
119EEMoonjung Cho, Jian Pei, Ke Wang: Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007)
2006
118 Ke Wang, Yabo Xu, Rong She, Philip S. Yu: Classification Spanning Private Databases. AAAI 2006
117EEHuiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu: A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003
116EEYabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei: Classification spanning correlated data streams. CIKM 2006: 132-141
115EEKe Wang, Yuelong Jiang, Alexander Tuzhilin: Mining Actionable Patterns by Role Models. ICDE 2006: 16
114EEYi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang: Direct Marketing When There Are Voluntary Buyers. ICDM 2006: 922-927
113EEKe Wang, James N. K. Liu, Weimin Ma: Mining the Most Reliable Association Rules with Composite Items. ICDM Workshops 2006: 749-754
112EEZhao Xu, Ke Wang, Xiao-hua Qiao: Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. IIH-MSP 2006: 41-46
111EEZhao Xu, Ke Wang, Xiao-hua Qiao: A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. IIH-MSP 2006: 59-62
110EEWeimin Ma, Ke Wang: On the On-Line k-Truck Problem with Benefit Maximization. ISAAC 2006: 660-669
109EEKe Wang, Benjamin C. M. Fung: Anonymizing sequential releases. KDD 2006: 414-423
108EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630
107EERaymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759
106EEKe Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248
105EENiels Provos, Joe McClain, Ke Wang: Search worms. WORM 2006: 1-8
104EEKe Wang, Weiwei, Yiying Tong, Mathieu Desbrun, Peter Schröder: Edge subdivision schemes and the construction of smooth vector fields. ACM Trans. Graph. 25(3): 1041-1048 (2006)
103EESalvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
102EEBing Zheng, Ke Wang: On accelerate overrelaxation methods for rank deficient linear systems. Applied Mathematics and Computation 173(2): 951-959 (2006)
101EEKe Wang, Bing Zheng: Symmetric successive overrelaxation methods for fuzzy linear systems. Applied Mathematics and Computation 175(2): 891-901 (2006)
100EEBing Zheng, Ke Wang: General fuzzy linear systems. Applied Mathematics and Computation 181(2): 1276-1286 (2006)
99EEKe Wang, Bing Zheng: Inconsistent fuzzy linear systems. Applied Mathematics and Computation 181(2): 973-981 (2006)
98EEBing Zheng, Ke Wang: Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. Applied Mathematics and Computation 182(2): 1709-1713 (2006)
97EEJian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu: Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006)
96EEIrene Pekerskaya, Jian Pei, Ke Wang: Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006)
2005
95EEBenjamin C. M. Fung, Ke Wang, Philip S. Yu: Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216
94EEKe Wang, Benjamin C. M. Fung, Philip S. Yu: Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473
93EEAda Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang: Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616
92EEYuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu: Mining Patterns That Respond to Actions. ICDM 2005: 669-672
91EEJian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang: Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756
90EEKe Wang, Benjamin C. M. Fung, Guozhu Dong: Integrating Private Databases for Data Analysis. ISI 2005: 171-182
89EESalvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
88EEKe Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246
87EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
86 Ke Wang, Yabo Xu, Philip S. Yu, Rong She: Building Decision Trees on Records Linked through Key References. SDM 2005
85 Rong She, Ke Wang, Yabo Xu, Philip S. Yu: Pushing Feature Selection Ahead Of Join. SDM 2005
84EEDouglas A. Bodner, Ke Wang, Sheng Xu: Advanced decision logic in simulation of material flow processing networks. Winter Simulation Conference 2005: 1359-1366
83EEKe Wang, Sheng Xu, Leon F. McGinnis: Time management in distributed factory simulation, a case study using HLA. Winter Simulation Conference 2005: 1781-1786
82EEBing Zheng, Ke Wang: Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. Applied Mathematics and Computation 169(2): 1305-1323 (2005)
81EEFengying Wei, Ke Wang: Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. Applied Mathematics and Computation 170(2): 994-998 (2005)
80EELing Bai, Ke Wang: Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. Applied Mathematics and Computation 171(1): 531-546 (2005)
79EEKe Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung: Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005)
78EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005)
77EESenqiang Zhou, Ke Wang: Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005)
76EEKe Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005)
2004
75EEKe Wang, Yabo Xu, Jeffrey Xu Yu: Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187
74EERui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie: Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. CSB 2004: 152-160
73EEKe Wang, Philip S. Yu, Sourav Chakraborty: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256
72EELi-bao Zhang, Ke Wang: Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. MIAR 2004: 86-93
71EELi-bao Zhang, Ke Wang: New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. NPC 2004: 513-516
70EEKe Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222
69EEQiang Yang, Ian Tian Yi Li, Ke Wang: Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004)
68EEGuozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou: Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004)
2003
67EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
66EEKe Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302
65EEKe Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang: Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740
64EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378
63EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
62EEKe Wang, Yuelong Jiang, Laks V. S. Lakshmanan: Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255
61EERong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman: Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445
60EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81
59EEBenjamin C. M. Fung, Ke Wang, Martin Ester: Hierarchical Document Clustering using Frequent Itemsets. SDM 2003
58EEKe Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu: Mining Changes of Classification by Correspondence Tracing. SDM 2003
57EEChang-Jian Zhao, Lokenath Debnath, Ke Wang: Positive periodic solutions of a delayed model in population. Appl. Math. Lett. 16(4): 561-565 (2003)
56EEQiang Yang, Tianyiian Li, Ke Wang: Web-Log Cleaning for Constructing Sequential Classifiers. Applied Artificial Intelligence 17(5-6): 431-441 (2003)
55EEKe Wang, Yu He, Jiawei Han: Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003)
54 Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman: PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Research 31(13): 3613-3617 (2003)
2002
53EEKe Wang, Senqiang Zhou, Jiawei Han: Profit Mining: From Patterns to Actions. EDBT 2002: 70-87
52EEEric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang: Mining Association Rules from Stars. ICDM 2002: 322-329
51EEJunqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han: Mining frequent item sets by opportunistic projection. KDD 2002: 229-238
50EEKe Wang, Ming-Yen Thomas Su: Item selection by "hub-authority" profit ranking. KDD 2002: 652-657
49EEKe Wang, Liu Tang, Jiawei Han, Junqiang Liu: Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340
48EEEmin Gün Sirer, Ke Wang: An access control language for web services. SACMAT 2002: 23-30
47EEGao Cong, Lan Yi, Bing Liu, Ke Wang: Discovering Frequent Substructures from Hierarchical Semi-structured Data. SDM 2002
46EEJiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang: CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626
2001
45 Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal: Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88
44 Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin: Mining Confident Rules Without Support Requirement. CIKM 2001: 89-96
43EESonny Han Seng Chee, Jiawei Han, Ke Wang: RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151
42EEKe Wang, Yu He: User-Defined Association Mining. PAKDD 2001: 387-399
41EEJiawei Han, Jian Pei, Guozhu Dong, Ke Wang: Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12
40EEGuozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang: Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330
39EEIan Tian Yi Li, Qiang Yang, Ke Wang: Classification Pruning for Web-request Prediction. WWW Posters 2001
2000
38EEKe Wang, Senqiang Zhou, Yu He: Growing decision trees on support-less association rules. KDD 2000: 265-269
37EEKe Wang, Yu He, Jiawei Han: Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52
36EEWeining Zhang, Ke Wang: An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000)
35EEKe Wang, Huiqing Liu: Discovering Structural Association of Semistructured Data. IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000)
1999
34EEKe Wang, Chu Xu, Bing Liu: Clustering Transactions Using Large Items. CIKM 1999: 483-490
33EEKe Wang, Beng Chin Ooi, Sam Yuan Sung: P-Tree: A B-Tree Index for Lists. DASFAA 1999: 221-228
32EEBing Liu, Wynne Hsu, Ke Wang, Shu Chen: Visually Aided Exploration of Interesting Association Rules. PAKDD 1999: 380-389
31EEKe Wang, Senqiang Zhou, Shiang Chen Liew: Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374
1998
30 Ke Wang, Soon Hock William Tay, Bing Liu: Interestingness-Based Interval Merger for Numeric Association Rules. KDD 1998: 121-128
29 Bing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi: Using Decision Tree Induction for Discovering Holes in Data. PRICAI 1998: 182-193
28 Ke Wang, Bing Liu: Concurrent Discretization of Multiple Attributes. PRICAI 1998: 250-259
27EEKe Wang, Huiqing Liu: Discovering Typical Structures of Documents: A Road Map Approach. SIGIR 1998: 146-154
26 Wang Chiew Tan, Ke Wang, Limsoon Wong: A Graphical Interface to Genome Multidatabases. J. Database Manag. 9(1): 24-32 (1998)
1997
25 Ke Wang: Mining Association Patterns from Nested Databases. DMKD 1997: 0-
24 Ke Wang, Han Chong Goh: Minimum Splits Based Discretization for Continuous Features. IJCAI (2) 1997: 942-951
23 Ke Wang, Huiqing Liu: Schema Discovery for Semistructured Data. KDD 1997: 271-274
22 Ke Wang, Suman Sundaresh: Selecting Features by Vertical Compactness of Data. KDD 1997: 275-278
21 Ke Wang, Weining Zhang, Siu-Cheung Chau: Weakly Independent Database Schemes. Acta Inf. 34(1): 1-22 (1997)
20 Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data. J. Intell. Inf. Syst. 9(1): 33-56 (1997)
1996
19 Wang Chiew Tan, Ke Wang, Limsoon Wong: QUICK: Graphical User Interface to Multiple Databases. DEXA Workshop 1996: 404-409
1995
18EEKe Wang: Some Positive Results for Boundedness of Multiple Recursive Rules. ICDT 1995: 383-396
17EEWeining Zhang, Ke Wang, Siu-Cheung Chau: Data Partition and Parallel Evaluation of Datalog Programs. IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995)
16EEKe Wang, Weining Zhang, Siu-Cheung Chau: Decomposition of Magic Rewriting. J. ACM 42(2): 329-381 (1995)
1994
15EEKe Wang, Li-Yan Yuan: First-Order Logic Characterization of Program Properties. IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994)
1993
14 Ke Wang, Weining Zhang, Siu-Cheung Chau: Minimize Linear Mutual Recursion by Rule Unfolding. ICCI 1993: 98-102
13 Héctor J. Hernández, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes. SIAM J. Comput. 22(1): 29-45 (1993)
1992
12 Ke Wang, Li-Yan Yuan: Enforce Constraints in Archival Databases. ICCI 1992: 397-400
11EEKe Wang, Marc H. Graham: Constant-Time Maintainability: A Generalization of Independence. ACM Trans. Database Syst. 17(2): 201-246 (1992)
10 Ke Wang, Li-Yan Yuan: Preservation of Integrity Constraints in Definite DATALOG Programs. Inf. Process. Lett. 44(4): 185-193 (1992)
9 Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies. Theor. Comput. Sci. 100(2): 347-364 (1992)
1991
8 Ke Wang, Li-Yan Yuan: Incremental Database Design Revisited. ICCI 1991: 219-230
7EEKe Wang, Li-Yan Yuan: First-Order Logic Reducible Programs. ICDE 1991: 746-755
6EEWeining Zhang, Ke Wang, Siu-Cheung Chau: Data partition: A Practical Parallel Evaluation of Datalog Programs. PDIS 1991: 98-105
1990
5EEKe Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. SIGMOD Conference 1990: 74-83
4EEMarc H. Graham, Ke Wang: On the Equivalence of an Egd to a Set of Fd's J. ACM 37(3): 474-490 (1990)
1989
3EEKe Wang: Can Constant-time Maintainability Be More Practical? PODS 1989: 120-127
1986
2EEMarc H. Graham, Ke Wang: Constant Time Maintenance or The Triumph of the fd. PODS 1986: 202-216
1984
1 In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. IEEE Trans. Computers 33(10): 906-911 (1984)

Coauthor Index

1Ling Bai [80] [124]
2Douglas A. Bodner [84]
3Fiona S. L. Brinkman [54] [61]
4Linh H. Bui [89]
5Sourav Chakraborty [73]
6Siu-Cheung Chau [6] [14] [16] [17] [21]
7Sonny Han Seng Chee [43]
8Nansheng Chen [140]
9Qiming Chen [45]
10Shu Chen [32]
11Zheng Chen [125]
12Fei Chen [61]
13Wei Cheng [142]
14David Wai-Lok Cheung (David W. Cheung) [44]
15Francis Y. L. Chin [44]
16Moonjung Cho [119]
17Gao Cong [47]
18Gabriela F. Cretu [88]
19Umeshwar Dayal [45]
20Mourad Debbabi [137]
21Lokenath Debnath [57]
22Mathieu Desbrun [104]
23Leslie J. Deutsch [1]
24Guozhu Dong [40] [41] [46] [66] [68] [76] [90]
25Martin Ester [54] [59] [61]
26Katalin de Fays [54]
27Ryan Ferster [89]
28Yoav Freund [74]
29Ada Wai-Chee Fu [52] [58] [64] [78] [92] [93] [107] [116] [126] [129] [132] [136] [139] [141] [143] [144] [146]
30Benjamin C. M. Fung [59] [90] [94] [95] [109] [120] [122] [137] [139] [141] [147]
31Ting Gao [133]
32Jennifer L. Gardy [54] [61]
33Han Chong Goh [24]
34Marc H. Graham [2] [4] [11]
35Jiawei Han [37] [40] [41] [43] [45] [46] [49] [51] [53] [55] [66] [68] [76]
36Yu He [37] [38] [42] [44] [55]
37Héctor J. Hernández [13]
38Shlomo Hershkop [60] [63] [67] [89] [103]
39In-Shek Hsu [1]
40Wynne Hsu [32]
41Chia-Wei Hu [60] [63] [103]
42Sujun Hua [54]
43Patrick C. K. Hung [147]
44Eugene Ie [74]
45Tao Jiang [123]
46Yuelong Jiang [62] [66] [76] [92] [115]
47Angelos D. Keromytis [87]
48Rui Kuang [74]
49Yi-Ting Lai [114]
50Laks V. S. Lakshmanan (V. S. Lakshmanan) [62]
51Joyce M. W. Lam [40] [68]
52Christophe G. Lambert [54]
53Ying Lan [117]
54Hady Wirawan Lauw [108] [128] [135] [145]
55Christina S. Leslie [74]
56Ian Tian Yi Li [39] [69]
57Jiuyong Li [107]
58Tianyiian Li [56]
59Wei-Jen Li [103]
60Shiang Chen Liew [31]
61Ee-Peng Lim [108] [128] [135] [145]
62Daymond Ling [114]
63Bing Liu [28] [29] [30] [32] [34] [47]
64Daxin Liu [117]
65Huiqing Liu [23] [27] [35]
66James Nga-Kwok Liu (James N. K. Liu) [113] [138]
67Jia Liu [144]
68Jian Liu [91] [97]
69Junqiang Liu [49] [51]
70Michael E. Locasto [87]
71Weimin Ma [110] [113] [131] [133] [134] [138]
72Joe McClain [105]
73Leon F. McGinnis [83]
74Noman Mohammed [147]
75Lai-Fun Mun [29]
76Kenta Nakai [54]
77Matthew J. Nesbitt [140]
78Eric Ka Ka Ng [52]
79Olivier Nimeskern [60] [63] [67] [103]
80Beng Chin Ooi [33]
81Yunhe Pan [51]
82Janak J. Parekh [106]
83Jian Pei [40] [41] [45] [46] [68] [91] [96] [97] [116] [119] [126] [127] [129] [139] [140] [141] [143]
84Irene Pekerskaya [96]
85Helen Pinto [45]
86Niels Provos [105]
87Xin-Zhi Qi [29]
88Xiao-hua Qiao [111] [112]
89Irving S. Reed [1]
90Peter Schröder [104]
91Rong She [61] [85] [86] [116] [118] [132]
92Hua Shi [114]
93Mahira Siddiqi [74]
94István Simon [54]
95Emin Gün Sirer [48]
96Cory Spencer [54]
97Salvatore J. Stolfo [60] [63] [67] [70] [87] [88] [89] [103] [106]
98Ming-Yen Thomas Su [50]
99Suman Sundaresh [22]
100Sam Yuan Sung [33]
101Ah-Hwee Tan [123]
102Wang Chiew Tan [19] [26]
103Liu Tang [49]
104Shao-Hua Tang [134]
105Soon Hock William Tay [30]
106Yiying Tong [104]
107Trieu-Kien Truong [1]
108Gábor E. Tusnády [54]
109Alexander Tuzhilin [92] [115]
110Ismael A. Vergara [140]
111Gaofei Wang [117]
112Haixun Wang [91] [97]
113Huiqiang Wang [117]
114Jianyong Wang [46] [91] [97]
115Kai Wang [74]
116Lingyu Wang [137]
117Wei Wang [127] [130]
118Zhibin Wang [127]
119Fengying Wei [81]
120 Weiwei [104]
121Limsoon Wong [19] [26]
122Raymond Chi-Wing Wong [64] [78] [93] [107] [126] [129] [143] [144] [146]
123Chu Xu [34]
124Jian Xu [127]
125Sheng Xu [83] [84]
126Yabo Xu [75] [85] [86] [116] [118] [125] [132] [136] [139] [144] [146]
127Zhao Xu [111] [112]
128Qiang Yang [39] [56] [65] [69] [79]
129Chiunn-Shyong Ye [1]
130Jack Man Shun Yeung [65] [79]
131Lan Yi [47]
132Chuanhua You [121]
133Jeffrey Xu Yu [58] [66] [75] [76]
134Philip S. Yu [73] [85] [86] [91] [94] [95] [97] [118] [120] [122] [136]
135Li-Yan Yuan [7] [8] [10] [12] [15]
136Xinghuo Zeng [140]
137Benyu Zhang [125]
138Jason Zhang [114]
139Li-bao Zhang [71] [72]
140Weining Zhang [6] [14] [16] [17] [21] [36]
141Xiuying Zhang [142]
142Chang-Jian Zhao [57]
143Bing Zheng [82] [98] [99] [100] [101] [102]
144Senqiang Zhou [31] [38] [53] [58] [65] [77] [79]
145Yan Zhuang [130]
146Wei Zou [68]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)