2009 |
147 | EE | Noman Mohammed,
Benjamin C. M. Fung,
Ke Wang,
Patrick C. K. Hung:
Privacy-preserving data mashup.
EDBT 2009: 228-239 |
146 | EE | Ke Wang,
Yabo Xu,
Ada Wai-Chee Fu,
Raymond Chi-Wing Wong:
FF-Anonymity: When Quasi-identifiers Are Missing.
ICDE 2009: 1136-1139 |
145 | EE | Hady Wirawan Lauw,
Ee-Peng Lim,
Ke Wang:
On Mining Rating Dependencies in Online Collaborative Rating Networks.
PAKDD 2009: 1054-1061 |
144 | EE | Raymond Chi-Wing Wong,
Ada Wai-Chee Fu,
Jia Liu,
Ke Wang,
Yabo Xu:
Preserving Individual Privacy in Serial Data Publishing
CoRR abs/0903.0682: (2009) |
143 | EE | Raymond Chi-Wing Wong,
Jian Pei,
Ada Wai-Chee Fu,
Ke Wang:
Online Skyline Analysis with Dynamic Preferences on Nominal Attributes.
IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009) |
2008 |
142 | EE | Wei Cheng,
Ke Wang,
Xiuying Zhang:
A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China.
CSSE (4) 2008: 190-193 |
141 | EE | Benjamin C. M. Fung,
Ke Wang,
Ada Wai-Chee Fu,
Jian Pei:
Anonymity for continuous data publishing.
EDBT 2008: 264-275 |
140 | EE | Xinghuo Zeng,
Matthew J. Nesbitt,
Jian Pei,
Ke Wang,
Ismael A. Vergara,
Nansheng Chen:
OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics.
EDBT 2008: 656-667 |
139 | EE | Yabo Xu,
Benjamin C. M. Fung,
Ke Wang,
Ada Wai-Chee Fu,
Jian Pei:
Publishing Sensitive Transactions for Itemset Utility.
ICDM 2008: 1109-1114 |
138 | EE | Ke Wang,
James Nga-Kwok Liu,
Weimin Ma:
A Study on the Reliability of Case-Based Reasoning Systems.
ICDM Workshops 2008: 60-68 |
137 | EE | Benjamin C. M. Fung,
Ke Wang,
Lingyu Wang,
Mourad Debbabi:
A framework for privacy-preserving cluster analysis.
ISI 2008: 46-51 |
136 | EE | Yabo Xu,
Ke Wang,
Ada Wai-Chee Fu,
Philip S. Yu:
Anonymizing transaction databases for publication.
KDD 2008: 767-775 |
135 | EE | Hady Wirawan Lauw,
Ee-Peng Lim,
Ke Wang:
Bias and Controversy in Evaluation Systems.
IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008) |
134 | EE | Weimin Ma,
Shao-Hua Tang,
Ke Wang:
Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties.
IJPRAI 22(1): 195-206 (2008) |
2007 |
133 | EE | Weimin Ma,
Ting Gao,
Ke Wang:
On the On-Line k -Taxi Problem with Limited Look Ahead.
COCOA 2007: 72-80 |
132 | EE | Rong She,
Ke Wang,
Ada Wai-Chee Fu,
Yabo Xu:
Computing Join Aggregates over Private Tables.
DaWaK 2007: 78-88 |
131 | EE | Weimin Ma,
Ke Wang:
On the On-Line Weighted k-Taxi Problem.
ESCAPE 2007: 152-162 |
130 | EE | Ke Wang,
Wei Wang,
Yan Zhuang:
Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network.
ISNN (1) 2007: 834-842 |
129 | EE | Raymond Chi-Wing Wong,
Jian Pei,
Ada Wai-Chee Fu,
Ke Wang:
Mining favorable facets.
KDD 2007: 804-813 |
128 | EE | Hady Wirawan Lauw,
Ee-Peng Lim,
Ke Wang:
Summarizing Review Scores of "Unequal" Reviewers.
SDM 2007 |
127 | EE | Jian Pei,
Jian Xu,
Zhibin Wang,
Wei Wang,
Ke Wang:
Maintaining K-Anonymity against Incremental Updates.
SSDBM 2007: 5 |
126 | EE | Raymond Chi-Wing Wong,
Ada Wai-Chee Fu,
Ke Wang,
Jian Pei:
Minimality Attack in Privacy Preserving Data Publishing.
VLDB 2007: 543-554 |
125 | EE | Yabo Xu,
Ke Wang,
Benyu Zhang,
Zheng Chen:
Privacy-enhancing personalized web search.
WWW 2007: 591-600 |
124 | EE | Ling Bai,
Ke Wang:
A diffusive single-species model with periodic coefficients and its optimal harvesting policy.
Applied Mathematics and Computation 187(2): 873-882 (2007) |
123 | EE | Tao Jiang,
Ah-Hwee Tan,
Ke Wang:
Mining Generalized Associations of Semantic Relations from Textual Web Content.
IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007) |
122 | EE | Benjamin C. M. Fung,
Ke Wang,
Philip S. Yu:
Anonymizing Classification Data for Privacy Preservation.
IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) |
121 | EE | Ke Wang,
Chuanhua You:
A note on identifying generalized diagonally dominant matrices.
Int. J. Comput. Math. 84(12): 1863-1870 (2007) |
120 | EE | Ke Wang,
Benjamin C. M. Fung,
Philip S. Yu:
Handicapping attacker's confidence: an alternative to k -anonymization.
Knowl. Inf. Syst. 11(3): 345-368 (2007) |
119 | EE | Moonjung Cho,
Jian Pei,
Ke Wang:
Answering ad hoc aggregate queries from data streams using prefix aggregate trees.
Knowl. Inf. Syst. 12(3): 301-329 (2007) |
2006 |
118 | | Ke Wang,
Yabo Xu,
Rong She,
Philip S. Yu:
Classification Spanning Private Databases.
AAAI 2006 |
117 | EE | Huiqiang Wang,
Gaofei Wang,
Ying Lan,
Ke Wang,
Daxin Liu:
A New Automatic Intrusion Response Taxonomy and Its Application.
APWeb Workshops 2006: 999-1003 |
116 | EE | Yabo Xu,
Ke Wang,
Ada Wai-Chee Fu,
Rong She,
Jian Pei:
Classification spanning correlated data streams.
CIKM 2006: 132-141 |
115 | EE | Ke Wang,
Yuelong Jiang,
Alexander Tuzhilin:
Mining Actionable Patterns by Role Models.
ICDE 2006: 16 |
114 | EE | Yi-Ting Lai,
Ke Wang,
Daymond Ling,
Hua Shi,
Jason Zhang:
Direct Marketing When There Are Voluntary Buyers.
ICDM 2006: 922-927 |
113 | EE | Ke Wang,
James N. K. Liu,
Weimin Ma:
Mining the Most Reliable Association Rules with Composite Items.
ICDM Workshops 2006: 749-754 |
112 | EE | Zhao Xu,
Ke Wang,
Xiao-hua Qiao:
Digital Audio Watermarking Algorithm Based on Quantizing Coefficients.
IIH-MSP 2006: 41-46 |
111 | EE | Zhao Xu,
Ke Wang,
Xiao-hua Qiao:
A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis.
IIH-MSP 2006: 59-62 |
110 | EE | Weimin Ma,
Ke Wang:
On the On-Line k-Truck Problem with Benefit Maximization.
ISAAC 2006: 660-669 |
109 | EE | Ke Wang,
Benjamin C. M. Fung:
Anonymizing sequential releases.
KDD 2006: 414-423 |
108 | EE | Hady Wirawan Lauw,
Ee-Peng Lim,
Ke Wang:
Bias and controversy: beyond the statistical deviation.
KDD 2006: 625-630 |
107 | EE | Raymond Chi-Wing Wong,
Jiuyong Li,
Ada Wai-Chee Fu,
Ke Wang:
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing.
KDD 2006: 754-759 |
106 | EE | Ke Wang,
Janak J. Parekh,
Salvatore J. Stolfo:
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.
RAID 2006: 226-248 |
105 | EE | Niels Provos,
Joe McClain,
Ke Wang:
Search worms.
WORM 2006: 1-8 |
104 | EE | Ke Wang,
Weiwei,
Yiying Tong,
Mathieu Desbrun,
Peter Schröder:
Edge subdivision schemes and the construction of smooth vector fields.
ACM Trans. Graph. 25(3): 1041-1048 (2006) |
103 | EE | Salvatore J. Stolfo,
Shlomo Hershkop,
Chia-Wei Hu,
Wei-Jen Li,
Olivier Nimeskern,
Ke Wang:
Behavior-based modeling and its application to Email analysis.
ACM Trans. Internet Techn. 6(2): 187-221 (2006) |
102 | EE | Bing Zheng,
Ke Wang:
On accelerate overrelaxation methods for rank deficient linear systems.
Applied Mathematics and Computation 173(2): 951-959 (2006) |
101 | EE | Ke Wang,
Bing Zheng:
Symmetric successive overrelaxation methods for fuzzy linear systems.
Applied Mathematics and Computation 175(2): 891-901 (2006) |
100 | EE | Bing Zheng,
Ke Wang:
General fuzzy linear systems.
Applied Mathematics and Computation 181(2): 1276-1286 (2006) |
99 | EE | Ke Wang,
Bing Zheng:
Inconsistent fuzzy linear systems.
Applied Mathematics and Computation 181(2): 973-981 (2006) |
98 | EE | Bing Zheng,
Ke Wang:
Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420].
Applied Mathematics and Computation 182(2): 1709-1713 (2006) |
97 | EE | Jian Pei,
Haixun Wang,
Jian Liu,
Ke Wang,
Jianyong Wang,
Philip S. Yu:
Discovering Frequent Closed Partial Orders from Strings.
IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006) |
96 | EE | Irene Pekerskaya,
Jian Pei,
Ke Wang:
Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach.
J. Intell. Inf. Syst. 27(3): 215-242 (2006) |
2005 |
95 | EE | Benjamin C. M. Fung,
Ke Wang,
Philip S. Yu:
Top-Down Specialization for Information and Privacy Preservation.
ICDE 2005: 205-216 |
94 | EE | Ke Wang,
Benjamin C. M. Fung,
Philip S. Yu:
Template-Based Privacy Preservation in Classification Problems.
ICDM 2005: 466-473 |
93 | EE | Ada Wai-Chee Fu,
Raymond Chi-Wing Wong,
Ke Wang:
Privacy-Preserving Frequent Pattern Mining across Private Databases.
ICDM 2005: 613-616 |
92 | EE | Yuelong Jiang,
Ke Wang,
Alexander Tuzhilin,
Ada Wai-Chee Fu:
Mining Patterns That Respond to Actions.
ICDM 2005: 669-672 |
91 | EE | Jian Pei,
Jian Liu,
Haixun Wang,
Ke Wang,
Philip S. Yu,
Jianyong Wang:
Efficiently Mining Frequent Closed Partial Orders.
ICDM 2005: 753-756 |
90 | EE | Ke Wang,
Benjamin C. M. Fung,
Guozhu Dong:
Integrating Private Databases for Data Analysis.
ISI 2005: 171-182 |
89 | EE | Salvatore J. Stolfo,
Shlomo Hershkop,
Linh H. Bui,
Ryan Ferster,
Ke Wang:
Anomaly Detection in Computer Security and an Application to File System Accesses.
ISMIS 2005: 14-28 |
88 | EE | Ke Wang,
Gabriela F. Cretu,
Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation.
RAID 2005: 227-246 |
87 | EE | Michael E. Locasto,
Ke Wang,
Angelos D. Keromytis,
Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention.
RAID 2005: 82-101 |
86 | | Ke Wang,
Yabo Xu,
Philip S. Yu,
Rong She:
Building Decision Trees on Records Linked through Key References.
SDM 2005 |
85 | | Rong She,
Ke Wang,
Yabo Xu,
Philip S. Yu:
Pushing Feature Selection Ahead Of Join.
SDM 2005 |
84 | EE | Douglas A. Bodner,
Ke Wang,
Sheng Xu:
Advanced decision logic in simulation of material flow processing networks.
Winter Simulation Conference 2005: 1359-1366 |
83 | EE | Ke Wang,
Sheng Xu,
Leon F. McGinnis:
Time management in distributed factory simulation, a case study using HLA.
Winter Simulation Conference 2005: 1781-1786 |
82 | EE | Bing Zheng,
Ke Wang:
Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem.
Applied Mathematics and Computation 169(2): 1305-1323 (2005) |
81 | EE | Fengying Wei,
Ke Wang:
Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response.
Applied Mathematics and Computation 170(2): 994-998 (2005) |
80 | EE | Ling Bai,
Ke Wang:
Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy.
Applied Mathematics and Computation 171(1): 531-546 (2005) |
79 | EE | Ke Wang,
Senqiang Zhou,
Qiang Yang,
Jack Man Shun Yeung:
Mining Customer Value: From Association Rules to Direct Marketing.
Data Min. Knowl. Discov. 11(1): 57-79 (2005) |
78 | EE | Raymond Chi-Wing Wong,
Ada Wai-Chee Fu,
Ke Wang:
Data Mining for Inventory Item Selection with Cross-Selling Considerations.
Data Min. Knowl. Discov. 11(1): 81-112 (2005) |
77 | EE | Senqiang Zhou,
Ke Wang:
Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification.
IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005) |
76 | EE | Ke Wang,
Yuelong Jiang,
Jeffrey Xu Yu,
Guozhu Dong,
Jiawei Han:
Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining.
IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005) |
2004 |
75 | EE | Ke Wang,
Yabo Xu,
Jeffrey Xu Yu:
Scalable sequential pattern mining for biological sequences.
CIKM 2004: 178-187 |
74 | EE | Rui Kuang,
Eugene Ie,
Ke Wang,
Kai Wang,
Mahira Siddiqi,
Yoav Freund,
Christina S. Leslie:
Profile-Based String Kernels for Remote Homology Detection and Motif Extraction.
CSB 2004: 152-160 |
73 | EE | Ke Wang,
Philip S. Yu,
Sourav Chakraborty:
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection.
ICDM 2004: 249-256 |
72 | EE | Li-bao Zhang,
Ke Wang:
Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition.
MIAR 2004: 86-93 |
71 | EE | Li-bao Zhang,
Ke Wang:
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications.
NPC 2004: 513-516 |
70 | EE | Ke Wang,
Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection.
RAID 2004: 203-222 |
69 | EE | Qiang Yang,
Ian Tian Yi Li,
Ke Wang:
Building Association-Rule Based Sequential Classifiers for Web-Document Prediction.
Data Min. Knowl. Discov. 8(3): 253-273 (2004) |
68 | EE | Guozhu Dong,
Jiawei Han,
Joyce M. W. Lam,
Jian Pei,
Ke Wang,
Wei Zou:
Mining Constrained Gradients in Large Databases.
IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004) |
2003 |
67 | EE | Salvatore J. Stolfo,
Shlomo Hershkop,
Ke Wang,
Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email.
DISCEX (2) 2003: 290- |
66 | EE | Ke Wang,
Yuelong Jiang,
Jeffrey Xu Yu,
Guozhu Dong,
Jiawei Han:
Pushing Aggregate Constraints by Divide-and-Approximate.
ICDE 2003: 291-302 |
65 | EE | Ke Wang,
Senqiang Zhou,
Jack Man Shun Yeung,
Qiang Yang:
Mining Customer Value: From Association Rules to Direct Marketing.
ICDE 2003: 738-740 |
64 | EE | Raymond Chi-Wing Wong,
Ada Wai-Chee Fu,
Ke Wang:
MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations.
ICDM 2003: 371-378 |
63 | EE | Salvatore J. Stolfo,
Shlomo Hershkop,
Ke Wang,
Olivier Nimeskern,
Chia-Wei Hu:
Behavior Profiling of Email.
ISI 2003: 74-90 |
62 | EE | Ke Wang,
Yuelong Jiang,
Laks V. S. Lakshmanan:
Mining unexpected rules by pushing user dynamics.
KDD 2003: 246-255 |
61 | EE | Rong She,
Fei Chen,
Ke Wang,
Martin Ester,
Jennifer L. Gardy,
Fiona S. L. Brinkman:
Frequent-subsequence-based prediction of outer membrane proteins.
KDD 2003: 436-445 |
60 | EE | Salvatore J. Stolfo,
Shlomo Hershkop,
Ke Wang,
Olivier Nimeskern,
Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems.
MMM-ACNS 2003: 57-81 |
59 | EE | Benjamin C. M. Fung,
Ke Wang,
Martin Ester:
Hierarchical Document Clustering using Frequent Itemsets.
SDM 2003 |
58 | EE | Ke Wang,
Senqiang Zhou,
Ada Wai-Chee Fu,
Jeffrey Xu Yu:
Mining Changes of Classification by Correspondence Tracing.
SDM 2003 |
57 | EE | Chang-Jian Zhao,
Lokenath Debnath,
Ke Wang:
Positive periodic solutions of a delayed model in population.
Appl. Math. Lett. 16(4): 561-565 (2003) |
56 | EE | Qiang Yang,
Tianyiian Li,
Ke Wang:
Web-Log Cleaning for Constructing Sequential Classifiers.
Applied Artificial Intelligence 17(5-6): 431-441 (2003) |
55 | EE | Ke Wang,
Yu He,
Jiawei Han:
Pushing Support Constraints Into Association Rules Mining.
IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003) |
54 | | Jennifer L. Gardy,
Cory Spencer,
Ke Wang,
Martin Ester,
Gábor E. Tusnády,
István Simon,
Sujun Hua,
Katalin de Fays,
Christophe G. Lambert,
Kenta Nakai,
Fiona S. L. Brinkman:
PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria.
Nucleic Acids Research 31(13): 3613-3617 (2003) |
2002 |
53 | EE | Ke Wang,
Senqiang Zhou,
Jiawei Han:
Profit Mining: From Patterns to Actions.
EDBT 2002: 70-87 |
52 | EE | Eric Ka Ka Ng,
Ada Wai-Chee Fu,
Ke Wang:
Mining Association Rules from Stars.
ICDM 2002: 322-329 |
51 | EE | Junqiang Liu,
Yunhe Pan,
Ke Wang,
Jiawei Han:
Mining frequent item sets by opportunistic projection.
KDD 2002: 229-238 |
50 | EE | Ke Wang,
Ming-Yen Thomas Su:
Item selection by "hub-authority" profit ranking.
KDD 2002: 652-657 |
49 | EE | Ke Wang,
Liu Tang,
Jiawei Han,
Junqiang Liu:
Top Down FP-Growth for Association Rule Mining.
PAKDD 2002: 334-340 |
48 | EE | Emin Gün Sirer,
Ke Wang:
An access control language for web services.
SACMAT 2002: 23-30 |
47 | EE | Gao Cong,
Lan Yi,
Bing Liu,
Ke Wang:
Discovering Frequent Substructures from Hierarchical Semi-structured Data.
SDM 2002 |
46 | EE | Jiawei Han,
Jianyong Wang,
Guozhu Dong,
Jian Pei,
Ke Wang:
CubeExplorer: online exploration of data cubes.
SIGMOD Conference 2002: 626 |
2001 |
45 | | Helen Pinto,
Jiawei Han,
Jian Pei,
Ke Wang,
Qiming Chen,
Umeshwar Dayal:
Multi-Dimensional Sequential Pattern Mining.
CIKM 2001: 81-88 |
44 | | Ke Wang,
Yu He,
David Wai-Lok Cheung,
Francis Y. L. Chin:
Mining Confident Rules Without Support Requirement.
CIKM 2001: 89-96 |
43 | EE | Sonny Han Seng Chee,
Jiawei Han,
Ke Wang:
RecTree: An Efficient Collaborative Filtering Method.
DaWaK 2001: 141-151 |
42 | EE | Ke Wang,
Yu He:
User-Defined Association Mining.
PAKDD 2001: 387-399 |
41 | EE | Jiawei Han,
Jian Pei,
Guozhu Dong,
Ke Wang:
Efficient Computation of Iceberg Cubes with Complex Measures.
SIGMOD Conference 2001: 1-12 |
40 | EE | Guozhu Dong,
Jiawei Han,
Joyce M. W. Lam,
Jian Pei,
Ke Wang:
Mining Multi-Dimensional Constrained Gradients in Data Cubes.
VLDB 2001: 321-330 |
39 | EE | Ian Tian Yi Li,
Qiang Yang,
Ke Wang:
Classification Pruning for Web-request Prediction.
WWW Posters 2001 |
2000 |
38 | EE | Ke Wang,
Senqiang Zhou,
Yu He:
Growing decision trees on support-less association rules.
KDD 2000: 265-269 |
37 | EE | Ke Wang,
Yu He,
Jiawei Han:
Mining Frequent Itemsets Using Support Constraints.
VLDB 2000: 43-52 |
36 | EE | Weining Zhang,
Ke Wang:
An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators.
IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000) |
35 | EE | Ke Wang,
Huiqing Liu:
Discovering Structural Association of Semistructured Data.
IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000) |
1999 |
34 | EE | Ke Wang,
Chu Xu,
Bing Liu:
Clustering Transactions Using Large Items.
CIKM 1999: 483-490 |
33 | EE | Ke Wang,
Beng Chin Ooi,
Sam Yuan Sung:
P-Tree: A B-Tree Index for Lists.
DASFAA 1999: 221-228 |
32 | EE | Bing Liu,
Wynne Hsu,
Ke Wang,
Shu Chen:
Visually Aided Exploration of Interesting Association Rules.
PAKDD 1999: 380-389 |
31 | EE | Ke Wang,
Senqiang Zhou,
Shiang Chen Liew:
Building Hierarchical Classifiers Using Class Proximity.
VLDB 1999: 363-374 |
1998 |
30 | | Ke Wang,
Soon Hock William Tay,
Bing Liu:
Interestingness-Based Interval Merger for Numeric Association Rules.
KDD 1998: 121-128 |
29 | | Bing Liu,
Ke Wang,
Lai-Fun Mun,
Xin-Zhi Qi:
Using Decision Tree Induction for Discovering Holes in Data.
PRICAI 1998: 182-193 |
28 | | Ke Wang,
Bing Liu:
Concurrent Discretization of Multiple Attributes.
PRICAI 1998: 250-259 |
27 | EE | Ke Wang,
Huiqing Liu:
Discovering Typical Structures of Documents: A Road Map Approach.
SIGIR 1998: 146-154 |
26 | | Wang Chiew Tan,
Ke Wang,
Limsoon Wong:
A Graphical Interface to Genome Multidatabases.
J. Database Manag. 9(1): 24-32 (1998) |
1997 |
25 | | Ke Wang:
Mining Association Patterns from Nested Databases.
DMKD 1997: 0- |
24 | | Ke Wang,
Han Chong Goh:
Minimum Splits Based Discretization for Continuous Features.
IJCAI (2) 1997: 942-951 |
23 | | Ke Wang,
Huiqing Liu:
Schema Discovery for Semistructured Data.
KDD 1997: 271-274 |
22 | | Ke Wang,
Suman Sundaresh:
Selecting Features by Vertical Compactness of Data.
KDD 1997: 275-278 |
21 | | Ke Wang,
Weining Zhang,
Siu-Cheung Chau:
Weakly Independent Database Schemes.
Acta Inf. 34(1): 1-22 (1997) |
20 | | Ke Wang:
Discovering Patterns from Large and Dynamic Sequential Data.
J. Intell. Inf. Syst. 9(1): 33-56 (1997) |
1996 |
19 | | Wang Chiew Tan,
Ke Wang,
Limsoon Wong:
QUICK: Graphical User Interface to Multiple Databases.
DEXA Workshop 1996: 404-409 |
1995 |
18 | EE | Ke Wang:
Some Positive Results for Boundedness of Multiple Recursive Rules.
ICDT 1995: 383-396 |
17 | EE | Weining Zhang,
Ke Wang,
Siu-Cheung Chau:
Data Partition and Parallel Evaluation of Datalog Programs.
IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995) |
16 | EE | Ke Wang,
Weining Zhang,
Siu-Cheung Chau:
Decomposition of Magic Rewriting.
J. ACM 42(2): 329-381 (1995) |
1994 |
15 | EE | Ke Wang,
Li-Yan Yuan:
First-Order Logic Characterization of Program Properties.
IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994) |
1993 |
14 | | Ke Wang,
Weining Zhang,
Siu-Cheung Chau:
Minimize Linear Mutual Recursion by Rule Unfolding.
ICCI 1993: 98-102 |
13 | | Héctor J. Hernández,
Ke Wang:
On the Boundedness of Constant-Time-Maintainable Database Schemes.
SIAM J. Comput. 22(1): 29-45 (1993) |
1992 |
12 | | Ke Wang,
Li-Yan Yuan:
Enforce Constraints in Archival Databases.
ICCI 1992: 397-400 |
11 | EE | Ke Wang,
Marc H. Graham:
Constant-Time Maintainability: A Generalization of Independence.
ACM Trans. Database Syst. 17(2): 201-246 (1992) |
10 | | Ke Wang,
Li-Yan Yuan:
Preservation of Integrity Constraints in Definite DATALOG Programs.
Inf. Process. Lett. 44(4): 185-193 (1992) |
9 | | Ke Wang:
On Characterizing Boundedness of Database Schemes with Bounded Dependencies.
Theor. Comput. Sci. 100(2): 347-364 (1992) |
1991 |
8 | | Ke Wang,
Li-Yan Yuan:
Incremental Database Design Revisited.
ICCI 1991: 219-230 |
7 | EE | Ke Wang,
Li-Yan Yuan:
First-Order Logic Reducible Programs.
ICDE 1991: 746-755 |
6 | EE | Weining Zhang,
Ke Wang,
Siu-Cheung Chau:
Data partition: A Practical Parallel Evaluation of Datalog Programs.
PDIS 1991: 98-105 |
1990 |
5 | EE | Ke Wang:
Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation.
SIGMOD Conference 1990: 74-83 |
4 | EE | Marc H. Graham,
Ke Wang:
On the Equivalence of an Egd to a Set of Fd's
J. ACM 37(3): 474-490 (1990) |
1989 |
3 | EE | Ke Wang:
Can Constant-time Maintainability Be More Practical?
PODS 1989: 120-127 |
1986 |
2 | EE | Marc H. Graham,
Ke Wang:
Constant Time Maintenance or The Triumph of the fd.
PODS 1986: 202-216 |
1984 |
1 | | In-Shek Hsu,
Irving S. Reed,
Trieu-Kien Truong,
Ke Wang,
Chiunn-Shyong Ye,
Leslie J. Deutsch:
The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm.
IEEE Trans. Computers 33(10): 906-911 (1984) |