2009 | ||
---|---|---|
31 | EE | Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu: E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. PAISI 2009: 76-88 |
2008 | ||
30 | EE | Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir: Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. ARES 2008: 1234-1239 |
29 | EE | Yue Jiang, Chang-jie Tang, Haichun Zheng, Chuan Li, Yu Chen, Jiang Wu, Dong-lei Wang: Adaptive Gene Expression Programming Algorithm Based on Cloud Model. BMEI (1) 2008: 226-230 |
28 | EE | Chuan Li, Changjie Tang, Chunqiu Zeng, Jiang Wu, Yu Chen, Jiangtao Qiu, Li Dai, Jun Zhu, Yongguang Jiang: Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions. BMEI (1) 2008: 260-264 |
27 | EE | Jiang Wu, Ying-qiang Guo, Guang-fu Yin, Huai-qing Chen, Yunqing Kang: Osteoinductive Observation for BMP-2 Gene Modification of Mesenchymal Stem Cells Combined with Plasma-sprayed Hydroxyapatite Coating. BMEI (1) 2008: 755-759 |
26 | EE | Gang Yang, Haiyan Long, Jiang Wu, Hua Huang: A Novel Electrical Field Bioreactor for Wound Healing Study. BMEI (2) 2008: 548-552 |
25 | EE | Kaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir: Performance engineering of replica voting protocols for high assurance data collection systems. COMSWARE 2008: 424-433 |
24 | EE | Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, Shengzhi Li, Xun Lin, Jie Zuo: k-Anonymity via Clustering Domain Knowledge for Privacy Preservation. FSKD (4) 2008: 697-701 |
23 | EE | Jiang Wu, Douglas R. Stinson: Authorship Proof for Textual Document. Information Hiding 2008: 209-223 |
22 | EE | Jiang Wu, Douglas R. Stinson: Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. WISEC 2008: 119-124 |
21 | EE | Jiang Wu, Bin Hu: An agent-based simulation study of the dynamics of mobile viral advertising. Winter Simulation Conference 2008: 2953 |
20 | EE | Shengping Dong, Bin Hu, Jiang Wu: Modelling and simulation of team effectiveness emerged from member-task interaction. Winter Simulation Conference 2008: 914-922 |
19 | EE | Jiang Wu, Bin Hu, Jinlong Zhang, Da Fang: Multi-agent simulation of group behavior in E-Government policy decision. Simulation Modelling Practice and Theory 16(10): 1571-1587 (2008) |
2007 | ||
18 | EE | Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu You: Mobile Position Tracking by TDOA-Doppler Hybrid Estimation in Mobile Cellular System. ICC 2007: 4670-4673 |
17 | EE | Qin Huang, Jiang Wu, Chunming Zhao, Xiaohu You: Waterfilling-Like Multiplicity Assignment Algorithm for Algebraic Soft-Decision Decoding of Reed-Solomon Codes. ICC 2007: 6210-6213 |
16 | Jiang Wu, Yi Luo, D. Manivannan: An enhanced model-based checkpointing protocol. Parallel and Distributed Computing and Networks 2007: 313-318 | |
15 | EE | Jiang Wu, Bin Hu: Agent-based simulation of group-task interaction in knowledge team. SCSC 2007: 905-912 |
14 | EE | Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiao-Hu You: Doppler Location Based on Two-Dimension Searching in Orthogonal Complement Space in DAS. VTC Fall 2007: 1962-1964 |
13 | EE | Jiang Wu, Bin Hu: Modeling and simulation of group behavior in e-government implementation. Winter Simulation Conference 2007: 1284-1291 |
2006 | ||
12 | EE | Li Zhang, Chunming Zhao, Jiang Wu, Wenjin Wang: MAP based Equalizer for OFDM Systems in Time-Varying Multipath Channels. GLOBECOM 2006 |
11 | EE | Jiang Wu, D. Manivannan: An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database Systems. ICDCN 2006: 82-87 |
10 | EE | Jiang Wu, Sheldon Wang, Christine Chau, Lei Zeng, Jinsong Lin: Overseas development for a major U.S. eCommerce website. ICSE 2006: 632-635 |
9 | EE | Jiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat: Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. WOWMOM 2006: 456-458 |
8 | EE | Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat: Effective worm detection for various scan techniques. Journal of Computer Security 14(4): 359-387 (2006) |
2005 | ||
7 | EE | Jiang Wu, Ruizhong Wei: An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. Selected Areas in Cryptography 2005: 221-232 |
2004 | ||
6 | EE | Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat: An Effective Architecture and Algorithm for Detecting Worms with Various Scan. NDSS 2004 |
5 | EE | Ruizhong Wei, Jiang Wu: Product Construction of Key Distribution Schemes for Sensor Networks. Selected Areas in Cryptography 2004: 280-293 |
2002 | ||
4 | Kun Zhou, Qionghai Dai, Jiang Wu, Guihua Er: Fast tracking of semantic video object based on motion prediction and subregion extraction. ICIP (3) 2002: 621-624 | |
2000 | ||
3 | Jiang Wu, Gerald Q. Maguire Jr.: Agent Based Seamless IP Multicast Receiver Handover. PWC 2000: 213-226 | |
1993 | ||
2 | Michael Stonebraker, Jolly Chen, Nobuko Nathan, Caroline Paxson, Alan Su, Jiang Wu: Tioga: A Database-Oriented Visualization Tool. IEEE Visualization 1993: 86-93 | |
1 | EE | Michael Stonebraker, Jolly Chen, Nobuko Nathan, Caroline Paxson, Jiang Wu: Tioga: Providing Data Management Support for Scientific Visualization Applications. VLDB 1993: 25-38 |