2009 |
31 | EE | Teng Long,
Shaojie Qiao,
Changjie Tang,
Liangxu Liu,
Taiyong Li,
Jiang Wu:
E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases.
PAISI 2009: 76-88 |
2008 |
30 | EE | Kaliappa Nadar Ravindran,
Jiang Wu,
Kevin A. Kwiat,
Ali Sabbir:
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks.
ARES 2008: 1234-1239 |
29 | EE | Yue Jiang,
Chang-jie Tang,
Haichun Zheng,
Chuan Li,
Yu Chen,
Jiang Wu,
Dong-lei Wang:
Adaptive Gene Expression Programming Algorithm Based on Cloud Model.
BMEI (1) 2008: 226-230 |
28 | EE | Chuan Li,
Changjie Tang,
Chunqiu Zeng,
Jiang Wu,
Yu Chen,
Jiangtao Qiu,
Li Dai,
Jun Zhu,
Yongguang Jiang:
Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions.
BMEI (1) 2008: 260-264 |
27 | EE | Jiang Wu,
Ying-qiang Guo,
Guang-fu Yin,
Huai-qing Chen,
Yunqing Kang:
Osteoinductive Observation for BMP-2 Gene Modification of Mesenchymal Stem Cells Combined with Plasma-sprayed Hydroxyapatite Coating.
BMEI (1) 2008: 755-759 |
26 | EE | Gang Yang,
Haiyan Long,
Jiang Wu,
Hua Huang:
A Novel Electrical Field Bioreactor for Wound Healing Study.
BMEI (2) 2008: 548-552 |
25 | EE | Kaliappa Nadar Ravindran,
Jiang Wu,
Mohammad Rabby,
Kevin A. Kwiat,
Ali Sabbir:
Performance engineering of replica voting protocols for high assurance data collection systems.
COMSWARE 2008: 424-433 |
24 | EE | Taiyong Li,
Changjie Tang,
Jiang Wu,
Qian Luo,
Shengzhi Li,
Xun Lin,
Jie Zuo:
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation.
FSKD (4) 2008: 697-701 |
23 | EE | Jiang Wu,
Douglas R. Stinson:
Authorship Proof for Textual Document.
Information Hiding 2008: 209-223 |
22 | EE | Jiang Wu,
Douglas R. Stinson:
Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks.
WISEC 2008: 119-124 |
21 | EE | Jiang Wu,
Bin Hu:
An agent-based simulation study of the dynamics of mobile viral advertising.
Winter Simulation Conference 2008: 2953 |
20 | EE | Shengping Dong,
Bin Hu,
Jiang Wu:
Modelling and simulation of team effectiveness emerged from member-task interaction.
Winter Simulation Conference 2008: 914-922 |
19 | EE | Jiang Wu,
Bin Hu,
Jinlong Zhang,
Da Fang:
Multi-agent simulation of group behavior in E-Government policy decision.
Simulation Modelling Practice and Theory 16(10): 1571-1587 (2008) |
2007 |
18 | EE | Wen Pan,
Jiang Wu,
Zhanjun Jiang,
Yan Wang,
Xiaohu You:
Mobile Position Tracking by TDOA-Doppler Hybrid Estimation in Mobile Cellular System.
ICC 2007: 4670-4673 |
17 | EE | Qin Huang,
Jiang Wu,
Chunming Zhao,
Xiaohu You:
Waterfilling-Like Multiplicity Assignment Algorithm for Algebraic Soft-Decision Decoding of Reed-Solomon Codes.
ICC 2007: 6210-6213 |
16 | | Jiang Wu,
Yi Luo,
D. Manivannan:
An enhanced model-based checkpointing protocol.
Parallel and Distributed Computing and Networks 2007: 313-318 |
15 | EE | Jiang Wu,
Bin Hu:
Agent-based simulation of group-task interaction in knowledge team.
SCSC 2007: 905-912 |
14 | EE | Wen Pan,
Jiang Wu,
Zhanjun Jiang,
Yan Wang,
Xiao-Hu You:
Doppler Location Based on Two-Dimension Searching in Orthogonal Complement Space in DAS.
VTC Fall 2007: 1962-1964 |
13 | EE | Jiang Wu,
Bin Hu:
Modeling and simulation of group behavior in e-government implementation.
Winter Simulation Conference 2007: 1284-1291 |
2006 |
12 | EE | Li Zhang,
Chunming Zhao,
Jiang Wu,
Wenjin Wang:
MAP based Equalizer for OFDM Systems in Time-Varying Multipath Channels.
GLOBECOM 2006 |
11 | EE | Jiang Wu,
D. Manivannan:
An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database Systems.
ICDCN 2006: 82-87 |
10 | EE | Jiang Wu,
Sheldon Wang,
Christine Chau,
Lei Zeng,
Jinsong Lin:
Overseas development for a major U.S. eCommerce website.
ICSE 2006: 632-635 |
9 | EE | Jiang Wu,
Kaliappa Nadar Ravindran,
Ali Sabbir,
Kevin A. Kwiat:
Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery.
WOWMOM 2006: 456-458 |
8 | EE | Jianhong Xia,
Sarma Vangala,
Jiang Wu,
Lixin Gao,
Kevin A. Kwiat:
Effective worm detection for various scan techniques.
Journal of Computer Security 14(4): 359-387 (2006) |
2005 |
7 | EE | Jiang Wu,
Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.
Selected Areas in Cryptography 2005: 221-232 |
2004 |
6 | EE | Jiang Wu,
Sarma Vangala,
Lixin Gao,
Kevin A. Kwiat:
An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
NDSS 2004 |
5 | EE | Ruizhong Wei,
Jiang Wu:
Product Construction of Key Distribution Schemes for Sensor Networks.
Selected Areas in Cryptography 2004: 280-293 |
2002 |
4 | | Kun Zhou,
Qionghai Dai,
Jiang Wu,
Guihua Er:
Fast tracking of semantic video object based on motion prediction and subregion extraction.
ICIP (3) 2002: 621-624 |
2000 |
3 | | Jiang Wu,
Gerald Q. Maguire Jr.:
Agent Based Seamless IP Multicast Receiver Handover.
PWC 2000: 213-226 |
1993 |
2 | | Michael Stonebraker,
Jolly Chen,
Nobuko Nathan,
Caroline Paxson,
Alan Su,
Jiang Wu:
Tioga: A Database-Oriented Visualization Tool.
IEEE Visualization 1993: 86-93 |
1 | EE | Michael Stonebraker,
Jolly Chen,
Nobuko Nathan,
Caroline Paxson,
Jiang Wu:
Tioga: Providing Data Management Support for Scientific Visualization Applications.
VLDB 1993: 25-38 |