dblp.uni-trier.dewww.uni-trier.de

Sheng Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
42EEQing Shao, Yong-Sheng Ding, Zhi-Hua Hu, Sheng Zhang, Yun Wei: A Bio-network Based Fault-Tolerant Architecture for Supervisory System. CSSE (1) 2008: 473-476
41EESheng Zhang, Xiaoling Bao, Jian Shu, Sha Chen: Comparative Research of XML Compression Technologies. ICYCS 2008: 112-117
40EESheng Zhang: Exp-function method exactly solving a KdV equation with forcing term. Applied Mathematics and Computation 197(1): 128-134 (2008)
39EESheng Zhang: Exp-function method for constructing explicit and exact solutions of a lattice equation. Applied Mathematics and Computation 199(1): 242-249 (2008)
38EESheng Zhang: A further improved extended Fan sub-equation method for (2+1)-dimensional breaking soliton equations. Applied Mathematics and Computation 199(1): 259-267 (2008)
37EEIndranil Saha, Bhargab B. Bhattacharya, Sheng Zhang, Sharad C. Seth: Planar Straight-Line Embedding of Double-Tree Scan Architecture on a Rectangular Grid. Fundam. Inform. 89(2-3): 331-344 (2008)
2007
36EESheng Zhang: A generalized auxiliary equation method and its application to the (2+1)-dimensional KdV equations. Applied Mathematics and Computation 188(1): 1-6 (2007)
35EESheng Zhang, Tiecheng Xia: A generalized F-expansion method with symbolic computation exactly solving Broer-Kaup equations. Applied Mathematics and Computation 189(1): 836-843 (2007)
34EESheng Zhang: A generalized new auxiliary equation method and its application to the (2+1)-dimensional breaking soliton equations. Applied Mathematics and Computation 190(1): 510-516 (2007)
33EESheng Zhang, Terence Sim: Discriminant Subspace Analysis: A Fukunaga-Koontz Approach. IEEE Trans. Pattern Anal. Mach. Intell. 29(10): 1732-1745 (2007)
32EETerence Sim, Sheng Zhang, Rajkumar Janakiraman, Sandeep Kumar: Continuous Verification Using Multimodal Biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 687-700 (2007)
31EEJianliang Zhang, Sheng Zhang, Shuo Wang, Runde Zhou: A Novel Scheme of Implementing High-Speed High-Probability-Resolution Digital AWGN Generators. Journal of Circuits, Systems, and Computers 16(2): 211-219 (2007)
2006
30EESheng Zhang, James Ford, Fillia Makedon: A privacy-preserving collaborative filtering scheme with two-way communication. ACM Conference on Electronic Commerce 2006: 316-323
29EESheng Zhang, Terence Sim: When Fisher meets Fukunaga-Koontz: A New Look at Linear Discriminants. CVPR (1) 2006: 323-329
28EESheng Zhang, Rajkumar Janakiraman, Terence Sim, Sandeep Kumar: Continuous Verification Using Multimodal Biometrics. ICB 2006: 562-570
27EESheng Zhang, Amit Chakrabarti, James Ford, Fillia Makedon: Attack detection in time series for recommender systems. KDD 2006: 809-814
26EESheng Zhang, James Ford, Fillia Makedon: Deriving Private Information from Randomly Perturbed Ratings. SDM 2006
25EESheng Zhang, Weihong Wang, James Ford, Fillia Makedon: Learning from Incomplete Ratings Using Non-negative Matrix Factorization. SDM 2006
24EESheng Zhang, Yi Ouyang, James Ford, Fillia Makedon: Analysis of a low-dimensional linear model under recommendation attacks. SIGIR 2006: 517-524
23EESheng Zhang, Tiecheng Xia: Symbolic computation and new families of exact non-travelling wave solutions to (3+1)-dimensional Kadomstev-Petviashvili equation. Applied Mathematics and Computation 181(1): 319-331 (2006)
22EESheng Zhang, Tiecheng Xia: Further improved extended Fan sub-equation method and new exact solutions of the (2+1)-dimensional Broer-Kaup-Kupershmidt equations. Applied Mathematics and Computation 182(2): 1651-1660 (2006)
2005
21EESandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang: Using Continuous Biometric Verification to Protect Interactive Login Sessions. ACSAC 2005: 441-450
20EESheng Zhang, Sharad C. Seth, Bhargab B. Bhattacharya: Efficient Test Compaction for Pseudo-Random Testing. Asian Test Symposium 2005: 337-342
19EESheng Zhang, Weihong Wang, James Ford, Fillia Makedon, Justin D. Pearlman: Using Singular Value Decomposition Approximation for Collaborative Filtering. CEC 2005: 257-264
18 Ji Zhang, Wei Wang, Sheng Zhang: A Color Indexing Scheme Using Two-level Clustering Processing for Effective and Efficient Image Retrieval. DMIN 2005: 73-78
17EEHeng Huang, Li Shen, Fillia Makedon, Sheng Zhang, Mark Greenberg, Ling Gao, Justin D. Pearlman: A clustering-based approach for prediction of cardiac resynchronization therapy. SAC 2005: 260-266
16EEWei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon, James Ford: Node clustering based on link delay in P2P networks. SAC 2005: 744-749
15EESheng Zhang, Fillia Makedon: Privacy preserving learning in negotiation. SAC 2005: 821-825
14EESheng Zhang, Sharad C. Seth, Bhargab B. Bhattacharya: On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design. VLSI Design 2005: 491-496
13EERajkumar Janakiraman, Sandeep Kumar, Sheng Zhang, Terence Sim: Using Continuous Face Verification to Improve Desktop Security. WACV/MOTION 2005: 501-507
12EESheng Zhang, Ji Zhang, Han Liu, Wei Wang: XAR-miner: efficient association rules mining for XML data. WWW (Special interest tracks and posters) 2005: 894-895
11EEJi Zhang, Wei Wang, Han Liu, Sheng Zhang: X-warehouse: building query pattern-driven data. WWW (Special interest tracks and posters) 2005: 896-897
2004
10EESheng Zhang, Song Ye, Fillia Makedon, James Ford: A hybrid negotiation strategy mechanism in an automated negotiation system. ACM Conference on Electronic Commerce 2004: 256-257
9 Wenliang Chen, Ru Yi, Sheng Zhang: An Approach to Hole Repairing for FEA Mesh. CISST 2004: 268-271
8EESheng Zhang, Fillia Makedon, James Ford, Lin Ai: A Model for Multi-party Negotiations with Majority Rule. EC-Web 2004: 228-237
7EESheng Zhang, Fillia Makedon, James Ford, Calliope Sudborough, Lin Ai, Sarantos Kapidakis, Vangelis Karkaletsis, Euripidis Loukis: An International Trade Negotiation Framework for e-Government. EGOV 2004: 211-217
6EEFillia Makedon, Song Ye, Sheng Zhang, James Ford, Li Shen, Sarantos Kapidakis: Data Brokers: Building Collections through Automated Negotiation. SETN 2004: 13-22
5EESheng Zhang: Preconditioned GMRES methods for discretization equation of nonsymmetric and indefinite elliptic problem. Applied Mathematics and Computation 158(2): 307-317 (2004)
2003
4EEBhargab B. Bhattacharya, Sharad C. Seth, Sheng Zhang: Double-Tree Scan: A Novel Low-Power Scan-Path Architecture. ITC 2003: 470-479
3EEBhargab B. Bhattacharya, Sharad C. Seth, Sheng Zhang: Low-Energy BIST Design for Scan-based Logic Circuits. VLSI Design 2003: 546-551
2000
2EESheng Zhang, Xianli Wu: Variable Length Language Model for Chinese Character Recognition. ICMI 2000: 267-271
1997
1 Jinchao Xu, Sheng Zhang: Preconditioning the Poincaré-Steklov operator by using Green's function. Math. Comput. 66(217): 125-138 (1997)

Coauthor Index

1Lin Ai [7] [8]
2Xiaoling Bao [41]
3Bhargab B. Bhattacharya [3] [4] [14] [20] [37]
4Amit Chakrabarti [27]
5Sha Chen [41]
6Wenliang Chen [9]
7Yong-Sheng Ding [42]
8James Ford [6] [7] [8] [10] [16] [19] [24] [25] [26] [27] [30]
9Ling Gao [17]
10Mark Greenberg [17]
11Zhi-Hua Hu [42]
12Heng Huang [17]
13Rajkumar Janakiraman [13] [21] [28] [32]
14Sarantos Kapidakis [6] [7]
15Vangelis Karkaletsis [7]
16Sandeep Kumar [13] [21] [28] [32]
17Han Liu [11] [12]
18Euripidis Loukis [7]
19Fillia Makedon [6] [7] [8] [10] [15] [16] [17] [19] [24] [25] [26] [27] [30]
20Yi Ouyang [16] [24]
21Justin D. Pearlman [17] [19]
22Indranil Saha [37]
23Sharad C. Seth [3] [4] [14] [20] [37]
24Qing Shao [42]
25Li Shen [6] [17]
26Jian Shu [41]
27Terence Sim [13] [21] [28] [29] [32] [33]
28Calliope Sudborough [7]
29Shuo Wang [31]
30Wei Wang [11] [12] [18]
31Weihong Wang [19] [25]
32Yun Wei [42]
33Xianli Wu [2]
34Tiecheng Xia [22] [23] [35]
35Jinchao Xu [1]
36Song Ye [6] [10]
37Ru Yi [9]
38Ji Zhang [11] [12] [18]
39Jianliang Zhang [31]
40Wei Zheng [16]
41Runde Zhou [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)