dblp.uni-trier.dewww.uni-trier.de

Hong Zhao

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEGuodong Zhang, Xin Zhang, Hong Zhao, Peiyu Yan: A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet. BMEI (1) 2008: 850-854
29EEGuodong Zhang, Peiyu Yan, Hong Zhao, Xin Zhang: A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks. BMEI (2) 2008: 823-826
28EEHong Zhao: A Practical Wavelet Domain LMK Algorithm for Predicting Multimedia Traffic. ICC 2008: 515-519
27EEXiang Zhou, Hong Zhao: Three-Dimensional Shape Measurement Using Maar Wavelet Transform. ICIRA (1) 2008: 753-760
26EEWeiguang Zhang, Hong Zhao, Xiang Zhou: Design of Multi-resolution 3D Measurement System Using Light Sectioning Method and Multi-sensor Data Fusion Techniques. ICIRA (1) 2008: 761-770
25EEJinjun Li, Hong Zhao, Tao Jiang, Xiang Zhou: Development of a 3D High-Precise Positioning System Based on a Planar Target and Two CCD Cameras. ICIRA (2) 2008: 475-484
24EEMichael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Maintaining software product lines - an industrial practice. ICSM 2008: 444-447
23EEMing Luo, Yingyou Wen, Hong Zhao: An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. ICYCS 2008: 1577-1582
22EEMichael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547
2007
21EENan Guo, Tian-han Gao, Bin Zhang, Hong Zhao: Distributed and Scalable Event Correlation Based on Causality Graph. APNOMS 2007: 567-570
20EEShuyi Chen, Yingyou Wen, Hong Zhao: Formal Analysis of Secure Bootstrap in Trusted Computing. ATC 2007: 352-360
19EEXuena Peng, Hong Zhao: A Framework of Attacker Centric Cyber Attack Behavior Analysis. ICC 2007: 1449-1454
18EEHanxun Zhou, Yingyou Wen, Hong Zhao: Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. ICN 2007: 65
17EEHuifei Rao, Jie Chen, Changhong Yu, Woon Tiong Ang, I-Chyn Wey, An-Yeu Wu, Hong Zhao: Ensemble Dependent Matrix Methodology for Probabilistic-Based Fault-tolerant Nanoscale Circuit Design. ISCAS 2007: 1803-1806
16EEHanxun Zhou, Yingyou Wen, Hong Zhao: Detecting early worm propagation based on entropy. Infoscale 2007: 71
15EEXuezhi Wen, Wei Liu, Nan Wang, Huai Yuan, Hong Zhao: Improved Wavelet Feature Extraction Methods Based on HSV Space for Vehicle Detection. MVA 2007: 376-379
2006
14EEXuezhi Wen, Hong Zhao, Nan Wang, Huai Yuan: A Rear-Vehicle Detection System for Static Images Based on Monocular Vision. ICARCV 2006: 1-4
13EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Network Traffic Prediction Using Least Mean Kurtosis. IEICE Transactions 89-B(5): 1672-1674 (2006)
2005
12EEXiangyang Wang, Hong Zhao: A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. CIS (2) 2005: 617-622
11EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Layered MPEG Video Transmission over IP DiffServ. ITCC (1) 2005: 63-67
2004
10EETian-han Gao, Nan Guo, Hong Zhao: A Self-Adapting Mobile Ipv6 Model Based on MAP. EEE 2004: 473-476
9EENan Guo, Tian-han Gao, Hong Zhao: Distributed Plug-and-Play Network Management Model Based on Mobile Agents. EEE 2004: 487-491
8EEHong Shao, Wen-cheng Cui, Hong Zhao: Medical image retrieval based on visual contents and text information. SMC (1) 2004: 1098-1103
7EEHong Shao, Wen-cheng Cui, Hong Zhao: Automatic analysis of brain pathology based on image content. SMC (5) 2004: 4480-4484
2003
6EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Self-similar Traffic Prediction Using Least Mean Kurtosis. ITCC 2003: 352-355
5 Long-Cheng Li, Hong Zhao, Hiroaki Shiina, Christopher J. Kane, Rajvir Dahiya: PGDB: a curated and integrated database of genes related to the prostate. Nucleic Acids Research 31(1): 291-293 (2003)
2002
4EEHong Zhao, Nirwan Ansari, Yun Q. Shi: A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. ITCC 2002: 54-58
1999
3EEYaodong He, Zao Jiang, Bing Liu, Hong Zhao: Content-based Index and Retrieval Method of Chinese Document Images. ICDAR 1999: 685-688
2EETimothy K. Tsai, Mei-Chen Hsueh, Hong Zhao, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Stress-Based and Path-Based Fault Injection. IEEE Trans. Computers 48(11): 1183-1201 (1999)
1993
1 Xingwei Wang, Hong Zhao, Jiakeng Zhu: GRPC: A Communication Cooperation Mechanism in Distributed Systems. Operating Systems Review 27(3): 75-86 (1993)

Coauthor Index

1Woon Tiong Ang [17]
2Nirwan Ansari [4] [6] [11] [13]
3Jie Chen [17]
4Shuyi Chen [20]
5Wen-cheng Cui [7] [8]
6Rajvir Dahiya [5]
7Tian-han Gao [9] [10] [21]
8Nan Guo [9] [10] [21]
9Yaodong He [3]
10Mei-Chen Hsueh [2]
11Ravishankar K. Iyer (Ravi K. Iyer) [2]
12Michael Jiang [22] [24]
13Tao Jiang [25]
14Zao Jiang [3]
15Zbigniew Kalbarczyk [2]
16Christopher J. Kane [5]
17Jinjun Li [25]
18Long-Cheng Li [5]
19Bing Liu [3]
20Wei Liu [15]
21Ming Luo [23]
22Xuena Peng [19]
23Huifei Rao [17]
24Hong Shao [7] [8]
25Yun Q. Shi (Yun-Qing Shi) [4] [6] [11] [13]
26Hiroaki Shiina [5]
27Timothy K. Tsai [2]
28Nan Wang [14] [15]
29Xiangyang Wang [12]
30Xingwei Wang [1]
31Xuezhi Wen [14] [15]
32Yingyou Wen [16] [18] [20] [23]
33I-Chyn Wey [17]
34An-Yeu Wu [17]
35Peiyu Yan [29] [30]
36Changhong Yu [17]
37Huai Yuan [14] [15]
38Bin Zhang [21]
39Guodong Zhang [29] [30]
40Jing Zhang [22] [24]
41Weiguang Zhang [26]
42Xin Zhang [29] [30]
43Hanxun Zhou [16] [18]
44Xiang Zhou [25] [26] [27]
45Yuanyuan Zhou [22] [24]
46Jiakeng Zhu [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)