2008 |
36 | EE | Xin Zhao,
Myung-Eun Lee,
Soo-Hyung Kim:
Improved image segmentation method based on optimized threshold using Genetic Algorithm.
AICCSA 2008: 921-922 |
35 | EE | Myung-Eun Lee,
Soo-Hyung Kim,
Wan Hyun Cho,
Xin Zhao:
Segmentation of medical image based on mean shift and deterministic annealing EM algorithm.
AICCSA 2008: 937-938 |
34 | EE | Jacob R. Minz,
Xin Zhao,
Sung Kyu Lim:
Buffered clock tree synthesis for 3D ICs under thermal variations.
ASP-DAC 2008: 504-509 |
33 | EE | Zhong Gao,
Guanming Lu,
Xin Zhao,
Danni Qin,
Mei Qin:
Applying a novel combined classifier for pornographic web filtering in a grid computing environment.
CSCWD 2008: 513-517 |
32 | EE | Fan Zhang,
Gang Wang,
Xiaoguang Liu,
Guangyi Sun,
Xin Zhao,
Jing Liu,
Guizhang Lu:
An Improved Parallel Implementation of 3-D DRIE Simulation on Multi-core Processors.
HPCC 2008: 891-896 |
31 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers.
Middleware 2008: 388-407 |
30 | EE | Xin Zhao,
Ahmet T. Erdogan,
Tughrul Arslan:
OFDM symbol timing synchronization system on a Reconfigurable Instruction Cell Array.
SoCC 2008: 319-322 |
29 | EE | Xin Zhao,
Chun Tung Chou,
Jun Guo,
Sanjay Jha,
Archan Misra:
Probabilistically reliable on-demand multicast in wireless mesh networks.
WOWMOM 2008: 1-9 |
2007 |
28 | EE | Ye Du,
Yaoyun Shi,
Xin Zhao:
Using Spam Farm to Boost PageRank.
AIRWeb 2007 |
27 | EE | Mongkol Ekpanyapong,
Xin Zhao,
Sung Kyu Lim:
An Efficient Computation of Statistically Critical Sequential Paths Under Retiming.
ASP-DAC 2007: 547-552 |
26 | EE | Xin Zhao,
Chun Tung Chou,
Jun Guo,
Sanjay Jha:
A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks.
LCN 2007: 213-214 |
25 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Using a virtual machine to protect sensitive Grid resources.
Concurrency and Computation: Practice and Experience 19(14): 1917-1935 (2007) |
2006 |
24 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
Securing sensitive content in a view-only file system.
Digital Rights Management Workshop 2006: 27-36 |
23 | EE | Xin Zhao,
Fengxia Li,
Shouyi Zhan,
Zhisheng Li:
Ocean Wave Simulation under Wind Change Effect.
ICICIC (3) 2006: 26-29 |
22 | EE | Zhisheng Li,
Junshan Li,
Shuai Liu,
Wei Yang,
Xin Zhao:
Design and Implementation of Operational Effectiveness Evaluation Simulation System for ECM.
ICICIC (3) 2006: 95-98 |
21 | EE | Xin Zhao,
Yansong Zhang,
Guanlong Chen:
Model Optimization of Artificial Neural Networks for Performance Predicting in Spot Welding of the Body Galvanized DP Steel Sheets, .
ICNC (1) 2006: 602-605 |
20 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
Siren: Catching Evasive Malware (Short Paper).
IEEE Symposium on Security and Privacy 2006: 78-85 |
19 | EE | Guangyi Sun,
Xin Zhao,
Guizhang Lu:
Voxel-Based Modeling and Rendering for Virtual MEMS Fabrication Process.
IROS 2006: 306-311 |
18 | EE | Xin Zhao,
Yici Cai,
Qiang Zhou,
Xianlong Hong:
A novel low-power physical design methodology for MTCMOS.
ISCAS 2006 |
17 | EE | Xin Zhao,
Chun Tung Chou,
Jun Guo,
Sanjay Jha:
Protecting Multicast Sessions in Wireless Mesh Networks.
LCN 2006: 467-474 |
16 | EE | Zhigang Liang,
Kuncheng Li,
Xiaolin Yang,
Xiangying Du,
Jiabin Liu,
Xin Zhao,
Xiangdong Qi:
ROC Analysis for Diagnostic Accuracy of Fracture by Using Different Monitors.
J. Digital Imaging 19(3): 276-278 (2006) |
2005 |
15 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
CPOL: high-performance policy evaluation.
ACM Conference on Computer and Communications Security 2005: 147-157 |
14 | | Stefan Voß,
Xin Zhao:
Some Steps Towards a Scientometric Analysis of Publications in Machine Translation.
Artificial Intelligence and Applications 2005: 651-655 |
13 | EE | Wei Xie,
Huaiyu Wu,
Xin Zhao:
Relaxed LMIs Observer-Based Controller Design via Improved T-S Fuzzy Model Structure.
FSKD (1) 2005: 930-941 |
12 | | Xin Zhao,
Atul Prakash:
WSF: An HTTP-Level Firewall for Hardening Web Servers.
IASTED PDCS 2005: 248-253 |
11 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Towards Protecting Sensitive Files in a Compromised System.
IEEE Security in Storage Workshop 2005: 21-28 |
10 | EE | Yici Cai,
Xin Zhao,
Qiang Zhou,
Xianlong Hong:
Shielding Area Optimization Under the Solution of Interconnect Crosstalk.
J. Comput. Sci. Technol. 20(6): 901-906 (2005) |
2004 |
9 | EE | Xin Zhao,
Fuji Ren,
Stefan Voß:
A Super-Function Based Japanese-Chinese Machine Translation System for Business Users.
AMTA 2004: 272-281 |
8 | EE | Ian T. Foster,
Jerry Gieraltowski,
Scott Gose,
Natalia Maltsev,
Edward N. May,
Alex Rodriguez,
Dinanath Sulakhe,
A. Vaniachine,
Jim Shank,
Saul Youssef,
David Adams,
Richard Baker,
Wensheng Deng,
Jason Smith,
Dantong Yu,
Iosif Legrand,
Suresh Singh,
Conrad Steenberg,
Yang Xia,
M. Anzar Afaq,
Eileen Berman,
James Annis,
L. A. T. Bauerdick,
Michael Ernst,
Ian Fisk,
Lisa Giacchetti,
Gregory E. Graham,
Anne Heavey,
Joseph Kaiser,
Nickolai Kuropatkin,
Ruth Pordes,
Vijay Sekhri,
John Weigand,
Yujun Wu,
Keith Baker,
Lawrence Sorrillo,
John Huth,
Matthew Allen,
Leigh Grundhoefer,
John Hicks,
Fred Luehring,
Steve Peck,
Rob Quick,
Stephen Simms,
George Fekete,
Jan vandenBerg,
Kihyeon Cho,
Kihwan Kwon,
Dongchul Son,
Hyoungwoo Park,
Shane Canon,
Keith R. Jackson,
David E. Konerding,
Jason Lee,
Doug Olson,
Iowa Sakrejda,
Brian Tierney,
Mark Green,
Russ Miller,
James Letts,
Terrence Martin,
David Bury,
Catalin Dumitrescu,
Daniel Engh,
Robert Gardner,
Marco Mambelli,
Yuri Smirnov,
Jens-S. Vöckler,
Michael Wilde,
Yong Zhao,
Xin Zhao,
Paul Avery,
Richard Cavanaugh,
Bockjoo Kim,
Craig Prescott,
Jorge Luis Rodriguez,
Andrew Zahn,
Shawn McKee,
Christopher T. Jordan,
James E. Prewett,
Timothy L. Thomas,
Horst Severini,
Ben Clifford,
Ewa Deelman,
Larry Flon,
Carl Kesselman,
Gaurang Mehta,
Nosa Olomu,
Karan Vahi,
Kaushik De,
Patrick McGuigan,
Mark Sosebee,
Dan Bradley,
Peter Couvares,
Alan DeSmet,
Carey Kireyev,
Erik Paulson,
Alain Roy,
Scott Koranda,
Brian Moe,
Bobby Brown,
Paul Sheldon:
The Grid2003 Production Grid: Principles and Practice.
HPDC 2004: 236-245 |
7 | | Xin Zhao,
Yici Cai,
Qiang Zhou,
Xianlong Hong,
Lei He,
Jinjun Xiong:
Shielding area optimization under the solution of interconnect crosstalk.
ISCAS (5) 2004: 297-300 |
2003 |
6 | EE | Xin Zhao,
Atul Prakash:
Source Authentication in Group Communication Systems.
DEXA Workshops 2003: 455-459 |
5 | EE | Liwu Li,
Xin Zhao:
UML Specification and Relational Database.
Journal of Object Technology 2(5): 87-100 (2003) |
2002 |
4 | | Chunfeng Wang,
Xin Zhao:
Business Failure Prediction Using Modified ants Algorithm.
JCIS 2002: 1127-1130 |
1999 |
3 | EE | Xin Zhao,
Daoxu Chen,
Li Xie:
An Object-Oriented Developing Framework of Fault-Tolerance System.
TOOLS (31) 1999: 232-238 |
1998 |
2 | | Jon B. Weissman,
Xin Zhao:
Scheduling parallel applications in distributed networks.
Cluster Computing 1(1): 109-118 (1998) |
1997 |
1 | EE | Jon B. Weissman,
Xin Zhao:
Run-time Support for Scheduling Parallel Applications in Heterogeneous NOWs.
HPDC 1997: 347-355 |