2009 | ||
---|---|---|
41 | Jiang Wu, Douglas R. Stinson: A Highly Scalable RFID Authentication Protocol. ACISP 2009: 360-376 | |
40 | Jiang Wu, Duoyong Sun, Bin Hu, Yu Zhang: Organizational Adaptative Behavior: The Complex Perspective of Individuals-Tasks Interaction. Complex (1) 2009: 28-38 | |
39 | Duoyong Sun, Jiang Wu, Shenghua Zheng, Bin Hu, Kathleen M. Carley: Topological Analysis and Measurements of an Online Chinese Student Social Network. Complex (1) 2009: 737-748 | |
38 | Jiang Wu, Zhizhong Li, Jianwei Niu: A 3D Method for Fit Assessment of a Sizing System. HCI (11) 2009: 737-743 | |
37 | Taiyong Li, Changjie Tang, Ting He, Jiang Wu, Wenbing Qin: Gene Expression Programming without Reduplicate Individuals. ICNC (4) 2009: 249-253 | |
36 | Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms: Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. NCA 2009: 12-19 | |
35 | Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu: E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases. PAISI 2009: 76-88 | |
34 | Stephen Foster, Walt Potter, Jiang Wu, Bin Hu, Yu Zhang: A history sensitive cascade model in diffusion networks. SpringSim 2009 | |
33 | Zhanjun Jiang, Jiang Wu, Dongming Wang, Xiaohu You: Parallel Proportion Fair Scheduling in DAS with Partial Channel State Information. IEICE Transactions 92-B(6): 2312-2315 (2009) | |
32 | Jiang Wu, D. Manivannan, Bhavani M. Thuraisingham: Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system. Inf. Sci. 179(20): 3659-3672 (2009) | |
31 | Jiang Wu, Bin Hu, Yu Zhang, Catherine Spence, Steven B. Hall, Kathleen M. Carley: An Agent-based Simulation Study for Exploring Organizational Adaptation. Simulation 85(6): 397-413 (2009) | |
2008 | ||
30 | Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir: Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. ARES 2008: 1234-1239 | |
29 | Yue Jiang, Chang-jie Tang, Haichun Zheng, Chuan Li, Yu Chen, Jiang Wu, Dong-lei Wang: Adaptive Gene Expression Programming Algorithm Based on Cloud Model. BMEI (1) 2008: 226-230 | |
28 | Chuan Li, Changjie Tang, Chunqiu Zeng, Jiang Wu, Yu Chen, Jiangtao Qiu, Li Dai, Jun Zhu, Yongguang Jiang: Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions. BMEI (1) 2008: 260-264 | |
27 | Jiang Wu, Ying-qiang Guo, Guang-fu Yin, Huai-qing Chen, Yunqing Kang: Osteoinductive Observation for BMP-2 Gene Modification of Mesenchymal Stem Cells Combined with Plasma-sprayed Hydroxyapatite Coating. BMEI (1) 2008: 755-759 | |
26 | Gang Yang, Haiyan Long, Jiang Wu, Hua Huang: A Novel Electrical Field Bioreactor for Wound Healing Study. BMEI (2) 2008: 548-552 | |
25 | Kaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir: Performance engineering of replica voting protocols for high assurance data collection systems. COMSWARE 2008: 424-433 | |
24 | Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, Shengzhi Li, Xun Lin, Jie Zuo: k-Anonymity via Clustering Domain Knowledge for Privacy Preservation. FSKD (4) 2008: 697-701 | |
23 | Jiang Wu, Douglas R. Stinson: Authorship Proof for Textual Document. Information Hiding 2008: 209-223 | |
22 | Jiang Wu, Douglas R. Stinson: Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. WISEC 2008: 119-124 | |
21 | Jiang Wu, Bin Hu: An agent-based simulation study of the dynamics of mobile viral advertising. Winter Simulation Conference 2008: 2953 | |
20 | Shengping Dong, Bin Hu, Jiang Wu: Modelling and simulation of team effectiveness emerged from member-task interaction. Winter Simulation Conference 2008: 914-922 | |
19 | Jiang Wu, Bin Hu, Jinlong Zhang, Da Fang: Multi-agent simulation of group behavior in E-Government policy decision. Simulation Modelling Practice and Theory 16(10): 1571-1587 (2008) | |
2007 | ||
18 | Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu You: Mobile Position Tracking by TDOA-Doppler Hybrid Estimation in Mobile Cellular System. ICC 2007: 4670-4673 | |
17 | Qin Huang, Jiang Wu, Chunming Zhao, Xiaohu You: Waterfilling-Like Multiplicity Assignment Algorithm for Algebraic Soft-Decision Decoding of Reed-Solomon Codes. ICC 2007: 6210-6213 | |
16 | Jiang Wu, Yi Luo, D. Manivannan: An enhanced model-based checkpointing protocol. Parallel and Distributed Computing and Networks 2007: 313-318 | |
15 | Jiang Wu, Bin Hu: Agent-based simulation of group-task interaction in knowledge team. SCSC 2007: 905-912 | |
14 | Wen Pan, Jiang Wu, Zhanjun Jiang, Yan Wang, Xiaohu You: Doppler Location Based on Two-Dimension Searching in Orthogonal Complement Space in DAS. VTC Fall 2007: 1962-1964 | |
13 | Jiang Wu, Bin Hu: Modeling and simulation of group behavior in e-government implementation. Winter Simulation Conference 2007: 1284-1291 | |
2006 | ||
12 | Li Zhang, Chunming Zhao, Jiang Wu, Wenjin Wang: MAP based Equalizer for OFDM Systems in Time-Varying Multipath Channels. GLOBECOM 2006 | |
11 | Jiang Wu, D. Manivannan: An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database Systems. ICDCN 2006: 82-87 | |
10 | Jiang Wu, Sheldon Wang, Christine Chau, Lei Zeng, Jinsong Lin: Overseas development for a major U.S. eCommerce website. ICSE 2006: 632-635 | |
9 | Jiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat: Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. WOWMOM 2006: 456-458 | |
8 | Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat: Effective worm detection for various scan techniques. Journal of Computer Security 14(4): 359-387 (2006) | |
2005 | ||
7 | Jiang Wu, Ruizhong Wei: An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. Selected Areas in Cryptography 2005: 221-232 | |
2004 | ||
6 | Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat: An Effective Architecture and Algorithm for Detecting Worms with Various Scan. NDSS 2004 | |
5 | Ruizhong Wei, Jiang Wu: Product Construction of Key Distribution Schemes for Sensor Networks. Selected Areas in Cryptography 2004: 280-293 | |
2002 | ||
4 | Kun Zhou, Qionghai Dai, Jiang Wu, Guihua Er: Fast tracking of semantic video object based on motion prediction and subregion extraction. ICIP (3) 2002: 621-624 | |
2000 | ||
3 | Jiang Wu, Gerald Q. Maguire Jr.: Agent Based Seamless IP Multicast Receiver Handover. PWC 2000: 213-226 | |
1993 | ||
2 | Michael Stonebraker, Jolly Chen, Nobuko Nathan, Caroline Paxson, Alan Su, Jiang Wu: Tioga: A Database-Oriented Visualization Tool. IEEE Visualization 1993: 86-93 | |
1 | Michael Stonebraker, Jolly Chen, Nobuko Nathan, Caroline Paxson, Jiang Wu: Tioga: Providing Data Management Support for Scientific Visualization Applications. VLDB 1993: 25-38 |