Name
Papers
Collaborators
SHENG-DE WANG
108
100
Citations 
PageRank 
Referers 
720
68.13
1593
Referees 
References 
1529
889
Search Limit
1001000
Title
Citations
PageRank
Year
CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata00.342022
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records00.342022
Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol00.342022
Detecting and Scoring Equipment Faults in Real Time During Semiconductor Test Processes00.342021
Provable Secure Group Key Establishment Scheme for Fog Computing00.342021
Grid Structure Attention for Natural Language Interface to Bash Commands00.342020
A Novel Gaming Video Encoding Process Using In-Game Motion Vectors00.342020
Data Reduction for real-time bridge vibration data on Edge00.342019
An Approach to the Design of Specific Hardware Circuits from C Programs.00.342018
Distributed Continuous Control With Meta Learning On Robotic Arms00.342018
BLE Tree Networks for Sensor Devices in Internet of Things.00.342017
PhishBox: An Approach for Phishing Validation and Detection.00.342017
Streaming Analytics Processing In Manufacturing Performance Monitoring And Prediction00.342017
Learning Cross-Domain Disentangled Deep Representation with Supervision from A Single Domain.10.372017
An Android Malware Detection Approach Using Bayesian Inference00.342016
The Concept Of Attack Scenarios And Its Applications In Android Malware Detection00.342016
An adaptive network intrusion detection approach for the cloud environment00.342015
An Fpga Memory Hierarchy For High-Level Synthesized Opencl Kernels00.342015
Machine Learning Based Hybrid Behavior Models for Android Malware Analysis60.432015
A hybrid multiple-character transition finite-automaton for string matching engine.00.342015
PFBF: Pre-Filtered Bloom Filters.00.342014
An Embedded NIDS with Multi-core Aware Packet Capture10.352013
An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm70.462013
Mobile agent application and integration in electronic anamnesis system.30.422012
The enhancement of security in healthcare information systems.90.652012
Embedded Network Intrusion Detection Systems with a Multi-core Aware Packet Capture Module30.402011
A Data Parallel Approach to XML Parsing and Query30.382011
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis40.432010
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis40.432010
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems30.432010
Heuristic algorithm for the resource constrained scheduling problem during high-level synthesis.00.342009
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent10.362009
An enhanced uplink scheduling algorithm for video traffic transmission in IEEE 802.16 BWA systems00.342009
Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space491.522009
Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report20.402008
Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer10.352008
The modified grid location service for mobile ad-hoc networks00.342007
Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC40.502007
Choosing the Kernel Parameters for the Directed Acyclic Graph Support Vector Machines00.342007
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning10.362007
Layered peer to peer streaming using hidden Markov models00.342007
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming10.352006
Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity00.342006
Transmission range designation broadcasting methods for wireless ad hoc networks00.342006
Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance80.742006
A weighting initialization strategy for weighted support vector machines30.442005
Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks80.752005
A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks10.362005
Dynamic Scheduling Methods for Computational Grid Environments160.732005
Training algorithms for fuzzy support vector machines with noisy data662.542004
  • 1
  • 2