学术活动
  2010-4-9
  2010-4-9
  2010-4-9
  2010-4-9
  2010-4-9
 

王茜    Wang Qian







同名作者区分

王茜 东南大学王茜 北京邮电大学王茜 燕山大学
王茜 中国科学院王茜 Unknown王茜 重庆大学
王茜 南京东南大学王茜 大连理工大学王茜 清华大学
注:C-DBLP的重名区分功能部分使用了清华大学王建勇老师课题组提出的GHOST(GrapH-based framewOrk for name diStincTion)算法,在此表示感谢。
共检索到结果53条  被引55次[注:ScholarSpace内自引数]
查看王茜的合作作者    在DBLP中查找该作者文献
查看该作者的单位历史    作者项目历史

论文列表


注:被引数指ScholarSpace内自引数
No. 论文信息 被引数
2019
53 袁丁 王茜 邓李维 . 聚类辅助特征对齐的域适应方法. 计算机科学, 2019, (03): 0
2016
52 魏立新 王利平 曾重阳 王茜 . 多领导粒子策略的动态多目标粒子群算法. 小型微型计算机系统, 2016, (07): 1
2015
51 王茜 苏荔 黄庆明 . 融合视觉感知特性的视频编码率失真优化. 计算机辅助设计与图形学学报, 2015, (10): 1851-1859 0
2013
50 王茜 刘泓 杨传栋 . 面向外包关联规则挖掘的隐私保护算法研究. 计算机工程, 2013, (02): 0
2012
49 王静 吕科 何宁 王茜 . 基于分裂Bregman方法的全变差图像去模糊. 电子学报, 2012, (08): - 5
48 刘乃嘉 王茜 程志锐 居立 . 基于分布式文件系统的高校存储平台探索与实践. 计算机科学, 2012, (S2): 0
47 王茜 刘乃嘉 戚丽 冯珂 . 高校数据库备份空间预测方法研究. 计算机科学, 2012, (S2): 0
2011
46 朱夏 李小平 王茜 . 基于总空闲时间增量的无等待流水调度混合遗传算法. 计算机研究与发展, 2011, (03): 455-464 0
45 王茜 杨正宽 . 一种基于加权KNN的大数据集下离群检测算法. 计算机科学, 2011, (10): 177-181 1
44 杨宁 王茜 . 一种基于小生境策略的阴性选择算法. 计算机科学, 2011, (S1): 1
2010
43 王茜 王均波 . 一种改进的协同过滤推荐算法. 计算机科学, 2010, 37 (06): 226-229 0
42 王初阳 李小平 王茜 苑迎春 . 有准备时间无等待流水车间调度的搜索算法. 计算机研究与发展, 2010, (04): 653-663 0
2009
41 苑迎春 李小平 王茜 王克俭 . 成本约束的网格工作流时间优化方法. 计算机研究与发展, 2009, (02): 8
40 苑迎春 李小平 王茜 张晓东 . 基于优先级规则的网格工作流调度. , 2009, (07): 1457-1465 9
39 朱夏 李小平 王茜 . 基于目标增量的无等待流水调度快速迭代贪婪算法. 计算机学报, 2009, (01): 132-141 0
2008
38 苑迎春 李小平 王茜 . 基于串归约的网格工作流费用优化方法. 计算机研究与发展, 2008, 45 (02): 246-253 7
37 朱郑州 吴中福 王茜 . 多源流媒体课件同步编辑系统的研究与实现. 计算机科学, 2008, 35 (02): 129-131 0
36 王茜 吴黎明 . 单点登录在Web服务安全中的应用. 计算机工程, 2008, 34 (08): 179-181 1
35 苑迎春 李小平 王茜 张毅 . 基于逆向分层的网格工作流调度算法. 计算机学报, 2008, 31 (02): 282-290 12
34 汪丽芳 王茜 . 一种改进的基于向量的P2P电子商务信任模型. 计算机科学, 2008, 35 (08): 300-303 1
2007
33 张晓敏 王茜 . 基于概念层次树的个性化推荐算法. 计算机工程, 2007, 33 (24): 57-60 0
2006
32 王茜 杜瑾珺 . 一种P2P电子商务安全信任模型. 计算机科学, 2006, 33 (09): 54-57 1
31 陈涛 王茜 . 轻型XML客户机的研究与设计. 计算机工程, 2006, 32 (02): 271-274 0
30 刘骥 王茜 . 基于网格服务的网格环境下数据传输. 计算机科学, 2006, 33 (01): 56-60 2
29 于玮萍 王茜 . 基于软件能力模型的匹配机制. 计算机科学, 2006, 33 (07): 280-285 0
28 陈莉 李小平 王茜 . 基于QoS的网格服务选择优化机制. 计算机工程, 2006, 32 (24): 121-123 0
27 王茜 杨广超 . 网格环境中一种基于SPKI证书的授权模型. 计算机科学, 2006, 33 (12): 75-77 0
2005
26 伍星 王茜 . 设计模式在HTML解析器中的应用. 计算机工程, 2005, 31 (02): 89-91 0
25 朱郑州 王茜 吴中福 . 流媒体标签技术在网络课件制作中的应用及实现. 计算机工程, 2005, 31 (04): 231-233 1
2004
24 刘慧君 王茜 . 基于JNI的COM组件调用. 计算机工程, 2004, 30 (09): 101-103 0
2003
23 王海源 王茜 . 基于票据的微支付形式. 计算机科学, 2003, 30 (05): 173-176 0
22 王茜 杨德礼 . 电子商务的安全体系结构及技术研究. 计算机工程, 2003, 29 (01): 72-75 0
21 朱征宇 朱庆生 王茜 . 一种基于虚拟XML技术的XQuery查询器系统框架. 计算机科学, 2003, 30 (01): 145-149 0
20 朱文华 王茜 . 企业动态联盟中柔性工作流的研究与实现. 小型微型计算机系统, 2003, 24 (04): 758-762 0
19 王茜 王富强 傅鹤岗 朱庆生 . 基于SPKI电子支付中的银行端访问控制. 计算机科学, 2003, 30 (10): 178-180 0
18 朱庆生 李唯唯 王茜 傅鹤岗 . 一种基于SPKI的匿名支付方案. 计算机科学, 2003, 30 (10): 175-177 3
17 杨强 吴中福 王茜 . 基于支持向量机的分段线性学习方法. 计算机科学, 2003, 30 (04): 136-139 0
2002
16 王茜 朱庆生 付鹤岗 吴中福 . 电子商务中的知识管理. 计算机科学, 2002, 29 (04): 128-130 0
15 朱庆生 王茜 傅鹤岗 吴中福 . 基于文档分割的图像兴趣域检测及编码方法. 电子学报, 2002, 30 (12A): 1943-1946 1
14 王茜 杨德礼 杜祥宇 . 基于Linux IPChains用户访问控制系统的实现. 计算机工程, 2002, 28 (11): 15-17 0
13 王茜 隆克平 程时端 张润彤 . Internet网络的TCP友好控制机制. 计算机科学, 2002, 29 (03): 54-57 0
12 朱庆生 王茜 傅鹤岗 吴中福 . 基于文档分割的图像兴趣域检测及编码方法. 电子学报, 2002, (S1): 0
11 王茜 杨德礼 刘力 . 虚拟专用网的AAA管理系统的研究与设计. , 2002, 28 (08): 56-59 0
2001
10 王茜 . 虚拟企业中动态的过程知识管理的研究. 计算机科学, 2001, 28 (12): 46-51 0
9 张伟 符云清 王茜 吴中福 . 现代远程教育与资源建设. 计算机科学, 2001, 28 (08): 102-105 0
8 朱征宇 朱庆生 王茜 . 基于扩展标记图的虚拟网页技术. 计算机科学, 2001, 28 (11): 80-83 1
2000
7 王茜 朱庆生 吴中福 . 安全电子商务应用环境. 计算机科学, 2000, 27 (12): 73-76 0
6 王茜 邓志成 吴靖 程时端 . 区分服务体系结构及其实现. 计算机科学, 2000, 27 (06): 58-61 0
5 邓志成 王茜 徐惠民 . 区分服务体系的服务质量机制浅析. 计算机科学, 2000, 27 (06): 61-64 0
1998
4 张烽 王茜 . 制造执行系统的研究及相关技术实现. 小型微型计算机系统, 1998, 19 (02): 28-32 0
1997
3 王茜 . 以过程为中心的软件工程环境研究. 计算机科学, 1997, 24 (06): 100-102 0
1995
2 闵光太 王茜 . 概念建模中面向行动的层次网络模型. 计算机研究与发展, 1995, 32 (02): 39-45 0
1 王茜 许光辰 . STD容错计算机系统. 小型微型计算机系统, 1995, 16 (11): 10-15 0

DBLP检索到的论文列表

No. Paper Inforamtion
2014
1 Qian Wang, Chunxiu Xu, Muqing Wu, Min Zhao, Deshui Yu, Propagation characteristics of high speed railway radio channel based on broadband measurements at 2.6 GHz. WCNC, 2014
0 Dongxuan Bao, Zhuo Zou, Qian Wang, Majid Baghaei Nejad, Li-Rong Zheng, A wirelessly-powered UWB sensor tag with time-domain sensor interface. ISCAS, 2014
-1 Qian Wang, Chunxiu Xu, Min Zhao, Deshui Yu, Results and analysis for a novel 2×2 channel measurement applied in LTE-R at 2.6 GHz. WCNC, 2014
-2 Chi-Kin Chau, Qian Wang, Dah-Ming Chiu, Economic Viability of Paris Metro Pricing for Digital Services. ACM Trans. Internet Techn., 2014, ACM Trans. Internet Techn., 14(2-3): 12
-3 Wei Song, Zhiyong Peng, Qian Wang, Fangquan Cheng, Xiaoxin Wu, Yihui Cui, Efficient privacy-preserved data query over ciphertext in cloud computing. Security and Communication Networks, 2014, Security and Communication Networks, 7(6): 1049-1065
-4 Fangquan Cheng, Qian Wang, Qianwen Zhang, Zhiyong Peng, Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data. WAIM, 2014
-5 Qian Wang, Jiaxing Zhang, Sen Song, Zheng Zhang, Attentional Neural Network: Feature Selection Using Cognitive Feedback. NIPS, 2014
-6 Yongming Li, Qian Wang, The universal fuzzy automaton. Fuzzy Sets and Systems, 2014, Fuzzy Sets and Systems, 249(): 27-48
-7 Guorong Wu, Qian Wang, Daoqiang Zhang, Feiping Nie, Heng Huang, Dinggang Shen, A generative probability model of joint label fusion for multi-atlas based brain segmentation. Medical Image Analysis, 2014, Medical Image Analysis, 18(6): 881-890
2013
-8 Shihui Ying, Guorong Wu, Qian Wang, Dinggang Shen, Groupwise Registration via Graph Shrinkage on the Image Manifold. CVPR, 2013
-9 Qian Wang, Bruno Barras, Semantics of Intensional Type Theory extended with Decidable Equational Theories. CSL, 2013
-10 Cong Wang, Kui Ren, Jia Wang, Qian Wang, Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations. IEEE Trans. Parallel Distrib. Syst., 2013, IEEE Trans. Parallel Distrib. Syst., 24(6): 1172-1181
-11 Zhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang, Proof-carrying cloud computation: The case of convex optimization. INFOCOM, 2013
-12 Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou, Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers, 2013, IEEE Trans. Computers, 62(2): 362-375
-13 Liang Tang, Yun Rui, Qian Wang, Husheng Li, Zhiyong Bu, A reverse transmission mechanism for surveillance network in smart grid. INFOCOM, 2013
-14 Katie Kuksenok, Michael Brooks, Qian Wang, Charlotte P. Lee, Challenges and opportunities for technology in foreign language classrooms. CHI, 2013
-15 Wei Xiong, Naixue Xiong, Laurence T. Yang, Jong Hyuk Park, Hanping Hu, Qian Wang, An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory. The Journal of Supercomputing, 2013, The Journal of Supercomputing, 64(2): 274-294
-16 Xuan Liu, Kui Ren, Yanling Yuan, Zuyi Li, Qian Wang, Optimal budget deployment strategy against power grid interdiction. INFOCOM, 2013
-17 Qian Wang, Zhaohui Peng, Fei Jiang, Qingzhong Li, LSA-PTM: A Propagation-Based Topic Model Using Latent Semantic Analysis on Heterogeneous Information Networks. WAIM, 2013
2012
-18 Qian Wang, Zesheng Chen, Chao Chen, On the Characteristics of the Worm Infection Family Tree. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(5): 1614-1627
-19 Ming Huang, Zhixun Xia, Hongbo Wang, Qinghua Zeng, Qian Wang, The range of the value for the fuzzifier of the fuzzy c-means algorithm. Pattern Recognition Letters, 2012, Pattern Recognition Letters, 33(16): 2280-2284
-20 Kaihe Xu, Qian Wang, Kui Ren, Joint UFH and power control for effective wireless anti-jamming communication. INFOCOM, 2012
-21 Xianyi Zhang, Qian Wang, Yunquan Zhang, Model-driven Level 3 BLAS Performance Optimization on Loongson 3A Processor. ICPADS, 2012
-22 Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou, Toward Secure and Dependable Storage Services in Cloud Computing. IEEE T. Services Computing, 2012, IEEE T. Services Computing, 5(2): 220-232
-23 XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, Yuanfang Chen, Locating malicious nodes for data aggregation in wireless networks. INFOCOM, 2012
-24 Bo Qin, Meng Zhou, Ying Ge, Len Taing, Tao Liu, Qian Wang, Su Wang, Junsheng Chen, Lingling Shen, Xikun Duan, Sheng&aposen Hu, Wei Li 0036, Henry Long, Yong Zhang, X. Shirley Liu, CistromeMap: a knowledgebase and web server for ChIP-Seq and DNase-Seq studies in mouse and human. Bioinformatics, 2012, Bioinformatics, 28(10): 1411-1412
-25 Hien Nguyen, Eshwar Pedamallu, Jaspal Subhlok, Edgar Gabriel, Qian Wang, Margaret S. Cheung, David Anderson, An Execution Environment for Robust Parallel Computing on Volunteer PC Grids. ICPP, 2012
-26 Qian Wang, Kui Ren, Xiaoqiao Meng, When cloud meets eBay: Towards effective pricing for cloud computing. INFOCOM, 2012
-27 Qian Wang, Dian-Wu Yue, Francis Chung-Ming Lau, Optimisation of throughput in cognitive radio networks: an analysis at the data link layer. IET Communications, 2012, IET Communications, 6(1): 1-12
-28 Jianxing Feng, Clifford A. Meyer, Qian Wang, Jun S. Liu, X. Shirley Liu, Yong Zhang, GFOLD: a generalized fold change for ranking differentially expressed genes from RNA-seq data. Bioinformatics, 2012, Bioinformatics, 28(21): 2782-2788
-29 Qian Wang, Dian-Wu Yue, Francis C. M. Lau, Performance of cooperative spectrum sensing over fading channels with low signal-to-noise ratio. IET Communications, 2012, IET Communications, 6(13): 1988-1999
2011
-30 Hai Su, Qian Wang, Kui Ren, Kai Xing, Jamming-Resilient Dynamic Spectrum Access for Cognitive Radio Networks. ICC, 2011
-31 Jin Li 0002, Qian Wang, Cong Wang, Kui Ren, Enhancing Attribute-Based Encryption with Attribute Hierarchy. MONET, 2011, MONET, 16(5): 553-561
-32 Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li 0002, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst., 2011, IEEE Trans. Parallel Distrib. Syst., 22(5): 847-859
-33 Qian Wang, Zesheng Chen, Chao Chen, Darknet-Based Inference of Internet Worm Temporal Characteristics. IEEE Transactions on Information Forensics and Security, 2011, IEEE Transactions on Information Forensics and Security, 6(4): 1382-1393
-34 Qian Wang, Kui Ren, Shucheng Yu, Wenjing Lou, Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. TOSN, 2011, TOSN, 8(1): 9
-35 Xinbo Gao, Qian Wang, Xuelong Li, Dacheng Tao, Kaibing Zhang, Zernike-Moment-Based Image Super Resolution. IEEE Transactions on Image Processing, 2011, IEEE Transactions on Image Processing, 20(10): 2738-2747
-36 Qian Wang, Hai Su, Kui Ren, Kwangjo Kim, Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. INFOCOM, 2011
-37 Eshwar Rohit, Hien Nguyen, Nagarajan Kanna, Jaspal Subhlok, Edgar Gabriel, Qian Wang, Margaret S. Cheung, David Anderson, A Robust Communication Framework for Parallel Execution on Volunteer PC Grids. CCGRID, 2011
-38 Qian Wang, Ping Xu, Kui Ren, Xiang-Yang Li, Delay-bounded adaptive UFH-based anti-jamming wireless communication. INFOCOM, 2011
-39 Bruno Barras, Jean-Pierre Jouannaud, Pierre-Yves Strub, Qian Wang, CoQMTU: A Higher-Order Type Theory with a Predicative Hierarchy of Universes Parametrized by a Decidable First-Order Theory. LICS, 2011
-40 Qian Wang, Kui Ren, Peng Ning, Anti-jamming communication in cognitive radio networks with unknown channel statistics. ICNP, 2011
2010
-41 Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM, 2010
-42 Ning Cao, Qian Wang, Kui Ren, Wenjing Lou, Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks. ICC, 2010
-43 Lina Chen, Hong Wang, Liangcai Zhang, Wan Li, Qian Wang, Yukui Shang, Yuehan He, Weiming He, Xu Li, Jingxie Tai, Xia Li, Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks. BMC Bioinformatics, 2010, BMC Bioinformatics, 11(): 392
-44 Jin Li 0002, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou, Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM, 2010
-45 Hongjun Jia, Guorong Wu, Qian Wang, Dinggang Shen, ABSORB: Atlas building by Self-Organized Registration and Bundling. CVPR, 2010
-46 Chi-Kin Chau, Qian Wang, Dah-Ming Chiu, On the Viability of Paris Metro Pricing for Communication and Service Networks. INFOCOM, 2010
2009
-47 Shekhar Srikantaiah, Mahmut T. Kandemir, Qian Wang, SHARP control: controlled shared cache management in chip multiprocessors. MICRO, 2009
-48 Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang, Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. INFOCOM, 2009
-49 Zesheng Chen, Chao Chen, Qian Wang, Delay-Tolerant Botnets. ICCCN, 2009
-50 Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, Ensuring data storage security in Cloud Computing. IWQoS, 2009
-51 Joseph L. Hellerstein, Sharad Singhal, Qian Wang, Research challenges in control engineering of computing systems. IEEE Transactions on Network and Service Management, 2009, IEEE Transactions on Network and Service Management, 6(4): 206-211
-52 Qian Wang, Cong Wang, Jin Li 0002, Kui Ren, Wenjing Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS, 2009
-53 Lina Chen, Liangcai Zhang, Yan Zhao, Liangde Xu, Yukui Shang, Qian Wang, Wan Li, Hong Wang, Xia Li, Prioritizing risk pathways: a novel association approach to searching for disease pathways fusing SNPs and pathways. Bioinformatics, 2009, Bioinformatics, 25(2): 237-242
2008
-54 Hongbing Fang, Qian Wang, Yi-Cheng Tu, Mark F. Horstemeyer, An Efficient Non-dominated Sorting Method for Evolutionary Algorithms. Evolutionary Computation, 2008, Evolutionary Computation, 16(3): 355-384
-55 Qian Wang, Kui Ren, Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks. ICC, 2008
-56 Jeonghwan Choi, Youngjae Kim, Anand Sivasubramaniam, Jelena Srebric, Qian Wang, Joonwon Lee, A CFD-Based Tool for Studying Temperature in Rack-Mounted Servers. IEEE Trans. Computers, 2008, IEEE Trans. Computers, 57(8): 1129-1142
2007
-57 Jeonghwan Choi, Youngjae Kim, Anand Sivasubramaniam, Jelena Srebric, Qian Wang, Joonwon Lee, Modeling and Managing Thermal Profiles of Rack-mounted Servers with ThermoStat. HPCA, 2007
2006
-58 Jingtao Li, Xueping Wang, Bing Liu 0009, Qian Wang, Gendu Zhang, A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities. WAIM, 2006
-59 Jianyong Zhang, Anand Sivasubramaniam, Qian Wang, Alma Riska, Erik Riedel, Storage performance virtualization via throughput and latency control. TOS, 2006, TOS, 2(3): 283-308
-60 Qian Wang, Dan Xu, Jing Xu, Zhiyong Bu, A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. IPCCC, 2006
2005
-61 Jianyong Zhang, Anand Sivasubramaniam, Alma Riska, Qian Wang, Erik Riedel, An interposed 2-Level I/O scheduling framework for performance virtualization. SIGMETRICS, 2005
-62 Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubramaniam, Qian Wang, Natarajan Gautam, Managing server energy and operational costs in hosting centers. SIGMETRICS, 2005
-63 Eric Anderson, Susan Spence, Ram Swaminathan, Mahesh Kallahalla, Qian Wang, Quickly finding near-optimal storage designs. ACM Trans. Comput. Syst., 2005, ACM Trans. Comput. Syst., 23(4): 337-374
-64 Jianyong Zhang, Anand Sivasubramaniam, Qian Wang, Alma Riska, Erik Riedel, Storage Performance Virtualization via Throughput and Latency Control. MASCOTS, 2005
-65 Qian Wang, Gopal Gupta, Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach. SAC, 2005
2003
-66 Qian Wang, Tao Xia, Chew Lim Tan, Lida Li, Directional Wavelet Approach to Remove Document Image Interference. ICDAR, 2003
-67 Qian Wang, Gopal Gupta, Continuation Semantics as Horn Clauses. LOPSTR, 2003
-68 Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, Kevin Fu, Plutus: Scalable Secure File Sharing on Untrusted Storage. FAST, 2003
2002
-69 Qingsheng Zhu, Rui Li, Qian Wang, Zhongfu Wu, Sender-Side Storage Scheme of Multimedia Email. JCIS, 2002
-70 Dongfeng Yuan, Peng Zhang, Qian Wang, Wayne E. Stark, A novel multilevel codes with 16QAM. WCNC, 2002
1999
-71 Chew Lim Tan, Bo Yuan, Weihua Huang, Qian Wang, Zheng Zhang 0003, Text/Graphics Separation using Agent-based Pyramid Operations. ICDAR, 1999

承担项目历史

*注:由于资助项目信息是由程序自动集成,因此以下项目信息仅供参考,如有任何错误,请联系rucwamdm(at)gmail(dot)com
项目起止年份项目名称项目类别经费(万)
2012~2014可注射型仿生颌骨材料的研制 国家自然科学基金-青年科学基金项目
项目号:81100785
22
2011~2013基于特征匹配的企业资源动态配置方法 国家自然科学基金-面上项目
项目号:61070160
30
2010~2012面向参与主体交易行为的电子现金公平交易协议理论与方法研究 国家自然科学基金-面上项目
项目号:70971141
25
2009~2011基于个性化需求的服务选择算法 国家自然科学基金-面上项目
项目号:60873236
30
2006~2008基于离线可信第三方的电子现金公平交易系统理论与方法研究 国家自然科学基金-青年科学基金项目
项目号:70501033
16.6

合作作者列表

1 于玮萍 []   []  [29]  
2 付鹤岗 [16]  
3 伍星 [26]  
4 何宁 [49]  
5 傅鹤岗 [18]   [19]  [15]  [12]  
6 冯珂 [47]  
7 刘乃嘉 [48]   [47]  
8 刘力 [11]  
9 刘慧君 [24]  
10 刘泓 [50]  
11 刘骥 [30]  
12 吕科 [49]  
13 吴中福 [7]   [9]  [16]  [17]  [25]  [37]  [15]  [12]  
14 吴靖 [6]  
15 吴黎明 [36]  
16 周小平 []  
17 居立 [48]  
18 张伟 [9]  
19 张晓东 [40]  
20 张晓敏 [33]  
21 张毅 [35]  
22 张润彤 [13]  
23 张烽 [4]  
24 张祖红 []  
25 徐惠民 [5]  
26 戚丽 [47]  
27 曹亮 []  
28 曾重阳 [52]  
29 朱夏 [39]   [46]  
30 朱庆生 [7]   [8]  [16]  [21]  [18]  [19]  [15]  [12]  
31 朱征宇 [8]   [21]  
32 朱文华 [20]  
33 朱郑州 [25]   [37]  
34 李唯唯 [18]  
35 李小平 [28]   [35]  [38]  [39]  [41]  [40]  [42]  [46]  
36 杜瑾珺 [32]  
37 杜祥宇 [14]  
38 杨传栋 [50]  
39 杨宁 [44]  
40 杨广超 [27]  
41 杨强 [17]  
42 杨德礼 [22]   [14]  [11]  
43 杨正宽 [45]  
44 汪丽芳 [34]  
45 王克俭 [41]  
46 王初阳 [42]  
47 王利平 [52]  
48 王均波 [43]  
49 王富强 [19]  
50 王海源 [23]  
51 王静 [49]  
52 程志锐 [48]  
53 程时端 [6]   [13]  
54 符云清 [9]  
55 苏荔 [51]  
56 苑迎春 [35]   [38]  [41]  [40]  [42]  
57 袁丁 [53]  
58 许光辰 [1]  
59 许红 []  
60 邓志成 [6]   [5]  
61 邓李维 [53]  
62 闵光太 [2]  
63 陈涛 [31]  
64 陈莉 [28]  
65 隆克平 [13]  
66 魏立新 [52]  
67 黄庆明 [51]  

单位历史信息

重庆大学计算机学院 (2000--2019)
东南大学计算机科学与工程学院 (2008--2011)
东南大学计算机科学与工程系 (1995--2006)

说明: 作者的单位历史信息是根据本系统中论文的单位信息采用算法自动计算得到,部分信息可能不准确,仅供参考。