СТ |
Cyber Warfare: Steganography vs. Steganalysis |
2004 |
Wang H., Wang Sh. |
|
|
|
Communications of the ACM |
27.11.2004 |
СТ |
Optimized Query Translation Strategy for XML Stored in Relational Database |
2004 |
Wang H., Li J., He Zh. |
Lecture Notes in Computer Science |
|
|
Lecture Notes in Computer Science |
15.09.2004 |
СТ |
Web Information Integration Based on Compressed XML |
2003 |
Wang H., Li J., He Z., Luo J. |
|
|
|
Lecture Notes in Computer Science |
28.11.2003 |
СТ |
Parallel Algorithm for Mining Maximal Frequent Patterns |
2003 |
Wang H., Xiao Z., Zhang H., Jiang S. |
|
|
|
Lecture Notes in Computer Science |
27.11.2003 |
СТ |
An Efficient Algorithm for Irregular Redistributions in Parallelizing Compilers |
2003 |
Wang H., Guo M., Prasad S. K., Pan Y., Chen W. |
|
|
|
Lecture Notes in Computer Science |
19.09.2003 |
СТ |
Z Approach to Semantic Web |
2002 |
Dong J. S., Sun J., Wang H. |
|
|
|
Lecture Notes in Computer Science |
20.11.2002 |
СТ |
Design Tools for Application Specific Embedded Processors |
2002 |
Qin W., Rajagopalan S., Vachharajani M., Wang H., Zhu X., August D., Keutzer K., Malik S., Peh L. -S. |
|
|
|
Lecture Notes in Computer Science |
12.11.2002 |
СТ |
User-Defined Aggregates in Database Languages |
2000 |
Wang H., Zaniolo C. |
Lecture Notes in Computer Science |
|
|
Lecture Notes in Computer Science |
03.02.2001 |
СТ |
Axiomatic Approach to Feature Subset Selection Based on Relevance |
1999 |
Wang H., Bell D., Murtagh F. |
|
|
|
IEEE Trans. on Pattern Analysis and Machine Intelligence |
03.06.1999 |
СТ |
Consumer Privacy Concerns about Internet Marketing |
1998 |
Wang H., Lee M.K. O., Wang C. |
|
|
|
Communications of the ACM |
10.04.1998 |
СТ |
The UNIX Tutor |
1992 |
Wang H., Kushniruk A. |
|
|
|
Lecture Notes in Computer Science |
03.07.1992 |
СТ |
Parallel parsing on a one-way linear array of finite-state machines |
1991 |
Ibarra O., Jiang T., Wang H. |
|
|
|
Theoretical Computer Science |
30.08.1991 |