dblp.uni-trier.dewww.uni-trier.de

Ke Wang Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2010
157EEWei Cheng, Ke Wang, Xiuying Zhang: Implementation of a COM-based decision-tree model with VBA in ArcGIS. Expert Syst. Appl. 37(1): 12-17 (2010)
2009
156EENoman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung: Privacy-preserving data mashup. EDBT 2009: 228-239
155EEKe Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong: FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139
154 Xiao Nian Tang, Ke Wang, Gui Jun Nian, Dan Wang, Na Ni: Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. IPCV 2009: 337-342
153EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061
152EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Anonymization-based attacks in privacy-preserving data publishing. ACM Trans. Database Syst. 34(2): (2009)
151EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu: Preserving Individual Privacy in Serial Data Publishing CoRR abs/0903.0682: (2009)
150EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu: Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755: (2009)
149EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu: Anonymization with Worst-Case Distribution-Based Background Knowledge CoRR abs/0909.1127: (2009)
148EEBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009)
147EERaymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009)
146EEXinghuo Zeng, Jian Pei, Ke Wang, Jinyan Li: PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining. Knowl. Inf. Syst. 20(3): 375-391 (2009)
2008
145EEWei Cheng, Ke Wang, Xiuying Zhang: A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. CSSE (4) 2008: 190-193
144EEBenjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Anonymity for continuous data publishing. EDBT 2008: 264-275
143EEXinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen: OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667
142EEYabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114
141EEKe Wang, James Nga-Kwok Liu, Weimin Ma: A Study on the Reliability of Case-Based Reasoning Systems. ICDM Workshops 2008: 60-68
140EEBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51
139EEYabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu: Anonymizing transaction databases for publication. KDD 2008: 767-775
138EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008)
137EERong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates Over Private Tables. IJDWM 4(4): 22-41 (2008)
136EEWeimin Ma, Shao-Hua Tang, Ke Wang: Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties. IJPRAI 22(1): 195-206 (2008)
135EEMohammed J. Zaki, Ke Wang: Special Issue on the Best Papers of SDM'08. Statistical Analysis and Data Mining 1(3): 109-110 (2008)
2007
134EEWeimin Ma, Ting Gao, Ke Wang: On the On-Line k -Taxi Problem with Limited Look Ahead. COCOA 2007: 72-80
133EERong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88
132EEWeimin Ma, Ke Wang: On the On-Line Weighted k-Taxi Problem. ESCAPE 2007: 152-162
131EEKe Wang, Wei Wang, Yan Zhuang: Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. ISNN (1) 2007: 834-842
130EERaymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Mining favorable facets. KDD 2007: 804-813
129EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Summarizing Review Scores of "Unequal" Reviewers. SDM 2007
128EEJian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang: Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5
127EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554
126EEYabo Xu, Ke Wang, Benyu Zhang, Zheng Chen: Privacy-enhancing personalized web search. WWW 2007: 591-600
125EELing Bai, Ke Wang: A diffusive single-species model with periodic coefficients and its optimal harvesting policy. Applied Mathematics and Computation 187(2): 873-882 (2007)
124EETao Jiang, Ah-Hwee Tan, Ke Wang: Mining Generalized Associations of Semantic Relations from Textual Web Content. IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007)
123EEBenjamin C. M. Fung, Ke Wang, Philip S. Yu: Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007)
122EEKe Wang, Chuanhua You: A note on identifying generalized diagonally dominant matrices. Int. J. Comput. Math. 84(12): 1863-1870 (2007)
121EEKe Wang, Benjamin C. M. Fung, Philip S. Yu: Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007)
120EEMoonjung Cho, Jian Pei, Ke Wang: Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007)
2006
119 Ke Wang, Yabo Xu, Rong She, Philip S. Yu: Classification Spanning Private Databases. AAAI 2006
118EEHuiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu: A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003
117EEYabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei: Classification spanning correlated data streams. CIKM 2006: 132-141
116EEKe Wang, Yuelong Jiang, Alexander Tuzhilin: Mining Actionable Patterns by Role Models. ICDE 2006: 16
115EEYi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang: Direct Marketing When There Are Voluntary Buyers. ICDM 2006: 922-927
114EEKe Wang, James N. K. Liu, Weimin Ma: Mining the Most Reliable Association Rules with Composite Items. ICDM Workshops 2006: 749-754
113EEZhao Xu, Ke Wang, Xiao-hua Qiao: Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. IIH-MSP 2006: 41-46
112EEZhao Xu, Ke Wang, Xiao-hua Qiao: A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. IIH-MSP 2006: 59-62
111EEWeimin Ma, Ke Wang: On the On-Line k-Truck Problem with Benefit Maximization. ISAAC 2006: 660-669
110EEKe Wang, Benjamin C. M. Fung: Anonymizing sequential releases. KDD 2006: 414-423
109EEHady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630
108EERaymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759
107EEKe Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248
106EENiels Provos, Joe McClain, Ke Wang: Search worms. WORM 2006: 1-8
105EEKe Wang, Weiwei, Yiying Tong, Mathieu Desbrun, Peter Schröder: Edge subdivision schemes and the construction of smooth vector fields. ACM Trans. Graph. 25(3): 1041-1048 (2006)
104EESalvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006)
103EEBing Zheng, Ke Wang: On accelerate overrelaxation methods for rank deficient linear systems. Applied Mathematics and Computation 173(2): 951-959 (2006)
102EEKe Wang, Bing Zheng: Symmetric successive overrelaxation methods for fuzzy linear systems. Applied Mathematics and Computation 175(2): 891-901 (2006)
101EEBing Zheng, Ke Wang: General fuzzy linear systems. Applied Mathematics and Computation 181(2): 1276-1286 (2006)
100EEKe Wang, Bing Zheng: Inconsistent fuzzy linear systems. Applied Mathematics and Computation 181(2): 973-981 (2006)
99EEBing Zheng, Ke Wang: Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. Applied Mathematics and Computation 182(2): 1709-1713 (2006)
98EEJian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu: Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006)
97EEIrene Pekerskaya, Jian Pei, Ke Wang: Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006)
2005
96EEBenjamin C. M. Fung, Ke Wang, Philip S. Yu: Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216
95EEKe Wang, Benjamin C. M. Fung, Philip S. Yu: Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473
94EEAda Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang: Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616
93EEYuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu: Mining Patterns That Respond to Actions. ICDM 2005: 669-672
92EEJian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang: Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756
91EEKe Wang, Benjamin C. M. Fung, Guozhu Dong: Integrating Private Databases for Data Analysis. ISI 2005: 171-182
90EESalvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28
89EEKe Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246
88EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
87 Ke Wang, Yabo Xu, Philip S. Yu, Rong She: Building Decision Trees on Records Linked through Key References. SDM 2005
86 Rong She, Ke Wang, Yabo Xu, Philip S. Yu: Pushing Feature Selection Ahead Of Join. SDM 2005
85EEDouglas A. Bodner, Ke Wang, Sheng Xu: Advanced decision logic in simulation of material flow processing networks. Winter Simulation Conference 2005: 1359-1366
84EEKe Wang, Sheng Xu, Leon F. McGinnis: Time management in distributed factory simulation, a case study using HLA. Winter Simulation Conference 2005: 1781-1786
83EEBing Zheng, Ke Wang: Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. Applied Mathematics and Computation 169(2): 1305-1323 (2005)
82EEFengying Wei, Ke Wang: Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. Applied Mathematics and Computation 170(2): 994-998 (2005)
81EELing Bai, Ke Wang: Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. Applied Mathematics and Computation 171(1): 531-546 (2005)
80EEKe Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung: Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005)
79EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005)
78EESenqiang Zhou, Ke Wang: Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005)
77EEKe Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005)
2004
76EEKe Wang, Yabo Xu, Jeffrey Xu Yu: Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187
75EERui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie: Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. CSB 2004: 152-160
74EEKe Wang, Philip S. Yu, Sourav Chakraborty: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256
73EELi-bao Zhang, Ke Wang: Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. MIAR 2004: 86-93
72EELi-bao Zhang, Ke Wang: New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. NPC 2004: 513-516
71EEKe Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222
70EEJing Wang, Ke Wang: Optimal control of harvesting for single population. Applied Mathematics and Computation 156(1): 235-247 (2004)
69EEQiang Yang, Ian Tian Yi Li, Ke Wang: Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004)
68EEGuozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou: Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004)
2003
67EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290-
66EEKe Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302
65EEKe Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang: Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740
64EERaymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378
63EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90
62EEKe Wang, Yuelong Jiang, Laks V. S. Lakshmanan: Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255
61EERong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman: Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445
60EESalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81
59EEBenjamin C. M. Fung, Ke Wang, Martin Ester: Hierarchical Document Clustering using Frequent Itemsets. SDM 2003
58EEKe Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu: Mining Changes of Classification by Correspondence Tracing. SDM 2003
57EEChang-Jian Zhao, Lokenath Debnath, Ke Wang: Positive periodic solutions of a delayed model in population. Appl. Math. Lett. 16(4): 561-565 (2003)
56EEQiang Yang, Tianyiian Li, Ke Wang: Web-Log Cleaning for Constructing Sequential Classifiers. Applied Artificial Intelligence 17(5-6): 431-441 (2003)
55EEKe Wang, Yu He, Jiawei Han: Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003)
54 Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman: PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Research 31(13): 3613-3617 (2003)
2002
53EEKe Wang, Senqiang Zhou, Jiawei Han: Profit Mining: From Patterns to Actions. EDBT 2002: 70-87
52EEEric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang: Mining Association Rules from Stars. ICDM 2002: 322-329
51EEJunqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han: Mining frequent item sets by opportunistic projection. KDD 2002: 229-238
50EEKe Wang, Ming-Yen Thomas Su: Item selection by "hub-authority" profit ranking. KDD 2002: 652-657
49EEKe Wang, Liu Tang, Jiawei Han, Junqiang Liu: Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340
48EEEmin Gün Sirer, Ke Wang: An access control language for web services. SACMAT 2002: 23-30
47EEGao Cong, Lan Yi, Bing Liu, Ke Wang: Discovering Frequent Substructures from Hierarchical Semi-structured Data. SDM 2002
46EEJiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang: CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626
2001
45 Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal: Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88
44 Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin: Mining Confident Rules Without Support Requirement. CIKM 2001: 89-96
43EESonny Han Seng Chee, Jiawei Han, Ke Wang: RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151
42EEKe Wang, Yu He: User-Defined Association Mining. PAKDD 2001: 387-399
41EEJiawei Han, Jian Pei, Guozhu Dong, Ke Wang: Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12
40EEGuozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang: Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330
39EEIan Tian Yi Li, Qiang Yang, Ke Wang: Classification Pruning for Web-request Prediction. WWW Posters 2001
2000
38EEKe Wang, Senqiang Zhou, Yu He: Growing decision trees on support-less association rules. KDD 2000: 265-269
37EEKe Wang, Yu He, Jiawei Han: Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52
36EEWeining Zhang, Ke Wang: An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000)
35EEKe Wang, Huiqing Liu: Discovering Structural Association of Semistructured Data. IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000)
1999
34EEKe Wang, Chu Xu, Bing Liu: Clustering Transactions Using Large Items. CIKM 1999: 483-490
33EEKe Wang, Beng Chin Ooi, Sam Yuan Sung: P-Tree: A B-Tree Index for Lists. DASFAA 1999: 221-228
32EEBing Liu, Wynne Hsu, Ke Wang, Shu Chen: Visually Aided Exploration of Interesting Association Rules. PAKDD 1999: 380-389
31EEKe Wang, Senqiang Zhou, Shiang Chen Liew: Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374
1998
30 Ke Wang, Soon Hock William Tay, Bing Liu: Interestingness-Based Interval Merger for Numeric Association Rules. KDD 1998: 121-128
29EEBing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi: Using Decision Tree Induction for Discovering Holes in Data. PRICAI 1998: 182-193
28EEKe Wang, Bing Liu: Concurrent Discretization of Multiple Attributes. PRICAI 1998: 250-259
27EEKe Wang, Huiqing Liu: Discovering Typical Structures of Documents: A Road Map Approach. SIGIR 1998: 146-154
26 Wang Chiew Tan, Ke Wang, Limsoon Wong: A Graphical Interface to Genome Multidatabases. J. Database Manag. 9(1): 24-32 (1998)
1997
25 Ke Wang: Mining Association Patterns from Nested Databases. DMKD 1997: 0-
24 Ke Wang, Han Chong Goh: Minimum Splits Based Discretization for Continuous Features. IJCAI (2) 1997: 942-951
23 Ke Wang, Huiqing Liu: Schema Discovery for Semistructured Data. KDD 1997: 271-274
22 Ke Wang, Suman Sundaresh: Selecting Features by Vertical Compactness of Data. KDD 1997: 275-278
21 Ke Wang, Weining Zhang, Siu-Cheung Chau: Weakly Independent Database Schemes. Acta Inf. 34(1): 1-22 (1997)
20 Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data. J. Intell. Inf. Syst. 9(1): 33-56 (1997)
1996
19 Wang Chiew Tan, Ke Wang, Limsoon Wong: QUICK: Graphical User Interface to Multiple Databases. DEXA Workshop 1996: 404-409
1995
18EEKe Wang: Some Positive Results for Boundedness of Multiple Recursive Rules. ICDT 1995: 383-396
17EEWeining Zhang, Ke Wang, Siu-Cheung Chau: Data Partition and Parallel Evaluation of Datalog Programs. IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995)
16EEKe Wang, Weining Zhang, Siu-Cheung Chau: Decomposition of Magic Rewriting. J. ACM 42(2): 329-381 (1995)
1994
15EEKe Wang, Li-Yan Yuan: First-Order Logic Characterization of Program Properties. IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994)
1993
14 Ke Wang, Weining Zhang, Siu-Cheung Chau: Minimize Linear Mutual Recursion by Rule Unfolding. ICCI 1993: 98-102
13 Héctor J. Hernández, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes. SIAM J. Comput. 22(1): 29-45 (1993)
1992
12 Ke Wang, Li-Yan Yuan: Enforce Constraints in Archival Databases. ICCI 1992: 397-400
11EEKe Wang, Marc H. Graham: Constant-Time Maintainability: A Generalization of Independence. ACM Trans. Database Syst. 17(2): 201-246 (1992)
10 Ke Wang, Li-Yan Yuan: Preservation of Integrity Constraints in Definite DATALOG Programs. Inf. Process. Lett. 44(4): 185-193 (1992)
9 Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies. Theor. Comput. Sci. 100(2): 347-364 (1992)
1991
8EEKe Wang, Li-Yan Yuan: Incremental Database Design Revisited. ICCI 1991: 219-230
7EEKe Wang, Li-Yan Yuan: First-Order Logic Reducible Programs. ICDE 1991: 746-755
6EEWeining Zhang, Ke Wang, Siu-Cheung Chau: Data partition: A Practical Parallel Evaluation of Datalog Programs. PDIS 1991: 98-105
1990
5EEKe Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. SIGMOD Conference 1990: 74-83
4EEMarc H. Graham, Ke Wang: On the Equivalence of an Egd to a Set of Fd's J. ACM 37(3): 474-490 (1990)
1989
3EEKe Wang: Can Constant-time Maintainability Be More Practical? PODS 1989: 120-127
1986
2EEMarc H. Graham, Ke Wang: Constant Time Maintenance or The Triumph of the fd. PODS 1986: 202-216
1984
1 In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. IEEE Trans. Computers 33(10): 906-911 (1984)

Coauthor Index

1Ling Bai [81] [125]
2Douglas A. Bodner [85]
3Fiona S. L. Brinkman [54] [61]
4Linh H. Bui [90]
5Sourav Chakraborty [74]
6Siu-Cheung Chau [6] [14] [16] [17] [21]
7Sonny Han Seng Chee [43]
8Nansheng Chen [143]
9Qiming Chen [45]
10Shu Chen [32]
11Zheng Chen [126]
12Fei Chen [61]
13Wei Cheng [145] [157]
14David Wai-Lok Cheung (David W. Cheung) [44]
15Francis Y. L. Chin (Francis Yuk-Lun Chin) [44]
16Moonjung Cho [120]
17Gao Cong [47]
18Gabriela F. Cretu-Ciocarlie (Gabriela F. Cretu) [89]
19Umeshwar Dayal [45]
20Mourad Debbabi [140]
21Lokenath Debnath [57]
22Mathieu Desbrun [105]
23Leslie J. Deutsch [1]
24Guozhu Dong [40] [41] [46] [66] [68] [77] [91]
25Martin Ester [54] [59] [61]
26Katalin de Fays [54]
27Ryan Ferster [90]
28Yoav Freund [75]
29Ada Wai-Chee Fu [52] [58] [64] [79] [93] [94] [108] [117] [127] [130] [133] [137] [139] [142] [144] [147] [149] [150] [151] [152] [155]
30Benjamin C. M. Fung [59] [91] [95] [96] [110] [121] [123] [140] [142] [144] [148] [156]
31Ting Gao [134]
32Jennifer L. Gardy [54] [61]
33Han Chong Goh [24]
34Marc H. Graham [2] [4] [11]
35Jiawei Han [37] [40] [41] [43] [45] [46] [49] [51] [53] [55] [66] [68] [77]
36Yu He [37] [38] [42] [44] [55]
37Héctor J. Hernández [13]
38Shlomo Hershkop [60] [63] [67] [90] [104]
39In-Shek Hsu [1]
40Wynne Hsu [32]
41Chia-Wei Hu [60] [63] [104]
42Sujun Hua [54]
43Patrick C. K. Hung [148] [156]
44Eugene Ie [75]
45Tao Jiang [124]
46Yuelong Jiang [62] [66] [77] [93] [116]
47Angelos D. Keromytis [88]
48Rui Kuang [75]
49Yi-Ting Lai [115]
50Laks V. S. Lakshmanan (V. S. Lakshmanan) [62]
51Joyce M. W. Lam [40] [68]
52Christophe G. Lambert [54]
53Ying Lan [118]
54Hady Wirawan Lauw [109] [129] [138] [153]
55Christina S. Leslie [75]
56Ian Tian Yi Li [39] [69]
57Jinyan Li [146]
58Jiuyong Li [108]
59Tianyiian Li [56]
60Wei-Jen Li [104]
61Shiang Chen Liew [31]
62Ee-Peng Lim [109] [129] [138] [153]
63Daymond Ling [115]
64Bing Liu [28] [29] [30] [32] [34] [47]
65Daxin Liu [118]
66Huiqing Liu [23] [27] [35]
67James Nga-Kwok Liu (James N. K. Liu) [114] [141]
68Jia Liu [151]
69Jian Liu [92] [98]
70Junqiang Liu [49] [51]
71Michael E. Locasto [88]
72Weimin Ma [111] [114] [132] [134] [136] [141]
73Joe McClain [106]
74Leon F. McGinnis [84]
75Noman Mohammed [156]
76Lai-Fun Mun [29]
77Kenta Nakai [54]
78Matthew J. Nesbitt [143]
79Eric Ka Ka Ng [52]
80Na Ni [154]
81Gui Jun Nian [154]
82Olivier Nimeskern [60] [63] [67] [104]
83Beng Chin Ooi [33]
84Yunhe Pan [51]
85Janak J. Parekh [107]
86Jian Pei [40] [41] [45] [46] [68] [92] [97] [98] [117] [120] [127] [128] [130] [142] [143] [144] [146] [147] [149] [152]
87Irene Pekerskaya [97]
88Helen Pinto [45]
89Niels Provos [106]
90Xin-Zhi Qi [29]
91Xiao-hua Qiao [112] [113]
92Irving S. Reed [1]
93Peter Schröder [105]
94Rong She [61] [86] [87] [117] [119] [133] [137]
95Hua Shi [115]
96Mahira Siddiqi [75]
97István Simon [54]
98Emin Gün Sirer [48]
99Cory Spencer [54]
100Salvatore J. Stolfo [60] [63] [67] [71] [88] [89] [90] [104] [107]
101Ming-Yen Thomas Su [50]
102Suman Sundaresh [22]
103Sam Yuan Sung [33]
104Ah-Hwee Tan [124]
105Wang Chiew Tan [19] [26]
106Liu Tang [49]
107Shao-Hua Tang [136]
108Xiao Nian Tang [154]
109Soon Hock William Tay [30]
110Yiying Tong [105]
111Trieu-Kien Truong [1]
112Gábor E. Tusnády [54]
113Alexander Tuzhilin [93] [116]
114Ismael A. Vergara [143]
115Dan Wang [154]
116Gaofei Wang [118]
117Haixun Wang [92] [98]
118Huiqiang Wang [118]
119Jianyong Wang [46] [92] [98]
120Jing Wang [70]
121Kai Wang [75]
122Lingyu Wang [140] [148]
123Wei Wang [128] [131]
124Zhibin Wang [128]
125Fengying Wei [82]
126 Weiwei [105]
127Limsoon Wong [19] [26]
128Raymond Chi-Wing Wong [64] [79] [94] [108] [127] [130] [147] [149] [150] [151] [152] [155]
129Chu Xu [34]
130Jian Xu [128]
131Sheng Xu [84] [85]
132Yabo Xu [76] [86] [87] [117] [119] [126] [133] [137] [139] [142] [149] [150] [151] [155]
133Zhao Xu [112] [113]
134Qiang Yang [39] [56] [65] [69] [80]
135Chiunn-Shyong Ye [1]
136Jack Man Shun Yeung [65] [80]
137Lan Yi [47]
138Chuanhua You [122]
139Jeffrey Xu Yu (Xu Yu) [58] [66] [76] [77]
140Philip S. Yu [74] [86] [87] [92] [95] [96] [98] [119] [121] [123] [139] [149] [150]
141Li-Yan Yuan [7] [8] [10] [12] [15]
142Mohammed Javeed Zaki (Mohammed J. Zaki) [135]
143Xinghuo Zeng [143] [146]
144Benyu Zhang [126]
145Jason Zhang [115]
146Li-bao Zhang [72] [73]
147Weining Zhang [6] [14] [16] [17] [21] [36]
148Xiuying Zhang [145] [157]
149Chang-Jian Zhao [57]
150Bing Zheng [83] [99] [100] [101] [102] [103]
151Senqiang Zhou [31] [38] [53] [58] [65] [78] [80]
152Yan Zhuang [131]
153Wei Zou [68]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)