default search action
Xiang Lu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j56]Nijing Yang, Hong Peng, Jun Wang, Xiang Lu, Antonio Ramírez-de-Arellano, Xiangxiang Wang, Yongbin Yu:
Model design and exponential state estimation for discrete-time delayed memristive spiking neural P systems. Neural Networks 181: 106801 (2025) - 2024
- [j55]Jianwei Chen, Yi Zhang, Sheng He, Xiang Lu:
High-Accuracy Visible Light Positioning Algorithm Using Single LED Lamp With a Beacon. IEEE Access 12: 102337-102344 (2024) - [j54]Xiang Lu, Hao Wang, Jingjuan Zhang, Yongtao Zhang, Jin Zhong, Guanghe Zhuang:
Research on J wave detection based on transfer learning and VGG16. Biomed. Signal Process. Control. 95: 106420 (2024) - [j53]Zefa Li, Zhenyu Wu, Jiankang Chen, Yanling Li, Huibao Huang, Yu Lu, Xiang Lu, Junru Li:
Inverse analysis of deformation moduli for high arch dams using the displacement reconstruction technique and multi-objective optimization. Comput. Aided Civ. Infrastructure Eng. 39(10): 1507-1529 (2024) - [j52]Jichen Tian, Chen Chen, Xiang Lu, Yanling Li, Jiankang Chen:
Deep transfer learning-based time-varying model for deformation monitoring of high earth-rock dams. Eng. Appl. Artif. Intell. 138: 109310 (2024) - [j51]Zefa Li, Chuan Yin, Rengui Chen, Zhenyu Wu, Jiankang Chen, Xiang Lu:
A novel deformation monitoring model for high arch dams using impulse response-based equivalent temperature and machine learning-aided separate modeling. Expert Syst. Appl. 238(Part F): 122328 (2024) - [j50]Jun Li, Guanlun Sun, Xiang Lu, Rui Lin, Lena Wosinska:
Flexible-queue-management-based bandwidth allocation in higher-speed PONs. J. Opt. Commun. Netw. 16(10): 40- (2024) - [j49]Xiang Lu, Rongliang Zhang, Xinzheng Lyu, Xu Cui, Fang Kong, Xiaohan Guo, Hongyu Sun:
A Measurement Angle Error Correction Method for Polarized Images Based on Levenberg-Marquardt. IEEE Trans. Instrum. Meas. 73: 1-8 (2024) - [i2]Yao Zhao, Tao Wu, Yijie Zhu, Xiang Lu, Jun Wang, Haitham Bou-Ammar, Xinyu Zhang, Peng Du:
ZSL-RPPO: Zero-Shot Learning for Quadrupedal Locomotion in Challenging Terrains using Recurrent Proximal Policy Optimization. CoRR abs/2403.01928 (2024) - 2023
- [j48]Jian-Hang Li, Xin-Yue Gao, Xiang Lu, Guo-Dong Liu:
Multi-Head Attention-Based Hybrid Deep Neural Network for Aeroengine Risk Assessment. IEEE Access 11: 113376-113389 (2023) - [j47]Xiang Lu, Wei Zhou, Hai-Bang Ly, Chongchong Qi, Thuy-Anh Nguyen, May Huu Nguyen, Jiandong Huang, Binh Thai Pham:
Optimization of neural network parameters in improvement of particulate matter concentration prediction of open-pit mining. Appl. Soft Comput. 147: 110769 (2023) - [j46]Xiang Lu, Xingrui Wang, Wanying Zhang, Anhao Wen, Yande Ren:
An end-to-end model for ECG signals classification based on residual attention network. Biomed. Signal Process. Control. 80(Part): 104369 (2023) - [j45]Hongyu Sun, Jiao Song, Shanshan Zhou, Qiang Liu, Xiang Lu, Mingming Qi:
Guided wave signal-based sensing and classification for small geological structure. IET Signal Process. 17(7) (2023) - [j44]Teng-Fei Ding, Kang Zhou, Ming-Feng Ge, Xiang Lu, Guang Ling:
Fully distributed practical bipartite formation tracking of networked Lagrangian systems with actuator faults and bounded inputs. Int. J. Control 96(11): 2928-2936 (2023) - [j43]Zhongkai Wen, Huan Zhang, Weiping Shu, Liqiang Zhang, Lei Liu, Xiang Lu, Yashi Zhou, Jingjing Ren, Shuang Li, Qingjun Zhang:
The SSR Brightness Temperature Increment Model Based on a Deep Neural Network. Remote. Sens. 15(17): 4149 (2023) - [c51]Yirui Bai, Zixuan Liu, Xuefeng Liu, Xiang Lu, Hong Lei:
A cross-chain identity authentication scheme based on DID. Blockchain 2023: 172-179 - [c50]Shijie Luan, Xiang Lu, Zhuangzhuang Zhang, Guangsheng Chang, Yunchuan Guo:
Efficient and Privacy-Preserving Byzantine-Robust Federated Learning. GLOBECOM 2023: 2202-2208 - [c49]Yulong Chen, YanJie Pei, Xiang Lu, Mengyao Shi:
Point Multiplication ZigZag: An Optimized Co-Processor Architecture Design for SM2/3 Based on RISC-V. ICC 2023: 3793-3798 - 2022
- [j42]Xiang Lu, Chen Chen, Zefa Li, Jiankang Chen, Liang Pei, Kun He:
Bayesian network safety risk analysis for the dam-foundation system using Monte Carlo simulation. Appl. Soft Comput. 126: 109229 (2022) - [j41]Izhar Mithal Jiskani, Qingxiang Cai, Wei Zhou, Xiang Lu, Syed Ahsan Ali Shah:
An integrated fuzzy decision support system for analyzing challenges and pathways to promote green and climate smart mining. Expert Syst. Appl. 188: 116062 (2022) - [j40]Liang Pei, Chen Chen, Kun He, Xiang Lu:
System reliability of a gravity dam-foundation system using Bayesian networks. Reliab. Eng. Syst. Saf. 218(Part): 108178 (2022) - [j39]Mei Li, Jiajun Zhang, Xiang Lu, Chengqing Zong:
Dual-View Conditional Variational Auto-Encoder for Emotional Dialogue Generation. ACM Trans. Asian Low Resour. Lang. Inf. Process. 21(3): 46:1-46:18 (2022) - [c48]Yuankun Zhou, Shuping Wang, Xiang Lu, Gang Wang:
Omni-Directional Mobile Inspection System for Hazardous Chemical Warehousing Based on the Fusion of Multiple Data Sources. ICAIT 2022: 160-165 - [c47]Shanshan Wu, Wen Lu, Kezhang Lin, Xiang Lu, Dong Jin:
Magic Mirror by Bidirectional GAN: A Video Data Theft-Proof Framework. ICC 2022: 2059-2064 - [c46]Xingrui Wang, Lei Sun, Anhao Wen, Yucong Leng, Xiang Lu:
Two Simulation Methods of J Wave Signal in ECG. ICCT 2022: 1169-1173 - [c45]Xiang Lu, Huaxing Kuang, Jun Guan, Heng-liang Zhou, Yulei Qian:
Cramér-Rao Bound Analysis of Passive Localization in Collaborative Environment of Surface Ships. IGARSS 2022: 2323-2326 - 2021
- [j38]Xin Chen, Wei Gao, Jie Li, Dongfang You, Zhaolei Yu, Mingzhi Zhang, Fang Shao, Yongyue Wei, Ruyang Zhang, Theis Lange, Qianghu Wang, Feng Chen, Xiang Lu, Yang Zhao:
A predictive paradigm for COVID-19 prognosis based on the longitudinal measure of biomarkers. Briefings Bioinform. 22(6) (2021) - [j37]Xiang Lu, Yaoxiang Li, Tanzy M. T. Love:
On Bayesian Analysis of Parsimonious Gaussian Mixture Models. J. Classif. 38(3): 576-593 (2021) - [j36]Ying-Jie Zhang, Xiang Lu, Hai-Feng Lang, Zhong-Xiao Man, Yun-Jie Xia, Heng Fan:
Quantum speedup dynamics process without non-Markovianity. Quantum Inf. Process. 20(3): 87 (2021) - 2020
- [j35]Peirui Bai, Kai Yang, Xiaolin Min, Ziyang Guo, Chang Li, Yingxia Fu, Chao Han, Xiang Lu, Qingyi Liu:
A Novel Framework for Improving Pulse-Coupled Neural Networks With Fuzzy Connectedness for Medical Image Segmentation. IEEE Access 8: 138129-138140 (2020) - [j34]Rui Zhou, Xiang Lu, Shuai Lu, Yang Fu, Mingjie Tang:
Phone Position Independent Recognition of FineWalking Modes with Phone Sensors. Ad Hoc Sens. Wirel. Networks 46(1-2): 139-161 (2020) - [j33]Jing Si, Rong Guo, Xiang Lu, Chao Han, Li Xu, Dan Xing, Caiping Chen:
Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review. BMC Medical Informatics Decis. Mak. 20(1): 275 (2020) - [j32]Chinedum Emmanuel Okwudire, Xiang Lu, Giridharan Kumaravelu, Harsha V. Madhyastha:
A three-tier redundant architecture for safe and reliable cloud-based CNC over public internet networks. Robotics Comput. Integr. Manuf. 62: 101880 (2020) - [j31]Rui Zhou, Ziyuan Gong, Xiang Lu, Yang Fu:
WiFlowCount: Device-Free People Flow Counting by Exploiting Doppler Effect in Commodity WiFi. IEEE Syst. J. 14(4): 4919-4930 (2020) - [j30]Xiali Wang, Xiang Lu:
A Host-Based Anomaly Detection Framework Using XGBoost and LSTM for IoT Devices. Wirel. Commun. Mob. Comput. 2020: 8838571:1-8838571:13 (2020) - [j29]Rui Zhou, Xiang Lu, Yang Fu, Mingjie Tang:
Device-free crowd counting with WiFi channel state information and deep neural networks. Wirel. Networks 26(5): 3495-3506 (2020)
2010 – 2019
- 2019
- [j28]Song Jiang, Caiwu Lu, Sai Zhang, Xiang Lu, Sang-Bing Tsai, Cheng-Kuang Wang, Yuan Gao, Yufei Shi, Chien-Hung Lee:
Prediction of Ecological Pressure on Resource-Based Cities Based on an RBF Neural Network Optimized by an Improved ABC Algorithm. IEEE Access 7: 47423-47436 (2019) - [j27]Xiang Lu, Wei Zhou, Xiaohua Ding, Xuyang Shi, Boyu Luan, Ming Li:
Ensemble Learning Regression for Estimating Unconfined Compressive Strength of Cemented Paste Backfill. IEEE Access 7: 72125-72133 (2019) - [j26]Xiaojie Fan, Lina Wang, Fang Ren, Yulai Xie, Xiang Lu, Yiying Zhang, Tianwen Zhangsun, Wei Chen, Jianping Wang:
Feature Fusion-Based Multi-Task ConvNet for Simultaneous Optical Performance Monitoring and Bit-Rate/Modulation Format Identification. IEEE Access 7: 126709-126719 (2019) - [j25]Xiaohua Ding, Wei Zhou, Xiang Lu, Ming Li, Ebelia Manda, Xuyang Shi, Boyu Luan, Chongchong Qi:
Distribution Characteristics of Fragments Size and Optimization of Blasting Parameters Under Blasting Impact Load in Open-Pit Mine. IEEE Access 7: 137501-137516 (2019) - [j24]Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu:
Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation. Comput. Networks 158: 184-192 (2019) - [j23]Xiang Lu, Ziyang Chen, Lianpo Wang, Ruidong Li, Chao Zhai:
RF-Drone: Multi-Tag System for RF-ID Enables Drone Tracking in GPS-Denied Environments. IEICE Trans. Commun. 102-B(10): 1941-1950 (2019) - [c44]Chao Liu, Xinghua Wu, Min Yu, Gang Li, Jianguo Jiang, Weiqing Huang, Xiang Lu:
A Two-Stage Model Based on BERT for Short Fake News Detection. KSEM (2) 2019: 172-183 - [c43]Xiaohan Zhu, Xiang Lu, Shaobo Wu:
Research on Pricing Mechanism and Security of Digital Currency. NaNA 2019: 325-331 - 2018
- [c42]Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu:
How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure? INFOCOM 2018: 2501-2509 - [c41]Rui Zhou, Meng Hao, Xiang Lu, Mingjie Tang, Yang Fu:
Device-Free Localization Based on CSI Fingerprints and Deep Neural Networks. SECON 2018: 226-234 - [c40]Nijing Yang, Chenyu Yang, Yongbin Yu, Xiang Lu, Lin Wang, Tashi Nyima:
Study on Acttive Filter Based on Memristor and Memcapacitor. WOCN 2018: 1-4 - 2017
- [j22]Jie Wu, Xiang Lu, Dong Guo, Liang Liang:
Slacks-Based Efficiency Measurements with Undesirable Outputs in Data Envelopment Analysis. Int. J. Inf. Technol. Decis. Mak. 16(4): 1005-1022 (2017) - [j21]He Tang, Yong Peng, Xiang Lu, Albert Z. Wang, Hai Wang:
A quantitative design methodology for high-speed interpolation/averaging ADCs. Integr. 58: 215-224 (2017) - [j20]Zhenyu Wei, Xiang Lu, Tingjun Shi:
基于PKI体系的跨域密钥协商协议 (Cross-domain PKI-based Key Agreement Protocol). 计算机科学 44(1): 155-158 (2017) - [j19]Haojin Zhu, Kuai Xu, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 293-295 (2017) - [j18]Xiang Lu, Linlin Tu, Xinyun Zhou, Naixue Xiong, Limin Sun:
ViMediaNet: an emulation system for interactive multimedia based telepresence services. J. Supercomput. 73(8): 3562-3578 (2017) - [c39]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6 - [c38]Zhuo Lu, Mingkui Wei, Xiang Lu:
How they interact? Understanding cyber and physical interactions against fault propagation in smart grid. INFOCOM 2017: 1-9 - [c37]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45 - [c36]Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, Yao Liu:
Stateful Inter-Packet Signal Processing for Wireless Networking. MobiCom 2017: 15-27 - [c35]Ahmed Salem, Xuening Liao, Yulong Shen, Xiang Lu:
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework. NaNA 2017: 326-329 - [c34]Rui Zhou, Jiesong Chen, Xiang Lu, Jia Wu:
CSI fingerprinting with SVM regression to achieve device-free passive localization. WoWMoM 2017: 1-9 - 2016
- [j17]Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang:
Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int. J. Grid Util. Comput. 7(1): 1-11 (2016) - [j16]Ning Gao, Xiaojun Jing, Songlin Sun, Junsheng Mu, Xiang Lu:
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 10(7): 3414-3434 (2016) - [j15]Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:
An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9(4): 752-761 (2016) - [j14]Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016) - [c33]Shichao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang, Limin Sun:
Zero reconciliation secret key extraction in MIMO backscatter wireless systems. ICC 2016: 1-6 - [c32]Gaofeng Li, Lei Sun, Xiang Lu, Jie Hao, Jingtai Liu:
A practical, fast, and low-cost kinematic calibration scheme for a deformable manipulator by using Leap Motion. ROBIO 2016: 719-724 - 2015
- [j13]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6): 1070-1081 (2015) - [j12]Chunhua Zhang, Xiang Lu, Yuan-yuan Tan, Ya Shun Wang:
Reliability demonstration methodology for products with Gamma Process by optimal accelerated degradation testing. Reliab. Eng. Syst. Saf. 142: 369-377 (2015) - [c31]Kaixuan Xie, Shiming Ge, Rui Yang, Xiang Lu, Limin Sun:
Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. CCCV (1) 2015: 249-257 - [c30]Shuixian Chen, Xiang Lu, Limin Sun, Shiming Ge:
Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications. GLOBECOM 2015: 1-6 - [c29]Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, Limin Sun:
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. GLOBECOM 2015: 1-6 - [c28]Yongming Jin, Hongsong Zhu, Zhiqiang Shi, Xiang Lu, Limin Sun:
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. ICC 2015: 7234-7239 - 2014
- [j11]Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang:
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Clust. Comput. 17(4): 1369-1381 (2014) - [j10]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(2): 12 (2014) - [c27]Xiang Lu, Jianxun Liu:
Performance of Space Network Time Synchronization Protocol in Proximity Link. 3PGCIC 2014: 628-632 - [c26]Xiang Lu, Lei Xie, Yafeng Yin, Wei Wang, Baoliu Ye, Sanglu Lu:
Efficient localization based on imprecise anchors in RFID system. ICC 2014: 142-147 - [c25]Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. INFOCOM 2014: 2337-2345 - [c24]Xiang Lu, Kaiyan Yu, Yizhai Zhang, Jingang Yi, Jingtai Liu:
Whole-body pose estimation in physical rider-bicycle interactions with a monocular camera and a set of wearable gyroscopes. IROS 2014: 4124-4129 - [c23]Xiang Lu, Jingtai Liu, Jie Hao, Sen Zhang, Lei Sun:
Self-calibration of deformable arm with a monocular camera. ROBIO 2014: 861-866 - [c22]Sen Zhang, Lei Sun, Zhongliang Chen, Xiang Lu, Jingtai Liu:
Smooth path planning for a home service robot using η3-splines. ROBIO 2014: 1910-1915 - 2013
- [j9]Xinghua Li, Xiang Lu, Jianfeng Ma:
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. Smart Comput. Rev. 3(3): 174-189 (2013) - [j8]Xiang Lu, Wenye Wang, Jianfeng Ma:
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation. IEEE Trans. Smart Grid 4(1): 170-183 (2013) - [c21]He Tang, Yong Peng, Xiang Lu, Hai Wang, Albert Z. Wang:
Quantitative analysis for high speed interpolated/averaging ADC. ASICON 2013: 1-4 - [c20]Kaiyan Yu, Xiang Lu, Jingang Yi, Jerry W. Shan:
Electrophoresis-based motion planning and control of a nanowire in fluid suspension. CASE 2013: 819-824 - [c19]Lei Xie, Yafeng Yin, Xiang Lu, Bo Sheng, Sanglu Lu:
iFridge: an intelligent fridge for food management based on RFID technology. UbiComp (Adjunct Publication) 2013: 291-294 - [c18]Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92 - [c17]Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun:
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617 - 2012
- [j7]Xiang Lu, Wenye Wang, Jianfeng Ma:
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems. Int. J. Distributed Sens. Networks 8 (2012) - [c16]Yan Li, Jingtai Liu, Haifeng Li, Xiang Lu, Lei Sun:
Modeling and control architecture for the competitive networked robot system based on POMDP. MFI 2012: 58-64 - [c15]Fei Wang, Xiang Lu, Wenye Wang, Alex Q. Huang:
Development of distributed grid intelligence platform for solid state transformer. SmartGridComm 2012: 481-485 - 2011
- [j6]Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park:
Authentications and Key Management in 3G-WLAN Interworking. Mob. Networks Appl. 16(3): 394-407 (2011) - [c14]Xiang Lu, Zhuo Lu, Wenye Wang, Jianfeng Ma:
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6 - [c13]Xiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma:
From security to vulnerability: Data authentication undermines message delivery in smart grid. MILCOM 2011: 1183-1188 - [c12]Xiang Lu, Wenye Wang, Avik Juneja, Alexander Dean:
Talk to transformers: An empirical study of device communications for the FREEDM system. SmartGridComm 2011: 303-308
2000 – 2009
- 2007
- [j5]Jing Wang, Duncan M. Hank Walker, Xiang Lu, Ananta K. Majhi, Bram Kruseman, Guido Gronthoud, Luis Elvira Villagra, Paul J. A. M. van de Wiel, Stefan Eichenberger:
Modeling Power Supply Noise in Delay Testing. IEEE Des. Test Comput. 24(3): 226-234 (2007) - [c11]Xiang Lu, Shuqian Luo:
The Application of Watersnakes Algorithm in Segmentation of the Hippocampus from Brain MR Image. MIMI 2007: 277-286 - 2006
- [c10]Wei Tang, Qing-Guo Wang, Xiang Lu, Zhiping Zhang:
Why Ti=4Td for PID Controller Tuning. ICARCV 2006: 1-2 - [i1]Xiang Lu, Jiajia Chen, Sailing He:
An Algorithm for Constructing All Families of Codes of Arbitrary Requirement in an OCDMA System. CoRR abs/cs/0601088 (2006) - 2005
- [b1]Xiang Lu:
Fault modeling, delay evaluation and path selection for delay test under process variation in nano-scale VLSI circuits. Texas A&M University, College Station, USA, 2005 - [j4]Yi-Jen Chiang, Tobias Lenz, Xiang Lu, Günter Rote:
Simple and optimal output-sensitive construction of contour trees using monotone paths. Comput. Geom. 30(2): 165-195 (2005) - [j3]Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker, Weiping Shi:
Longest-path selection for delay test under process variation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(12): 1924-1929 (2005) - [c9]Jing Wang, Ziding Yue, Xiang Lu, Wangqi Qiu, Weiping Shi, D. M. H. Walker:
A vector-based approach for power supply noise analysis in test compaction. ITC 2005: 10 - [c8]Jing Wang, Xiang Lu, Wangqi Qiu, Ziding Yue, Steve Fancler, Weiping Shi, D. M. H. Walker:
Static Compaction of Delay Tests Considering Power Supply Noise. VTS 2005: 235-240 - 2004
- [c7]Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker, Weiping Shi:
Longest path selection for delay test under process variation. ASP-DAC 2004: 98-103 - [c6]Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker, Weiping Shi:
PARADE: PARAmetric Delay Evaluation under Process Variation. ISQED 2004: 276-280 - [c5]Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker, Weiping Shi:
A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide. MTV 2004: 97-102 - [c4]Wangqi Qiu, Xiang Lu, Jing Wang, Zhuo Li, D. M. H. Walker, Weiping Shi:
A Statistical Fault Coverage Metric for Realistic Path Delay Faults. VTS 2004: 37-42 - 2003
- [j2]Yi-Jen Chiang, Xiang Lu:
Progressive Simplification of Tetrahedral Meshes Preserving All Isosurface Topologies. Comput. Graph. Forum 22(3): 493-504 (2003) - [j1]Zhuo Li, Xiang Lu, Wangqi Qiu, Weiping Shi, D. M. H. Walker:
A circuit level fault model for resistive bridges. ACM Trans. Design Autom. Electr. Syst. 8(4): 546-559 (2003) - [c3]Wangqi Qiu, Xiang Lu, Zhuo Li, D. M. H. Walker, Weiping Shi:
CodSim -- A Combined Delay Fault Simulator. DFT 2003: 79- - [c2]Zhuo Li, Xiang Lu, Weiping Shi:
Process variation dimension reduction based on SVD. ISCAS (4) 2003: 672-675 - [c1]Zhuo Li, Xiang Lu, Wangqi Qiu, Weiping Shi, D. M. H. Walker:
A Circuit Level Fault Model for Resistive Opens and Bridges. VTS 2003: 379-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint