default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2018
- Tai-Chiu Hsung, John Lo, Mei-Man Chong, Tazuko K. Goto, Lim-Kwong Cheung:
Orbit Segmentation by Surface Reconstruction With Automatic Sliced Vertex Screening. IEEE Trans. Biomed. Eng. 65(4): 828-838 (2018) - 2015
- Ka Hing Cheng, Ching-Hsiang Cheng, Andy Kuo-An Chao, Dennis Kwong Chun Lo:
LASER light scribe and microwave annealing reduction of graphene oxide for supercapacitor applications. NEMS 2015: 380-383 - 2014
- Kensuke Ogawa, Hiroki Ishihara, Kazuhiro Goi, Yasuhiro Mashiko, Soon Thor Lim, Min Jie Sun, Sean Seah, Ching Eng Png, Tsung-Yang Liow, Xiaoguang Tu, Guo-Qiang Lo, Dim-Lee Kwong:
Fundamental characteristics and high-speed applications of carrier-depletion silicon Mach-Zehnder modulators. IEICE Electron. Express 11(24): 20142010 (2014) - Su Fong Chien, Ka Kien Lo, Kae Hsiang Kwong, Heng Siong Lim:
Performance Evaluation for Sum Capacity in OFDMA Systems with Proportional Fairness. CIT 2014: 1-2 - Tai-Chiu Hsung, John Lo, Mei-Man Chong, Lim-Kwong Cheung, Tazuko K. Goto:
Orbit segmentation by surface reconstruction with vertex screening. DSP 2014: 521-524 - 2013
- Kazuhiro Goi, Kensuke Ogawa, Yong Tsong Tan, Vivek Dixit, Soon Thor Lim, Ching Eng Png, Tsung-Yang Liow, Xiaoguang Tu, Guo-Qiang Lo, Dim-Lee Kwong:
Silicon Mach-Zehnder modulator using low-loss phase shifter with bottom PN junction formed by restricted-depth doping. IEICE Electron. Express 10(17): 20130552 (2013) - Yun Zhang, Sam Kwong, Long Xu, Sudeng Hu, Gangyi Jiang, C.-C. Jay Kuo:
Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model. IEEE Trans. Image Process. 22(9): 3497-3512 (2013) - 2012
- Harris Kwong, Sin-Min Lee, Sheng-Ping Bill Lo, Hsin-Hao Su, Yung-Chin Wang:
On uniformly balanced graphs. Australas. J Comb. 53: 83-96 (2012) - Tat Wing Chim, Jeanno Chin Long Cheung, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET. J. Information Security 3(1): 59-67 (2012) - Su Fong Chien, Ka Kien Lo, Kae Hsiang Kwong, Geong Sen Poh, David Chieng:
Delay, throughput and packet absorption rate analysis of heterogeneous WMN. ICWCA 2012: 1-6 - Ka Kien Lo, Kae Hsiang Kwong, David Chieng, Alvin Ting, Khong Neng Choong, Mazlan Abbas:
Bridging digital divide in Malaysia using low cost WiMAX-WiFi multi-hop network. ICWCA 2012: 1-6 - 2011
- Jeanno Chin Long Cheung, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui:
Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network. GLOBECOM 2011: 1-5 - Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7 - 2010
- Kwai-Sang Chin, Kwong-Chi Lo, Jendy P. F. Leung:
Development of user-satisfaction-based knowledge management performance measurement system with evidential reasoning approach. Expert Syst. Appl. 37(1): 366-382 (2010) - 2009
- Suk-Tak Chan, Sze-wing Tang, Kwok-wing Tang, Wing-kit Lee, Shing-shun Lo, Kenneth K. Kwong:
Hierarchical coding of characters in the ventral and dorsal visual streams of Chinese language processing. NeuroImage 48(2): 423-435 (2009) - Chi-Hang Fred Fung, Kiyoshi Tamaki, Bing Qi, Hoi-Kwong Lo, Xiongfeng Ma:
Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9(1&2): 131-165 (2009) - 2007
- Bing Qi, Chi-Hang Fred Fung, Hoi-Kwong Lo, Xiongfeng Ma:
Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1): 73-82 (2007) - 2006
- Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, Hoi-Kwong Lo:
Phase-Remapping Attack in Practical Quantum Key Distribution Systems. CoRR abs/quant-ph/0601115 (2006) - 2005
- Kin Kwong Leung, Chi Wan Sung, Tat M. Lok, Vijay K. Bhargava:
An optimal phase control algorithm for MISO systems with finite feedback. ISIT 2005: 1554-1557 - 2004
- Kin Kwong Leung, Chi Wan Sung, Wing Shing Wong, Tat-Ming Lok:
Convergence theorem for a general class of power-control algorithms. IEEE Trans. Commun. 52(9): 1566-1574 (2004) - 2001
- Kin Kwong Leung, Chi Wan Sung, Wing Shing Wong, Tat-Ming Lok:
Convergence theorem for a general class of power control algorithms. ICC 2001: 811-815
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 21:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint