关注
Ding-Zhu Du
Ding-Zhu Du
Professor of Computer Science, University of Texas at Dallas
在 utdallas.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Combinatorial group testing and its applications
D Du, FK Hwang, F Hwang
World Scientific, 2000
14272000
Improving wireless sensor network lifetime through power aware organization
M Cardei, DZ Du
Wireless networks 11, 333-340, 2005
12732005
Fuzzy multi-criteria decision making: theory and applications with recent developments
C Kahraman
Springer Science & Business Media, 2008
8982008
Regular languages
S Yu
Handbook of Formal Languages: Volume 1 Word, Language, Grammar, 41-110, 1997
6301997
Relay sensor placement in wireless sensor networks
X Cheng, DZ Du, L Wang, B Xu
Wireless Networks 14, 347-355, 2008
6162008
Theory of computational complexity
DZ Du, KI Ko
John Wiley & Sons, 2011
5092011
Spatial statistics in ArcGIS
LM Scott, MV Janikas
Handbook of applied spatial analysis: Software tools, methods and …, 2009
4602009
Handbook of combinatorial optimization
D Du, PM Pardalos
Springer Science & Business Media, 1998
368*1998
A polynomial‐time approximation scheme for the minimum‐connected dominating set in ad hoc wireless networks
X Cheng, X Huang, D Li, W Wu, DZ Du
Networks: An International Journal 42 (4), 202-208, 2003
3672003
Wireless sensor networks with energy efficient organization
M Cardei, D MacCallum, MX Cheng, M Min, X Jia, D Li, DZ Du
Journal of Interconnection Networks 3 (03n04), 213-229, 2002
3402002
Pooling designs and nonadaptive group testing: important tools for DNA sequencing
FK Hwang, D Du
World Scientific, 2006
3272006
Minimax and applications
DZ Du, PM Pardalos
Springer Science & Business Media, 1995
3131995
A proof of the Gilbert-Pollak conjecture on the Steiner ratio
DZ Du, FK Hwang
Algorithmica 7, 121-135, 1992
3021992
Design and analysis of approximation algorithms
D Du, KI Ko, X Hu
Springer, 2012
2712012
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
2702020
Approximations for Steiner trees with minimum number of Steiner points
D Chen, DZ Du, XD Hu, GH Lin, L Wang, G Xue
Theoretical Computer Science 262 (1-2), 83-99, 2001
2692001
Inverse problems: Tikhonov theory and algorithms
K Ito, B Jin
World Scientific, 2014
2652014
On greedy construction of connected dominating sets in wireless networks
Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du
Wireless Communications and Mobile Computing 5 (8), 927-932, 2005
2462005
A decision criterion for the optimal number of clusters in hierarchical clustering
Y Jung, H Park, DZ Du, BL Drake
Journal of Global Optimization 25 (1), 91-111, 2003
2422003
Adaptive influence maximization in dynamic social networks
G Tong, W Wu, S Tang, DZ Du
IEEE/ACM Transactions on Networking 25 (1), 112-125, 2016
2372016
系统目前无法执行此操作,请稍后再试。
文章 1–20