default search action
Jian Tang 0001
Person information
- affiliation: Memorial University of Newfoundland, Department of Computer Science, St. John's, Canada
Other persons with the same name
- Jian Tang — disambiguation page
- Jian Tang 0002 — Lanzhou University, School of Mathematics and Statistics, China (and 2 more)
- Jian Tang 0003 — Beijing University of Technology, College of Electronic and Control Engineering, China (and 1 more)
- Jian Tang 0004 — Wuhan University, GNSS Research Center, China (and 1 more)
- Jian Tang 0005 — HEC Montreal, QC, Canada (and 4 more)
- Jian Tang 0006 — Quzhou University, College of Mechanical Engineering, China
- Jian Tang 0007 — Sun Yat-sen University, School of Electronics and Information Engineering, Guangzhou, China
- Jian Tang 0008 — Midea Group Co Ltd, Foshan, China (and 3 more)
- Jian Tang 0009 — Central University of Finance and Economics, School of Information, Beijing, China
- Jian Tang 0010 — Technical University of Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Towards the design of real-time autonomous IoT NIDS. Clust. Comput. 26(5): 2489-2502 (2023) - [i1]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Balanced Datasets for IoT IDS. CoRR abs/2301.04008 (2023) - 2021
- [j14]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Ensemble Detection Model for IoT IDS. Internet Things 16: 100435 (2021) - 2020
- [c32]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
An Ensemble Feature Selection Method for IoT IDS. DependSys 2020: 41-48
2010 – 2019
- 2016
- [j13]Jian Tang, Shuigeng Zhou:
A New Approach for Feature Selection from Microarray Data Based on Mutual Information. IEEE ACM Trans. Comput. Biol. Bioinform. 13(6): 1004-1015 (2016) - 2010
- [j12]Zheng Chen, Jian Tang:
Using Gene Ontology to enhance effectiveness of similarity measures for microarray data. Int. J. Data Min. Bioinform. 4(5): 520-534 (2010) - [j11]Jian Tang, Ada Wai-Chee Fu:
Query rewritings using views for XPath queries, framework, and methodologies. Inf. Syst. 35(3): 315-334 (2010)
2000 – 2009
- 2008
- [c31]Zheng Chen, Jian Tang:
Using Gene Ontology to Enhance Effectiveness of Similarity Measures for Microarray Data. BIBM 2008: 66-71 - [c30]San-Yih Hwang, Jian Tang, Hong-Yang Lin:
A Probability-Based Framework for Dynamic Resource Scheduling in Grid Environment. GPC 2008: 59-70 - [c29]Junwei Wu, Jian Tang:
A bottom-up approach for XML documents classification. IDEAS 2008: 131-137 - 2007
- [j10]San-Yih Hwang, Haojun Wang, Jian Tang, Jaideep Srivastava:
A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. Inf. Sci. 177(23): 5484-5503 (2007) - [j9]Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W. Cheung:
Capabilities of outlier detection schemes in large datasets, framework and methodologies. Knowl. Inf. Syst. 11(1): 45-84 (2007) - [c28]Jianlong Qi, Jian Tang:
Integrating gene ontology into discriminative powers of genes for feature selection in microarray data. SAC 2007: 430-434 - 2006
- [c27]Jianlong Qi, Jian Tang:
Gene Ontology Driven Feature Selection from Microarray Gene Expression Data. CIBCB 2006: 1-7 - [c26]Xiao Bing Huang, Jian Tang:
A Method for Feature Selection on Microarray Data Using Support Vector Machine. DaWaK 2006: 513-523 - 2005
- [c25]Xiao Bing Huang, Jian Tang:
SPL: An Structured Pipeline Method for Frequent Remote Service Interactions in Bioinformatics Workflows. ICWS 2005: 795-796 - [c24]Jian Tang, Shuigeng Zhou:
A Theoretic Framework for Answering XPath Queries Using Views. XSym 2005: 18-33 - 2004
- [j8]San-Yih Hwang, Jian Tang:
Consulting past exceptions to facilitate workflow exception handling. Decis. Support Syst. 37(1): 49-69 (2004) - [j7]Jian Tang, Ada Wai-Chee Fu, Jari Veijalainen:
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies. Electron. Commer. Res. 4(4): 393-413 (2004) - 2003
- [j6]Jian Tang, Vagan Y. Terziyan, Jari Veijalainen:
Distributed PIN Verification Scheme for Improving Security of Mobile Devices. Mob. Networks Appl. 8(2): 159-175 (2003) - [c23]Zhixiang Chen, Ada Wai-Chee Fu, Jian Tang:
On Complementarity of Cluster and Outlier Detection Schemes. DaWaK 2003: 234-243 - [c22]Zhixiang Chen, Jian Tang, Ada Wai-Chee Fu:
Modeling and Efficient Mining of Intentional Knowledge of Outliers. IDEAS 2003: 44-53 - 2002
- [c21]Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David Wai-Lok Cheung:
Enhancing Effectiveness of Outlier Detections for Low Density Patterns. PAKDD 2002: 535-548 - 2001
- [c20]Jian Tang, Ada Wai-Chee Fu:
Secure E-Commerce Transactions, Modeling and Implementation Aspects. DS-9 2001: 53-67 - [c19]Jian Tang, Jari Veijalainen:
Using Agents to Improve Security and to Assist in Negotiations for E-Commerce Transactions in Mobile Computing. HICSS 2001 - [c18]Chun Hung Cheng, Jian Tang, Ada Wai-Chee Fu, Irwin King:
Hierarchical Classification of Documents with Error Control. PAKDD 2001: 433-443 - 2000
- [c17]Ada Wai-Chee Fu, Renfrew W.-w. Kwong, Jian Tang:
Mining N-most Interesting Itemsets. ISMIS 2000: 59-67
1990 – 1999
- 1999
- [j5]Jian Tang, Jari Veijalainen:
Using Fragmentation to Increase reliability for Workflow Systems. Trans. SDPS 3(2): 33-48 (1999) - [c16]Jian Tang:
Ad-Hoc Recovery in Workflows: A Formal Model and Some System Support Aspects. CoopIS 1999: 222-233 - [c15]San-Yih Hwang, Sun-Fa Ho, Jian Tang:
Mining Exception Instances to Facilitate Workflow Exception Handling. DASFAA 1999: 45-52 - [c14]Jian Tang, Xuemin Xing:
A Workflow Management Systems Architecture that Support Ad-Hoc Recoveries. IDEAS 1999: 332-340 - 1998
- [j4]Jian Tang, Jari Veijalainen:
Enforcement of Inter-Task Dependencies in Workflows, Characterization and Paradigm. Int. J. Cooperative Inf. Syst. 7(1): 19-54 (1998) - [c13]Jian Tang:
Using Incremental Pruning to Increase the Efficiency of Dynamic Itemset Counting for Association Rules. CIKM 1998: 273-280 - [c12]Jian Tang, San-Yih Hwang:
A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems. EDBT 1998: 484-498 - [c11]Jian Tang, Jari Veijalainen:
A Scheme to Enhance Reliability in Workflow Applications. IADT 1998: 86-93 - 1996
- [c10]Jian Tang, San-Yih Hwang:
Handling Uncertainties in Workflow Applications. CIKM 1996: 269-276 - [c9]Jian Tang, San-Yih Hwang:
Coping with Mismatched Semantics of Dependencies in Workflow Applications. DEXA 1996: 467-478 - 1995
- [c8]Jian Tang, Jari Veijalainen:
Transaction-oriented Work-flow Concepts in Inter-Organizational Environments. CIKM 1995: 250-259 - [c7]Jian Tang, Jari Veijalainen:
Enforcing Inter-Task Dependencies in Transactional Workflows. CoopIS 1995: 72-86 - 1994
- [j3]Jian Tang:
On Multilevel Voting. Distributed Comput. 8(1): 39-58 (1994) - [c6]Hao Chen, Jian Tang:
An Efficient Method for Mutual Exclusion in Truly Distributed Systems. ICDCS 1994: 97-104 - 1993
- [j2]Jian Tang, N. Natarajan:
Obtaining Coteries That Optimize the Availability of Replicated Databases. IEEE Trans. Knowl. Data Eng. 5(2): 309-321 (1993) - 1992
- [c5]Jian Tang:
Managing Replicated Data in Heterogeneous Database Systems. SRDS 1992: 12-19 - 1991
- [j1]Jian Tang, N. Natarajan:
A scheme for increasing availability in partitioned replicated databases. Inf. Sci. 53(1-2): 1-34 (1991) - 1990
- [c4]Jian Tang:
Voting Class - an Approach to Achieving High Availability for Replicated Data. DPDS 1990: 146-156
1980 – 1989
- 1989
- [c3]Jian Tang, N. Natarajan:
A Scheme for Maintaining Consistency and Availability of Replicated Files in a Partitioned Distributed System. ICDE 1989: 530-537 - [c2]Jian Tang, N. Natarajan:
A Static Pessimistic Scheme for Handling Replicated Databases. SIGMOD Conference 1989: 389-398 - 1987
- [c1]N. Natarajan, Jian Tang:
Synchronization of Redundant Computation in a Distributed System. SRDS 1987: 139-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint