default search action
Yau Jim Yip
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j6]Yijing Jiang, Shanyu Tang, Liping Zhang, Muzhou Xiong, Yau Jim Yip:
Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation. ACM Trans. Multim. Comput. Commun. Appl. 12(4): 54:1-54:20 (2016) - 2011
- [j5]Yongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip:
Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inf. Secur. 5(1): 26-32 (2011) - 2010
- [c22]Zhiyong Zhang, Joan Lu, Yau Jim Yip:
Automatic Segmentation for Breast Skin-line. CIT 2010: 1599-1604 - [c21]Zhiyong Zhang, Joan Lu, Yau Jim Yip:
Automatic Detection of Pectoral Muscle with the Maximum Intensity Change Algorithm. SGAI Conf. 2010: 489-494
2000 – 2009
- 2009
- [j4]Lizhen Wang, Lihua Zhou, Joan Lu, Jim Yip:
An order-clique-based approach for mining maximal co-locations. Inf. Sci. 179(19): 3370-3382 (2009) - [j3]Shanyu Tang, Yongfeng Huang, Yau Jim Yip:
Performance of Database Driven Network Applications from the User Perspective. KSII Trans. Internet Inf. Syst. 3(3): 235-250 (2009) - [c20]Baydaa Al-Hamadani, Raad Alwan, Joan Lu, Jim Yip:
Vague Content and Structure (VCAS) Retrieval for XML Electronic Healthcare Records (EHR). International Conference on Internet Computing 2009: 241-246 - [i1]Baolong Liu, Joan Lu, Jim Yip:
XML Data Integrity Based on Concatenated Hash Function. CoRR abs/0906.3772 (2009) - 2008
- [c19]Lizhen Wang, Yuzhen Bao, Joan Lu, Jim Yip:
A new join-less approach for co-location pattern mining. CIT 2008: 197-202 - [c18]Lizhen Wang, Yuzhen Bao, Joan Lu, Jim Yip:
A Web-Based Visual Spatial Co-Location Patterns. CW 2008: 675-681 - [c17]Gehao Lu, Joan Lu, Jim Yip:
Mobile Agent based Data Fusion for Wireless Sensor Networks with a XML Framework. International Conference on Internet Computing 2008: 298-303 - [c16]Gehao Lu, Joan Lu, Shaowen Yao, Jim Yip:
Investigation on FIPA Agent Communication Mechanism Based on Web Service. International Conference on Internet Computing 2008: 316-320 - 2007
- [c15]Lizhen Wang, Junli Lu, Joan Lu, Jim Yip:
AOG-ags Algorithms and Applications. ADMA 2007: 323-334 - [c14]Yi Che, Hua Long, Joan Lu, Jim Yip:
An Investigation in Self-similar Study and Implication of 3G Mobile Traffic. Communications in Computing 2007: 62-65 - [c13]Hua Long, Joan Lu, Shuiren Chao, Jim Yip:
Handoff Algorithm Improvement and its Analysis for Mobile Networks. Communications in Computing 2007: 66-71 - [c12]Gehao Lu, Joan Lu, Shaowen Yao, Jim Yip:
A Review on Computational Trust Models for Multi-agent Systems. International Conference on Internet Computing 2007: 325-331 - [c11]Ibrahim Mohammad Dweib, Joan Lu, Gary Allen, Jim Yip:
Schema Based Approach of Mapping XML documents to Relational Database. International Conference on Internet Computing 2007: 332-338 - [c10]Gehao Lu, Joan Lu, Shaowen Yao, Jim Yip:
A Comparative Study in Java-Based Development Plateforms for Multi-Agent Systems. International Conference on Internet Computing 2007: 339-345 - [c9]Seif El Duolaf El Haj, Joan Lu, Jim Yip:
Indexing Technique for XML Documents. International Conference on Internet Computing 2007: 346-354 - [c8]Lizhen Wang, Joan Lu, Jim Yip:
An Effective Approach to Predicting Plant Species in an Ecological Environment. IKE 2007: 245-250 - 2006
- [c7]Joan Lu, Umair Rahman, Jim Yip:
XML-Based Security - A New Challenge to I.T. Protection. International Conference on Internet Computing 2006: 352-360 - 2004
- [c6]Frank Wang, Sheng Jiang, Yau Jim Yip:
Web Intelligence Research Activities in the UK. Web Intelligence 2004: 807-808 - 2002
- [c5]Frank Wang, Ruby Sharma, Na Helian, Farhi Marir, Yau Jim Yip:
A management information system for public health. ECIS 2002: 1454-1464 - [c4]Frank Wang, Na Helian, Yau Jim Yip:
Run-Length Encoding Applied to Grid Space Storing and Indexing. ICWI 2002: 461-471 - [c3]Frank Wang, Ruby Sharma, Na Helian, Farhi Marir, Yau Jim Yip:
The Millennium Information System (MIS) for European Public Health and Environment Network (EPHEN). ICEIS 2002: 302-306 - 2001
- [c2]Farhi Marir, Yau Jim Yip:
IODBCON: An Integrated Object-Oriented Database System for Integrating Information about Architecture Design and Construction Processes. ICEIS (1) 2001: 36-43
1990 – 1999
- 1996
- [j2]Alex Brown, Yacine Rezgui, Grahame S. Cooper, Jim Yip, Peter Brandon:
Promoting Computer Integrated Construction Through the Use of Distribution Technology. J. Inf. Technol. Constr. 1: 51-67 (1996) - 1995
- [j1]Tariq M. Khan, Yau Jim Yip:
CBT II - Case-based computer-aided instruction: survey of principles, applications and issues. Knowl. Eng. Rev. 10(3): 235-268 (1995) - [c1]Tariq M. Khan, Yau Jim Yip:
Case-based Curriculum Planning for Computer-Aided Instruction. UK Workshop on Case-Based Reasoning 1995: 201-209
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 19:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint