default search action
Dong Jiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j10]Ronghe Wang, Bo Zhang, Jianning Bi, Xinhai Zhang, Xiaolei Guo, Dong Jiao, Jianghua Lv, Shilong Ma:
Cloud rendering learning platform technology research for visual analysis of large scale 3D multimedia data. Multim. Tools Appl. 79(7-8): 5371-5398 (2020)
2010 – 2019
- 2019
- [j9]Ronghe Wang, Bo Zhang, Manqing Wu, Jun Zhang, Xiaolei Guo, Xinhai Zhang, Huibo Li, Dong Jiao, Shilong Ma:
Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications. EURASIP J. Wirel. Commun. Netw. 2019: 79 (2019) - [c8]Ronghe Wang, Bo Zhang, Haiyong Xie, Dong Jiao, Shilong Ma:
A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology. CLOUD 2019: 314-323 - 2018
- [c7]Ronghe Wang, Bo Zhang, Jianning Bi, Xinhai Zhang, Xiaolei Guo, Dong Jiao:
GhostMobileCloud: A Cloud-Based Mobile Terminal User Accessing Remote 3D Scene Real-Time Communication Method. CSPS (2) 2018: 307-316 - 2015
- [j8]Guanghai Cui, Mingchu Li, Zhen Wang, Jiankang Ren, Dong Jiao, Jianhua Ma:
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective. Concurr. Comput. Pract. Exp. 27(12): 3044-3064 (2015) - [j7]Yan Yu, Ruicong Han, Xuefeng Zhao, Xingquan Mao, Wei-Tong Hu, Dong Jiao, Mingchu Li, Jinping Ou:
Initial Validation of Mobile-Structural Health Monitoring Method Using Smartphones. Int. J. Distributed Sens. Networks 11: 274391:1-274391:14 (2015) - [j6]Xiaofei Wang, Qianying Tang, Pulkit Jain, Dong Jiao, Chris H. Kim:
The Dependence of BTI and HCI-Induced Frequency Degradation on Interconnect Length and Its Circuit Level Implications. IEEE Trans. Very Large Scale Integr. Syst. 23(2): 280-291 (2015) - 2013
- [j5]Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. IET Inf. Secur. 7(4): 343-348 (2013) - [j4]Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:
Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. Secur. Commun. Networks 6(9): 1126-1142 (2013) - 2012
- [j3]Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou:
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j2]Dong Jiao, Bongjin Kim, Chris H. Kim:
Design, Modeling, and Test of a Programmable Adaptive Phase-Shifting PLL for Enhancing Clock Data Compensation. IEEE J. Solid State Circuits 47(10): 2505-2516 (2012) - 2011
- [c6]Pingqiang Zhou, Dong Jiao, Chris H. Kim, Sachin S. Sapatnekar:
Exploration of on-chip switched-capacitor DC-DC converter for multicore processors using a distributed power delivery network. CICC 2011: 1-4 - [c5]Dong Jiao, Chris H. Kim:
A programmable adaptive phase-shifting PLL for clock data compensation under resonant supply noise. ISSCC 2011: 272-274 - [c4]Dong Jiao, Mingchu Li, Cheng Guo, Jianhua Ma:
A Multi-attribute Hierarchical Threshold Scheme. iThings/CPSCom 2011: 667-671 - 2010
- [j1]Dong Jiao, Jie Gu, Chris H. Kim:
Circuit Design and Modeling Techniques for Enhancing the Clock-Data Compensation Effect Under Resonant Supply Noise. IEEE J. Solid State Circuits 45(10): 2130-2141 (2010) - [c3]Weifeng Sun, Yudan Zhu, Zhiyuan Su, Dong Jiao, Mingchu Li:
A Priority-Based Task Scheduling Algorithm in Grid. PAAP 2010: 311-315
2000 – 2009
- 2009
- [c2]Dong Jiao, Jie Gu, Chris H. Kim:
Circuit techniques for enhancing the clock data compensation effect under resonant supply noise. CICC 2009: 29-32 - 2008
- [c1]Dong Jiao, Jie Gu, Pulkit Jain, Chris H. Kim:
Enhancing beneficial jitter using phase-shifted clock distribution. ISLPED 2008: 21-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint