default search action
G. Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]G. Wang, Q. Fang, J. Wang, Q. M. Li, J. Y. Chen, Y. Liu:
Estimation of load for tunnel lining in elastic soil using physics-informed neural network. Comput. Aided Civ. Infrastructure Eng. 39(17): 2701-2718 (2024) - [c13]H. Yang, Y. Li, J. Tang, R. An, Y. Zhang, L. Gao, N. Gao, H. Xu, Y. Du, Z. Liu, X. Ma, G. Wang, C. Zhao, J. Xiang, J. Zhao, W. Bu, K. Zheng, J. Kang, B. Gao, H. Qian, H. Wu:
Monolithic 3D Integration of Analog RRAM-Based Fully Weight Stationary and Novel CFET 2T0C-Based Partially Weight Stationary for Accelerating Transformer. VLSI Technology and Circuits 2024: 1-2 - 2022
- [j15]Samira Asadi, Mehrdad Moallem, G. Wang:
Simultaneous Sensor and Actuator Fault Reconstruction by Using a Sliding Mode Observer, Fuzzy Stability Analysis, and a Nonlinear Optimization Tool. Sensors 22(18): 6866 (2022)
2010 – 2019
- 2018
- [j14]Eric Li, Z. C. He, G. Wang, Yong Jong:
Fundamental study of mechanism of band gap in fluid and solid/fluid phononic crystals. Adv. Eng. Softw. 121: 167-177 (2018) - [j13]G. Wang:
Guest Editorial ISCAS 2018 Special Issue. IEEE Trans. Biomed. Circuits Syst. 12(6): 1278 (2018) - 2017
- [j12]Kelly R. Thorp, G. Wang, Kevin F. Bronson, M. Badaruddin, J. Mon:
Hyperspectral data mining to identify relevant canopy spectral features for estimating durum wheat growth, nitrogen status, and grain yield. Comput. Electron. Agric. 136: 1-12 (2017) - [j11]G. Wang, WeiQi Yan, Mohan S. Kankanhalli:
Content based authentication of visual cryptography. Multim. Tools Appl. 76(7): 9427-9441 (2017) - [c12]Hammam A. Alshazly, M. Hassaballah, Abdelmgeid A. Ali, G. Wang:
An Experimental Evaluation of Binary Feature Descriptors. AISI 2017: 181-191 - 2015
- [j10]Gregory Freeman, Paul Chang, E. R. Engbrecht, K. J. Giewont, David F. Hilscher, M. Lagus, Timothy J. McArdle, B. Morgenfeld, Shreesh Narasimha, James P. Norum, K. A. Nummy, Paul C. Parries, G. Wang, Jonathan K. Winslow, Paul D. Agnello, Rajeev Malik:
Performance-optimized gate-first 22-nm SOI technology with embedded DRAM. IBM J. Res. Dev. 59(1) (2015) - 2013
- [j9]J. Shu, G. Wang, K. Zhang:
Logistics distribution network design with two commodity categories. J. Oper. Res. Soc. 64(9): 1400-1408 (2013) - 2012
- [j8]X. L. Huang, G. Wang, F. Hu:
A novel Haar wavelet-based vector BPSK-OFDM robust to channel spectral nulls and with reduced cyclic prefix length and PAPR. Int. J. Commun. Syst. 25(10): 1350-1362 (2012) - [j7]G. Wang, X. X. Huang:
Levitin-Polyak Well-Posedness for Optimization Problems with Generalized Equilibrium Constraints. J. Optim. Theory Appl. 153(1): 27-41 (2012) - [c11]S. Haque, F. Dion, R. Frost, R. Groulx, S. E. Holland, A. Karcher, W. F. Kolbe, N. A. Roe, G. Wang, Y. Yu:
Design of low-noise output amplifiers for P-channel charge-coupled devices fabricated on high-resistivity silicon. Sensors, Cameras, and Systems for Industrial and Scientific Applications 2012: 82980X - 2010
- [c10]X. H. Wang, T. N. Wong, G. Wang:
Agent Ontology Interoperability Approach for MAS Negotiations in Virtual Enterprises. ICAART (2) 2010: 149-154 - [c9]G. Wang, T. N. Wong, X. H. Wang:
A Negotiation Protocol to Support Agent Argumentation and Ontology Interoperability in MAS-Based Virtual Enterprises. ITNG 2010: 448-453
2000 – 2009
- 2009
- [j6]L. Wang, G. Wang:
RFID-driven global supply chain and management. Int. J. Comput. Appl. Technol. 35(1): 42-49 (2009) - [j5]H. Wang, G. Wang, X. Wen, Y. Zhou:
An enterprise modelling method based on an extension mechanism. Int. J. Comput. Integr. Manuf. 22(9): 836-846 (2009) - [c8]Ying Che, G. Wang, X. X. Wen, B. Y. Ren:
Research on Computational Independent Model in the Enterprise Information System Development Mode Based on Model Driven and Software Component. IESA 2009: 85-89 - 2008
- [c7]Wei Kong, Paul C. Parries, G. Wang, Subramanian S. Iyer:
Analysis of Retention Time Distribution of Embedded DRAM - A New Method to Characterize Across-Chip Threshold Voltage Variation. ITC 2008: 1-7 - 2007
- [j4]X. Wen, X. Xu, G. Wang, Y. Gong, R. Lv:
An extended GRAI model for enterprise process diagnosis. Int. J. Comput. Integr. Manuf. 20(2&3): 189-198 (2007) - 2005
- [c6]H. K. Dai, G. Wang:
Mining a Class of Complex Episodes in Event Sequences. AAIM 2005: 460-471 - 2003
- [c5]G. Wang, Z. X. Cheng:
A Class of Non-Separable Bivariate Biothogonal Scaling Functions with Compact Support. WAA 2003: 682-687 - 2002
- [j3]G. Wang, Victor Sreeram, Wan Quan Liu:
Balanced performance preserving controller reduction. Syst. Control. Lett. 46(2): 99-110 (2002) - 2001
- [j2]G. Wang, Victor Sreeram, Wan Quan Liu:
Performance preserving controller reduction via additive perturbation of the closed-loop transfer function. IEEE Trans. Autom. Control. 46(5): 771-775 (2001)
1990 – 1999
- 1999
- [j1]G. Wang, Danesh K. Tafti:
Performance Enhancement on Microprocessors with Hierarchical Memory Systems for Solving Large Sparse Linear Systems. Int. J. High Perform. Comput. Appl. 13(1): 63-79 (1999) - 1998
- [c4]L. Zhou, G. Wu, G. Wang:
Shenzhen net based on ATM and internet techniques. Information Systems in the WWW Environment 1998: 346-360 - 1995
- [c3]S. Q. Zheng, G. Wang:
Constructing Hypernetworks Using Dual Hypergraphs. Parallel and Distributed Computing and Systems 1995: 167-169
1980 – 1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint