default search action
Edward Chow
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c10]Arij Alfaidi, Edward Chow:
Saving Electronic Health Record (EHR) in private and secure mHealth system with blockchain Smart contracts. AINA (3) 2021: 159-164 - 2020
- [j5]Pegah Aslani, Leah Drost, Yuexi Huang, Benjamin B. C. Lucht, Erin Wong, Gregory J. Czarnota, Caitlin Yee, Bo Angela Wan, Vithusha Ganesh, Samuel T. Gunaseelan, Elizabeth David, Edward Chow, Kullervo Hynynen:
Thermal Therapy With a Fully Electronically Steerable HIFU Phased Array Using Ultrasound Guidance and Local Harmonic Motion Monitoring. IEEE Trans. Biomed. Eng. 67(7): 1854-1862 (2020)
2010 – 2019
- 2019
- [c9]Ahmed Al Guqhaiman, Edward Chow:
Multi-channel software-based MAC protocol for UWSNs. IPSN 2019: 323-324 - [c8]Rui Zhao, Edward Chow, Chunchun Li:
Traffic-Based Automatic Detection of Browser Fingerprinting. SecureComm (1) 2019: 365-385 - [i3]Kyongsik Yun, Luan Nguyen, Tuan Nguyen, Doyoung Kim, Sarah Eldin, Alexander Huyen, Thomas Lu, Edward Chow:
Small Target Detection for Search and Rescue Operations using Distributed Deep Learning and Synthetic Data Generation. CoRR abs/1904.11619 (2019) - 2018
- [i2]Kyongsik Yun, Joseph Osborne, Madison Lee, Thomas Lu, Edward Chow:
Automatic speech recognition for launch control center communication using recurrent neural networks with data augmentation and custom language model. CoRR abs/1804.09552 (2018) - [i1]Kyongsik Yun, Thomas Lu, Edward Chow:
Occluded object reconstruction for first responders with augmented reality glasses using conditional generative adversarial networks. CoRR abs/1805.00322 (2018) - 2016
- [j4]Richard White, Aaron Burkhart, Randy George, Terrance E. Boult, Edward Chow:
Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology. Int. J. Crit. Infrastructure Prot. 14: 28-40 (2016) - [c7]Richard White, Aaron Burkhart, Terrance E. Boult, Edward Chow:
Towards a Comparable Cross-Sector Risk Analysis: RAMCAP Revisited. Critical Infrastructure Protection 2016: 221-237 - 2014
- [j3]Richard White, Terrance E. Boult, Edward Chow:
A computational asset vulnerability model for the strategic protection of the critical infrastructure. Int. J. Crit. Infrastructure Prot. 7(3): 167-177 (2014) - [c6]Richard White, Aaron Burkhart, Edward Chow, Logan Maynard:
A Decision Support Tool for a Unified Homeland Security Strategy. Critical Infrastructure Protection 2014: 195-211 - 2012
- [c5]Edward Chow, Farrokh Vatan, George Paloulian, Steve Frisbie, Zuzana Srostlik, Vasilios Kalomiris, Daniel Apgar:
Dynamic communication resource negotiations. MILCOM 2012: 1-6 - 2010
- [c4]Francisco Torres, Edward Chow:
A 3D Curve Chain Code Representation for the Analysis of Human Motion Similarity. DMS 2010: 132-136 - [c3]Edward Chow, Mark James, Hsin-Ping Chang, Farrokh Vatan, Gurusham Sudhir:
An Intelligent Network for Federated Testing of NetCentric Systems. POLICY 2010: 44-52
2000 – 2009
- 2002
- [c2]Cagatay Basdogan, Mitchell J. H. Lum, Jose Salcedo, Edward Chow, Stephen A. Kupiec, Andrew Kostrewski:
Autostereoscopic and Haptic Visualization for Space Exploration and Mission Design. Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems 2002: 271-276
1990 – 1999
- 1999
- [j2]Kai Hwang, Hai Jin, Edward Chow, Cho-Li Wang, Zhiwei Xu:
Designing SSI clusters with hierarchical checkpointing and single I/O space. IEEE Concurr. 7(1): 60-69 (1999) - [c1]Mehmet Sahinoglu, Edward Chow:
Empirical-Bayesian Availability Indices of Safety & Time Critical Software Systems with Corrective Maintenance. PRDC 1999: 84- - 1994
- [j1]Lothar Thiele, Edward Chow:
Guest editors' introduction. J. VLSI Signal Process. 8(2): 95 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint