Skip to Main Content

Jie Wang


Jie Wang
Professor Jie WangProfessor
  • College
    College of Sciences
  • Department
    Computer Science
  • Phone
    (978) 934-3649
  • Fax
    (978) 934-3550
  • Office
    Dandeneau Hall - 333
  • Email
  • Profile Links

Research Interests

Text mining and systems, data modeling, algorithms, cyber security

Prof. Wang's current research interests include text mining algorithms and systems, data modeling and its applications, and combinatorial optimizations. My previous interests included large-scale network dynamics, cloud computing and search over encryption, network security, wireless networks, and computational complexity theory. He is particularly interested in algorithmic problems and mathematical modeling arising from practical applications, including data analysis and applications, intelligent text automation, wireless sensor networks, computational medicine, networking, and online social networks. I studied computational complexity theory from late 1980's to early 2000's, including structural complexity, average-case complexity, and average NP-completeness.

Education

  • Ph D: Computer Science, (1990), Boston University - Boston, MA
    Supporting Area: Computational Complexity
    Dissertation/Thesis Title: Polynomial-Time Creativity and Its Applications
  • MS: Computer Science, (1984), Sun Yat-sen University - Guangzhou, China
    Supporting Area: Artificial Intelligence and Mathematical Logic
    Dissertation/Thesis Title: Relativized Complexity Classes
  • BS: Computational Mathematics, (1982), Sun Yat-sen University - Guangzhou, China
    Dissertation/Thesis Title: Applications of Alpha-Beta Pruning in Block Designs

Biography

Prof. Wang joined the Department of Computer Science at UMass Lowell in 2001 as Full Professor and served as Department Chair from 2007 to 2016. Prior to that he was Assistant Professor and then Associate Professor of Computer Science at the University of North Carolina. He has also served as Director of the greater China partnership for the Consortium for Mathematics and Its Applications since 2011.

Selected Awards and Honors

  • Honorary Advisor (2013) - NeoUnion Hong Kong Education Science Culture Organization
  • MHE Scholar (2012), Scholarship/Research - Ministry of Higher Education, China
  • PMYR Award for Major New Initiatives (2010) - University of Massachusetts Lowell
  • Teaching Excellence Award (2002) - University of Massachusetts Lowell
  • Nominee of Board of Governors' Teaching Excellence Award (2000), Teaching - University of North Carolina Board of Governors
  • Presidential Teaching Fellow (1989), Scholarship/Research - Boston University
  • Presidential Graduate Fellow (1986), Scholarship/Research - Boston University
  • Scientific Advancement Award (1985) - Department of Higher Education in Guangdong Province, China

Selected Publications

  • Kissel, Z.A., Wang, J. (2017). Generic Adaptively Secure Searchable Phrase Encryption. Proceedings on Privacy Enhancing Technologies, 2017(1) 4–20.
  • Su, S., Zhao, S., Cheng, X., Bi, R., Cao, X., Wang, J. (2017). Group-based collective keyword querying in road networks. Information Processing Letters, 118 83 - 90.
  • Wang, J., Xiao, X., Qin, Y., Dong, J., Geissler, G., Zhang, G., Cejda, N., Alikhani, B., Doughty, R.B. (2017). Mapping the dynamics of eastern redcedar encroachment into grasslands during 1984–2010 through PALSAR and time series Landsat images. Remote Sensing of Environment, 190 233–246.
  • Chen, J., Liang, Q., Wang, J. (2015). Bandwidth Allocation Based on Personality Traits on Smartphone Usage and Channel Condition (pp. 273–282).
  • Li, J., Su, S., Cheng, X., Song, M., Ma, L., Wang, J. (2015). Cost-efficient coordinated scheduling for leasing cloud resources on hybrid workloads. Parallel Computing, 44 1–17.
  • Cao, Y., Hou, P., Brown, D., Wang, J., Chen, S. (2015). Distributed Analytics and Edge Intelligence: Pervasive Health Monitoring at the Era of Fog Computing (pp. 43–48).
  • Song, C., Ge, T., Chen, C., Wang, J. (2015). Soft Quorums: A High Availability Solution for Service Oriented Stream Systems (pp. 778–779).
  • Cornelis, M.C., Byrne, E.M., Esko, T., Nalls, M.A., Ganna, A., Paynter, N., Monda, K.L., Amin, N., Fischer, K., Renstrom, F., Ngwa, J.S., Huikari, V., Cavadino, A., Nolte, I.M., Teumer, A., Yu, K., Marques-Vidal, P., Rawal, R., Manichaikul, A., Wojczynski, M.K., Vink, J.M., Zhao, J.H., Burlutsky, G., Lahti, J., Mikkilä, V., Lemaitre, R.N., Eriksson, J., Musani, S.K., Tanaka, T., Geller, F., Luan, J., Hui, J., Mägi, R., Dimitriou, M., Garcia, M.E., Ho, W., Wright, M.J., Rose, L.M., Magnusson, P.K., Pedersen, N.L., Couper, D., Oostra, B.A., Hofman, A., Ikram, M.A., Tiemeier, H.W., Uitterlinden, A.G., van Rooij F.J.A., ., Barroso, I., Johansson, I., Xue, L., Kaakinen, M., Milani, L., Power, C., Snieder, H., Stolk, R.P., Baumeister, S.E., Biffar, R., Gu, F., Bastardot, F., Kutalik, Z., J., D.R., Forouhi, N.G., Mihailov, E., Lind, L., Lindgren, C., Michaëlsson, K., Morris, A., Jensen, M., Khaw, K., Luben, R.N., Wang, J., Männistö, S., Perälä, M., Kähönen, M., Lehtimäki, T., Viikari, J., Mozaffarian, D., Mukamal, K., Psaty, B.M., Döring, A., Heath, A.C., Montgomery, G.W., Dahmen, N., Carithers, T., Tucker, K.L., Ferrucci, L., Boyd, H.A., Melbye, M., Treur, J.L., Mellström, D., Hottenga, J.J., Prokopenko, I., Tönjes, A., Deloukas, P., Kanoni, S., Lorentzon, M., Houston, D.K., Liu, Y., Danesh, J., Rasheed, A., Mason, M.A., Zonderman, A.B., Franke, L., Kristal, B.S., Karjalainen, J., Reed, D.R., Westra, H., Evans, M.K., Saleheen, D., Harris, T.B., Dedoussis, G., Curhan, G., Stumvoll, M., Beilby, J., Pasquale, L.R., Feenstra, B., Bandinelli, S., Ordovas, J.M., Chan, A.T., Peters, U., Ohlsson, C., Gieger, C., Martin, N.G., Waldenberger, M., Siscovick, D.S., Raitakari, O., Eriksson, J.G., Mitchell, P., Hunter, D.J., Kraft, P., Rimm, E.B., Boomsma, D.I., Borecki, I.B., Loos, R.J., Wareham, N.J., Vollenweider, P., Caporaso, N., Grabe, H.J., Neuhouser, M.L., Wolffenbuttel, B.H., Hu, F.B., Hyppönen, E., Järvelin, M., Cupples, L.A., Franks, P.W., Ridker, P.M., van Duijn C.M., ., Heiss, G., Metspalu, A., North, K.E., Ingelsson, E., Nettleton, J.A., van Dam R.M., ., Chasman, D.I. (2015). Genome-wide meta-analysis identifies six novel loci associated with habitual coffee consumption. Molecular psychiatry, 20(5) 647-656.
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B., Wang, J. (2014). Providing service assurance in mobile opportunistic networks. Computer Networks, 74 114–140.
  • Kissel, Z.A., Wang, J. (2014). A Note on Verifiable Privacy-Preserving Tries (pp. 942–943).
  • Saipulla, A., Cui, J., Fu, X., Liu, B., Wang, J. (2014). Barrier coverage: Foundations and design (pp. 59–115). Springer Berlin Heidelberg
  • Song, C., Ge, T., Chen, C., Wang, J. (2014). Event Pattern Matching over Graph Streams. Proceedings of the VLDB Endowment, 8(4) 413–424.
  • Jia, M., Wang, J. (2014). Handling big data of online social networks on a small machine (pp. 676–685). Springer
  • Cheng, W., Zhu, J., Mohapatra, P., Wang, J. (2014). Time and energy efficient localization (pp. 81–89).
  • Jia, M., Wang, J. (2014). Handling big data of online social networks on a small machine. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8591 LNCS 676-685.
  • Fang, Z., Wang, J. (2014). Efficient identifications of structural similarities for graphs. Journal of Combinatorial Optimization, 27(2) 209-220.
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B., Wang, J. (2013). Providing service assurance in mobile opportunistic networks. Computer Networks.
  • Zhu, Y., Wu, W.b., Wu, L., Wang, L., Wang, J. (2013). SmartPrint: A cloud print system for office (pp. 95-100). Proceedings - IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013
  • Saipulla, A., Westphal, C., Liu, B., Wang, J. (2013). Barrier coverage with line-based deployed mobile sensors. Ad Hoc Networks, 11(4) 1381-1391.
  • Su, S., Li, J., Huang, Q., Huang, X., Shuang, K., Wang, J. (2013). Cost-efficient task scheduling for executing large programs in the cloud. Parallel Computing, 39(4-5) 177-188.
  • Wang, J., Lu, J., Fang, Z., Ge, T., Chen, C. (2013). Pl-Tree: An Efficient Indexing Method for High-Dimensional Data (pp. 183–200). Springer
  • Cheng, X., Chin, A., Ling, C., Wang, F., Chen, E., Chen, G., Cui, P., King, I., Tian, J., Wang, J., Ho, J., Ishikawa, Y., Jin, X., Kim, D., Kim, J., Tang, J., Tao, D., Wang, X., Yu, Z., Zhang, D., Zhang, J., Zheng, V., Zhou, J. (2013). Preface to nining and understanding from big data (pp. xlvi-xlvii). Proceedings - IEEE 13th International Conference on Data Mining Workshops, ICDMW 2013
  • Song, C., Li, Z., Ge, T., Wang, J. (2013). Query Execution Timing: Taming Real-Time Anytime Queries on Multicore Processors (pp. 2237–2242).
  • Zhao, P., Yang, X., Wang, J., Liu, B., Wang, J. (2013). Admission control on multipath routing in 802.11-based wireless mesh networks. Ad Hoc Networks, 11(8) 2235-2251.
  • Wang, J., Lu, J., Fang, Z., Tingjian, G., Chen, C. (2013). PL-tree: An Efficient Indexing Method for High-Dimensional Data (pp. 183-200). International Symposium on Spatial and Temporal Databases (SSTD 2013)
  • Kissel, Z., Wang, J. (2013). Access control for untrusted content distribution clouds using unidirectional re-encryption (pp. 49-56). Proceedings of the 2013 International Conference on High Performance Computing and Simulation, HPCS 2013
  • Kaushik, B., Zhang, H., Fu, X., Liu, B., Wang, J. (2013). SmartParcel: A collaborative data sharing framework for mobile operating systems (pp. 290-295). Proceedings - International Conference on Distributed Computing Systems
  • Kissel, Z., Wang, J. (2013). Verifiable phrase search over encrypted data secure against a semi-honest-but-curious adversary (pp. 126-131). Proceedings - International Conference on Distributed Computing Systems
  • Li, Y., Wang, J., Liu, B., Liang, Q. (2013). Finding network communities using random walkers with improved accuracy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7936 LNCS 801-810.
  • Luo, Y., Chen, X., Wang, J. (2013). A virtual network embedding algorithm for providing stronger connectivity in the residual networks. Journal of Networks, 8(4) 779-786.
  • Cheng, X., Li, Y., Liu, B., Xu, Z., Bao, L., Wang, J. (2012). 18f-fdg PET/CT and PET for evaluation of pathological response to neoadjuvant chemotherapy in breast cancer: A meta-analysis. Acta radiologica, 53(6) 615-627.
  • Hu, G., Shi, J., Pan, W., Wang, J. (2012). A hierarchical model of e-government service capability: An empirical analysis. Government Information Quarterly, 29(4) 564-572.
  • Fang, Z., Wang, J., Liu, B., Gong, W. (2012). Double Pareto Lognormal Distributions in Complex Networks. Springer
  • Fang, Z., Wang, J. (2012). Efficient identifications of structural similarities for graphs. Journal of Combinatorial Optimization, 1-12.
  • Wang, J., Li, Y., Liu, B., Chen, G. (2012). Optimization Problems in Online Social Networks (2nd Edition). Springer
  • Wang, J., Ye, L. (2012). Structure and properties of hydrophobic cationic poly(vinyl alcohol). Polymer International, 61(4) 571-580.
  • Fu, X., Zhang, N., Pingley, A., Yu, W., Wang, J., Zhao, W. (2012). The digital marauder's map: A WiFi forensic positioning tool. IEEE Transactions on Mobile Computing, 11(3) 377-389.
  • Cheng, X., Su, S., Zhang, Z., Shuang, K., Yang, F., Luo, Y., Wang, J. (2012). Virtual network embedding through topology awareness and optimization. Computer Networks, 56(6) 1797-1813.
  • Cheng, X., Li, Y., Xu, Z., Li, D., Wang, J. (2011). A meta-analysis of 99mTc-MIBI SPECT for detection of recurrent glioma after radiation therapy. Journal of Clinical Neuroscience, 18(3) 307-312.
  • Zhu, L., Hu, W., Liu, D., Tian, W., Yu, G., Liu, X., Wang, J., Feng, E., Zhang, X., Chen, B., Zeng, M., Wang, H. (2011). A reference proteomic database of Lactobacillus plantarum CMCC-p0002. PLoS ONE, 6(10).
  • Barr, S., Wang, J., Liu, B. (2011). An efficient method for constructing underwater sensor barriers. Journal of Communications, 6(5) 370-383.
  • Wang, B., Luo, B., Liang, M., Wang, A., Wang, J., Fang, Y., Chang, Y., Zhi, L. (2011). Chemical amination of graphene oxides and their extraordinary properties in the detection of lead ions. Nanoscale, 3(12) 5059-5066.
  • Li, W., Wang, J., Jiang, H.R., Xu, X.L., Zhang, J., Liu, M.L., Zhai, L.Y. (2011). Combined effects of cyclooxygenase-1 and cyclooxygenase-2 selective inhibitors on ovarian carcinoma in Vivo. International Journal of Molecular Sciences, 12(1) 668-681.
  • Huang, Y.H., Long, T.Z., Xiao, Z.Y., Ye, H., Wan, Y.L., Wang, J. (2011). Duodenal pseudolymphoma: A case report and review of literature. World Journal of Gastroenterology, 17(27) 3267-3270.
  • Hu, X., Wang, J. (2011). Journal of Combinatorial Optimization: Preface. Journal of Combinatorial Optimization, 21(1) 1.
  • Liu, D., Wang, S., Xu, B., Guo, Y., Zhao, J., Liu, W., Sun, Z., Shao, C., Wei, X., Jiang, Z., Wang, X., Liu, F., Wang, J., Huang, L., Hu, D., He, X., Riedel, C.U., Yuan, J. (2011). Proteomics analysis of Bifidobacterium longum NCC2705 growing on glucose, fructose, mannose, xylose, ribose, and galactose. Proteomics, 11(13) 2628-2638.
  • He, Z.Y., Shi, C.B., Wen, H., Li, F.L., Wang, B.L., Wang, J. (2011). Upregulation of p53 expression in patients with colorectal cancer by administration of curcumin. Cancer investigation, 29(3) 208-213.
  • Cheng, X., Su, S., Zhang, Z., Wang, H., Yang, F., Luo, Y., Wang, J. (2011). Virtual network embedding through topology-aware node ranking. Computer Communication Review, 41(2) 39-47.
  • Li, N., Yan, B., Chen, G., Govindaswamy, P., Wang, J. (2010). Design and implementation of a sensor-based wireless camera system for continuous monitoring in assistive environments. Personal and Ubiquitous Computing, 14(6) 499-510.
  • Fang, Z., Wang, J. (2010). Hybrid approximation for minimum-cost target coverage in wireless sensor networks. Optimization Letters, 4(3) 371-381.
  • Ma, H., Wu, Y., Yang, X., Liu, X., He, J., Fu, L., Wang, J., Xu, H., Shi, Y., Zhong, R. (2010). Integrated poly(dimethysiloxane) with an intrinsic nonfouling property approaching "absolute" zero background in immunoassays. Analytical Chemistry, 82(15) 6338-6342.
  • Gauvin, W., Ribeiro, B., Towsley, D., Liu, B., Wang, J. (2010). Measurement and gender-specific analysis of user publishing characteristics on MySpace. IEEE Network, 24(5) 38-43.
  • Zhu, B., Han, Q., Yang, X.H., Ni, H.Q., He, J.F., Niu, Z.C., Wang, X., Wang, X.P., Wang, J. (2010). Metamorphic InGaAs p-i-n photodetectors with 1.75 m cut-off wavelength grown on GaAs. Chinese Physics Letters, 27(3).
  • Hu, X., Wang, J. (2010). Recent advances in computation and combinatorial optimization. Algorithmica (New York), 56(3) 281-282.
  • Wang, M., Wang, Z., Wang, J. (2010). Research on ANN-based machining operation selection for rotational parts. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 39(3) 470-474.
  • L�, J., Wang, J., Wang, M., Wu, Y. (2010). Research on tool wear condition monitoring based on combination of SOM and HMM. Zhongguo Jixie Gongcheng/China Mechanical Engineering, 21(13) 1531-1535.
  • He, Z., Shi, C., Wen, H., Li, F., Wang, B., Wang, J. (2010). The potential of carcinoembryonic antigen, p53, Ki-67 and glutathion Stransferase- as clinico-histopathological markers for colorectal cancer. Journal of Biomedical Research, 24(1) 51-57.
  • Wang, M., Lv, J.J., Wang, J. (2010). Tool wear condition monitoring based on continuous gaussian mixture HMM. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 42(3) 240-245.
  • He, Z.Y., Wen, H., Shi, C.B., Wang, J. (2010). Up-regulation of hnRNP a1, Ezrin, tubulin -2C and Annexin A1 in sentinel lymph nodes of colorectal cancer. World Journal of Gastroenterology, 16(37) 4670-4676.
  • Liu, B., Bestavros, A., Wang, J., Du, D.Z. (2010). Wireless network algorithms, systems, and applications. Eurasip Journal on Wireless Communications and Networking, 2010.
  • Yang, Y., Wang, J., Zhang, J., Liu, J., Yang, X., Zhao, H. (2009). Exfoliated graphite oxide decorated by PDMAEMA chains and polymer particles. Langmuir, 25(19) 11808-11814.
  • Zhang, H., Xia, H., Wang, J., Li, Y. (2009). High intensity focused ultrasound-responsive release behavior of PLA-b-PEG copolymer micelles. Journal of Controlled Release, 139(1) 31-39.
  • Wang, J., Pelletier, M., Zhang, H., Xia, H., Zhao, Y. (2009). High-frequency ultrasound-responsive block copolymer micelle. Langmuir, 25(22) 13201-13205.
  • Wang, H., Wang, J. (2009). Interfacial defects and flux-pinning effects in nanostructured yba2cu 3o7&gama; thin films. IEEE Transactions on Applied Superconductivity, 19(3) 3395-3398.
  • Wang, J., Tsai, C.F., Bi, Z., Naugle, D.G., Wang, H. (2009). Microstructural and pinning properties of YBa2Cu 307- thin films doped with magnetic nanoparticles. IEEE Transactions on Applied Superconductivity, 19(3) 3503-3506.
  • Lichtenberger, A.W., Stronko, G.S., Wang, J., Cecil, T.W., Zhang, J.Z. (2009). Pentalevel resist process for the precise fabrication of small area SIS junctions. IEEE Transactions on Applied Superconductivity, 19(3) 222-225.
  • Wang, J., Hao, Y.H., Yu, H., Justin, O.L., Mohanty, D.K. (2009). Preparation and properties of polyamines: Part II-Controlled and sustained release of Nitric Oxide (NO) from nitrosated polymers. Polymer Journal, 41(9) 715-725.
  • Yan, B., Chen, G., Wang, J., Yin, H. (2009). Robust detection of unauthorized wireless access points. Mobile Networks and Applications, 14(4) 508-522.
  • Hu, G., Pan, W., Lu, M., Wang, J. (2009). The widely shared definition of e-Government: An exploratory study. Electronic Library, 27(6) 968-985.
  • Liu, B., Bestavros, A., Du, D., Wang, J. (2009). Wireless Algorithms, Systems, and Applications. Springer
  • Yuan, J., Wang, B., Sun, Z., Bo, X., Yuan, X., He, X., Zhao, H., Du, X., Wang, F., Jiang, Z., Zhang, L., Jia, L., Wang, Y., Wei, K., Wang, J., Zhang, X., Sun, Y., Huang, L., Zeng, M. (2008). Analysis of host-inducing proteome changes in Bifidobacterium longum NCC2705 grown in vivo. Journal of Proteome Research, 7(1) 375-385.
  • Grundmann, O., Wang, J., McGregor, G.P., Butterweck, V. (2008). Anxiolytic activity of a phytochemically characterized Passiflora incarnata extract is mediated via the GABAergic system. Planta Medica, 74(15) 1769-1773.
  • Da, M.X., Wu, X.T., Wang, J., Guo, T.K., Zhao, Z.G., Luo, T., Zhang, M.M., Qian, K. (2008). Expression of Cyclooxygenase-2 and Vascular Endothelial Growth Factor-C Correlates with Lymphangiogenesis and Lymphatic Invasion in Human Gastric Cancer. Archives of Medical Research, 39(1) 92-99.
  • Wang, J., Kwon, J.H., Yoon, J., Wang, H., Haugan, T.J., Baca, F.J., Pierce, N.A., Barnes, P.N. (2008). Flux pinning in YBa2Cu3O7- thin film samples linked to stacking fault density. Applied Physics Letters, 92(8).
  • Du, H., Zhang, X., Wang, J., Yao, X., Hu, Z. (2008). Novel approaches to predict the retention of histidine-containing peptides in immobilized metal-affinity chromatography. Proteomics, 8(11) 2185-2195.
  • Wang, J., Lu, G., Li, G., Lu, Z., Yang, X., Zhou, E. (2008). Novel morphology of polyethylene crystals created upon melt crystallization of spin-coated film. Macromolecules, 41(4) 1273-1280.
  • Zhang, J.F., Wang, J., Xu, L.J. (2008). Optimal trajectory planning for parallel robots based on artificial life algorithm. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 14(10) 2005-2010.
  • Du, H., Wang, J., Zhang, X., Yao, X., Hu, Z. (2008). Prediction of retention times of peptides in RPLC by using radial basis function neural networks and projection pursuit regression. Chemometrics and Intelligent Laboratory Systems, 92(1) 92-99.
  • Wang, J., Neuhoff, P.S. (2008). Thermodynamics of dehydration in analcime: Absorption calorimetry and equilibrium observations. American Mineralogist, 93(8-9) 1449-1459.
  • Zhang, J.F., Xu, L.J., Wang, J. (2007). Dynamic simulation for spherical parallel manipulators in grid computing environment. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 39(5) 164-170.
  • Neuhoff, P.S., Wang, J. (2007). Heat capacity of hydration in zeolites. American Mineralogist, 92(8-9) 1358-1367.
  • Li, C., Fang, Q.F., Wang, X.P., Wang, J., Li, D., Zhuang, Z. (2007). Internal friction study of oxygen ion conductors La1.95 K0.05 Mo2-x Tx O9- (T=Fe,Mn). Journal of Applied Physics, 101(8).
  • Neuhoff, P.S., Wang, J. (2007). Isothermal measurement of heats of hydration in zeolites by simultaneous thermogravimetry and differential scanning calorimetry. Clays and Clay Minerals, 55(3) 239-252.
  • Berman, P., DasGupta, B., Kao, M.Y., Wang, J. (2007). On constructing an optimal consensus clustering from multiple clusterings. Information Processing Letters, 104(4) 137-145.
  • Zhang, J., Xu, L., Wang, J. (2007). Synthesis of adjustable spherical six-bar mechanisms for path generation. Jixie Gongcheng Xuebao/Chinese Journal of Mechanical Engineering, 43(11) 50-55.
  • Wang, J., Zhong, W., Zhang, J. (2006). A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation. Applied Mathematics and Computation, 183(2) 804-812.
  • Wang, J., Fang, Y. (2006). Determination, purity assessment and chiral separation of levodopa methyl ester in bulk and formulation pharmaceuticals. Biomedical Chromatography, 20(9) 904-910.
  • Wang, J., Zhong, N. (2006). Efficient point coverage in wireless sensor networks. Journal of Combinatorial Optimization, 11(3) 291-304.
  • Wang, J., Zhong, W., Zhang, J. (2006). High order compact computation and nonuniform grids for streamfunction vorticity equations. Applied Mathematics and Computation, 179(1) 108-120.
  • Xu, S., Zhang, J., Han, D., Wang, J. (2006). Singular value decomposition based data distortion strategy for privacy protection. Knowledge and Information Systems, 10(3) 383-397.
  • Wang, J., Ying, T., Wang, H., Shi, Z., Li, M., He, K., Feng, E., Wang, J., Yuan, J., Li, T., Wei, K., Su, G., Zhu, H., Zhang, X., Huang, P., Huang, L. (2005). 2-D reference map of Bacillus anthracis vaccine strain A16R proteins. Proteomics, 5(17) 4488-4495.
  • Li, Y., Li, X.L., Zhao, W., Wang, J. (2005). Research on product creative design with cognitive psychology. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 11(9) 1201-1207.
  • Wang, J., Zhou, Y., Fang, Y.Z. (2005). Studies of the rate constant of levodopa methyl ester hydrolysis by LC. Chromatographia, 62(7-8) 423-428.
  • Wang, J. (2004). The effect of central baryonic cores in dark halos on the evaluation of strong lensing probabilities. Chinese Journal of Astronomy and Astrophysics, 4(1) 10-16.
  • Li, Y., Wang, J., Li, X.L., Zhao, W., Hu, W. (2003). Creative thinking and computer aided product innovation. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 9(12) 1092-1096.
  • Wang, Z., Yuan, D., Pan, L., Cheng, X., Lv, Y., Wang, X., Guo, S., Duan, X., Wang, J., Xu, D., Lv, M. (2003). Crystal growth and thermal and optical properties of La3Ga5SiO14 single crystals. Applied Physics A: Materials Science and Processing, 77(5) 683-685.
  • Wang, J. (2003). Technical Computer Science: Preface. Theoretical Computer Science, 296(1) 1-2.
  • Sivalingam, K.M., Wang, J., Wu, X., Mishra, M. (2002). An interval-based scheduling algorithm for optical WDM star networks. Photonic Network Communications, 4(1) 73-87.
  • Wang, J. (2002). Complete on average Boolean satisfiability. Journal of Complexity, 18(4) 1024-1036.
  • Chen, D.Z., Wang, J., Wu, X. (2002). Image segmentation with asteroidality/tubularity and smoothness constraints. International Journal of Computational Geometry and Applications, 12(5) 413-428.
  • Jin, W., Wang, J. (2002). Simultaneous HPLC determination of betamethasone sodium phosphate and betamethasone dipropionate in compound betamethasone injection. Chinese Pharmaceutical Journal, 37(1) 48-50.
  • Yian, Y.N., Jia, Z.S., Wang, J. (2002). Swallow training and caring for stroke patients with dysphagia. Chinese Journal of Clinical Rehabilitation, 6(17) 2630-2631.
  • Jiang, C., Zhang, J.C., Wang, J. (2002). Utilizing Gompertz curve to establish the model between the development expenses and the development time of a missile. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 24(4) 23.
  • Wang, J., Hu, Z.L., Wei, B. (2000). Copper-catalysed cross coupling reaction under microwave irradiation conditions. Journal of Chemical Research - Part S, (11) 536-537.
  • Fu, B., Yang, X.P., Wang, J., Jia, Z.J. (1999). A New Sesquiterpene from Ligularia Songarica. Chinese Chemical Letters, 10(1) 29-30.
  • Ge, Y., Stelts, D.R., Wang, J., Vining, D.J. (1999). Computing the centerline of a colon: A robust and efficient method based on 3D skeletons. Journal of computer assisted tomography, 23(5) 786-794.
  • Wang, J. (1999). Distributional word problem for groups. SIAM Journal on Computing, 28(4) 1264-1283.
  • Wang, J. (1999). Packing of Unequal Spheres and Automated Radiosurgical Treatment Planning. Journal of Combinatorial Optimization, 3(4) 453-463.
  • Wang, J., Piao, Y., Zhang, H., Tian, P. (1999). Parametric adaptive control of continuous time chaotic systems. Zidonghua Xuebao/Acta Automatica Sinica, 25(2) 269-274.
  • Wang, J., Ge, Y. (1998). An optimization problem in virtual endoscopy. Theoretical Computer Science, 207(1) 203-216.
  • Wang, J. (1997). Determination of vitamin B6, calcium pantothenate and vitamin B2 in Miyarisan Aiji A fine granules by HPLC. Chinese Pharmaceutical Journal, 32(2) 106-108.
  • Wang, J., Kurosaki, Y., Satoh, I. (1996). Heat transfer characteristics of an impinging air jet laden with solid particles recirculating in an enclosure (1st report, flow characteristics and volume fraction distribution of gas-solid suspension). Nippon Kikai Gakkai Ronbunshu, B Hen/Transactions of the Japan Society of Mechanical Engineers, Part B, 62(596) 1502-1510.
  • Sivalingam, K.M., Wang, J. (1996). Media access protocols for WDM networks with on-line scheduling. Journal of Lightwave Technology, 14(6) 1278-1286.
  • Wang, J. (1995). Productive functions and isomorphisms. Mathematical Systems Theory, 28(2) 109-116.
  • Homer, S., Wang, J. (1994). Immunity of Complete Problems. Information and Computation, 110(1) 119-129.
  • Wang, J., Yamada, Y., Yamashita, I., Kurosaki, Y. (1994). Improvement of Stirling engine efficiency by heat transfer enhancement of heater. Nippon Kikai Gakkai Ronbunshu, B Hen/Transactions of the Japan Society of Mechanical Engineers, Part B, 60(571) 1011-1016.
  • Wang, J., Belanger, J. (1993). Honest iteration schemes of randomizing algorithms. Information Processing Letters, 45(6) 275-278.
  • Wang, J. (1992). A note on two-way probabilistic automata. Information Processing Letters, 43(6) 321-326.
  • Wang, J. (1991). On p-creative sets and p-completely creative sets. Theoretical Computer Science, 85(1) 1-31.
  • Homer, S., Wang, J. (1989). Absolute results concerning one-way functions and their applications. Mathematical Systems Theory, 22(1) 21-35.
  • Yamada, Y., Wang, J., Mori, Y. (1988). Heat transfer enhancement of high temperature heat exchangers for Stirling engines by use of wall radiation. Nippon Kikai Gakkai Ronbunshu, B Hen/Transactions of the Japan Society of Mechanical Engineers, Part B, 54(506) 2885-2892.

Selected Presentations

  • Son Le, Michael Zuba, Zheng Peng, Jun-Hong Cui, Jie Wang, Deployment framework for mobile underwater wireless networks with node reuse - Proceedings of IEEE Globecom 2012 Ad Hoc and Sensor Networking Symposium (GC12 AHSN),
  • Measuring structural similarities of graphs in linear time - Proceedings of the 6th International Conference on Combinatorial Optimization and Applications (COCOAê12), August 2012 - Banff, Canada
  • 72. Junjie Chen, Qilian Liang, Jie Wang, and Hyeong-Ah Choi. Spectrum efficiency of nested sparse sampling - Proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012), August 2012 - Yellow Mountains, China
  • Aerial locatization with smartphones - Proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012), August 2012 - Yellow Mountains, China
  • Design and spectrum efficiency of a new waveform - Proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012), August 2012 - Yellow Mountains, China
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, July 2012 - Chongqing
  • Peng Zhao, Xinyu Yang, Jiaying Wang, and Jie Wang. Rate-adaptive admission control for bandwidth assurance in multirate wireless mesh networks - Proceedings of IEEE International Conference on Communications (ICC 2012), June 2012 - Ottawa
  • 73. Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang and Xinwen Fu. When digital forensic research meets laws - Proceedings of the First International Workshop on Digital Forensics. IEEE ICDE 2012 Workshop on Network Forensics, Security, and Privacy, April 2012 - Washington DC
  • Peng Zhao, Xinyu Yang, Jiayin Wang, Benyuan Liu, and Jie Wang. BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks - 75. Peng Zhao, Xinyu Yang, Jiaying Wang, and Jie Wang. Rate-adaptive admission control for bandwidth assurance in multirate wireless mesh networks, March 2012 - Orlando, FL
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, March 2012 - Shanghai, China
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, March 2012
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, March 2012 - Wuhan, China
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, March 2012 - Shanghai, China
  • Finding Statistical Characteristics and Similarities of Substructures between Knowledge Networks, March 2012 - Guangzhou
  • Zhongbao Zhang, Sen Su, Xiang Cheng, Yiwen Wang, Yan Luo, and Jie Wang. Energy-aware Virtual Network Embedding through Consolidation - Proceedings of IEEE INFOCOM 2012 Workshop on Smart Grids and Green networks, 2012, March 2012 - Orlando, FL
  • Xuzhou Chen, Yan Luo, and Jie Wang. Virtual network embedding with border matching - Proceedings of the 4th International Conference on Communications Systems and Networks (COMSNETSê12), January 2012 - Bangalore, India
  • Access control in untrusted cloud storage using unidirectional proxy re-encryption, December 2011
  • Jie Yang, Jie Wang, and Benyuan Liu. An intersection collision warning system using Wi-Fi smartphones in VANET - Proceedings of the IEEE Global Communications Conference (GLOBECOM 2011), December 2011 - Houston, TX
  • Access control in untrusted cloud storage using unidirectional proxy re-encryption, October 2011
  • Zheng Fang, Jie Wang, Benyuan Liu, and Weibo Gong. Wikipedia as domain knowledge networks: Domain extraction and statistical measurement - Proceedings of International Conference on Knowledge Discovery and Information Retrieval (KDIR 2011), October 2011 - Paris, France
  • Access control in untrusted cloud storage using unidirectional proxy re-encryption, September 2011
  • Access control in untrusted cloud storage using unidirectional proxy re-encryption, September 2011
  • Benyuan Liu, Jie Wang, Cindy Chen, Harshavardhan Achrekar, Zheng Fang, and You Li. Spatio-temporal approach to the discovery of online social trends - Proceedings of the 5th International Conference on Combinatorial Optimization and Applications (COCOAê11), August 2011 - Zhangjiajie, China
  • Tefen Lin, Jie Wang, Pei-Yu Huang, Yan-Ping Tung, Hsiao-Yun Huang, and Kai-Wen Yu. A Web application for making mosaic art images - Proceedings of the 7th International Conference on Web Information Systems and Technologies (WEBISTê11), May 2011 - Noordwijkerhout, the Netherlands
  • Junwei Huang, Xian Pan, Xinwen Fu, and Jie Wang. Long PN code based DSSS watermarking - Proceedings of the 30th IEEE Conference on Computer Communications (INFOCOMê11), April 2011 - Shanghai, China
  • Computer Network Security in a Nutshell, March 2011 - Guangzhou
  • Double Pareto Lognormal Distributions in Knowledge Networks, March 2011
  • Large-Scale Network Dynamics and Online Social Networks, March 2011 - Guangzhou
  • Tefen Lin and Jie Wang. Producing automated mosaic art images of high quality with restricted and limited color palettes - Proceedings of the International Conference on Imaging Theory and Applications (IMAGAPPê11), March 2011 - Algarve, Portugal
  • Double Pareto Lognormal Distributions in Knowledge Networks, February 2011 - Richardson, TX
  • Discovering New Knowledge from the Internet, January 2011
  • Anwar Saipulla, Benyuan Liu, and Jie Wang. Finding and mending barrier gaps in wireless sensor networks - Proceedings of the IEEE Global Communications Conference (GLOBECOM 2010), December 2010 - Miami, FL
  • Discovering New Knowledge from the Internet, September 2010 - Boston, MA
  • Discovering New Knowledge from the Internet, September 2010 - MA
  • Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen Fu, and Jie Wang. Coverage with sensors of limited mobility - Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHocê10), September 2010 - Chicago, IL
  • Discovering New Knowledge from the Internet, June 2010 - Nanjing
  • Discovering New Knowledge from the Internet, June 2010 - Nanjing
  • Discovering New Knowledge from the Internet, June 2010 - Xiêan
  • Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu and Nan Zhang. 3DLoc: Three dimensional wireless localization toolkit - Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS 2010), June 2010 - Genoa, Italy
  • A Virtual Network Embedding Algorithm for Stronger Connectivity in the Residual Networks, May 2010
  • Constructing Underwater Spatial Barriers with Sensor Networks, May 2010 - Beijing, China
  • Constructing Underwater Spatial Barriers with Sensor Networks, May 2010 - Beijing, China
  • Discovering New Knowledge from the Internet, May 2010 - Beijing, China
  • Discovering New Knowledge from the Internet, May 2010 - Beijing, China
  • Discovering New Knowledge from the Internet, May 2010 - Beijing, China
  • Discovering New Knowledge from the Internet, May 2010 - Xiêan
  • Constructing Strong Barriers with Underwater Sensor Networks, April 2010 - Newport, Rhode Island
  • Large-Scale Network Dynamics: A New Frontier, March 2010 - NC
  • William Gauvin, Benyuan Liu, Xinwen Fu, and Jie Wang. Utopia providing trusted social network relationships within an untrusted environment - Proceedings of the First Workshop on Social Networks, Applications, and Systems, 2009
  • Large-Scale Network Dynamics: A New Frontier, November 2009 - Boston, MA
  • Large-Scale Network Dynamics: A New Frontier, October 2009 - Richardson, TX
  • Stanley Barr, Benyuan Liu, and Jie Wang. Constructing underwater sensor based barriers using distributed auction - Proceedings of MILCOM 2009, October 2009 - Boston, MA
  • Large-Scale Network Dynamics: A New Frontier, September 2009 - Lowell, MA
  • Large-Scale Network Dynamics: A New Frontier, September 2009 - East Lansing, MI
  • Stanley Barr, Benyuan Liu, and Jie Wang. Barriers with sensor networks using auction algorithms - Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN 2009), August 2009 - San Francisco, CA
  • Jie Yang and Jie Wang. Routing-aware query optimization for conserving energy in wireless sensor networks - Proceedings of the 4th International Conference on Algorithms, Systems, and Applications (WASA 2009), August 2009 - Boston, MA
  • Zheng Fang, Jie Wang, and Donghui Zhang. Workload-driven compressed skycube queries in wireless applications - Proceedings of the 4th International Conference on Algorithms, Systems, and Applications (WASA 2009), August 2009 - Boston, MA
  • Xinwen Fu, Nan Zhang, Jie Wang, and Wei Zhao. The digital Marauderês map: a new threat to location privacy in wireless networks - Proceedings of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), June 2009 - Montreal Canada
  • Anwar Saipulla, Cedric Westphal, Benyuan Liu, and Jie Wang. Barrier coverage of line-based deployed wireless sensor networks - Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOMê09), April 2009 - Rio de Janeiro, Brazil
  • Sensor Barriers for Detecting Intruders on Line-Based Deployed Wireless Sensor Networks, April 2009 - Piscataway, NJ
  • Barrier Coverage of Line-Based Deployed Wireless Sensor Networks, February 2009 - Worcester, MA
  • Underwater Spatial Barrier Sensor Networks - The 3rd UMass School of Marine Sciences Research Colloquium, January 2009 - Fall River, MA
  • Anwar Saipulla, Benyuan Liu, and Jie Wang. Barrier coverage with airdropped wireless sensors - Proceedings of MILCOM 2008, November 2008 - San Diego, CA
  • Stanley Barr, Benyuan Liu, and Jie Wang. Barrier coverage for underwater sensor networks - Proceedings of MILCOM 2008, November 2008 - San Diego, CA
  • Zheng Fang and Jie Wang. Convex combination approximation for the min-cost WSN point coverage problem. Lecture Notes in Computer Science, Vol. 5258 (Y. Li, D. Huynh, S. Das, and D.-Z. Du edts.), Pages 188-199. - Proceedings of the 3rd International Conference on Wireless Algorithms, Systems and Applications (WASA08), October 2008 - Dallas, TX
  • Strong Barrier Coverage using Networks of Randomly Deployed Sensors, September 2008 - Boston, MA
  • Wei Li, Cindy Chen, and Jie Wang. PCS: an efficient clustering method for high-dimensional data. Received the Best Paper Award - Proceedings of the 4th International Conference on Data Mining (DMIN'08), July 2008
  • Guanling Chen, Prabhu Govindaswamy, Nan Li, and Jie Wang. Continous camera-based monitoring for assistive environments - Proceedings of the First International Conference on Pervasive Technologies Related to Assistive Enviroments (PETRA), July 2008 - Athens, Greece
  • Robust Detection of Rogue Wireless Access Points, July 2008 - Guangzhou, PRC
  • Routing and Random Access Control of Mobile Ad Hoc Networks (MANET), June 2008 - Changsha, PRC
  • Strong Barrier Coverage using Networks of Randomly Deployed Sensors, June 2008 - Beijing, PRC
  • Strong Barrier Coverage using Networks of Randomly Deployed Sensors, June 2008 - Changsha, PRC
  • Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipulla. Strong Barrier Coverage of Wireless Sensor Networks - Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihocê08), May 2008 - Hong Kong
  • Hongda Yin, Guanling Chen, and Jie Wang. Detecting protected layer-3 rogue APs - Proceedings of the 4th IEEE International Conference on Broadband Communications, Networks, and Systems (BROADNETS07), 2007
  • Zhijun Yu and Jie Wang. Fault-tolerant sensor coverage for achieving wanted coverage lifetime with minimum cost. - Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA07), August 2007 - Chicago, IL
  • Jie Lu and Jie Wang. Analytical performance analysis of network-processor-based application designs - Proceedings of the 15th International Conference on Computer Communications and Networks (IC3N06), October 2006 - Arlington, VA
  • Algorithmic Issues in Wireless Sensor Deployments, July 2006 - Changsha, PRC
  • Higher Education in Computer Network Security in American Universities, July 2006 - Guangzhou, PRC
  • Minimum-Cost Sensor Arrangements for Achieving Wanted Coverage Lifetime, July 2006 - Guangzhou, PRC
  • Wireless Sensor Networks: Current Technologies and Application, July 2006 - Changsha, PRC
  • Jie Wang and Zhijun Yu. A new variation of Chord with novel improvement on lookup locality - Proceedings of the 2006 International Conference on Grid Computing and Applications (GCAê06), June 2006 - Las Vegas, Nevada
  • Ubiquitous Computing and Wireless Sensor Networks, June 2006 - Guangzhou, PRC
  • Jie Lu and Jie Wang. Performance modeling and analysis of Web Switch - Proceedings of the 31st Annual International Conference on Computer Measurement (CMGê05), December 2005 - Orlando, FL
  • Jie Lu and Jie Wang. A general framework for measuring performance of NP-based Web switches - Proceedings of the 5th Intel IXA University Summit, September 2005 - Hudson, MA
  • Constructing an Optimal Clustering from Several Existing Clusterings, January 2005 - Boston, MA
  • Jie Lu and Jie Wang. Distributed lock manager on a network processor - Proceedings of the 4th Intel IXA University Summit, September 2004 - Hudson, MA
  • Network and Information Security, August 2004 - Guangzhou, PRC
  • Programmable Network processor applications, August 2004 - Guangzhou, PRC
  • Jie Lu and Jie Wang. Exploring IXP in data grid applications for better performance - Proceedings of the 3rd Intel IXA University Summit, September 2003 - San Jose, CA
  • IXA Network Security, November 2002 - Lowell, MA
  • Virtual Colonoscopy and Radio Surgical Treatment Planning, August 2002 - Worcester, MA
  • Average complexity II, May 2002 - Lowell, MA
  • Jie Wang. Minimum clustering is NP-hard - Proceedings of the 2nd Annual University of Massachusetts Bioinformatics Conference, May 2002 - MA
  • Boolean function complexity, March 2002 - Germany
  • Finding the centerline of a colon model in virtual colonoscopy, February 2002 - Boston, MA
  • Danny Z. Chen, Jie Wang, and Xiaodong Wu. Image segmentation with monotonicity and smoothness constraints - Proceedings of the 12th International Symposium on Algorithms and Computation (ISSAC'01), December 2001 - New Zealand
  • An interval-based scheduling algorithm for optical WDM star networks, November 2001 - Lowell, MA
  • Minghui Li and Jie Wang. AntiHACK: an automated system against hacking - Proceedings of the 9th IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS'01), November 2001 - Nashville, TN
  • Minghui Li and Jie Wang. Some hacking techniques on Windows platform - Proceedings of the 9th IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS'01), November 2001 - Nashville, TN
  • Average complexity I, October 2001 - Lowell, MA
  • Discrete modeling in virtual endoscopy with medical applications, August 2001 - Hangzhou, PRC
  • Discrete optimization problems in treatment planning with gamma units, August 2001 - Hangzhou, PRC
  • Jie Wang. Medial axis and optimal locations of min-max sphere packing - Proceedings of the 4th Greensboro Conference on Combinatorics and Graph Theory, November 2000 - NC
  • Secure online elections, May 2000 - Lowell, MA
  • Linear-Time Approximation Algorithms for Computing Numerical Summation with Provably Small Errors, April 2000 - Winston-Salem, NC
  • Complexity of min-max sphere packing with respect to treatment planning, December 1999 - Piscataway, NJ
  • Discrete methods in virtual endoscopy, December 1999 - Piscataway, NJ
  • Jared Karro and Jie Wang. Towards a practical, secure, and very large scale online election - Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99), December 1999 - Phoenix, AZ
  • Jie Wang. Packing of nonequal spheres and automated radiosurgical treatment planning - Proceedings of the 3rd Greensboro Conference on Graph Theory and Combinatorics, November 1999 - NC
  • Jared Karro and Jie Wang. Preventing Web servers from security holes in Server-Side Includes - Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC'98), December 1998 - Phoenix, AZ
  • Jie Wang and Yaorong Ge. A graph optimization problem in virtual colonoscopy - Lecture Notes in Computer Science, vol. 1443, pages 375-386, Springer-Verlag, August 1998 - Taipei, Taiwan
  • Ming-Yang Kao and Jie Wang. Efficient minimization of numerical summation errors - Proceedings of the 25th International Colloquium on Automata, Languages, and Programming (ICALP'98), July 1998 - Aalborg, Denmark
  • Yaorong Ge, David Stelts, Jie Wang, Xianliang Zha, and David Vining. Computing the central path of colon lumen in helical CT images - Proceedings of the SPIE's International Symposium on Medical Imaging 1998, February 1998 - San Diago, CA
  • Jared Karro and Jie Wang. ``Server-side includes'' and Web server security - The 29th ACM Technical Symposium on Computer Science Education, February 1998 - Atlanta, GA
  • A graph optimization problem in virtual endoscopy, November 1997 - Morgantown, WV
  • A graph optimization problem in virtual endoscopy, October 1997 - Wilkes-Barre, PA
  • Average complexity, October 1997 - College Park, MD
  • Finding the central path of a colon: an efficient and robust method based on 3D skeletons, October 1997 - Hamilton, Canada
  • Jie Wang. A graph optimization problem in virtual endoscopy - Proceedings of the 2nd Greensboro Conference on Graph Theory and Combinatorics, October 1997 - NC
  • Finding the central path of colons based on 3D skeletons, August 1997 - Hong Kong
  • Average-case computational complexity theory, June 1997 - Berkeley, CA
  • Average-case NP-completeness, May 1997 - NJ
  • Average-case intractable NP-problems, April 1997 - Minneapolis, MN
  • URL rewriting and spoofing attacks on the Web, January 1997 - Winston-Salem, NC
  • Measuring average time, October 1996 - Kirksville, Missouri
  • Random isomorphisms, September 1996 - Germany
  • Jay Belanger and Jie Wang. Reductions and convergence rates of average time - Proceedings of the 2nd Annual International Computing and Combinatorics Conference (COCOON'96), July 1996 - Hong Kong
  • Average-case computational complexity theory, June 1996 - Guangzhou, PRC
  • Computer networks-some current research topics, June 1996 - Guangzhou, PRC
  • WDM networks with on-line scheduling, April 1996 - NC
  • Krishna Sivalingam and Jie Wang. Performance of a MAC protocol for WDM networks with on-line scheduling - Proceedings of the IEEE Conference on Network Communication (INFOCOM'96), March 1996 - San Francisco, CA
  • Computer networks in China and Chinese text I/O on the Web, December 1995 - Tuscaloosa, AL
  • Jie Wang. Computer networks in China and Chinese text I/O on Internet - Proceedings of the International Workshop of Bilingual Botanical Information Management, December 1995 - University of Alabama, Tuscalosa
  • Jay Belanger and Jie Wang. Rankable distributions do not provide harder instances than uniform distributions - Proceedings of the 1st International Computing and Combinatorics Conference (COCOON'95), August 1995 - Xi'an, China
  • Jie Wang. Average-case completeness of a word problem for groups - Proceedings of the 27th ACM Symposium on Theory of Computing (STOC'95), May 1995 - Las Vegas, NE
  • Jie Wang. Selectivity and self-reducibility: new characterizations of complexity classes - Proceedings of the 6th Annual International Conference on Computing and Information (ICCI'94), May 1994 - Ontario, Canada
  • Robert McCloskey, Jie Wang, and Jay Belanger. Parallel parsing of languages generated by ambiguous bounded context grammars - Proceedings of the 6th Annual International Conference on Computing and Information (ICCI'94), May 1994 - Ontario, Canada
  • An average-case NP-complete word problem for finitely presented groups, February 1994 - Germany
  • Average case computational intractability, July 1993 - Beijing, PRC
  • Jie Wang. Average case complexity - Proceedings of the 3rd International Conference for Young Computer Scientists, July 1993 - Beijing, China
  • Jay Belanger and Jie Wang. Isomorphisms of NP-complete problems on random instances - Proceedings of the 8th IEEE Annual Conference on Structure in Complexity Theory (Structures'93), June 1993 - San Diego, CA
  • Lane Hemachandra, Abrecht Hoene, Mitsunori Ogiwara, Alan Selman, Thomas Thierauf, and Jie Wang. Selectivity - Proceedings of the 5th Annual International Conference on Computing and Information (ICCI'93), May 1993 - Ontario, Canada
  • Average-case computational intractability, April 1993 - NY
  • Jie Wang and Luc Longpre. Nondeterministic and alternating computations - Proceedings of the 4th International Conference of Computing and Information (ICCI'92), 1992 - Toronto, Canada
  • Jie Wang and Jay Belanger. On average P vs. average NP - Proceedings of the 7th IEEE Annual Conference on Structure in Complexity Theory (Structures'92), 1992 - Boston, MA
  • Jie Wang and Jay Belanger. Honest iteration schemes of randomizing algorithms - Vol. 650 of Lecture Notes in Computer Science (ISAAC'92), 1992 - Tokyo, Japan
  • Average-case NP- completeness, November 1992 - Lexington, KT
  • Index immunity and isomorphism problems, July 1992 - NY
  • On average P and average NP, February 1992 - Germany
  • Average NP, December 1991 - Boston, MA
  • Immunity of complete problems, July 1991 - Piscataway, NJ
  • Is NLIN _ coNLIN?, May 1991 - Buffalo, NY
  • On the E-isomorphism problem, December 1990 - Piscataway, NJ
  • Jie Wang. P-productivity and polynomial time approximations - Proceedings of the 5th IEEE Annual Conference on Structure in Complexity Theory (Structures'90), 1990 - Barcelona, Spain
  • Jie Wang. Some remarks on polynomial time isomorphisms - Proceedings of Advances in Computing and Information (ICCI'90), June 1990 - Ontario, Canada
  • P-creativity and polynomial time isomorphism, February 1990 - Boston, MA
  • Polynomial-time isomorphism using the notion of polynomial-time creativity, February 1990 - IL
  • Jie Wang. P-creative sets vs. p-completely creative sets - Proceedings of the 4th IEEE Annual Conference on Structure in Complexity Theory (Structures'89), 1989 - Eugene, OR
  • P-creative sets, November 1988 - Heidelberg, West Germany
  • Attempts at constructing one-way functions, June 1988 - Santa Barbara, CA
  • P-complete creativity, June 1988 - Santa Barbara, CA
  • Steve Homer and Jie Wang. On semi-simple sets - Proceedings of the 2nd Asian Logic Conference, 1987 - Beijing, Chin
  • Jie Wang. Complexity analysis of computing block designs - Proceedings of the First National Symposium in Computational Algebra, 1985 - Lanzhou, China
  • Jie Wang. Some results in relativised complexity classes - Proceedings of the First National Symposium in Computational Algebra, 1985 - Lanzhou, China
  • Jie Wang. A result on G_del numbering - Proceedings of the First National Symposium in Mathematical Logic, 1984 - Guizhou, China
  • Guangkun Hou and Jie Wang. Using artificial intelligence techniques to find new block designs - Proceedings of the Second National Symposium on Artificial Intelligence, 1984 - Wuhan, China

Selected Contracts, Fellowships, Grants and Sponsored Research

  • Programmable Network Infrastructure with Emerging Technologies (2007), Grant - National Science Foundation
    Chen, G. (Co-Principal), Luo, Y. (Principal), Chandra, K., Wang, J.