Conferences in DBLP
Di Wu , Ye Tian , Kam-Wing Ng Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:1-8 [Conf ] Sanfeng Zhang , Guoxin Wu , Gang Chen , Libo Xu On Building and Updating Distributed LSI for P2P Systems. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:9-16 [Conf ] Yin Li , Fanyuan Ma , Liang Zhang Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:17-26 [Conf ] Hanyu Liu , Yu Peng , Mao Yang , Yafei Dai Characterization of P2P File-Sharing System. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:27-34 [Conf ] Liu Fang , Rao Ruonan Analysis of GHT in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:35-44 [Conf ] Xinli Huang , Fanyuan Ma , Yin Li Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:45-53 [Conf ] Dario Catalano , Giancarlo Ruffo , Rossano Schifanella A P2P Market Place Based on Aggregate Signatures. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:54-63 [Conf ] Jun Li , Xun Kang Proof of Service in a Hybrid P2P Environment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:64-73 [Conf ] Qiang Ding , Ke Xu , Hui-shan Liu Construct Optimal Diameter Network and d-partition Routing Algorithm. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:74-81 [Conf ] Gayatri Swamynathan , Ben Y. Zhao , Kevin C. Almeroth Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:82-90 [Conf ] Hongcan Zhang , Jiwu Shu , Wei Xue , Dingxing Wang VTarget: An Improved Software Target Emulator for SANs. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:91-100 [Conf ] Jun Luo , Jiwu Shu , Wei Xue Design and Implementation of an Efficient Multipath for a SAN Environment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:101-110 [Conf ] Tao Cai , Shiguang Ju , JuenJie Zhao , DeJiao Niu Research of Hot-Spot Selection Algorithm in Virtual Address Switch. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:111-119 [Conf ] Yulin Wang , Guangjun Li , Xiaojun Wu , Shuisheng Lin An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:120-129 [Conf ] Xiangguo Li , Jianhua Yang , Zhaohui Wu An NFSv4-Based Security Scheme for NAS. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:130-139 [Conf ] Changsheng Xie , Zhen Zhao , Jian Liu , Wei Wu Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:140-148 [Conf ] Bigang Li , Jiwu Shu , Fei Mu , Weimin Zheng A Cluster LVM for SAN Environments. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:149-158 [Conf ] Roy Varshavsky , Michal Linial , David Horn COMPACT: A Comparative Package for Clustering Assessment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:159-167 [Conf ] Xiao-hua Xu , Ling Chen , Ping He Fast Sequence Similarity Computing with LCS on LARPBS. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:168-175 [Conf ] Ling Chen , Juan Chen , Yi Pan Fast Scalable Algorithm on LARPBS for Sequence Alignment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:176-185 [Conf ] David B. Bracewell , Scott Russell , Annie S. Wu Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:186-195 [Conf ] Chengyong Yang , Erliang Zeng , Tao Li , Giri Narasimhan A Knowledge-Driven Method to Evaluate Multi-source Clustering. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:196-202 [Conf ] Jieyue He , Hae-Jin Hu , Robert W. Harrison , Phang C. Tai , Yisheng Dong , Yi Pan Understanding Protein Structure Prediction Using SVM_DT. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:203-212 [Conf ] Budi Ongkowijaya , Shilin Ding , Xiaoyan Zhu Various Features with Integrated Strategies for Protein Name Classification. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:213-222 [Conf ] Hai Jin , Chuanjiang Yi , Song Wu , Li Qi , Deqing Zou Uniform Authorization Management in ChinaGrid Support Platform. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:223-231 [Conf ] Yongwei Wu , Song Wu , Huashan Yu , Chunming Hu Introduction to ChinaGrid Support Platform. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:232-240 [Conf ] Xingwei Wang , Nan Jiang , Jialin Wang , Min Huang A Microeconomics-Based Resource Assignment Model for Grid Computing. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:241-248 [Conf ] Xiaoshe Dong , Yinfeng Wang , Xiuqiang He , Hua Guo , Fang Zheng , Weiguo Wu The Campus Resource Management Based on Constellation Model in the ChinaGrid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:249-256 [Conf ] Shoubin Dong , Pengfei Liu , Yicheng Cao , Zhengping Du Grid Computing Methodology for Protein Structure Prediction and Analysis. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:257-266 [Conf ] Xiangxu Meng , Shijun Liu , Rui Wang , Chenglei Yang , Hai Guo Applying Service Composition in Digital Museum Grid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:267-275 [Conf ] Junzhou Luo , Aibo Song , Ye Zhu , Xiaopeng Wang , Teng Ma , Zhiang Wu , Yaobin Xu , Liang Ge Grid Supporting Platform for AMS Data Processing. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:276-285 [Conf ] Xiaowu Chen , Xixi Luo , Zhangsheng Pan , Qinping Zhao A CGSP-Based Grid Application for University Digital Museums. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:286-296 [Conf ] Weimin Zheng , Meizhi Hu , Lin Liu , Yongwei Wu , Jing Tie FleMA: A Flexible Measurement Architecture for ChinaGrid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:297-304 [Conf ] Minglu Li , Chuliang Weng , Xinda Lu , Yong Yin , Qianni Deng A Resource Scheduling Strategy for the CFD Application on the Grid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:305-314 [Conf ] Mingwen Wang , Qingxin Zhu , Li Qing A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:315-322 [Conf ] Haifeng Qian , Zhenfu Cao A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:323-331 [Conf ] Yuan Zhou , Zhenfu Cao , Zhenchuan Chai An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:332-341 [Conf ] Shengbao Wang , Zhenfu Cao , Haiyong Bao Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:342-349 [Conf ] Zhenchuan Chai , Zhenfu Cao , Yuan Zhou Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:350-358 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng ID-Based Proxy Signature Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:359-367 [Conf ] Zhenfeng Zhang , Dengguo Feng Efficient Fair Certified E-Mail Delivery Based on RSA. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:368-377 [Conf ] Liwu Zhang , Dengguo Feng Intrusion Tolerant CA Scheme with Cheaters Detection Ability. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:378-386 [Conf ] Zheng Qin , Na Li , Da-Fang Zhang , Nai-Zheng Bian Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:387-396 [Conf ] Dingsheng Wan , Qing Li , Guihai Chen Research and Implementation of Workflow Interoperability Crossing Organizations. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:397-402 [Conf ] Peng Han , Haiguang Chen , Bo Yu , Dan Xu , Chuanshan Gao LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:403-411 [Conf ] Panlong Yang , Chang Tian Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:412-421 [Conf ] Amer Filipovic , Amitava Datta , Chris McDonald Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:422-433 [Conf ] Kennie H. Jones , Kenneth N. Lodding , Stephan Olariu , Larry Wilson , Chunsheng Xin Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:434-443 [Conf ] Xunxue Cui , Zhan Zhao , Qing Tao Probabilistic Behavior of Sensor Network Localization. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:444-453 [Conf ] Xiaomei Cao , Maolin Huang , YueQuan Chen , Guihai Chen Hybrid Authentication and Key Management Scheme for WSANs. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:454-465 [Conf ] Jian Wang , Zhengyou Xia , Lein Harn , Guihai Chen Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:466-474 [Conf ] Jiafu Hu , Nong Xiao , Yingjie Zhao , Wei Fu An Asynchronous Replica Consistency Model in Data Grid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:475-484 [Conf ] Gang Yin , Huaimin Wang , Tao Liu , Dian-xi Shi , Ming-Feng Chen Distributed Access Control for Grid Environments Using Trust Management Approach. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:485-495 [Conf ] Zhangsheng Pan , Xiaowu Chen , Xiangyu Ji Research on Database Access and Integration in UDMGrid. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:496-505 [Conf ] Jiadi Yu , Minglu Li , Feng Hong Resource Allocation Based on Pricing for Grid Computing Environments. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:506-513 [Conf ] Lixin Han , Guihai Chen , Linping Sun , Li Xie CMSA: A Method for Construction and Maintenance of Semantic Annotations. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:514-519 [Conf ] Kun Wu , Dai Han , Yang Zhang , Sanglu Lu , Daoxu Chen , Li Xie NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:520-529 [Conf ] Yaojun Han , Changjun Jiang , Xuemei Luo Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:530-539 [Conf ] Hongbo Wan , Qianni Deng , Xinhua Lin , Xinda Lu , Minglu Li The Design and Implementation of Service Adapter in ShanghaiGrid Core. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:540-548 [Conf ] Yutong Lu , Zhiyu Shen , Enqiang Zhou , Min Zhu MCRM System: CIM-Based Multiple Clusters Manager. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:549-558 [Conf ] Lei Cao , Minglu Li , Jian Cao , Yi Wang Introduction to an Agent-Based Grid Workflow Management System. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:559-568 [Conf ] Heping Chen , Jinguang Gu , Xiaohui Li , Hongping Fang An XML Query Mechanism with Ontology Integration. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:569-578 [Conf ] Wan-Chun Dou , Guihai Chen , Feng Su , Shijie Cai Implementation of Cooperative Cognition Under Web Environment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:579-588 [Conf ] Sun-Moon Jo , Ki-Tae Kim , Hoon-Joon Kouh , Weon-Hee Yoo Access Authorization Policy for XML Document Security. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:589-598 [Conf ] Jing Mei , Elena Paslaru Bontas , Zuoquan Lin OWL2Jess: A Transformational Implementation of the OWL Semantics. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:599-608 [Conf ] Kiyoung Moon , Namje Park , Kyoil Chung , Sungwon Sohn , Jaecheol Ryou Security Frameworks for Open LBS Based on Web Services Security Mechanism. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:609-618 [Conf ] Lei Xu , Baowen Xu , Changhai Nie Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:619-626 [Conf ] Xiaochun Yang , Xiangyu Liu , Bin Wang , Ge Yu A K -Anonymizing Approach for Preventing Link Attacks in Data Publishing. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:627-636 [Conf ] Yanping Yang , QingPing Tan , Yong Xiao Transformation-Driven Development of Composite Web Services. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:637-646 [Conf ] Fei Yu , Huang Huang , Cheng Xu , Xiao-peng Dai , Miaoliang Zhu Badness Information Audit Based on Image Character Filtering. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:647-656 [Conf ] Weifeng Zhang , Baowen Xu , Guoqiang Zhou User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:657-665 [Conf ]