The SCEAS System
Navigation Menu

Search the dblp DataBase


Chen Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiao-Feng Li, Chen Yang, Zhao-Hui Du, Tin-Fook Ngai
    Exploiting Thread-Level Speculative Parallelism with Software Value Prediction. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2005, pp:367-388 [Conf]
  2. Chen Yang, Furong Wang, Xinmei Wang
    Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:109-112 [Conf]
  3. Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang
    Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:448-452 [Conf]
  4. Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
    A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:487-492 [Conf]
  5. Chen Yang, Sami Khuri
    PTC: An Interactive Tool for Phylogenetic Tree Construction. [Citation Graph (0, 0)][DBLP]
    CSB, 2003, pp:476-477 [Conf]
  6. Chen Yang, Zhao Yong, Xie Hongsheng, Wu Chuncheng
    Network Evolution Modeling and Simulation Based on SPD. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:848-855 [Conf]
  7. Xiao-Feng Li, Zhao-Hui Du, Chen Yang, Chu-Cheow Lim, Tin-Fook Ngai
    Speculative Parallel Threading Architecture and Compilation. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2005, pp:285-294 [Conf]
  8. Chen Yang, Yongjian Chen, Xiong Fu, Chu-Cheow Lim, Roy Ju
    POV-Ray Parallelization and Optimization: An Experience Report. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:997-1003 [Conf]
  9. Zhao-Hui Du, Chu-Cheow Lim, Xiao-Feng Li, Chen Yang, Qingyu Zhao, Tin-Fook Ngai
    A cost-driven compilation framework for speculative parallelization of sequential programs. [Citation Graph (0, 0)][DBLP]
    PLDI, 2004, pp:71-81 [Conf]
  10. Chen Yang, Wenping Ma, Xinmei Wang
    New Traitor Tracing Scheme against Anonymous Attack. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:389-392 [Conf]
  11. Chen Yang, Wenping Ma, Xinmei Wang
    Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:306-312 [Conf]
  12. Chen Yang, Nan Chen, Peng-fei Zhang, Zhen Jiao
    Flexible Multi-modal Interaction Technologies and User Interface Specially Designed for Chinese Car Infotainment System. [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:243-252 [Conf]
  13. Yan Li, Chen Yang
    Learning Assessment Model in Web-Learning Based on Rough Set. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:603-606 [Conf]

  14. Linux kernels as complex networks: A novel method to study evolution. [Citation Graph (, )][DBLP]

  15. A Fully Parallel LISP2 Compactor with Preservation of the Sliding Properties. [Citation Graph (, )][DBLP]

  16. Comparative Metabolomics of Breast Cancer. [Citation Graph (, )][DBLP]

  17. The Study of Multidimensional-Data Flow of Fishbone Applied for Data Mining. [Citation Graph (, )][DBLP]

  18. Landscape bartender: landscape generation using a cocktail analogy. [Citation Graph (, )][DBLP]

  19. Generalized Russian Cards Problem. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002