The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yongtian Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tingrong Lu, Chengcheng Sui, Yushu Ma, Jinsong Zhao, Yongtian Yang
    Extending Address Space of IP Networks with Hierarchical Addressing. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2005, pp:499-508 [Conf]
  2. Wu Yang, Xiao-chun Yun, Yong-Tian Yang
    Using Boosting Learning Method for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:634-641 [Conf]
  3. Wei Lin, Yongtian Yang, Shuqin Zhang
    A Computational Reputation Model in P2P Networks Based on Trust and Distrust. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:501-508 [Conf]
  4. Chunyan Li, Wei Lin, Yongtian Yang
    Packet Filtering Using a Decision Tree Classifier. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:801-805 [Conf]
  5. Shuqin Zhang, Dongxin Lu, Yongtian Yang
    A Fuzzy Set Based Trust and Reputation Model in P2P Networks. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2004, pp:211-217 [Conf]
  6. Yibing Song, Yongtian Yang
    Modeling Organization of Multi-Agent System with Command Mechanism. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:732-736 [Conf]
  7. Xueqing Wang, Yongtian Yang, Zhonglin Zhang
    A Virtual Rhomb Grid-Based Movement-Assisted Sensor Deployment Algorithm in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:491-495 [Conf]
  8. Xianhai Zhang, Yongtian Yang, Yan Zhu
    A Secure Hierarchical Fragile Watermarking Method with Tamper Localization. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:69-74 [Conf]
  9. Zhen-guo Gao, Yongtian Yang, Ling Wang, Jianwen Cui, Xiang Li
    FNSCSDP: A Forward Node Selection Based Cross-Layer Service Discovery Protocol for MANETs. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:220-231 [Conf]
  10. Zhen-guo Gao, Yongtian Yang, Jing Zhao, Jianwen Cui, Xiang Li
    Service Discovery Protocols for MANETs: A Survey. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:232-243 [Conf]
  11. Xueqing Wang, Yongtian Yang
    k-Variable Movement-Assisted Sensor Deployment Based on Virtual Rhomb Grid in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SelfMan, 2006, pp:179-183 [Conf]
  12. Ting Sun, Dongxin Lu, Yongtian Yang
    An Energy-Efficient Routing Method of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:129-132 [Conf]

  13. Formalization of Capability for Command-Based Agent. [Citation Graph (, )][DBLP]


  14. An Efficient Survivability Hierarchy Analysis Model for Networked Information System. [Citation Graph (, )][DBLP]


  15. A Quantitative Evaluation Model for Network Security. [Citation Graph (, )][DBLP]


  16. Research on Disaster Tolerance System Based on Network Dataflow. [Citation Graph (, )][DBLP]


  17. A Method to Enhance Service Survivability Based on Autonomous Configuration. [Citation Graph (, )][DBLP]


  18. A Method for Global Attack Graph Generation. [Citation Graph (, )][DBLP]


  19. A Dual-Center Event Description Model Used in Event Tracking. [Citation Graph (, )][DBLP]


  20. Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002