|
Search the dblp DataBase
Ming-Yang Su:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ming-Yang Su, Jia-Feng Chang
An Efficient and Secured Internet Key Exchange Protocol Design. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:184-192 [Conf]
- Gen-Huey Chen, Shien-Ching Hwang, Ming-Yang Su, Dyi-Rong Duh
A General Broadcasting Scheme for Recursive Networks with Complete Connection. [Citation Graph (0, 0)][DBLP] ICPADS, 1998, pp:248-0 [Conf]
- Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
A linear-time algorithm for computing the diameters of the incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP] ICPADS, 1996, pp:90-97 [Conf]
- Jang-Ping Sheu, Ming-Yang Su
A Multicast Algorithm for Hypercube Multiprocessors. [Citation Graph (0, 0)][DBLP] ICPP (3), 1992, pp:18-22 [Conf]
- Shi-Jinn Horng, Ming-Yang Su, Chao-Yi Wu
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms. [Citation Graph (0, 0)][DBLP] ICWS, 2005, pp:783-784 [Conf]
- Min-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
Broadcasting on Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP] ISPAN, 1996, pp:375-381 [Conf]
- Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
Broadcasting on Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 1999, v:57, n:3, pp:271-294 [Journal]
- Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
Topological properties of incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP] Networks, 1998, v:32, n:1, pp:23-45 [Journal]
- Gen-Huey Chen, Shien-Ching Hwang, Hui-Ling Huang, Ming-Yang Su, Dyi-Rong Duh
A general broadcasting scheme for recursive networks with complete connection. [Citation Graph (0, 0)][DBLP] Parallel Computing, 2001, v:27, n:9, pp:1273-1278 [Journal]
- Ming-Yang Su, Hui-Ling Huang, Gen-Huey Chen, Dyi-Rong Duh
Node-disjoint paths in incomplete WK-recursive networks. [Citation Graph (0, 0)][DBLP] Parallel Computing, 2000, v:26, n:13-14, pp:1925-1944 [Journal]
- Ming-Yang Su, Gen-Huey Chen, Dyi-Rong Duh
A Shortest-Path Routing Algorithm for Incomplete WK-Recursive Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:4, pp:367-379 [Journal]
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. [Citation Graph (, )][DBLP]
A real-time network intrusion detection system based on incremental mining approach. [Citation Graph (, )][DBLP]
Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes. [Citation Graph (, )][DBLP]
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. [Citation Graph (, )][DBLP]
Design of an adaptive positioning system based on WiFi radio signals. [Citation Graph (, )][DBLP]
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. [Citation Graph (, )][DBLP]
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|