The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhimin Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhimin Yang, Hai Cao, Wei Tang
    Intelligent Agents in Intrusion Detection of CSCW Systems. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:1001-1004 [Conf]
  2. Zhimin Yang, Eylem Ekici, Dong Xuan
    A Localization-Based Anti-Sensor Network System. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2396-2400 [Conf]

  3. P2P Cooperation based on Strong Migration in CSCW. [Citation Graph (, )][DBLP]


  4. Multi-filters collaboration for querying XML data streams. [Citation Graph (, )][DBLP]


  5. An intrusion detection system based on RBF neural network. [Citation Graph (, )][DBLP]


  6. The Research on the Algorithm of Nonlinear Support Vector Classification Machine Based on Fuzzy Theory. [Citation Graph (, )][DBLP]


  7. The Research on the Algorithm of Approximately Linearly Dividable Support Vector Classification Machine Based on Fuzzy Theory. [Citation Graph (, )][DBLP]


  8. A fuzzy optimization method for support vector classification. [Citation Graph (, )][DBLP]


  9. On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. [Citation Graph (, )][DBLP]


  10. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. [Citation Graph (, )][DBLP]


  11. Fuzzy Support Vector Classification Based on Fuzzy Optimization. [Citation Graph (, )][DBLP]


  12. Exploring an Improved Decision Tree Based Weights. [Citation Graph (, )][DBLP]


  13. Malicious Shellcode Detection with Virtual Memory Snapshots. [Citation Graph (, )][DBLP]


  14. PerFallD: A pervasive fall detection system using mobile phones. [Citation Graph (, )][DBLP]


  15. Link-layer protection in 802.11i WLANS with dummy authentication. [Citation Graph (, )][DBLP]


  16. Research on Acceleration and Deceleration Control Algorithm of NC Instruction Interpretations with High-Order Smooth. [Citation Graph (, )][DBLP]


  17. Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002