The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhenghu Gong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haitao Chen, Chuanfu Xu, Zunguo Huang, Huaping Hu, Zhenghu Gong
    A Scalable Peer-to-Peer Lookup Model. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:379-387 [Conf]
  2. Haitao Chen, Chuanfu Xu, Zunguo Huang, Zhenghu Gong, Huaping Hu
    Researches on Scalable Architecture for Security Information Distribution Service. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:450-457 [Conf]
  3. Guangming Hu, Zunguo Huang, Huaping Hu, Zhenghu Gong
    Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:398-405 [Conf]
  4. Hui-Yao An, Xicheng Lu, Zheng-Hu Gong, Wei Peng
    A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:321-330 [Conf]
  5. Haitao Chen, Zhenghu Gong, Zunguo Huang
    An Efficient Distributed Search Method. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:265-270 [Conf]
  6. Guangming Hu, Xiaohui Kuang, Zhenghu Gong
    A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:344-353 [Conf]
  7. Yaping Liu, Zhenghu Gong, Baosheng Wang, Jinshu Shu
    A Routing Optimization Algorithm for BGP Egress Selection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2006, pp:192-199 [Conf]
  8. Haitao Chen, Zunguo Huang, Zhenghu Gong
    Efficient Content Locating in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:253-257 [Conf]
  9. Lechun Wang, Peidong Zhu, Zhenghu Gong
    Systematic Robustness-Testing RI-Pro of BGP. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:463-468 [Conf]
  10. Haitao Chen, Zhenghu Gong, Zunguo Huang
    Parallel Downloading Algorithm for Large-volume File Distribution. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:745-749 [Conf]
  11. Qiang Zhang, Guangming Hu, Zhenghu Gong
    Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HPCC, 2007, pp:132-143 [Conf]

  12. AS Alliance in Inter-Domain Routing. [Citation Graph (, )][DBLP]


  13. E2EDSM: An Edge-to-Edge Data Service Model for Mass Streaming Media Transmission. [Citation Graph (, )][DBLP]


  14. Exploiting the Thread-Level Parallelism for BGP on Multi-core. [Citation Graph (, )][DBLP]


  15. Optimizing Sweep3D for Graphic Processor Unit. [Citation Graph (, )][DBLP]


  16. Detection Network Anomalies Based on Packet and Flow Analysis. [Citation Graph (, )][DBLP]


  17. An Entropy Based Algorithm to Find Critical Traffic Matrices. [Citation Graph (, )][DBLP]


  18. Two New Hybrid-type Data Dissemination Algorithms for Large-Scale Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  19. Translator Trust for the Internet Inter-domain Routing. [Citation Graph (, )][DBLP]


  20. A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  21. A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. [Citation Graph (, )][DBLP]


  22. A Practical Non-blocking Route Propagation Technology for Threaded BGP. [Citation Graph (, )][DBLP]


  23. Research and Implementation of Network Transmission Situation Awareness. [Citation Graph (, )][DBLP]


  24. Network Situation Assessment Based on RST. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002