The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jie Ma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei Cui, Jie Ma, Zhigang Huo
    Grid Gateway: Message-Passing between Separated Cluster Interconnects. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:724-731 [Conf]
  2. Huan Chen, Rongfeng Tang, Yi Zhao, Jin Xiong, Jie Ma, Ninghui Sun
    Research on Key Technologies of Load Balancing for NFS Server with Multiple Network Paths. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:407-411 [Conf]
  3. Yuanxia You, Dan Meng, Gang Xue, Jie Ma
    Evaluation of the Device Driver Availability in Dawning4000A. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:308-313 [Conf]
  4. Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu
    Semi-User-Level Communication Architecture. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  5. Ming Ma, Libiao Zhang, Jie Ma, Chunguang Zhou
    Fuzzy Neural Network Optimization by a Particle Swarm Optimization Algorithm. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:752-761 [Conf]
  6. Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, Jie Ma, Hao Wang, Jiangpei Yin
    APPLE: A Novel P2P Based e-Learning Environment. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:52-62 [Conf]
  7. Rongfeng Tang, Jin Xiong, Jie Ma, Dan Meng
    A New Way to High Performance NFS for Clusters. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:51-55 [Conf]
  8. Danjun Liu, Jie Ma, Jianfeng Zhan, Ying Jiang
    A Formal Method for Modeling and Managing Large-Scale Distributed Applications. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:542-547 [Conf]
  9. Wei Huang, Zhe Wang, Jie Ma
    Design of DMPI on DAWNING-3000. [Citation Graph (0, 0)][DBLP]
    PVM/MPI, 2002, pp:314-322 [Conf]
  10. Yi Zhao, Rongfeng Tang, Jin Xiong, Jie Ma
    IncFS: An Integrated High-Performance Distributed File System Based on NFS. [Citation Graph (0, 0)][DBLP]
    IWNAS, 2006, pp:87-92 [Conf]
  11. Jie Ma, Jin He, Dan Meng, Guojie Li
    BCL-3: A High Performance Basic Communication Protocol for Commodity Superserver DAWNING-3000. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2001, v:16, n:6, pp:522-530 [Journal]
  12. Ming Ma, Chunguang Zhou, Libiao Zhang, Jie Ma
    Fuzzy Neural Network Optimization by a Multi-Objective Particle Swarm Optimization Algorithm. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:12, pp:2104-2109 [Journal]
  13. Huan Chen, Yi Zhao, Jin Xiong, Jie Ma, Ninghui Sun
    United-FS: A Logical File System Providing a Single Image of Multiple Physical File Systems on NFS Server. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-7 [Conf]

  14. Measuring Peer-to-Peer Botnets Using Control Flow Stability. [Citation Graph (, )][DBLP]


  15. Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. [Citation Graph (, )][DBLP]


  16. A Thunderstorm Forecast Model Based on Weighted SVM and Data Field. [Citation Graph (, )][DBLP]


  17. Colony Evolution in Social Networks Based on Multi-agent System. [Citation Graph (, )][DBLP]


  18. HPPNET: A novel network for HPC and its implication for communication software. [Citation Graph (, )][DBLP]


  19. Combining Policy Search with Planning in Multi-agent Cooperation. [Citation Graph (, )][DBLP]


  20. Adaptive and scalable metadata management to support a trillion files. [Citation Graph (, )][DBLP]


  21. Automatic attack plan recognition from intrusion alerts. [Citation Graph (, )][DBLP]


  22. Region Based Image Retrieval Incorporated with Camera Metadata. [Citation Graph (, )][DBLP]


  23. Object Localization Based on Mutual Information in Global Structure Constraint Model. [Citation Graph (, )][DBLP]


  24. Processing Intrusion Detection Alerts in Large-scale Network. [Citation Graph (, )][DBLP]


  25. Object Localization Based on Global Structure Constraint Model and Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  26. Semantic Information Extraction of Video Based on Ontology and Inference. [Citation Graph (, )][DBLP]


  27. Computational identification of rare codons of Escherichia coli based on codon pairs preference. [Citation Graph (, )][DBLP]


  28. Bounds for pairs in partitions of graphs. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002