|
Search the dblp DataBase
Ronghui Wu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guangxue Yue, Renfa Li, Zude Zhou, Ronghui Wu
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:776-786 [Conf]
- Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. [Citation Graph (0, 0)][DBLP] SKG, 2006, pp:74- [Conf]
- Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu
Research on User Authentication for Grid Computing Security. [Citation Graph (0, 0)][DBLP] SKG, 2006, pp:72- [Conf]
- Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. [Citation Graph (0, 0)][DBLP] SKG, 2006, pp:75- [Conf]
- Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Chen Xu
Research on Advanced Distributed Learning by Using SCORM. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2007, pp:571-574 [Conf]
- Fei Yu, Yue Shen, Guangxue Yue, Ronghui Wu, Cheng Xu
Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2007, pp:109-112 [Conf]
Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. [Citation Graph (, )][DBLP]
An Intrusion Alarm System Based on Fuzzy Reasoning Machine. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|