The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qi He: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qi He, Katia P. Sycara, Zhongmin Su
    A Solution to Open Standard of PKI. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:99-110 [Conf]
  2. Qi He, Katia P. Sycara, Timothy W. Finin
    Personal Security Agent: KQML-Based PKI. [Citation Graph (0, 0)][DBLP]
    Agents, 1998, pp:377-384 [Conf]
  3. Qi He, Constantinos Dovrolis, Mostafa H. Ammar
    A Methodology for the Optimal Configuration of TCP Traffic in Network Simulations under Link Load Constraints. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2005, pp:25-32 [Conf]
  4. Qi He, Pradeep K. Khosla, Zhongmin Su
    A Practical Study on Security of Agent-Based Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    Trust, Reputation, and Security, 2002, pp:194-208 [Conf]
  5. Guohua Liu, Qi He, Ziyang Chen, Ying Wang
    A Novel System for Publishing Relational Data in XML Based on ER-DTD Method. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:7-10 [Conf]
  6. Qi He, Tok Wang Ling
    Extending and inferring functional dependencies in schema transformation. [Citation Graph (0, 0)][DBLP]
    CIKM, 2004, pp:12-21 [Conf]
  7. Qi He, Tok Wang Ling
    Resolving Schematic Discrepancy in the Integration of Entity-Relationship Schemas. [Citation Graph (0, 0)][DBLP]
    ER, 2004, pp:245-258 [Conf]
  8. Qi He, Kuiyu Chang, Ee-Peng Lim
    A Model for Anticipatory Event Detection. [Citation Graph (0, 0)][DBLP]
    ER, 2006, pp:168-181 [Conf]
  9. Qi He, Karsten Schwan
    IQ-RUDP: Coordinating Application Adaptation with Network Transport. [Citation Graph (0, 0)][DBLP]
    HPDC, 2002, pp:369-378 [Conf]
  10. Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, Jun Zhang
    Dependable Transaction for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:691-700 [Conf]
  11. Hao Wang, Heqing Guo, Jianfei Yin, Qi He, Manshan Lin, Jun Zhang
    Abuse-Free Item Exchange. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1028-1035 [Conf]
  12. Qi He, Mostafa H. Ammar, George F. Riley, Richard Fujimoto
    Exploiting the Predictability of TCP's Steady-State Behavior to Speed Up Network Simulation. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:101-108 [Conf]
  13. Qi He, Mostafa H. Ammar, George F. Riley, Himanshu Raj, Richard Fujimoto
    Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2003, pp:71-78 [Conf]
  14. Zhongtang Cai, Greg Eisenhauer, Qi He, Vibhore Kumar, Karsten Schwan, Matthew Wolf
    IQ-services: network-aware middleware for interactive large-data applications. [Citation Graph (0, 0)][DBLP]
    Middleware for Grid Computing, 2004, pp:11-16 [Conf]
  15. Qi He, Constantinos Dovrolis, Mostafa H. Ammar
    On the predictability of large transfer TCP throughput. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:145-156 [Conf]
  16. Qi He, Constantinos Dovrolis, Mostafa H. Ammar
    Prediction of TCP throughput: formula-based and history-based methods. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:388-389 [Conf]
  17. Hanny Yulius Limanto, Nguyen Ngoc Giang, Vo Tan Trung, Jun Zhang, Qi He, Nguyen Quang Huy
    An information extraction engine for web discussion forums. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:978-979 [Conf]
  18. Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, Jun Zhang
    A new dependable exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2770-2780 [Journal]
  19. Zhongtang Cai, Greg Eisenhauer, Qi He, Vibhore Kumar, Karsten Schwan, Matthew Wolf
    IQ-Services: network-aware middleware for interactive large-data applications. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:6, pp:635-652 [Journal]
  20. Qi He, Tok Wang Ling
    An ontology based approach to the integration of entity-relationship schemas. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2006, v:58, n:3, pp:299-326 [Journal]
  21. Qi He, Mostafa H. Ammar, George F. Riley, Richard M. Fujimoto
    Exploiting the predictability of TCP steady-state to speed up network simulation. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2004, v:58, n:2-3, pp:163-187 [Journal]
  22. Qi He, Mostafa H. Ammar
    Dynamic Host-Group/Multi-Destination Routing for Multicast Sessions. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:28, n:3-4, pp:409-433 [Journal]
  23. Qi He, Dapeng Wu, Pradeep K. Khosla
    A secure incentive architecture for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:333-346 [Journal]
  24. Ridzwan Aminuddin, Ridzwan Suri, Kuiyu Chang, Zaki Zainudin, Qi He, Ee-Peng Lim
    Modeling Anticipatory Event Transitions. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:401-408 [Conf]
  25. Qi He, Kuiyu Chang, Ee-Peng Lim, Jun Zhang
    Bursty Feature Representation for Clustering Text Streams. [Citation Graph (0, 0)][DBLP]
    SDM, 2007, pp:- [Conf]
  26. Qi He, Kuiyu Chang, Ee-Peng Lim
    Analyzing feature trajectories for event detection. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:207-214 [Conf]
  27. Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim
    Anticipatory Event Detection for Bursty Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:220-225 [Conf]
  28. Qi He, Constantinos Dovrolis, Mostafa H. Ammar
    On the predictability of large transfer TCP throughput. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:14, pp:3959-3977 [Journal]
  29. Qi He, Kuiyu Chang, Ee-Peng Lim
    Anticipatory event detection via classification. [Citation Graph (0, 0)][DBLP]
    Inf. Syst. E-Business Management, 2007, v:5, n:3, pp:275-294 [Journal]

  30. Detecting topic evolution in scientific literature: how can citations help? [Citation Graph (, )][DBLP]


  31. Preserving FDs in K-Anonymization by K-MSDs and Association Generalization. [Citation Graph (, )][DBLP]


  32. Creating the Cryptograph Index by Query Frequencies in DAS Models. [Citation Graph (, )][DBLP]


  33. Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases. [Citation Graph (, )][DBLP]


  34. Web Query Recommendation via Sequential Query Prediction. [Citation Graph (, )][DBLP]


  35. Using Burstiness to Improve Clustering of Topics in News Streams. [Citation Graph (, )][DBLP]


  36. Context-aware query suggestion by mining click-through and session data. [Citation Graph (, )][DBLP]


  37. Context-aware citation recommendation. [Citation Graph (, )][DBLP]


  38. TwitterRank: finding topic-sensitive influential twitterers. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002