The SCEAS System
Navigation Menu

Search the dblp DataBase


Yi Hu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jianyong Duan, Ruzhan Lu, Weilin Wu, Yi Hu, Yan Tian
    A Bio-Inspired Approach for Multi-Word Expression Extraction. [Citation Graph (0, 0)][DBLP]
    ACL, 2006, pp:- [Conf]
  2. Xinda Lu, Yi Hu, Jie Chen
    A Lifetime-Sensitive Scheduling Method. [Citation Graph (0, 0)][DBLP]
    APDC, 1997, pp:351-355 [Conf]
  3. Albert Simpson, Jill Hunter, Moira Wylie, Yi Hu, David Mann
    Demonstrating Real-Time JPEG Image Compression-Decompression Using Standard Component IP Cores on a Programmable Logic Based Platform for DSP and Image Processing. [Citation Graph (0, 0)][DBLP]
    FPL, 2001, pp:441-450 [Conf]
  4. Xiaoming Chen, Xuening Li, Yi Hu, Ruzhan Lu
    Dual Filtering Strategy for Chinese Term Extraction. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:778-786 [Conf]
  5. Yi Hu, Zhichun Xiao, Brajendra Panda
    A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:157- [Conf]
  6. Jing Zhou, Brajendra Panda, Yi Hu
    Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:420-429 [Conf]
  7. Yi Hu, Tomoharu Nagao
    Matching of characters in scene images by using local shape feature vectors. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2003, pp:207-212 [Conf]
  8. Jianyong Duan, Yi Hu, Ruzhan Lu, Yan Tian, Hui Liu
    Bilingual Semantic Network Construction. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:548-557 [Conf]
  9. Yi Hu, Tomoharu Nagao
    A matching method based on marker-controlled watershed segmentation. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:283-286 [Conf]
  10. Dequan Zheng, Yi Hu, Tiejun Zhao, Hao Yu, Sheng Li
    Research of Machine Learning Method for Specific Information Recognition on the Internet. [Citation Graph (0, 0)][DBLP]
    ICMI, 2002, pp:229-234 [Conf]
  11. Yi Hu, Brajendra Panda
    Identification of Malicious Transactions in Database Systems. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:329-335 [Conf]
  12. Yi Hu, Jianyong Duan, Xiaoming Chen, Bingzhen Pei, Ruzhan Lu
    A New Method for Sentiment Classification in Text Retrieval. [Citation Graph (0, 0)][DBLP]
    IJCNLP, 2005, pp:1-9 [Conf]
  13. Hua Zhang, Dian Zhou, Yi Hu, Ruiming Li, Jianzhong Zhang
    Phase noise spectra analysis for LC oscillators. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2263-2266 [Conf]
  14. Yi Hu, Ruzhan Lu, Xuening Li
    An Approach to Automatic Construction of Lexical Relations Between Chinese Nouns from Machine Readable Dictionary. [Citation Graph (0, 0)][DBLP]
    NLDB, 2005, pp:345-348 [Conf]
  15. Yi Hu, Brajendra Panda
    A data mining approach for database intrusion detection. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:711-716 [Conf]
  16. Yi Hu, Zhichun Xiao, Brajendra Panda
    Modeling deceptive information dissemination using a holistic approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1591-1598 [Conf]
  17. Yi Hu, Brajendra Panda
    Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:125-134 [Conf]
  18. Yi Hu, Brajendra Panda
    Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:269-291 [Journal]
  19. Xiaohong Chen, Bin Gong, Hui Liu, Yi Hu
    SECGrid: Science and Engineering Computing Based Collaborative Problem Solving Environment. [Citation Graph (0, 0)][DBLP]
    CDVE, 2007, pp:234-241 [Conf]
  20. Yi Hu, Chang Woo Lee, Jong Yeol Yang, Bum Joo Shin
    Modeling of Places Based on Feature Distribution. [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:1019-1027 [Conf]
  21. Yi Hu, Ruzhan Lu, Yuquan Chen, Bingzhen Pei
    Text Retrieval Oriented Auto-construction of Conceptual Relationship. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:1214-1217 [Conf]
  22. Yi Hu, Ruzhan Lu, Xuening Li, Yuquan Chen, Jianyong Duan
    A Language Modeling Approach to Sentiment Analysis. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:1186-1193 [Conf]
  23. Yi Hu, Ruzhan Lu, Yuquan Chen, Hui Liu, Dongyi Zhang
    The Dictionary-Based Quantified Conceptual Relations for Hard and Soft Chinese Text Clustering. [Citation Graph (0, 0)][DBLP]
    NLDB, 2007, pp:96-106 [Conf]
  24. Yi Hu, Ruzhan Lu, Yuquan Chen, Xiaoying Chen, Jianyong Duan
    The Bootstrapping Based Recognition of Conceptual Relationship for Text Retrieval. [Citation Graph (0, 0)][DBLP]
    NLDB, 2007, pp:264-271 [Conf]
  25. Yi Hu, Nuo Yu, Xiaohua Jia
    Energy efficient real-time data aggregation in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:803-808 [Conf]

  26. A Novel Method for Intelligence of Sensors Modeling. [Citation Graph (, )][DBLP]

  27. The Design and Implementation of a GMA based Grid Monitoring Service. [Citation Graph (, )][DBLP]

  28. Analysis of Data Dependency Based Intrusion Detection System. [Citation Graph (, )][DBLP]

  29. A Practical Approach for Relevance Measure of Inter-sentence. [Citation Graph (, )][DBLP]

  30. A New Hierarchical Conceptual Graph Formalism Adapted for Chinese Document Retrieval. [Citation Graph (, )][DBLP]

  31. Automated Extraction of Conceptual Knowledge from a Chinese Machine-Readable Dictionary. [Citation Graph (, )][DBLP]

  32. Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks. [Citation Graph (, )][DBLP]

  33. Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks. [Citation Graph (, )][DBLP]

  34. A Balanced Consistency Maintenance Protocol for Structured P2P Systems. [Citation Graph (, )][DBLP]

  35. Application of Artificial Intelligence Technique in Distributed Generation System. [Citation Graph (, )][DBLP]

  36. Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. [Citation Graph (, )][DBLP]

  37. Developing Evaluation Model of Topical Term for Document-Level Sentiment Classification. [Citation Graph (, )][DBLP]

  38. A Conceptual Model of Adjectival Modification in Chinese and Its Automatic Construction from a Machine Readable Dictionary. [Citation Graph (, )][DBLP]

  39. Traffic signal control using fuzzy logic and evolutionary algorithms. [Citation Graph (, )][DBLP]

  40. Distributed Call Admission Protocol for Multi-Channel Multi-Radio Wireless Networks. [Citation Graph (, )][DBLP]

  41. Human Body Region Extraction from Photos. [Citation Graph (, )][DBLP]

  42. Mining Inter-transaction Data Dependencies for Database Intrusion Detection. [Citation Graph (, )][DBLP]

  43. Network Anomaly Detection Based on Traffic Prediction. [Citation Graph (, )][DBLP]

  44. On the use of Bayesian modeling for predicting noise reduction performance. [Citation Graph (, )][DBLP]

  45. Equalization of urban and rural basic public facilities based on GIS: A case study of educational facilities in Changzhou. [Citation Graph (, )][DBLP]

  46. Inorganic Element Functional Group Database on Pulverized Coal Surface Based on XPS Method. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002