Search the dblp DataBase
Yi Hu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jianyong Duan , Ruzhan Lu , Weilin Wu , Yi Hu , Yan Tian A Bio-Inspired Approach for Multi-Word Expression Extraction. [Citation Graph (0, 0)][DBLP ] ACL, 2006, pp:- [Conf ] Xinda Lu , Yi Hu , Jie Chen A Lifetime-Sensitive Scheduling Method. [Citation Graph (0, 0)][DBLP ] APDC, 1997, pp:351-355 [Conf ] Albert Simpson , Jill Hunter , Moira Wylie , Yi Hu , David Mann Demonstrating Real-Time JPEG Image Compression-Decompression Using Standard Component IP Cores on a Programmable Logic Based Platform for DSP and Image Processing. [Citation Graph (0, 0)][DBLP ] FPL, 2001, pp:441-450 [Conf ] Xiaoming Chen , Xuening Li , Yi Hu , Ruzhan Lu Dual Filtering Strategy for Chinese Term Extraction. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:778-786 [Conf ] Yi Hu , Zhichun Xiao , Brajendra Panda A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:157- [Conf ] Jing Zhou , Brajendra Panda , Yi Hu Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:420-429 [Conf ] Yi Hu , Tomoharu Nagao Matching of characters in scene images by using local shape feature vectors. [Citation Graph (0, 0)][DBLP ] ICIAP, 2003, pp:207-212 [Conf ] Jianyong Duan , Yi Hu , Ruzhan Lu , Yan Tian , Hui Liu Bilingual Semantic Network Construction. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2005, pp:548-557 [Conf ] Yi Hu , Tomoharu Nagao A matching method based on marker-controlled watershed segmentation. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:283-286 [Conf ] Dequan Zheng , Yi Hu , Tiejun Zhao , Hao Yu , Sheng Li Research of Machine Learning Method for Specific Information Recognition on the Internet. [Citation Graph (0, 0)][DBLP ] ICMI, 2002, pp:229-234 [Conf ] Yi Hu , Brajendra Panda Identification of Malicious Transactions in Database Systems. [Citation Graph (0, 0)][DBLP ] IDEAS, 2003, pp:329-335 [Conf ] Yi Hu , Jianyong Duan , Xiaoming Chen , Bingzhen Pei , Ruzhan Lu A New Method for Sentiment Classification in Text Retrieval. [Citation Graph (0, 0)][DBLP ] IJCNLP, 2005, pp:1-9 [Conf ] Hua Zhang , Dian Zhou , Yi Hu , Ruiming Li , Jianzhong Zhang Phase noise spectra analysis for LC oscillators. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2005, pp:2263-2266 [Conf ] Yi Hu , Ruzhan Lu , Xuening Li An Approach to Automatic Construction of Lexical Relations Between Chinese Nouns from Machine Readable Dictionary. [Citation Graph (0, 0)][DBLP ] NLDB, 2005, pp:345-348 [Conf ] Yi Hu , Brajendra Panda A data mining approach for database intrusion detection. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:711-716 [Conf ] Yi Hu , Zhichun Xiao , Brajendra Panda Modeling deceptive information dissemination using a holistic approach. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:1591-1598 [Conf ] Yi Hu , Brajendra Panda Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:125-134 [Conf ] Yi Hu , Brajendra Panda Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2005, v:13, n:3, pp:269-291 [Journal ] Xiaohong Chen , Bin Gong , Hui Liu , Yi Hu SECGrid: Science and Engineering Computing Based Collaborative Problem Solving Environment. [Citation Graph (0, 0)][DBLP ] CDVE, 2007, pp:234-241 [Conf ] Yi Hu , Chang Woo Lee , Jong Yeol Yang , Bum Joo Shin Modeling of Places Based on Feature Distribution. [Citation Graph (0, 0)][DBLP ] HCI (3), 2007, pp:1019-1027 [Conf ] Yi Hu , Ruzhan Lu , Yuquan Chen , Bingzhen Pei Text Retrieval Oriented Auto-construction of Conceptual Relationship. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2007, pp:1214-1217 [Conf ] Yi Hu , Ruzhan Lu , Xuening Li , Yuquan Chen , Jianyong Duan A Language Modeling Approach to Sentiment Analysis. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2007, pp:1186-1193 [Conf ] Yi Hu , Ruzhan Lu , Yuquan Chen , Hui Liu , Dongyi Zhang The Dictionary-Based Quantified Conceptual Relations for Hard and Soft Chinese Text Clustering. [Citation Graph (0, 0)][DBLP ] NLDB, 2007, pp:96-106 [Conf ] Yi Hu , Ruzhan Lu , Yuquan Chen , Xiaoying Chen , Jianyong Duan The Bootstrapping Based Recognition of Conceptual Relationship for Text Retrieval. [Citation Graph (0, 0)][DBLP ] NLDB, 2007, pp:264-271 [Conf ] Yi Hu , Nuo Yu , Xiaohua Jia Energy efficient real-time data aggregation in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:803-808 [Conf ] A Novel Method for Intelligence of Sensors Modeling. [Citation Graph (, )][DBLP ] The Design and Implementation of a GMA based Grid Monitoring Service. [Citation Graph (, )][DBLP ] Analysis of Data Dependency Based Intrusion Detection System. [Citation Graph (, )][DBLP ] A Practical Approach for Relevance Measure of Inter-sentence. [Citation Graph (, )][DBLP ] A New Hierarchical Conceptual Graph Formalism Adapted for Chinese Document Retrieval. [Citation Graph (, )][DBLP ] Automated Extraction of Conceptual Knowledge from a Chinese Machine-Readable Dictionary. [Citation Graph (, )][DBLP ] Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks. [Citation Graph (, )][DBLP ] Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks. [Citation Graph (, )][DBLP ] A Balanced Consistency Maintenance Protocol for Structured P2P Systems. [Citation Graph (, )][DBLP ] Application of Artificial Intelligence Technique in Distributed Generation System. [Citation Graph (, )][DBLP ] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. [Citation Graph (, )][DBLP ] Developing Evaluation Model of Topical Term for Document-Level Sentiment Classification. [Citation Graph (, )][DBLP ] A Conceptual Model of Adjectival Modification in Chinese and Its Automatic Construction from a Machine Readable Dictionary. [Citation Graph (, )][DBLP ] Traffic signal control using fuzzy logic and evolutionary algorithms. [Citation Graph (, )][DBLP ] Distributed Call Admission Protocol for Multi-Channel Multi-Radio Wireless Networks. [Citation Graph (, )][DBLP ] Human Body Region Extraction from Photos. [Citation Graph (, )][DBLP ] Mining Inter-transaction Data Dependencies for Database Intrusion Detection. [Citation Graph (, )][DBLP ] Network Anomaly Detection Based on Traffic Prediction. [Citation Graph (, )][DBLP ] On the use of Bayesian modeling for predicting noise reduction performance. [Citation Graph (, )][DBLP ] Equalization of urban and rural basic public facilities based on GIS: A case study of educational facilities in Changzhou. [Citation Graph (, )][DBLP ] Inorganic Element Functional Group Database on Pulverized Coal Surface Based on XPS Method. [Citation Graph (, )][DBLP ] Search in 0.017secs, Finished in 0.021secs