The SCEAS System
Navigation Menu

Search the dblp DataBase


Jing Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
    Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:293-308 [Conf]
  2. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Aggregate Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:110-119 [Conf]
  3. Zhenfeng Zhang, Jing Xu, Dengguo Feng
    Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:200-210 [Conf]
  4. Jing Xu, C. Murray Woodside, Dorina C. Petriu
    Performance Analysis of a Software Design Using the UML Profile for Schedulability, Performance, and Time. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation / TOOLS, 2003, pp:291-307 [Conf]
  5. Jing Xu, Sumalatha Adabala, José A. B. Fortes
    Towards Autonomic Virtual Applications in the In-VIGO System. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:15-26 [Conf]
  6. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
    Efficient ID-Based Optimistic Fair Exchange with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:14-26 [Conf]
  7. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Proxy Signature Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:359-367 [Conf]
  8. Greg Franks, Dorina C. Petriu, C. Murray Woodside, Jing Xu, Peter Tregunno
    Layered Bottlenecks and Their Mitigation. [Citation Graph (0, 0)][DBLP]
    QEST, 2006, pp:103-114 [Conf]
  9. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    A Ring Signature Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:160-169 [Conf]
  10. Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens
    Performance analysis of security aspects in UML models. [Citation Graph (0, 0)][DBLP]
    WOSP, 2007, pp:91-102 [Conf]
  11. Jian-Xin Xu, Jing Xu
    A new fuzzy logic learning control scheme for repetitive trajectory tracking problems. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:133, n:1, pp:57-75 [Journal]
  12. Baoan Yang, Ling Xia Li, Hai Ji, Jing Xu
    An early warning system for loan risk assessment using artificial neural networks. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2001, v:14, n:5-6, pp:303-306 [Journal]
  13. Baoan Yang, Ling Xia Li, Qinghua Xie, Jing Xu
    Development of a KBS for managing bank loan risk. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2001, v:14, n:5-6, pp:299-302 [Journal]
  14. Yan Chen, Lixian Huang, Lulu Li, Qi Luo, Ying Wang, Jing Xu
    The Experimental Approaches of Assessing the Consistency of User Interface. [Citation Graph (0, 0)][DBLP]
    HCI (1), 2007, pp:420-427 [Conf]
  15. Jing Xu, Ming Zhao, José A. B. Fortes, Robert Carpenter, Mazin S. Yousif
    On the Use of Fuzzy Modeling in Virtualized Data Center Management. [Citation Graph (0, 0)][DBLP]
    ICAC, 2007, pp:25- [Conf]
  16. Yanfang Li, Huamin Yang, Jing Xu, Wei He, Jingtao Fan
    Chinese Character Recognition Method Based on Multi-features and Parallel Neural Network Computation. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:1103-1111 [Conf]
  17. Jing Xu, Wensheng Yu, Jian-Qiang Yi, Zhishou Tu
    Traffic Signal Timing with Neural Dynamic Optimization. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:358-367 [Conf]

  18. A Method for Privacy Protection in Location Based Services. [Citation Graph (, )][DBLP]

  19. An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. [Citation Graph (, )][DBLP]

  20. Preferences in Multiple-View Open Learner Models. [Citation Graph (, )][DBLP]

  21. Intrusion Detection Method Based on Fuzzy Hidden Markov Model. [Citation Graph (, )][DBLP]

  22. Robust Centerline Extraction for Tree-like Blood Vessels based on the Region Growing Algorithm and Level-Set Method. [Citation Graph (, )][DBLP]

  23. Towards Autonomic Grid Data Management with Virtualized Distributed File Systems. [Citation Graph (, )][DBLP]

  24. SAR image despeckling using undecimated directional filter banks and mean shift. [Citation Graph (, )][DBLP]

  25. The application of fuzzy system method to the cost estimation of construction works. [Citation Graph (, )][DBLP]

  26. Calibration of a structure light based windshield inspection system. [Citation Graph (, )][DBLP]

  27. Real-time 3D shape measurement system based on single structure light pattern. [Citation Graph (, )][DBLP]

  28. Random Move Tabu Search for Freight Proportion Allocation Problem. [Citation Graph (, )][DBLP]

  29. Ramp metering based on on-line ADHDP (lambda) controller. [Citation Graph (, )][DBLP]

  30. Video Fingerprinting by Using Boosted Features. [Citation Graph (, )][DBLP]

  31. Scalability Analysis of Job Scheduling Using Virtual Nodes. [Citation Graph (, )][DBLP]

  32. Preoperative Surgery Planning for Percutaneous Hepatic Microwave Ablation. [Citation Graph (, )][DBLP]

  33. How memory biases affect information transmission: A rational analysis of serial reproduction. [Citation Graph (, )][DBLP]

  34. Continuous Time Bayesian Networks for Host Level Network Intrusion Detection. [Citation Graph (, )][DBLP]

  35. Automatic Performance Evaluation Of Palm Recognition. [Citation Graph (, )][DBLP]

  36. The Design and Implementation of XML-based Workflow Engine. [Citation Graph (, )][DBLP]

  37. Cooperative Autonomic Management in Dynamic Distributed Systems. [Citation Graph (, )][DBLP]

  38. Rule-based automatic software performance diagnosis and improvement. [Citation Graph (, )][DBLP]

  39. Discrete event simulation modeling of resource planning and service order execution for service businesses. [Citation Graph (, )][DBLP]

  40. A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. [Citation Graph (, )][DBLP]

  41. A New Distributed Intrusion Detection Method Based on Immune Mobile Agent. [Citation Graph (, )][DBLP]

  42. Analysis and Design of Distributed Space-Time Trellis Code With Asynchronous Amplify-and-Forward Relaying. [Citation Graph (, )][DBLP]

  43. Differential Distributed Space-Frequency Coding for Broadband Non-Regenerative Wireless Relaying Systems. [Citation Graph (, )][DBLP]

  44. Scattered Points Denoising of TC-Bezier Surface Fitting. [Citation Graph (, )][DBLP]

  45. An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson’s Visual Model. [Citation Graph (, )][DBLP]

  46. All-Optical Logic Gates Based on Semiconductor Optical Amplifiers and Tunable Filters. [Citation Graph (, )][DBLP]

  47. Destination Planning and Space Mapping in the Robot-aided Coagulation Therapy System. [Citation Graph (, )][DBLP]

  48. Develop feedback robot planning method for 3D surface inspection. [Citation Graph (, )][DBLP]

  49. Windshield shape inspection using structured light patterns from two diffuse planar light sources. [Citation Graph (, )][DBLP]

  50. A Web-App Auto-Testing System Based on Test-Flow and Control Constraints. [Citation Graph (, )][DBLP]

  51. Iterative learning control for systems with both parametric and non-parametric uncertainties. [Citation Graph (, )][DBLP]

  52. Proportional-Fair Bit and Power Adaptation in Multiuser OFDM Systems. [Citation Graph (, )][DBLP]

  53. A New Client-to-Client Password-Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]

  54. Frequency-domain equalization and diversity combining for demodulate-and-forward cooperative systems. [Citation Graph (, )][DBLP]

  55. Autonomic resource management in virtualized data centers using fuzzy logic-based approaches. [Citation Graph (, )][DBLP]

  56. The Laplacian Spread of a Tree. [Citation Graph (, )][DBLP]

  57. Semiregular automorphisms of arc-transitive graphs with valency pq. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.009secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002