The SCEAS System
Navigation Menu

Search the dblp DataBase


Liusheng Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Liu Sheng Huang, John Chung-Mong Lee, Qing Li, Wei Xiong
    Experimental Video Database Management System Based on Advanced Object-Oriented Techniques. [Citation Graph (4, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1996, pp:158-169 [Conf]
  2. Qing Li, Liu Sheng Huang
    A Dynamic Data Model for a Video Database Management System. [Citation Graph (1, 6)][DBLP]
    ACM Comput. Surv., 1995, v:27, n:4, pp:602-606 [Journal]
  3. Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang
    Common Vulnerability Markup Language. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:228-240 [Conf]
  4. Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao
    An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:315-324 [Conf]
  5. Wei Yang, Liusheng Huang, Yonglong Luo, Mingjun Xiao
    Quantum Oblivious Transfer Based on POVM Measurements. [Citation Graph (0, 0)][DBLP]
    FCS, 2006, pp:154-162 [Conf]
  6. Haitao Tian, Liusheng Huang, Jiulong Shan, Guoliang Chen
    Automated Vulnerability Management through Web Services. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:1067-1070 [Conf]
  7. Ming-Jun Xiao, Kai Han, Liusheng Huang, Jing-Yuan Li
    Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:78-85 [Conf]
  8. Wei Yang, Liusheng Huang, Mingjun Xiao, Weiwei Jing
    Quantum ANDOS Protocol with Unconditional Security. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:20-30 [Conf]
  9. H. T. Tian, Liusheng Huang, Z. Zhou, Yonglong Luo
    Arm up Administrators: Automated Vulnerability Management. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:587-593 [Conf]
  10. Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang, Jichun Wang, Xu Wang
    Self-organization Data Gathering for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:650-661 [Conf]
  11. Hongli Xu, Liusheng Huang, Yingyu Wan, Ben Xu
    Accurate Time Synchronization for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:153-163 [Conf]
  12. Liusheng Huang, Hong Zhong, Hong Shen, Yonglong Luo
    An Efficient Multiple-Precision Division Algorithm. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:971-974 [Conf]
  13. Ming-Jun Xiao, Liusheng Huang, Yonglong Luo, Hong Shen
    Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:239-243 [Conf]
  14. Hongli Xu, Liusheng Huang, Yingyu Wan, Kezhong Lu
    Localized Algorithm for Coverage in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:750-754 [Conf]
  15. An Liu, Liusheng Huang, Qing Li
    QoS-Aware Web Services Composition Using Transactional Composition Operator. [Citation Graph (0, 0)][DBLP]
    WAIM, 2006, pp:217-228 [Conf]
  16. An Liu, Liusheng Huang, Qing Li, Mingjun Xiao
    Fault-Tolerant Orchestration of Transactional Web Services. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:90-101 [Conf]
  17. Weijiang Xu, Liusheng Huang, Yonglong Luo, Yifei Yao, Weiwei Jing
    Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:850-856 [Conf]
  18. Xiaodong Gu, Guoliang Chen, Jun Gu, Liusheng Huang, Yunjae Jung
    Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms. [Citation Graph (0, 0)][DBLP]
    J. Comb. Optim., 2002, v:6, n:4, pp:455-471 [Journal]
  19. Liusheng Huang, Huaping Chen, Wang Xun, Guoliang Chen
    A Fast Algorithm for Mining Association Rules. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2000, v:15, n:6, pp:619-624 [Journal]
  20. Yinlong Xu, Guoliang Chen, Liusheng Huang, Yingyu Wan
    Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:4, pp:411-419 [Journal]
  21. Liusheng Huang, Hongli Xu, Yang Wang, Junmin Wu, Hong Li
    Coverage and Exposure Paths in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:4, pp:490-495 [Journal]
  22. Keqiu Li, Hong Shen, Keishi Tajima, Liusheng Huang
    An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2006, v:35, n:2, pp:165-184 [Journal]
  23. Jingyuan Li, Weijia Jia, Liusheng Huang, Mingjun Xiao, Jun Wang
    An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:380-390 [Conf]
  24. Yonglong Luo, Liusheng Huang, Hong Zhong
    Secure Two-Party Point-Circle Inclusion Problem. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:88-91 [Journal]

  25. Privacy-preserving Protocols for Finding the Convex Hulls. [Citation Graph (, )][DBLP]

  26. Interference-Aware Relay Assignment for Cooperative Networks. [Citation Graph (, )][DBLP]

  27. NBLS: Neighbor-information-based localization system for wireless sensor networks. [Citation Graph (, )][DBLP]

  28. Building Profit-Aware Service-Oriented Business Applications. [Citation Graph (, )][DBLP]

  29. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. [Citation Graph (, )][DBLP]

  30. Topology control for minimal path interference in wireless sensor networks. [Citation Graph (, )][DBLP]

  31. Hiding Information by Context-Based Synonym Substitution. [Citation Graph (, )][DBLP]

  32. Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks. [Citation Graph (, )][DBLP]

  33. An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  34. A Tracking Range Based Ant-Colony Routing Protocol for Mobile Wireless. [Citation Graph (, )][DBLP]

  35. Spanner-Aware Relay Node Placement in Wireless Ad Hoc Sensor Networks. [Citation Graph (, )][DBLP]

  36. A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. [Citation Graph (, )][DBLP]

  37. Coverage-preserving Data Gathering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  38. Location-Independent Topology Control and Implementation for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  39. QoS-Aware Scheduling of Web Services. [Citation Graph (, )][DBLP]

  40. A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  41. Efficient Wireless Broadcasting Using Onion Decoding. [Citation Graph (, )][DBLP]

  42. Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  43. Wireless fire monitoring system for ancient buildings. [Citation Graph (, )][DBLP]

  44. Privacy-preserving statistical quantitative rules mining. [Citation Graph (, )][DBLP]

  45. A hybrid range-free localization scheme in wireless sensor networks work in progress. [Citation Graph (, )][DBLP]

  46. Privacy-preserving technology and its applications in statistics measurements. [Citation Graph (, )][DBLP]

  47. An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks. [Citation Graph (, )][DBLP]

  48. Web services provision: solutions, challenges and opportunities (invited paper). [Citation Graph (, )][DBLP]

  49. An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme. [Citation Graph (, )][DBLP]

  50. Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. [Citation Graph (, )][DBLP]

  51. Steganalysis on Character Substitution Using Support Vector Machine. [Citation Graph (, )][DBLP]

  52. Privacy Preserving Attribute Reduction Based on Rough Set. [Citation Graph (, )][DBLP]

  53. Quantum Oblivious Transfer Using Tripartite Entangled States. [Citation Graph (, )][DBLP]

  54. Detection of Synonym-Substitution Modified Articles Using Context Information. [Citation Graph (, )][DBLP]

  55. A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  56. A fine-grained localization algorithm in wireless sensor networks. [Citation Graph (, )][DBLP]

  57. Building QKD Networks Based On a Novel QKD Scheme. [Citation Graph (, )][DBLP]

  58. A Threshold Multi-secret Sharing Scheme. [Citation Graph (, )][DBLP]

  59. Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links. [Citation Graph (, )][DBLP]

  60. Interface assignment and bandwidth allocation for multi-channel wireless mesh networks. [Citation Graph (, )][DBLP]

  61. Topology control for delay-constraint data collection in wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002