The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhengyou Xia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhengyou Xia, Yichuan Jiang
    A Novel Artificial Life Ecosystem Environment Model. [Citation Graph (0, 0)][DBLP]
    ACRI, 2004, pp:650-659 [Conf]
  2. Zhengyou Xia, Y. A. Hu, Jian Wang, Y.-C. Jiang, X. L. Qin
    Analyze and Guess Type of Piece in the Computer Game Intelligent System. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:1174-1183 [Conf]
  3. Zhengyou Xia, YongPing Zhu, Hui Lu
    Evaluation Function for Siguo Game Based on Two Attitudes. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:1322-1331 [Conf]
  4. Zhengyou Xia, Yichuan Jiang
    A Novel Grid Node-by-Node Security Model. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:356-363 [Conf]
  5. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
    The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:591-598 [Conf]
  6. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
    The construction of a novel agent fault-tolerant migration model. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1-6 [Conf]
  7. Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang
    An access control policy for active networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:369-374 [Conf]
  8. Zhengyou Xia, Yichuan Jiang, Jian Wang
    Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:640-641 [Conf]
  9. Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
    Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:466-474 [Conf]
  10. Zhengyou Xia, Jian Wang, Yichuan Jiang
    Design Quality of Security Service Negotiation Protocol. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2005, v:24, n:2, pp:- [Journal]
  11. Zhengyou Xia, Yunan Hu
    Extending RSVP for Quality of Security Service. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:2, pp:51-57 [Journal]
  12. Zhengyou Xia, LaiLei Huang
    Emergence of Social Rumor: Modeling, Analysis, and Simulations. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:90-97 [Conf]
  13. Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang
    A Novel Policy and Information Flow Security Model for Active Network. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:42-55 [Conf]
  14. Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang
    A Novel Autonomous Trust Management Model for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:56-65 [Conf]

  15. Measuring User Prestige and Interaction Preference on Social Network Site. [Citation Graph (, )][DBLP]


  16. AWT: Aspiration with Timer Search Algorithm in Siguo. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002