Search the dblp DataBase
Zhengyou Xia :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhengyou Xia , Yichuan Jiang A Novel Artificial Life Ecosystem Environment Model. [Citation Graph (0, 0)][DBLP ] ACRI, 2004, pp:650-659 [Conf ] Zhengyou Xia , Y. A. Hu , Jian Wang , Y.-C. Jiang , X. L. Qin Analyze and Guess Type of Piece in the Computer Game Intelligent System. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:1174-1183 [Conf ] Zhengyou Xia , YongPing Zhu , Hui Lu Evaluation Function for Siguo Game Based on Two Attitudes. [Citation Graph (0, 0)][DBLP ] FSKD, 2006, pp:1322-1331 [Conf ] Zhengyou Xia , Yichuan Jiang A Novel Grid Node-by-Node Security Model. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:356-363 [Conf ] Yichuan Jiang , Zhengyou Xia , YiPing Zhong , Shiyong Zhang The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:591-598 [Conf ] Yichuan Jiang , Zhengyou Xia , YiPing Zhong , Shiyong Zhang The construction of a novel agent fault-tolerant migration model. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:1-6 [Conf ] Zhengyou Xia , Yichuan Jiang , YiPing Zhong , Shiyong Zhang An access control policy for active networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:369-374 [Conf ] Zhengyou Xia , Yichuan Jiang , Jian Wang Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:640-641 [Conf ] Jian Wang , Zhengyou Xia , Lein Harn , Guihai Chen Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:466-474 [Conf ] Zhengyou Xia , Jian Wang , Yichuan Jiang Design Quality of Security Service Negotiation Protocol. [Citation Graph (0, 0)][DBLP ] Computers and Artificial Intelligence, 2005, v:24, n:2, pp:- [Journal ] Zhengyou Xia , Yunan Hu Extending RSVP for Quality of Security Service. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2006, v:10, n:2, pp:51-57 [Journal ] Zhengyou Xia , LaiLei Huang Emergence of Social Rumor: Modeling, Analysis, and Simulations. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:90-97 [Conf ] Zhengyou Xia , Yichuan Jiang , YiPing Zhong , Shiyong Zhang A Novel Policy and Information Flow Security Model for Active Network. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:42-55 [Conf ] Yichuan Jiang , Zhengyou Xia , YiPing Zhong , Shiyong Zhang A Novel Autonomous Trust Management Model for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:56-65 [Conf ] Measuring User Prestige and Interaction Preference on Social Network Site. [Citation Graph (, )][DBLP ] AWT: Aspiration with Timer Search Algorithm in Siguo. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs