Search the dblp DataBase
Xiaoping Wu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yexin Song , Yingchun Chen , Xiaoping Wu A Method for Solving Nonlinear Programming Models with All Fuzzy Coefficients Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2005, pp:1101-1104 [Conf ] Guang Yang , Xiaoping Wu , Yexin Song , Yinchun Chen Fault Diagnosis of Complicated Machinery System Based on Genetic Algorithm and Fuzzy RBF Neural Network. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2006, pp:908-917 [Conf ] Zhi-Dong Shen , Xiao-Ping Wu , Yu-Hua Wang , Wen-Ling Peng , Huanguo Zhang Group Key Management in Grid Environment. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:626-631 [Conf ] Zhi-Dong Shen , Fei Yan , Weizhong Qiang , Xiao-Ping Wu , Huanguo Zhang Grid System Integrated with Trusted Computing Platform. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:619-625 [Conf ] Ping Wang , Xiaoping Wu OpenMP programming for a global inverse model. [Citation Graph (0, 0)][DBLP ] Scientific Programming, 2002, v:10, n:3, pp:253-261 [Journal ] Wenbo Zhang , Xiaoping Wu Adaptive Synchronization of Uncertain Chaotic Systems Based on Fuzzy Observer. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2007, pp:355-362 [Conf ] Wenbo Zhang , Xiaoping Wu General H infinity Synchronization of Chaotic Systems Via Orthogonal Function Neural Network. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2007, pp:494-501 [Conf ] Guang Yang , Xiaoping Wu Synthesized Fault Diagnosis Method Based on Fuzzy Logic and D-S Evidence Theory. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2007, pp:1024-1031 [Conf ] An Optimal Strategy for Online Non-uniform Length Order Scheduling. [Citation Graph (, )][DBLP ] An Executable Code Authorization Model for Secure Operating System. [Citation Graph (, )][DBLP ] A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping. [Citation Graph (, )][DBLP ] A Trusted Computing Technology Enabled Mobile Agent System. [Citation Graph (, )][DBLP ] Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. [Citation Graph (, )][DBLP ] Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. [Citation Graph (, )][DBLP ] A Hybrid Model of RST and DST with its Application in Intrusion Detection. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs