The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaoping Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yexin Song, Yingchun Chen, Xiaoping Wu
    A Method for Solving Nonlinear Programming Models with All Fuzzy Coefficients Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:1101-1104 [Conf]
  2. Guang Yang, Xiaoping Wu, Yexin Song, Yinchun Chen
    Fault Diagnosis of Complicated Machinery System Based on Genetic Algorithm and Fuzzy RBF Neural Network. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:908-917 [Conf]
  3. Zhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang
    Group Key Management in Grid Environment. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:626-631 [Conf]
  4. Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang
    Grid System Integrated with Trusted Computing Platform. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:619-625 [Conf]
  5. Ping Wang, Xiaoping Wu
    OpenMP programming for a global inverse model. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 2002, v:10, n:3, pp:253-261 [Journal]
  6. Wenbo Zhang, Xiaoping Wu
    Adaptive Synchronization of Uncertain Chaotic Systems Based on Fuzzy Observer. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:355-362 [Conf]
  7. Wenbo Zhang, Xiaoping Wu
    General Hinfinity Synchronization of Chaotic Systems Via Orthogonal Function Neural Network. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:494-501 [Conf]
  8. Guang Yang, Xiaoping Wu
    Synthesized Fault Diagnosis Method Based on Fuzzy Logic and D-S Evidence Theory. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:1024-1031 [Conf]

  9. An Optimal Strategy for Online Non-uniform Length Order Scheduling. [Citation Graph (, )][DBLP]


  10. An Executable Code Authorization Model for Secure Operating System. [Citation Graph (, )][DBLP]


  11. A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping. [Citation Graph (, )][DBLP]


  12. A Trusted Computing Technology Enabled Mobile Agent System. [Citation Graph (, )][DBLP]


  13. Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. [Citation Graph (, )][DBLP]


  14. Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. [Citation Graph (, )][DBLP]


  15. A Hybrid Model of RST and DST with its Application in Intrusion Detection. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002