The SCEAS System
Navigation Menu

Search the dblp DataBase


Meng Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Meng Yu, Peng Liu, Wanyu Zang
    Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:142-151 [Conf]
  2. Meng Yu, Wanyu Zang, Peng Liu
    Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:515-526 [Conf]
  3. Meng Yu, Shaomei Wang
    Study on Scheduling System Based on Multi-Agent of Container Terminal. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:579-584 [Conf]
  4. Meng Yu, Indriyati Atmosukarto, Wee Kheng Leow, Zhiyong Huang, Rong Xu
    3D Model Retrieval With Morphing-Based Geometric and Topological Feature Maps. [Citation Graph (0, 0)][DBLP]
    CVPR (2), 2003, pp:656-661 [Conf]
  5. Brian A. Barsky, Daniel R. Horn, Stanley A. Klein, Jeffrey A. Pang, Meng Yu
    Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:246-255 [Conf]
  6. Brian A. Barsky, Daniel R. Horn, Stanley A. Klein, Jeffrey A. Pang, Meng Yu
    Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:256-265 [Conf]
  7. Meng Yu, Peng Liu, Wanyu Zang
    Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:418-425 [Conf]
  8. Wanyu Zang, Meng Yu
    A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:289-302 [Conf]
  9. Wen-hui Li, Meng Yu, Zhen-hua Zhang, Dong-fei Liu, Jian-yuan Wang
    A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2006, pp:68-76 [Conf]
  10. Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie
    JAPS-II: A Source to Source Parallelizing Compiler for Java. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:164-170 [Conf]
  11. Meng Yu, Peng Liu, Wanyu Zang
    Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:229-240 [Conf]
  12. Meng Yu, Peng Liu, Wanyu Zang
    Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal]
  13. Peng Liu, Wanyu Zang, Meng Yu
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal]
  14. Meng Yu, Jing Li, Rick S. Blum, Kameran Azadet
    Toward Maximizing Throughput in Wireless Relay: A General User Cooperation Model. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:25-30 [Conf]

  15. Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP]

  16. TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. [Citation Graph (, )][DBLP]

  17. Multi-Source Multihop Wireless Networks: A Trellis Representation and Network Coding. [Citation Graph (, )][DBLP]

  18. User Cooperation Through Network Coding. [Citation Graph (, )][DBLP]

  19. CrossTree: A new HTC architecture with high reliability and scalability. [Citation Graph (, )][DBLP]

  20. An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]

  21. Decentralized Trust Management based on the Reputation of Information Sources. [Citation Graph (, )][DBLP]

Search in 0.048secs, Finished in 0.050secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002