|
Search the dblp DataBase
Meng Yu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Meng Yu, Peng Liu, Wanyu Zang
Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:142-151 [Conf]
- Meng Yu, Wanyu Zang, Peng Liu
Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:515-526 [Conf]
- Meng Yu, Shaomei Wang
Study on Scheduling System Based on Multi-Agent of Container Terminal. [Citation Graph (0, 0)][DBLP] CSCWD, 2006, pp:579-584 [Conf]
- Meng Yu, Indriyati Atmosukarto, Wee Kheng Leow, Zhiyong Huang, Rong Xu
3D Model Retrieval With Morphing-Based Geometric and Topological Feature Maps. [Citation Graph (0, 0)][DBLP] CVPR (2), 2003, pp:656-661 [Conf]
- Brian A. Barsky, Daniel R. Horn, Stanley A. Klein, Jeffrey A. Pang, Meng Yu
Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2003, pp:246-255 [Conf]
- Brian A. Barsky, Daniel R. Horn, Stanley A. Klein, Jeffrey A. Pang, Meng Yu
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2003, pp:256-265 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:418-425 [Conf]
- Wanyu Zang, Meng Yu
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:289-302 [Conf]
- Wen-hui Li, Meng Yu, Zhen-hua Zhang, Dong-fei Liu, Jian-yuan Wang
A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm. [Citation Graph (0, 0)][DBLP] ISMIS, 2006, pp:68-76 [Conf]
- Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie
JAPS-II: A Source to Source Parallelizing Compiler for Java. [Citation Graph (0, 0)][DBLP] PDPTA, 2002, pp:164-170 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:229-240 [Conf]
- Meng Yu, Peng Liu, Wanyu Zang
Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal]
- Peng Liu, Wanyu Zang, Meng Yu
Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal]
- Meng Yu, Jing Li, Rick S. Blum, Kameran Azadet
Toward Maximizing Throughput in Wireless Relay: A General User Cooperation Model. [Citation Graph (0, 0)][DBLP] CISS, 2007, pp:25-30 [Conf]
Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP]
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. [Citation Graph (, )][DBLP]
Multi-Source Multihop Wireless Networks: A Trellis Representation and Network Coding. [Citation Graph (, )][DBLP]
User Cooperation Through Network Coding. [Citation Graph (, )][DBLP]
CrossTree: A new HTC architecture with high reliability and scalability. [Citation Graph (, )][DBLP]
An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]
Decentralized Trust Management based on the Reputation of Information Sources. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|