The SCEAS System
| |||||||

## Search the dblp DataBase
Pingzhi Fan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xiaoqiang Zhang, Zhongliang Zhu, Pingzhi Fan
**Intrusion Detection Based on Cross-Correlation of System Call Sequences.**[Citation Graph (0, 0)][DBLP] ICTAI, 2005, pp:277-283 [Conf] - Pingzhi Fan
**Analysis of Error Contol in Digital Trunked Radio Systems.**[Citation Graph (0, 0)][DBLP] IMA Int. Conf., 1997, pp:96-100 [Conf] - Xiannong Fu, Yi Pan, Anu G. Bourgeois, Pingzhi Fan
**A Three-Stage Heuristic Combined Genetic Algorithm Strategy to the Channel-Assignment Problem.**[Citation Graph (0, 0)][DBLP] IPDPS, 2003, pp:145- [Conf] - Toshiaki Imoto, Naoki Suehiro, Noriyoshi Kuroyanagi, Pingzhi Fan
**Simulation of Multipath-Tolerant Binary Signal Design for Approximately Synchronized CDMA Mobile Communication without Co-Channel Interference nor Detection Sidelobe Using Complete Complementary Codes.**[Citation Graph (0, 0)][DBLP] ISCC, 1999, pp:317-323 [Conf] - Mingxing He, Pingzhi Fan, Firoz Kaderali
**Group Key Agreement Protocol Based on GH-KEP.**[Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:619-623 [Conf] - Yingpeng Sang, Hong Shen, Pingzhi Fan
**Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine.**[Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:666-669 [Conf] - Lifang Feng, Pingzhi Fan
**Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:342-350 [Conf] - Qingchun Chen, Kam-yiu Lam, Pingzhi Fan
**Comments on "Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks'.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2005, v:54, n:9, pp:1182-1183 [Journal] - Zhi Chen, Pingzhi Fan, Jin Fan
**On the constructions of multiple-burst error-correcting codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1992, v:38, n:1, pp:197-0 [Journal] - Zhi Chen, Pingzhi Fan, Jin Fan
**Disjoint difference sets, difference triangle sets, and related codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1992, v:38, n:2, pp:518-0 [Journal] - Daiyuan Peng, Pingzhi Fan
**Lower Bounds on the Hamming Auto- and Cross Correlations of Frequency-Hopping Sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2004, v:50, n:9, pp:2149-2154 [Journal] - Xiaohu Tang, Parampalli Udaya, Pingzhi Fan
**A new family of nonbinary sequences with three-level correlation property and large linear span.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2906-2914 [Journal] - Xiaohu Tang, Parampalli Udaya, Pingzhi Fan
**Generalized Binary Udaya-Siddiqi Sequences.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2007, v:53, n:3, pp:1225-1230 [Journal] - Wenhao Shan, Pingzhi Fan, Yi Pan
**Performance Evaluation of a Hierarchical Cellular System with Mobile Velocity-Based Bidirectional Call-Overflow Scheme.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:1, pp:72-83 [Journal] - Shahzad Amin Sheikh, Pingzhi Fan
**Two efficient adaptively varying modulus blind equalizers: AVMA and DM/AVMA.**[Citation Graph (0, 0)][DBLP] Digital Signal Processing, 2006, v:16, n:6, pp:832-845 [Journal] - I-Hong Kuo, Shi-Jinn Horng, Tzong-Wann Kao, Tsung-Lieh Lin, Pingzhi Fan
**An Efficient Flow-Shop Scheduling Algorithm Based on a Hybrid Particle Swarm Optimization Model.**[Citation Graph (0, 0)][DBLP] IEA/AIE, 2007, pp:303-312 [Conf] **3D Block-Based Medial Axis Transform and Chessboard Distance Transform on the CREW PRAM.**[Citation Graph (, )][DBLP]**An Asymptotically Sum-Rate Optimal Precoding Scheme for MIMO Gaussian Broadcast Channel.**[Citation Graph (, )][DBLP]**Construction of Anti-Collusion Codes Based on Cover-Free Families.**[Citation Graph (, )][DBLP]**A New Concurrent Detection of Control Flow Errors Based on DCT Technique.**[Citation Graph (, )][DBLP]**An Enhanced Anti-collision Algorithm in RFID Based on Counter and Stack.**[Citation Graph (, )][DBLP]**Performance of large CDMA random access systems with retransmission diversity over fading channels.**[Citation Graph (, )][DBLP]**A feasible intrusion detector for recognizing IIS attacks based on neural networks.**[Citation Graph (, )][DBLP]**A new optimal quaternary sequence family of length 2(2**[Citation Graph (, )][DBLP]^{n}- 1) obtained from the orthogonal transformation of Families*B*and*C*.**Constructions of optimal quaternary constant weight codes via group divisible designs.**[Citation Graph (, )][DBLP]
Search in 0.040secs, Finished in 0.041secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |