The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wanli Ma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mehmet A. Orgun, Wanli Ma
    An Overview of Temporal and Modal Logic Programming. [Citation Graph (0, 0)][DBLP]
    ICTL, 1994, pp:445-479 [Conf]
  2. Wanli Ma, C. W. Johnson, Richard P. Brent
    Programming with transactions and chemical abstract machine. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:562-564 [Conf]
  3. Wanli Ma, Dharmendra Sharma
    A Multiple Agents Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:205-211 [Conf]
  4. Wanli Ma, Dat Tran, Dharmendra Sharma, Abhishek Mathur
    Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1176-1183 [Conf]
  5. Dharmendra Sharma, Wanli Ma, Dat Tran
    On an IT Security Framework. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:226-232 [Conf]
  6. Dharmendra Sharma, Wanli Ma, Dat Tran, Mary Anderson
    A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1184-1191 [Conf]
  7. Kang Zhang, Wanli Ma
    Graphical Assistance in Parallel Program Development. [Citation Graph (0, 0)][DBLP]
    VL, 1994, pp:168-170 [Conf]
  8. Wanli Ma, Dat Tran, Dharmendra Sharma
    Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:589-596 [Conf]
  9. Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
    A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:547-554 [Conf]

  10. Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP]


  11. On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP]


  12. Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP]


  13. A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP]


  14. Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP]


  15. Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP]


  16. Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP]


  17. Detecting Image Based Spam Email. [Citation Graph (, )][DBLP]


  18. A Multi-agent Security Architecture. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002