Search the dblp DataBase
Xiaochun Yang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xiaochun Yang , Ge Yu , Guoren Wang Efficiently Mapping Integrity Constraints from Relational Database to XML Document. [Citation Graph (0, 0)][DBLP ] ADBIS, 2001, pp:338-351 [Conf ] Xiaochun Yang , Ge Yu , Guoren Wang , Dan Wang , Baoyan Song Constraints for Information Cooperation in Virtual Enterprise Systems. [Citation Graph (0, 0)][DBLP ] CODAS, 2001, pp:175-182 [Conf ] Xiaochun Yang , Lin Li , Yiu-Kai Ng , Bin Wang , Ge Yu Associated Load Shedding Strategies for Computing Multi-joins in Sensor Networks. [Citation Graph (0, 0)][DBLP ] DASFAA, 2006, pp:50-64 [Conf ] Xiaochun Yang , Bin Wang Weave amino acid sequences for protein secondary structure prediction. [Citation Graph (0, 0)][DBLP ] DMKD, 2003, pp:80-87 [Conf ] Xiaochun Yang , Bin Wang , Guoren Wang , Ge Yu A Query Rewriting System for Enhancing the Queriability of Form-Based Interface. [Citation Graph (0, 0)][DBLP ] ICADL, 2004, pp:462-472 [Conf ] Xiaochun Yang , Chen Li , Ge Yu , Lei Shi XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:1124-1125 [Conf ] Xiaochun Yang , Guoren Wang , Ge Yu , Dik Lun Lee Modeling Enterprise Objects in a Virtual Enterprise Integrating System: VIASCOPE. [Citation Graph (0, 0)][DBLP ] ICSC, 1999, pp:166-175 [Conf ] Seung Jin Lim , Yiu-Kai Ng , Xiaochun Yang Integrating HTML Tables Using Semantic Hierarchies And Meta-Data Sets. [Citation Graph (0, 0)][DBLP ] IDEAS, 2002, pp:160-169 [Conf ] Xiaochun Yang , Xiangyu Liu , Bin Wang , Ge Yu A K -Anonymizing Approach for Preventing Link Attacks in Data Publishing. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:627-636 [Conf ] Xiaochun Yang , Chen Li Secure XML Publishing without Information Leakage in the Presence of Data Inference. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:96-107 [Conf ] Zhengyu Ou , Ge Yu , Yaxin Yu , Shanshan Wu , Xiaochun Yang , Qingxu Deng Tick Scheduling: A Deadline Based Optimal Task Scheduling Approach for Real-Time Data Stream Systems. [Citation Graph (0, 0)][DBLP ] WAIM, 2005, pp:725-730 [Conf ] Derong Shen , Ge Yu , Tiezheng Nie , Rui Li , Xiaochun Yang Modeling QoS for Semantic Equivalent Web Services. [Citation Graph (0, 0)][DBLP ] WAIM, 2004, pp:478-488 [Conf ] Lina Wang , Ge Yu , Guoren Wang , Xiaochun Yang , Dan Wang , Xiaomei Dong , Daling Wang , Zhe Mei A Virtual Private Network for Virtual Enterprise Information Systems. [Citation Graph (0, 0)][DBLP ] Web-Age Information Management, 2000, pp:165-176 [Conf ] Xiaochun Yang , Guoren Wang Mapping Referential Integrity Constraints from Relational Databases to XML. [Citation Graph (0, 0)][DBLP ] WAIM, 2001, pp:329-342 [Conf ] Xiaochun Yang , Bin Wang , Yiu-Kai Ng , Ge Yu , Guoren Wang A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine. [Citation Graph (0, 0)][DBLP ] WAIM, 2003, pp:266-277 [Conf ] Xiaochun Yang , Ge Yu , Guoren Wang Distributed Semantic Constraints in Virtual Enterprise Information Integrating Systems. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2001, v:14, n:3, pp:259-278 [Journal ] Chen Li , Houtan Shirani-Mehr , Xiaochun Yang Protecting Individual Information Against Inference Attacks in Data Publishing. [Citation Graph (0, 0)][DBLP ] DASFAA, 2007, pp:422-433 [Conf ] Bin Wang , Xiaochun Yang , Guoren Wang , Lei Chen 0002 , Sean X. Wang , Xuemin Lin , Ge Yu Answering Constrained k-NN Queries in Unstructured P2P Systems. [Citation Graph (0, 0)][DBLP ] DBISP2P, 2006, pp:397-405 [Conf ] Chen Li , Bin Wang , Xiaochun Yang VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:303-314 [Conf ] Bin Wang , Xiaochun Yang , Guoren Wang , Ge Yu Continuous Approximate Window Queries in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM, 2007, pp:407-418 [Conf ] Bin Wang , Xiaochun Yang , Guoren Wang , Ge Yu Efficient Difference NN Queries for Moving Objects. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM, 2007, pp:542-553 [Conf ] Distance-Based Outlier Detection on Uncertain Data. [Citation Graph (, )][DBLP ] An Efficient P2P Range Query Processing Approach for Multi-dimensional Uncertain Data. [Citation Graph (, )][DBLP ] Workshop Organizers' Message. [Citation Graph (, )][DBLP ] MCIS2010 Workshop Organizers' Message. [Citation Graph (, )][DBLP ] Graphical symbol recognition in architectural plans with an improved Ant-Tree based clustering algorithm. [Citation Graph (, )][DBLP ] Verification of CERT Secure Coding Rules: Case Studies. [Citation Graph (, )][DBLP ] A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. [Citation Graph (, )][DBLP ] Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. [Citation Graph (, )][DBLP ] Cost-based variable-length-gram selection for string collections to support approximate queries efficiently. [Citation Graph (, )][DBLP ] A Data Storage Method Based on Query Processing Region in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Enhancing Keyword Search in Relational Databases Using Nearly Duplicate Records. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs