The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yong Peng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, Jian Ma
    Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  2. Chonggang Wang, Bo Li, Kazem Sohraby, Yong Peng
    AFRED: An Adaptive Fuzzy-based Control Algorithm for Active Queue Management. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:12-20 [Conf]
  3. Meng Xu, Junliang Chen, Yong Peng, Xiang Mei, Chuanchang Liu
    A Dynamic Semantic Association-Based Web Service Composition Method. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:666-672 [Conf]
  4. Chuanchang Liu, Yong Peng, Junliang Chen
    Web Services Description Ontology-Based Service Discovery Model. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:633-636 [Conf]
  5. Yong Peng, Shiduan Cheng
    Performance Enhancement and Bandwidth Guarantee in IEEE 802.11 Wireless LANs. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:2, pp:150-157 [Journal]
  6. Yong Peng, Shiduan Cheng, Junliang Chen
    RSAD: A Robust Distributed Contention-Based Adaptive Mechanism for IEEE 802.11 Wireless LANs. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:2, pp:282-288 [Journal]
  7. Haitao Wu, Yu Lin, Shiduan Cheng, Yong Peng, Keping Long
    IEEE 802.11 Distributed Coordination Function: Enhancement and Analysis. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:5, pp:607-614 [Journal]

  8. A Practical Database Intrusion Detection System Framework. [Citation Graph (, )][DBLP]


  9. An Ontology-Driven Paradigm for Component Representation and Retrieval. [Citation Graph (, )][DBLP]


  10. A Fuzzy Optimization Neural Network Model Using Second Order Information. [Citation Graph (, )][DBLP]


  11. Fuzzy optimization based comprehensive assessment on the best utilization order of multi-water sources in Dalian. [Citation Graph (, )][DBLP]


  12. Optimal operation of cascade reservoirs based on generalized ant colony optimization method. [Citation Graph (, )][DBLP]


  13. Achievable Rate of Gaussian Cognitive Z-Interference Channel with Partial Side Information. [Citation Graph (, )][DBLP]


  14. A generic service system for knowledge-intensive service firms. [Citation Graph (, )][DBLP]


  15. Contour Map Plotting Algorithm for Evaluating Characteristics of Transient Electron Beam. [Citation Graph (, )][DBLP]


  16. On the Capacity Equivalence with Side Information at Transmitter and Receiver [Citation Graph (, )][DBLP]


  17. Capacity Bounds of Half-Duplex Gaussian Cooperative Interference Channel [Citation Graph (, )][DBLP]


  18. Noisy DPC and Application to a Cognitive Channel [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002