Search the dblp DataBase
X. Yuan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
X. Yuan , Z. Duan FRR: a proportional and worst-case fair round robin scheduler. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:831-842 [Conf ] X. Yuan , A. K. Argawala A Decomposition Approach to Non-preemptive Scheduling in Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1989, pp:240-248 [Conf ] H. Yu , W. Liao , X. Yuan , J. Xu Teaching a web security course to practice information assurance. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2006, pp:12-16 [Conf ] X. Yuan , Zhang-Zhi Hu , H. T. Wu , Manabu Torii , Meenakshi Narayanaswamy , K. E. Ravikumar , K. Vijay-Shanker , Cathy H. Wu An online literature mining tool for protein phosphorylation. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2006, v:22, n:13, pp:1668-1669 [Journal ] X. Yuan , D. Goldman , Ali Moghaddamzadeh Segmentation of Colour Images with Highlights and Shadows sing Fuzzy-like Reasoning. [Citation Graph (0, 0)][DBLP ] Pattern Anal. Appl., 2001, v:4, n:4, pp:272-282 [Journal ] H. Yu , X. Yuan , J. Xu , S. Providence , B. Chu , D. Gu Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1030-1035 [Conf ] Z. Duan , X. Yuan , J. Chandrashekar Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Motion analysis for face capturing. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs