The SCEAS System
Navigation Menu

Search the dblp DataBase


Yong Qi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qian-Mu Li, Yong Qi, Man-Wu Xu, Feng-Yu Liu
    A New Method of Network Data Link Troubleshooting. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:890-900 [Conf]
  2. Jizhong Zhao, Yong Qi, Zhaofeng Ma
    Secure Multimedia Streaming with Trusted Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:817-821 [Conf]
  3. Dong-jun Yu, Yong Qi, Yong-Hong Xu, Jing-Yu Yang
    Kernel-SOM Based Visualization of Financial Time Series Forecasting. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:470-473 [Conf]
  4. Jizhong Zhao, Min Xi, Yong Qi
    Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:844-849 [Conf]
  5. Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao
    A Conflict Resolution Method in Context-Aware Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:135-140 [Conf]
  6. Hai Ning Meng, Yong Qi, Di Hou, Ying Chen
    Forecasting Software Aging of Service-Oriented Application Server Based on Wavelet Network with Adaptive Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICAC, 2007, pp:10- [Conf]
  7. Min Xi, Jizhong Zhao, Yong Qi, Hui He, Liang Liu
    An Offset Algorithm for Conflict Resolution in Context-Aware Computing. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:878-887 [Conf]

  8. Developing an Insulin Pump System Using the SOFL Method. [Citation Graph (, )][DBLP]

  9. An Improved Calculus for Secure Dynamic Services Composition. [Citation Graph (, )][DBLP]

  10. Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. [Citation Graph (, )][DBLP]

  11. Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments. [Citation Graph (, )][DBLP]

  12. An Improved Heuristic for QoS-Aware Service Composition Framework. [Citation Graph (, )][DBLP]

  13. A Mixed Software Rejuvenation Policy for Multiple Degradations Software System. [Citation Graph (, )][DBLP]

  14. A Study on Context-aware Privacy Protection for Personal Information. [Citation Graph (, )][DBLP]

  15. EUL: An Efficient and Universal Localization Method for Wireless Sensor Network. [Citation Graph (, )][DBLP]

  16. A Multi-step Task Allocation Algorithm of Mobile Agent Based on Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]

  17. Run to Potential: Sweep Coverage in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  18. Randomizing RFID Private Authentication. [Citation Graph (, )][DBLP]

  19. Safety assurance for archeologists using sensor network. [Citation Graph (, )][DBLP]

  20. Energy Saving Task Scheduling for Heterogeneous CMP System Based on Multi-objective Fuzzy Genetic Algorithm. [Citation Graph (, )][DBLP]

  21. A Desynchronization Tolerant RFID Private Authentication Protocol. [Citation Graph (, )][DBLP]

  22. Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems. [Citation Graph (, )][DBLP]

  23. Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment. [Citation Graph (, )][DBLP]

  24. Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology. [Citation Graph (, )][DBLP]

Search in 0.060secs, Finished in 0.061secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002