Search the dblp DataBase
Yang Xiang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Janzen , Yang Xiang Probabilistic Reasoning for Meal Planning in Intelligent Fridges. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2003, pp:575-582 [Conf ] Yang Xiang Semantics of Multiply Selectioned Bayesian Networks for Cooperative Multi-agent Distributed Interpretation. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 1996, pp:213-226 [Conf ] Yang Xiang Temporally Invariant Junction Tree for Inference in Dynamic Bayesian Network. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 1998, pp:363-377 [Conf ] Yang Xiang , Junjiang Chen , Abhi Deshmukht A Decision-Theoretic Graphical Model for Collaborative Design on Supply Chains. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2004, pp:355-369 [Conf ] Yang Xiang , Xiaohua Hu , Nick Cercone , Howard J. Hamilton Learning Pseudo-independent Models: Analytical and Experimental Results. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2000, pp:227-239 [Conf ] Yang Xiang , J. Lee Local Score Computation in Learning Belief Networks. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2001, pp:152-161 [Conf ] Yang Xiang , Chenwen Ye Deborah Ann Stacey, Application of Bayesian Networks to Shopping Assistance. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2002, pp:344-348 [Conf ] Yongzhong Tu , Wei-Tek Tsai , Yang Xiang Specifying Constraints with Message Sequence Specifications. [Citation Graph (0, 0)][DBLP ] APSEC, 1999, pp:368-375 [Conf ] Yang Xiang , Kun Zhang Agent interface enhancement: making multiagent graphical models accessible. [Citation Graph (0, 0)][DBLP ] AAMAS, 2006, pp:19-26 [Conf ] Yang Xiang , Wanlei Zhou Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:320-333 [Conf ] Yang Xiang , Qiwei Gu , Zhengxiang Li A Distributed Framework of Web-Based Telemedicine System. [Citation Graph (0, 0)][DBLP ] CBMS, 2003, pp:108-0 [Conf ] Albert C. S. Chung , Yang Xiang , Jian Ye , W. K. Law Elastic Interaction Models for Active Contours and Surfaces. [Citation Graph (0, 0)][DBLP ] CVBIA, 2005, pp:314-323 [Conf ] Yang Xiang , Albert C. S. Chung , Jian Ye A New Active Contour Method Based on Elastic Interaction. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2005, pp:452-457 [Conf ] Hsinchun Chen , Homa Atabakhsh , Daniel Dajun Zeng , Jennifer Schroeder , Tim Petersen , Dan Casey , M. Chen , Yang Xiang , Damien Daspit , Suresh Nandiraju COPLINK: Visualization and Collaboration for Law Enforcement. [Citation Graph (0, 0)][DBLP ] DG.O, 2002, pp:- [Conf ] Hongyu Geng , Yang Xiang Distributed Multi-Agent MSBN: Implementing Verification. [Citation Graph (0, 0)][DBLP ] FLAIRS Conference, 2000, pp:293-297 [Conf ] Jae-Hyuck Lee , Yang Xiang Model Complexity of Pseudo-independent Models. [Citation Graph (0, 0)][DBLP ] FLAIRS Conference, 2005, pp:766-771 [Conf ] Yang Xiang , Michael Janzen Package Planning with Graphical Models. [Citation Graph (0, 0)][DBLP ] FLAIRS Conference, 2004, pp:- [Conf ] Gulisong Nasierding , Yang Xiang , Honghua Dai Towards Extended Machine Translation Model for Next Generation World Wide Web. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:1017-1020 [Conf ] Yang Xiang , Wanlei Zhou Protect Grids from DDoS Attacks. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:309-316 [Conf ] Yang Xiang , Wanlei Zhou , Morshed U. Chowdhury GHIRS: Integration of Hotel Management Systems by Web Services. [Citation Graph (0, 0)][DBLP ] GCC (2), 2003, pp:1002-1009 [Conf ] Yang Xiang , Zhongwen Li , Hong Chen Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. [Citation Graph (0, 0)][DBLP ] GCC Workshops, 2006, pp:181-188 [Conf ] Baolin Sun , Layuan Li , Qiu Yang , Yang Xiang An Entropy-Based Stability QoS Multicast Routing Protocol in Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] GPC, 2006, pp:217-226 [Conf ] Xiangdong An , Yang Xiang , Nick Cercone Revising Markov Boundary for Multiagent Probabilistic Inference. [Citation Graph (0, 0)][DBLP ] IAT, 2004, pp:113-119 [Conf ] Wei Shi , Yang Xiang , Wanlei Zhou Distributed Defense Against Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:357-362 [Conf ] Yang Xiang , Wanlei Zhou , Morshed U. Chowdhury Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:312-0 [Conf ] Yang Xiang , Victor R. Lesser Justifying Multiply Sectioned Bayesian Networks. [Citation Graph (0, 0)][DBLP ] ICMAS, 2000, pp:349-358 [Conf ] Yang Xiang , Wanlei Zhou An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Wanlei Zhou , Yang Xiang Combating DDoS Attacks in Web-based Services. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Zhongwen Li , Yang Xiang , Hong Chen Performance Optimization of Checkpointing Schemes with Task Duplication. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:671-677 [Conf ] S. K. Michael Wong , Yang Xiang , Xiaopin Nie Representation of Bayesian Networks as Relational Databases. [Citation Graph (0, 0)][DBLP ] IPMU, 1994, pp:117-130 [Conf ] Yang Xiang Distributed Multi-Agent Probabilistic Reasoning With Bayesian Networks. [Citation Graph (0, 0)][DBLP ] ISMIS, 1994, pp:285-294 [Conf ] Yang Xiang , Wanlei Zhou Intelligent DDoS Packet Filtering in High-Speed Networks. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:395-406 [Conf ] Xiangdong An , Yang Xiang , Nick Cercone Probabilistic reasoning in dynamic multiagent systems. [Citation Graph (0, 0)][DBLP ] NMR, 2004, pp:16-24 [Conf ] Yang Xiang , S. K. Michael Wong , Nick Cercone Quantifying Uncertainty of Knowledge Discovered From Databases. [Citation Graph (0, 0)][DBLP ] RSKD, 1993, pp:63-73 [Conf ] Andreas Brandstädt , Feodor F. Dragan , Yang Xiang , Chenyu Yan Generalized Powers of Graphs and Their Algorithmic Use. [Citation Graph (0, 0)][DBLP ] SWAT, 2006, pp:423-434 [Conf ] Tongsheng Chu , Yang Xiang Exploring Parallelism in Learning Belief Networks. [Citation Graph (0, 0)][DBLP ] UAI, 1997, pp:90-98 [Conf ] Jun Hu , Yang Xiang Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels. [Citation Graph (0, 0)][DBLP ] UAI, 1997, pp:258-265 [Conf ] S. K. Michael Wong , Cory J. Butz , Yang Xiang A Method for Implementing a Probabilistic Model as a Relational Database. [Citation Graph (0, 0)][DBLP ] UAI, 1995, pp:556-564 [Conf ] Yang Xiang Optimization of Inter-Subnet Belief Updating in Multiply Sectioned Bayesian Networks. [Citation Graph (0, 0)][DBLP ] UAI, 1995, pp:565-573 [Conf ] Yang Xiang , Michael P. Beddoes , David Poole Can Uncertainty Management be Realized in a Finite Totally Ordered Probability Algebra? [Citation Graph (0, 0)][DBLP ] UAI, 1989, pp:41-60 [Conf ] Yang Xiang , David Poole , Michael P. Beddoes Exploring Localization in Bayesian Networks for Large Expert Systems. [Citation Graph (0, 0)][DBLP ] UAI, 1992, pp:344-351 [Conf ] Yang Xiang , S. K. Michael Wong , Nick Cercone Critical Remarks on Single Link Search in Learning Belief Networks. [Citation Graph (0, 0)][DBLP ] UAI, 1996, pp:564-571 [Conf ] Yang Xiang , Wanlei Zhou A Defense System against DDoS Attacks by Large-Scale IP Traceback. [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:431-436 [Conf ] Yang Xiang A Probabilistic Framework for Cooperative Multi-Agent Distributed Interpretation and Optimization of Communication. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1996, v:87, n:1-2, pp:295-342 [Journal ] Yang Xiang , B. Pant , A. Eisen , Michael P. Beddoes , David Poole Multiply sectioned Bayesian networks for neuromuscular diagnosis. [Citation Graph (0, 0)][DBLP ] Artificial Intelligence in Medicine, 1993, v:5, n:4, pp:293-314 [Journal ] Yang Xiang , David Poole , Michael P. Beddoes Multiply Sectioned Bayesian Networks and Junction Forests for Large Knowledge-Based Systems. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 1993, v:9, n:, pp:171-220 [Journal ] Yang Xiang , S. K. Michael Wong , Nick Cercone Quantification of Unvertainty in Classification Rules Discovered from Databases. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 1995, v:11, n:, pp:427-441 [Journal ] Yang Xiang , Tongsheng Chu Parallel Learning of Belief Networks in Large and Difficult Domains. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 1999, v:3, n:3, pp:315-339 [Journal ] Yang Xiang , Michael Chau , Homa Atabakhsh , Hsinchun Chen Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2005, v:41, n:1, pp:69-83 [Journal ] Yang Xiang Belief updating in multiply sectioned Bayesian networks without repeated local propagations. [Citation Graph (0, 0)][DBLP ] Int. J. Approx. Reasoning, 2000, v:23, n:1, pp:1-21 [Journal ] Yang Xiang Comparison of multiagent inference methods in multiply sectioned Bayesian networks. [Citation Graph (0, 0)][DBLP ] Int. J. Approx. Reasoning, 2003, v:33, n:3, pp:235-254 [Journal ] Yang Xiang , Jae-Hyuck Lee , Nick Cercone Toward better scoring metrics for pseudo-independent models. [Citation Graph (0, 0)][DBLP ] Int. J. Intell. Syst., 2004, v:19, n:8, pp:749-768 [Journal ] S. K. Michael Wong , Cory J. Butz , Yang Xiang Automated Database Schema Design Using Mined Data Dependencies. [Citation Graph (0, 0)][DBLP ] JASIS, 1998, v:49, n:5, pp:455-470 [Journal ] Yang Xiang , S. K. Michael Wong , Nick Cercone A ``Microscopic'' Study of Minimum Entropy Search in Learning Decomposable Markov Networks. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1997, v:26, n:1, pp:65-92 [Journal ] Yang Xiang Cooperative triangulation in MSBNs without revealing subnet structures. [Citation Graph (0, 0)][DBLP ] Networks, 2001, v:37, n:1, pp:53-65 [Journal ] Yang Xiang Verification of DAG structures in cooperative belief network-based multiagent systems. [Citation Graph (0, 0)][DBLP ] Networks, 1998, v:31, n:3, pp:183-191 [Journal ] E. Santos , Yang Xiang Editorial advances on uncertain reasoning in intelligent systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2002, v:32, n:1, pp:2-3 [Journal ] Yang Xiang , Victor R. Lesser On the role of multiply sectioned Bayesian networks to cooperative multiagent systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:4, pp:489-501 [Journal ] A. B. M. Shawkat Ali , Yang Xiang Spam Classification Using Adaptive Boosting Algorithm. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:972-976 [Conf ] Yang Xiang , Wanling Zhang Multiagent Constraint Satisfaction with Multiply Sectioned Constraint Networks. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2007, pp:228-240 [Conf ] Yang Xiang , Franklin Hanshar Planning in Multiagent Expedition with Collaborative Design Networks. [Citation Graph (0, 0)][DBLP ] Canadian Conference on AI, 2007, pp:526-538 [Conf ] Zhongwen Li , Yang Xiang , Dongsheng He Simulation and Analysis of DDoS in Active Defense Environment. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:878-886 [Conf ] Yang Xiang A Decision Theoretic View on Choosing Heuristics for Discovery of Graphical Models. [Citation Graph (0, 0)][DBLP ] FLAIRS Conference, 2007, pp:170-0 [Conf ] Yang Xiang , Wanlei Zhou , Jinjun Chen Managing Email Overload with an Automatic Nonparametric Clustering Approach. [Citation Graph (0, 0)][DBLP ] NPC, 2007, pp:81-90 [Conf ] Yang Xiang , Ning Jia Modeling Causal Reinforcement and Undermining for Efficient CPT Elicitation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:12, pp:1708-1718 [Journal ] Enumerating Unlabeled and Root Labeled Trees for Causal Model Acquisition. [Citation Graph (, )][DBLP ] SIP Robustness Testing Based on TTCN-3. [Citation Graph (, )][DBLP ] Automatic Application Signature Construction from Unknown Traffic. [Citation Graph (, )][DBLP ] Propagation Modeling of Peer-to-Peer Worms. [Citation Graph (, )][DBLP ] A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. [Citation Graph (, )][DBLP ] Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks. [Citation Graph (, )][DBLP ] Data Mining Approach for Ship Virtual Assembly Based on Rough Set Theory. [Citation Graph (, )][DBLP ] Online Tracing Scanning Worm with Sliding Window. [Citation Graph (, )][DBLP ] Defending against the Propagation of Active Worms. [Citation Graph (, )][DBLP ] Distributed University Timetabling with Multiply Sectioned Constraint Networks. [Citation Graph (, )][DBLP ] Multiagent Bayesian Forecasting of Time Series with Graphical Models. [Citation Graph (, )][DBLP ] Generalized Non-impeding Noisy-AND Trees. [Citation Graph (, )][DBLP ] An Efficient Web Service Annotation Method Utilizing Concept Mapping and Interface Expansion. [Citation Graph (, )][DBLP ] A Lightweight Intrusion Alert Fusion System. [Citation Graph (, )][DBLP ] Tractable Optimal Multiagent Collaborative Design. [Citation Graph (, )][DBLP ] Using Multi-core to Support Security-Related Applications. [Citation Graph (, )][DBLP ] Overlapping Matrix Pattern Visualization: A Hypergraph Approach. [Citation Graph (, )][DBLP ] Research on Fuzzy Control Methods for Suspension Density and Liquid Levels in Dense-Medium Separation. [Citation Graph (, )][DBLP ] Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Effective and efficient itemset pattern summarization: regression-based approaches. [Citation Graph (, )][DBLP ] Succinct summarization of transactional databases: an overlapped hyperrectangle scheme. [Citation Graph (, )][DBLP ] Cartesian contour: a concise representation for a collection of frequent sets. [Citation Graph (, )][DBLP ] Collective Additive Tree Spanners of Homogeneously Orderable Graphs. [Citation Graph (, )][DBLP ] How to Use Spanning Trees to Navigate in Graphs. [Citation Graph (, )][DBLP ] Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation. [Citation Graph (, )][DBLP ] Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. [Citation Graph (, )][DBLP ] Online Accumulation: Reconstruction of Worm Propagation Path. [Citation Graph (, )][DBLP ] A Multi-core Supported Intrusion Detection System. [Citation Graph (, )][DBLP ] Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. [Citation Graph (, )][DBLP ] Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. [Citation Graph (, )][DBLP ] Defending Grid Web Services from XDoS Attacks by SOTA. [Citation Graph (, )][DBLP ] Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP ] TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks. [Citation Graph (, )][DBLP ] Efficiently answering reachability queries on very large directed graphs. [Citation Graph (, )][DBLP ] 3-HOP: a high-compression indexing scheme for reachability query. [Citation Graph (, )][DBLP ] Computing label-constraint reachability in graph databases. [Citation Graph (, )][DBLP ] Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs. [Citation Graph (, )][DBLP ] Additive Spanners for Circle Graphs and Polygonal Graphs. [Citation Graph (, )][DBLP ] Towards Effective Elicitation of NIN-AND Tree Causal Models. [Citation Graph (, )][DBLP ] Modeling the propagation of Peer-to-Peer worms under quarantine. [Citation Graph (, )][DBLP ] Improve the Usefulness of Skyline Analysis in Cloud Computing Environments. [Citation Graph (, )][DBLP ] A. Darwiche, Modeling and Reasoning with Bayesian Networks , Cambridge (2009). [Citation Graph (, )][DBLP ] A Constructive Graphical Model Approach for Knowledge-Based Systems: A Vehicle Monitoring Case Study. [Citation Graph (, )][DBLP ] Checkpointing schemes for Grid workflow systems. [Citation Graph (, )][DBLP ] Spam filtering for network traffic security on a multi-core environment. [Citation Graph (, )][DBLP ] Special Issue: Multi-core Supported Network and System Security. [Citation Graph (, )][DBLP ] A microscopic competition model and its dynamics analysis on network attacks. [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.018secs