The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yang Xiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Janzen, Yang Xiang
    Probabilistic Reasoning for Meal Planning in Intelligent Fridges. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2003, pp:575-582 [Conf]
  2. Yang Xiang
    Semantics of Multiply Selectioned Bayesian Networks for Cooperative Multi-agent Distributed Interpretation. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 1996, pp:213-226 [Conf]
  3. Yang Xiang
    Temporally Invariant Junction Tree for Inference in Dynamic Bayesian Network. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 1998, pp:363-377 [Conf]
  4. Yang Xiang, Junjiang Chen, Abhi Deshmukht
    A Decision-Theoretic Graphical Model for Collaborative Design on Supply Chains. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2004, pp:355-369 [Conf]
  5. Yang Xiang, Xiaohua Hu, Nick Cercone, Howard J. Hamilton
    Learning Pseudo-independent Models: Analytical and Experimental Results. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2000, pp:227-239 [Conf]
  6. Yang Xiang, J. Lee
    Local Score Computation in Learning Belief Networks. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2001, pp:152-161 [Conf]
  7. Yang Xiang, Chenwen Ye
    Deborah Ann Stacey, Application of Bayesian Networks to Shopping Assistance. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2002, pp:344-348 [Conf]
  8. Yongzhong Tu, Wei-Tek Tsai, Yang Xiang
    Specifying Constraints with Message Sequence Specifications. [Citation Graph (0, 0)][DBLP]
    APSEC, 1999, pp:368-375 [Conf]
  9. Yang Xiang, Kun Zhang
    Agent interface enhancement: making multiagent graphical models accessible. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:19-26 [Conf]
  10. Yang Xiang, Wanlei Zhou
    Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:320-333 [Conf]
  11. Yang Xiang, Qiwei Gu, Zhengxiang Li
    A Distributed Framework of Web-Based Telemedicine System. [Citation Graph (0, 0)][DBLP]
    CBMS, 2003, pp:108-0 [Conf]
  12. Albert C. S. Chung, Yang Xiang, Jian Ye, W. K. Law
    Elastic Interaction Models for Active Contours and Surfaces. [Citation Graph (0, 0)][DBLP]
    CVBIA, 2005, pp:314-323 [Conf]
  13. Yang Xiang, Albert C. S. Chung, Jian Ye
    A New Active Contour Method Based on Elastic Interaction. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2005, pp:452-457 [Conf]
  14. Hsinchun Chen, Homa Atabakhsh, Daniel Dajun Zeng, Jennifer Schroeder, Tim Petersen, Dan Casey, M. Chen, Yang Xiang, Damien Daspit, Suresh Nandiraju
    COPLINK: Visualization and Collaboration for Law Enforcement. [Citation Graph (0, 0)][DBLP]
    DG.O, 2002, pp:- [Conf]
  15. Hongyu Geng, Yang Xiang
    Distributed Multi-Agent MSBN: Implementing Verification. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2000, pp:293-297 [Conf]
  16. Jae-Hyuck Lee, Yang Xiang
    Model Complexity of Pseudo-independent Models. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2005, pp:766-771 [Conf]
  17. Yang Xiang, Michael Janzen
    Package Planning with Graphical Models. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2004, pp:- [Conf]
  18. Gulisong Nasierding, Yang Xiang, Honghua Dai
    Towards Extended Machine Translation Model for Next Generation World Wide Web. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:1017-1020 [Conf]
  19. Yang Xiang, Wanlei Zhou
    Protect Grids from DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:309-316 [Conf]
  20. Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
    GHIRS: Integration of Hotel Management Systems by Web Services. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:1002-1009 [Conf]
  21. Yang Xiang, Zhongwen Li, Hong Chen
    Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:181-188 [Conf]
  22. Baolin Sun, Layuan Li, Qiu Yang, Yang Xiang
    An Entropy-Based Stability QoS Multicast Routing Protocol in Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:217-226 [Conf]
  23. Xiangdong An, Yang Xiang, Nick Cercone
    Revising Markov Boundary for Multiagent Probabilistic Inference. [Citation Graph (0, 0)][DBLP]
    IAT, 2004, pp:113-119 [Conf]
  24. Wei Shi, Yang Xiang, Wanlei Zhou
    Distributed Defense Against Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:357-362 [Conf]
  25. Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
    Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:312-0 [Conf]
  26. Yang Xiang, Victor R. Lesser
    Justifying Multiply Sectioned Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ICMAS, 2000, pp:349-358 [Conf]
  27. Yang Xiang, Wanlei Zhou
    An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  28. Wanlei Zhou, Yang Xiang
    Combating DDoS Attacks in Web-based Services. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  29. Zhongwen Li, Yang Xiang, Hong Chen
    Performance Optimization of Checkpointing Schemes with Task Duplication. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:671-677 [Conf]
  30. S. K. Michael Wong, Yang Xiang, Xiaopin Nie
    Representation of Bayesian Networks as Relational Databases. [Citation Graph (0, 0)][DBLP]
    IPMU, 1994, pp:117-130 [Conf]
  31. Yang Xiang
    Distributed Multi-Agent Probabilistic Reasoning With Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1994, pp:285-294 [Conf]
  32. Yang Xiang, Wanlei Zhou
    Intelligent DDoS Packet Filtering in High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:395-406 [Conf]
  33. Xiangdong An, Yang Xiang, Nick Cercone
    Probabilistic reasoning in dynamic multiagent systems. [Citation Graph (0, 0)][DBLP]
    NMR, 2004, pp:16-24 [Conf]
  34. Yang Xiang, S. K. Michael Wong, Nick Cercone
    Quantifying Uncertainty of Knowledge Discovered From Databases. [Citation Graph (0, 0)][DBLP]
    RSKD, 1993, pp:63-73 [Conf]
  35. Andreas Brandstädt, Feodor F. Dragan, Yang Xiang, Chenyu Yan
    Generalized Powers of Graphs and Their Algorithmic Use. [Citation Graph (0, 0)][DBLP]
    SWAT, 2006, pp:423-434 [Conf]
  36. Tongsheng Chu, Yang Xiang
    Exploring Parallelism in Learning Belief Networks. [Citation Graph (0, 0)][DBLP]
    UAI, 1997, pp:90-98 [Conf]
  37. Jun Hu, Yang Xiang
    Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels. [Citation Graph (0, 0)][DBLP]
    UAI, 1997, pp:258-265 [Conf]
  38. S. K. Michael Wong, Cory J. Butz, Yang Xiang
    A Method for Implementing a Probabilistic Model as a Relational Database. [Citation Graph (0, 0)][DBLP]
    UAI, 1995, pp:556-564 [Conf]
  39. Yang Xiang
    Optimization of Inter-Subnet Belief Updating in Multiply Sectioned Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    UAI, 1995, pp:565-573 [Conf]
  40. Yang Xiang, Michael P. Beddoes, David Poole
    Can Uncertainty Management be Realized in a Finite Totally Ordered Probability Algebra? [Citation Graph (0, 0)][DBLP]
    UAI, 1989, pp:41-60 [Conf]
  41. Yang Xiang, David Poole, Michael P. Beddoes
    Exploring Localization in Bayesian Networks for Large Expert Systems. [Citation Graph (0, 0)][DBLP]
    UAI, 1992, pp:344-351 [Conf]
  42. Yang Xiang, S. K. Michael Wong, Nick Cercone
    Critical Remarks on Single Link Search in Learning Belief Networks. [Citation Graph (0, 0)][DBLP]
    UAI, 1996, pp:564-571 [Conf]
  43. Yang Xiang, Wanlei Zhou
    A Defense System against DDoS Attacks by Large-Scale IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:431-436 [Conf]
  44. Yang Xiang
    A Probabilistic Framework for Cooperative Multi-Agent Distributed Interpretation and Optimization of Communication. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1996, v:87, n:1-2, pp:295-342 [Journal]
  45. Yang Xiang, B. Pant, A. Eisen, Michael P. Beddoes, David Poole
    Multiply sectioned Bayesian networks for neuromuscular diagnosis. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence in Medicine, 1993, v:5, n:4, pp:293-314 [Journal]
  46. Yang Xiang, David Poole, Michael P. Beddoes
    Multiply Sectioned Bayesian Networks and Junction Forests for Large Knowledge-Based Systems. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 1993, v:9, n:, pp:171-220 [Journal]
  47. Yang Xiang, S. K. Michael Wong, Nick Cercone
    Quantification of Unvertainty in Classification Rules Discovered from Databases. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 1995, v:11, n:, pp:427-441 [Journal]
  48. Yang Xiang, Tongsheng Chu
    Parallel Learning of Belief Networks in Large and Difficult Domains. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 1999, v:3, n:3, pp:315-339 [Journal]
  49. Yang Xiang, Michael Chau, Homa Atabakhsh, Hsinchun Chen
    Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2005, v:41, n:1, pp:69-83 [Journal]
  50. Yang Xiang
    Belief updating in multiply sectioned Bayesian networks without repeated local propagations. [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 2000, v:23, n:1, pp:1-21 [Journal]
  51. Yang Xiang
    Comparison of multiagent inference methods in multiply sectioned Bayesian networks. [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 2003, v:33, n:3, pp:235-254 [Journal]
  52. Yang Xiang, Jae-Hyuck Lee, Nick Cercone
    Toward better scoring metrics for pseudo-independent models. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2004, v:19, n:8, pp:749-768 [Journal]
  53. S. K. Michael Wong, Cory J. Butz, Yang Xiang
    Automated Database Schema Design Using Mined Data Dependencies. [Citation Graph (0, 0)][DBLP]
    JASIS, 1998, v:49, n:5, pp:455-470 [Journal]
  54. Yang Xiang, S. K. Michael Wong, Nick Cercone
    A ``Microscopic'' Study of Minimum Entropy Search in Learning Decomposable Markov Networks. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1997, v:26, n:1, pp:65-92 [Journal]
  55. Yang Xiang
    Cooperative triangulation in MSBNs without revealing subnet structures. [Citation Graph (0, 0)][DBLP]
    Networks, 2001, v:37, n:1, pp:53-65 [Journal]
  56. Yang Xiang
    Verification of DAG structures in cooperative belief network-based multiagent systems. [Citation Graph (0, 0)][DBLP]
    Networks, 1998, v:31, n:3, pp:183-191 [Journal]
  57. E. Santos, Yang Xiang
    Editorial advances on uncertain reasoning in intelligent systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2002, v:32, n:1, pp:2-3 [Journal]
  58. Yang Xiang, Victor R. Lesser
    On the role of multiply sectioned Bayesian networks to cooperative multiagent systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:4, pp:489-501 [Journal]
  59. A. B. M. Shawkat Ali, Yang Xiang
    Spam Classification Using Adaptive Boosting Algorithm. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:972-976 [Conf]
  60. Yang Xiang, Wanling Zhang
    Multiagent Constraint Satisfaction with Multiply Sectioned Constraint Networks. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2007, pp:228-240 [Conf]
  61. Yang Xiang, Franklin Hanshar
    Planning in Multiagent Expedition with Collaborative Design Networks. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 2007, pp:526-538 [Conf]
  62. Zhongwen Li, Yang Xiang, Dongsheng He
    Simulation and Analysis of DDoS in Active Defense Environment. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:878-886 [Conf]
  63. Yang Xiang
    A Decision Theoretic View on Choosing Heuristics for Discovery of Graphical Models. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2007, pp:170-0 [Conf]
  64. Yang Xiang, Wanlei Zhou, Jinjun Chen
    Managing Email Overload with an Automatic Nonparametric Clustering Approach. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:81-90 [Conf]
  65. Yang Xiang, Ning Jia
    Modeling Causal Reinforcement and Undermining for Efficient CPT Elicitation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2007, v:19, n:12, pp:1708-1718 [Journal]

  66. Enumerating Unlabeled and Root Labeled Trees for Causal Model Acquisition. [Citation Graph (, )][DBLP]


  67. SIP Robustness Testing Based on TTCN-3. [Citation Graph (, )][DBLP]


  68. Automatic Application Signature Construction from Unknown Traffic. [Citation Graph (, )][DBLP]


  69. Propagation Modeling of Peer-to-Peer Worms. [Citation Graph (, )][DBLP]


  70. A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. [Citation Graph (, )][DBLP]


  71. Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks. [Citation Graph (, )][DBLP]


  72. Data Mining Approach for Ship Virtual Assembly Based on Rough Set Theory. [Citation Graph (, )][DBLP]


  73. Online Tracing Scanning Worm with Sliding Window. [Citation Graph (, )][DBLP]


  74. Defending against the Propagation of Active Worms. [Citation Graph (, )][DBLP]


  75. Distributed University Timetabling with Multiply Sectioned Constraint Networks. [Citation Graph (, )][DBLP]


  76. Multiagent Bayesian Forecasting of Time Series with Graphical Models. [Citation Graph (, )][DBLP]


  77. Generalized Non-impeding Noisy-AND Trees. [Citation Graph (, )][DBLP]


  78. An Efficient Web Service Annotation Method Utilizing Concept Mapping and Interface Expansion. [Citation Graph (, )][DBLP]


  79. A Lightweight Intrusion Alert Fusion System. [Citation Graph (, )][DBLP]


  80. Tractable Optimal Multiagent Collaborative Design. [Citation Graph (, )][DBLP]


  81. Using Multi-core to Support Security-Related Applications. [Citation Graph (, )][DBLP]


  82. Overlapping Matrix Pattern Visualization: A Hypergraph Approach. [Citation Graph (, )][DBLP]


  83. Research on Fuzzy Control Methods for Suspension Density and Liquid Levels in Dense-Medium Separation. [Citation Graph (, )][DBLP]


  84. Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  85. Effective and efficient itemset pattern summarization: regression-based approaches. [Citation Graph (, )][DBLP]


  86. Succinct summarization of transactional databases: an overlapped hyperrectangle scheme. [Citation Graph (, )][DBLP]


  87. Cartesian contour: a concise representation for a collection of frequent sets. [Citation Graph (, )][DBLP]


  88. Collective Additive Tree Spanners of Homogeneously Orderable Graphs. [Citation Graph (, )][DBLP]


  89. How to Use Spanning Trees to Navigate in Graphs. [Citation Graph (, )][DBLP]


  90. Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation. [Citation Graph (, )][DBLP]


  91. Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. [Citation Graph (, )][DBLP]


  92. Online Accumulation: Reconstruction of Worm Propagation Path. [Citation Graph (, )][DBLP]


  93. A Multi-core Supported Intrusion Detection System. [Citation Graph (, )][DBLP]


  94. Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. [Citation Graph (, )][DBLP]


  95. Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. [Citation Graph (, )][DBLP]


  96. Defending Grid Web Services from XDoS Attacks by SOTA. [Citation Graph (, )][DBLP]


  97. Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. [Citation Graph (, )][DBLP]


  98. TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks. [Citation Graph (, )][DBLP]


  99. Efficiently answering reachability queries on very large directed graphs. [Citation Graph (, )][DBLP]


  100. 3-HOP: a high-compression indexing scheme for reachability query. [Citation Graph (, )][DBLP]


  101. Computing label-constraint reachability in graph databases. [Citation Graph (, )][DBLP]


  102. Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs. [Citation Graph (, )][DBLP]


  103. Additive Spanners for Circle Graphs and Polygonal Graphs. [Citation Graph (, )][DBLP]


  104. Towards Effective Elicitation of NIN-AND Tree Causal Models. [Citation Graph (, )][DBLP]


  105. Modeling the propagation of Peer-to-Peer worms under quarantine. [Citation Graph (, )][DBLP]


  106. Improve the Usefulness of Skyline Analysis in Cloud Computing Environments. [Citation Graph (, )][DBLP]


  107. A. Darwiche, Modeling and Reasoning with Bayesian Networks , Cambridge (2009). [Citation Graph (, )][DBLP]


  108. A Constructive Graphical Model Approach for Knowledge-Based Systems: A Vehicle Monitoring Case Study. [Citation Graph (, )][DBLP]


  109. Checkpointing schemes for Grid workflow systems. [Citation Graph (, )][DBLP]


  110. Spam filtering for network traffic security on a multi-core environment. [Citation Graph (, )][DBLP]


  111. Special Issue: Multi-core Supported Network and System Security. [Citation Graph (, )][DBLP]


  112. A microscopic competition model and its dynamics analysis on network attacks. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002