The SCEAS System
Navigation Menu

Search the dblp DataBase


Xin Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Voß, Xin Zhao
    Some Steps Towards a Scientometric Analysis of Publications in Machine Translation. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Applications, 2005, pp:651-655 [Conf]
  2. Xin Zhao, Fuji Ren, Stefan Voß
    A Super-Function Based Japanese-Chinese Machine Translation System for Business Users. [Citation Graph (0, 0)][DBLP]
    AMTA, 2004, pp:272-281 [Conf]
  3. Kevin Borders, Xin Zhao, Atul Prakash
    CPOL: high-performance policy evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:147-157 [Conf]
  4. Xin Zhao, Atul Prakash
    Source Authentication in Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:455-459 [Conf]
  5. Wei Xie, Huaiyu Wu, Xin Zhao
    Relaxed LMIs Observer-Based Controller Design via Improved T-S Fuzzy Model Structure. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:930-941 [Conf]
  6. Ian T. Foster, Jerry Gieraltowski, Scott Gose, Natalia Maltsev, Edward N. May, Alex Rodriguez, Dinanath Sulakhe, A. Vaniachine, Jim Shank, Saul Youssef, David Adams, Richard Baker, Wensheng Deng, Jason Smith, Dantong Yu, Iosif Legrand, Suresh Singh, Conrad Steenberg, Yang Xia, M. Anzar Afaq, Eileen Berman, James Annis, L. A. T. Bauerdick, Michael Ernst, Ian Fisk, Lisa Giacchetti, Gregory E. Graham, Anne Heavey, Joseph Kaiser, Nickolai Kuropatkin, Ruth Pordes, Vijay Sekhri, John Weigand, Yujun Wu, Keith Baker, Lawrence Sorrillo, John Huth, Matthew Allen, Leigh Grundhoefer, John Hicks, Fred Luehring, Steve Peck, Rob Quick, Stephen Simms, George Fekete, Jan vandenBerg, Kihyeon Cho, Kihwan Kwon, Dongchul Son, Hyoungwoo Park, Shane Canon, Keith R. Jackson, David E. Konerding, Jason Lee, Doug Olson, Iowa Sakrejda, Brian Tierney, Mark Green, Russ Miller, James Letts, Terrence Martin, David Bury, Catalin Dumitrescu, Daniel Engh, Robert Gardner, Marco Mambelli, Yuri Smirnov, Jens-S. Vöckler, Michael Wilde, Yong Zhao, Xin Zhao, Paul Avery, Richard Cavanaugh, Bockjoo Kim, Craig Prescott, Jorge Luis Rodriguez, Andrew Zahn, Shawn McKee, Christopher T. Jordan, James E. Prewett, Timothy L. Thomas, Horst Severini, Ben Clifford, Ewa Deelman, Larry Flon, Carl Kesselman, Gaurang Mehta, Nosa Olomu, Karan Vahi, Kaushik De, Patrick McGuigan, Mark Sosebee, Dan Bradley, Peter Couvares, Alan DeSmet, Carey Kireyev, Erik Paulson, Alain Roy, Scott Koranda, Brian Moe, Bobby Brown, Paul Sheldon
    The Grid2003 Production Grid: Principles and Practice. [Citation Graph (0, 0)][DBLP]
    HPDC, 2004, pp:236-245 [Conf]
  7. Jon B. Weissman, Xin Zhao
    Run-time Support for Scheduling Parallel Applications in Heterogeneous NOWs. [Citation Graph (0, 0)][DBLP]
    HPDC, 1997, pp:347-355 [Conf]
  8. Xin Zhao, Yansong Zhang, Guanlong Chen
    Model Optimization of Artificial Neural Networks for Performance Predicting in Spot Welding of the Body Galvanized DP Steel Sheets, . [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:602-605 [Conf]
  9. Xin Zhao, Yici Cai, Qiang Zhou, Xianlong Hong, Lei He, Jinjun Xiong
    Shielding area optimization under the solution of interconnect crosstalk. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:297-300 [Conf]
  10. Chunfeng Wang, Xin Zhao
    Business Failure Prediction Using Modified ants Algorithm. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:1127-1130 [Conf]
  11. Xin Zhao, Atul Prakash
    WSF: An HTTP-Level Firewall for Hardening Web Servers. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:248-253 [Conf]
  12. Kevin Borders, Xin Zhao, Atul Prakash
    Siren: Catching Evasive Malware (Short Paper). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:78-85 [Conf]
  13. Xin Zhao, Fengxia Li, Shouyi Zhan, Zhisheng Li
    Ocean Wave Simulation under Wind Change Effect. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:26-29 [Conf]
  14. Zhisheng Li, Junshan Li, Shuai Liu, Wei Yang, Xin Zhao
    Design and Implementation of Operational Effectiveness Evaluation Simulation System for ECM. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:95-98 [Conf]
  15. Xin Zhao, Daoxu Chen, Li Xie
    An Object-Oriented Developing Framework of Fault-Tolerance System. [Citation Graph (0, 0)][DBLP]
    TOOLS (31), 1999, pp:232-238 [Conf]
  16. Jon B. Weissman, Xin Zhao
    Scheduling parallel applications in distributed networks. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1998, v:1, n:1, pp:109-118 [Journal]
  17. Yici Cai, Xin Zhao, Qiang Zhou, Xianlong Hong
    Shielding Area Optimization Under the Solution of Interconnect Crosstalk. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:6, pp:901-906 [Journal]
  18. Liwu Li, Xin Zhao
    UML Specification and Relational Database. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2003, v:2, n:5, pp:87-100 [Journal]
  19. Xin Zhao, Yici Cai, Qiang Zhou, Xianlong Hong
    A novel low-power physical design methodology for MTCMOS. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  20. Ye Du, Yaoyun Shi, Xin Zhao
    Using Spam Farm to Boost PageRank. [Citation Graph (0, 0)][DBLP]
    AIRWeb, 2007, pp:- [Conf]
  21. Zhigang Liang, Kuncheng Li, Xiaolin Yang, Xiangying Du, Jiabin Liu, Xin Zhao, Xiangdong Qi
    ROC Analysis for Diagnostic Accuracy of Fracture by Using Different Monitors. [Citation Graph (0, 0)][DBLP]
    J. Digital Imaging, 2006, v:19, n:3, pp:276-278 [Journal]

  22. Segmentation of medical image based on mean shift and deterministic annealing EM algorithm. [Citation Graph (, )][DBLP]

  23. Improved image segmentation method based on optimized threshold using Genetic Algorithm. [Citation Graph (, )][DBLP]

  24. An Efficient Computation of Statistically Critical Sequential Paths Under Retiming. [Citation Graph (, )][DBLP]

  25. Buffered clock tree synthesis for 3D ICs under thermal variations. [Citation Graph (, )][DBLP]

  26. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  27. Applying a novel combined classifier for pornographic web filtering in a grid computing environment. [Citation Graph (, )][DBLP]

  28. An ILP formulation for task mapping and scheduling on multi-core architectures. [Citation Graph (, )][DBLP]

  29. Securing sensitive content in a view-only file system. [Citation Graph (, )][DBLP]

  30. An Improved Parallel Implementation of 3-D DRIE Simulation on Multi-core Processors. [Citation Graph (, )][DBLP]

  31. An Improved Parallel MEMS Processing-Level Simulation Implementation Using Graphic Processing Unit. [Citation Graph (, )][DBLP]

  32. Pre-bond testable low-power clock tree design for 3D stacked ICs. [Citation Graph (, )][DBLP]

  33. A new approach based on intuitionistic fuzzy set for selection of suppliers. [Citation Graph (, )][DBLP]

  34. On the Aggregatability of Router Forwarding Tables. [Citation Graph (, )][DBLP]

  35. Slew-aware clock tree design for reliable subthreshold circuits. [Citation Graph (, )][DBLP]

  36. A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  37. Protecting Multicast Sessions in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  38. Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. [Citation Graph (, )][DBLP]

  39. Low-Complexity and Sampling-Aided Multi-view Video Coding at Low Bitrate. [Citation Graph (, )][DBLP]

  40. Towards Protecting Sensitive Files in a Compromised System. [Citation Graph (, )][DBLP]

  41. An Automatic Layout Function in BPEL Visual Modeling Tool. [Citation Graph (, )][DBLP]

  42. Probabilistically reliable on-demand multicast in wireless mesh networks. [Citation Graph (, )][DBLP]

  43. Study of the Electromagnetic Field of Transcranial Magnetic Stimulation Based on the Real Head Model. [Citation Graph (, )][DBLP]

  44. Effect of Xiaoyaosan on Changes of Behavior in Chronic Immobilization Stress Rats. [Citation Graph (, )][DBLP]

  45. A Novel Micropayment Scheme with Complete Anonymity. [Citation Graph (, )][DBLP]

  46. Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  47. Voxel-Based Modeling and Rendering for Virtual MEMS Fabrication Process. [Citation Graph (, )][DBLP]

  48. OFDM symbol timing synchronization system on a Reconfigurable Instruction Cell Array. [Citation Graph (, )][DBLP]

  49. Heterogeneous multi-core architectures with dynamically reconfigurable processors for wireless communication. [Citation Graph (, )][DBLP]

  50. Improved Image Thresholding Using Ant Colony Optimization Algorithm. [Citation Graph (, )][DBLP]

  51. Distribution of Antioxidatases in Cell of Diatom Nitzschia Closterium and Response to Different Environmental Silicon Concentrations. [Citation Graph (, )][DBLP]

  52. COLBERT: A Scoring Based Graphical Model for Expert Identification. [Citation Graph (, )][DBLP]

  53. A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  54. State engine based validation of MEMS process sequences. [Citation Graph (, )][DBLP]

  55. Kernel-imbedded Gaussian processes for disease classification using microarray gene expression data. [Citation Graph (, )][DBLP]

  56. Longitudinal study of BGP monitor session failures. [Citation Graph (, )][DBLP]

  57. Using a virtual machine to protect sensitive Grid resources. [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.010secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002