The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhen Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yueping Jin, Zhaohui Wu, ShuiGuang Deng, Zhen Yu
    Service-Oriented Workflow Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:484-488 [Conf]
  2. Yawen Wei, Zhen Yu, Yong Guan
    COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2006, pp:338-355 [Conf]
  3. ShuiGuang Deng, Zhaohui Wu, Qi Gao, Zhen Yu
    Virtual Workflow Management System in Grid Environment. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:978-985 [Conf]
  4. Zhen Yu, Zhaohui Wu, ShuiGuang Deng, Qi Gao
    Temporal Problems in Service-Based Workflows. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:954-961 [Conf]
  5. ShuiGuang Deng, Zhaohui Wu, Zhen Yu, Huang Lican
    A Secure Process-Service Model. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:627-630 [Conf]
  6. Zhen Yu, Yong Guan
    A key pre-distribution scheme using deployment knowledge for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:261-268 [Conf]
  7. William Sears, Zhen Yu, Yong Guan
    An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:13-20 [Conf]
  8. ShuiGuang Deng, Zhen Yu, Zhaohui Wu, Huang Lican
    Enhancement of workflow flexibility by composing activities at run-time. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:667-673 [Conf]
  9. Zhen Yu, Yong Guan
    A dynamic en-route scheme for filtering false data injection in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2005, pp:294-295 [Conf]
  10. Yawen Wei, Zhen Yu, Yong Guan
    Location Verification Algorithms forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:70- [Conf]
  11. Zhen Yu, Yong Guan
    A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  12. Some Classes of 3-Gamma c-Critical Graph. [Citation Graph (, )][DBLP]


  13. Lightweight Secure Search Protocols for Low-cost RFID Systems. [Citation Graph (, )][DBLP]


  14. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. [Citation Graph (, )][DBLP]


  15. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. [Citation Graph (, )][DBLP]


  16. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. [Citation Graph (, )][DBLP]


  17. A Robust Motion Detection Algorithm for Complex Background Using Statistical Models. [Citation Graph (, )][DBLP]


  18. A Mechanism for P2P Traffic Control. [Citation Graph (, )][DBLP]


  19. Analysis on thermal balance and design principles of catalytic combustion gas sensor. [Citation Graph (, )][DBLP]


Search in 0.073secs, Finished in 0.074secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002