|
Search the dblp DataBase
Zhen Yu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yueping Jin, Zhaohui Wu, ShuiGuang Deng, Zhen Yu
Service-Oriented Workflow Model. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:484-488 [Conf]
- Yawen Wei, Zhen Yu, Yong Guan
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] DCOSS, 2006, pp:338-355 [Conf]
- ShuiGuang Deng, Zhaohui Wu, Qi Gao, Zhen Yu
Virtual Workflow Management System in Grid Environment. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:978-985 [Conf]
- Zhen Yu, Zhaohui Wu, ShuiGuang Deng, Qi Gao
Temporal Problems in Service-Based Workflows. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:954-961 [Conf]
- ShuiGuang Deng, Zhaohui Wu, Zhen Yu, Huang Lican
A Secure Process-Service Model. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2004, pp:627-630 [Conf]
- Zhen Yu, Yong Guan
A key pre-distribution scheme using deployment knowledge for wireless sensor networks. [Citation Graph (0, 0)][DBLP] IPSN, 2005, pp:261-268 [Conf]
- William Sears, Zhen Yu, Yong Guan
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:13-20 [Conf]
- ShuiGuang Deng, Zhen Yu, Zhaohui Wu, Huang Lican
Enhancement of workflow flexibility by composing activities at run-time. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:667-673 [Conf]
- Zhen Yu, Yong Guan
A dynamic en-route scheme for filtering false data injection in wireless sensor networks. [Citation Graph (0, 0)][DBLP] SenSys, 2005, pp:294-295 [Conf]
- Yawen Wei, Zhen Yu, Yong Guan
Location Verification Algorithms forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:70- [Conf]
- Zhen Yu, Yong Guan
A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
Some Classes of 3-Gamma c-Critical Graph. [Citation Graph (, )][DBLP]
Lightweight Secure Search Protocols for Low-cost RFID Systems. [Citation Graph (, )][DBLP]
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. [Citation Graph (, )][DBLP]
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. [Citation Graph (, )][DBLP]
Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. [Citation Graph (, )][DBLP]
A Robust Motion Detection Algorithm for Complex Background Using Statistical Models. [Citation Graph (, )][DBLP]
A Mechanism for P2P Traffic Control. [Citation Graph (, )][DBLP]
Analysis on thermal balance and design principles of catalytic combustion gas sensor. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|