The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fang-Yie Leu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih
    Integrating Grid with Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:304-309 [Conf]
  2. Fang-Yie Leu, Yao-Chung Fan
    Compressing an Inverted File with LCS. [Citation Graph (0, 0)][DBLP]
    COMPSAC Workshops, 2004, pp:60-61 [Conf]
  3. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang
    A Performance-Based Grid Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:525-530 [Conf]
  4. Fang-Yie Leu, Yao-Chung Fan
    Compressing a Directed Massive Graph using Small World Model. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2004, pp:550- [Conf]
  5. Fang-Yie Leu, Wei-Jie Yang
    Intrusion Detection with CUSUM for TCP-Based DDoS. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1255-1264 [Conf]
  6. Fang-Yie Leu, Shi-Jie Yan, Wen-Kui Chang
    Fuzzy-Based Dynamic Bandwidth Allocation System. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:911-920 [Conf]
  7. Fang-Yie Leu, Hsiao-Hong Tsai, Wen-Kui Chang
    Distributed Sendbox Scheme for Mobile Agent Communication. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:545-550 [Conf]
  8. Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang
    IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:716-722 [Conf]
  9. Hsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang
    Mobile Agent Communication Using SIP. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:274-279 [Conf]
  10. Fang-Yie Leu, Chien-Chiao Yang
    Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems. [Citation Graph (0, 0)][DBLP]
    SEKE, 1990, pp:116-121 [Conf]
  11. Fang-Yie Leu, Ching-Chien Kuan, Der-Jiunn Deng, Yu-Hsin Chen
    Garanteed non dropping mechanism deploying IEEE802.11e standard. [Citation Graph (0, 0)][DBLP]
    SITIS, 2005, pp:170-175 [Conf]
  12. Fang-Yie Leu, Neng-Wen Lo, Lun-Ni Yang
    Predicting vertebrate promoters with heterogeneous cluster computing. [Citation Graph (0, 0)][DBLP]
    SITIS, 2005, pp:143-148 [Conf]
  13. Fang-Yie Leu, Tai-Shiang Wang
    A Wireless Grid Service Platform Using SIP and Agents. [Citation Graph (0, 0)][DBLP]
    SNPD, 2006, pp:139-144 [Conf]
  14. Fang-Yie Leu, Shi-Kuo Chang, Chien-Chiao Yang
    A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:2, pp:183-206 [Journal]
  15. Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin
    An Enhanced DGIDE Platform for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:559-568 [Conf]
  16. Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang
    Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:137-152 [Conf]
  17. Fang-Yie Leu, Yu-Hsin Chen, Ching-Chien Kuan
    An Improved Bandwidth-Use Method on IEEE 802.11e Standard over Wireless LAN. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:183-192 [Conf]
  18. Fang-Yie Leu, Guo-Cai Li
    A scalable sensor network using a polar coordinate system. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2007, v:87, n:12, pp:2978-2990 [Journal]

  19. A Routing Scheme with Localized Movement in Event-Driven Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications. [Citation Graph (, )][DBLP]


  21. Detecting DoS and DDoS Attacks Using Chi-Square. [Citation Graph (, )][DBLP]


  22. Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System. [Citation Graph (, )][DBLP]


  23. A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. [Citation Graph (, )][DBLP]


  24. Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering. [Citation Graph (, )][DBLP]


  25. Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. [Citation Graph (, )][DBLP]


  26. A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.154secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002