The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei Ren: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei Ren, Hai Jin
    Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:177-182 [Conf]
  2. Wei Ren, Dan Liu
    Fractal Curve Interpolation Algorithm in the Scene of Navigation Simulator. [Citation Graph (0, 0)][DBLP]
    CISST, 2004, pp:39-42 [Conf]
  3. Wei Ren, Hai Jin
    A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2006, pp:805-809 [Conf]
  4. Xingwei Wang, Jinghong Liu, Wei Ren, Min Huang, Nan Gao
    A Job Assignment Method Based on Auction Model and Genetic Algorithm for Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:44-48 [Conf]
  5. Wei Ren, Sameer Singh
    An Automated Video Annotation System. [Citation Graph (0, 0)][DBLP]
    ICAPR (2), 2005, pp:693-700 [Conf]
  6. Wei Ren
    On the Novel Network Forensics Perspective of Enhanced E-Business Security. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1355-1360 [Conf]
  7. Wei Ren, Sameer Singh
    Video Sequence Matching with Spatio-Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2004, pp:834-837 [Conf]
  8. Wei Ren, Sameer Singh
    Automatic Video Shot Boundary Detection Using Machine Learning.. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2004, pp:285-292 [Conf]
  9. Wei Ren
    On A Reference Model of Distributed Cooperative Network, Forensics System. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  10. Wei Ren, Hai Jin, Tenghong Liu
    Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISM, 2005, pp:707-712 [Conf]
  11. Wei Ren
    On a Network Forensics Model For Information Security. [Citation Graph (0, 0)][DBLP]
    ISTA, 2004, pp:229-234 [Conf]
  12. Wei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang
    IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:102-110 [Conf]
  13. Wei Ren, Hai Jin
    A Recursion Nearness Based Method for Characterizing IP Address. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:665-669 [Conf]
  14. Wei Ren, Hai Jin
    Honeynet based distributed adaptive network forensics and active real time investigation. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:302-303 [Conf]
  15. Wei Ren, Paul Weal, Maneesha Singh, Sameer Singh
    Visual Information Retrieval: Minerva Video Benchmark. [Citation Graph (0, 0)][DBLP]
    SPPRA, 2006, pp:256-261 [Conf]
  16. Sunan Huang, Wei Ren
    Vehicle longitudinal control using throttles and brakes. [Citation Graph (0, 0)][DBLP]
    Robotics and Autonomous Systems, 1999, v:26, n:4, pp:241-253 [Journal]
  17. Sunan Huang, Wei Ren, Steven C. Chan
    Design and performance evaluation of mixed manual and automated control traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2000, v:30, n:6, pp:661-673 [Journal]
  18. Wei Ren
    On Constrained Nonlinear Tracking Control of a Small Fixed-wing UAV. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Robotic Systems, 2007, v:48, n:4, pp:525-537 [Journal]
  19. Wei Ren, Tenghong Liu, Hai Jin
    Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1927-1932 [Journal]

  20. A Model-Free Greedy Gene Selection for Microarray Sample Class Prediction. [Citation Graph (, )][DBLP]


  21. Detecting Community Structure by Network Vectorization. [Citation Graph (, )][DBLP]


  22. A semantic Web based model for product cooperative design. [Citation Graph (, )][DBLP]


  23. HybridS: A Scheme for Secure Distributed Data Storage in WSNs. [Citation Graph (, )][DBLP]


  24. SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography. [Citation Graph (, )][DBLP]


  25. Optimized User Revocation for Group Signature Based Privacy-Aware PKI. [Citation Graph (, )][DBLP]


  26. Connectivity of cognitive radio networks: proximity vs. opportunity. [Citation Graph (, )][DBLP]


  27. Influence of Social Networks on Recovering Large Scale Distributed Systems. [Citation Graph (, )][DBLP]


  28. Experimental implementation and validation of consensus algorithms on a mobile actuator and sensor network platform. [Citation Graph (, )][DBLP]


  29. Dynamic Self-Healing for Service Flows with Semantic Web Services. [Citation Graph (, )][DBLP]


  30. A Novel Approach to Spatio-Temporal Video Analysis and Retrieval. [Citation Graph (, )][DBLP]


  31. H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  32. Light Space Cascaded Shadow Maps for Large Scale Dynamic Environments. [Citation Graph (, )][DBLP]


  33. Semantic enhanced rule driven workflow execution in Collaborative Virtual Enterprise. [Citation Graph (, )][DBLP]


  34. An Improved Cloud Rendering Method. [Citation Graph (, )][DBLP]


  35. Collective motion from consensus with Cartesian coordinate coupling - Part II: Double-integrator dynamics. [Citation Graph (, )][DBLP]


  36. Collective motion from consensus with Cartesian coordinate coupling - Part I: Single-integrator kinematics. [Citation Graph (, )][DBLP]


  37. Distributed coordination algorithms for multiple fractional-order systems. [Citation Graph (, )][DBLP]


  38. Convergence of sampled-data consensus algorithms for double-integrator dynamics. [Citation Graph (, )][DBLP]


  39. Decentralized cooperative attitude tracking using Modified Rodriguez Parameters. [Citation Graph (, )][DBLP]


  40. Containment control with multiple stationary or dynamic leaders under a directed interaction graph. [Citation Graph (, )][DBLP]


  41. Distributed coordination of fractional-order systems with extensions to directed dynamic networks and absolute/relative damping. [Citation Graph (, )][DBLP]


  42. Power control in spectrum overlay networks: How to cross a multi-lane highway. [Citation Graph (, )][DBLP]


  43. Determining the degree of chaos from analysis of ISI time series in the nervous system: a comparison between correlation dimension and nonlinear forecasting methods. [Citation Graph (, )][DBLP]


  44. Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway [Citation Graph (, )][DBLP]


  45. Connectivity of Cognitive Radio Networks: Proximity vs. Opportunity [Citation Graph (, )][DBLP]


  46. On the Connectivity and Multihop Delay of Ad Hoc Cognitive Radio Networks [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.282secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002