The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Huaimin Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi
    Trust Management with Safe Privilege Propagation. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:174-183 [Conf]
  2. Yufeng Wang, Huaimin Wang, Yan Jia, Bixin Liu
    Closed Queueing Network Model for Multi-tier Data Stream Processing Center. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:899-904 [Conf]
  3. Haiyuan Xu, Quanyuan Wu, Huaimin Wang, Guogui Yang, Yan Jia
    KF-Diff+: Highly Efficient Change Detection Algorithm for XML Documents. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2002, pp:1273-1286 [Conf]
  4. Yufeng Wang, Huaimin Wang, Yan Jia, Dian-xi Shi, Bixin Liu
    A SLA-Based Resource Donation Mechanism for Service Hosting Utility Center. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:719-724 [Conf]
  5. Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang
    AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:343-350 [Conf]
  6. Junsheng Chang, Huaimin Wang, Yin Gang
    A Dynamic Trust Metric for P2P Systems. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:117-120 [Conf]
  7. Lei Li, Huaimin Wang, Dian-xi Shi, Hui Liu
    An Efficient Optimistic Atomic Broadcast Algorithm. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:315-320 [Conf]
  8. Jianqiang Hu, Changguo Guo, Huaimin Wang, Peng Zou
    Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:509-518 [Conf]
  9. Jianqiang Hu, Changguo Guo, Huaimin Wang, Peng Zou
    Quality Driven Web Services Selection. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:681-688 [Conf]
  10. Junsheng Chang, Huaimin Wang, Gang Yin
    A Time-Frame Based Trust Model for P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:155-165 [Conf]
  11. Wen Dou, Yan Jia, Huai Ming Wang, Wen Qiang Song, Peng Zou
    A P2P Approach for Global Computing. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:248- [Conf]
  12. Gang Yin, Meng Teng, Huaimin Wang, Yan Jia, Dian-xi Shi
    An Authorization Framework Based on Constrained Delegation. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:845-857 [Conf]
  13. Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen
    Distributed Access Control for Grid Environments Using Trust Management Approach. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:485-495 [Conf]
  14. Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu
    Towards More Controllable and Practical Delegation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:245-258 [Conf]
  15. Yufeng Wang, Huaimin Wang, Dian-xi Shi, Bixin Liu
    COROB: A Controlled Resource Borrowing Framework for Overload Handling in Cluster-Based Service Hosting Center. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2005, pp:763-779 [Conf]
  16. Gang Wu, Huaiming Wang, XinJun Mao, Quanyuan Wu
    Growing Distributed System. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:399-403 [Conf]
  17. Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang
    Research on Control Flags-based Weighted Authentication Trustworthiness Model. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:369-373 [Conf]
  18. Chao Shui, Huaiming Wang, Pen Zhou, Yan Jia
    Cactus: A New Constant-Degree and Fault Tolerate P2P Overlay. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:386-397 [Conf]
  19. XinJun Mao, Gang Wu, Huaiming Wang
    Cooperation models for service oriented multi-agent system. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:510-511 [Conf]
  20. Kai Du, Huaimin Wang, Bo Deng, Yongheng Wang, Shuqiang Yang
    DRO+: A Systemic and Economical Approach to Improve Availability of Massive Database Systems. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2006, pp:122-132 [Conf]
  21. Buquan Liu, Huaimin Wang, Yiping Yao
    Data consistency in a large-scale runtime infrastructure. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2005, pp:1787-1794 [Conf]
  22. Buquan Liu, Yiping Yao, Jing Tao, Huaimin Wang
    Implementation of time management in a runtime infrastructure. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2006, pp:1044-1151 [Conf]
  23. Buquan Liu, Yiping Yao, Jing Tao, Huaimin Wang
    Development of a runtime infrastructure for large-scale distributed simulations. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2006, pp:1036-1043 [Conf]
  24. Han Xiaogang, Xu Li, Wang Huaimin
    YHCS2: A CORBA-Compliant Distributed C/S Computing Platform. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:374-378 [Conf]
  25. Gang Wu, Quanyuan Wu, Huaimin Wang
    A Novel Workflow Management Model Based on Mobile Agents for Internet Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:182-187 [Conf]
  26. Huaimin Wang, Quanyuan Wu
    A Formal Framework of Multi-Agent Systems with Requirement/Service Cooperative Style. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2000, v:15, n:2, pp:106-115 [Journal]
  27. Huaimin Wang, Yufeng Wang, Yang-Bin Tang
    StarBus+: Distributed Object Middleware Practice for Internet Computing. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:4, pp:542-551 [Journal]
  28. Mengluo Ji, Huaimin Wang, Mengjun Li, Wei Dong, Zhichang Qi
    An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:2020-2026 [Journal]
  29. Chunmei Gui, Quanyuan Wu, Huaimin Wang
    Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:239-248 [Conf]
  30. Zhizhong Liu, Huaimin Wang, Bin Zhou
    A Scalable Mechanism for Semantic Service Discovery in Multi-ontology Environment. [Citation Graph (0, 0)][DBLP]
    GPC, 2007, pp:136-145 [Conf]
  31. Xingzhi Feng, Quanyuan Wu, Huaimin Wang, Yi Ren, Changguo Guo
    ZebraX: A Model for Service Composition with Multiple QoS Constraints. [Citation Graph (0, 0)][DBLP]
    GPC, 2007, pp:614-626 [Conf]
  32. Yan Wen, Jinjing Zhao, Huaimin Wang
    A Novel Approach for Untrusted Code Execution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:398-411 [Conf]
  33. Yan Wen, Huaimin Wang
    A Secure Virtual Execution Environment for Untrusted Code. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:156-167 [Conf]
  34. Kai Du, Huaimin Wang, Shuqiang Yang, Bo Deng
    Towards High Performance and High Availability Clusters of Archived Stream. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:876-883 [Conf]
  35. Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang
    A New Reputation Mechanism Against Dishonest Recommendations in P2P Systems. [Citation Graph (0, 0)][DBLP]
    WISE, 2007, pp:449-460 [Conf]

  36. Online Self-Reconfiguration with Performance Guarantee for Energy-Efficient Large-Scale Cloud Computing Data Centers. [Citation Graph (, )][DBLP]


  37. Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. [Citation Graph (, )][DBLP]


  38. On Trustworthy Reputation Evidence Establishment: Rating Analysis and Defense against Dishonesty. [Citation Graph (, )][DBLP]


  39. HOM: An Approach to Calculating Semantic Similarity Utilizing Relations between Ontologies. [Citation Graph (, )][DBLP]


  40. Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. [Citation Graph (, )][DBLP]


  41. A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation. [Citation Graph (, )][DBLP]


  42. Together: A Hybrid Overlay for Application-Layer Multicast in Heterogeneous Environment. [Citation Graph (, )][DBLP]


  43. Reliability Design for Large Scale Storage Systems. [Citation Graph (, )][DBLP]


  44. Towards Role Based Trust Management without Distributed Searching of Credentials. [Citation Graph (, )][DBLP]


  45. Internet-Based Virtual Computing Environment. [Citation Graph (, )][DBLP]


  46. Towards Global State Identification of Nodes in DHT Based Systems. [Citation Graph (, )][DBLP]


  47. Taming software adaptability with architecture-centric framework. [Citation Graph (, )][DBLP]


  48. An Adaptive Algorithm for Failure Recovery During Dynamic Service Composition. [Citation Graph (, )][DBLP]


  49. Towards Unanticipated Adaptation: An Architecture-Based Approach. [Citation Graph (, )][DBLP]


  50. Component Based Context Model. [Citation Graph (, )][DBLP]


  51. ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. [Citation Graph (, )][DBLP]


  52. An efficient algorithm in the HLA time management. [Citation Graph (, )][DBLP]


  53. A Novel Intrusion-Tolerant Approach for Internet Access. [Citation Graph (, )][DBLP]


  54. RepCom: Towards Reputation Composition over Peer-to-Peer Communities. [Citation Graph (, )][DBLP]


  55. A Plugin-Based Software Production Line Integrated Framework. [Citation Graph (, )][DBLP]


  56. A User Trustworthiness Based Lightweight Access Control. [Citation Graph (, )][DBLP]


  57. A Framework for Error-Tolerant Scheme in Pervasive Computing. [Citation Graph (, )][DBLP]


  58. Towards General Access Control Management for Middleware Security. [Citation Graph (, )][DBLP]


  59. SRDL: A Simple Role-Based Delegation Logic. [Citation Graph (, )][DBLP]


Search in 2.156secs, Finished in 2.160secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002