The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dian-xi Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi
    Trust Management with Safe Privilege Propagation. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:174-183 [Conf]
  2. Yufeng Wang, Huaimin Wang, Yan Jia, Dian-xi Shi, Bixin Liu
    A SLA-Based Resource Donation Mechanism for Service Hosting Utility Center. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:719-724 [Conf]
  3. Lei Li, Huaimin Wang, Dian-xi Shi, Hui Liu
    An Efficient Optimistic Atomic Broadcast Algorithm. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:315-320 [Conf]
  4. Gang Yin, Meng Teng, Huaimin Wang, Yan Jia, Dian-xi Shi
    An Authorization Framework Based on Constrained Delegation. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:845-857 [Conf]
  5. Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen
    Distributed Access Control for Grid Environments Using Trust Management Approach. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:485-495 [Conf]
  6. Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu
    Towards More Controllable and Practical Delegation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:245-258 [Conf]
  7. Yufeng Wang, Huaimin Wang, Dian-xi Shi, Bixin Liu
    COROB: A Controlled Resource Borrowing Framework for Overload Handling in Cluster-Based Service Hosting Center. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2005, pp:763-779 [Conf]

  8. Online Self-Reconfiguration with Performance Guarantee for Energy-Efficient Large-Scale Cloud Computing Data Centers. [Citation Graph (, )][DBLP]


  9. Towards Role Based Trust Management without Distributed Searching of Credentials. [Citation Graph (, )][DBLP]


  10. Taming software adaptability with architecture-centric framework. [Citation Graph (, )][DBLP]


  11. Towards Unanticipated Adaptation: An Architecture-Based Approach. [Citation Graph (, )][DBLP]


  12. Component Based Context Model. [Citation Graph (, )][DBLP]


  13. Extend the Service and Component in Meta-level for Pervasive Computing. [Citation Graph (, )][DBLP]


  14. RepCom: Towards Reputation Composition over Peer-to-Peer Communities. [Citation Graph (, )][DBLP]


  15. Type-Based Service Ontology, Service Description in Pervasive Computing. [Citation Graph (, )][DBLP]


  16. A Framework for Error-Tolerant Scheme in Pervasive Computing. [Citation Graph (, )][DBLP]


  17. Towards General Access Control Management for Middleware Security. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002