The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaohong Yuan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaohong Yuan, Percy Vega, Jinsheng Xu, Huiming Yu, Yaohang Li
    Using packet sniffer simulator in the class: experience and evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:116-121 [Conf]
  2. Eduardo B. Fernández, Xiaohong Yuan
    Securing analysis patterns. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:288-293 [Conf]
  3. Eduardo B. Fernández, Xiaohong Yuan
    Semantic Analysis Patterns. [Citation Graph (0, 0)][DBLP]
    ER, 2000, pp:183-195 [Conf]
  4. Xiaohong Yuan, Mohammad Ilyas
    Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:677-686 [Conf]
  5. Yaohang Li, Daniel Tsu-Tang Chen, Xiaohong Yuan, Huiming Yu, Albert C. Esterline
    Secure Remote Compiling Services on the Grid. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:373-378 [Conf]
  6. Xiaohong Yuan, Kai Zhao, Jue Wang
    Visualization in Mechanical Geometry Theorem Proving. [Citation Graph (0, 0)][DBLP]
    SCAI, 1995, pp:478-482 [Conf]
  7. Xiaohong Yuan
    An Experience Report on Teaching the Personal Software Process. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2003, pp:810-815 [Conf]
  8. Xiaohong Yuan, Percy Vega, Huiming Yu, Yaohang Li
    A Personal Software Process Tool for Eclipse Environment. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2005, pp:717-723 [Conf]
  9. Barry L. Kurtz, James B. Fenwick Jr., Christopher C. Ellsworth, Xiaohong Yuan, Adam Steele, Xiaoping Jia
    Inter-University software engineering using web services. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:464-468 [Conf]
  10. Otman Basir, Xiaohong Yuan
    Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory. [Citation Graph (0, 0)][DBLP]
    Information Fusion, 2007, v:8, n:4, pp:379-386 [Journal]
  11. Yaohang Li, Daniel Chen, Xiaohong Yuan
    Trustworthy remote compiling services for grid-based scientific applications. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2007, v:41, n:2, pp:119-131 [Journal]

  12. Using a Practice Oriented Approach to Teach Web Security Course. [Citation Graph (, )][DBLP]


  13. Laboratory Design For Demonstrating Phishing. [Citation Graph (, )][DBLP]


  14. LAN attacker: a visual education tool. [Citation Graph (, )][DBLP]


Search in 0.031secs, Finished in 0.031secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002