The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bing Sun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bing Sun, Bo Zhou, Nan Tang, Guoren Wang, Ge Yu, Fulin Jia
    Answering XML Twig Queries with Automata. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:170-179 [Conf]
  2. Jianhua Lv, Guoren Wang, Jeffrey Xu Yu, Ge Yu, Hongjun Lu, Bing Sun
    A New Path Expression Computing Approach for XML Data. [Citation Graph (0, 0)][DBLP]
    EEXTT, 2002, pp:35-46 [Conf]
  3. Bing Sun, Jacob T. Schwartz, Ofer H. Gill, Bud Mishra
    COMBAT: Search Rapidly for Highly Similar Protein-Coding Sequences Using Bipartite Graph Matching. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2006, pp:654-661 [Conf]
  4. Guoren Wang, Mengchi Liu, Jeffrey Xu Yu, Bing Sun, Ge Yu, Jianhua Lv, Hongjun Lu
    Effective Schema-Based XML Query Optimization Techniques. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:230-235 [Conf]
  5. Jianhua Lv, Guoren Wang, Jeffrey Xu Yu, Ge Yu, Hongjun Lu, Bing Sun
    Performance Evaluation of a DOM-Based XML Database: Storage, Indexing and Query Optimization. [Citation Graph (0, 0)][DBLP]
    WAIM, 2002, pp:13-24 [Conf]
  6. Bing Sun, Jianhua Lv, Guoren Wang, Ge Yu, Bo Zhou
    Efficient Evaluation of XML Path Queries with Automata. [Citation Graph (0, 0)][DBLP]
    WAIM, 2003, pp:116-127 [Conf]
  7. Jeffrey Xu Yu, Guoren Wang, Hongjun Lu, Ge Yu, Jianhua Lv, Bing Sun
    Automata Match: a new XML query processing approach. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2003, v:18, n:5, pp:227-240 [Journal]
  8. Guoren Wang, Bing Sun, Jianhua Lv, Ge Yu
    RPE Query Processing and Optimization Techniques for XML Databases. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:2, pp:224-237 [Journal]
  9. Huafeng Wu, Han Peng, Qiang Zhou, Min Yang, Bing Sun, Bo Yu
    P2P Multimedia Sharing over MANET. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:635-642 [Conf]

  10. Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. [Citation Graph (, )][DBLP]


  11. Saturation Attack on the Block Cipher HIGHT. [Citation Graph (, )][DBLP]


  12. Enumeration of Homogeneous Rotation Symmetric Functions over Fp. [Citation Graph (, )][DBLP]


  13. Construction of Resilient Functions with Multiple Cryptographic Criteria. [Citation Graph (, )][DBLP]


  14. Learning IMED via shift-invariant transformation. [Citation Graph (, )][DBLP]


  15. New Cryptanalysis of Block Ciphers with Low Algebraic Degree. [Citation Graph (, )][DBLP]


  16. The Fitness Evaluation Model of SAAS for Enterprise Information System. [Citation Graph (, )][DBLP]


  17. Self-Protection Model Based on Intelligent Agent. [Citation Graph (, )][DBLP]


Search in 0.033secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002