The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fei Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fei Yu, Yue Shen, Huang Huang, Cheng Xu, Xia-peng Dai
    An Information Audit System Based on Bayes Algorithm. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:869-876 [Conf]
  2. Fei Yu, Vincent W. S. Wong, Victor C. M. Leung
    Efficient QoS Provisioning for Adaptive Multimedia in Mobile Communication Networks by Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:579-588 [Conf]
  3. Fei Yu, Vikram Krishnamurthy
    Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:912-919 [Conf]
  4. Bin Jiang, Da-fung Zhang, Chao Yang, Guangxue Yue, Fei Yu
    A Privacy Policy of P3P Based on Relational Database. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:510-515 [Conf]
  5. Xinghui Zhu, Guang Lu, Fei Yu, Shuqiang Yang, Miaoliang Zhu
    PVM: A Memory Management under Vertical Architecture. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:326-331 [Conf]
  6. Fei Yu, Victor C. M. Leung
    Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:518-526 [Conf]
  7. Fei Yu, Vincent W. S. Wong, Victor C. M. Leung
    A New QoS Provisioning Method for Adaptive Multimedia in Cellular Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  8. Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li
    Intrusion Detection Based on Fuzzy Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:231-239 [Conf]
  9. Fei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu
    Badness Information Audit Based on Image Character Filtering. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:647-656 [Conf]
  10. Fei Yu, Vikram Krishnamurthy
    Cross-Layer Radio Resource Allocation in Packet CDMA Wireless Mobile Networks with LMMSE Receivers. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1243-1254 [Conf]
  11. Bo Sun, Fei Yu, Kui Wu, Victor C. M. Leung
    Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:61-69 [Conf]
  12. Cheng Xu, Fei Yu, Zhenghui Dai, Guangxue Yue, Renfa Li
    Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:27- [Conf]
  13. Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li
    Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:74- [Conf]
  14. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu
    Research on User Authentication for Grid Computing Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:72- [Conf]
  15. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen
    Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:75- [Conf]
  16. Rui Li, Renfa Li, Fei Yu, Jigang Wen
    A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:73- [Conf]
  17. Fei Yu, Victor C. M. Leung
    Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:5, pp:577-589 [Journal]
  18. Fei Yu, Vikram Krishnamurthy
    Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:30, n:1-3, pp:177-192 [Journal]
  19. Fei Yu, Vikram Krishnamurthy
    Optimal Joint Session Admission Control in Integrated WLAN and CDMA Cellular Networks with Vertical Handoff. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:126-139 [Journal]
  20. Guangxue Yue, Fei Yu, Li-ping Chen, Yi-jun Chen
    An Access Control Model in Lager-Scale P2P File Sharing Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:741-744 [Conf]
  21. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Chen Xu
    Research on Advanced Distributed Learning by Using SCORM. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:571-574 [Conf]
  22. Ken Chen, Guangxue Yue, Fei Yu, Yue Shen, Aiqing Zhu
    Research on Speech Emotion Recognition System in E-Learning. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:555-558 [Conf]
  23. Fei Yu, Yue Shen, Guangxue Yue, Ronghui Wu, Cheng Xu
    Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:109-112 [Conf]

  24. Robust and Efficient Change Detection Algorithm. [Citation Graph (, )][DBLP]


  25. PSO Algorithm Based Online Self-Tuning of PID Controller. [Citation Graph (, )][DBLP]


  26. Locating Reference Points between Fingerprint Images. [Citation Graph (, )][DBLP]


  27. Intent-Driven Insider Threat Detection in Intelligence Analyses. [Citation Graph (, )][DBLP]


  28. Simulation of Wireless Local Area Network. [Citation Graph (, )][DBLP]


  29. An Improved Algorithm of Pattern Matching for Information Security Audit System. [Citation Graph (, )][DBLP]


  30. Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. [Citation Graph (, )][DBLP]


  31. Motion Retrieval with Ensemble Multiple Instance Learning Based on Mocap Database. [Citation Graph (, )][DBLP]


  32. A novel multiple access scheme in wireless multimedia networks with multi-packet reception. [Citation Graph (, )][DBLP]


  33. Capturing User Intent for Analytic Process. [Citation Graph (, )][DBLP]


  34. The Algorithms of Constructing Concept Lattices Based On CAT With Cognitive Diagnosis. [Citation Graph (, )][DBLP]


  35. The Implementation of Evidence Theory in Mobile E-Business Payment. [Citation Graph (, )][DBLP]


  36. E-learning System Based on Neural Networks. [Citation Graph (, )][DBLP]


  37. Design and Implementation of Embedded Multimedia Surveillance System. [Citation Graph (, )][DBLP]


  38. Intrusion Detection for High-Speed Networks Based on Producing System. [Citation Graph (, )][DBLP]


  39. The Fault Diagnosis of a Class of Nonlinear Stochastic Time-delay systems. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002