Search the dblp DataBase
Fei Yu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Fei Yu , Yue Shen , Huang Huang , Cheng Xu , Xia-peng Dai An Information Audit System Based on Bayes Algorithm. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:869-876 [Conf ] Fei Yu , Vincent W. S. Wong , Victor C. M. Leung Efficient QoS Provisioning for Adaptive Multimedia in Mobile Communication Networks by Reinforcement Learning. [Citation Graph (0, 0)][DBLP ] BROADNETS, 2004, pp:579-588 [Conf ] Fei Yu , Vikram Krishnamurthy Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:912-919 [Conf ] Bin Jiang , Da-fung Zhang , Chao Yang , Guangxue Yue , Fei Yu A Privacy Policy of P3P Based on Relational Database. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:510-515 [Conf ] Xinghui Zhu , Guang Lu , Fei Yu , Shuqiang Yang , Miaoliang Zhu PVM: A Memory Management under Vertical Architecture. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:326-331 [Conf ] Fei Yu , Victor C. M. Leung Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:518-526 [Conf ] Fei Yu , Vincent W. S. Wong , Victor C. M. Leung A New QoS Provisioning Method for Adaptive Multimedia in Cellular Wireless Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Ji-yao An , Guangxue Yue , Fei Yu , Renfa Li Intrusion Detection Based on Fuzzy Neural Networks. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2006, pp:231-239 [Conf ] Fei Yu , Huang Huang , Cheng Xu , Xiao-peng Dai , Miaoliang Zhu Badness Information Audit Based on Image Character Filtering. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:647-656 [Conf ] Fei Yu , Vikram Krishnamurthy Cross-Layer Radio Resource Allocation in Packet CDMA Wireless Mobile Networks with LMMSE Receivers. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:1243-1254 [Conf ] Bo Sun , Fei Yu , Kui Wu , Victor C. M. Leung Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2004, pp:61-69 [Conf ] Cheng Xu , Fei Yu , Zhenghui Dai , Guangxue Yue , Renfa Li Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:27- [Conf ] Guangxue Yue , Fei Yu , Yi-jun Chen , Ronghui Wu , Ji-yao An , Renfa Li Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:74- [Conf ] Ronghui Wu , Renfa Li , Fei Yu , Guangxue Yue , Cheng Xu Research on User Authentication for Grid Computing Security. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:72- [Conf ] Ronghui Wu , Renfa Li , Fei Yu , Guangxue Yue , Jigang Wen Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:75- [Conf ] Rui Li , Renfa Li , Fei Yu , Jigang Wen A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:73- [Conf ] Fei Yu , Victor C. M. Leung Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:5, pp:577-589 [Journal ] Fei Yu , Vikram Krishnamurthy Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2005, v:30, n:1-3, pp:177-192 [Journal ] Fei Yu , Vikram Krishnamurthy Optimal Joint Session Admission Control in Integrated WLAN and CDMA Cellular Networks with Vertical Handoff. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:126-139 [Journal ] Guangxue Yue , Fei Yu , Li-ping Chen , Yi-jun Chen An Access Control Model in Lager-Scale P2P File Sharing Systems. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:741-744 [Conf ] Ronghui Wu , Renfa Li , Fei Yu , Guangxue Yue , Chen Xu Research on Advanced Distributed Learning by Using SCORM. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:571-574 [Conf ] Ken Chen , Guangxue Yue , Fei Yu , Yue Shen , Aiqing Zhu Research on Speech Emotion Recognition System in E-Learning. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:555-558 [Conf ] Fei Yu , Yue Shen , Guangxue Yue , Ronghui Wu , Cheng Xu Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:109-112 [Conf ] Robust and Efficient Change Detection Algorithm. [Citation Graph (, )][DBLP ] PSO Algorithm Based Online Self-Tuning of PID Controller. [Citation Graph (, )][DBLP ] Locating Reference Points between Fingerprint Images. [Citation Graph (, )][DBLP ] Intent-Driven Insider Threat Detection in Intelligence Analyses. [Citation Graph (, )][DBLP ] Simulation of Wireless Local Area Network. [Citation Graph (, )][DBLP ] An Improved Algorithm of Pattern Matching for Information Security Audit System. [Citation Graph (, )][DBLP ] Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. [Citation Graph (, )][DBLP ] Motion Retrieval with Ensemble Multiple Instance Learning Based on Mocap Database. [Citation Graph (, )][DBLP ] A novel multiple access scheme in wireless multimedia networks with multi-packet reception. [Citation Graph (, )][DBLP ] Capturing User Intent for Analytic Process. [Citation Graph (, )][DBLP ] The Algorithms of Constructing Concept Lattices Based On CAT With Cognitive Diagnosis. [Citation Graph (, )][DBLP ] The Implementation of Evidence Theory in Mobile E-Business Payment. [Citation Graph (, )][DBLP ] E-learning System Based on Neural Networks. [Citation Graph (, )][DBLP ] Design and Implementation of Embedded Multimedia Surveillance System. [Citation Graph (, )][DBLP ] Intrusion Detection for High-Speed Networks Based on Producing System. [Citation Graph (, )][DBLP ] The Fault Diagnosis of a Class of Nonlinear Stochastic Time-delay systems. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.332secs