The SCEAS System
Navigation Menu

Search the dblp DataBase


Feng Cao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Cao, Cullen Jennings
    Providing Response Identity and Authentication in IP Telephony. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:198-205 [Conf]
  2. Feng Cao, Saadat Malik
    Security Analysis for IP-based Government Emergency Telephony Service. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:496-501 [Conf]
  3. Feng Cao, Petre Dini
    Providing Secure End-to-End Session Tracking in Distributed Multi-Protocol Environments. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:155- [Conf]
  4. Feng Cao, David A. Bryan, Bruce Lowekamp
    Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:105- [Conf]
  5. Peng-Jun Wan, Feng Cao
    Multichannel Lightwave Networks. [Citation Graph (0, 0)][DBLP]
    Advances in Algorithms, Languages, and Complexity, 1997, pp:379-396 [Conf]
  6. Feng Cao, Zhenfu Cao
    Security Model of Proxy-Multi Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:144-152 [Conf]
  7. Feng Cao, Jeffrey D. Smith, Kenji Takahashi
    An Architecture of Distributed Media Servers for Supporting Guaranteed QoS and Media Indexing. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:1-5 [Conf]
  8. Jiandong Huang, Y. Wang, N. R. Vaidyanathan, Feng Cao
    GRMS: A Global Resource Management System for Distributed QoS and Criticality Support. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1997, pp:424-432 [Conf]
  9. Feng Cao, Zhenfu Cao
    A Proxy-Protected Signature Scheme Based on Finite Automaton. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:48-55 [Conf]
  10. Feng Cao, Zhenfu Cao
    Cryptanalysis on a Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:117-120 [Conf]
  11. Feng Cao, Zhenfu Cao, Licheng Wang
    An Improvement of an Identity-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:13-18 [Conf]
  12. Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
    Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:8-12 [Conf]
  13. Feng Cao
    Reliability Analysis of Partitioned Optical Passive Stars Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1997, pp:470-475 [Conf]
  14. Feng Cao, Ding-Zhu Du, Shang-Hua Teng
    Fault-tolerant Properties of Pyramid Network. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1690-1693 [Conf]
  15. Feng Cao, Ding-Zhu Du
    Fault-Tolerant Routing and Multicasting in Butterfly Networks. [Citation Graph (0, 0)][DBLP]
    SAC, 1999, pp:455-460 [Conf]
  16. Feng Cao, Eddie Grant
    Learning by Experimentation in a Robot World. [Citation Graph (0, 0)][DBLP]
    SCAI, 1989, pp:177-184 [Conf]
  17. Feng Cao, Martin Ester, Weining Qian, Aoying Zhou
    Density-Based Clustering over an Evolving Data Stream with Noise. [Citation Graph (0, 0)][DBLP]
    SDM, 2006, pp:- [Conf]
  18. Feng Cao, Anthony K. H. Tung, Aoying Zhou
    Scalable Clustering Using Graphics Processors. [Citation Graph (0, 0)][DBLP]
    WAIM, 2006, pp:372-384 [Conf]
  19. Shiyong Lu, Feng Cao, Yi Lu
    Pama: a Fast String Matching Algorithm. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:2, pp:357-378 [Journal]
  20. Jiandong Huang, Y. Wang, Feng Cao
    On Developing Distributed Middleware Services for QoS- and Criticality-Based Resource Negotiation and Adaptation. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1999, v:16, n:2-3, pp:187-221 [Journal]
  21. Feng Cao, Ding-Zhu Du, D. Frank Hsu, Shang-Hua Teng
    Fault Tolerance Properties of Pyramid Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:1, pp:88-93 [Journal]
  22. Feng Cao, David Hung-Chang Du, Allalaghatta Pavan
    Topological Embedding into WDM Optical Passive Star Networks with Tunable Transmitters. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:12, pp:1404-1413 [Journal]
  23. Feng Cao, Al Borchers
    Optimal Transmission Schedules for Lightwave Networks Embedded with De Bruijn Graphs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:222, n:1-2, pp:113-131 [Journal]
  24. Guoliang Xue, Ding-Zhu Du, Feng Cao
    Recent advances in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:147-149 [Journal]
  25. Aoying Zhou, Feng Cao, Ying Yan, Chaofeng Sha, Xiaofeng He
    Distributed Data Stream Clustering: A Fast EM-based Approach. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:736-745 [Conf]
  26. Feng Cao, Ding-Zhu Du, D. Frank Hsu, Lihui Hwang, Weili Wu
    Super line-connectivity of consecutive-d digraphs. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1998, v:183, n:1-3, pp:27-38 [Journal]

  27. A Study on the Driving Forces of Urban Expansion Using Rough Sets. [Citation Graph (, )][DBLP]

  28. Supporting Ontology-Based Dynamic Property and Classification in WebSphere Metadata Server. [Citation Graph (, )][DBLP]

  29. MDS++: Supporting Ontology-based Dynamic Classification in WebSphere Metadata Server. [Citation Graph (, )][DBLP]

  30. Semantic Enhancement for Enterprise Data Management. [Citation Graph (, )][DBLP]

  31. Effective and efficient semantic web data management over DB2. [Citation Graph (, )][DBLP]

  32. An Identity Based Proxy Signature Scheme Secure in the Standard Model. [Citation Graph (, )][DBLP]

  33. An Effective SPARQL Support over Relational Databases. [Citation Graph (, )][DBLP]

  34. Identifying and tracking suspicious activities through IP gray space analysis. [Citation Graph (, )][DBLP]

Search in 0.057secs, Finished in 0.058secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002