The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xin Lin, Shanping Li, Zhaohui Yang, Wei Shi
    Application-oriented Context Modeling and Reasoning in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:495-501 [Conf]
  2. Wei Shi, Jian Wu, ShuiGuang Deng, Li Kuang, Huajun Chen, Dongcai Shi, Zhao Xu, Zhiyong Ye, Zhaohui Wu, Xiaohong Qian, Xiuhai Chen, Quanming Xu, Feihu Chen
    ITSGrid: A Novel Integrated Intelligent Transportation Information and Service Platform. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2006, pp:519- [Conf]
  3. Wei Shi, Jian Wu, Zhaohui Wu
    Using State Machine to Integrate Human Activity into BPEL in Dartflow. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2006, pp:517- [Conf]
  4. Stefan Dobrev, Rastislav Kralovic, Nicola Santoro, Wei Shi
    Black Hole Search in Asynchronous Rings Using Tokens. [Citation Graph (0, 0)][DBLP]
    CIAC, 2006, pp:139-150 [Conf]
  5. Dehua Chen, Ruiqiang Guo, Jiajin Le, Wei Shi
    PeeRCR: a distributed P2P-based reusable component repository system. [Citation Graph (0, 0)][DBLP]
    COEA, 2005, pp:93-107 [Conf]
  6. Xin Lin, Shanping Li, Wei Shi, Jie Teng
    A Scalable Version Control Layer in P2P File System. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:996-1001 [Conf]
  7. Wei Shi, Shanping Li, Gang Peng, Tianchi Ma, Xin Lin
    Local Index Tree for Mobile Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:650-656 [Conf]
  8. Wei Shi, Wanlei Zhou
    Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:26-33 [Conf]
  9. Wei Shi, Yang Xiang, Wanlei Zhou
    Distributed Defense Against Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:357-362 [Conf]
  10. Wei Shi, Shanping Li, Gang Peng, Xin Lin
    Dynamic Dominant Index Set for Mobile Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:995-999 [Conf]
  11. Xin Lin, Shanping Li, Jian Xu, Wei Shi
    A RDF-Based Context Filtering System in Pervasive Environment. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:306-315 [Conf]
  12. Li Kuang, ShuiGuang Deng, Ying Li, Wei Shi, Zhaohui Wu
    Exploring Semantic Technologies in Service Matchmakin. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2005, pp:226-234 [Conf]
  13. Wei Shi, Wanlei Zhou, Weimin Zheng
    A Self-Learning System for Identifying Harmful Network Information. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  14. Qing Gao, Shanping Li, Wei Shi
    Power-Efficient Routing Mechanism in Sensor Networks based on Node-Density. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:654-656 [Conf]
  15. Wei Shi, Shanping Li, Xin Lin
    Towards Merging Pervasive Computing into Grid - Lightweight Portal, Dynamic Collaborating and Semantic Supporting. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:560-563 [Conf]
  16. Wei Shi, Wanlei Zhou
    Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:3-9 [Conf]
  17. Wei Shi, Jean-Pierre Corriveau
    An Executable Model for a Family of Election Algorithms. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  18. Wei Shi, Pradip K. Srimani
    Hyper Butterfly Network: A Scalable Optimally Fault Tolerant Architecture. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP, 1998, pp:732-736 [Conf]
  19. Wei Shi, Pradip K. Srimani
    Leader Election in Hyper-Butterfly Graphs. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:292-299 [Conf]
  20. Wei Shi, Jean-Pierre Corriveau
    System family engineering for leader election in ring topology. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:398-403 [Conf]
  21. Xin Lin, Shanping Li, Jian Xu, Wei Shi, Qing Gao
    An Efficient Context Modeling and Reasoning System in Pervasive Environment: Using Absolute and Relative Context Filtering Technology. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:357-367 [Conf]
  22. Wei Shi, Jian Wu, Ying Li, Li Kuang
    Intelligent Transportation Information Sharing and Service Integration in Semantic Grid Environment. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:174-180 [Conf]
  23. Li Kuang, Ying Li, ShuiGuang Deng, Jian Wu, Wei Shi, Zhaohui Wu
    Expressing Service and Query Behavior Using pi-Calculus for Matchmaking. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:629-632 [Conf]
  24. Wei Shi, Wanlei Zhou
    A Parallel Euler Approach for Large-Scale Biological Sequence Assembly. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:437-441 [Conf]
  25. Wei Shi, Pradip K. Srimani
    Leader election in hierarchical star network. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:11, pp:1435-1442 [Journal]
  26. Wei Shi, Pradip K. Srimani
    Hierarchical star: a new two level interconnection network. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Architecture, 2005, v:51, n:1, pp:1-14 [Journal]
  27. Wei Shi, Abdelmadjid Bouabdallah, Pradip K. Srimani
    Leader election in oriented star graphs. [Citation Graph (0, 0)][DBLP]
    Networks, 2005, v:45, n:3, pp:169-179 [Journal]
  28. Wei Shi, Pradip K. Srimani
    A regular scalable fault tolerant interconnection network for distributed processing. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2001, v:27, n:14, pp:1897-1919 [Journal]
  29. Wei Shi, Thomas W. Sun, Richard D. Wesel
    Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized Gaussian noise. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:1, pp:446-450 [Journal]
  30. Stefan Dobrev, Nicola Santoro, Wei Shi
    Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2007, pp:608-617 [Conf]
  31. Stefan Dobrev, Nicola Santoro, Wei Shi
    Scattered Black Hole Search in an Oriented Ring using Tokens. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-8 [Conf]

  32. Dynamic Routing Strategies Based on Local Topological Information of Scale-free Network. [Citation Graph (, )][DBLP]


  33. Facilitating the Flexible Modeling of Human-Driven Workflow in BPEL. [Citation Graph (, )][DBLP]


  34. Connectivity Based Greedy Algorithm with Multipoint Relaying for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  35. Modeling and Validating Requirements Using Executable Cotnracts and Scenarios. [Citation Graph (, )][DBLP]


  36. Black Hole Search with Tokens in Interconnected Networks. [Citation Graph (, )][DBLP]


  37. Using Improved FOAF to Enhance BPEL-extracted RBAC Capability. [Citation Graph (, )][DBLP]


  38. Simulation Study of Public Goods Experiment. [Citation Graph (, )][DBLP]


  39. Achieving Full Diversity by Selection in Arbitrary Multi-Hop Amplify-and-Forward Relay Networks. [Citation Graph (, )][DBLP]


  40. Escaping from Blocking: A Dynamic Virtual Channel for Pipelined Routers. [Citation Graph (, )][DBLP]


  41. A self-adaptive test framework for concurrent programs. [Citation Graph (, )][DBLP]


  42. Reconstruction of Worm Propagation Path by Causality. [Citation Graph (, )][DBLP]


  43. Ensuring Correctness of Dynamic Reconfiguration in SOA Based Software. [Citation Graph (, )][DBLP]


  44. Frequency distribution of TATA Box and extension sequences on human promoters. [Citation Graph (, )][DBLP]


  45. Illumina WG-6 BeadChip strips should be normalized separately. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002