|
Search the dblp DataBase
Jianming Fu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jianming Fu, Xian Yi, Huanguo Zhang
Modeling the Behavior of Ada Tasks and Verifying Its Safety. [Citation Graph (0, 0)][DBLP] CIT, 2004, pp:676-680 [Conf]
- Jianming Fu, Hui Fan
Assigning Block Size Based on Speculation for Parallel Downloading. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:119- [Conf]
- Yichun Liu, Jianming Fu, Huanguo Zhang
An Optimistic Fair Protocol for P2P Chained Transaction. [Citation Graph (0, 0)][DBLP] ASIAN, 2005, pp:136-145 [Conf]
- Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang
An Adaptive Service Strategy Based on User Rating in P2P. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:860-870 [Conf]
- Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. [Citation Graph (0, 0)][DBLP] NPC, 2004, pp:443-450 [Conf]
- Jianming Fu, Binglan Chen, Huanguo Zhang
A Worm Containment Model Based on Neighbor-Alarm. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:449-457 [Conf]
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. [Citation Graph (, )][DBLP]
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. [Citation Graph (, )][DBLP]
Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. [Citation Graph (, )][DBLP]
Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call Graph. [Citation Graph (, )][DBLP]
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|