The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zheng Yan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zheng Yan, Ronan MacLaverty
    Autonomic Trust Management in a Component Based Software System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:279-292 [Conf]
  2. James F. Plusquellic, Amy Germida, Zheng Yan
    8-Bit Multiplier Simulation Experiments Investigating the Use of Power Supply Transient Signals for the Detection of CMOS Defects. [Citation Graph (0, 0)][DBLP]
    DFT, 1999, pp:68-76 [Conf]
  3. Yongqiang Liu, Zheng Yan, Yixin Ni, Felix F. Wu
    A geometrical study on voltage collapse mechanisms of power systems. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:908-911 [Conf]
  4. Amy Germida, Zheng Yan, James F. Plusquellic, Fidel Muradali
    Defect detection using power supply transient signal analysis. [Citation Graph (0, 0)][DBLP]
    ITC, 1999, pp:67-76 [Conf]
  5. Zheng Yan, Piotr Cofta
    Methodology to Bridge Different Domains of Trust in Mobile Communications. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:211-224 [Conf]
  6. Zheng Yan
    A Conceptual Architecture of a Trusted Mobile Environment. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:75-81 [Conf]
  7. Zheng Yan, Piotr Cofta
    A Mechanism for Trust Sustainability Among Trusted Computing Platforms. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:11-19 [Conf]
  8. Ronald A. DeVore, Zheng Yan
    Error analysis for piecewise quadratic curve fitting algorithms. [Citation Graph (0, 0)][DBLP]
    Computer Aided Geometric Design, 1986, v:3, n:3, pp:205-215 [Journal]
  9. Zheng Yan, Christian Prehofer
    An Adaptive Trust Control Model for a Trustworthy Component Software Platform. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:226-238 [Conf]

  10. A User Behavior Based Trust Model for Mobile Applications. [Citation Graph (, )][DBLP]


  11. Formalizing Trust Based on Usage Behaviours for Mobile Applications. [Citation Graph (, )][DBLP]


  12. A Methodology towards Usable Trust Management. [Citation Graph (, )][DBLP]


  13. Autonomic Trust Management for a Pervasive System. [Citation Graph (, )][DBLP]


  14. Research of Welding Robot Controlled by PMAC and ARM Two Processors. [Citation Graph (, )][DBLP]


  15. Exploring Trust of Mobile Applications Based on User Behaviors. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002