|
Search the dblp DataBase
Fei Yan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:227-235 [Conf]
- Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao
An Improved Global Trust Value Computing Method in P2P System. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:258-267 [Conf]
- Fei Yan, Alexey Kostin, William J. Christmas, Josef Kittler
A Novel Data Association Algorithm for Object Tracking in Clutter with Application to Tennis Video Analysis. [Citation Graph (0, 0)][DBLP] CVPR (1), 2006, pp:634-641 [Conf]
- Robert Aichner, Herbert Buchner, Fei Yan, Walter Kellermann
Real-Time Convolutive Blind Source Separation Based on a Broadband Approach. [Citation Graph (0, 0)][DBLP] ICA, 2004, pp:840-848 [Conf]
- Fei Yan, William J. Christmas, Josef Kittler
A Maximum A Posteriori Probability Viterbi Data Association Algorithm for Ball Tracking in Sports Video. [Citation Graph (0, 0)][DBLP] ICPR (1), 2006, pp:279-282 [Conf]
- Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang
Grid System Integrated with Trusted Computing Platform. [Citation Graph (0, 0)][DBLP] IMSCCS (1), 2006, pp:619-625 [Conf]
- Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan
A Jackson Network-Based Model for Quantitative Analysis of Network Security. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:517-522 [Conf]
- Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. [Citation Graph (0, 0)][DBLP] NPC, 2004, pp:443-450 [Conf]
- Josef Kittler, William J. Christmas, Alexey Kostin, Fei Yan, Ilias Kolonias, David Windridge
A Memory Architecture and Contextual Reasoning Framework for Cognitive Vision. [Citation Graph (0, 0)][DBLP] SCIA, 2005, pp:343-358 [Conf]
- Robert Aichner, Herbert Buchner, Fei Yan, Walter Kellermann
A real-time blind source separation scheme and its application to reverberant and noisy acoustic environments. [Citation Graph (0, 0)][DBLP] Signal Processing, 2006, v:86, n:6, pp:1260-1277 [Journal]
A Secure Multi-party Computing Model Based on Trusted Computing Platform. [Citation Graph (, )][DBLP]
Daonity: grid security with behaviour conformity from trusted computing. [Citation Graph (, )][DBLP]
Efficient IRM enforcement of history-based access control policies. [Citation Graph (, )][DBLP]
Building Trusted Sub-domain for the Grid with Trusted Computing. [Citation Graph (, )][DBLP]
Analysis of the structure and evolution of the co-borrowing network in Peking University library. [Citation Graph (, )][DBLP]
Non-sparse Multiple Kernel Learning for Fisher Discriminant Analysis. [Citation Graph (, )][DBLP]
Multiple kernel learning and feature space denoising. [Citation Graph (, )][DBLP]
Analyzing user's book-loan behaviors in Peking university library from social network perspective. [Citation Graph (, )][DBLP]
A Multiple Expert Approach to the Class Imbalance Problem Using Inverse Random under Sampling. [Citation Graph (, )][DBLP]
Combining Multiple Kernels by Augmenting the Kernel Matrix. [Citation Graph (, )][DBLP]
Improving Multilabel Classification Performance by Using Ensemble of Multi-label Classifiers. [Citation Graph (, )][DBLP]
Trusted Code Remote Execution through Trusted Computing and Virtualization. [Citation Graph (, )][DBLP]
Users' Book-Loan Behaviors Analysis and Knowledge Dependency Mining. [Citation Graph (, )][DBLP]
The MediaMill TRECVID 2008 Semantic Video Search Engine. [Citation Graph (, )][DBLP]
Research on Association Rules Based Group Ranking Model with Fuzzy Preference Relation Structure. [Citation Graph (, )][DBLP]
Large-scale Topological Environmental Model Based Particle Filters for Mobile Robot Indoor Localization. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|