Search the dblp DataBase
Hao Chen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chengwen Liu , Hao Chen , Warren Krueger A Distributed Query Processing Strategy Using Placement Dependency. [Citation Graph (1, 20)][DBLP ] ICDE, 1996, pp:477-484 [Conf ] Hao Chen , Shi Ying , Jin Liu , Wei Wang SE4SC: A Specific Search Engine for Software Components. [Citation Graph (0, 0)][DBLP ] CIT, 2004, pp:863-868 [Conf ] Jin Liu , Keqing He , Bing Li , Hao Chen , Liang Peng A Methodology for Acquisition of Software Component Attribute Ontology. [Citation Graph (0, 0)][DBLP ] CIT, 2004, pp:1058-1064 [Conf ] Benjamin Schwarz , Hao Chen , David Wagner , Jeremy Lin , Wei Tu , Geoff Morrison , Jacob West Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:13-22 [Conf ] Hao Chen Update Operation and Partition Dependency in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:624-627 [Conf ] Jianhua Sun , Hai Jin , Hao Chen , Zongfen Han Server Scheduling Scheme for Asynchronous Cluster Video Server. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:509-513 [Conf ] Hao Chen , Hai Jin , Jianhua Sun , Dafu Deng , Xiaofei Liao Analysis of large-scale topological properties for peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] CCGRID, 2004, pp:27-34 [Conf ] Hao Chen , Jonathan S. Shapiro Using build-integrated static checking to preserve correctness invariants. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:288-297 [Conf ] Hao Chen , David Wagner MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf ] Hao Chen , Susan T. Dumais Bringing order to the Web: automatically categorizing search results. [Citation Graph (0, 0)][DBLP ] CHI, 2000, pp:145-152 [Conf ] Susan T. Dumais , Edward Cutrell , Hao Chen Optimizing search by showing results in context. [Citation Graph (0, 0)][DBLP ] CHI, 2001, pp:277-284 [Conf ] Hao Chen , Ronald Cramer Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:521-536 [Conf ] Weiyu Wu , Hao Chen An Ubicomp-Based Model of Cooperative Design System for Architectural Engineering. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:365-368 [Conf ] Hao Chen , Chengwen Liu Maintenance of Placement Dependency in Distributed Multidatabase Systems. [Citation Graph (0, 13)][DBLP ] DASFAA, 1999, pp:339-346 [Conf ] Chengwen Liu , Hao Chen A Hash Partition Strategy for Distributed Query Processing. [Citation Graph (0, 19)][DBLP ] EDBT, 1996, pp:373-387 [Conf ] Xiaofei Liao , Hai Jin , Hao Chen Lemming: A Novel Resource Lookup Scheme for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] EUC, 2004, pp:1024-1033 [Conf ] Hai Jin , Jianhua Sun , Hao Chen , Zongfen Han A Fuzzy Data Mining Based Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] FTDCS, 2004, pp:191-197 [Conf ] Hao Chen , John Clark , Jeremy Jacob Human competitive security protocols synthesis. [Citation Graph (0, 0)][DBLP ] GECCO, 2006, pp:1855-1856 [Conf ] Hao Chen , Hai Jin , Jianhua Sun , Zongfen Han Efficient Immunization Algorithm for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] HiPC, 2004, pp:232-241 [Conf ] Hao Chen , Hai Jin , Jianhua Sun , Zongfen Han Efficient Immunization Algorithm for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science, 2004, pp:623-626 [Conf ] Hao Chen , Oscar E. Agazzi , Ching Y. Suen Piecewise Linear Modulation Model of Handwriting. [Citation Graph (0, 0)][DBLP ] ICDAR, 1997, pp:363-368 [Conf ] Hao Chen , Jian Tang An Efficient Method for Mutual Exclusion in Truly Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 1994, pp:97-104 [Conf ] Jianhua Sun , Hai Jin , Hao Chen , Qian Zhang , Zongfen Han A Compound Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:370-381 [Conf ] Hai Jin , Jianhua Sun , Hao Chen , Zongfen Han A Risk-Sensitive Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:107-117 [Conf ] Hao Chen , Chengwen Liu An Efficient Algorithm for Processing Distributed Queries Using Partition Dependency. [Citation Graph (0, 0)][DBLP ] ICPADS, 2000, pp:339-346 [Conf ] Hao Chen , Dong Zhang The Switched Reluctance Motor Drive for the Direct-Drive Joint of the Robot. [Citation Graph (0, 0)][DBLP ] ICRA, 2001, pp:1439-1443 [Conf ] Jianhua Sun , Hai Jin , Hao Chen , Zongfen Han , Deqing Zou A Data Mining Based Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] IDEAL, 2003, pp:677-684 [Conf ] Hai Jin , Dan Tang , Yongkun Zhang , Hao Chen SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Hai Jin , Xia Xie , Yunfa Li , Zongfen Han , Hao Chen Athena: A Real-time Performance Evaluation for Distributed Software with Reliability Constraints. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Dafu Deng , Hai Jin , Chao Zhang , Hao Chen , Xiaofei Liao Honeycomb: A Peer-to-Peer Substrate for On-Demand Media Streaming Service. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:330-339 [Conf ] Hao Chen , Ljiljana Trajkovi Simulation of Route Optimization in Mobile IP. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:847-848 [Conf ] Hai Jin , Hao Chen , Jianhua Sun Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems. [Citation Graph (0, 0)][DBLP ] MMM, 2003, pp:493-0 [Conf ] Hao Chen , Drew Dean , David Wagner Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Dafu Deng , Hai Jin , Xiaofei Liao , Hao Chen CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:238-243 [Conf ] Hao Chen , Nicholas S. Flann Parallel Simulated Annealing and Genetic Algorithms: a Space of Hybrid Methods. [Citation Graph (0, 0)][DBLP ] PPSN, 1994, pp:428-438 [Conf ] Lili Pan , Junyi Li , Beiji Zou , Hao Chen Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage. [Citation Graph (0, 0)][DBLP ] PRDC, 2005, pp:235-244 [Conf ] Chengwen Liu , Hao Chen A heuristic algorithm for partition strategy in distributed query processing. [Citation Graph (0, 0)][DBLP ] SAC, 1996, pp:196-200 [Conf ] Susan T. Dumais , Hao Chen Hierarchical classification of Web content. [Citation Graph (0, 0)][DBLP ] SIGIR, 2000, pp:256-263 [Conf ] Hao Chen , Guangming Xie Nonlinear mathematical model of switched reluctance machine system. [Citation Graph (0, 0)][DBLP ] SMC (7), 2004, pp:6054-6060 [Conf ] Lihua Yuan , Jianning Mai , Zhendong Su , Hao Chen , Chen-Nee Chuah , Prasant Mohapatra FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:199-213 [Conf ] Hao Chen , David Wagner , Drew Dean Setuid Demystified. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:171-190 [Conf ] Hao Chen , Burt M. Sharp Oliz, a suite of Perl scripts that assist in the design of microarrays using 50mer oligonucleotides from the 3' untranslated region. [Citation Graph (0, 0)][DBLP ] BMC Bioinformatics, 2002, v:3, n:, pp:27- [Journal ] Hao Chen , Burt M. Sharp Content-rich biological network constructed by mining PubMed abstracts. [Citation Graph (0, 0)][DBLP ] BMC Bioinformatics, 2004, v:5, n:, pp:147- [Journal ] George Turkiyyah , Duane W. Storti , Mark A. Ganter , Hao Chen , Munikumar Vimawala An accelerated triangulation method for computing the skeletons of free-form solid models. [Citation Graph (0, 0)][DBLP ] Computer-Aided Design, 1997, v:29, n:1, pp:5-19 [Journal ] Chen Hao , John A. Clark , Jeremy L. Jacob Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal ] Hao Chen , Pramod K. Varshney A human perception inspired quality metric for image fusion based on regional information. [Citation Graph (0, 0)][DBLP ] Information Fusion, 2007, v:8, n:2, pp:193-207 [Journal ] Arun Vishwanath , Hao Chen Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters. [Citation Graph (0, 0)][DBLP ] JASIST, 2006, v:57, n:11, pp:1451-1460 [Journal ] Zhenming Liu , Changkang Huang , Keqiang Fan , Ping Wei , Hao Chen , Shiyong Liu , Jianfeng Pei , Lei Shi , Bo Li , Kun Yang , Ying Liu , Luhua Lai Virtual Screening of Novel Noncovalent Inhibitors for SARS-CoV 3C-like Proteinase. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Modeling, 2005, v:45, n:1, pp:10-17 [Journal ] Jianfeng Pei , Hao Chen , Zhenming Liu , Xiaofeng Han , Qi Wang , Bin Shen , Jiaju Zhou , Luhua Lai Improving the Quality of 3D-QSAR by Using Flexible-Ligand Receptor Models. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Modeling, 2005, v:45, n:6, pp:1920-1933 [Journal ] Hao Chen On the minimum distances of Schubert codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1535-1538 [Journal ] Hao Chen Some good quantum error-correcting codes from algebraic-Geometric codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2059-2061 [Journal ] Hao Chen Fast algorithms for determining the linear complexity of sequences over GF(p/sup m/) with period 2/sup t/n. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:5, pp:1854-1856 [Journal ] Hao Chen Codes on Garcia-Stichtenoth Curves with True Distance Greater Than Feng-Rao Distance. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:706-709 [Journal ] Hao Chen On the number of correctable errors of the Feng-Rao decoding algorithm for AG codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1709-1712 [Journal ] Hao Chen On minimum Lee weights of Hensel lifts of some binary BCH codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2157-2162 [Journal ] Hao Chen , San Ling , Chaoping Xing Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2055-2058 [Journal ] Hao Chen , San Ling , Chaoping Xing Quantum codes from concatenated algebraic-geometric codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2915-2920 [Journal ] Hao Chen , Stephen S. Yau Contribution to Munuera's problem on the main conjecture of geometric hyperelliptic MDS codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1349-1354 [Journal ] Chaoping Xing , Hao Chen Improvements on parameters of one-point AG Codes from Hermitian curves. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:2, pp:535-537 [Journal ] Hao Chen , Jianying Hu , Richard Sproat Integrating geometrical and linguistic analysis for email signature block parsing. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 1999, v:17, n:4, pp:343-366 [Journal ] Hao Chen , Nicholas S. Flann , Daniel W. Watson Parallel Genetic Simulated Annealing: A Massively Parallel SIMD Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:2, pp:126-136 [Journal ] Francis Hsu , Hao Chen , Thomas Ristenpart , Jason Li , Zhendong Su Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:257-268 [Conf ] Hai Jin , Qionghua Hu , Xiaofei Liao , Hao Chen , Dafu Deng IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:119- [Conf ] Hao Chen , Ronald Cramer , Shafi Goldwasser , Robbert de Haan , Vinod Vaikuntanathan Secure Computation from Random Error Correcting Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:291-310 [Conf ] Rui Kang , ChaoXiong Xu , Hao Chen , Hongbo Xu A New Decoding Algorithm in MIMO-ZP-OFDM Systems. [Citation Graph (0, 0)][DBLP ] HCI (12), 2007, pp:130-135 [Conf ] Yong-Qin Tao , Du-Wu Cui , Xiang-Lin Miao , Hao Chen An Improved Swarm Intelligence Algorithm for Solving TSP Problem. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2007, pp:813-822 [Conf ] B. Vujicic , Hao Chen , L. Trajkovic Prediction of traffic in a public safety network. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Yi-Min Wang , Ming Ma , Yuan Niu , Hao Chen Spam double-funnel: connecting web spammers with advertisers. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:291-300 [Conf ] Hao Chen , Seapahn Megerian Efficient Data Collection through Compression-Centric Routing. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Hao Chen Linear Secret Sharing from Algebraic-Geometric Codes [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Hao Chen , Liang Ma , Jianhua Li Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Hao Chen Reducing the Computation of Linear Complexities of Periodic Sequences over GF(pm ) [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Hao Chen MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Hao Chen , Jianhua Li Lower Bounds on the Algebraic Immunity of Boolean Functions [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP ] Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. [Citation Graph (, )][DBLP ] OMash: enabling secure web mashups via object abstractions. [Citation Graph (, )][DBLP ] Multi-party off-the-record messaging. [Citation Graph (, )][DBLP ] Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. [Citation Graph (, )][DBLP ] A Novel Frame Error Concealment Algorithm Based on Dynamic Texture Synthesis. [Citation Graph (, )][DBLP ] Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. [Citation Graph (, )][DBLP ] Chinese text categorization study based on CBM learning. [Citation Graph (, )][DBLP ] Framework of Personalized Web-Oriented Data Management System. [Citation Graph (, )][DBLP ] Optimal feature selection algorithm based on quantum-inspired clone genetic strategy in text categorization. [Citation Graph (, )][DBLP ] Stochastic computational models for accurate reliability evaluation of logic circuits. [Citation Graph (, )][DBLP ] Dumpling: An Efficient Method Based on Clustering for Network Positioning. [Citation Graph (, )][DBLP ] A Proximity-Aware Load Balancing Algorithm in P2P Systems. [Citation Graph (, )][DBLP ] Service-Oriented Grid Computing for SAFORAH. [Citation Graph (, )][DBLP ] Dimensionality Reduction of Hyperspectral Images for Color Display using Segmented Independent Component Analysis. [Citation Graph (, )][DBLP ] Registration of high-dimensional remote sensing data based on a new dimensionality reduction rule. [Citation Graph (, )][DBLP ] Video coding using dynamic texture synthesis. [Citation Graph (, )][DBLP ] Temporal color Just Noticeable Distortion model and its application for video coding. [Citation Graph (, )][DBLP ] The application of decision tree in Chinese email classification. [Citation Graph (, )][DBLP ] Research of knowledge evolution system on simulation of human scientific knowledge. [Citation Graph (, )][DBLP ] Multilinear analysis based on image texture for face recognition. [Citation Graph (, )][DBLP ] Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator. [Citation Graph (, )][DBLP ] Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling. [Citation Graph (, )][DBLP ] Extracting Auto-Correlation Feature for License Plate Detection Based on AdaBoost. [Citation Graph (, )][DBLP ] Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. [Citation Graph (, )][DBLP ] Security Features and Technologies for E-business Architecture Design. [Citation Graph (, )][DBLP ] CapAuth: A Capability-based Handover Scheme. [Citation Graph (, )][DBLP ] vCUDA: GPU accelerated high performance computing in virtual machines. [Citation Graph (, )][DBLP ] An ANFIS Based Fuzzy Synthesis Judgment for Transformer Fault Diagnosis. [Citation Graph (, )][DBLP ] A quantitative approach to non-intrusive computing. [Citation Graph (, )][DBLP ] A Quantitative Study of Forum Spamming Using Context-based Analysis. [Citation Graph (, )][DBLP ] Exploiting Opportunistic Scheduling in Cellular Data Networks. [Citation Graph (, )][DBLP ] Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP ] iPhish: Phishing Vulnerabilities on Consumer Electronics. [Citation Graph (, )][DBLP ] DCSVS: Distributed Collaborative Set-Top-Box Video Service. [Citation Graph (, )][DBLP ] A New Parallel Algorithm for Training Feedforward Neural Networks Based on the Augmented Lagrange Multiplier Method. [Citation Graph (, )][DBLP ] Defending against sensor-sniffing attacks on mobile phones. [Citation Graph (, )][DBLP ] A Virus Immunization Model Based on Communities in Large Scale Networks. [Citation Graph (, )][DBLP ] Distributed authentication for low-cost wireless networks. [Citation Graph (, )][DBLP ] A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. [Citation Graph (, )][DBLP ] A novel approach for image fusion based on Markov Random Fields. [Citation Graph (, )][DBLP ] Efficient compromising resilient authentication schemes for large scale wireless sensor networks. [Citation Graph (, )][DBLP ] A Least Grade Page Replacement Algorithm for Web Cache Optimization. [Citation Graph (, )][DBLP ] A Reusable Component-Based Library for GUI Regression Testing. [Citation Graph (, )][DBLP ] A Ontology-Based Multimedia Resource Sharing Framework in Multimedia Science Paper Generation. [Citation Graph (, )][DBLP ] Noise Injection for Search Privacy Protection. [Citation Graph (, )][DBLP ] Personalized Information Retrieval Model Based on User Interests. [Citation Graph (, )][DBLP ] Research on Translucent Mechanism-Based Infeasible Path. [Citation Graph (, )][DBLP ] Sliding Mode Controller Design for an Aircraft Pitch Rate Track System. [Citation Graph (, )][DBLP ] Partner selection schemes for cooperative multi-hop relay networks. [Citation Graph (, )][DBLP ] A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP ] Cooperative relay for decentralized detection. [Citation Graph (, )][DBLP ] An Automatic Semantic Extraction Algorithm for XML Document. [Citation Graph (, )][DBLP ] Identification of amyloid fibril-forming segments based on structure and residue-based statistical potential. [Citation Graph (, )][DBLP ] Automated Design of Security Protocols. [Citation Graph (, )][DBLP ] CRT-Based High Speed Parallel Architecture for Long BCH Encoding [Citation Graph (, )][DBLP ] Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.662secs