The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hao Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chengwen Liu, Hao Chen, Warren Krueger
    A Distributed Query Processing Strategy Using Placement Dependency. [Citation Graph (1, 20)][DBLP]
    ICDE, 1996, pp:477-484 [Conf]
  2. Hao Chen, Shi Ying, Jin Liu, Wei Wang
    SE4SC: A Specific Search Engine for Software Components. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:863-868 [Conf]
  3. Jin Liu, Keqing He, Bing Li, Hao Chen, Liang Peng
    A Methodology for Acquisition of Software Component Attribute Ontology. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:1058-1064 [Conf]
  4. Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
    Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:13-22 [Conf]
  5. Hao Chen
    Update Operation and Partition Dependency in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:624-627 [Conf]
  6. Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han
    Server Scheduling Scheme for Asynchronous Cluster Video Server. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:509-513 [Conf]
  7. Hao Chen, Hai Jin, Jianhua Sun, Dafu Deng, Xiaofei Liao
    Analysis of large-scale topological properties for peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:27-34 [Conf]
  8. Hao Chen, Jonathan S. Shapiro
    Using build-integrated static checking to preserve correctness invariants. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:288-297 [Conf]
  9. Hao Chen, David Wagner
    MOPS: an infrastructure for examining security properties of software. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf]
  10. Hao Chen, Susan T. Dumais
    Bringing order to the Web: automatically categorizing search results. [Citation Graph (0, 0)][DBLP]
    CHI, 2000, pp:145-152 [Conf]
  11. Susan T. Dumais, Edward Cutrell, Hao Chen
    Optimizing search by showing results in context. [Citation Graph (0, 0)][DBLP]
    CHI, 2001, pp:277-284 [Conf]
  12. Hao Chen, Ronald Cramer
    Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:521-536 [Conf]
  13. Weiyu Wu, Hao Chen
    An Ubicomp-Based Model of Cooperative Design System for Architectural Engineering. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:365-368 [Conf]
  14. Hao Chen, Chengwen Liu
    Maintenance of Placement Dependency in Distributed Multidatabase Systems. [Citation Graph (0, 13)][DBLP]
    DASFAA, 1999, pp:339-346 [Conf]
  15. Chengwen Liu, Hao Chen
    A Hash Partition Strategy for Distributed Query Processing. [Citation Graph (0, 19)][DBLP]
    EDBT, 1996, pp:373-387 [Conf]
  16. Xiaofei Liao, Hai Jin, Hao Chen
    Lemming: A Novel Resource Lookup Scheme for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:1024-1033 [Conf]
  17. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
    A Fuzzy Data Mining Based Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:191-197 [Conf]
  18. Hao Chen, John Clark, Jeremy Jacob
    Human competitive security protocols synthesis. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1855-1856 [Conf]
  19. Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han
    Efficient Immunization Algorithm for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    HiPC, 2004, pp:232-241 [Conf]
  20. Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han
    Efficient Immunization Algorithm for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:623-626 [Conf]
  21. Hao Chen, Oscar E. Agazzi, Ching Y. Suen
    Piecewise Linear Modulation Model of Handwriting. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1997, pp:363-368 [Conf]
  22. Hao Chen, Jian Tang
    An Efficient Method for Mutual Exclusion in Truly Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1994, pp:97-104 [Conf]
  23. Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han
    A Compound Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:370-381 [Conf]
  24. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
    A Risk-Sensitive Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:107-117 [Conf]
  25. Hao Chen, Chengwen Liu
    An Efficient Algorithm for Processing Distributed Queries Using Partition Dependency. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2000, pp:339-346 [Conf]
  26. Hao Chen, Dong Zhang
    The Switched Reluctance Motor Drive for the Direct-Drive Joint of the Robot. [Citation Graph (0, 0)][DBLP]
    ICRA, 2001, pp:1439-1443 [Conf]
  27. Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou
    A Data Mining Based Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:677-684 [Conf]
  28. Hai Jin, Dan Tang, Yongkun Zhang, Hao Chen
    SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  29. Hai Jin, Xia Xie, Yunfa Li, Zongfen Han, Hao Chen
    Athena: A Real-time Performance Evaluation for Distributed Software with Reliability Constraints. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  30. Dafu Deng, Hai Jin, Chao Zhang, Hao Chen, Xiaofei Liao
    Honeycomb: A Peer-to-Peer Substrate for On-Demand Media Streaming Service. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:330-339 [Conf]
  31. Hao Chen, Ljiljana Trajkovi
    Simulation of Route Optimization in Mobile IP. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:847-848 [Conf]
  32. Hai Jin, Hao Chen, Jianhua Sun
    Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems. [Citation Graph (0, 0)][DBLP]
    MMM, 2003, pp:493-0 [Conf]
  33. Hao Chen, Drew Dean, David Wagner
    Model Checking One Million Lines of C Code. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  34. Dafu Deng, Hai Jin, Xiaofei Liao, Hao Chen
    CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:238-243 [Conf]
  35. Hao Chen, Nicholas S. Flann
    Parallel Simulated Annealing and Genetic Algorithms: a Space of Hybrid Methods. [Citation Graph (0, 0)][DBLP]
    PPSN, 1994, pp:428-438 [Conf]
  36. Lili Pan, Junyi Li, Beiji Zou, Hao Chen
    Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:235-244 [Conf]
  37. Chengwen Liu, Hao Chen
    A heuristic algorithm for partition strategy in distributed query processing. [Citation Graph (0, 0)][DBLP]
    SAC, 1996, pp:196-200 [Conf]
  38. Susan T. Dumais, Hao Chen
    Hierarchical classification of Web content. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2000, pp:256-263 [Conf]
  39. Hao Chen, Guangming Xie
    Nonlinear mathematical model of switched reluctance machine system. [Citation Graph (0, 0)][DBLP]
    SMC (7), 2004, pp:6054-6060 [Conf]
  40. Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
    FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:199-213 [Conf]
  41. Hao Chen, David Wagner, Drew Dean
    Setuid Demystified. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:171-190 [Conf]
  42. Hao Chen, Burt M. Sharp
    Oliz, a suite of Perl scripts that assist in the design of microarrays using 50mer oligonucleotides from the 3' untranslated region. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2002, v:3, n:, pp:27- [Journal]
  43. Hao Chen, Burt M. Sharp
    Content-rich biological network constructed by mining PubMed abstracts. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2004, v:5, n:, pp:147- [Journal]
  44. George Turkiyyah, Duane W. Storti, Mark A. Ganter, Hao Chen, Munikumar Vimawala
    An accelerated triangulation method for computing the skeletons of free-form solid models. [Citation Graph (0, 0)][DBLP]
    Computer-Aided Design, 1997, v:29, n:1, pp:5-19 [Journal]
  45. Chen Hao, John A. Clark, Jeremy L. Jacob
    Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal]
  46. Hao Chen, Pramod K. Varshney
    A human perception inspired quality metric for image fusion based on regional information. [Citation Graph (0, 0)][DBLP]
    Information Fusion, 2007, v:8, n:2, pp:193-207 [Journal]
  47. Arun Vishwanath, Hao Chen
    Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters. [Citation Graph (0, 0)][DBLP]
    JASIST, 2006, v:57, n:11, pp:1451-1460 [Journal]
  48. Zhenming Liu, Changkang Huang, Keqiang Fan, Ping Wei, Hao Chen, Shiyong Liu, Jianfeng Pei, Lei Shi, Bo Li, Kun Yang, Ying Liu, Luhua Lai
    Virtual Screening of Novel Noncovalent Inhibitors for SARS-CoV 3C-like Proteinase. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Modeling, 2005, v:45, n:1, pp:10-17 [Journal]
  49. Jianfeng Pei, Hao Chen, Zhenming Liu, Xiaofeng Han, Qi Wang, Bin Shen, Jiaju Zhou, Luhua Lai
    Improving the Quality of 3D-QSAR by Using Flexible-Ligand Receptor Models. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Modeling, 2005, v:45, n:6, pp:1920-1933 [Journal]
  50. Hao Chen
    On the minimum distances of Schubert codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1535-1538 [Journal]
  51. Hao Chen
    Some good quantum error-correcting codes from algebraic-Geometric codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2059-2061 [Journal]
  52. Hao Chen
    Fast algorithms for determining the linear complexity of sequences over GF(p/sup m/) with period 2/sup t/n. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:5, pp:1854-1856 [Journal]
  53. Hao Chen
    Codes on Garcia-Stichtenoth Curves with True Distance Greater Than Feng-Rao Distance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:706-709 [Journal]
  54. Hao Chen
    On the number of correctable errors of the Feng-Rao decoding algorithm for AG codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1709-1712 [Journal]
  55. Hao Chen
    On minimum Lee weights of Hensel lifts of some binary BCH codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2157-2162 [Journal]
  56. Hao Chen, San Ling, Chaoping Xing
    Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2055-2058 [Journal]
  57. Hao Chen, San Ling, Chaoping Xing
    Quantum codes from concatenated algebraic-geometric codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2915-2920 [Journal]
  58. Hao Chen, Stephen S. Yau
    Contribution to Munuera's problem on the main conjecture of geometric hyperelliptic MDS codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1349-1354 [Journal]
  59. Chaoping Xing, Hao Chen
    Improvements on parameters of one-point AG Codes from Hermitian curves. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:2, pp:535-537 [Journal]
  60. Hao Chen, Jianying Hu, Richard Sproat
    Integrating geometrical and linguistic analysis for email signature block parsing. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1999, v:17, n:4, pp:343-366 [Journal]
  61. Hao Chen, Nicholas S. Flann, Daniel W. Watson
    Parallel Genetic Simulated Annealing: A Massively Parallel SIMD Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:2, pp:126-136 [Journal]
  62. Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
    Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:257-268 [Conf]
  63. Hai Jin, Qionghua Hu, Xiaofei Liao, Hao Chen, Dafu Deng
    IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2005, pp:119- [Conf]
  64. Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
    Secure Computation from Random Error Correcting Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:291-310 [Conf]
  65. Rui Kang, ChaoXiong Xu, Hao Chen, Hongbo Xu
    A New Decoding Algorithm in MIMO-ZP-OFDM Systems. [Citation Graph (0, 0)][DBLP]
    HCI (12), 2007, pp:130-135 [Conf]
  66. Yong-Qin Tao, Du-Wu Cui, Xiang-Lin Miao, Hao Chen
    An Improved Swarm Intelligence Algorithm for Solving TSP Problem. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:813-822 [Conf]
  67. B. Vujicic, Hao Chen, L. Trajkovic
    Prediction of traffic in a public safety network. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  68. Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
    Spam double-funnel: connecting web spammers with advertisers. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:291-300 [Conf]
  69. Hao Chen, Seapahn Megerian
    Efficient Data Collection through Compression-Centric Routing. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  70. Hao Chen
    Linear Secret Sharing from Algebraic-Geometric Codes [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  71. Hao Chen, Liang Ma, Jianhua Li
    Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  72. Hao Chen
    Reducing the Computation of Linear Complexities of Periodic Sequences over GF(pm) [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  73. Hao Chen
    MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  74. Hao Chen, Jianhua Li
    Lower Bounds on the Algebraic Immunity of Boolean Functions [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  75. Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP]


  76. Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. [Citation Graph (, )][DBLP]


  77. OMash: enabling secure web mashups via object abstractions. [Citation Graph (, )][DBLP]


  78. Multi-party off-the-record messaging. [Citation Graph (, )][DBLP]


  79. Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. [Citation Graph (, )][DBLP]


  80. A Novel Frame Error Concealment Algorithm Based on Dynamic Texture Synthesis. [Citation Graph (, )][DBLP]


  81. Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. [Citation Graph (, )][DBLP]


  82. Chinese text categorization study based on CBM learning. [Citation Graph (, )][DBLP]


  83. Framework of Personalized Web-Oriented Data Management System. [Citation Graph (, )][DBLP]


  84. Optimal feature selection algorithm based on quantum-inspired clone genetic strategy in text categorization. [Citation Graph (, )][DBLP]


  85. Stochastic computational models for accurate reliability evaluation of logic circuits. [Citation Graph (, )][DBLP]


  86. Dumpling: An Efficient Method Based on Clustering for Network Positioning. [Citation Graph (, )][DBLP]


  87. A Proximity-Aware Load Balancing Algorithm in P2P Systems. [Citation Graph (, )][DBLP]


  88. Service-Oriented Grid Computing for SAFORAH. [Citation Graph (, )][DBLP]


  89. Dimensionality Reduction of Hyperspectral Images for Color Display using Segmented Independent Component Analysis. [Citation Graph (, )][DBLP]


  90. Registration of high-dimensional remote sensing data based on a new dimensionality reduction rule. [Citation Graph (, )][DBLP]


  91. Video coding using dynamic texture synthesis. [Citation Graph (, )][DBLP]


  92. Temporal color Just Noticeable Distortion model and its application for video coding. [Citation Graph (, )][DBLP]


  93. The application of decision tree in Chinese email classification. [Citation Graph (, )][DBLP]


  94. Research of knowledge evolution system on simulation of human scientific knowledge. [Citation Graph (, )][DBLP]


  95. Multilinear analysis based on image texture for face recognition. [Citation Graph (, )][DBLP]


  96. Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator. [Citation Graph (, )][DBLP]


  97. Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling. [Citation Graph (, )][DBLP]


  98. Extracting Auto-Correlation Feature for License Plate Detection Based on AdaBoost. [Citation Graph (, )][DBLP]


  99. Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. [Citation Graph (, )][DBLP]


  100. Security Features and Technologies for E-business Architecture Design. [Citation Graph (, )][DBLP]


  101. CapAuth: A Capability-based Handover Scheme. [Citation Graph (, )][DBLP]


  102. vCUDA: GPU accelerated high performance computing in virtual machines. [Citation Graph (, )][DBLP]


  103. An ANFIS Based Fuzzy Synthesis Judgment for Transformer Fault Diagnosis. [Citation Graph (, )][DBLP]


  104. A quantitative approach to non-intrusive computing. [Citation Graph (, )][DBLP]


  105. A Quantitative Study of Forum Spamming Using Context-based Analysis. [Citation Graph (, )][DBLP]


  106. Exploiting Opportunistic Scheduling in Cellular Data Networks. [Citation Graph (, )][DBLP]


  107. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]


  108. iPhish: Phishing Vulnerabilities on Consumer Electronics. [Citation Graph (, )][DBLP]


  109. DCSVS: Distributed Collaborative Set-Top-Box Video Service. [Citation Graph (, )][DBLP]


  110. A New Parallel Algorithm for Training Feedforward Neural Networks Based on the Augmented Lagrange Multiplier Method. [Citation Graph (, )][DBLP]


  111. Defending against sensor-sniffing attacks on mobile phones. [Citation Graph (, )][DBLP]


  112. A Virus Immunization Model Based on Communities in Large Scale Networks. [Citation Graph (, )][DBLP]


  113. Distributed authentication for low-cost wireless networks. [Citation Graph (, )][DBLP]


  114. A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. [Citation Graph (, )][DBLP]


  115. A novel approach for image fusion based on Markov Random Fields. [Citation Graph (, )][DBLP]


  116. Efficient compromising resilient authentication schemes for large scale wireless sensor networks. [Citation Graph (, )][DBLP]


  117. A Least Grade Page Replacement Algorithm for Web Cache Optimization. [Citation Graph (, )][DBLP]


  118. A Reusable Component-Based Library for GUI Regression Testing. [Citation Graph (, )][DBLP]


  119. A Ontology-Based Multimedia Resource Sharing Framework in Multimedia Science Paper Generation. [Citation Graph (, )][DBLP]


  120. Noise Injection for Search Privacy Protection. [Citation Graph (, )][DBLP]


  121. Personalized Information Retrieval Model Based on User Interests. [Citation Graph (, )][DBLP]


  122. Research on Translucent Mechanism-Based Infeasible Path. [Citation Graph (, )][DBLP]


  123. Sliding Mode Controller Design for an Aircraft Pitch Rate Track System. [Citation Graph (, )][DBLP]


  124. Partner selection schemes for cooperative multi-hop relay networks. [Citation Graph (, )][DBLP]


  125. A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP]


  126. Cooperative relay for decentralized detection. [Citation Graph (, )][DBLP]


  127. An Automatic Semantic Extraction Algorithm for XML Document. [Citation Graph (, )][DBLP]


  128. Identification of amyloid fibril-forming segments based on structure and residue-based statistical potential. [Citation Graph (, )][DBLP]


  129. Automated Design of Security Protocols. [Citation Graph (, )][DBLP]


  130. CRT-Based High Speed Parallel Architecture for Long BCH Encoding [Citation Graph (, )][DBLP]


  131. Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks [Citation Graph (, )][DBLP]


Search in 0.291secs, Finished in 0.295secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002