The SCEAS System
| |||||||

## Search the dblp DataBase
Hao Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Chengwen Liu, Hao Chen, Warren Krueger
**A Distributed Query Processing Strategy Using Placement Dependency.**[Citation Graph (1, 20)][DBLP] ICDE, 1996, pp:477-484 [Conf] - Hao Chen, Shi Ying, Jin Liu, Wei Wang
**SE4SC: A Specific Search Engine for Software Components.**[Citation Graph (0, 0)][DBLP] CIT, 2004, pp:863-868 [Conf] - Jin Liu, Keqing He, Bing Li, Hao Chen, Liang Peng
**A Methodology for Acquisition of Software Component Attribute Ontology.**[Citation Graph (0, 0)][DBLP] CIT, 2004, pp:1058-1064 [Conf] - Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
**Model Checking An Entire Linux Distribution for Security Violations.**[Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:13-22 [Conf] - Hao Chen
**Update Operation and Partition Dependency in Distributed Database Systems.**[Citation Graph (0, 0)][DBLP] AINA, 2003, pp:624-627 [Conf] - Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han
**Server Scheduling Scheme for Asynchronous Cluster Video Server.**[Citation Graph (0, 0)][DBLP] AINA, 2003, pp:509-513 [Conf] - Hao Chen, Hai Jin, Jianhua Sun, Dafu Deng, Xiaofei Liao
**Analysis of large-scale topological properties for peer-to-peer networks.**[Citation Graph (0, 0)][DBLP] CCGRID, 2004, pp:27-34 [Conf] - Hao Chen, Jonathan S. Shapiro
**Using build-integrated static checking to preserve correctness invariants.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:288-297 [Conf] - Hao Chen, David Wagner
**MOPS: an infrastructure for examining security properties of software.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:235-244 [Conf] - Hao Chen, Susan T. Dumais
**Bringing order to the Web: automatically categorizing search results.**[Citation Graph (0, 0)][DBLP] CHI, 2000, pp:145-152 [Conf] - Susan T. Dumais, Edward Cutrell, Hao Chen
**Optimizing search by showing results in context.**[Citation Graph (0, 0)][DBLP] CHI, 2001, pp:277-284 [Conf] - Hao Chen, Ronald Cramer
**Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:521-536 [Conf] - Weiyu Wu, Hao Chen
**An Ubicomp-Based Model of Cooperative Design System for Architectural Engineering.**[Citation Graph (0, 0)][DBLP] CSCWD, 2006, pp:365-368 [Conf] - Hao Chen, Chengwen Liu
**Maintenance of Placement Dependency in Distributed Multidatabase Systems.**[Citation Graph (0, 13)][DBLP] DASFAA, 1999, pp:339-346 [Conf] - Chengwen Liu, Hao Chen
**A Hash Partition Strategy for Distributed Query Processing.**[Citation Graph (0, 19)][DBLP] EDBT, 1996, pp:373-387 [Conf] - Xiaofei Liao, Hai Jin, Hao Chen
**Lemming: A Novel Resource Lookup Scheme for Peer-to-Peer Networks.**[Citation Graph (0, 0)][DBLP] EUC, 2004, pp:1024-1033 [Conf] - Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
**A Fuzzy Data Mining Based Intrusion Detection Model.**[Citation Graph (0, 0)][DBLP] FTDCS, 2004, pp:191-197 [Conf] - Hao Chen, John Clark, Jeremy Jacob
**Human competitive security protocols synthesis.**[Citation Graph (0, 0)][DBLP] GECCO, 2006, pp:1855-1856 [Conf] - Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han
**Efficient Immunization Algorithm for Peer-to-Peer Networks.**[Citation Graph (0, 0)][DBLP] HiPC, 2004, pp:232-241 [Conf] - Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han
**Efficient Immunization Algorithm for Peer-to-Peer Networks.**[Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2004, pp:623-626 [Conf] - Hao Chen, Oscar E. Agazzi, Ching Y. Suen
**Piecewise Linear Modulation Model of Handwriting.**[Citation Graph (0, 0)][DBLP] ICDAR, 1997, pp:363-368 [Conf] - Hao Chen, Jian Tang
**An Efficient Method for Mutual Exclusion in Truly Distributed Systems.**[Citation Graph (0, 0)][DBLP] ICDCS, 1994, pp:97-104 [Conf] - Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han
**A Compound Intrusion Detection Model.**[Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:370-381 [Conf] - Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
**A Risk-Sensitive Intrusion Detection Model.**[Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:107-117 [Conf] - Hao Chen, Chengwen Liu
**An Efficient Algorithm for Processing Distributed Queries Using Partition Dependency.**[Citation Graph (0, 0)][DBLP] ICPADS, 2000, pp:339-346 [Conf] - Hao Chen, Dong Zhang
**The Switched Reluctance Motor Drive for the Direct-Drive Joint of the Robot.**[Citation Graph (0, 0)][DBLP] ICRA, 2001, pp:1439-1443 [Conf] - Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou
**A Data Mining Based Intrusion Detection Model.**[Citation Graph (0, 0)][DBLP] IDEAL, 2003, pp:677-684 [Conf] - Hai Jin, Dan Tang, Yongkun Zhang, Hao Chen
**SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff.**[Citation Graph (0, 0)][DBLP] IPDPS, 2004, pp:- [Conf] - Hai Jin, Xia Xie, Yunfa Li, Zongfen Han, Hao Chen
**Athena: A Real-time Performance Evaluation for Distributed Software with Reliability Constraints.**[Citation Graph (0, 0)][DBLP] IPDPS, 2004, pp:- [Conf] - Dafu Deng, Hai Jin, Chao Zhang, Hao Chen, Xiaofei Liao
**Honeycomb: A Peer-to-Peer Substrate for On-Demand Media Streaming Service.**[Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:330-339 [Conf] - Hao Chen, Ljiljana Trajkovi
**Simulation of Route Optimization in Mobile IP.**[Citation Graph (0, 0)][DBLP] LCN, 2002, pp:847-848 [Conf] - Hai Jin, Hao Chen, Jianhua Sun
**Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems.**[Citation Graph (0, 0)][DBLP] MMM, 2003, pp:493-0 [Conf] - Hao Chen, Drew Dean, David Wagner
**Model Checking One Million Lines of C Code.**[Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf] - Dafu Deng, Hai Jin, Xiaofei Liao, Hao Chen
**CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers.**[Citation Graph (0, 0)][DBLP] NPC, 2004, pp:238-243 [Conf] - Hao Chen, Nicholas S. Flann
**Parallel Simulated Annealing and Genetic Algorithms: a Space of Hybrid Methods.**[Citation Graph (0, 0)][DBLP] PPSN, 1994, pp:428-438 [Conf] - Lili Pan, Junyi Li, Beiji Zou, Hao Chen
**Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage.**[Citation Graph (0, 0)][DBLP] PRDC, 2005, pp:235-244 [Conf] - Chengwen Liu, Hao Chen
**A heuristic algorithm for partition strategy in distributed query processing.**[Citation Graph (0, 0)][DBLP] SAC, 1996, pp:196-200 [Conf] - Susan T. Dumais, Hao Chen
**Hierarchical classification of Web content.**[Citation Graph (0, 0)][DBLP] SIGIR, 2000, pp:256-263 [Conf] - Hao Chen, Guangming Xie
**Nonlinear mathematical model of switched reluctance machine system.**[Citation Graph (0, 0)][DBLP] SMC (7), 2004, pp:6054-6060 [Conf] - Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
**FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.**[Citation Graph (0, 0)][DBLP] S&P, 2006, pp:199-213 [Conf] - Hao Chen, David Wagner, Drew Dean
**Setuid Demystified.**[Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:171-190 [Conf] - Hao Chen, Burt M. Sharp
**Oliz, a suite of Perl scripts that assist in the design of microarrays using 50mer oligonucleotides from the 3' untranslated region.**[Citation Graph (0, 0)][DBLP] BMC Bioinformatics, 2002, v:3, n:, pp:27- [Journal] - Hao Chen, Burt M. Sharp
**Content-rich biological network constructed by mining PubMed abstracts.**[Citation Graph (0, 0)][DBLP] BMC Bioinformatics, 2004, v:5, n:, pp:147- [Journal] - George Turkiyyah, Duane W. Storti, Mark A. Ganter, Hao Chen, Munikumar Vimawala
**An accelerated triangulation method for computing the skeletons of free-form solid models.**[Citation Graph (0, 0)][DBLP] Computer-Aided Design, 1997, v:29, n:1, pp:5-19 [Journal] - Chen Hao, John A. Clark, Jeremy L. Jacob
**Synthesising Efficient and Effective Security Protocols.**[Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal] - Hao Chen, Pramod K. Varshney
**A human perception inspired quality metric for image fusion based on regional information.**[Citation Graph (0, 0)][DBLP] Information Fusion, 2007, v:8, n:2, pp:193-207 [Journal] - Arun Vishwanath, Hao Chen
**Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters.**[Citation Graph (0, 0)][DBLP] JASIST, 2006, v:57, n:11, pp:1451-1460 [Journal] - Zhenming Liu, Changkang Huang, Keqiang Fan, Ping Wei, Hao Chen, Shiyong Liu, Jianfeng Pei, Lei Shi, Bo Li, Kun Yang, Ying Liu, Luhua Lai
**Virtual Screening of Novel Noncovalent Inhibitors for SARS-CoV 3C-like Proteinase.**[Citation Graph (0, 0)][DBLP] Journal of Chemical Information and Modeling, 2005, v:45, n:1, pp:10-17 [Journal] - Jianfeng Pei, Hao Chen, Zhenming Liu, Xiaofeng Han, Qi Wang, Bin Shen, Jiaju Zhou, Luhua Lai
**Improving the Quality of 3D-QSAR by Using Flexible-Ligand Receptor Models.**[Citation Graph (0, 0)][DBLP] Journal of Chemical Information and Modeling, 2005, v:45, n:6, pp:1920-1933 [Journal] - Hao Chen
**On the minimum distances of Schubert codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1535-1538 [Journal] - Hao Chen
**Some good quantum error-correcting codes from algebraic-Geometric codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2059-2061 [Journal] - Hao Chen
**Fast algorithms for determining the linear complexity of sequences over GF(p/sup m/) with period 2/sup t/n.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:5, pp:1854-1856 [Journal] - Hao Chen
**Codes on Garcia-Stichtenoth Curves with True Distance Greater Than Feng-Rao Distance.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:706-709 [Journal] - Hao Chen
**On the number of correctable errors of the Feng-Rao decoding algorithm for AG codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1709-1712 [Journal] - Hao Chen
**On minimum Lee weights of Hensel lifts of some binary BCH codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:2157-2162 [Journal] - Hao Chen, San Ling, Chaoping Xing
**Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:5, pp:2055-2058 [Journal] - Hao Chen, San Ling, Chaoping Xing
**Quantum codes from concatenated algebraic-geometric codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2915-2920 [Journal] - Hao Chen, Stephen S. Yau
**Contribution to Munuera's problem on the main conjecture of geometric hyperelliptic MDS codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1349-1354 [Journal] - Chaoping Xing, Hao Chen
**Improvements on parameters of one-point AG Codes from Hermitian curves.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:2, pp:535-537 [Journal] - Hao Chen, Jianying Hu, Richard Sproat
**Integrating geometrical and linguistic analysis for email signature block parsing.**[Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst., 1999, v:17, n:4, pp:343-366 [Journal] - Hao Chen, Nicholas S. Flann, Daniel W. Watson
**Parallel Genetic Simulated Annealing: A Massively Parallel SIMD Algorithm.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:2, pp:126-136 [Journal] - Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
**Back to the Future: A Framework for Automatic Malware Removal and System Repair.**[Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:257-268 [Conf] - Hai Jin, Qionghua Hu, Xiaofei Liao, Hao Chen, Dafu Deng
**IMAC: an importance-level based adaptive CPU scheduling scheme for multimedia and non-real time applications.**[Citation Graph (0, 0)][DBLP] AICCSA, 2005, pp:119- [Conf] - Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
**Secure Computation from Random Error Correcting Codes.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:291-310 [Conf] - Rui Kang, ChaoXiong Xu, Hao Chen, Hongbo Xu
**A New Decoding Algorithm in MIMO-ZP-OFDM Systems.**[Citation Graph (0, 0)][DBLP] HCI (12), 2007, pp:130-135 [Conf] - Yong-Qin Tao, Du-Wu Cui, Xiang-Lin Miao, Hao Chen
**An Improved Swarm Intelligence Algorithm for Solving TSP Problem.**[Citation Graph (0, 0)][DBLP] ICIC (2), 2007, pp:813-822 [Conf] - B. Vujicic, Hao Chen, L. Trajkovic
**Prediction of traffic in a public safety network.**[Citation Graph (0, 0)][DBLP] ISCAS, 2006, pp:- [Conf] - Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
**Spam double-funnel: connecting web spammers with advertisers.**[Citation Graph (0, 0)][DBLP] WWW, 2007, pp:291-300 [Conf] - Hao Chen, Seapahn Megerian
**Efficient Data Collection through Compression-Centric Routing.**[Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf] - Hao Chen
**Linear Secret Sharing from Algebraic-Geometric Codes**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] - Hao Chen, Liang Ma, Jianhua Li
**Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] - Hao Chen
**Reducing the Computation of Linear Complexities of Periodic Sequences over GF(p**[Citation Graph (0, 0)][DBLP]^{m}) CoRR, 2006, v:0, n:, pp:- [Journal] - Hao Chen
**MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] - Hao Chen, Jianhua Li
**Lower Bounds on the Algebraic Immunity of Boolean Functions**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] **Optimising IDS Sensor Placement.**[Citation Graph (, )][DBLP]**Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.**[Citation Graph (, )][DBLP]**OMash: enabling secure web mashups via object abstractions.**[Citation Graph (, )][DBLP]**Multi-party off-the-record messaging.**[Citation Graph (, )][DBLP]**Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over**[Citation Graph (, )][DBLP]*Any*Fixed Finite Field.**A Novel Frame Error Concealment Algorithm Based on Dynamic Texture Synthesis.**[Citation Graph (, )][DBLP]**Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves.**[Citation Graph (, )][DBLP]**Chinese text categorization study based on CBM learning.**[Citation Graph (, )][DBLP]**Framework of Personalized Web-Oriented Data Management System.**[Citation Graph (, )][DBLP]**Optimal feature selection algorithm based on quantum-inspired clone genetic strategy in text categorization.**[Citation Graph (, )][DBLP]**Stochastic computational models for accurate reliability evaluation of logic circuits.**[Citation Graph (, )][DBLP]**Dumpling: An Efficient Method Based on Clustering for Network Positioning.**[Citation Graph (, )][DBLP]**A Proximity-Aware Load Balancing Algorithm in P2P Systems.**[Citation Graph (, )][DBLP]**Service-Oriented Grid Computing for SAFORAH.**[Citation Graph (, )][DBLP]**Dimensionality Reduction of Hyperspectral Images for Color Display using Segmented Independent Component Analysis.**[Citation Graph (, )][DBLP]**Registration of high-dimensional remote sensing data based on a new dimensionality reduction rule.**[Citation Graph (, )][DBLP]**Video coding using dynamic texture synthesis.**[Citation Graph (, )][DBLP]**Temporal color Just Noticeable Distortion model and its application for video coding.**[Citation Graph (, )][DBLP]**The application of decision tree in Chinese email classification.**[Citation Graph (, )][DBLP]**Research of knowledge evolution system on simulation of human scientific knowledge.**[Citation Graph (, )][DBLP]**Multilinear analysis based on image texture for face recognition.**[Citation Graph (, )][DBLP]**Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator.**[Citation Graph (, )][DBLP]**Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling.**[Citation Graph (, )][DBLP]**Extracting Auto-Correlation Feature for License Plate Detection Based on AdaBoost.**[Citation Graph (, )][DBLP]**Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.**[Citation Graph (, )][DBLP]**Security Features and Technologies for E-business Architecture Design.**[Citation Graph (, )][DBLP]**CapAuth: A Capability-based Handover Scheme.**[Citation Graph (, )][DBLP]**vCUDA: GPU accelerated high performance computing in virtual machines.**[Citation Graph (, )][DBLP]**An ANFIS Based Fuzzy Synthesis Judgment for Transformer Fault Diagnosis.**[Citation Graph (, )][DBLP]**A quantitative approach to non-intrusive computing.**[Citation Graph (, )][DBLP]**A Quantitative Study of Forum Spamming Using Context-based Analysis.**[Citation Graph (, )][DBLP]**Exploiting Opportunistic Scheduling in Cellular Data Networks.**[Citation Graph (, )][DBLP]**Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.**[Citation Graph (, )][DBLP]**iPhish: Phishing Vulnerabilities on Consumer Electronics.**[Citation Graph (, )][DBLP]**DCSVS: Distributed Collaborative Set-Top-Box Video Service.**[Citation Graph (, )][DBLP]**A New Parallel Algorithm for Training Feedforward Neural Networks Based on the Augmented Lagrange Multiplier Method.**[Citation Graph (, )][DBLP]**Defending against sensor-sniffing attacks on mobile phones.**[Citation Graph (, )][DBLP]**A Virus Immunization Model Based on Communities in Large Scale Networks.**[Citation Graph (, )][DBLP]**Distributed authentication for low-cost wireless networks.**[Citation Graph (, )][DBLP]**A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks.**[Citation Graph (, )][DBLP]**A novel approach for image fusion based on Markov Random Fields.**[Citation Graph (, )][DBLP]**Efficient compromising resilient authentication schemes for large scale wireless sensor networks.**[Citation Graph (, )][DBLP]**A Least Grade Page Replacement Algorithm for Web Cache Optimization.**[Citation Graph (, )][DBLP]**A Reusable Component-Based Library for GUI Regression Testing.**[Citation Graph (, )][DBLP]**A Ontology-Based Multimedia Resource Sharing Framework in Multimedia Science Paper Generation.**[Citation Graph (, )][DBLP]**Noise Injection for Search Privacy Protection.**[Citation Graph (, )][DBLP]**Personalized Information Retrieval Model Based on User Interests.**[Citation Graph (, )][DBLP]**Research on Translucent Mechanism-Based Infeasible Path.**[Citation Graph (, )][DBLP]**Sliding Mode Controller Design for an Aircraft Pitch Rate Track System.**[Citation Graph (, )][DBLP]**Partner selection schemes for cooperative multi-hop relay networks.**[Citation Graph (, )][DBLP]**A Deployment Value Model for Intrusion Detection Sensors.**[Citation Graph (, )][DBLP]**Cooperative relay for decentralized detection.**[Citation Graph (, )][DBLP]**An Automatic Semantic Extraction Algorithm for XML Document.**[Citation Graph (, )][DBLP]**Identification of amyloid fibril-forming segments based on structure and residue-based statistical potential.**[Citation Graph (, )][DBLP]**Automated Design of Security Protocols.**[Citation Graph (, )][DBLP]**CRT-Based High Speed Parallel Architecture for Long BCH Encoding**[Citation Graph (, )][DBLP]**Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks**[Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.010secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |