The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lin Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lin Chen, ZhiYun Yang, ZhengQuan Xu
    A Degree-Delay-Constrained Genetic Algorithm for Multicast Routing Tree. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:1033-1038 [Conf]
  2. Lin Chen, Minglu Li, Jian Cao, Yi Wang
    An ECA Rule-based Workflow Design Tool for Shanghai Grid. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:325-328 [Conf]
  3. Xiaoqin Huang, Linpeng Huang, Lin Chen, Minglu Li
    Design and Implementation of an Agent-Based Web Services Platform for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:643-646 [Conf]
  4. Lin Chen, Minglu Li, Min-You Wu
    Scalable Backbone for Wireless Metropolitan Grid. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:595-599 [Conf]
  5. Lin Chen, Jie Huang, Zheng-Hu Gong
    An Anti-noise Text Categorization Method Based on Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:272-278 [Conf]
  6. Lin Chen, Xiaoqin Huang, Jinyuan You
    Fair Tracing Without Trustees for Multiple Banks. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:1061-1066 [Conf]
  7. Lin Chen
    A Selected Tour of the Theory of Identification Matrices. [Citation Graph (0, 0)][DBLP]
    COCOON, 1997, pp:222-231 [Conf]
  8. Lin Chen
    Optimal Circular Arc Representations. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1995, pp:255-266 [Conf]
  9. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
    Routing Algorithm Using SkipNet and Small-World for Peer-to-Peer System. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:984-989 [Conf]
  10. Tianchi Ma, Lin Chen, Cho-Li Wang, Francis C. M. Lau
    G-PASS: Security Infrastructure for Grid Travelers. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:301-308 [Conf]
  11. Yi Wang, Minglu Li, Jian Cao, Feilong Tang, Lin Chen, Lei Cao
    An ECA-Rule-Based Workflow Management Approach for Web Services Composition. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:143-148 [Conf]
  12. Lin Chen, Xiaoqin Huang, Jinyuan You
    Certificate-Based Authentication and Authorization Architecture in Digital Library. [Citation Graph (0, 0)][DBLP]
    ICADL, 2004, pp:643- [Conf]
  13. Lin Chen, René Schott
    Optimal Operations on Red-Black Trees. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:529-533 [Conf]
  14. Lin Chen
    Efficient Deterministic Parallel Algorithms for Integer Sorting. [Citation Graph (0, 0)][DBLP]
    ICCI, 1990, pp:433-442 [Conf]
  15. Lin Chen
    Logarithmic Time NC Algorithms for Comparability Graphs and Circle Graphs. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:383-394 [Conf]
  16. Lin Chen
    A Provably Fastest Parallel Algorithm for the Recognition of the Consecutive Ones Property with Selected Applications. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1997, pp:594-601 [Conf]
  17. Lin Chen
    Optimal Computation of Shortest Paths on Doubly Convex Bipartite Graphs. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1997, pp:618-623 [Conf]
  18. Lin Chen, Jean Leneutre
    A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:207-214 [Conf]
  19. Lin Chen, Xiaoyun Xue, Jean Leneutre
    A Lightweight Mechanism to Secure OLSR. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:887-895 [Conf]
  20. PanPan Liao, Ying Liu, Lin Chen
    Hybrid chinese text chunking. [Citation Graph (0, 0)][DBLP]
    IRI, 2006, pp:561-566 [Conf]
  21. Lin Chen
    Revisiting Circular Arc Graphs. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1994, pp:559-566 [Conf]
  22. Lin Chen, K. L. Yeung
    Fast-response receiver-driven layered multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1032-1037 [Conf]
  23. ZhengQuan Xu, Lin Chen
    An effective heuristic algorithm for dynamic multicast routing with delay-constrained. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:1024-1031 [Conf]
  24. Lin Chen, Minglu Li, Jian Cao
    A Rule-Based Workflow Approach for Service Composition. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:1036-1046 [Conf]
  25. Lin Chen
    Optimal overlap representations. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:8-14 [Conf]
  26. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
    An Identity-Based Grid Security Infrastructure Model. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:314-325 [Conf]
  27. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
    An Identity-Based Model for Grid Security Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:258-266 [Conf]
  28. Lin Chen, Jie Huang, Zheng-Hu Gong
    Computing the Optimal Action Sequence by Niche Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    KI, 2005, pp:148-160 [Conf]
  29. Lin Chen, Gudrun Wagenknecht
    Automated Topology Correction for Human Brain Segmentation. [Citation Graph (0, 0)][DBLP]
    MICCAI (2), 2006, pp:316-323 [Conf]
  30. Lin Chen
    Tight Lower Bounds for Computing Shortest Paths on Proper Interval and Bipartite Permutation Graphs. [Citation Graph (0, 0)][DBLP]
    PaCT, 1997, pp:7-12 [Conf]
  31. Lin Chen, Xiaoqin Huang, Minglu Li, Jinyuan You
    Secure Group Communication in Grid Computing. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:604-607 [Conf]
  32. Lin Chen, Youwen Ouyang
    Component-centric approach in a web-based home schooling application. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:89-93 [Conf]
  33. Lin Chen
    NC Algorithms for Circular-Arc Graphs. [Citation Graph (0, 0)][DBLP]
    WADS, 1989, pp:291-302 [Conf]
  34. Juan Xu, Yongfa Hong, Changjun Jiang, Lin Chen
    Upper Bound on Operational Lifetime of Ultra Wide Band Sensor Network. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:271-282 [Conf]
  35. Juan Xu, Yongfa Hong, Lin Chen
    Bound on the Operational Lifetime of Ultra Wide Band Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:80-84 [Conf]
  36. Lin Chen, Jean Leneutre, Jean-Jacques Puig
    A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICWMC, 2006, pp:36- [Conf]
  37. Lin Chen
    Efficient Parallel Recognition of Some Circular Arc Graphs, I. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1993, v:9, n:3, pp:217-238 [Journal]
  38. Lin Chen
    Efficient Parallel Recognition of Some Circular Arc Graphs, II. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1997, v:17, n:3, pp:266-280 [Journal]
  39. Tianchi Ma, Lin Chen, Cho-Li Wang, Francis Chi-Moon Lau
    G-PASS: an instance-oriented security infrastructure for Grid travelers. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:14, pp:1871-1884 [Journal]
  40. Lei Liu, Lin Chen
    A Modal Supervaluation Description Logic for Characterization of Vague Concepts: its semantics and a tableau algorithm for it. [Citation Graph (0, 0)][DBLP]
    Logic Journal of the IGPL, 2006, v:14, n:6, pp:873-888 [Journal]
  41. Lin Chen, René Schott
    Optimal Operations on Red-Black Trees. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1996, v:7, n:3, pp:227-240 [Journal]
  42. Huafu Chen, Dezhong Yao, Lin Chen
    A new method for detecting brain activities from fMRI dataset. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2002, v:48, n:1-4, pp:1047-1052 [Journal]
  43. Lin Chen
    O(1) Space Complexity Deletion for AVL Trees. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1986, v:22, n:3, pp:147-149 [Journal]
  44. Lin Chen
    Optimal Parallel Time Bounds for the Maximum Clique Problem on Intervals. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:42, n:4, pp:197-201 [Journal]
  45. Lin Chen
    Solving the Shortest-Paths Problem on Bipartite Permutation Graphs Efficiently. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:5, pp:259-264 [Journal]
  46. Lin Chen
    Improving Space Efficiency for a Family of Operations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1996, v:95, n:1, pp:49-57 [Journal]
  47. Lin Chen, Yaacov Yesha
    Parallel Recognition of the Consecutive Ones Property with Applications. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1991, v:12, n:3, pp:375-392 [Journal]
  48. Lin Chen
    Optimal Circular Arc Representations: Properties, Recognition, and Construction. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1998, v:56, n:3, pp:320-331 [Journal]
  49. Lin Chen
    Graph Isomorphism and Identification Matrices: Sequential Algorithms. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1999, v:59, n:3, pp:450-475 [Journal]
  50. Lin Chen, Cho-Li Wang, Francis C. M. Lau
    A Grid Middleware for Distributed Java Computing with MPI Binding and Process Migration Supports. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:4, pp:505-514 [Journal]
  51. Changjun Jiang, Zhaohui Zhang, Guosun Zeng, Hong-Zhong Chen, Duo-Qian Miao, Yu Fang, Xiaofeng Tao, Qing Zhi, Feng Yue, Yang Luo, Anqing Zhou, Lin Chen, Lei Liu
    Urban Traffic Information Service Application Grid. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:1, pp:134-140 [Journal]
  52. ZhengQuan Xu, Lin Chen
    An effective algorithm for delay-constrained dynamic multicasting. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:3, pp:172-179 [Journal]
  53. Lin Chen
    Partitioning Graphs Into Hamiltonian Ones. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1996, v:22, n:4, pp:607-618 [Journal]
  54. Lin Chen, Julius Y. Jiang, Maung T. Nyeu
    Provably Fastest Parallel Algorithms for Bipartite Permutation Graphs. [Citation Graph (0, 0)][DBLP]
    Parallel Processing Letters, 1999, v:9, n:3, pp:385-390 [Journal]
  55. Lin Chen
    A selected tour of the theory of identification matrices. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:240, n:2, pp:299-318 [Journal]
  56. Lin Chen
    Graph Isomorphism and Identification Matrices: Parallel Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:3, pp:308-319 [Journal]
  57. Yi Wang, Minglu Li, Jian Cao, Lin Chen, Feilong Tang, Xinhua Lin
    SGSP - A Workflow Based Middleware for Service-Oriented Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:807-814 [Conf]
  58. Lin Chen, Jean Leneutre
    Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:16- [Conf]
  59. Lin Chen, Kangling Fang, Zifan Hu
    Direct Torque Control for Dual Three Phase Induction Machine Using Fuzzy Space Voltage Modulation. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:452-460 [Conf]
  60. Lin Chen, Jean Leneutre
    Toward secure and scalable time synchronization in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2453-2467 [Journal]

  61. Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing Platform. [Citation Graph (, )][DBLP]


  62. Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. [Citation Graph (, )][DBLP]


  63. CFCSS without Aliasing for SPARC Architecture. [Citation Graph (, )][DBLP]


  64. Approximation Algorithms for Scheduling with a Variable Machine Maintenance. [Citation Graph (, )][DBLP]


  65. I learn from you, you learn from me: How to make iList learn from students. [Citation Graph (, )][DBLP]


  66. A Case Study of Failure Mode Analysis with Text Mining Methods. [Citation Graph (, )][DBLP]


  67. Topology Correction for Brain Atlas Segmentation. [Citation Graph (, )][DBLP]


  68. Topology Correction for Brain Atlas Segmentation Using a Multiscale Algorithm. [Citation Graph (, )][DBLP]


  69. An Improved DAD Check Scheme MLD-Based in FHMIPv6. [Citation Graph (, )][DBLP]


  70. A Constraint Based Bug Checking Approach for Python. [Citation Graph (, )][DBLP]


  71. An improved aggregated one-dependence estimator: On non-rigid cross validation. [Citation Graph (, )][DBLP]


  72. Ontology Based Query Expansion in Vertical Search Engine. [Citation Graph (, )][DBLP]


  73. A new knowledge representation method for Battle Management Language. [Citation Graph (, )][DBLP]


  74. A novel formal computational model of Chinese text sentiment based on corpus. [Citation Graph (, )][DBLP]


  75. On the Power and Rate Control in IEEE 802.11 WLANs - A Game Theoretical Approach. [Citation Graph (, )][DBLP]


  76. Development of Simulation Software for Coal-Fired Power Units Based on Matlab/Simulink. [Citation Graph (, )][DBLP]


  77. A framework of ontological semantic knowledge tree for vertical search engine. [Citation Graph (, )][DBLP]


  78. A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. [Citation Graph (, )][DBLP]


  79. A Fast Longest Common Subsequence Algorithm for Biosequences Alignment. [Citation Graph (, )][DBLP]


  80. An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  81. Process reassignment with reduced migration cost in grid load rebalancing. [Citation Graph (, )][DBLP]


  82. Topological Correction of Volumetric Binary Brain Segmentation Using a Multiscale Algorithm. [Citation Graph (, )][DBLP]


  83. Generating Proactive Feedback to Help Students Stay on Track. [Citation Graph (, )][DBLP]


  84. Efficient medium access control design for autonomous wireless networks - A game theoretic approach. [Citation Graph (, )][DBLP]


  85. Efficient Parallel Algorithms on Proper Circular Arc Graphs. [Citation Graph (, )][DBLP]


  86. Anisotropic resizing of model with geometric textures. [Citation Graph (, )][DBLP]


  87. Expertise Analysis in a Question Answer Portal for Author Ranking. [Citation Graph (, )][DBLP]


  88. Real-Time Collaborative Filtering Using Extreme Learning Machine. [Citation Graph (, )][DBLP]


  89. A fast and accurate collaborative filter. [Citation Graph (, )][DBLP]


  90. Differential Evolutionary Bayesian Classifier. [Citation Graph (, )][DBLP]


  91. A Distributed Access Point Selection Algorithm Based on No-Regret Learning for Wireless Access Networks. [Citation Graph (, )][DBLP]


  92. Regularized Extreme Learning Machine. [Citation Graph (, )][DBLP]


  93. Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. [Citation Graph (, )][DBLP]


  94. Topological Entropy and Complexity of One Class of Cellular Automata Rules. [Citation Graph (, )][DBLP]


  95. Complex Symbolic Dynamics of Bernoulli Shift Cellular Automata Rule. [Citation Graph (, )][DBLP]


  96. An ECA-Rule-Based Workflow Approach for Advance Resource Reservation in ShanghaiGrid. [Citation Graph (, )][DBLP]


  97. Design of Scalable Hardware Architecture for Dual-field Montgomery Modular Inverse Computation. [Citation Graph (, )][DBLP]


  98. An Advanced Genetic Algorithm for Traveling Salesman Problem. [Citation Graph (, )][DBLP]


  99. Research on Default Probability of Emerging Technology Firms. [Citation Graph (, )][DBLP]


Search in 0.212secs, Finished in 0.216secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002