Search the dblp DataBase
Wanlei Zhou :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mingjun Lan , Wanlei Zhou Spam Filtering based on Preference Ranking. [Citation Graph (0, 0)][DBLP ] CIT, 2005, pp:223-227 [Conf ] Adil M. Hammadi , John Casey , Wanlei Zhou The Cost of Recovery Protocols in Web-based Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2004, pp:137-142 [Conf ] Ying Zhao , Wanlei Zhou , Elicia Lanham , Shui Yu , Mingjun Lan Self-Adaptive Clock Synchronization Based on Clock Precision Difference. [Citation Graph (0, 0)][DBLP ] ACSC, 2003, pp:181-187 [Conf ] Leanne Ngo , Wanlei Zhou , Matthew Warren Understanding Transition towards Information Security Culture Change. [Citation Graph (0, 0)][DBLP ] AISM, 2005, pp:67-73 [Conf ] Wanlei Zhou , Michael Zhou The Design and Application of Sensors Implemented in Java. [Citation Graph (0, 0)][DBLP ] Applied Informatics, 1999, pp:47-50 [Conf ] Yang Xiang , Wanlei Zhou Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:320-333 [Conf ] Changgui Chen , Wanlei Zhou An architecture for resolving networking partitioning. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:84-87 [Conf ] Wanlei Zhou , Li Wang Automating the Construction of Replicated Objects in a Cluster of Workstations. [Citation Graph (0, 0)][DBLP ] CCGRID, 2001, pp:634-639 [Conf ] Shui Yu , Wanlei Zhou , Fuchun Huang , Mingjun Lan An Efficient Algorithm for Application-Layer Anycasting. [Citation Graph (0, 0)][DBLP ] DCW, 2002, pp:74-83 [Conf ] Changgui Chen , Wanlei Zhou Towards an Interactive Architecture for Web-Based Databases. [Citation Graph (0, 0)][DBLP ] GCC (2), 2003, pp:871-878 [Conf ] Mingjun Lan , Wanlei Zhou An Adaptive Information Grid Architecture for Recommendation System. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:584-591 [Conf ] Wei Shi , Wanlei Zhou Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:26-33 [Conf ] Yang Xiang , Wanlei Zhou Protect Grids from DDoS Attacks. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:309-316 [Conf ] Yang Xiang , Wanlei Zhou , Morshed U. Chowdhury GHIRS: Integration of Hotel Management Systems by Web Services. [Citation Graph (0, 0)][DBLP ] GCC (2), 2003, pp:1002-1009 [Conf ] Shui Yu , John Casey , Wanlei Zhou A Load Balancing Algorithm for Web Based Server Grids. [Citation Graph (0, 0)][DBLP ] GCC (2), 2003, pp:121-128 [Conf ] Wanlei Zhou , Hua Ye , Lin Ye Improving the Performance of Equalization in Communication Systems. [Citation Graph (0, 0)][DBLP ] GCC (2), 2003, pp:388-395 [Conf ] John Casey , Wanlei Zhou Reducing the Bandwidth Requirements of P2P Keyword Indexing. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:50-59 [Conf ] Wei Shi , Yang Xiang , Wanlei Zhou Distributed Defense Against Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:357-362 [Conf ] Shui Yu , Wanlei Zhou An Efficient Reliable Architecture for Application Layer Anycast Service. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:376-385 [Conf ] Ying Zhao , Wanlei Zhou , Yingying Zhang , E. J. Lanham , Jiumei Huang Clock Synchronization State Graphs Based on Clock Precision Difference. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2005, pp:34-39 [Conf ] Hua Ye , Wanlei Zhou , Justin Rough A Fast and Robust Method Applied in Telecommunication Systems. [Citation Graph (0, 0)][DBLP ] IC-AI, 2004, pp:423-426 [Conf ] Ruth S. Raitman , Leanne Ngo , Naomi Augar , Wanlei Zhou Security in the Online E-Learning Environment. [Citation Graph (0, 0)][DBLP ] ICALT, 2005, pp:702-706 [Conf ] Wanlei Zhou , Brian Molinari A Model of Execution Time Estimating for RPC-Oriented Programs. [Citation Graph (0, 0)][DBLP ] ICCI, 1990, pp:376-384 [Conf ] Wanlei Zhou , Brian Molinari On the Management of Remote Procedure Call Transactions. [Citation Graph (0, 0)][DBLP ] ICCI, 1991, pp:571-581 [Conf ] Hua Ye , Wanlei Zhou Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:129-135 [Conf ] Yang Xiang , Wanlei Zhou , Morshed U. Chowdhury Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP ] ICETE (1), 2004, pp:312-0 [Conf ] Naomi Augar , Ruth S. Raitman , Wanlei Zhou From e-Learning to Virtual Learning Community: Bridging the Gap. [Citation Graph (0, 0)][DBLP ] ICWL, 2004, pp:301-308 [Conf ] Elicia Lanham , Wanlei Zhou Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned. [Citation Graph (0, 0)][DBLP ] ICWL, 2003, pp:134-144 [Conf ] Ruth S. Raitman , Wanlei Zhou , Paul Nicholson Exploring the Foundations of Practicing Online Collaboration. [Citation Graph (0, 0)][DBLP ] ICWL, 2003, pp:532-541 [Conf ] Haiyi Zhang , Barbro Back , Wanlei Zhou The Design and Implementation of a Traffic Accident Analysis System. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2001, pp:476-481 [Conf ] Yang Xiang , Wanlei Zhou An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Wei Shi , Wanlei Zhou , Weimin Zheng A Self-Learning System for Identifying Harmful Network Information. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Shui Yu , Wanlei Zhou , John Casey Load Balance Algorithms for Anycast. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Wanlei Zhou , Yang Xiang Combating DDoS Attacks in Web-based Services. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Wei Shi , Wanlei Zhou Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:3-9 [Conf ] Changgui Chen , Wanlei Zhou A Solution for Fault-Tolerance in Replicated Database Systems. [Citation Graph (0, 0)][DBLP ] ISPA, 2003, pp:411-422 [Conf ] Shui Yu , Wanlei Zhou A Mesh Based Anycast Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:927-932 [Conf ] Yang Xiang , Wanlei Zhou Intelligent DDoS Packet Filtering in High-Speed Networks. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:395-406 [Conf ] Shui Yu , Wanlei Zhou , Justin Rough Minicast: A Multicast-Anycast Protocol for Message Delivery. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:798-803 [Conf ] Wanlei Zhou Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:17-18 [Conf ] Weijia Jia , Pui-on Au , Yong He , Wanlei Zhou Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks. [Citation Graph (0, 0)][DBLP ] ISPAN, 2002, pp:295-300 [Conf ] Wanlei Zhou , Robert Holmes The Design and Simulation of a Hybrid Replication Control Protocol. [Citation Graph (0, 0)][DBLP ] ISPAN, 1999, pp:210-215 [Conf ] Changgui Chen , Wanlei Zhou , Wei Dai A Reactive Framework for Supporting Knowledge Management. [Citation Graph (0, 0)][DBLP ] Parallel and Distributed Computing and Networks, 2005, pp:405-410 [Conf ] Shui Yu , Wanlei Zhou , Weijia Jia Fault-Tolerant Servers for Anycast Communication. [Citation Graph (0, 0)][DBLP ] PDPTA, 2003, pp:1244-1250 [Conf ] Wanlei Zhou Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System. [Citation Graph (0, 0)][DBLP ] PDPTA, 1997, pp:848-857 [Conf ] Wanlei Zhou A Layered Distributed Program Debugger. [Citation Graph (0, 0)][DBLP ] SPDP, 1993, pp:665-668 [Conf ] Shui Yu , Wanlei Zhou A Novel Middleware Based Web Database Model. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:533-536 [Conf ] Wei Shi , Wanlei Zhou A Parallel Euler Approach for Large-Scale Biological Sequence Assembly. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:437-441 [Conf ] Yang Xiang , Wanlei Zhou A Defense System against DDoS Attacks by Large-Scale IP Traceback. [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:431-436 [Conf ] Leanne Ngo , Wanlei Zhou The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:230-233 [Conf ] Ruth S. Raitman , Naomi Augar , Wanlei Zhou Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:142-146 [Conf ] Md. Rafiqul Islam , Morshed U. Chowdhury , Wanlei Zhou An Innovative Spam Filtering Model Based on Support Vector Machine. [Citation Graph (0, 0)][DBLP ] CIMCA/IAWTIC, 2005, pp:348-353 [Conf ] Li Wang , Wanlei Zhou An Architecture for Building Reliable Distributed Object-Based Systems. [Citation Graph (0, 0)][DBLP ] TOOLS (24), 1997, pp:260-265 [Conf ] Li Wang , Wanlei Zhou Primary-Backup Object Replications in Java. [Citation Graph (0, 0)][DBLP ] TOOLS (27), 1998, pp:78-82 [Conf ] Li Wang , Wanlei Zhou A Tool for Constructing Service Replication Systems. [Citation Graph (0, 0)][DBLP ] TOOLS (31), 1999, pp:358-361 [Conf ] Wanlei Zhou , Andrzej M. Goscinski Managing Replicated Remote Procedure Call Transactions. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:7, pp:592-608 [Journal ] Wanlei Zhou Supporting fault-tolerant and open distributed processing using RPC. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:6-7, pp:528-538 [Journal ] Wanlei Zhou A tool for layered analysing and understanding of distributed programs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:5, pp:385-392 [Journal ] Wanlei Zhou Detecting and tolerating failures in a loosely integrated heterogeneous database system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:11, pp:1056-1067 [Journal ] Wanlei Zhou , Weijia Jia A token-based independent update protocol for managing replicated objects. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2002, v:17, n:3, pp:189-207 [Journal ] Chengzhung Sun , Wanlei Zhou , Andrzej M. Goscinski , Xue-bin Chi Advanced services for Clusters and Internet computing. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2004, v:20, n:4, pp:501-503 [Journal ] Wanlei Zhou , Li Wang , Weijia Jia An analysis of update ordering in distributed replication systems. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2004, v:20, n:4, pp:565-590 [Journal ] Joseph Fong , Wanlei Zhou Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2003, v:16, n:4, pp:241-242 [Journal ] Joseph Fong , Wanlei Zhou Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2004, v:17, n:1, pp:1-2 [Journal ] Elicia Lanham , Wanlei Zhou Cultural Issues in Online Learning - Is Blended Learning a Possible Solution? [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2003, v:16, n:4, pp:275-292 [Journal ] Ming Li , Chi-Hung Chi , Weijia Jia , Wei Zhao , Wanlei Zhou , Jiannong Cao , Dongyang Long , Qiang Meng Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. [Citation Graph (0, 0)][DBLP ] International Journal of Information Technology and Decision Making, 2003, v:2, n:3, pp:397-405 [Journal ] Ying Zhao , Wanlei Zhou , Jiumei Huang , Shui Yu Self-Adaptive Clock Synchronization for Computational Grid. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:4, pp:434-441 [Journal ] Wu Yeu , Tian Yonghong , Wanlei Zhou The Development of a Mobile Decision Support System. [Citation Graph (0, 0)][DBLP ] Journal of Interconnection Networks, 2001, v:2, n:3, pp:379-390 [Journal ] Changgui Chen , Weijia Jia , Wanlei Zhou A reactive system architecture for building fault-tolerant distributed applications. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:3, pp:401-415 [Journal ] Li Wang , Wanlei Zhou , Weijia Jia The design and implementation of an active replication scheme for distributing services in a cluster of workstations. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:58, n:3, pp:199-210 [Journal ] Wanlei Zhou The design and implementation of a distributed program monitor. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1993, v:22, n:1, pp:63-77 [Journal ] Wanlei Zhou A rapid prototyping system for distributed information system applications. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:24, n:1, pp:3-29 [Journal ] Wanlei Zhou , Brian Molinari A system for managing remote procedure call transactions. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1996, v:34, n:2, pp:133-149 [Journal ] Weijia Jia , Bo Han , Chuanlin Zhang , Wanlei Zhou Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2004, v:29, n:2, pp:197-209 [Journal ] Md. Rafiqul Islam , Wanlei Zhou , Morshed U. Chowdhury Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:757-762 [Conf ] John Casey , Ashley Chonka , Wanlei Zhou Adjacency Cache: Fast Web Cache Indexing and Lookup. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:616-621 [Conf ] Atul Sajjanhar , Guojun Lu , Dengsheng Zhang , Wanlei Zhou A Composite Descriptor for Shape Retrieval. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:795-800 [Conf ] Md. Rafiqul Islam , Wanlei Zhou Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2007, pp:458-469 [Conf ] Yang Xiang , Wanlei Zhou , Jinjun Chen Managing Email Overload with an Automatic Nonparametric Clustering Approach. [Citation Graph (0, 0)][DBLP ] NPC, 2007, pp:81-90 [Conf ] Email Categorization Using (2+1)-Tier Classification Algorithms. [Citation Graph (, )][DBLP ] MVGL Analyser for Multi-classifier Based Spam Filtering System. [Citation Graph (, )][DBLP ] A Parallel Downloading Algorithm for Redundant Networks. [Citation Graph (, )][DBLP ] Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching. [Citation Graph (, )][DBLP ] A Lightweight Intrusion Alert Fusion System. [Citation Graph (, )][DBLP ] A Quick-Response Real-Time Stepping Stone Detection Scheme. [Citation Graph (, )][DBLP ] Using Multi-core to Support Security-Related Applications. [Citation Graph (, )][DBLP ] An Operational Approach to Validate the Path of BGP. [Citation Graph (, )][DBLP ] Effective DDoS Attacks Detection Using Generalized Entropy Metric. [Citation Graph (, )][DBLP ] Minimizing the Limitations of GL Analyser of Fusion Based Email Classification. [Citation Graph (, )][DBLP ] Efficient Web Browsing with Perfect Anonymity Using Page Prefetching. [Citation Graph (, )][DBLP ] Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks. [Citation Graph (, )][DBLP ] Reliable Downloading Algorithms for BitTorrent-like Systems. [Citation Graph (, )][DBLP ] Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. [Citation Graph (, )][DBLP ] Email Categorization Using Multi-stage Classification Technique. [Citation Graph (, )][DBLP ] A Resource-Search and Routing Algorithm within PCDN Autonomy Area. [Citation Graph (, )][DBLP ] Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. [Citation Graph (, )][DBLP ] An Enhanced Parallel Downloading Algorithm for BT. [Citation Graph (, )][DBLP ] Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. [Citation Graph (, )][DBLP ] Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. [Citation Graph (, )][DBLP ] Defending Grid Web Services from XDoS Attacks by SOTA. [Citation Graph (, )][DBLP ] A tool for assisting the understanding of distributed programs. [Citation Graph (, )][DBLP ] A Sensor Enabled Multi-Agent Infrastructure for Applications Integration. [Citation Graph (, )][DBLP ] Discriminating DDoS Flows from Flash Crowds Using Information Distance. [Citation Graph (, )][DBLP ] Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. [Citation Graph (, )][DBLP ] Frequency distribution of TATA Box and extension sequences on human promoters. [Citation Graph (, )][DBLP ] Spam filtering for network traffic security on a multi-core environment. [Citation Graph (, )][DBLP ] Special Issue: Multi-core Supported Network and System Security. [Citation Graph (, )][DBLP ] I/O scheduling and performance analysis on multi-core platforms. [Citation Graph (, )][DBLP ] A microscopic competition model and its dynamics analysis on network attacks. [Citation Graph (, )][DBLP ] Search in 0.091secs, Finished in 0.098secs