The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wanlei Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mingjun Lan, Wanlei Zhou
    Spam Filtering based on Preference Ranking. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:223-227 [Conf]
  2. Adil M. Hammadi, John Casey, Wanlei Zhou
    The Cost of Recovery Protocols in Web-based Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:137-142 [Conf]
  3. Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan
    Self-Adaptive Clock Synchronization Based on Clock Precision Difference. [Citation Graph (0, 0)][DBLP]
    ACSC, 2003, pp:181-187 [Conf]
  4. Leanne Ngo, Wanlei Zhou, Matthew Warren
    Understanding Transition towards Information Security Culture Change. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:67-73 [Conf]
  5. Wanlei Zhou, Michael Zhou
    The Design and Application of Sensors Implemented in Java. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 1999, pp:47-50 [Conf]
  6. Yang Xiang, Wanlei Zhou
    Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:320-333 [Conf]
  7. Changgui Chen, Wanlei Zhou
    An architecture for resolving networking partitioning. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:84-87 [Conf]
  8. Wanlei Zhou, Li Wang
    Automating the Construction of Replicated Objects in a Cluster of Workstations. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2001, pp:634-639 [Conf]
  9. Shui Yu, Wanlei Zhou, Fuchun Huang, Mingjun Lan
    An Efficient Algorithm for Application-Layer Anycasting. [Citation Graph (0, 0)][DBLP]
    DCW, 2002, pp:74-83 [Conf]
  10. Changgui Chen, Wanlei Zhou
    Towards an Interactive Architecture for Web-Based Databases. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:871-878 [Conf]
  11. Mingjun Lan, Wanlei Zhou
    An Adaptive Information Grid Architecture for Recommendation System. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:584-591 [Conf]
  12. Wei Shi, Wanlei Zhou
    Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:26-33 [Conf]
  13. Yang Xiang, Wanlei Zhou
    Protect Grids from DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:309-316 [Conf]
  14. Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
    GHIRS: Integration of Hotel Management Systems by Web Services. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:1002-1009 [Conf]
  15. Shui Yu, John Casey, Wanlei Zhou
    A Load Balancing Algorithm for Web Based Server Grids. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:121-128 [Conf]
  16. Wanlei Zhou, Hua Ye, Lin Ye
    Improving the Performance of Equalization in Communication Systems. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:388-395 [Conf]
  17. John Casey, Wanlei Zhou
    Reducing the Bandwidth Requirements of P2P Keyword Indexing. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:50-59 [Conf]
  18. Wei Shi, Yang Xiang, Wanlei Zhou
    Distributed Defense Against Distributed Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:357-362 [Conf]
  19. Shui Yu, Wanlei Zhou
    An Efficient Reliable Architecture for Application Layer Anycast Service. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:376-385 [Conf]
  20. Ying Zhao, Wanlei Zhou, Yingying Zhang, E. J. Lanham, Jiumei Huang
    Clock Synchronization State Graphs Based on Clock Precision Difference. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:34-39 [Conf]
  21. Hua Ye, Wanlei Zhou, Justin Rough
    A Fast and Robust Method Applied in Telecommunication Systems. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2004, pp:423-426 [Conf]
  22. Ruth S. Raitman, Leanne Ngo, Naomi Augar, Wanlei Zhou
    Security in the Online E-Learning Environment. [Citation Graph (0, 0)][DBLP]
    ICALT, 2005, pp:702-706 [Conf]
  23. Wanlei Zhou, Brian Molinari
    A Model of Execution Time Estimating for RPC-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    ICCI, 1990, pp:376-384 [Conf]
  24. Wanlei Zhou, Brian Molinari
    On the Management of Remote Procedure Call Transactions. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:571-581 [Conf]
  25. Hua Ye, Wanlei Zhou
    Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:129-135 [Conf]
  26. Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury
    Toward Pervasive Computing in Restaurant. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:312-0 [Conf]
  27. Naomi Augar, Ruth S. Raitman, Wanlei Zhou
    From e-Learning to Virtual Learning Community: Bridging the Gap. [Citation Graph (0, 0)][DBLP]
    ICWL, 2004, pp:301-308 [Conf]
  28. Elicia Lanham, Wanlei Zhou
    Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned. [Citation Graph (0, 0)][DBLP]
    ICWL, 2003, pp:134-144 [Conf]
  29. Ruth S. Raitman, Wanlei Zhou, Paul Nicholson
    Exploring the Foundations of Practicing Online Collaboration. [Citation Graph (0, 0)][DBLP]
    ICWL, 2003, pp:532-541 [Conf]
  30. Haiyi Zhang, Barbro Back, Wanlei Zhou
    The Design and Implementation of a Traffic Accident Analysis System. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2001, pp:476-481 [Conf]
  31. Yang Xiang, Wanlei Zhou
    An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  32. Wei Shi, Wanlei Zhou, Weimin Zheng
    A Self-Learning System for Identifying Harmful Network Information. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  33. Shui Yu, Wanlei Zhou, John Casey
    Load Balance Algorithms for Anycast. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  34. Wanlei Zhou, Yang Xiang
    Combating DDoS Attacks in Web-based Services. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  35. Wei Shi, Wanlei Zhou
    Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:3-9 [Conf]
  36. Changgui Chen, Wanlei Zhou
    A Solution for Fault-Tolerance in Replicated Database Systems. [Citation Graph (0, 0)][DBLP]
    ISPA, 2003, pp:411-422 [Conf]
  37. Shui Yu, Wanlei Zhou
    A Mesh Based Anycast Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:927-932 [Conf]
  38. Yang Xiang, Wanlei Zhou
    Intelligent DDoS Packet Filtering in High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:395-406 [Conf]
  39. Shui Yu, Wanlei Zhou, Justin Rough
    Minicast: A Multicast-Anycast Protocol for Message Delivery. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:798-803 [Conf]
  40. Wanlei Zhou
    Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:17-18 [Conf]
  41. Weijia Jia, Pui-on Au, Yong He, Wanlei Zhou
    Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2002, pp:295-300 [Conf]
  42. Wanlei Zhou, Robert Holmes
    The Design and Simulation of a Hybrid Replication Control Protocol. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1999, pp:210-215 [Conf]
  43. Changgui Chen, Wanlei Zhou, Wei Dai
    A Reactive Framework for Supporting Knowledge Management. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2005, pp:405-410 [Conf]
  44. Shui Yu, Wanlei Zhou, Weijia Jia
    Fault-Tolerant Servers for Anycast Communication. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:1244-1250 [Conf]
  45. Wanlei Zhou
    Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:848-857 [Conf]
  46. Wanlei Zhou
    A Layered Distributed Program Debugger. [Citation Graph (0, 0)][DBLP]
    SPDP, 1993, pp:665-668 [Conf]
  47. Shui Yu, Wanlei Zhou
    A Novel Middleware Based Web Database Model. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:533-536 [Conf]
  48. Wei Shi, Wanlei Zhou
    A Parallel Euler Approach for Large-Scale Biological Sequence Assembly. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:437-441 [Conf]
  49. Yang Xiang, Wanlei Zhou
    A Defense System against DDoS Attacks by Large-Scale IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:431-436 [Conf]
  50. Leanne Ngo, Wanlei Zhou
    The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:230-233 [Conf]
  51. Ruth S. Raitman, Naomi Augar, Wanlei Zhou
    Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:142-146 [Conf]
  52. Md. Rafiqul Islam, Morshed U. Chowdhury, Wanlei Zhou
    An Innovative Spam Filtering Model Based on Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:348-353 [Conf]
  53. Li Wang, Wanlei Zhou
    An Architecture for Building Reliable Distributed Object-Based Systems. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:260-265 [Conf]
  54. Li Wang, Wanlei Zhou
    Primary-Backup Object Replications in Java. [Citation Graph (0, 0)][DBLP]
    TOOLS (27), 1998, pp:78-82 [Conf]
  55. Li Wang, Wanlei Zhou
    A Tool for Constructing Service Replication Systems. [Citation Graph (0, 0)][DBLP]
    TOOLS (31), 1999, pp:358-361 [Conf]
  56. Wanlei Zhou, Andrzej M. Goscinski
    Managing Replicated Remote Procedure Call Transactions. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:7, pp:592-608 [Journal]
  57. Wanlei Zhou
    Supporting fault-tolerant and open distributed processing using RPC. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:6-7, pp:528-538 [Journal]
  58. Wanlei Zhou
    A tool for layered analysing and understanding of distributed programs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:5, pp:385-392 [Journal]
  59. Wanlei Zhou
    Detecting and tolerating failures in a loosely integrated heterogeneous database system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:11, pp:1056-1067 [Journal]
  60. Wanlei Zhou, Weijia Jia
    A token-based independent update protocol for managing replicated objects. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2002, v:17, n:3, pp:189-207 [Journal]
  61. Chengzhung Sun, Wanlei Zhou, Andrzej M. Goscinski, Xue-bin Chi
    Advanced services for Clusters and Internet computing. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:4, pp:501-503 [Journal]
  62. Wanlei Zhou, Li Wang, Weijia Jia
    An analysis of update ordering in distributed replication systems. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:4, pp:565-590 [Journal]
  63. Joseph Fong, Wanlei Zhou
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2003, v:16, n:4, pp:241-242 [Journal]
  64. Joseph Fong, Wanlei Zhou
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2004, v:17, n:1, pp:1-2 [Journal]
  65. Elicia Lanham, Wanlei Zhou
    Cultural Issues in Online Learning - Is Blended Learning a Possible Solution? [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2003, v:16, n:4, pp:275-292 [Journal]
  66. Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng
    Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    International Journal of Information Technology and Decision Making, 2003, v:2, n:3, pp:397-405 [Journal]
  67. Ying Zhao, Wanlei Zhou, Jiumei Huang, Shui Yu
    Self-Adaptive Clock Synchronization for Computational Grid. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:4, pp:434-441 [Journal]
  68. Wu Yeu, Tian Yonghong, Wanlei Zhou
    The Development of a Mobile Decision Support System. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2001, v:2, n:3, pp:379-390 [Journal]
  69. Changgui Chen, Weijia Jia, Wanlei Zhou
    A reactive system architecture for building fault-tolerant distributed applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:3, pp:401-415 [Journal]
  70. Li Wang, Wanlei Zhou, Weijia Jia
    The design and implementation of an active replication scheme for distributing services in a cluster of workstations. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:3, pp:199-210 [Journal]
  71. Wanlei Zhou
    The design and implementation of a distributed program monitor. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1993, v:22, n:1, pp:63-77 [Journal]
  72. Wanlei Zhou
    A rapid prototyping system for distributed information system applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:24, n:1, pp:3-29 [Journal]
  73. Wanlei Zhou, Brian Molinari
    A system for managing remote procedure call transactions. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:34, n:2, pp:133-149 [Journal]
  74. Weijia Jia, Bo Han, Chuanlin Zhang, Wanlei Zhou
    Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2004, v:29, n:2, pp:197-209 [Journal]
  75. Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury
    Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:757-762 [Conf]
  76. John Casey, Ashley Chonka, Wanlei Zhou
    Adjacency Cache: Fast Web Cache Indexing and Lookup. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:616-621 [Conf]
  77. Atul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou
    A Composite Descriptor for Shape Retrieval. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:795-800 [Conf]
  78. Md. Rafiqul Islam, Wanlei Zhou
    Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:458-469 [Conf]
  79. Yang Xiang, Wanlei Zhou, Jinjun Chen
    Managing Email Overload with an Automatic Nonparametric Clustering Approach. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:81-90 [Conf]

  80. Email Categorization Using (2+1)-Tier Classification Algorithms. [Citation Graph (, )][DBLP]


  81. MVGL Analyser for Multi-classifier Based Spam Filtering System. [Citation Graph (, )][DBLP]


  82. A Parallel Downloading Algorithm for Redundant Networks. [Citation Graph (, )][DBLP]


  83. Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching. [Citation Graph (, )][DBLP]


  84. A Lightweight Intrusion Alert Fusion System. [Citation Graph (, )][DBLP]


  85. A Quick-Response Real-Time Stepping Stone Detection Scheme. [Citation Graph (, )][DBLP]


  86. Using Multi-core to Support Security-Related Applications. [Citation Graph (, )][DBLP]


  87. An Operational Approach to Validate the Path of BGP. [Citation Graph (, )][DBLP]


  88. Effective DDoS Attacks Detection Using Generalized Entropy Metric. [Citation Graph (, )][DBLP]


  89. Minimizing the Limitations of GL Analyser of Fusion Based Email Classification. [Citation Graph (, )][DBLP]


  90. Efficient Web Browsing with Perfect Anonymity Using Page Prefetching. [Citation Graph (, )][DBLP]


  91. Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks. [Citation Graph (, )][DBLP]


  92. Reliable Downloading Algorithms for BitTorrent-like Systems. [Citation Graph (, )][DBLP]


  93. Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. [Citation Graph (, )][DBLP]


  94. Email Categorization Using Multi-stage Classification Technique. [Citation Graph (, )][DBLP]


  95. A Resource-Search and Routing Algorithm within PCDN Autonomy Area. [Citation Graph (, )][DBLP]


  96. Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. [Citation Graph (, )][DBLP]


  97. An Enhanced Parallel Downloading Algorithm for BT. [Citation Graph (, )][DBLP]


  98. Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. [Citation Graph (, )][DBLP]


  99. Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. [Citation Graph (, )][DBLP]


  100. Defending Grid Web Services from XDoS Attacks by SOTA. [Citation Graph (, )][DBLP]


  101. A tool for assisting the understanding of distributed programs. [Citation Graph (, )][DBLP]


  102. A Sensor Enabled Multi-Agent Infrastructure for Applications Integration. [Citation Graph (, )][DBLP]


  103. Discriminating DDoS Flows from Flash Crowds Using Information Distance. [Citation Graph (, )][DBLP]


  104. Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. [Citation Graph (, )][DBLP]


  105. Frequency distribution of TATA Box and extension sequences on human promoters. [Citation Graph (, )][DBLP]


  106. Spam filtering for network traffic security on a multi-core environment. [Citation Graph (, )][DBLP]


  107. Special Issue: Multi-core Supported Network and System Security. [Citation Graph (, )][DBLP]


  108. I/O scheduling and performance analysis on multi-core platforms. [Citation Graph (, )][DBLP]


  109. A microscopic competition model and its dynamics analysis on network attacks. [Citation Graph (, )][DBLP]


Search in 2.610secs, Finished in 2.613secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002