The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peng Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda
    Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. [Citation Graph (1, 8)][DBLP]
    DASFAA, 1989, pp:266-273 [Conf]
  2. Peng Liu, Lei Lei, Naijun Wu
    A Quantitative Study of the Effect of Missing Data in Classifiers. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:28-33 [Conf]
  3. Peng Liu
    DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:219-229 [Conf]
  4. Peng Liu
    Architectures for Intrusion Tolerant Database Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:311-320 [Conf]
  5. Sushil Jajodia, Peng Liu, Catherine D. McCollum
    Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:73-82 [Conf]
  6. Meng Yu, Peng Liu, Wanyu Zang
    Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:142-151 [Conf]
  7. Meng Yu, Wanyu Zang, Peng Liu
    Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:515-526 [Conf]
  8. Peng Liu, Elia El-Darzi, Lei Lei, Christos Vasilakis, Panagiotis Chountas, Wei Huang
    An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:583-590 [Conf]
  9. Peng Liu, Naijun Wu, Jiaxian Zhu, Junjie Yin, Wei Zhang
    A Unified Strategy of Feature Selection. [Citation Graph (0, 0)][DBLP]
    ADMA, 2006, pp:457-464 [Conf]
  10. Yu Chen, Zhenqiang Jiao, Jun Xie, Zhihui Du, Peng Liu, Ziyu Zhu
    A High Performance Design and Implementation of the Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:125-135 [Conf]
  11. Peng Liu, Wanyu Zang
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf]
  12. Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri
    Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:66-77 [Conf]
  13. Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee
    Incremental adaptation of XPath access control views. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:105-116 [Conf]
  14. Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
    QFilter: fine-grained run-time XML access control via NFA-based query rewriting. [Citation Graph (0, 0)][DBLP]
    CIKM, 2004, pp:543-552 [Conf]
  15. Qingzhao Tan, Wang-Chien Lee, Baihua Zheng, Peng Liu, Dik Lun Lee
    Balancing performance and confidentiality in air index. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:800-807 [Conf]
  16. Peng Liu, Zhihui Du
    Cluster Trend: DataSpeaking. [Citation Graph (0, 0)][DBLP]
    CLUSTER, 2001, pp:168-171 [Conf]
  17. Peng Liu, Sushil Jajodia
    Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:191-205 [Conf]
  18. Kun Bai, Hai Wang, Peng Liu
    Towards Database Firewalls. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:178-192 [Conf]
  19. Peng Liu, Xu Hao
    Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:75-89 [Conf]
  20. Peng Liu, Sushil Jajodia, Catherine D. McCollum
    Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:3-18 [Conf]
  21. Peng Liu, Ying Wang
    Multiphase Damage Confinement System for Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:75-87 [Conf]
  22. Pramote Luenam, Peng Liu
    ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:239-252 [Conf]
  23. Jianyong Zhang, Peng Liu
    Delivering Services with Integrity Guarantees in Survivable Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:33-46 [Conf]
  24. Peng Liu
    ITDB: An Attack Self-Healing Database System Prototype. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:131-133 [Conf]
  25. Peng Liu
    Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:284-289 [Conf]
  26. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:631-640 [Conf]
  27. Hai Wang, Peng Liu
    Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:207-224 [Conf]
  28. Peng Liu, Jiaxian Zhu, Lanjuan Liu, Yanhong Li, Xuefeng Zhang
    Application of Feature Selection for Unsupervised Learning in Prosecutors' Office. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:35-38 [Conf]
  29. Peng Liu, Yao Shi, Sanli Li
    Computing Pool: A Simplified and Practical Computational Grid Model. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:661-668 [Conf]
  30. Peng Liu, Paul Ammann, Sushil Jajodia
    Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1999, pp:414-423 [Conf]
  31. Meng Yu, Peng Liu, Wanyu Zang
    Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:418-425 [Conf]
  32. Peng Liu, Frank K. Soong
    Word graph based speech rcognition error correction by handwriting input. [Citation Graph (0, 0)][DBLP]
    ICMI, 2006, pp:339-346 [Conf]
  33. Douglas M. Blough, Peng Liu
    FIMD-MPI: A Tool for Injecting Faults into MPI Applications. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2000, pp:241-0 [Conf]
  34. Jun Du, Peng Liu, Frank K. Soong, Jian-Lai Zhou, Ren-Hua Wang
    Noisy Speech Recognition Performance of Discriminative HMMs. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:358-369 [Conf]
  35. Peng Liu, Jian-Lai Zhou, Frank K. Soong
    Non-uniform Kernel Allocation Based Parsimonious HMM. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:294-302 [Conf]
  36. Peng Liu, Lei Lei
    Missing Data Treatment Methods and NBI Model. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:633-638 [Conf]
  37. Xuefeng Zhang, Peng Liu, Jinjin Fan
    The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:377-384 [Conf]
  38. Jianshe Dong, Haixia Cao, Peng Liu, Li Ren
    Bayesian Chinese Spam Filter Based on Crossed N-gram. [Citation Graph (0, 0)][DBLP]
    ISDA (3), 2006, pp:103-108 [Conf]
  39. Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta
    A Taxonomy of Cyber Attacks on 3G Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:631-633 [Conf]
  40. Ming Liu, Peng Liu, Donghua Zhou
    Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2004, pp:91-96 [Conf]
  41. Hai Wang, Peng Liu, Lunqun Li
    Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:146-157 [Conf]
  42. Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu
    KTR: an Efficient Key Management Scheme For Air Access Control. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:499-501 [Conf]
  43. Chi-Chun Pan, Prasenjit Mitra, Peng Liu
    Semantic access control for information interoperation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:237-246 [Conf]
  44. Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
    A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:133-147 [Conf]
  45. Meng Yu, Peng Liu, Wanyu Zang
    Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:229-240 [Conf]
  46. Kameswari Kotapati, Peng Liu, Thomas F. LaPorta
    CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:158-170 [Conf]
  47. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu
    In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:252-259 [Conf]
  48. Peng Liu, Qingdong Yao, Weijian Yang
    Hardware/software codesign for HDTV source decoder on system level. [Citation Graph (0, 0)][DBLP]
    VCIP, 2002, pp:679-686 [Conf]
  49. Peng Liu, Zhong Chen
    An Access Control Model for Web Services in Business Process. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:292-298 [Conf]
  50. Peng Liu, Jian-bin Hu, Zhong Chen
    A Formal Language for Access Control Policies in Distributed Environment. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:766-769 [Conf]
  51. Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
    Deep Set Operators for XQuery. [Citation Graph (0, 0)][DBLP]
    XIME-P, 2005, pp:- [Conf]
  52. Dongwon Lee, Wang-Chien Lee, Peng Liu
    Supporting XML Security Models Using Relational Databases: A Vision. [Citation Graph (0, 0)][DBLP]
    Xsym, 2003, pp:267-281 [Conf]
  53. Y. Sun, P. Liu, Parviz Kermani, Thomas F. La Porta
    An architecture and key management approach for maintaining privacy in location based group services. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  54. JiaJu Wu, Gang Liu, Peng Liu, ChuanYu Xi
    The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005). [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:284-287 [Conf]
  55. Peng Liu, J. T. Gene Hwang
    Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2007, v:23, n:6, pp:739-746 [Journal]
  56. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  57. Peng Liu, Paul Ammann, Sushil Jajodia
    Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal]
  58. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal]
  59. Hui Zhu, X. L. Tang, Peng Liu
    An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition. [Citation Graph (0, 0)][DBLP]
    IJDAR, 2006, v:8, n:1, pp:27-34 [Journal]
  60. Peng Liu
    Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2007, v:43, n:1, pp:296- [Journal]
  61. Peng Liu, Amit Chetal
    Trust-based secure information sharing between federal government agencies. [Citation Graph (0, 0)][DBLP]
    JASIST, 2005, v:56, n:3, pp:283-298 [Journal]
  62. Peng Liu, Sushil Jajodia, Catherine D. McCollum
    Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal]
  63. Meng Yu, Peng Liu, Wanyu Zang
    Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal]
  64. Peng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang
    The Design and Implementation of a Self-Healing Database System. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2004, v:23, n:3, pp:247-269 [Journal]
  65. Peng Liu, Wanyu Zang, Meng Yu
    Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal]
  66. Paul Ammann, Sushil Jajodia, Peng Liu
    Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal]
  67. Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen
    On-demand public-key management for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:295-306 [Journal]
  68. Peng Liu, Yan Zhang, Zhigang Mao
    A Restoration Algorithm for Images Contaminated by Impulse Noise. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1939-1946 [Journal]
  69. Kun Bai, Peng Liu
    Towards Database Firewall: Mining the Damage Spreading Patterns. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:449-462 [Conf]
  70. Bo Luo, Dongwon Lee, Peng Liu
    Pragmatic XML Access Control Using Off-the-Shelf RDBMS. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:55-71 [Conf]
  71. Fang Huang, Dingsheng Liu, Peng Liu, Shaogang Wang, Yi Zeng, Guoqing Li, Wenyang Yu, Jian Wang, Lingjun Zhao, Lv Pang
    Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:642-649 [Conf]
  72. Peng Liu, Guojun Dai, Tingting Fu, Hong Zeng, Xiang Zhang
    A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:49-59 [Conf]
  73. Peng Liu, Ming Cai, Tingting Fu, Jinxiang Dong
    An EDF Interrupt Handling Scheme for Real-Time Kernel: Design and Task Simulation. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:969-972 [Conf]
  74. Huaidong Shi, Ming Cai, Jinxiang Dong, Peng Liu
    A Rich Servants Service Model for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:896-903 [Conf]
  75. Peng Liu, Dingsheng Liu, Fang Huang
    MTF Measurement Based on Interactive Live-Wire Edge Extraction. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:523-530 [Conf]
  76. Qijun Gu, Peng Liu, Chao-Hsien Chu
    Analysis of area-congestion-based DDoS attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:5, pp:613-625 [Journal]
  77. Xiuwen Zheng, Hung-Chung Huang, Wenyuan Li, Peng Liu, Quan-Zhen Li, Ying Liu
    Modeling nonlinearity in dilution design microarray data. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2007, v:23, n:11, pp:1339-1347 [Journal]
  78. Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann
    Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal]
  79. Peng Liu, Hai Wang, Lunquan Li
    Real-time data attack isolation for commercial database applications. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2006, v:29, n:4, pp:294-320 [Journal]

  80. A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. [Citation Graph (, )][DBLP]


  81. CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. [Citation Graph (, )][DBLP]


  82. Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP]


  83. STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP]


  84. Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. [Citation Graph (, )][DBLP]


  85. Detecting Software Theft via System Call Based Birthmarks. [Citation Graph (, )][DBLP]


  86. SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. [Citation Graph (, )][DBLP]


  87. A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. [Citation Graph (, )][DBLP]


  88. A PQRM-based PACS System for Advanced Medical Services under Grid Environment. [Citation Graph (, )][DBLP]


  89. Automaton segmentation: a new approach to preserve privacy in xml information brokering. [Citation Graph (, )][DBLP]


  90. Using virtual machines to do cross-layer damage assessment. [Citation Graph (, )][DBLP]


  91. Behavior based software theft detection. [Citation Graph (, )][DBLP]


  92. A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. [Citation Graph (, )][DBLP]


  93. Secure and Privacy-Preserving Information Brokering. [Citation Graph (, )][DBLP]


  94. Two-Agent Scheduling with Linear Deteriorating Jobs on a Single Machine. [Citation Graph (, )][DBLP]


  95. An Improved Cooperative Model for Web Service Based Workflow Management. [Citation Graph (, )][DBLP]


  96. A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. [Citation Graph (, )][DBLP]


  97. Transformable Vertexes Information based Algorithm for Online Task Placement in Reconfigurable System. [Citation Graph (, )][DBLP]


  98. TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. [Citation Graph (, )][DBLP]


  99. Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection. [Citation Graph (, )][DBLP]


  100. Intelligent Circuit Breaker Forecasting and Prewarning System Research. [Citation Graph (, )][DBLP]


  101. A New BP Neural Network Model Based on the Random Fuzzy Theory. [Citation Graph (, )][DBLP]


  102. Oil Spill Identification in Marine SAR Images Based on Texture Feature and Fuzzy Logic System. [Citation Graph (, )][DBLP]


  103. A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. [Citation Graph (, )][DBLP]


  104. Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. [Citation Graph (, )][DBLP]


  105. A Novel Hybrid Trust Management Framework for MANETs. [Citation Graph (, )][DBLP]


  106. Optimized control for ball mill powder making. [Citation Graph (, )][DBLP]


  107. A load balancing algorithm for homogeneous multiprocessor system. [Citation Graph (, )][DBLP]


  108. Approaches to improving corpus quality for statistical machine translation. [Citation Graph (, )][DBLP]


  109. An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition. [Citation Graph (, )][DBLP]


  110. Radical based fine trajectory HMMs of online handwritten characters. [Citation Graph (, )][DBLP]


  111. Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP]


  112. Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. [Citation Graph (, )][DBLP]


  113. A Statistical Spam Filtering Scheme Based on Grid Platform. [Citation Graph (, )][DBLP]


  114. A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. [Citation Graph (, )][DBLP]


  115. An intra-chip free-space optical interconnect. [Citation Graph (, )][DBLP]


  116. A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping. [Citation Graph (, )][DBLP]


  117. Virtual Reality Based Nuclear Steam Generator Ageing and Life Management Systems. [Citation Graph (, )][DBLP]


  118. Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. [Citation Graph (, )][DBLP]


  119. Rate-Based Watermark Traceback: A New Approach. [Citation Graph (, )][DBLP]


  120. A NoC Emulation/Verification Framework. [Citation Graph (, )][DBLP]


  121. Semi-supervised sparse metric learning using alternating linearization optimization. [Citation Graph (, )][DBLP]


  122. The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes. [Citation Graph (, )][DBLP]


  123. Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. [Citation Graph (, )][DBLP]


  124. A Design for an Online RSS Reader Based On AJAX. [Citation Graph (, )][DBLP]


  125. A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. [Citation Graph (, )][DBLP]


  126. Research on RTOS-Integrated TMR for Fault Tolerant Systems. [Citation Graph (, )][DBLP]


  127. Framework for Intrusion Tolerant Certification Authority System Evaluation. [Citation Graph (, )][DBLP]


  128. EndSec: An end-to-end message security protocol for mobile telecommunication networks. [Citation Graph (, )][DBLP]


  129. Protecting web services from remote exploit code: a static analysis approach. [Citation Graph (, )][DBLP]


  130. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. [Citation Graph (, )][DBLP]


  131. An Objective Trust Management Framework for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  132. An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP]


  133. Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI. [Citation Graph (, )][DBLP]


  134. A bus arbitration scheme for HDTV decoder SoC. [Citation Graph (, )][DBLP]


  135. A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices. [Citation Graph (, )][DBLP]


  136. Research on Experimental Platform and Methods for the Course "Interface and Communication". [Citation Graph (, )][DBLP]


  137. Semantization Improves the Energy Efficiency of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  138. Computer Supported Collaborative Learning Framework for the Handicapped in Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  139. Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge Acquisition. [Citation Graph (, )][DBLP]


  140. Energy-Efficient Architecture for Embedded Software with Hard Real-Time Requirements in Partial Reconfigurable Systems. [Citation Graph (, )][DBLP]


  141. Model of Network Traffic Based on Network Applications and Network Users. [Citation Graph (, )][DBLP]


  142. Discriminative training for improving letter-to-sound conversion performance. [Citation Graph (, )][DBLP]


  143. Prefix tree based auto-completion for convenient bi-modal chinese character input. [Citation Graph (, )][DBLP]


  144. An evidence framework for Bayesian learning of continuous-density hidden Markov models. [Citation Graph (, )][DBLP]


  145. Cross-lingual speech recognition under runtime resource constraints. [Citation Graph (, )][DBLP]


  146. Applying Granular Computing theories to system modelling with optimised development process. [Citation Graph (, )][DBLP]


  147. Gene expression: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. [Citation Graph (, )][DBLP]


  148. Creation of the importance scanning worm using information collected by Botnets. [Citation Graph (, )][DBLP]


Search in 0.150secs, Finished in 0.154secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002