Search the dblp DataBase
Peng Liu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yasushi Kiyoki , Takahiro Kurosawa , Peng Liu , Kazuhiko Kato , Takashi Masuda Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. [Citation Graph (1, 8)][DBLP ] DASFAA, 1989, pp:266-273 [Conf ] Peng Liu , Lei Lei , Naijun Wu A Quantitative Study of the Effect of Missing Data in Classifiers. [Citation Graph (0, 0)][DBLP ] CIT, 2005, pp:28-33 [Conf ] Peng Liu DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:219-229 [Conf ] Peng Liu Architectures for Intrusion Tolerant Database Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:311-320 [Conf ] Sushil Jajodia , Peng Liu , Catherine D. McCollum Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:73-82 [Conf ] Meng Yu , Peng Liu , Wanyu Zang Multi-Version Attack Recovery for Workflow System. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:142-151 [Conf ] Meng Yu , Wanyu Zang , Peng Liu Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:515-526 [Conf ] Peng Liu , Elia El-Darzi , Lei Lei , Christos Vasilakis , Panagiotis Chountas , Wei Huang An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset. [Citation Graph (0, 0)][DBLP ] ADMA, 2005, pp:583-590 [Conf ] Peng Liu , Naijun Wu , Jiaxian Zhu , Junjie Yin , Wei Zhang A Unified Strategy of Feature Selection. [Citation Graph (0, 0)][DBLP ] ADMA, 2006, pp:457-464 [Conf ] Yu Chen , Zhenqiang Jiao , Jun Xie , Zhihui Du , Peng Liu , Ziyu Zhu A High Performance Design and Implementation of the Virtual Interface Architecture. [Citation Graph (0, 0)][DBLP ] APPT, 2003, pp:125-135 [Conf ] Peng Liu , Wanyu Zang Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:179-189 [Conf ] Prasenjit Mitra , Chi-Chun Pan , Peng Liu , Vijayalakshmi Atluri Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:66-77 [Conf ] Padmapriya Ayyagari , Prasenjit Mitra , Dongwon Lee , Peng Liu , Wang-Chien Lee Incremental adaptation of XPath access control views. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:105-116 [Conf ] Bo Luo , Dongwon Lee , Wang-Chien Lee , Peng Liu QFilter: fine-grained run-time XML access control via NFA-based query rewriting. [Citation Graph (0, 0)][DBLP ] CIKM, 2004, pp:543-552 [Conf ] Qingzhao Tan , Wang-Chien Lee , Baihua Zheng , Peng Liu , Dik Lun Lee Balancing performance and confidentiality in air index. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:800-807 [Conf ] Peng Liu , Zhihui Du Cluster Trend: DataSpeaking. [Citation Graph (0, 0)][DBLP ] CLUSTER, 2001, pp:168-171 [Conf ] Peng Liu , Sushil Jajodia Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:191-205 [Conf ] Kun Bai , Hai Wang , Peng Liu Towards Database Firewalls. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:178-192 [Conf ] Peng Liu , Xu Hao Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:75-89 [Conf ] Peng Liu , Sushil Jajodia , Catherine D. McCollum Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:3-18 [Conf ] Peng Liu , Ying Wang Multiphase Damage Confinement System for Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:75-87 [Conf ] Pramote Luenam , Peng Liu ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:239-252 [Conf ] Jianyong Zhang , Peng Liu Delivering Services with Integrity Guarantees in Survivable Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:33-46 [Conf ] Peng Liu ITDB: An Attack Self-Healing Database System Prototype. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:131-133 [Conf ] Peng Liu Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:284-289 [Conf ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:631-640 [Conf ] Hai Wang , Peng Liu Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:207-224 [Conf ] Peng Liu , Jiaxian Zhu , Lanjuan Liu , Yanhong Li , Xuefeng Zhang Application of Feature Selection for Unsupervised Learning in Prosecutors' Office. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:35-38 [Conf ] Peng Liu , Yao Shi , Sanli Li Computing Pool: A Simplified and Practical Computational Grid Model. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:661-668 [Conf ] Peng Liu , Paul Ammann , Sushil Jajodia Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP ] ICDCS, 1999, pp:414-423 [Conf ] Meng Yu , Peng Liu , Wanyu Zang Self-Healing Workflow Systems under Attacks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:418-425 [Conf ] Peng Liu , Frank K. Soong Word graph based speech rcognition error correction by handwriting input. [Citation Graph (0, 0)][DBLP ] ICMI, 2006, pp:339-346 [Conf ] Douglas M. Blough , Peng Liu FIMD-MPI: A Tool for Injecting Faults into MPI Applications. [Citation Graph (0, 0)][DBLP ] IPDPS, 2000, pp:241-0 [Conf ] Jun Du , Peng Liu , Frank K. Soong , Jian-Lai Zhou , Ren-Hua Wang Noisy Speech Recognition Performance of Discriminative HMMs. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:358-369 [Conf ] Peng Liu , Jian-Lai Zhou , Frank K. Soong Non-uniform Kernel Allocation Based Parsimonious HMM. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:294-302 [Conf ] Peng Liu , Lei Lei Missing Data Treatment Methods and NBI Model. [Citation Graph (0, 0)][DBLP ] ISDA (1), 2006, pp:633-638 [Conf ] Xuefeng Zhang , Peng Liu , Jinjin Fan The Improvement of Naïve Bayesian Classifier Based on the Strategy of Fuzzy Feature Selection. [Citation Graph (0, 0)][DBLP ] ISDA (1), 2006, pp:377-384 [Conf ] Jianshe Dong , Haixia Cao , Peng Liu , Li Ren Bayesian Chinese Spam Filter Based on Crossed N-gram. [Citation Graph (0, 0)][DBLP ] ISDA (3), 2006, pp:103-108 [Conf ] Kameswari Kotapati , Peng Liu , Yan Sun , Thomas F. LaPorta A Taxonomy of Cyber Attacks on 3G Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:631-633 [Conf ] Ming Liu , Peng Liu , Donghua Zhou Neural Network Based Fault Tolerant Control of a Class of Nonlinear Systems with Input Time Delay. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2004, pp:91-96 [Conf ] Hai Wang , Peng Liu , Lunqun Li Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:146-157 [Conf ] Qijun Gu , Peng Liu , Wang-Chien Lee , Chao-Hsien Chu KTR: an Efficient Key Management Scheme For Air Access Control. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:499-501 [Conf ] Chi-Chun Pan , Prasenjit Mitra , Peng Liu Semantic access control for information interoperation. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:237-246 [Conf ] Bo Luo , Dongwon Lee , Wang-Chien Lee , Peng Liu A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:133-147 [Conf ] Meng Yu , Peng Liu , Wanyu Zang Intrusion Masking for Distributed Atomic Operations. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:229-240 [Conf ] Kameswari Kotapati , Peng Liu , Thomas F. LaPorta CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:158-170 [Conf ] Fengjun Li , Bo Luo , Peng Liu , Dongwon Lee , Prasenjit Mitra , Wang-Chien Lee , Chao-Hsien Chu In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. [Citation Graph (0, 0)][DBLP ] SUTC (1), 2006, pp:252-259 [Conf ] Peng Liu , Qingdong Yao , Weijian Yang Hardware/software codesign for HDTV source decoder on system level. [Citation Graph (0, 0)][DBLP ] VCIP, 2002, pp:679-686 [Conf ] Peng Liu , Zhong Chen An Access Control Model for Web Services in Business Process. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:292-298 [Conf ] Peng Liu , Jian-bin Hu , Zhong Chen A Formal Language for Access Control Policies in Distributed Environment. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2005, pp:766-769 [Conf ] Bo Luo , Dongwon Lee , Wang-Chien Lee , Peng Liu Deep Set Operators for XQuery. [Citation Graph (0, 0)][DBLP ] XIME-P, 2005, pp:- [Conf ] Dongwon Lee , Wang-Chien Lee , Peng Liu Supporting XML Security Models Using Relational Databases: A Vision. [Citation Graph (0, 0)][DBLP ] Xsym, 2003, pp:267-281 [Conf ] Y. Sun , P. Liu , Parviz Kermani , Thomas F. La Porta An architecture and key management approach for maintaining privacy in location based group services. [Citation Graph (0, 0)][DBLP ] CollaborateCom, 2005, pp:- [Conf ] JiaJu Wu , Gang Liu , Peng Liu , ChuanYu Xi The study on attemperment arithmetic based on neural network of logistics distribution tracking and attemperment system used GSM cellular phone (July 2005). [Citation Graph (0, 0)][DBLP ] GrC, 2005, pp:284-287 [Conf ] Peng Liu , J. T. Gene Hwang Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2007, v:23, n:6, pp:739-746 [Journal ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Peng Liu , Paul Ammann , Sushil Jajodia Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal ] Hui Zhu , X. L. Tang , Peng Liu An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition. [Citation Graph (0, 0)][DBLP ] IJDAR, 2006, v:8, n:1, pp:27-34 [Journal ] Peng Liu Information Security - A Strategic Approach, Vincent Leveque. IEEE Computer Society & Wiley Interscience. 263 pp., ISBN: 0471736120. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 2007, v:43, n:1, pp:296- [Journal ] Peng Liu , Amit Chetal Trust-based secure information sharing between federal government agencies. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:3, pp:283-298 [Journal ] Peng Liu , Sushil Jajodia , Catherine D. McCollum Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal ] Meng Yu , Peng Liu , Wanyu Zang Specifying and using intrusion masking models to process distributed operations. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:4, pp:623-658 [Journal ] Peng Liu , Jiwu Jing , Pramote Luenam , Ying Wang , Lunquan Li , Supawadee Ingsriswang The Design and Implementation of a Self-Healing Database System. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2004, v:23, n:3, pp:247-269 [Journal ] Peng Liu , Wanyu Zang , Meng Yu Incentive-based modeling and inference of attacker intent, objectives, and strategies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:78-118 [Journal ] Paul Ammann , Sushil Jajodia , Peng Liu Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal ] Ruidong Li , Jie Li , Peng Liu , Hsiao-Hwa Chen On-demand public-key management for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:295-306 [Journal ] Peng Liu , Yan Zhang , Zhigang Mao A Restoration Algorithm for Images Contaminated by Impulse Noise. [Citation Graph (0, 0)][DBLP ] Journal of Computer Research and Development, 2006, v:43, n:11, pp:1939-1946 [Journal ] Kun Bai , Peng Liu Towards Database Firewall: Mining the Damage Spreading Patterns. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:449-462 [Conf ] Bo Luo , Dongwon Lee , Peng Liu Pragmatic XML Access Control Using Off-the-Shelf RDBMS. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:55-71 [Conf ] Fang Huang , Dingsheng Liu , Peng Liu , Shaogang Wang , Yi Zeng , Guoqing Li , Wenyang Yu , Jian Wang , Lingjun Zhao , Lv Pang Research On Cluster-Based Parallel GIS with the Example of Parallelization on GRASS GIS. [Citation Graph (0, 0)][DBLP ] GCC, 2007, pp:642-649 [Conf ] Peng Liu , Guojun Dai , Tingting Fu , Hong Zeng , Xiang Zhang A Lazy EDF Interrupt Scheduling Algorithm for Multiprocessor in Parallel Computing Environment. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2007, pp:49-59 [Conf ] Peng Liu , Ming Cai , Tingting Fu , Jinxiang Dong An EDF Interrupt Handling Scheme for Real-Time Kernel: Design and Task Simulation. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:969-972 [Conf ] Huaidong Shi , Ming Cai , Jinxiang Dong , Peng Liu A Rich Servants Service Model for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2007, pp:896-903 [Conf ] Peng Liu , Dingsheng Liu , Fang Huang MTF Measurement Based on Interactive Live-Wire Edge Extraction. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2007, pp:523-530 [Conf ] Qijun Gu , Peng Liu , Chao-Hsien Chu Analysis of area-congestion-based DDoS attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:5, pp:613-625 [Journal ] Xiuwen Zheng , Hung-Chung Huang , Wenyuan Li , Peng Liu , Quan-Zhen Li , Ying Liu Modeling nonlinearity in dilution design microarray data. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2007, v:23, n:11, pp:1339-1347 [Journal ] Peng Liu , Jie Li , Sushil Jajodia , Paul Ammann Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal ] Peng Liu , Hai Wang , Lunquan Li Real-time data attack isolation for commercial database applications. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2006, v:29, n:4, pp:294-320 [Journal ] A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. [Citation Graph (, )][DBLP ] CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. [Citation Graph (, )][DBLP ] Database Isolation and Filtering against Data Corruption Attacks. [Citation Graph (, )][DBLP ] STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP ] Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. [Citation Graph (, )][DBLP ] Detecting Software Theft via System Call Based Birthmarks. [Citation Graph (, )][DBLP ] SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. [Citation Graph (, )][DBLP ] A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. [Citation Graph (, )][DBLP ] A PQRM-based PACS System for Advanced Medical Services under Grid Environment. [Citation Graph (, )][DBLP ] Automaton segmentation: a new approach to preserve privacy in xml information brokering. [Citation Graph (, )][DBLP ] Using virtual machines to do cross-layer damage assessment. [Citation Graph (, )][DBLP ] Behavior based software theft detection. [Citation Graph (, )][DBLP ] A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems. [Citation Graph (, )][DBLP ] Secure and Privacy-Preserving Information Brokering. [Citation Graph (, )][DBLP ] Two-Agent Scheduling with Linear Deteriorating Jobs on a Single Machine. [Citation Graph (, )][DBLP ] An Improved Cooperative Model for Web Service Based Workflow Management. [Citation Graph (, )][DBLP ] A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. [Citation Graph (, )][DBLP ] Transformable Vertexes Information based Algorithm for Online Task Placement in Reconfigurable System. [Citation Graph (, )][DBLP ] TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. [Citation Graph (, )][DBLP ] Research and Application of Improved K-Means Algorithm Based on Fuzzy Feature Selection. [Citation Graph (, )][DBLP ] Intelligent Circuit Breaker Forecasting and Prewarning System Research. [Citation Graph (, )][DBLP ] A New BP Neural Network Model Based on the Random Fuzzy Theory. [Citation Graph (, )][DBLP ] Oil Spill Identification in Marine SAR Images Based on Texture Feature and Fuzzy Logic System. [Citation Graph (, )][DBLP ] A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. [Citation Graph (, )][DBLP ] Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. [Citation Graph (, )][DBLP ] A Novel Hybrid Trust Management Framework for MANETs. [Citation Graph (, )][DBLP ] Optimized control for ball mill powder making. [Citation Graph (, )][DBLP ] A load balancing algorithm for homogeneous multiprocessor system. [Citation Graph (, )][DBLP ] Approaches to improving corpus quality for statistical machine translation. [Citation Graph (, )][DBLP ] An ellipsoid constrained quadratic programming (ECQP) approach to MCE training of MQDF-based classifiers for handwriting recognition. [Citation Graph (, )][DBLP ] Radical based fine trajectory HMMs of online handwritten characters. [Citation Graph (, )][DBLP ] Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP ] Adaptive Processing Scheme of Overflowed Buckets for Bucket Sort Algorithm. [Citation Graph (, )][DBLP ] A Statistical Spam Filtering Scheme Based on Grid Platform. [Citation Graph (, )][DBLP ] A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. [Citation Graph (, )][DBLP ] An intra-chip free-space optical interconnect. [Citation Graph (, )][DBLP ] A low-phase-noise LC QVCO with bottom-series coupling and capacitor tapping. [Citation Graph (, )][DBLP ] Virtual Reality Based Nuclear Steam Generator Ageing and Life Management Systems. [Citation Graph (, )][DBLP ] Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. [Citation Graph (, )][DBLP ] Rate-Based Watermark Traceback: A New Approach. [Citation Graph (, )][DBLP ] A NoC Emulation/Verification Framework. [Citation Graph (, )][DBLP ] Semi-supervised sparse metric learning using alternating linearization optimization. [Citation Graph (, )][DBLP ] The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes. [Citation Graph (, )][DBLP ] Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. [Citation Graph (, )][DBLP ] A Design for an Online RSS Reader Based On AJAX. [Citation Graph (, )][DBLP ] A Web Services Based Email Extension for Remote Monitoring of Embedded Systems. [Citation Graph (, )][DBLP ] Research on RTOS-Integrated TMR for Fault Tolerant Systems. [Citation Graph (, )][DBLP ] Framework for Intrusion Tolerant Certification Authority System Evaluation. [Citation Graph (, )][DBLP ] EndSec: An end-to-end message security protocol for mobile telecommunication networks. [Citation Graph (, )][DBLP ] Protecting web services from remote exploit code: a static analysis approach. [Citation Graph (, )][DBLP ] Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. [Citation Graph (, )][DBLP ] An Objective Trust Management Framework for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] An Attack-Resilient Channel Assignment MAC Protocol. [Citation Graph (, )][DBLP ] Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI. [Citation Graph (, )][DBLP ] A bus arbitration scheme for HDTV decoder SoC. [Citation Graph (, )][DBLP ] A Novel Micro Air Vehicle with Flexible Wing Integrated with On-board Electronic Devices. [Citation Graph (, )][DBLP ] Research on Experimental Platform and Methods for the Course "Interface and Communication". [Citation Graph (, )][DBLP ] Semantization Improves the Energy Efficiency of Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Computer Supported Collaborative Learning Framework for the Handicapped in Ubiquitous Computing Environment. [Citation Graph (, )][DBLP ] Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge Acquisition. [Citation Graph (, )][DBLP ] Energy-Efficient Architecture for Embedded Software with Hard Real-Time Requirements in Partial Reconfigurable Systems. [Citation Graph (, )][DBLP ] Model of Network Traffic Based on Network Applications and Network Users. [Citation Graph (, )][DBLP ] Discriminative training for improving letter-to-sound conversion performance. [Citation Graph (, )][DBLP ] Prefix tree based auto-completion for convenient bi-modal chinese character input. [Citation Graph (, )][DBLP ] An evidence framework for Bayesian learning of continuous-density hidden Markov models. [Citation Graph (, )][DBLP ] Cross-lingual speech recognition under runtime resource constraints. [Citation Graph (, )][DBLP ] Applying Granular Computing theories to system modelling with optimised development process. [Citation Graph (, )][DBLP ] Gene expression: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. [Citation Graph (, )][DBLP ] Creation of the importance scanning worm using information collected by Botnets. [Citation Graph (, )][DBLP ] Search in 0.237secs, Finished in 0.247secs