The SCEAS System
Navigation Menu

Search the dblp DataBase


Jian Yin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yubao Liu, Jian Yin
    The mining of fuzzy gradient in the case of materialized cube. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:93-97 [Conf]
  2. Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin
    Towards a Practical Approach to Confidential Byzantine Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:51-56 [Conf]
  3. Jian Chen, Jian Yin, Jin Huang
    Mining Correlated Rules for Associative Classification. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:130-140 [Conf]
  4. Jian Yin, Sanjay Kumar Madria
    SecRout: A Secure Routing Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:393-398 [Conf]
  5. Yiqun Chen, Chi-Hung Chi, Jian Yin
    Data Mining Service Based on MDA. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:297-302 [Conf]
  6. Weiheng Zhu, Jian Pei, Jian Yin, Yihuang Xie
    Granularity Adaptive Density Estimation and on Demand Clustering of Concept-Drifting Data Streams. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2006, pp:322-331 [Conf]
  7. Yiqun Chen, Jian Yin
    Sense Rank AALesk: A Semantic Solution for Word Sense Disambiguation. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:710-717 [Conf]
  8. Jian Chen, Jian Yin, Jin Huang, Ming Feng
    Associative Classification Based on Correlation Analysis. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:59-68 [Conf]
  9. Jian Yin, Xianli Fan, Yiqun Chen, Jiangtao Ren
    High-Dimensional Shared Nearest Neighbor Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:494-502 [Conf]
  10. Yubao Liu, Jian Yin
    The Computation of Semantic Data Cube. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:573-578 [Conf]
  11. Jian Chen, Liangyi Ou, Jian Yin, Jin Huang
    Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:519-528 [Conf]
  12. Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin
    Using Leases to Support Server-Driven Consistency in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:285-294 [Conf]
  13. Jian Chen, Jian Yin, Jun Zhang, Jin Huang
    Associative Classification in Text Categorization. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:1035-1044 [Conf]
  14. Jian Yin, Fang Mei, Gang Zhang
    Intrusion Detection Based on Data Mining. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:724-729 [Conf]
  15. Jiming Liu, Jian Yin
    Multi-agent Integer Programming. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2000, pp:301-307 [Conf]
  16. Jian Yin, Zhifang Tan
    Clustering Mixed Type Attributes in Large Dataset. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:655-661 [Conf]
  17. Haixun Wang, Jian Yin, Jian Pei, Philip S. Yu, Jeffrey Xu Yu
    Suppressing model overfitting in mining concept-drifting data streams. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:736-741 [Conf]
  18. Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu
    A Middleware System for Protecting Against Application Level Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    Middleware, 2006, pp:260-280 [Conf]
  19. Jiming Liu, Jian Yin
    Towards Efficient Data Re-mining (DRM). [Citation Graph (0, 0)][DBLP]
    PAKDD, 2001, pp:406-412 [Conf]
  20. Jian Yin, Duanning Zhou, Qiong-Qiong Xie
    A Clustering Algorithm for Time Series Data. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:119-122 [Conf]
  21. Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin
    Separating agreement from execution for byzantine fault tolerant services. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:253-267 [Conf]
  22. Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu
    A Client-Transparent Approach to Defend Against Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    SRDS, 2006, pp:61-70 [Conf]
  23. Jian Yin, Sanjay Kumar Madria
    A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:376-383 [Conf]
  24. Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin
    Hierarchical Cache Consistency in a WAN. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1999, pp:- [Conf]
  25. Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar
    Engineering server-driven consistency for large scale dynamic Web services. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:45-57 [Conf]
  26. Christopher Stewart, Kai Shen, Sandhya Dwarkadas, Michael L. Scott, Jian Yin
    Profile-Driven Component Placement for Cluster-Based Online Services. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:10, pp:- [Journal]
  27. Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sanjay Kumar Madria
    A secure hierarchical model for sensor network. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:1, pp:7-13 [Journal]
  28. Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin
    Volume Leases for Consistency in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1999, v:11, n:4, pp:563-576 [Journal]
  29. Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar
    Engineering web cache consistency. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2002, v:2, n:3, pp:224-259 [Journal]
  30. Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
    Clustering Massive Text Data Streams by Semantic Smoothing Model. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:389-400 [Conf]
  31. Mudhakar Srivatsa, Arun Iyengar, Thomas A. Mikalsen, Isabelle Rouvellou, Jian Yin
    An Access Control System for Web Service Compositions. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:1-8 [Conf]
  32. Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
    Integrity Auditing of Outsourced Data. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:782-793 [Conf]
  33. Raymond Chi-Wing Wong, Yubao Liu, Jian Yin, Zhilan Huang, Ada Wai-Chee Fu, Jian Pei
    (alpha, k)-anonymity Based Privacy Preservation by Lossy Join. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:733-744 [Conf]

  34. Face Recognition Using Clustering Based Optimal Linear Discriminant Analysis. [Citation Graph (, )][DBLP]

  35. Collaborative Filtering Recommendation Algorithm Using Dynamic Similar Neighbor Probability. [Citation Graph (, )][DBLP]

  36. Document Clustering Based on Semantic Smoothing Approach. [Citation Graph (, )][DBLP]

  37. Dual encryption for query integrity assurance. [Citation Graph (, )][DBLP]

  38. Providing freshness guarantees for outsourced databases. [Citation Graph (, )][DBLP]

  39. An Effective Maximal Subspace Clustering Algorithm Based on Enumeration Tree. [Citation Graph (, )][DBLP]

  40. A load balancing skyline query algorithm in high bandwidth distributed systems. [Citation Graph (, )][DBLP]

  41. Effective association clusters filtering to cold-start recommendations. [Citation Graph (, )][DBLP]

  42. Collaborative filtering recommendation based on fuzzy clustering of user preferences. [Citation Graph (, )][DBLP]

  43. An Adaptive Genetic Algorithm for Solving Traveling Salesman Problem. [Citation Graph (, )][DBLP]

  44. Exploring an Improved Decision Tree Based Weights. [Citation Graph (, )][DBLP]

  45. A Scalable Method for Access Control in Location-Based Broadcast Services. [Citation Graph (, )][DBLP]

  46. Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem. [Citation Graph (, )][DBLP]

  47. EntomoModel: Understanding and Avoiding Performance Anomaly Manifestations. [Citation Graph (, )][DBLP]

  48. Position: short object lifetimes require a delete-optimized storage system. [Citation Graph (, )][DBLP]

  49. An Improved Semantic Smoothing Model for Model-Based Document Clustering. [Citation Graph (, )][DBLP]

  50. Efficient Detection of Discords for Time Series Stream. [Citation Graph (, )][DBLP]

  51. Discrete quantum-behaved particle swarm optimization based on estimation of distribution for combinatorial optimization. [Citation Graph (, )][DBLP]

  52. Fast detection of database system abuse behaviors based on data mining approach. [Citation Graph (, )][DBLP]

  53. Genetic Particle Swarm Optimization Based on Multiagent Model for Combinatorial Optimization Problem. [Citation Graph (, )][DBLP]

  54. Newton geodesic optimization on special linear group. [Citation Graph (, )][DBLP]

  55. SeRWA: A secure routing protocol against wormhole attacks in sensor networks. [Citation Graph (, )][DBLP]

Search in 0.019secs, Finished in 0.021secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002