The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dongyang Long: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ming Li, Chi-Hung Chi, Dongyang Long
    Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:94-103 [Conf]
  2. Dongyang Long
    Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme. [Citation Graph (0, 0)][DBLP]
    EurAsia-ICT, 2002, pp:127-134 [Conf]
  3. Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan
    Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2005, pp:370-375 [Conf]
  4. Dongyang Long, Weijia Jia
    Optimal Maximal Encoding Different from Huffman Encoding. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:493-0 [Conf]
  5. Dongyang Long, Weijia Jia, Ming Li
    On Synchronous Coding. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:390-395 [Conf]
  6. Ming Li, Jingao Liu, Dongyang Long
    An Empirical Autocorrelation Form for Modeling LRD Traffic Series. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:399-402 [Conf]
  7. Dongyang Long, Weijia Jia
    On the Optimal Coding. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:94-101 [Conf]
  8. Ming Li, Jingao Liu, Dongyang Long
    Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:596-599 [Conf]
  9. Dongyang Long, Weijia Jia, Jian Ma, Duanning Zhou
    k-p-Infix codes and semaphore codes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2001, v:109, n:3, pp:237-252 [Journal]
  10. Dongyang Long, Weijia Jia, Ming Li
    Optimal Prefix Codes and Huffman Codes. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2003, v:80, n:6, pp:727-742 [Journal]
  11. Dongyang Long, Weijia Jia, Ming Li
    Optimal synchronous coding. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:8, pp:931-941 [Journal]
  12. Dongyang Long, Weijia Jia, Liang Zhang
    Product of Finite Maximal P-Codes. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2002, v:79, n:8, pp:889-899 [Journal]
  13. Dongyang Long, Weijia Jia, Pui-on Au, Ming Li
    Improving Chinese Storing Text Retrieval Systems' Security via a Novel Maximal Prefix Coding. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2002, v:15, n:4, pp:379-393 [Journal]
  14. Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng
    Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    International Journal of Information Technology and Decision Making, 2003, v:2, n:3, pp:397-405 [Journal]
  15. Dongyang Long
    On Group Codes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:163, n:1&2, pp:259-267 [Journal]
  16. Dongyang Long, Jian Ma, Duanning Zhou
    Structure of 3-Infix-Outfix Maximal Codes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1997, v:188, n:1-2, pp:231-240 [Journal]
  17. Yuewen Tang, Dongyang Long
    Some Novel Results of p-Adic Component of Primitive Sequences over Z/(pd). [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:346-353 [Conf]

  18. A Load-Balanced Route Selection for Network Coding in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  19. Secure Relativistic Bit Commitment with Fixed Channel Capacity. [Citation Graph (, )][DBLP]


  20. An O(N) Algorithm of Separability for Two-Partite Arbitrarily Dimensional Pure States. [Citation Graph (, )][DBLP]


  21. Network Coding for Creating Replica in Grid Environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002