The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zunping Cheng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mi Zhang, Zunping Cheng, Ziji Ma, Binyu Zang
    A Security Model Design in Web Service Environment. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:736-740 [Conf]
  2. Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao
    PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:357-362 [Conf]
  3. Zunping Cheng, Ding Zhou, Chen Wang, Jiankui Guo, Wei Wang, Baokang Ding, Baile Shi
    CLINCH: Clustering Incomplete High-Dimensional Data for Data Mining Application. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:88-99 [Conf]
  4. Ding Zhou, Zunping Cheng, Chen Wang, Haofeng Zhou, Wei Wang, Baile Shi
    SUDEPHIC: Self-Tuning Density-Based Partitioning and Hierarchical Clustering. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2004, pp:554-567 [Conf]
  5. Min Yang, Zunping Cheng, Ning Shang, Mi Zhang, Min Li, Jing Dai, Wei Wang, Dilin Mao, Chuanshan Gao
    iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:997-1000 [Conf]
  6. Mi Zhang, Jianjun Xu, Zunping Cheng, Yinsheng Li, Binyu Zang
    A Web Service-Based Framework for Supply Chain Management. [Citation Graph (0, 0)][DBLP]
    ISORC, 2005, pp:316-319 [Conf]
  7. Jiankui Guo, Beijun Ruan, Zunping Cheng, Fang-zhong Su, YaQin Wang, Xu-bin Deng, Ning Shang, Yangyong Zhu
    A Top-Down Algorithm for Mining Web Access Patterns from Web Logs. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:838-843 [Conf]
  8. Haofeng Zhou, Qingqing Yuan, Zunping Cheng, Baile Shi
    PHC: A Fast Partition and Hierarchy-Based Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:3, pp:407-0 [Journal]

  9. ADDI: an agent-based extension to UDDI for supply chain management. [Citation Graph (, )][DBLP]


  10. Statistical attack detection. [Citation Graph (, )][DBLP]


  11. Effective diverse and obfuscated attacks on model-based recommender systems. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002