Search the dblp DataBase
Jianping Wu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wei She , Jiahai Yang , Jianping Wu Passive Inter-Domain Routing Monitor Based on Routing Interaction. [Citation Graph (0, 0)][DBLP ] CIT, 2006, pp:104- [Conf ] Dan Li , Jianping Wu , Ke Xu , Yong Cui , Ying Liu , Xiaoping Zhang Performance Analysis of Multicast Routing Protocol PIM-SM. [Citation Graph (0, 0)][DBLP ] AICT/SAPIR/ELETE, 2005, pp:157-162 [Conf ] Jinxiang Zhang , Jilong Wang , Jianping Wu , Xing Li A Distributed Network Management Framework Based on NGI. [Citation Graph (0, 0)][DBLP ] APPT, 2003, pp:430-434 [Conf ] Wu Liu , Haixin Duan , Jianping Wu , Xing Li PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:518-525 [Conf ] Hong Zhang , Haixin Duan , Wu Liu , Jianping Wu An Extensible AAA Infrastructure for IPv6. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:482-487 [Conf ] Jun Bi , Jianping Wu , Miao Zhang Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:681-691 [Conf ] Jun Bi , Jianping Wu A Formal Approach to Conformance Testing of Distributed Routing Protocols. [Citation Graph (0, 0)][DBLP ] FORTE, 1999, pp:151-163 [Conf ] Jianping Wu , Yixin Zhao , Xia Yin From Active to Passive: Progress in Testing of Internet Routing Protocols. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:101-118 [Conf ] Dewang Chen , Yueming Yuan , Baiheng Li , Jianping Wu Validation and Comparison of Microscopic Car-Following Models Using Beijing Traffic Flow Data. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:1008-1011 [Conf ] Wu Liu , Jianping Wu , Hai-Xin Duan , Xing Li New Algorithm Mining Intrusion Patterns. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:774-777 [Conf ] Yuanfeng Zhou , Jianping Wu , Yuanhua Jia Research on Index System and Fuzzy Comprehensive Evaluation Method for Passenger Satisfaction. [Citation Graph (0, 0)][DBLP ] FSKD (1), 2005, pp:118-121 [Conf ] Wu Liu , Hai-Xin Duan , Jianping Wu , Xing Li , Ping Ren Algorithms for Congestion Detection and Control. [Citation Graph (0, 0)][DBLP ] GCC Workshops, 2004, pp:374-381 [Conf ] Wu Liu , Hai-Xin Duan , Jianping Wu , Ping Ren , Li-Hua Lu Distributed IDS Tracing Back to Attacking Sources. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:859-866 [Conf ] Wu Liu , Jianping Wu , Hai-Xin Duan , Xing Li , Ping Ren XML Based X.509 Authorization in CERNET Grid. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:325-332 [Conf ] Chang-ji Wang , Jianping Wu Applications of Peer to Peer Technology in CERNET. [Citation Graph (0, 0)][DBLP ] GCC (1), 2003, pp:436-439 [Conf ] Suogang Li , Jianping Wu , Ke Xu , Ying Liu Heterogeneous QoS Multicast and Its Improvement on Edge-Based Overlay Networks. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:436-446 [Conf ] Kun Wu , Jianping Wu , Ke Xu A Tree-Based Distributed Model for BGP Route Processing. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:119-128 [Conf ] Zuhui Yue , Youjian Zhao , Jianping Wu , Xiaoping Zhang Designing Scalable Routers with a New Switching Architecture. [Citation Graph (0, 0)][DBLP ] ICAS/ICNS, 2005, pp:1- [Conf ] Yong Cui , Jianping Wu Clustering-Based Distributed Precomputation for Quality-of-Service Routing. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2005, pp:551-558 [Conf ] Kun Wu , Jianping Wu , Ke Xu A Novel Control Plane Model of Extensible Routers. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:33-40 [Conf ] Jun Bi , Jianping Wu , X. Chen A Concurrent TTCN based Approach to Conformance Testing of Distributed Routing Protocol OSPF v2. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:760-767 [Conf ] Chuang Lin , Bo Li , Jianping Wu Modeling ATM traffic using stochastic Petri net. [Citation Graph (0, 0)][DBLP ] ICCCN, 1997, pp:538-0 [Conf ] Yong Jiang , Jianping Wu Proportional Differentiated Services for End-to-End Traffic Control. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:672-681 [Conf ] Liu Yan , Yin Xia , Jianping Wu Survey on SNMP in next genaration network. [Citation Graph (0, 0)][DBLP ] ICETE, 2005, pp:231-239 [Conf ] Yichang Tsai , Jianping Wu , Yiching Wu , Zhaohua Wang Automatic Roadway Geometry Measurement Algorithm Using Video Images. [Citation Graph (0, 0)][DBLP ] ICIAP, 2005, pp:669-678 [Conf ] Wu Liu , Jianping Wu , Hai-Xin Duan , Xing Li New Method for Intrusion Features Mining in IDS. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2005, pp:429-437 [Conf ] Jun Bi , Xiaoxiang Leng , Jianping Wu OSPF-TE Scalability Study based on Internal Performance Measurement. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:92- [Conf ] Luo Wen , Jianping Wu , Ke Xu Overlay Logging: An IP Traceback Scheme in MPLS Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:75-82 [Conf ] Jingxin Dong , Jianping Wu , Yuanfeng Zhou Comparative Study on Recognition of Transportation Under Real and UE Status. [Citation Graph (0, 0)][DBLP ] ICNC (2), 2005, pp:105-108 [Conf ] David Lee , Dongluo Chen , Ruibing Hao , Raymond E. Miller , Jianping Wu , Xia Yin A Formal Approach for Passive Testing of Protocol Data Portions. [Citation Graph (0, 0)][DBLP ] ICNP, 2002, pp:122-131 [Conf ] Yong Cui , Ke Xu , Jianping Wu Multi-constrained End-to-End Admission Control in Core-Stateless Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:420-429 [Conf ] Yong Cui , Ke Xu , Mingwei Xu , Jianping Wu Optimal QoS Routing Based on Extended Simulated Annealing. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:553-562 [Conf ] Suogang Li , Jianping Wu , Ke Xu ComBAQ: Provisioning Loss Differentiated Services for Hybrid Traffic in Routers. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:313-320 [Conf ] Zhiyong Liang , Ke Xu , Jianping Wu A Scalable Parallel Lookup Framework Avoiding Longest Prefix Match. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:616-625 [Conf ] Feng Shi , Jianping Wu , Ke Xu The Stability Problem of Multicast Trees in Layered Multicast. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:212-221 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu , Mingwei Xu SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:515-524 [Conf ] Zuhui Yue , Youjian Zhao , Jianping Wu , Xiaoping Zhang LBSR: A Load-Balanced Semiminimal Routing Algorithm in Cellular Routers. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:419-428 [Conf ] Lijun Wang , Ke Xu , Jianping Wu BGP Route Selection Notice. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:440-449 [Conf ] Yong Cui , Ke Xu , Jianping Wu Precomputation for Multi-constrained QoS Routing in High-speed Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Ruibing Hao , Jianping Wu Toward Formal TTCN-Based Test Execution. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:230-235 [Conf ] Mingwei Xu , Jianping Wu An Extension to Concurrent TTCN. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1998, pp:447-454 [Conf ] Yong Jiang , Chuang Lin , Jianping Wu , Xiaoxia Sun Integrated Performance Evaluating Criteria for Network Traffic Control. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:438-443 [Conf ] Yan Liu , Xia Yin , Jianping Wu Experience of Conformance Testing on IPv6 Protocols. [Citation Graph (0, 0)][DBLP ] ISCC, 2006, pp:95-100 [Conf ] Miao Zhang , Fengyuan Ren , Jianping Wu , Ke Xu Using fuzzy-PI controller in active queue management. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:742-747 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:57-62 [Conf ] Dan Li , Jianping Wu , Yong Cui , Jiangchuan Liu , Ke Xu Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. [Citation Graph (0, 0)][DBLP ] ISCIS, 2006, pp:844-853 [Conf ] Qian Wu , Jian-Ping Wu , Mingwei Xu , Yong Cui , Hui Deng An Agent-Based Scheme for Efficient Multicast Application in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ISCIS, 2005, pp:23-32 [Conf ] Zhonghua Li , ShaoBai Chen , Rirong Zheng , Jianping Wu , Zongyuan Mao A Novel Approach to Clustering Analysis Based on Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2004, pp:565-570 [Conf ] Jun Bi , Jianping Wu A STREAMS based high performance IP/X.25 router. [Citation Graph (0, 0)][DBLP ] ISPAN, 1996, pp:268-273 [Conf ] Jilong Wang , Ni Chunsheng , Jianping Wu , Guo Yunfei Next Generation Internet. [Citation Graph (0, 0)][DBLP ] ISPAN, 2004, pp:351-356 [Conf ] Lei Sun , Ke Xu , Weidong Liu , Jianping Wu TMS: A Scalable Transition Multicast Scheme. [Citation Graph (0, 0)][DBLP ] IWDC, 2003, pp:80-90 [Conf ] Chuang Lin , Lijie Sheng , Jianping Wu , Mingwei Xu An Integrative Scheme of Differentiated Services: Modeling and Performance Analysis. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2000, pp:441-448 [Conf ] Yixin Zhao , Jianping Wu , Bin Yu Intelligent Online BGP-4 Analyzer. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2000, pp:385-391 [Conf ] Yixin Zhao , Xia Yin , Bo Han , Jianping Wu On-Line Test System Applied in Routing Protocol Test. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2001, pp:331-338 [Conf ] Hongliang Bai , Jianping Wu , Changping Liu Motion and haar-like features based vehicle detection. [Citation Graph (0, 0)][DBLP ] MMM, 2006, pp:- [Conf ] Qian Wu , Jianping Wu , Mingwei Xu Improving Multicast Stability in Mobile Multicast Scheme Using Motion Prediction. [Citation Graph (0, 0)][DBLP ] MMNS, 2006, pp:235-246 [Conf ] Qian Wu , Jianping Wu , Mingwei Xu , Hui Deng A Simulation Study to Investigate the Impact of Mobility on Stability of IP Multicast Tree. [Citation Graph (0, 0)][DBLP ] MSN, 2005, pp:836-845 [Conf ] Zhongjie Li , Jianping Wu , Xia Yin Testing Multi Input/Output Transition System with All-Observer. [Citation Graph (0, 0)][DBLP ] TestCom, 2004, pp:95-111 [Conf ] Zhiliang Wang , Jianping Wu , Xia Yin , Xingang Shi , Beihang Tian Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems. [Citation Graph (0, 0)][DBLP ] TestCom, 2006, pp:324-340 [Conf ] Jianping Wu , Zhongjie Li , Xia Yin Towards Modeling and Testing of IP Routing Protocols. [Citation Graph (0, 0)][DBLP ] TestCom, 2003, pp:49-62 [Conf ] Dan Li , Yong Cui , Ke Xu , Jianping Wu Improvement of Multicast Routing Protocol Using Petri Nets. [Citation Graph (0, 0)][DBLP ] RSFDGrC (2), 2005, pp:634-643 [Conf ] Chongrong Li , Xing Li , Jianping Wu , Yue You , Maoke Chen IPv6 Development in China. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2003, pp:153-156 [Conf ] Zhongjie Li , Xia Yin , Jianping Wu Distributed Testing of Multi Input/Output Transition System. [Citation Graph (0, 0)][DBLP ] SEFM, 2004, pp:271-280 [Conf ] Li Zimu , Jianping Wu , ShaoHua Qin Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:46- [Conf ] Youjian Zhao , Zuhui Yue , Jianping Wu , Xiaoping Zhang Topological Properties and Routing Algorithms in Cellular Router. [Citation Graph (0, 0)][DBLP ] ICNS, 2006, pp:101- [Conf ] Kun Wu , Jianping Wu , Lizheng Fu , Ke Xu PS2 : An HA-Enabled Memory Management Scheme In Core Routers. [Citation Graph (0, 0)][DBLP ] ICNS, 2006, pp:26- [Conf ] Wu Liu , Hai-Xin Duan , Jian-Ping Wu , Xing Li Improved Marking Model ERPPM Tracing Back to DDoS Attacker. [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:759-762 [Conf ] Wu Liu , Jian-Ping Wu , Hai-Xin Duan , Xing Li The Authorization Service in Dynamic Trust Domains. [Citation Graph (0, 0)][DBLP ] ICITA (2), 2005, pp:564-567 [Conf ] Li Zimu , Jilong Wang , Jianping Wu P3Cast: A hybrid VoD streaming architecture of proxy with caching, patching, and peering for large-scale deployment. [Citation Graph (0, 0)][DBLP ] Communication Systems and Networks, 2006, pp:213-218 [Conf ] Zhao Li , Lizheng Fu , Ke Xu , Zhenyu Shi , Jianping Wu Smooth Handoff Based on Virtual Interface in Wireless Network. [Citation Graph (0, 0)][DBLP ] ICWMC, 2006, pp:79- [Conf ] Yong Cui , Jianping Wu , Ke Xu Precomputation for intra-domain QoS routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:47, n:6, pp:923-937 [Journal ] Jianping Wu , Dan Li , Yong Cui Stability of ALM Tree with selfish receivers: A simulation study. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2895-2903 [Journal ] Jianping Wu , Yong Cui , Xing Li , Chris Metz The Transition to IPv6, Part 1: 4over6 for the China Education and Research Network. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2006, v:10, n:3, pp:80-85 [Journal ] Jinhui Shan , Ji Wang , Zhi-Chang Qi , Jianping Wu Improved Method to Generate Path-Wise Test Data. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:2, pp:235-240 [Journal ] Ke Xu , Jianping Wu , Zhongchao Yu , Mingwei Xu A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:2, pp:219-226 [Journal ] Yixin Zhao , Jianping Wu , Xia Yin From Active to Passive - Progress in Testing Internet Routing Protocols. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:3, pp:264-283 [Journal ] Yixin Zhao , Xia Yin , Jianping Wu Problems in the Information Dissemination of the Internet Routing. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:2, pp:139-152 [Journal ] Jiahai Yang , Hai-Xin Duan , Jianping Wu , Xing Li Workflow Oriented Network Management - A Web/Java Approach. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2004, v:12, n:4, pp:- [Journal ] Yuqing Zhang , Chunling Wang , Jianping Wu , Xing Li Using SMV for Cryptographic Protocol Analysis: A Case Study. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2001, v:35, n:2, pp:43-50 [Journal ] Jun Bi , Xiaoxiang Leng , Jianping Wu Scalable IPv4/IPv6 Transition: A Peer-to-Peer Based Approach. [Citation Graph (0, 0)][DBLP ] DBISP2P, 2006, pp:406-416 [Conf ] Yong Cui , Dan Li , Jianping Wu Impact of Buffer Map Cheating on the Streaming Quality in DONet. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:817-824 [Conf ] Lizhong Xie , Jun Bi , Jianping Wu An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:801-808 [Conf ] Mingjiang Ye , Jianping Wu , Miao Zhang Experience with SPM in IPv6. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:833-840 [Conf ] Dan Li , Jianping Wu , Yong Cui , Jiangchuan Liu QoS-Aware Streaming in Overlay Multicast Considering the Selfishness in Construction Action. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:1154-1162 [Conf ] Yan Shen , Jun Bi , Jianping Wu , Qiang Liu The Automatic Peer-to-Peer Signature for Source Address Validation. [Citation Graph (0, 0)][DBLP ] KES (1), 2007, pp:855-863 [Conf ] Wang Lijun , Wu Jianping , Xu Ke Modified flap damping mechanism to improve inter-domain routing convergence. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:7, pp:1588-1599 [Journal ] Yong Cui , Jianping Wu , Xing Li , Mingwei Xu , Chris Metz The Transition to IPv6, Part II: The Softwire Mesh Framework Solution. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2006, v:10, n:5, pp:76-80 [Journal ] Xiaoxiang Leng , Jun Bi , Miao Zhang , Jianping Wu Connecting IPvX Networks Over IPvY with a P2P Method. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2007, v:15, n:3, pp:383-399 [Journal ] AutoSig-Automatically Generating Signatures for Applications. [Citation Graph (, )][DBLP ] Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] Analysis of BGP Convergence Using SHLPN Model. [Citation Graph (, )][DBLP ] Mutation Testing of Protocol Messages Based on Extended TTCN-3. [Citation Graph (, )][DBLP ] Analysis of Anonymity in P2P Anonymous Communication Systems. [Citation Graph (, )][DBLP ] Security and Reliability Design of Olympic Games Network. [Citation Graph (, )][DBLP ] Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] Mining the Features of Environmental Physical Field Influencing Trajectories of Mesoscale Convective Systems Based on Spatial Clustering Analysis. [Citation Graph (, )][DBLP ] Failure Influence: Robustness Measure for Scalable Switch Fabric. [Citation Graph (, )][DBLP ] Caching the P2P Traffic in ISP Network. [Citation Graph (, )][DBLP ] Truthful Streaming in Selfish DONet. [Citation Graph (, )][DBLP ] Evaluating Service Scalability of Network Architectures. [Citation Graph (, )][DBLP ] IABA: An improved PNN Algorithm for anomaly detection in network security management. [Citation Graph (, )][DBLP ] Source Address Validation: Architecture and Protocol Design. [Citation Graph (, )][DBLP ] Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] A Trust and Reputation based Anti-SPIM Method. [Citation Graph (, )][DBLP ] Performance testing of Mobile IPv6 protocol. [Citation Graph (, )][DBLP ] A two-level source address spoofing prevention based on automatic signature and verification mechanism. [Citation Graph (, )][DBLP ] A Variation of Route Flap Damping to Improve BGP Routing Convergence. [Citation Graph (, )][DBLP ] A Multihoming Based IPv4/IPv6 Transition Approach. [Citation Graph (, )][DBLP ] Identify P2P Traffic by Inspecting Data Transfer Behaviour. [Citation Graph (, )][DBLP ] A Formal Approach to Robustness Testing of Network Protocol. [Citation Graph (, )][DBLP ] Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells. [Citation Graph (, )][DBLP ] AMCAS: An Automatic Malicious Code Analysis System. [Citation Graph (, )][DBLP ] A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. [Citation Graph (, )][DBLP ] RPS: range-based path selection method for concurrent multipath transfer. [Citation Graph (, )][DBLP ] Robust Real-Time Ellipse Detection by Direct Least-Square-Fitting. [Citation Graph (, )][DBLP ] A Novel Management Information Retrieval Algorithm Based on NGI. [Citation Graph (, )][DBLP ] Real-time Robust Algorithm for Circle Object Detection. [Citation Graph (, )][DBLP ] A Formal Approach to Robustness Testing of Network Protocol with Time Constraints. [Citation Graph (, )][DBLP ] Research on dynamic zoning of elevator traffic based on artificial immune algorithm. [Citation Graph (, )][DBLP ] NetRiver, a computer network experiment system. [Citation Graph (, )][DBLP ] Real-Time Automatic Road Sign Detection. [Citation Graph (, )][DBLP ] A Tunnels-Between-Hosts Based Method for IPv4 Application over Native IPv6 Network. [Citation Graph (, )][DBLP ] An Approach to Optimize Local Trust Algorithm in SureMsg Service. [Citation Graph (, )][DBLP ] Design and Implementation of a Mobile GIS for Field Data Collection. [Citation Graph (, )][DBLP ] A solution for the data collection in the field survey based on Mobile and Wireless GIS. [Citation Graph (, )][DBLP ] Spatial indexing of global geographical data with HTM. [Citation Graph (, )][DBLP ] A method for representing thematic data in three-dimensional GIS. [Citation Graph (, )][DBLP ] Identify P2P traffic by inspecting data transfer behavior. [Citation Graph (, )][DBLP ] Towards secure dynamic collaborations with group-based RBAC model. [Citation Graph (, )][DBLP ] Search in 0.014secs, Finished in 0.569secs