|
Search the dblp DataBase
Xiaohong Guan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:221- [Conf]
- Xiaohong Guan, Feng Gao, Alva J. Svoboda
Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market. [Citation Graph (0, 0)][DBLP] HICSS, 1999, pp:- [Conf]
- Yongcai Wang, Dianfei Han, Qianchuan Zhao, Xiaohong Guan, Dazhong Zheng
Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICESS, 2004, pp:333-338 [Conf]
- Li Xia, Xi Chen, Xiaohong Guan
A New Gradient-Based Routing Protocol in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICESS, 2004, pp:318-325 [Conf]
- Yong Li, Peter B. Luh, Xiaohong Guan
Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown. [Citation Graph (0, 0)][DBLP] ICRA, 1994, pp:3447-3452 [Conf]
- Shiji Song, Guocheng Li, Xiaohong Guan
Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset. [Citation Graph (0, 0)][DBLP] ISNN (1), 2006, pp:350-358 [Conf]
- Qindong Sun, Xinbo Huang, Xiaohong Guan, Peng Gao
An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:346-351 [Conf]
- Wei Wang, Xiaohong Guan, Xiangliang Zhang
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. [Citation Graph (0, 0)][DBLP] ISNN (2), 2004, pp:657-662 [Conf]
- Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
Percentage Coverage Configuration in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISPA, 2005, pp:780-791 [Conf]
- Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu
Predicting the intrusion intentions by observing system call sequences. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:3, pp:241-252 [Journal]
- Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:7, pp:539-550 [Journal]
- Jinqian Liang, Xiaohong Guan
A virtual disk environment for providing file system recovery. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:8, pp:589-599 [Journal]
- Zhu Li, Ruixi Yuan, Xiaohong Guan
Traffic Classification - Towards Accurate Real Time Network Applications. [Citation Graph (0, 0)][DBLP] HCI (4), 2007, pp:67-76 [Conf]
Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. [Citation Graph (, )][DBLP]
Propagation Modeling and Analysis of Incidental Topics in Blogosphere. [Citation Graph (, )][DBLP]
Reliable Transport with Memory Consideration in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Accurate Classification of the Internet Traffic Based on the SVM Method. [Citation Graph (, )][DBLP]
Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. [Citation Graph (, )][DBLP]
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. [Citation Graph (, )][DBLP]
A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings. [Citation Graph (, )][DBLP]
On the performance of cognitive access with periodic spectrum sensing. [Citation Graph (, )][DBLP]
A New Data Streaming Method for Locating Hosts with Large Connection Degree. [Citation Graph (, )][DBLP]
Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels. [Citation Graph (, )][DBLP]
Event-based optimization for dispatching policies in material handling systems of general assembly lines. [Citation Graph (, )][DBLP]
Tracking moving object via a sensor network with partial information broadcasting scheme. [Citation Graph (, )][DBLP]
P2P Traffic Identification Based on the Signatures of Key Packets. [Citation Graph (, )][DBLP]
Processing of massive audit data streams for real-time anomaly intrusion detection. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.327secs
|