The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaohong Guan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
    Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:221- [Conf]
  2. Xiaohong Guan, Feng Gao, Alva J. Svoboda
    Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  3. Yongcai Wang, Dianfei Han, Qianchuan Zhao, Xiaohong Guan, Dazhong Zheng
    Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:333-338 [Conf]
  4. Li Xia, Xi Chen, Xiaohong Guan
    A New Gradient-Based Routing Protocol in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:318-325 [Conf]
  5. Yong Li, Peter B. Luh, Xiaohong Guan
    Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown. [Citation Graph (0, 0)][DBLP]
    ICRA, 1994, pp:3447-3452 [Conf]
  6. Shiji Song, Guocheng Li, Xiaohong Guan
    Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:350-358 [Conf]
  7. Qindong Sun, Xinbo Huang, Xiaohong Guan, Peng Gao
    An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:346-351 [Conf]
  8. Wei Wang, Xiaohong Guan, Xiangliang Zhang
    A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2004, pp:657-662 [Conf]
  9. Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
    Percentage Coverage Configuration in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:780-791 [Conf]
  10. Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu
    Predicting the intrusion intentions by observing system call sequences. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:3, pp:241-252 [Journal]
  11. Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang
    Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:7, pp:539-550 [Journal]
  12. Jinqian Liang, Xiaohong Guan
    A virtual disk environment for providing file system recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:8, pp:589-599 [Journal]
  13. Zhu Li, Ruixi Yuan, Xiaohong Guan
    Traffic Classification - Towards Accurate Real Time Network Applications. [Citation Graph (0, 0)][DBLP]
    HCI (4), 2007, pp:67-76 [Conf]

  14. Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. [Citation Graph (, )][DBLP]


  15. Propagation Modeling and Analysis of Incidental Topics in Blogosphere. [Citation Graph (, )][DBLP]


  16. Reliable Transport with Memory Consideration in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  17. Accurate Classification of the Internet Traffic Based on the SVM Method. [Citation Graph (, )][DBLP]


  18. Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. [Citation Graph (, )][DBLP]


  19. Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. [Citation Graph (, )][DBLP]


  20. A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings. [Citation Graph (, )][DBLP]


  21. On the performance of cognitive access with periodic spectrum sensing. [Citation Graph (, )][DBLP]


  22. A New Data Streaming Method for Locating Hosts with Large Connection Degree. [Citation Graph (, )][DBLP]


  23. Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels. [Citation Graph (, )][DBLP]


  24. Event-based optimization for dispatching policies in material handling systems of general assembly lines. [Citation Graph (, )][DBLP]


  25. Tracking moving object via a sensor network with partial information broadcasting scheme. [Citation Graph (, )][DBLP]


  26. P2P Traffic Identification Based on the Signatures of Key Packets. [Citation Graph (, )][DBLP]


  27. Processing of massive audit data streams for real-time anomaly intrusion detection. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.327secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002