Search the dblp DataBase
Weifeng Chen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Weifeng Chen , Kevin Lü Agent-Based Data Mining Approach for the Prediction of UK and Irish Companies Performance. [Citation Graph (0, 0)][DBLP ] BNCOD, 2004, pp:100-105 [Conf ] S. Su , José A. B. Fortes , T. R. Kasad , M. Patil , Andréa M. Matsunaga , Maurício O. Tsugawa , Violetta Cavalli-Sforza , Jaime G. Carbonell , Peter J. Jansen , W. Ward , R. Cole , Donald F. Towsley , Weifeng Chen , Annie I. Antón , Qingfeng He , C. McSweeney , L. deBrens , J. Ventura , P. Taveras , R. Connolly , C. Ortega , B. Piñeres , O. Brooks , M. Herrera A Prototype System for Transnational Information Sharing and Process Coordination. [Citation Graph (0, 0)][DBLP ] DG.O, 2004, pp:- [Conf ] S. Su , José A. B. Fortes , T. R. Kasad , M. Patil , Andréa M. Matsunaga , Maurício O. Tsugawa , Violetta Cavalli-Sforza , Jaime G. Carbonell , Peter J. Jansen , W. Ward , R. Cole , Donald F. Towsley , Weifeng Chen , Annie I. Antón , Qingfeng He , C. McSweeney , L. deBrens , J. Ventura , P. Taveras , R. Connolly , C. Ortega , B. Piñeres , O. Brooks , M. Herrera A Prototype System for Transnational Information Sharing and Process Coordination: System Demo. [Citation Graph (0, 0)][DBLP ] DG.O, 2004, pp:- [Conf ] Weifeng Chen , Lakshminath R. Dondeti Recommendations in Using Group Key Management Algorithms. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:222-227 [Conf ] Weifeng Chen , James F. Kurose , Donald F. Towsley , Zihui Ge Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events. [Citation Graph (0, 0)][DBLP ] ICNP, 2005, pp:191-200 [Conf ] Weifeng Chen , L. Clarke , James F. Kurose , Donald F. Towsley Optimizing cost-sensitive trust-negotiation protocols. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1431-1442 [Conf ] Weifeng Chen , Zihui Ge , Chun Zhang , James F. Kurose , Donald F. Towsley On Dynamic Subset Difference Revocation Scheme. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:743-758 [Conf ] Weifeng Chen , Lakshminath R. Dondeti Performance Comparison of Stateful and Stateless Group Rekeying Algorithms. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2002, pp:11-18 [Conf ] Weifeng Chen , Yong Huang , Bruno F. Ribeiro , Kyoungwon Suh , Honggang Zhang , Edmundo de Souza e Silva , James F. Kurose , Donald F. Towsley Exploiting the IPID Field to Infer Network Path and End-System Characteristics. [Citation Graph (0, 0)][DBLP ] PAM, 2005, pp:108-120 [Conf ] Jianchun Jiang , Weifeng Chen , Sihan Qing , Dengguo Feng The Defense Framework for Large-scale Computer Network System. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:69-78 [Conf ] Xiaosong Wang , Haitao Zhao , Qingwen Xu , Weibo Jin , Changning Liu , Huagang Zhang , Zhibin Huang , Xinyu Zhang , Yu Zhang , Dianqi Xin , Andrew J. G. Simpson , Lloyd J. Old , Yanqun Na , Yi Zhao , Weifeng Chen HPtaa database-potential target genes for clinical diagnosis and immunotherapy of human carcinoma. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 2006, v:34, n:Database-Issue, pp:607-612 [Journal ] Weifeng Chen , Zhen Liu , Anton Riabov A Soft Constraint Privacy Model based on Identifiability. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2007, pp:675-980 [Conf ] Wireless Forensic: A New Radio Frequency Based Locating System. [Citation Graph (, )][DBLP ] Analyzing Privacy in Enterprise Packet Trace Anonymization. [Citation Graph (, )][DBLP ] On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. [Citation Graph (, )][DBLP ] Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks. [Citation Graph (, )][DBLP ] Wireless Access Point Deployment for Both Coverage and Localization. [Citation Graph (, )][DBLP ] Fast, Sub-pixel Antialiased Shadow Maps. [Citation Graph (, )][DBLP ] Search in 0.032secs, Finished in 0.034secs