The SCEAS System
Navigation Menu

Search the dblp DataBase


Ming Hu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ming Hu, Junshan Zhang
    Two novel schemes for opportunistic multi-access. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:412-415 [Conf]
  2. Ming Hu, Junshan Zhang, John Sadowsky
    Traffic Aided Opportunistic Scheduling for Downlink Transmissions: Algorithms and Performance Bounds. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  3. Junshan Zhang, Ming Hu, Ness B. Shroff
    Bursty Data Over CDMA: MAI Self Similarity, Rate Control and Admission Control. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  4. Jerzy W. Grzymala-Busse, Ming Hu
    A Comparison of Several Approaches to Missing Attribute Values in Data Mining. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2000, pp:378-385 [Conf]
  5. Ming Hu, Junshan Zhang, John Sadowsky
    Traffic aided opportunistic scheduling for wireless networks: algorithms and performance bounds. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:4, pp:505-518 [Journal]
  6. Junshan Zhang, Ming Hu, Ness B. Shroff
    Bursty traffic over CDMA: predictive MAI temporal structure, rate control and admission control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:42, n:6, pp:779-795 [Journal]
  7. Ming Hu, Junshan Zhang
    Opportunistic Multi-Access: Multiuser Diversity, Relay-Aided Opportunistic Scheduling, and Traffic-Aided Smooth Admission Control. [Citation Graph (0, 0)][DBLP]
    MONET, 2004, v:9, n:4, pp:435-444 [Journal]

  8. A Dynamic Clustering Algorithm Based on Small Data Set. [Citation Graph (, )][DBLP]

  9. Timing Evaluation of the Known Cryptographic Algorithms. [Citation Graph (, )][DBLP]

  10. Fuzzy Reliability Analysis of a Multi-sensor Fusion System. [Citation Graph (, )][DBLP]

  11. Fuzzy Reliability Analysis of an iSCSI-Based Fault Tolerant Storage System Organization. [Citation Graph (, )][DBLP]

  12. RAID5x-Based Storage Complexity Analysis. [Citation Graph (, )][DBLP]

  13. Fuzzy Reliability Analysis of Distributed Storage System for Tolerating Double Node and Disk Failures. [Citation Graph (, )][DBLP]

  14. Simulation of Attacks on Network-based Error Detection. [Citation Graph (, )][DBLP]

  15. FRAID: A Networked Data Storage Layout. [Citation Graph (, )][DBLP]

  16. Availability Analytical Model for Web Services of an E-learning Development Platform. [Citation Graph (, )][DBLP]

  17. Design and Model Analysis of the E-Commerce Development Platform for 3-Tiered Web Applications. [Citation Graph (, )][DBLP]

  18. Analytical Model for Cluster Services of Flexible Enterprise Resource Planning Systems. [Citation Graph (, )][DBLP]

  19. Privacy Protecting in E-business Using Reasoning. [Citation Graph (, )][DBLP]

  20. Updating the Dynamic Fuzzy Sets Based on Immune Evolutionary. [Citation Graph (, )][DBLP]

Search in 0.046secs, Finished in 0.048secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002