The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhengding Lu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu-Hua Li, Zhengding Lu
    Ontology-Based Universal Knowledge Grid: Enabling Knowledge Discovery and Integration on the Grid. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:557-560 [Conf]
  2. Ruixuan Li, Zhi Zhang, Zhigang Wang, Wei Song, Zhengding Lu
    WebPeer: A P2P-based System for Publishing and Discovering Web Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:149-158 [Conf]
  3. Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun, Zhigang Wang
    A Semantic Search Conceptual Model and Application in Security Access Control. [Citation Graph (0, 0)][DBLP]
    ASWC, 2006, pp:366-376 [Conf]
  4. Yiqun Huang, Zhengding Lu, Heping Hu
    A new permutation approach for distributed association rule mining. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:351-352 [Conf]
  5. Bing Li, Zhengding Lu, Weijun Xiao, Ruixuan Li, Zhang Wei, Mudar Sarem
    An Architecture for Multidatabase Systems Based on CORBA and XML. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:32-37 [Conf]
  6. Ruixuan Li, Zhengding Lu, Weijun Xiao, Bing Li, Wei Wu
    Schema Mapping for Interoperability in XML-Based Multidatabase Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:235-240 [Conf]
  7. Li Chunlin, Zhengding Lu, Li Layuan
    Price Driven Market Mechanism for Computational Grid Resource Allocation. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2004, pp:117-126 [Conf]
  8. Hefei Ling, Zhengding Lu, Fuhao Zou
    New real-time watermarking algorithm for compressed video in vlc domain. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2171-2174 [Conf]
  9. Shuangyuan Yang, Zhengding Lu, Fuhao Zou
    A robust adaptive image watermarking algorithm. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1723-1726 [Conf]
  10. Zhengding Lu, Suzhi Zhang
    Data Integration Based WWW with XML and CORBA. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:455-458 [Conf]
  11. Ruixuan Li, Zhi Zhang, Wei Song, Feng Ke, Zhengding Lu
    Service Publishing and Discovering Model in a Web Services Oriented Peer-to-Peer System. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:597-599 [Conf]
  12. Suzhi Zhang, Zhengding Lu
    Automatic Generation of Wrapper for Data Extraction from the Web. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:390-394 [Conf]
  13. Yiqun Huang, Zhengding Lu, Heping Hu
    A Method of Security Improvement for Privacy Preserving Association Rule Mining over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2005, pp:339-343 [Conf]
  14. Yanwei Yu, Zhengding Lu, Hefei Ling, Fuhao Zou
    No-Reference Perceptual Quality Assessment of JPEG Images Using General Regression Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:638-645 [Conf]
  15. Fuhao Zou, Zhengding Lu, Hefei Ling
    A multiple watermarking algorithm based on CDMA technique. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:424-427 [Conf]
  16. Hans Shui-Hua, Zhengding Lu
    Shape Retrieval by Hierarchical Evolution. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:849-854 [Conf]
  17. Gaoxiang Yi, Heping Hu, Zhengding Lu
    Web Document Classification Based on Extended Rough set. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:916-919 [Conf]
  18. Mao-yuan Zhang, Ruixuan Li, Zhengding Lu, Chun-yan Zou
    An ECG Parallel Scheduling Algorithm for the Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:484-487 [Conf]
  19. Mao-yuan Zhang, Zhengding Lu
    A Fuzzy Classification Based on Feature Selection for Web Pages. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:469-472 [Conf]
  20. Mao-yuan Zhang, Chun-yan Zou, Zhengding Lu, Zhigang Wang
    A Semantic Matching of Information Segments for Tolerating Error Chinese Words. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:48-59 [Conf]
  21. Li Chunlin, Zhengding Lu, Li Layuan
    Design and implementation of a distributed computing environment model for object-oriented networks programming. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:5, pp:516-521 [Journal]
  22. Fang Liu, Zhengding Lu, Songfeng Lu
    Mining association rules using clustering. [Citation Graph (0, 0)][DBLP]
    Intell. Data Anal., 2001, v:5, n:4, pp:309-326 [Journal]
  23. Li Chunlin, Zhengding Lu, Li Layuan
    Apply Market Mechanism to Agent-Based Grid Resource Management. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2003, v:13, n:3, pp:327-340 [Journal]
  24. Mao-yuan Zhang, Zhengding Lu, Chun-yan Zou
    A Chinese word segmentation based on language situation in processing ambiguous words. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:162, n:3-4, pp:275-285 [Journal]
  25. Zhengding Lu, Li Chunlin, Li Layuan
    Coordinating Mobile Agents by the XML-Based Tuple Space. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:888-900 [Journal]
  26. Li Chunlin, Zhengding Lu, Li Layuan
    Design and Implementation of a Hybrid Agent Platform. [Citation Graph (0, 0)][DBLP]
    Programming and Computer Software, 2003, v:29, n:1, pp:28-42 [Journal]
  27. Li Jin, Zhengding Lu
    A Novel Secure Interoperation System. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2007, pp:808-814 [Conf]
  28. Jinwei Hu, Ruixuan Li, Zhengding Lu
    Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:49-63 [Conf]
  29. Ruixuan Li, Xiaolin Sun, Zhengding Lu, Kunmei Wen, Yuhua Li
    Towards a Type-2 Fuzzy Description Logic for Semantic Search Engine. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:805-812 [Conf]
  30. Li Jin, Zhengding Lu
    ASITL: Adaptive Secure Interoperation Using Trust-Level. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:117-128 [Conf]

  31. FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes. [Citation Graph (, )][DBLP]

  32. SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network. [Citation Graph (, )][DBLP]

  33. A logic for authorization provenance. [Citation Graph (, )][DBLP]

  34. Community mining on dynamic weighted directed graphs. [Citation Graph (, )][DBLP]

  35. Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. [Citation Graph (, )][DBLP]

  36. P2P-based Locking in Real-Time Collaborative Editing Systems. [Citation Graph (, )][DBLP]

  37. Discovering Hidden Group in Financial Transaction Network Using Hidden Markov Model and Genetic Algorithm. [Citation Graph (, )][DBLP]

  38. A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern. [Citation Graph (, )][DBLP]

  39. Real-time video watermarking based on extended m-sequences. [Citation Graph (, )][DBLP]

  40. Fast and robust video copy detection scheme using full DCT coefficients. [Citation Graph (, )][DBLP]

  41. Managing Authorization Provenance: A Modal Logic Based Approach. [Citation Graph (, )][DBLP]

  42. ICache: A Size-Aware Cooperative Caching Architecture for Web Images. [Citation Graph (, )][DBLP]

  43. Secure Interoperation in Multidomain Environments Employing UCON Policies. [Citation Graph (, )][DBLP]

  44. Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. [Citation Graph (, )][DBLP]

  45. Secret Sharing Based Video Watermark Algorithm for Multiuser. [Citation Graph (, )][DBLP]

  46. Robust image copy detection using multi-resolution histogram. [Citation Graph (, )][DBLP]

  47. Image Splicing Detection Using Multi-resolution Histogram. [Citation Graph (, )][DBLP]

  48. Role updating for assignments. [Citation Graph (, )][DBLP]

  49. Role mining based on weights. [Citation Graph (, )][DBLP]

  50. Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  51. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. [Citation Graph (, )][DBLP]

  52. RBAC-Based Secure Interoperation Using Constraint Logic Programming. [Citation Graph (, )][DBLP]

  53. A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. [Citation Graph (, )][DBLP]

  54. On Role Mappings for RBAC-Based Secure Interoperation. [Citation Graph (, )][DBLP]

  55. An efficient quantum search engine on unsorted database [Citation Graph (, )][DBLP]

Search in 0.116secs, Finished in 0.120secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002