The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zheng Yuan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Denis Bauer, Mikael Bodén, Ricarda Thier, Zheng Yuan
    Predicting Structural Disruption of Proteins Caused by Crossover (based on Amino Acid Sequence). [Citation Graph (0, 0)][DBLP]
    CIBCB, 2005, pp:514-520 [Conf]
  2. Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang
    An ID-Based Watermarking Scheme for Java Programs. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:848-857 [Conf]
  3. Zheng Yuan, Rohan D. Teasdale
    Prediction of Golgi Type II membrane proteins based on their transmembrane domains. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2002, v:18, n:8, pp:1109-1115 [Journal]
  4. Mikael Bodén, Zheng Yuan, Timothy L. Bailey
    Prediction of protein continuum secondary structure with probabilistic models based on NMR solved structures. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2006, v:7, n:, pp:68- [Journal]
  5. Jiangning Song, Kevin Burrage, Zheng Yuan, Thomas Huber
    Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2006, v:7, n:, pp:124- [Journal]
  6. Zheng Yuan
    Better prediction of protein contact number using a support vector regression analysis of amino acid sequence. [Citation Graph (0, 0)][DBLP]
    BMC Bioinformatics, 2005, v:6, n:, pp:248- [Journal]
  7. Zheng Yuan, John S. Mattick, Rohan D. Teasdale
    SVMtm: Support vector machines to predict transmembrane segments. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2004, v:25, n:5, pp:632-636 [Journal]
  8. Ya-tao Yang, Zheng Yuan, Yong Fang, Ping Zeng
    A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:643-645 [Conf]

  9. Distinguishing and Second-Preimage Attacks on CBC-Like MACs. [Citation Graph (, )][DBLP]


  10. New Birthday Attacks on Some MACs Based on Block Ciphers. [Citation Graph (, )][DBLP]


  11. Robust image restoration for rotary motion degradations and the motion parameter identification. [Citation Graph (, )][DBLP]


  12. Mining Stock Market Tendency by RS-Based Support Vector Machines. [Citation Graph (, )][DBLP]


  13. Research of Stock Index Futures Prediction Model based on Rough Set and Support Vector Machine. [Citation Graph (, )][DBLP]


  14. A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection. [Citation Graph (, )][DBLP]


  15. Predicting disulfide connectivity from protein sequence using multiple sequence feature vectors and secondary structure. [Citation Graph (, )][DBLP]


  16. Exploiting structural and topological information to improve prediction of RNA-protein binding sites. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002