The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Renfa Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kenli Li, Yan He, Renfa Li, Tao Yang
    A Scheduling Algorithm Based on a Trust Mechanism in Grid. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:463-468 [Conf]
  2. Yuan-ni Guo, Renfa Li
    Design and Performance of Firewall System Based on Embedded Computing. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:992-995 [Conf]
  3. Guangxue Yue, Renfa Li, Zude Zhou, Ronghui Wu
    An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:776-786 [Conf]
  4. Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li
    Intrusion Detection Based on Fuzzy Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:231-239 [Conf]
  5. Kenli Li, Renfa Li, Yang Lei, Yan-Tao Zhou
    A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:197-204 [Conf]
  6. Cheng Xu, Fei Yu, Zhenghui Dai, Guangxue Yue, Renfa Li
    Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:27- [Conf]
  7. Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li
    Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:74- [Conf]
  8. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu
    Research on User Authentication for Grid Computing Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:72- [Conf]
  9. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen
    Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:75- [Conf]
  10. Rui Li, Renfa Li, Fei Yu, Jigang Wen
    A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:73- [Conf]
  11. Kenli Li, Renfa Li, Qing-Hua Li
    Optimal Parallel Algorithm for the Knapsack Problem Without Memory Conflicts. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:6, pp:760-768 [Journal]
  12. Ying Wang, Kenli Li, Lang Li 0002, Renfa Li
    A Vertical and Horizontal Multiway Algorithm for Parallel-Merging. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:12, pp:2180-2186 [Journal]
  13. Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Chen Xu
    Research on Advanced Distributed Learning by Using SCORM. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:571-574 [Conf]

  14. An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea. [Citation Graph (, )][DBLP]


  15. A Energy Efficient Scheduling Base on Dynamic Voltage and Frequency Scaling for Multi-core Embedded Real-Time System. [Citation Graph (, )][DBLP]


  16. Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. [Citation Graph (, )][DBLP]


  17. VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN. [Citation Graph (, )][DBLP]


  18. Equitable distribution energy consumption of wsns. [Citation Graph (, )][DBLP]


  19. A Holistic Routing Protocol Design in Underground Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. Fast Localization Using Robust UWB Coding in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Clustering-Based Compressive Wide-Band Spectrum Sensing in Cognitive Radio Network. [Citation Graph (, )][DBLP]


  22. A novel OVSF-TH-UWB communication system. [Citation Graph (, )][DBLP]


  23. An Intrusion Alarm System Based on Fuzzy Reasoning Machine. [Citation Graph (, )][DBLP]


  24. Design and Implementation of Embedded Multimedia Surveillance System. [Citation Graph (, )][DBLP]


  25. An Energy-Aware Distributed Clustering Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  26. An optimization design and simulation of Ptolemy-based motor speed control. [Citation Graph (, )][DBLP]


  27. An Improved Trust Model in P2P. [Citation Graph (, )][DBLP]


  28. A holistic approach to wireless sensor network routing in underground tunnel environments. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002