The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wu Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wu Liu, Haixin Duan, Jianping Wu, Xing Li
    PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:518-525 [Conf]
  2. Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu
    An Extensible AAA Infrastructure for IPv6. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:482-487 [Conf]
  3. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
    New Algorithm Mining Intrusion Patterns. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:774-777 [Conf]
  4. Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren
    Algorithms for Congestion Detection and Control. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:374-381 [Conf]
  5. Wu Liu, Hai-Xin Duan, Jianping Wu, Ping Ren, Li-Hua Lu
    Distributed IDS Tracing Back to Attacking Sources. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:859-866 [Conf]
  6. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren
    XML Based X.509 Authorization in CERNET Grid. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:325-332 [Conf]
  7. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
    New Method for Intrusion Features Mining in IDS. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:429-437 [Conf]
  8. Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren
    Improved algorithms tracing back to attacking sources. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:222-226 [Conf]
  9. Wu Liu, Hai-Xin Duan, Jian-Ping Wu, Xing Li
    Improved Marking Model ERPPM Tracing Back to DDoS Attacker. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:759-762 [Conf]
  10. Wu Liu, Jian-Ping Wu, Hai-Xin Duan, Xing Li
    The Authorization Service in Dynamic Trust Domains. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:564-567 [Conf]
  11. Yong-Bin Li, Wu Liu, Xiao-Lin Xiang
    Geometry Theorem Proving by Decomposing Polynomial Systems into Strong Regular Sets. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:6, pp:820-827 [Journal]

  12. Analysis of Anonymity in P2P Anonymous Communication Systems. [Citation Graph (, )][DBLP]


  13. Decision of optimal scheduling scheme for gas field pipeline network based on hybrid genetic algorithm. [Citation Graph (, )][DBLP]


  14. IABA: An improved PNN Algorithm for anomaly detection in network security management. [Citation Graph (, )][DBLP]


  15. Text normalization in mandarin text-to-speech system. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002