|
Search the dblp DataBase
Hua Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Baolin Sun, Qiu Yang, Jun Ma, Hua Chen
Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP] CIS (1), 2005, pp:101-106 [Conf]
- Hua Chen, Jianfei Qian, Qingming He
A P2P Architecture for Supporting Group Communication in CSCW Systems. [Citation Graph (0, 0)][DBLP] CSCWD, 2006, pp:199-203 [Conf]
- Hua Chen, Peter F. Elzer, Odej Kao
Integrating a Real-Time Captured Object into Mixed Reality. [Citation Graph (0, 0)][DBLP] CW, 2006, pp:17-24 [Conf]
- Baolin Sun, Chao Gui, Hua Chen, Yue Zeng
An Entropy-Based Stability QoS Routing with Priority Scheduler in MANET Using Fuzzy Controllers. [Citation Graph (0, 0)][DBLP] FSKD, 2006, pp:735-738 [Conf]
- Qingming Fan, Hua Chen, Yan Cao, Baolong Liu, Yuexin Yang, Bo Sun, Rujia Zhao, Joan Lu
The Application of XML in the Denotation of Plant Diseases and Insect Pests Information. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2006, pp:311-315 [Conf]
- Joan Lu, Nathan Cripps, Hua Chen
XML Security in Certificate Management. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2006, pp:340-346 [Conf]
- Baolin Sun, Hua Chen, Layuan Li
An Intrusion Detection System for AODV. [Citation Graph (0, 0)][DBLP] ICECCS, 2005, pp:358-365 [Conf]
- Hua Chen, Baolin Sun, Yue Zeng
QoS Multicast Routing Algorithm in MANET: An Entropy-Based GA. [Citation Graph (0, 0)][DBLP] ICIC (2), 2006, pp:1279-1289 [Conf]
- Zhen Xu, Dengguo Feng, Lan Li, Hua Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:337-347 [Conf]
- Hua Chen, Dengguo Feng
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:352-361 [Conf]
- Xia Tao, Hua Chen, Zhaolin Wang, Warren H. Finlay, Raimar Löbenberg, Wilson H.-Y. Roa
Cytotoxicity of Drug-Loaded Nanoparticles and Liposomes Carried by Aerosol "Cluster Bombs" in Lung Cancer Cells. [Citation Graph (0, 0)][DBLP] ICMENS, 2004, pp:344-345 [Conf]
- Qinming He, Jianfei Qian, Hua Chen, Fangzhong Qi
Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:429-432 [Conf]
- Wenling Wu, Dengguo Feng, Hua Chen
Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
- Hua Chen, Peter F. Elzer
Novel view generation for a real-time captured video object. [Citation Graph (0, 0)][DBLP] VRST, 2006, pp:83-86 [Conf]
- Hua Chen, Oliver Wulf, Bernardo Wagner
Object Detection for a Mobile Robot Using Mixed Reality. [Citation Graph (0, 0)][DBLP] VSMM, 2006, pp:466-475 [Conf]
- Yang Shen, Xianglan Yin, Hua Chen, Wangdong Qi, Hao Dai
A Density Control Algorithm for Surveillance Sensor Networks. [Citation Graph (0, 0)][DBLP] WASA, 2006, pp:199-205 [Conf]
- Yaoxue Zhang, Hua Chen
A knowledge-based dynamic job-scheduling in low-volume/high-variety manufacturing. [Citation Graph (0, 0)][DBLP] AI in Engineering, 1999, v:13, n:3, pp:241-249 [Journal]
- Glenn R. Luecke, Hua Chen, James Coyle, Jim Hoekstra, Marina Kraeva, Yan Zou
MPI-CHECK: a tool for checking Fortran 90 MPI programs. [Citation Graph (0, 0)][DBLP] Concurrency and Computation: Practice and Experience, 2003, v:15, n:2, pp:93-100 [Journal]
- Wenying Feng, Hua Chen
A Matrix Algorithm forWeb Cache Pre-fetching. [Citation Graph (0, 0)][DBLP] ACIS-ICIS, 2007, pp:788-794 [Conf]
- Yusuo Hu, Hua Chen, Jian-Guang Lou, Jiang Li
Distributed Density Estimation Using Non-parametric Statistics. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:28- [Conf]
- Hua Chen, Zhi Geng, Jinzhu Jia
Hidden Markov Models with Multiple Observers. [Citation Graph (0, 0)][DBLP] ICIC (2), 2007, pp:427-435 [Conf]
- Hua Chen, Wenling Wu, Dengguo Feng
Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:284-295 [Conf]
- Shun Li, Feng Zhou, Chunhong Chen, Hua Chen, Yipin Wu
Quasi-Static Energy Recovery Logic with Single Power-Clock Supply. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:2124-2127 [Conf]
- Qiang Zhao, Hua Chen, Zhi Geng
Structural Learning About Independence Graphs from Multiple Databases. [Citation Graph (0, 0)][DBLP] PAKDD, 2007, pp:1122-1130 [Conf]
Efficient and Provably Secure Self-certified Signature Scheme. [Citation Graph (, )][DBLP]
A Special Proxy Signature Scheme with Multi-warrant. [Citation Graph (, )][DBLP]
An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP]
A Novel Technique for Improving Temperature Independency of Ring-ADC. [Citation Graph (, )][DBLP]
A Framework to Evaluate and Predict Performances in Virtual Machines Environment. [Citation Graph (, )][DBLP]
Application of Relevance Vector Machine to Downscale GCMs to Runoff in Hydrology. [Citation Graph (, )][DBLP]
Application of Rough Set Theory to Multi-factor Medium and Long-period Runoff Prediction in Danjing Kou Reservoir. [Citation Graph (, )][DBLP]
An Entropy-Based Fuzzy Controllers QoS Routing Algorithm in MANET. [Citation Graph (, )][DBLP]
Fine-Grained Security Model in Multi-Agent Communication. [Citation Graph (, )][DBLP]
Research and Realization of Manufacturing Resource Information Integration and Sharing Based on XML Technology. [Citation Graph (, )][DBLP]
Cutting Tool Information Tracking and Management Technology for Manufacturing Execute System. [Citation Graph (, )][DBLP]
Web Cache Adaptive Replacement Policy by LRU and LFU. [Citation Graph (, )][DBLP]
Data-Flow Based Analysis of Java Bytecode Vulnerability. [Citation Graph (, )][DBLP]
A Novel ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. [Citation Graph (, )][DBLP]
Cycle Accurate Verification of Synchronous Sequential Circuit Specified with UML 2.0 Modelling. [Citation Graph (, )][DBLP]
A Simplified Learning Algorithm of Incremental Bayesian. [Citation Graph (, )][DBLP]
Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]
Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|