The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hua Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Baolin Sun, Qiu Yang, Jun Ma, Hua Chen
    Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:101-106 [Conf]
  2. Hua Chen, Jianfei Qian, Qingming He
    A P2P Architecture for Supporting Group Communication in CSCW Systems. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:199-203 [Conf]
  3. Hua Chen, Peter F. Elzer, Odej Kao
    Integrating a Real-Time Captured Object into Mixed Reality. [Citation Graph (0, 0)][DBLP]
    CW, 2006, pp:17-24 [Conf]
  4. Baolin Sun, Chao Gui, Hua Chen, Yue Zeng
    An Entropy-Based Stability QoS Routing with Priority Scheduler in MANET Using Fuzzy Controllers. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:735-738 [Conf]
  5. Qingming Fan, Hua Chen, Yan Cao, Baolong Liu, Yuexin Yang, Bo Sun, Rujia Zhao, Joan Lu
    The Application of XML in the Denotation of Plant Diseases and Insect Pests Information. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2006, pp:311-315 [Conf]
  6. Joan Lu, Nathan Cripps, Hua Chen
    XML Security in Certificate Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2006, pp:340-346 [Conf]
  7. Baolin Sun, Hua Chen, Layuan Li
    An Intrusion Detection System for AODV. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:358-365 [Conf]
  8. Hua Chen, Baolin Sun, Yue Zeng
    QoS Multicast Routing Algorithm in MANET: An Entropy-Based GA. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:1279-1289 [Conf]
  9. Zhen Xu, Dengguo Feng, Lan Li, Hua Chen
    UC-RBAC: A Usage Constrained Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:337-347 [Conf]
  10. Hua Chen, Dengguo Feng
    An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:352-361 [Conf]
  11. Xia Tao, Hua Chen, Zhaolin Wang, Warren H. Finlay, Raimar Löbenberg, Wilson H.-Y. Roa
    Cytotoxicity of Drug-Loaded Nanoparticles and Liposomes Carried by Aerosol "Cluster Bombs" in Lung Cancer Cells. [Citation Graph (0, 0)][DBLP]
    ICMENS, 2004, pp:344-345 [Conf]
  12. Qinming He, Jianfei Qian, Hua Chen, Fangzhong Qi
    Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:429-432 [Conf]
  13. Wenling Wu, Dengguo Feng, Hua Chen
    Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
  14. Hua Chen, Peter F. Elzer
    Novel view generation for a real-time captured video object. [Citation Graph (0, 0)][DBLP]
    VRST, 2006, pp:83-86 [Conf]
  15. Hua Chen, Oliver Wulf, Bernardo Wagner
    Object Detection for a Mobile Robot Using Mixed Reality. [Citation Graph (0, 0)][DBLP]
    VSMM, 2006, pp:466-475 [Conf]
  16. Yang Shen, Xianglan Yin, Hua Chen, Wangdong Qi, Hao Dai
    A Density Control Algorithm for Surveillance Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:199-205 [Conf]
  17. Yaoxue Zhang, Hua Chen
    A knowledge-based dynamic job-scheduling in low-volume/high-variety manufacturing. [Citation Graph (0, 0)][DBLP]
    AI in Engineering, 1999, v:13, n:3, pp:241-249 [Journal]
  18. Glenn R. Luecke, Hua Chen, James Coyle, Jim Hoekstra, Marina Kraeva, Yan Zou
    MPI-CHECK: a tool for checking Fortran 90 MPI programs. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2003, v:15, n:2, pp:93-100 [Journal]
  19. Wenying Feng, Hua Chen
    A Matrix Algorithm forWeb Cache Pre-fetching. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:788-794 [Conf]
  20. Yusuo Hu, Hua Chen, Jian-Guang Lou, Jiang Li
    Distributed Density Estimation Using Non-parametric Statistics. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:28- [Conf]
  21. Hua Chen, Zhi Geng, Jinzhu Jia
    Hidden Markov Models with Multiple Observers. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:427-435 [Conf]
  22. Hua Chen, Wenling Wu, Dengguo Feng
    Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:284-295 [Conf]
  23. Shun Li, Feng Zhou, Chunhong Chen, Hua Chen, Yipin Wu
    Quasi-Static Energy Recovery Logic with Single Power-Clock Supply. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2124-2127 [Conf]
  24. Qiang Zhao, Hua Chen, Zhi Geng
    Structural Learning About Independence Graphs from Multiple Databases. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:1122-1130 [Conf]

  25. Efficient and Provably Secure Self-certified Signature Scheme. [Citation Graph (, )][DBLP]


  26. A Special Proxy Signature Scheme with Multi-warrant. [Citation Graph (, )][DBLP]


  27. An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP]


  28. A Novel Technique for Improving Temperature Independency of Ring-ADC. [Citation Graph (, )][DBLP]


  29. A Framework to Evaluate and Predict Performances in Virtual Machines Environment. [Citation Graph (, )][DBLP]


  30. Application of Relevance Vector Machine to Downscale GCMs to Runoff in Hydrology. [Citation Graph (, )][DBLP]


  31. Application of Rough Set Theory to Multi-factor Medium and Long-period Runoff Prediction in Danjing Kou Reservoir. [Citation Graph (, )][DBLP]


  32. An Entropy-Based Fuzzy Controllers QoS Routing Algorithm in MANET. [Citation Graph (, )][DBLP]


  33. Fine-Grained Security Model in Multi-Agent Communication. [Citation Graph (, )][DBLP]


  34. Research and Realization of Manufacturing Resource Information Integration and Sharing Based on XML Technology. [Citation Graph (, )][DBLP]


  35. Cutting Tool Information Tracking and Management Technology for Manufacturing Execute System. [Citation Graph (, )][DBLP]


  36. Web Cache Adaptive Replacement Policy by LRU and LFU. [Citation Graph (, )][DBLP]


  37. Data-Flow Based Analysis of Java Bytecode Vulnerability. [Citation Graph (, )][DBLP]


  38. A Novel ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]


  39. An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. [Citation Graph (, )][DBLP]


  40. Cycle Accurate Verification of Synchronous Sequential Circuit Specified with UML 2.0 Modelling. [Citation Graph (, )][DBLP]


  41. A Simplified Learning Algorithm of Incremental Bayesian. [Citation Graph (, )][DBLP]


  42. Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]


  43. Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002