The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yi Xie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao
    Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:977-982 [Conf]
  2. Yi Xie, Shun-Zheng Yu
    A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:811-821 [Conf]
  3. Jianqin Wang, Yong Xue, Yi Xie, Dingsheng Liu, Ruizhi Sun, Lu Yang, Ying Ding, Ya OuYang, Guangli Liu, YunLing Liu, Li Kang, Xinrong Cheng
    Study on Remotely Sensed Data Access and Integration Grid-enabled Middleware. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:477-481 [Conf]
  4. Yi Xie, Shun-Zheng Yu
    A Novel Model for Detecting Application Layer DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:56-63 [Conf]
  5. Jianqin Wang, Yong Xue, Jianping Guo, Yincui Hu, Chaolin Wu, Lei Zheng, Ying Luo, Yi Xie, YunLing Liu
    Study on Grid-Based Special Remotely Sensed Data Processing Node in Grid GIS. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:610-617 [Conf]
  6. Jianqin Wang, Yong Xue, Yuxin Jiang, Chenghu Zhou, Rongguo Chen, Jianping Guo, Wei Wan, Lei Zheng, Yi Xie
    Design of GridGIS Architecture. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2006, pp:628-636 [Conf]
  7. Yuehua Wan, Shiming Ji, Yi Xie, Xian Zhang, Peijun Xie
    Video Program Clustering Indexing Based on Face Recognition Hybrid Model of Hidden Markov Model and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    IWCIA, 2004, pp:739-749 [Conf]
  8. Sum Lam, Rocky K. C. Chang, Yi Xie
    Relative stability analysis of multiple queues. [Citation Graph (0, 0)][DBLP]
    VALUETOOLS, 2006, pp:65- [Conf]
  9. Yi Xie, Rocky K. C. Chang
    Stability-constrained optimization for energy efficiency in polling-based wireless networks. [Citation Graph (0, 0)][DBLP]
    VALUETOOLS, 2006, pp:23- [Conf]
  10. Huang Wenlong, Li Xiaolin, Jiao Jixiang, Feng Yu, Xie Yi
    Data Model and Virtual Database Engine for Grid Environment. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:823-829 [Conf]
  11. Yi Xie, Shun-Zheng Yu
    Detecting Shrew HTTP Flood Attacks for Flash Crowds. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2007, pp:640-647 [Conf]
  12. Yi Xie, Rocky K. C. Chang
    Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  13. Multivariate Statistical Modeling for Medical Image Compression Using Wavelet Transforms. [Citation Graph (, )][DBLP]


  14. On Medical Image Filtering Based on Rough Set Theory. [Citation Graph (, )][DBLP]


  15. A Simple and Efficient Parallel Approach to Large-Scale Railway Freight Data Analysis. [Citation Graph (, )][DBLP]


  16. Improvement on LEACH by combining Adaptive Cluster Head Election and Two-hop transmission. [Citation Graph (, )][DBLP]


  17. Measuring the Normality of Web Proxies' Behavior Based on Locality Principles. [Citation Graph (, )][DBLP]


  18. Object Tracking Based on the Combination of Learning and Cascade Particle Filter. [Citation Graph (, )][DBLP]


  19. Implementation of a new algorithm for the various pattern and language in the Workflow Management System. [Citation Graph (, )][DBLP]


  20. New coding method to reduce the database size and algorithm with significant efficiency in association rules. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002