Search the dblp DataBase
Cheng Zhang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cheng Zhang , Qinke Peng Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:315-321 [Conf ] Hao Liu , Yanbo Han , Gang Li , Cheng Zhang Achieving Context Sensitivity of Service-Oriented Applications with the Business-End Programming Language VINCA. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:89-96 [Conf ] Miao Wang , Cheng Zhang , Jingjing Yu Native API Based Windows Anomaly Intrusion Detection Method Using SVM. [Citation Graph (0, 0)][DBLP ] SUTC (1), 2006, pp:514-519 [Conf ] Cheng Zhang , Tarek M. Zayed , Amin Hammad , Gabriel A. Wainer Representation and analysis of spatial resources in construction simulation. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2005, pp:1541-1548 [Conf ] Hong Pang , Cheng Zhang , Amin Hammad Sensitivity analysis of construction simulation using Cell-DEVS and microcyclone. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2006, pp:2021-2028 [Conf ] Xue-hai Yuan , Cheng Zhang , Yonghong Ren Generalized fuzzy groups and many-valued implications. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2003, v:138, n:1, pp:205-211 [Journal ] Cheng Zhang , Chenghong Zhang Design and simulation of demand information sharing in a supply chain. [Citation Graph (0, 0)][DBLP ] Simulation Modelling Practice and Theory, 2007, v:15, n:1, pp:32-46 [Journal ] Yanbo Han , Hongcui Wang , Jianwu Wang , Shuying Yan , Cheng Zhang An End-User-Oriented Approach to Exploratory Service Compostion. [Citation Graph (0, 0)][DBLP ] Journal of Computer Research and Development, 2006, v:43, n:11, pp:1895-1903 [Journal ] Hao-Peng Chen , Cheng Zhang A Queueing-Theory-Based Fault Detection Mechanism for SOA-Based Applications. [Citation Graph (0, 0)][DBLP ] CEC/EEE, 2007, pp:157-166 [Conf ] Hao-Peng Chen , Cheng Zhang A Queueing-Theory-Based Fault Detection Mechanism for SOA-Based Applications. [Citation Graph (0, 0)][DBLP ] CEC/EEE, 2007, pp:265-269 [Conf ] A Fault Detection Mechanism for Service-Oriented Architecture Based on Queueing Theory. [Citation Graph (, )][DBLP ] Correcting Interaction Mismatches for Business Processes. [Citation Graph (, )][DBLP ] G-Optimal Design with Laplacian Regularization. [Citation Graph (, )][DBLP ] Fuzzy Probabilistic Sets and r-Fuzzy Sets. [Citation Graph (, )][DBLP ] A Multi-view Approach to Semi-supervised Document Classification with Incremental Naïve Bayes. [Citation Graph (, )][DBLP ] An EEG-based method for detecting drowsy driving state. [Citation Graph (, )][DBLP ] The non-clique particle swarm optimizer. [Citation Graph (, )][DBLP ] Particle swarm optimizer with self-adjusting neighborhoods. [Citation Graph (, )][DBLP ] The Interpretive Flexibility of an E-Government Project: From an Actor-Network Theory Perspective. [Citation Graph (, )][DBLP ] Service Recommendation with Adaptive User Interests Modeling. [Citation Graph (, )][DBLP ] BPGen: an automated breakpoint generator for debugging. [Citation Graph (, )][DBLP ] SWPM: An Incremental Fault Localization Algorithm Based on Sliding Window with Preprocessing Mechanism. [Citation Graph (, )][DBLP ] Learning to Extract Web News Title in Template Independent Way. [Citation Graph (, )][DBLP ] Agent-based simulation for collaborative cranes. [Citation Graph (, )][DBLP ] Probabilistic question recommendation for question answering communities. [Citation Graph (, )][DBLP ] Approximate Joins for XML Using g -String. [Citation Graph (, )][DBLP ] Fast Motion Estimation With Mini-Block For H.264/AVC. [Citation Graph (, )][DBLP ] Business-Oriented Virtualization of Web Services A Case Study. [Citation Graph (, )][DBLP ] Artificial ant colony foraging simulation and emergent property analysis. [Citation Graph (, )][DBLP ] A Network Security Risk Assessment Framework Based on Game Theory. [Citation Graph (, )][DBLP ] A design of the electromagnetic driver for the "internal force-static friction" capsubot. [Citation Graph (, )][DBLP ] A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. [Citation Graph (, )][DBLP ] Probabilistic Event-Driven Heuristic Fault Localization using Incremental Bayesian Suspected Degree. [Citation Graph (, )][DBLP ] Sampling Clock Offset Estimation Algorithm Based on IEEE 802.11n. [Citation Graph (, )][DBLP ] Application of Fuzzy Linking Numbers Based on Linking Numbers. [Citation Graph (, )][DBLP ] Implementation of Gigabit Ethernet Network Based on SOPC. [Citation Graph (, )][DBLP ] Several approaches to solve the rotation illusion with wheel effect. [Citation Graph (, )][DBLP ] Brand extension of online technology products: Evidence from search engine to virtual communities and online news. [Citation Graph (, )][DBLP ] Exploring E-Government Impact on Shanghai Firms' Informatization Process. [Citation Graph (, )][DBLP ] Understanding the Emerging C2C Electronic Market in China: An Experience-Seeking Social Marketplace. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.302secs