The SCEAS System
Navigation Menu

Search the dblp DataBase


Cheng Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cheng Zhang, Qinke Peng
    Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:315-321 [Conf]
  2. Hao Liu, Yanbo Han, Gang Li, Cheng Zhang
    Achieving Context Sensitivity of Service-Oriented Applications with the Business-End Programming Language VINCA. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:89-96 [Conf]
  3. Miao Wang, Cheng Zhang, Jingjing Yu
    Native API Based Windows Anomaly Intrusion Detection Method Using SVM. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:514-519 [Conf]
  4. Cheng Zhang, Tarek M. Zayed, Amin Hammad, Gabriel A. Wainer
    Representation and analysis of spatial resources in construction simulation. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2005, pp:1541-1548 [Conf]
  5. Hong Pang, Cheng Zhang, Amin Hammad
    Sensitivity analysis of construction simulation using Cell-DEVS and microcyclone. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2006, pp:2021-2028 [Conf]
  6. Xue-hai Yuan, Cheng Zhang, Yonghong Ren
    Generalized fuzzy groups and many-valued implications. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:138, n:1, pp:205-211 [Journal]
  7. Cheng Zhang, Chenghong Zhang
    Design and simulation of demand information sharing in a supply chain. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2007, v:15, n:1, pp:32-46 [Journal]
  8. Yanbo Han, Hongcui Wang, Jianwu Wang, Shuying Yan, Cheng Zhang
    An End-User-Oriented Approach to Exploratory Service Compostion. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1895-1903 [Journal]
  9. Hao-Peng Chen, Cheng Zhang
    A Queueing-Theory-Based Fault Detection Mechanism for SOA-Based Applications. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:157-166 [Conf]
  10. Hao-Peng Chen, Cheng Zhang
    A Queueing-Theory-Based Fault Detection Mechanism for SOA-Based Applications. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:265-269 [Conf]

  11. A Fault Detection Mechanism for Service-Oriented Architecture Based on Queueing Theory. [Citation Graph (, )][DBLP]

  12. Correcting Interaction Mismatches for Business Processes. [Citation Graph (, )][DBLP]

  13. G-Optimal Design with Laplacian Regularization. [Citation Graph (, )][DBLP]

  14. Fuzzy Probabilistic Sets and r-Fuzzy Sets. [Citation Graph (, )][DBLP]

  15. A Multi-view Approach to Semi-supervised Document Classification with Incremental Naïve Bayes. [Citation Graph (, )][DBLP]

  16. An EEG-based method for detecting drowsy driving state. [Citation Graph (, )][DBLP]

  17. The non-clique particle swarm optimizer. [Citation Graph (, )][DBLP]

  18. Particle swarm optimizer with self-adjusting neighborhoods. [Citation Graph (, )][DBLP]

  19. The Interpretive Flexibility of an E-Government Project: From an Actor-Network Theory Perspective. [Citation Graph (, )][DBLP]

  20. Service Recommendation with Adaptive User Interests Modeling. [Citation Graph (, )][DBLP]

  21. BPGen: an automated breakpoint generator for debugging. [Citation Graph (, )][DBLP]

  22. SWPM: An Incremental Fault Localization Algorithm Based on Sliding Window with Preprocessing Mechanism. [Citation Graph (, )][DBLP]

  23. Learning to Extract Web News Title in Template Independent Way. [Citation Graph (, )][DBLP]

  24. Agent-based simulation for collaborative cranes. [Citation Graph (, )][DBLP]

  25. Probabilistic question recommendation for question answering communities. [Citation Graph (, )][DBLP]

  26. Approximate Joins for XML Using g-String. [Citation Graph (, )][DBLP]

  27. Fast Motion Estimation With Mini-Block For H.264/AVC. [Citation Graph (, )][DBLP]

  28. Business-Oriented Virtualization of Web Services A Case Study. [Citation Graph (, )][DBLP]

  29. Artificial ant colony foraging simulation and emergent property analysis. [Citation Graph (, )][DBLP]

  30. A Network Security Risk Assessment Framework Based on Game Theory. [Citation Graph (, )][DBLP]

  31. A design of the electromagnetic driver for the "internal force-static friction" capsubot. [Citation Graph (, )][DBLP]

  32. A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. [Citation Graph (, )][DBLP]

  33. Probabilistic Event-Driven Heuristic Fault Localization using Incremental Bayesian Suspected Degree. [Citation Graph (, )][DBLP]

  34. Sampling Clock Offset Estimation Algorithm Based on IEEE 802.11n. [Citation Graph (, )][DBLP]

  35. Application of Fuzzy Linking Numbers Based on Linking Numbers. [Citation Graph (, )][DBLP]

  36. Implementation of Gigabit Ethernet Network Based on SOPC. [Citation Graph (, )][DBLP]

  37. Several approaches to solve the rotation illusion with wheel effect. [Citation Graph (, )][DBLP]

  38. Brand extension of online technology products: Evidence from search engine to virtual communities and online news. [Citation Graph (, )][DBLP]

  39. Exploring E-Government Impact on Shanghai Firms' Informatization Process. [Citation Graph (, )][DBLP]

  40. Understanding the Emerging C2C Electronic Market in China: An Experience-Seeking Social Marketplace. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002