The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qi Yong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shi Yi, Yang Xinyu, Li Ning, Qi Yong
    Deterministic Packet Marking with Link Signatures for IP Traceback. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:144-152 [Conf]
  2. Meng Hai Ning, Qi Yong, Hou Di, Chen Ying, Zhao Ji Zhong
    Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:659-666 [Conf]
  3. Meng Hai Ning, Qi Yong, Hou Di, Liu Liang, He Hui
    Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ISPA, 2006, pp:573-583 [Conf]
  4. Qi Yong, Ma Li, Zhao Jizhong, Shen Junyi
    OTMS-A CORBA-Compliant Object Transaction Management System. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:126-133 [Conf]
  5. Xi Min, Zhao Jizhong, Qi Yong, He Hui, Li Ming, Wei Wei
    Isotope Programming Model: a Kind of Program Model for Context-Aware Application. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:597-602 [Conf]
  6. Zhang Kun, Qi Yong, Zhang Hong
    Dynamic multicast routing algorithm for delay and delay variation-bounded Steiner tree problem. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:7, pp:554-564 [Journal]
  7. Meng Hai Ning, Qi Yong, Hou Di, Pei Lu Xia, Chen Ying
    Application Server Aging Prediction Model Based on Wavelet Network with Adaptive Particle Swarm Optimization Algorithm. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:14-25 [Conf]

  8. SpiG4WSC: A Calculus for Secure Services Composition. [Citation Graph (, )][DBLP]


  9. Dynamic Projection from Choreography to Orchestration Based on Role Correlation. [Citation Graph (, )][DBLP]


  10. Designing Simulated Context-Aware Telephone in Pervasive Spaces. [Citation Graph (, )][DBLP]


  11. A Table-Driven Programming Paradigm for Context-Aware Application Development. [Citation Graph (, )][DBLP]


  12. Research on context-aware architecture for personal information privacy protection. [Citation Graph (, )][DBLP]


  13. Information Security Risk Assessment Method Based on CORAS Frame. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002