![]() |
| 2005 | ||
|---|---|---|
| 3 | EE | X. Cheng, X. Ma, M. Cheng, S. C.-H. Huang: Proving secure properties of cryptographic protocols with knowledge based approach. IPCCC 2005: 3-9 |
| 2004 | ||
| 2 | EE | M. Cheng, Kin Chew Hung: Lattice boltzmann method on nonuniform mesh. International Journal of Computational Engineering Science 5(2): 291-302 (2004) |
| 1987 | ||
| 1 | William T. Gray, M. Cheng: Forecasting CPU Utilization in an IMS Environment: A Case Study Using Monte Carlo Techniques. Int. CMG Conference 1987: 81-86 | |
| 1 | X. Cheng | [3] |
| 2 | William T. Gray | [1] |
| 3 | S. C.-H. Huang | [3] |
| 4 | Kin Chew Hung | [2] |
| 5 | X. Ma | [3] |