Ping Lin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

16EEFeng Qiao, Ping Lin: A Particle Swarm Approach for IEEE 802.16m System Scheduling. CSSE (1) 2008: 1234-1237
15EEGuo Chen, Zhilin Li, Ping Lin: A fast finite difference method for biharmonic equations on irregular domains and its application to an incompressible Stokes flow. Adv. Comput. Math. 29(2): 113-133 (2008)
14EEPing Lin, K. Selçuk Candan: Enabling access-privacy for random walk based data analysis applications. Data Knowl. Eng. 63(3): 667-683 (2007)
13EEDilip Krishnan, Ping Lin, Andy M. Yip: A Primal-Dual Active-Set Method for Non-Negativity Constrained Total Variation Deblurring Problems. IEEE Transactions on Image Processing 16(11): 2766-2777 (2007)
12EEXue-Cheng Tai, Oddvar Christiansen, Ping Lin, Inge Skjælaaen: Image Segmentation Using Some Piecewise Constant Level Set Methods with MBO Type of Projection. International Journal of Computer Vision 73(1): 61-76 (2007)
11EEPing Lin, K. Selçuk Candan: Access-Private Outsourcing of Markov Chain and RandomWalk based Data Analysis Applications. ICDE Workshops 2006: 97
10EEPing Lin, Zhongcheng Zhou, Hang Gao: Exact controllability of the parabolic system with bilinear control. Appl. Math. Lett. 19(6): 568-575 (2006)
9EEPing Lin, Lai C. Liu, Kai S. Koong: Performance assessment of functional managers in the high-technology sector. IJSS 2(1): 32-53 (2006)
8EEPing Lin, K. Selçuk Candan: Hiding Tree Structured Data and Queries from Untrusted Data Stores. Information Systems Security 14(4): 10-26 (2005)
7EEPing Lin, K. Selçuk Candan: Secure and Privacy Preserving Outsourcing of Tree Structured Data. Secure Data Management 2004: 1-17
6 Ping Lin, K. Selçuk Candan: Hiding Traversal of Tree Structured Data from Untrusted Data Stores. WOSIS 2004: 314-323
5EEPing Lin, K. Selçuk Candan: Hiding Traversal of Tree Structured Data from Untrusted Data Stores. ISI 2003: 385
4EEPing Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu: Hiding Data and Code Security for Application Hosting Infrastructure. ISI 2003: 388
3 Ping Lin: Theoretical and numerical analysis for the quasi-continuum approximation of a material particle model. Math. Comput. 72(242): 657-675 (2003)
2EEPing Lin, C. Sekar Chandersekaran: Integration of DCE and Local Registries: Design Approaches. ACM Conference on Computer and Communications Security 1993: 165-170
1 Ping Lin: The Encapsulated Security Services Interface (ESSI). SEC 1993: 119-135

Coauthor Index

1Rida A. Bazzi [4]
2K. Selçuk Candan [4] [5] [6] [7] [8] [11] [14]
3C. Sekar Chandersekaran [2]
4Guo Chen [15]
5Oddvar Christiansen [12]
6Hang Gao [10]
7Kai S. Koong [9]
8Dilip Krishnan [13]
9Zhilin Li [15]
10Lai C. Liu [9]
11Zhichao Liu [4]
12Feng Qiao [16]
13Inge Skjælaaen [12]
14Xue-Cheng Tai [12]
15Andy M. Yip [13]
16Zhongcheng Zhou [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)