dblp.uni-trier.dewww.uni-trier.de

Ronghui Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
8EEJi-yao An, Ronghui Wu, Renfa Li, Cheng Xu: An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168
7 Ronghui Wu, Yiming Liang, Renfa Li, Cheng Xu, Fei Yu: Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. IMECS 2007: 650-653
6EEFei Yu, Yue Shen, Guangxue Yue, Ronghui Wu, Cheng Xu: Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. International Conference on Computational Science (3) 2007: 109-112
5EERonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu: Research on Advanced Distributed Learning by Using SCORM. International Conference on Computational Science (3) 2007: 571-574
2006
4EERonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu: Research on User Authentication for Grid Computing Security. SKG 2006: 72
3EEGuangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li: Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. SKG 2006: 74
2EERonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen: Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security. SKG 2006: 75
2005
1EEGuangxue Yue, Renfa Li, Zude Zhou, Ronghui Wu: An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks. GCC 2005: 776-786

Coauthor Index

1Ji-yao An [3] [8]
2Yi-jun Chen [3]
3Renfa Li [1] [2] [3] [4] [5] [7] [8]
4Yiming Liang [7]
5Yue Shen [6]
6Jigang Wen [2]
7Cheng Xu [4] [5] [6] [7] [8]
8Fei Yu [2] [3] [4] [5] [6] [7]
9Guangxue Yue [1] [2] [3] [4] [5] [6]
10Zude Zhou [1]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)