2007 |
8 | EE | Ji-yao An,
Ronghui Wu,
Renfa Li,
Cheng Xu:
An Intrusion Alarm System Based on Fuzzy Reasoning Machine.
IITA 2007: 165-168 |
7 | | Ronghui Wu,
Yiming Liang,
Renfa Li,
Cheng Xu,
Fei Yu:
Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network.
IMECS 2007: 650-653 |
6 | EE | Fei Yu,
Yue Shen,
Guangxue Yue,
Ronghui Wu,
Cheng Xu:
Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning.
International Conference on Computational Science (3) 2007: 109-112 |
5 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on Advanced Distributed Learning by Using SCORM.
International Conference on Computational Science (3) 2007: 571-574 |
2006 |
4 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on User Authentication for Grid Computing Security.
SKG 2006: 72 |
3 | EE | Guangxue Yue,
Fei Yu,
Yi-jun Chen,
Ronghui Wu,
Ji-yao An,
Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
SKG 2006: 74 |
2 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Jigang Wen:
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
SKG 2006: 75 |
2005 |
1 | EE | Guangxue Yue,
Renfa Li,
Zude Zhou,
Ronghui Wu:
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks.
GCC 2005: 776-786 |