dblp.uni-trier.dewww.uni-trier.de

Ping Yi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
9EENing Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi: Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801
8EEJunhua Tang, Yue Wu, Linsen Li, Ping Yi: The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink. GLOBECOM 2008: 5091-5095
7EELinchun Li, Jianhua Li, Yue Wu, Ping Yi: A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329
2005
6EEPing Yi, YiPing Zhong, Shiyong Zhang: A Novel Intrusion Detection Method for Mobile Ad Hoc Networks. EGC 2005: 1183-1192
5EEYang Li, Ping Yi, Qiyan Li: Optimizing Path Expression Queries of XML Data. ICEBE 2005: 497-504
4 Ping Yi, Shiyong Zhang, YiPing Zhong: An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks. ICEIS (4) 2005: 220-226
3EEPing Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang: Resisting Flooding Attacks in Ad Hoc Networks. ITCC (2) 2005: 657-662
2EEPing Yi, YiPing Zhong, Shiyong Zhang: Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. International Conference on Computational Science (2) 2005: 593-600
1EEPing Yi, Yichuan Jiang, YiPing Zhong, Shiyong Zhang: Distributed Intrusion Detection for Mobile Ad Hoc Networks. SAINT Workshops 2005: 94-97

Coauthor Index

1Zhoulin Dai [3]
2Liming Hao [9]
3Yichuan Jiang [1]
4Jianhua Li [7] [9]
5Linchun Li [7]
6Linsen Li [8]
7Qiyan Li [5]
8Yang Li [5]
9Ning Liu [9]
10Junhua Tang [8]
11Yue Wu [7] [8] [9]
12Shiyong Zhang [1] [2] [3] [4] [6]
13YiPing Zhong [1] [2] [3] [4] [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)