dblp.uni-trier.dewww.uni-trier.de

Jian Yin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
50EEYubao Liu, Xiuwei Chen, Fei Wang, Jian Yin: Efficient Detection of Discords for Time Series Stream. APWeb/WAIM 2009: 629-634
2008
49EEWenxin Yang, Shuqin Rao, Jina Wang, Jian Yin, Jian Chen: Face Recognition Using Clustering Based Optimal Linear Discriminant Analysis. ADMA 2008: 241-249
48EEHaixun Wang, Jian Yin, Chang-Shing Perng, Philip S. Yu: Dual encryption for query integrity assurance. CIKM 2008: 863-872
47EEMin Xie, Haixun Wang, Jian Yin, Xiaofeng Meng: Providing freshness guarantees for outsourced databases. EDBT 2008: 323-332
46EEJina Wang, Jian Huang, Shuqin Rao, Shaoe Xue, Jian Yin: An Adaptive Genetic Algorithm for Solving Traveling Salesman Problem. ICIC (2) 2008: 182-189
45EEYalan Zhou, Jiahai Wang, Jian Yin: Genetic Particle Swarm Optimization Based on Multiagent Model for Combinatorial Optimization Problem. ICNSC 2008: 293-297
44EEJiahai Wang, Yunong Zhang, Yalan Zhou, Jian Yin: Discrete quantum-behaved particle swarm optimization based on estimation of distribution for combinatorial optimization. IEEE Congress on Evolutionary Computation 2008: 897-904
43EEMudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Scalable Method for Access Control in Location-Based Broadcast Services. INFOCOM 2008: 256-260
42EEJian Yin, Sanjay Kumar Madria: ESecRout: An Energy Efficient Secure Routing for Sensor Networks. IJDSN 4(2): 67-82 (2008)
41EEYubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu: Clustering Text Data Streams. J. Comput. Sci. Technol. 23(1): 112-128 (2008)
40EEMudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. TWEB 2(3): (2008)
2007
39EEYubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu: Clustering Massive Text Data Streams by Semantic Smoothing Model. ADMA 2007: 389-400
38EERaymond Chi-Wing Wong, Yubao Liu, Jian Yin, Zhilan Huang, Ada Wai-Chee Fu, Jian Pei: (alpha, k)-anonymity Based Privacy Preservation by Lossy Join. APWeb/WAIM 2007: 733-744
37EEYubao Liu, Jiarong Cai, Jian Yin, Zhilan Huang: Document Clustering Based on Semantic Smoothing Approach. AWIC 2007: 217-222
36EEJian Yin, Zhilan Huang, Yubao Liu, Jiarong Cai, Jian Chen: An Effective Maximal Subspace Clustering Algorithm Based on Enumeration Tree. FSKD (1) 2007: 572-576
35EEMudhakar Srivatsa, Arun Iyengar, Thomas A. Mikalsen, Isabelle Rouvellou, Jian Yin: An Access Control System for Web Service Compositions. ICWS 2007: 1-8
34EEYubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin: Fast detection of database system abuse behaviors based on data mining approach. Infoscale 2007: 37
33EEJiarong Cai, Yubao Liu, Jian Yin: An Improved Semantic Smoothing Model for Model-Based Document Clustering. SNPD (3) 2007: 670-675
32EEMin Xie, Haixun Wang, Jian Yin, Xiaofeng Meng: Integrity Auditing of Outsourced Data. VLDB 2007: 782-793
31EEYubao Liu, Jianlin Feng, Jian Yin: The Incremental Mining of Constrained Cube Gradients. International Journal of Information Technology and Decision Making 6(2): 253-278 (2007)
2006
30EEJian Yin, Sanjay Kumar Madria: SecRout: A Secure Routing Protocol for Sensor Networks. AINA (1) 2006: 393-398
29EEWeiheng Zhu, Jian Pei, Jian Yin, Yihuang Xie: Granularity Adaptive Density Estimation and on Demand Clustering of Concept-Drifting Data Streams. DaWaK 2006: 322-331
28EEJian Yin, Fang Mei, Gang Zhang: Intrusion Detection Based on Data Mining. ICIC (2) 2006: 724-729
27EEHaixun Wang, Jian Yin, Jian Pei, Philip S. Yu, Jeffrey Xu Yu: Suppressing model overfitting in mining concept-drifting data streams. KDD 2006: 736-741
26EEMudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Middleware System for Protecting Against Application Level Denial of Service Attacks. Middleware 2006: 260-280
25EEJian Yin, Duanning Zhou, Qiong-Qiong Xie: A Clustering Algorithm for Time Series Data. PDCAT 2006: 119-122
24EEMudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Client-Transparent Approach to Defend Against Denial of Service Attacks. SRDS 2006: 61-70
23EEJian Yin, Sanjay Kumar Madria: A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. SUTC (1) 2006: 376-383
2005
22EEJian Chen, Jian Yin, Jin Huang: Mining Correlated Rules for Associative Classification. ADMA 2005: 130-140
21EEYubao Liu, Jian Yin: The mining of fuzzy gradient in the case of materialized cube. CIT 2005: 93-97
20EEJian Chen, Jian Yin, Jin Huang, Ming Feng: Associative Classification Based on Correlation Analysis. FSKD (1) 2005: 59-68
19EEJian Yin, Xianli Fan, Yiqun Chen, Jiangtao Ren: High-Dimensional Shared Nearest Neighbor Clustering Algorithm. FSKD (2) 2005: 494-502
18EEYiqun Chen, Jian Yin: Sense Rank AALesk: A Semantic Solution for Word Sense Disambiguation. FSKD (2) 2005: 710-717
17EEYubao Liu, Jian Yin: The Computation of Semantic Data Cube. GCC 2005: 573-578
16EEJian Chen, Liangyi Ou, Jian Yin, Jin Huang: Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database. ICCNMC 2005: 519-528
15EEJian Chen, Jian Yin, Jun Zhang, Jin Huang: Associative Classification in Text Categorization. ICIC (1) 2005: 1035-1044
14EEJian Yin, Zhifang Tan: Clustering Mixed Type Attributes in Large Dataset. ISPA 2005: 655-661
2004
13EEFred Douglis, John Palmer, Elizabeth S. Richards, David Tao, William H. Tetzlaff, John M. Tracey, Jian Yin: Position: short object lifetimes require a delete-optimized storage system. ACM SIGOPS European Workshop 2004: 6
12EEYiqun Chen, Chi-Hung Chi, Jian Yin: Data Mining Service Based on MDA. AWCC 2004: 297-302
11EEChristopher Stewart, Kai Shen, Sandhya Dwarkadas, Michael L. Scott, Jian Yin: Profile-Driven Component Placement for Cluster-Based Online Services. IEEE Distributed Systems Online 5(10): (2004)
10EEMalik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sanjay Kumar Madria: A secure hierarchical model for sensor network. SIGMOD Record 33(1): 7-13 (2004)
2003
9EEJian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin: Towards a Practical Approach to Confidential Byzantine Fault Tolerance. Future Directions in Distributed Computing 2003: 51-56
8EEJian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin: Separating agreement from execution for byzantine fault tolerant services. SOSP 2003: 253-267
2002
7EEJian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar: Engineering web cache consistency. ACM Trans. Internet Techn. 2(3): 224-259 (2002)
2001
6EEJiming Liu, Jian Yin: Towards Efficient Data Re-mining (DRM). PAKDD 2001: 406-412
5EEJian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar: Engineering server-driven consistency for large scale dynamic Web services. WWW 2001: 45-57
2000
4EEJiming Liu, Jian Yin: Multi-agent Integer Programming. IDEAL 2000: 301-307
1999
3EEJian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Hierarchical Cache Consistency in a WAN. USENIX Symposium on Internet Technologies and Systems 1999
2EEJian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Volume Leases for Consistency in Large-Scale Systems. IEEE Trans. Knowl. Data Eng. 11(4): 563-576 (1999)
1998
1EEJian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Using Leases to Support Server-Driven Consistency in Large-Scale Systems. ICDCS 1998: 285-294

Coauthor Index

1Lorenzo Alvisi [1] [2] [3] [5] [7] [8] [9]
2Jiarong Cai [33] [34] [36] [37] [39] [41]
3Jian Chen [15] [16] [20] [22] [36] [49]
4Xiuwei Chen [50]
5Yiqun Chen [12] [18] [19]
6Chi-Hung Chi [12]
7Michael Dahlin [1] [2] [3] [5] [7] [8] [9]
8Fred Douglis [13]
9Sandhya Dwarkadas [11]
10Xianli Fan [19]
11Jianlin Feng [31]
12Ming Feng [20]
13Ada Wai-Chee Fu [38] [39] [41]
14Jian Huang [46]
15Jin Huang [15] [16] [20] [22]
16Zhilan Huang [34] [36] [37] [38]
17Arun Iyengar [5] [7] [24] [26] [35] [40] [43]
18Calvin Lin [1] [2] [3]
19Jiming Liu [4] [6]
20Ling Liu [24] [26] [40] [43]
21Yubao Liu [17] [21] [31] [33] [34] [36] [37] [38] [39] [41] [50]
22Sanjay Kumar Madria [10] [23] [30] [42]
23Jean-Philippe Martin [8] [9]
24Fang Mei [28]
25Xiaofeng Meng [32] [47]
26Thomas A. Mikalsen [35]
27Liangyi Ou [16]
28John Palmer [13]
29Biswajit Panja [10]
30Jian Pei [27] [29] [38]
31Chang-Shing Perng [48]
32Shuqin Rao [46] [49]
33Jiangtao Ren [19]
34Elizabeth S. Richards [13]
35Isabelle Rouvellou [35]
36Michael L. Scott [11]
37Kai Shen [11]
38Mudhakar Srivatsa [24] [26] [35] [40] [43]
39Christopher Stewart [11]
40Zhifang Tan [14]
41David Tao [13]
42William H. Tetzlaff [13]
43John M. Tracey [13]
44Malik Ayed Tubaishat [10]
45Arun Venkataramani [8] [9]
46Fei Wang [50]
47Haixun Wang [27] [32] [47] [48]
48Jiahai Wang [44] [45]
49Jina Wang [46] [49]
50Raymond Chi-Wing Wong [38]
51Min Xie [32] [47]
52Qiong-Qiong Xie [25]
53Yihuang Xie [29]
54Shaoe Xue [46]
55Wenxin Yang [49]
56Jeffrey Xu Yu [27]
57Jingwen Yu [34]
58Philip S. Yu [27] [48]
59Gang Zhang [28]
60Jun Zhang [15]
61Yunong Zhang [44]
62Duanning Zhou [25]
63Yalan Zhou [44] [45]
64Weiheng Zhu [29]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)