2009 |
23 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications 32(1): 158-183 (2009) |
2008 |
22 | EE | Kun Bai,
Meng Yu,
Peng Liu:
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
ESORICS 2008: 161-176 |
21 | EE | Jing Li,
Meng Yu:
Multi-Source Multihop Wireless Networks: A Trellis Representation and Network Coding.
ICC 2008: 2740-2744 |
2007 |
20 | EE | Meng Yu,
Wanyu Zang,
Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks.
ACSAC 2007: 97-106 |
19 | EE | Meng Yu,
Jing Li,
Rick S. Blum,
Kameran Azadet:
Toward Maximizing Throughput in Wireless Relay: A General User Cooperation Model.
CISS 2007: 25-30 |
18 | EE | Meng Yu,
Jing Li,
Rick S. Blum:
User Cooperation Through Network Coding.
ICC 2007: 4064-4069 |
17 | EE | Meng Yu,
Wanyu Zang,
Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources.
ICNSC 2007: 212-217 |
16 | EE | Xiaoguang Liu,
Meng Yu,
Gang Wang,
Jing Liu:
CrossTree: A new HTC architecture with high reliability and scalability.
ICPADS 2007: 1-7 |
15 | EE | Meng Yu,
Peng Liu,
Wanyu Zang,
Sushil Jajodia:
Trusted Recovery.
Secure Data Management in Decentralized Systems 2007: 59-94 |
2006 |
14 | EE | Meng Yu,
Shaomei Wang:
Study on Scheduling System Based on Multi-Agent of Container Terminal.
CSCWD 2006: 579-584 |
13 | EE | Wanyu Zang,
Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
ICISS 2006: 289-302 |
12 | EE | Wen-hui Li,
Meng Yu,
Zhen-hua Zhang,
Dong-fei Liu,
Jian-yuan Wang:
A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm.
ISMIS 2006: 68-76 |
11 | EE | Murat Uysal,
Jing Li,
Meng Yu:
Error rate performance analysis of coded free-space optical links over gamma-gamma atmospheric turbulence channels.
IEEE Transactions on Wireless Communications 5(6): 1229-1233 (2006) |
2005 |
10 | EE | Meng Yu,
Wanyu Zang,
Peng Liu:
Defensive Execution of Transactional Processes against Attacks.
ACSAC 2005: 515-526 |
9 | EE | Peng Liu,
Wanyu Zang,
Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) |
8 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security 13(4): 623-658 (2005) |
2004 |
7 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Self-Healing Workflow Systems under Attacks.
ICDCS 2004: 418-425 |
2003 |
6 | EE | Meng Yu,
Peng Liu,
Wanyu Zang:
Multi-Version Attack Recovery for Workflow System.
ACSAC 2003: 142-151 |
5 | EE | Meng Yu,
Indriyati Atmosukarto,
Wee Kheng Leow,
Zhiyong Huang,
Rong Xu:
3D Model Retrieval With Morphing-Based Geometric and Topological Feature Maps.
CVPR (2) 2003: 656-661 |
4 | EE | Brian A. Barsky,
Daniel R. Horn,
Stanley A. Klein,
Jeffrey A. Pang,
Meng Yu:
Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques.
ICCSA (3) 2003: 246-255 |
3 | EE | Brian A. Barsky,
Daniel R. Horn,
Stanley A. Klein,
Jeffrey A. Pang,
Meng Yu:
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques.
ICCSA (3) 2003: 256-265 |
2 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations.
SEC 2003: 229-240 |
2002 |
1 | | Meng Yu,
Minyi Guo,
Yi Pan,
Wanyu Zang,
Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java.
PDPTA 2002: 164-170 |