2009 |
21 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jian Shu,
Guangxue Yue:
Editorial.
JCP 4(1): 1-2 (2009) |
20 | EE | Xiaojun Jia,
Guangxue Yue,
Fang Mei:
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
JCP 4(1): 53-60 (2009) |
19 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jun Zhang,
Guangxue Yue:
Editorial.
JSW 4(1): 1-2 (2009) |
2008 |
18 | EE | Shigen Shen,
Guangxue Yue:
Unified Certificate Validation System DNS-OCSP.
ISECS 2008: 394-397 |
17 | EE | Wen Chen,
Fei Yu,
Chin-Chen Chang,
Jiexian Zeng,
Guangxue Yue:
Editorial.
JCM 3(7): 1-2 (2008) |
2007 |
16 | EE | Zaimei Zhang,
Renfa Li,
Zhongsheng Li,
Haiyan Zhang,
Guangxue Yue:
An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea.
FSKD (3) 2007: 119-123 |
15 | EE | Weifeng Du,
Guangxue Yue,
Cheng Xu:
A Brief Analysis about Boundary Region Partition Reduction Standard.
IITA 2007: 34-37 |
14 | | Lei Ding,
Fei Yu,
Guangxue Yue,
Cheng Xu:
An Improved Algorithm of Pattern Matching for Information Security Audit System.
IMECS 2007: 459-463 |
13 | EE | Fei Yu,
Yue Shen,
Guangxue Yue,
Ronghui Wu,
Cheng Xu:
Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning.
International Conference on Computational Science (3) 2007: 109-112 |
12 | EE | Ken Chen,
Guangxue Yue,
Fei Yu,
Yue Shen,
Aiqing Zhu:
Research on Speech Emotion Recognition System in E-Learning.
International Conference on Computational Science (3) 2007: 555-558 |
11 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on Advanced Distributed Learning by Using SCORM.
International Conference on Computational Science (3) 2007: 571-574 |
10 | EE | Guangxue Yue,
Fei Yu,
Li-ping Chen,
Yi-jun Chen:
An Access Control Model in Lager-Scale P2P File Sharing Systems.
International Conference on Computational Science (4) 2007: 741-744 |
9 | EE | Renfa Li,
Yunlong Xie,
Jigang Wen,
Guangxue Yue:
EMMP: a highly efficient membership management protocol.
Frontiers of Computer Science in China 1(2): 208-212 (2007) |
2006 |
8 | EE | Guang Lu,
Yu Fei,
Guangxue Yue,
Miaoliang Zhu:
Worm Intrusion Alarm Modeling Based on Network Traffic Character.
IMSCCS (2) 2006: 142-147 |
7 | EE | Bin Jiang,
Da-fung Zhang,
Chao Yang,
Guangxue Yue,
Fei Yu:
A Privacy Policy of P3P Based on Relational Database.
IMSCCS (2) 2006: 510-515 |
6 | EE | Ji-yao An,
Guangxue Yue,
Fei Yu,
Renfa Li:
Intrusion Detection Based on Fuzzy Neural Networks.
ISNN (2) 2006: 231-239 |
5 | EE | Cheng Xu,
Fei Yu,
Zhenghui Dai,
Guangxue Yue,
Renfa Li:
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor.
SKG 2006: 27 |
4 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on User Authentication for Grid Computing Security.
SKG 2006: 72 |
3 | EE | Guangxue Yue,
Fei Yu,
Yi-jun Chen,
Ronghui Wu,
Ji-yao An,
Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
SKG 2006: 74 |
2 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Jigang Wen:
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
SKG 2006: 75 |
2005 |
1 | EE | Guangxue Yue,
Renfa Li,
Zude Zhou,
Ronghui Wu:
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks.
GCC 2005: 776-786 |