dblp.uni-trier.dewww.uni-trier.de

Ning Zhang

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
83EENing Zhang, Hong Bao: E-learning and Its Information Technology. CSSE (5) 2008: 396-399
82EEJihai Cao, Ning Zhang, Lin Song: A Fast Algorithm for the Chirp Rate Estimation. DELTA 2008: 45-48
81EENing Zhang, Incheol Shin, Feng Zou, Weili Wu, My T. Thai: Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC 2008: 1-8
80EEZhipeng Shen, Ning Zhang, Chen Guo: A General Fuzzified CMAC Controller with Eligibility. ISNN (2) 2008: 138-147
79EENing Zhang: An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. ITNG 2008: 875-880
78EENing Zhang: Characteristics of the Group Interest Network. NAA 2008: 620-627
77EENing Zhang, Incheol Shin, Bo Li, Cem Boyaci, Ravi Tiwari, My T. Thai: New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network. WASA 2008: 96-108
76EEDaehee Hwang, Ning Zhang, Hookeun Lee, Eugene Yi, Hui Zhang, Inyoul Y. Lee, Leroy Hood, Ruedi Aebersold: MS-BID: a Java package for label-free LC-MS-based comparative proteomic analysis. Bioinformatics 24(22): 2641-2642 (2008)
2007
75EEJay Chin, Ning Zhang, Aleksandra Nenadic, Li Yao, J. M. Brooke: Towards Context Constrained Authorisation for Pervasive Grid Computing. COMSWARE 2007
74EEYuansheng Huang, Ning Zhang, Lei Yu: CRM Method for Power Supply Enterprises Based on Analysis of Utility and Customers_ Credit and Multistage Fuzzy Evaluation. FSKD (3) 2007: 553-558
73EENing Zhang, Hua Ye, Yutian Liu: Fuzzy Comprehensive Evaluation for Power Network Operating Schemes. FSKD (4) 2007: 593-597
72EENing Zhang, Timothy Mount, Richard Boisvert: Generators Bidding Behavior in the NYISO Day-Ahead Wholesale Electricity Market. HICSS 2007: 123
71EENaikuo Yang, Howard Barringer, Ning Zhang: A Purpose-Based Access Control Model. IAS 2007: 143-148
70EEAleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow: Levels of Authentication Assurance: an Investigation. IAS 2007: 155-160
69EELi-Sha He, Ning Zhang, Li-Rong He, Ian Rogers: Secure M-commerce Transactions: A Third Party Based Signature Protocol. IAS 2007: 3-8
68EELi Zhang, Xiaolin Wu, Ning Zhang, Wen Gao, Qiang Wang, Debin Zhao: Context-based Arithmetic Coding Reexamined for DCT Video Compression. ISCAS 2007: 3147-3150
67EEZhuo Song, Ning Zhang, Zhuo Yang, Tao Zhang: Prediction of Helix, Strand Segments from Primary Protein Sequences by a Set of Neural Networks. ISNN (2) 2007: 1248-1253
66EEZhixiong Chen, Ning Zhang, Guozhen Xiao: Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. Inscrypt 2007: 231-245
65EENing Zhang, Ling Guan: Graph Cuts in Content-Based Image Classification and Retrieval with Relevance Feedback. PCM 2007: 30-39
64EEJianli Duan, Ning Zhang: Research on Visualization Techniques for Web Usability Analysis. SNPD (2) 2007: 788-791
63EEDebin Pang, Ning Zhang: Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. SNPD (3) 2007: 717-721
62EENing Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi: Achieving fine-grained access control in virtual organizations. Concurrency and Computation: Practice and Experience 19(9): 1333-1352 (2007)
61EENing Zhang, Jishou Ruan, Jie Wu, Tao Zhang: SHEETSPAIR: A Database of Amino Acid Pairs in Protein Sheet Structures. Data Science Journal 6: 589-595 (2007)
60EEQingHong Yan, Ning Zhang, Jie Wu, Tao Zhang: ERPDB: An Integrated Database of ERP Data for Neuroinformatics Research. Data Science Journal 6: 743-748 (2007)
59EENing Zhang, Zhixiong Chen, Guozhen Xiao: Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. Inf. Sci. 177(10): 2119-2129 (2007)
58EEMy T. Thai, Ning Zhang, Ravi Tiwari, Xiaochun Xu: On approximation algorithms of k-connected m-dominating sets in disk graphs. Theor. Comput. Sci. 385(1-3): 49-59 (2007)
2006
57EEIan Featherstone, Ning Zhang: A mobility monitoring based advance reservation protocol. Q2SWinet 2006: 111-118
56EEJunzhong Ji, Ning Zhang, Chunnian Liu, Ning Zhong: An Ant Colony Optimization Algorithm for Learning Classification Rules. Web Intelligence 2006: 1034-1037
55EEAleksandra Nenadic, Ning Zhang, Jay Chin, Carole A. Goble: FAME: Adding Multi-Level Authentication to Shibboleth. e-Science 2006: 157
54EEOmaima Bamasak, Ning Zhang: Reputation management and signature delegation: A distributed approach. Electronic Commerce Research 6(3-4): 227-263 (2006)
53EENing Zhang, Xiaolin Wu: Lossless compression of color mosaic images. IEEE Transactions on Image Processing 15(6): 1379-1388 (2006)
52EEJia Zhang, Ning Zhang, Liang-Jie Zhang: Auction-Based Pricing Model for Web Service Providers. Int. J. Web Service Res. 3(3): 82-107 (2006)
51EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Practical and efficient fair document exchange over networks. J. Network and Computer Applications 29(1): 46-61 (2006)
2005
50EEOmaima Bamasak, Ning Zhang: A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . EEE 2005: 270-275
49EEAleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. EEE 2005: 94-99
48EEAleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: Certified E-Mail Delivery with DSA Receipts. IPDPS 2005
47EEOmaima Bamasak, Ning Zhang, Doug Edwards: DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. IPDPS 2005
46EENing Zhang, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi: Plugging a Scalable Authentication Framework into Shibboleth. WETICE 2005: 271-276
45EEXiaolin Wu, Sorina Dumitrescu, Ning Zhang: On multirate optimality of JPEG2000 code stream. IEEE Transactions on Image Processing 14(12): 2012-2023 (2005)
44EEAleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble: RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. J. UCS 11(1): 175-192 (2005)
43EEAleksandra Nenadic, Ning Zhang, Qi Shi: RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. Journal of Computer Security 13(5): 757-777 (2005)
42EENing Zhang, Qi Shi, Madjid Merabti: Revocation of privacy-enhanced public-key certificates. Journal of Systems and Software 75(1-2): 205-214 (2005)
2004
41EEJia Zhang, Ning Zhang, Jen-Yao Chung: Assisting Seller Pricing Strategy Selection for Electronic Auctions. CEC 2004: 27-33
40EENing Zhang, Jay Chin, Alan L. Rector, Carole A. Goble, Y. Li: Towards an Authentication Middleware to Support Ubiquitous Web Access. COMPSAC Workshops 2004: 36-38
39EENing Zhang, Xiaolin Wu: Lossless compression of color mosaic images. ICIP 2004: 517-520
38EED. Critchlow, Ning Zhang: Revocation invocation for accountable anonymous PKI certificate trees. ISCC 2004: 386-392
37EEOmaima Bamasak, Ning Zhang: A secure proxy signature protocol for agent-based M-commerce applications. ISCC 2004: 399-406
36EEAleksandra Nenadic, Ning Zhang, Stephen Barton: A secure and fair DSA-based signature exchange protocol. ISCC 2004: 412-417
35EEAleksandra Nenadic, Ning Zhang, Stephen Barton: A Security Protocol for Certified E-Goods Delivery. ITCC (1) 2004: 22-
34EEOmaima Bamasak, Ning Zhang: Achieving Distributed Trusted Services. ITCC (1) 2004: 56-61
33EEHongbo Li, Ronghua Xu, Ning Zhang: On Miquel's Five-Circle Theorem. IWMM/GIAE 2004: 217-228
32EEAleksandra Nenadic, Ning Zhang, Stephen Barton: Fair certified e-mail delivery. SAC 2004: 391-396
31EELi-Sha He, Ning Zhang: A new signature scheme: joint-signature. SAC 2004: 807-812
30EEOmaima Bamasak, Ning Zhang: A secure method for signature delegation to mobile agents. SAC 2004: 813-818
29EED. Critchlow, Ning Zhang: Security enhanced accountable anonymous PKI certificates for mobile e-commerce. Computer Networks 45(4): 483-503 (2004)
28EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Autonomous mobile agent based fair exchange. Computer Networks 46(6): 751-770 (2004)
27EEXiaolin Wu, Ning Zhang: Primary-consistent soft-decision color demosaicking for digital cameras (patent pending). IEEE Transactions on Image Processing 13(9): 1263-1274 (2004)
26EENing Zhang, Qi Shi, Madjid Merabti: A unified approach to a fair document exchange system. Journal of Systems and Software 72(1): 83-96 (2004)
2003
25 Omaima Bamasak, Ning Zhang: Towards a Secure Mobile Agent Based M-Commerce System. ICEIS (4) 2003: 408-412
24 Aleksandra Nenadic, Ning Zhang: Non-Repudiation and Fairness in Electronic Data Exchange. ICEIS (4) 2003: 55-62
23 Xiaolin Wu, Ning Zhang: Primary-consistent soft-decision color demosaic for digital cameras. ICIP (1) 2003: 477-480
22EELi-Sha He, Ning Zhang: An Asymmetric Authentication Protocol for M-Commerce Applications. ISCC 2003: 244-
21EENing Zhang, Qi Shi, Madjid Merabti: An efficient protocol for anonymous and fair document exchange. Computer Networks 41(1): 19-28 (2003)
2002
20 Li-Sha He, Ning Zhang, Li-Rong He: A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. SEC 2002: 239-250
19 D. Critchlow, Ning Zhang: An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. SEC 2002: 411-422
2001
18EENing Zhang, Manhee Jo, Shigetomo Kimura, Yoshihiko Ebihara: A Study of Fairness for ATM ABR Service Based on Cell Delay. ICOIN 2001: 219-
2000
17 Ning Zhang, Xinggang Lin, Yujin Zhang: L-8 constrained micronoise filtering for high-fidelity image compression. VCIP 2000: 576-585
16EENing Zhang, Gang Feng: H2 Control design for fuzzy dynamic systems via LMI. Journal of Intelligent and Fuzzy Systems 8(4): 275-287 (2000)
1999
15 Ning Zhang, Qi Shi, Madjid Merabti: A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999)
14EEAnneliese von Mayrhauser, Ning Zhang: Automated regression testing using DBT and Sleuth. Journal of Software Maintenance 11(2): 93-116 (1999)
1998
13EEZhixiu Han, Gang Feng, Ning Zhang: Dynamic output feedback Hinfinity controller design of fuzzy dynamic systems using LMI techniques. KES (2) 1998: 343-352
12EEQi Shi, Ning Zhang: An effective model for composition of secure systems. Journal of Systems and Software 43(3): 233-244 (1998)
1996
11EENing Zhang, Qi Shi: Security Issues in an EDI Environment. ACSAC 1996: 129-137
10EEQi Shi, Ning Zhang: Applying Composable Security Properties to Assessment of Information Systems. COMPSAC 1996: 118-123
9EEQi Shi, Ning Zhang: A general approach to secure components composition. HASE 1996: 263-286
8 Ning Zhang, Qi Shi: Achieving Non-Repudiation of Receipt. Comput. J. 39(10): 844-853 (1996)
1995
7EEQi Shi, Ning Zhang: A General Approach to Evaluation of Secure Systems. COMPSAC 1995: 396-401
1993
6 Ning Zhang, Solomon W. Golomb: Polyphase sequence with low autocorrelations. IEEE Transactions on Information Theory 39(3): 1085- (1993)
1990
5 Ning Zhang, Solomon W. Golomb: A limit theorem for n-phase Barker sequences (corresp.). IEEE Transactions on Information Theory 36(4): 863- (1990)
4 Ning Zhang, Solomon W. Golomb: Uniqueness of the generalized Barker sequence of length 6. IEEE Transactions on Information Theory 36(5): 1167- (1990)
3 Ning Zhang, Solomon W. Golomb: On the crosscorrelation of generalized Barker sequences. IEEE Transactions on Information Theory 36(6): 1478- (1990)
1989
2 José L. Encarnação, Geory Köberle, Ning Zhang: Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach. Supercomputer 1989: 11-24
1 Ning Zhang, Solomon W. Golomb: Sixty-phase generalized Barker sequences. IEEE Transactions on Information Theory 35(4): 911- (1989)

Coauthor Index

1Ruedi Aebersold [76]
2Anneliese Amschler Andrews (Anneliese von Mayrhauser) [14]
3Robert Askwith (Bob Askwith) [28] [51]
4Omaima Bamasak [25] [30] [34] [37] [47] [50] [54]
5Hong Bao [83]
6Howard Barringer [71]
7Stephen Barton [32] [35] [36]
8Richard Boisvert [72]
9Cem Boyaci [77]
10J. M. Brooke [75]
11Jihai Cao [82]
12David W. Chadwick [62]
13Barry M. G. Cheetham [44]
14Zhixiong Chen [59] [66]
15Jay Chin [40] [46] [55] [62] [75]
16Jen-Yao Chung [41]
17D. Critchlow [19] [29] [38]
18Jianli Duan [64]
19Sorina Dumitrescu [45]
20Yoshihiko Ebihara [18]
21Doug Edwards [47]
22José L. Encarnação [2]
23Ian Featherstone [57]
24Gang Feng [13] [16]
25Wen Gao [68]
26Carole A. Goble [40] [44] [46] [48] [49] [55] [62]
27Solomon W. Golomb [1] [3] [4] [5] [6]
28Ling Guan [65]
29Chen Guo [80]
30Zhixiu Han [13]
31Li-Rong He [20] [69]
32Li-Sha He [20] [22] [31] [69]
33Leroy Hood [76]
34Yuansheng Huang [74]
35Daehee Hwang [76]
36Junzhong Ji [56]
37Manhee Jo [18]
38Shigetomo Kimura [18]
39Geory Köberle [2]
40Hookeun Lee [76]
41Inyoul Y. Lee [76]
42Bo Li [77]
43Hongbo Li [33]
44Y. Li [40]
45Xinggang Lin [17]
46Chunnian Liu [56]
47Yutian Liu [73]
48A. McNab [46]
49Madjid Merabti [15] [21] [26] [28] [42] [51]
50Terry Morrow [70]
51Timothy D. Mount (Timothy Mount) [72]
52Aleksandra Nenadic [24] [32] [35] [36] [43] [44] [46] [48] [49] [55] [62] [70] [75]
53Sassa Otenko (Alexander Otenko) [62]
54Debin Pang [63]
55Alan L. Rector [40] [46] [62]
56Ian Rogers [69]
57Jishou Ruan [61]
58Zhipeng Shen [80]
59Qi Shi [7] [8] [9] [10] [11] [12] [15] [21] [26] [28] [42] [43] [46] [48] [49] [51] [62]
60Incheol Shin [77] [81]
61Lin Song [82]
62Zhuo Song [67]
63My T. Thai [58] [77] [81]
64Ravi Tiwari [58] [77]
65Qiang Wang [68]
66Jie Wu [60] [61]
67Weili Wu [81]
68Xiaolin Wu [23] [27] [39] [45] [53] [68]
69Guozhen Xiao [59] [66]
70Ronghua Xu [33]
71Xiaochun Xu [58]
72QingHong Yan [60]
73Naikuo Yang [71]
74Zhuo Yang [67]
75Li Yao [46] [62] [70] [75]
76Hua Ye [73]
77Eugene Yi [76]
78Lei Yu [74]
79Hui Zhang [76]
80Jia Zhang [41] [52]
81Li Zhang [68]
82Liang-Jie Zhang [52]
83Tao Zhang [60] [61] [67]
84Yujin Zhang [17]
85Debin Zhao [68]
86Ning Zhong [56]
87Feng Zou [81]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)