Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Guangxue Yue
@article{DBLP:journals/ijwmc/ShiYMPM24, author = {Jian Shi and Guangxue Yue and Shengyu Ma and Tianjun Peng and Bolin Ma}, title = {A scalable multimodal ensemble learning framework for automatic modulation recognition}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {26}, number = {2}, pages = {182--197}, year = {2024}, url = {https://doi.org/10.1504/IJWMC.2024.137175}, doi = {10.1504/IJWMC.2024.137175}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/ShiYMPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/GaoMSLY23, author = {Yan Gao and Shengyu Ma and Jian Shi and Xiangbai Liao and Guangxue Yue}, title = {An optimised multi-channel neural network model based on {CLDNN} for automatic modulation recognition}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {24}, number = {2}, pages = {144--158}, year = {2023}, url = {https://doi.org/10.1504/IJWMC.2023.130404}, doi = {10.1504/IJWMC.2023.130404}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/GaoMSLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/LuZYML23, author = {Min Lu and Min Zhang and Guangxue Yue and Bolin Ma and Wei Li}, title = {A blind receiver for {OFDM} communications}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {24}, number = {3/4}, pages = {203--216}, year = {2023}, url = {https://doi.org/10.1504/IJWMC.2023.131293}, doi = {10.1504/IJWMC.2023.131293}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/LuZYML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/YueHX23, author = {Guangxue Yue and Chunlan Huang and Xiaofeng Xiong}, title = {A Task Offloading Scheme in Maritime Edge Computing Network}, journal = {J. Commun. Inf. Networks}, volume = {8}, number = {1}, pages = {171--186}, year = {2023}, url = {https://doi.org/10.23919/jcin.2023.10173733}, doi = {10.23919/JCIN.2023.10173733}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcin/YueHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/ShiYMY23, author = {Jian Shi and Xiaohui Yang and Jia Ma and Guangxue Yue}, title = {{CFCS:} {A} Robust and Efficient Collaboration Framework for Automatic Modulation Recognition}, journal = {J. Commun. Inf. Networks}, volume = {8}, number = {3}, pages = {283--294}, year = {2023}, url = {https://doi.org/10.23919/jcin.2023.10272355}, doi = {10.23919/JCIN.2023.10272355}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcin/ShiYMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuWSFYYL22, author = {Jianhua Liu and Xin Wang and Shigen Shen and Zhaoxi Fang and Shui Yu and Guangxue Yue and Minglu Li}, title = {Intelligent Jamming Defense Using {DNN} Stackelberg Game in Sensor Edge Cloud}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {6}, pages = {4356--4370}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3103196}, doi = {10.1109/JIOT.2021.3103196}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuWSFYYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/ZhangMSLY22, author = {Xianchao Zhang and Shengyu Ma and Jian Shi and Panpan Li and Guangxue Yue}, title = {Automatic Modulation Recognition Based on Multi-Channel Neural Network Model}, booktitle = {14th International Conference on Wireless Communications and Signal Processing, {WCSP} 2022, Nanjing, China, November 1-3, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCSP55476.2022.10039264}, doi = {10.1109/WCSP55476.2022.10039264}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/ZhangMSLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuPYML21, author = {Min Lu and Tianjun Peng and Guangxue Yue and Bolin Ma and Xiangbai Liao}, title = {Dual-Channel Hybrid Neural Network for Modulation Recognition}, journal = {{IEEE} Access}, volume = {9}, pages = {76260--76269}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3081617}, doi = {10.1109/ACCESS.2021.3081617}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LuPYML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangZYML21, author = {Huogen Yang and Lingzhu Zhao and Guangxue Yue and Bolin Ma and Wei Li}, title = {IRLNet: {A} Short-Time and Robust Architecture for Automatic Modulation Recognition}, journal = {{IEEE} Access}, volume = {9}, pages = {143661--143676}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3121762}, doi = {10.1109/ACCESS.2021.3121762}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YangZYML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuWSYYL21, author = {Jianhua Liu and Xin Wang and Shigen Shen and Guangxue Yue and Shui Yu and Minglu Li}, title = {A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {9}, pages = {7546--7561}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3038554}, doi = {10.1109/JIOT.2020.3038554}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuWSYYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhaoWVMY21, author = {Jie Zhao and Xin Wang and Harish Viswanathan and Arjuna Madanayake and Guangxue Yue}, title = {Compressed Beam Alignment with Out-of-Band Assistance in Millimeter Wave Cellular Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {1}, pages = {117--129}, year = {2021}, url = {https://doi.org/10.1109/TMC.2019.2941474}, doi = {10.1109/TMC.2019.2941474}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ZhaoWVMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuWYS18, author = {Jianhua Liu and Xin Wang and Guangxue Yue and Shigen Shen}, title = {Data sharing in VANETs based on evolutionary fuzzy game}, journal = {Future Gener. Comput. Syst.}, volume = {81}, pages = {141--155}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.10.037}, doi = {10.1016/J.FUTURE.2017.10.037}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuWYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuYYWL18, author = {Jiansheng Liu and Zhenxu You and Guangxue Yue and Jietai Wang and Jianhua Liu}, title = {{\unicode{32593}}{\unicode{32476}}{\unicode{20449}}{\unicode{20219}}{\unicode{30740}}{\unicode{31350}}{\unicode{36827}}{\unicode{23637}} (Research Progress of Network Trust)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {11}, pages = {13--28}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.11.002}, doi = {10.11896/J.ISSN.1002-137X.2018.11.002}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuYYWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/LiuSYHL15, author = {Jianhua Liu and Shigen Shen and Guangxue Yue and Risheng Han and Hongjie Li}, title = {A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud}, journal = {Appl. Soft Comput.}, volume = {30}, pages = {123--135}, year = {2015}, url = {https://doi.org/10.1016/j.asoc.2015.01.038}, doi = {10.1016/J.ASOC.2015.01.038}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/LiuSYHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiuYSSL14, author = {Jianhua Liu and Guangxue Yue and Shigen Shen and Huiliang Shang and Hongjie Li}, title = {Coverage Capacity Optimization for Mobile Sensor Networks Based on Evolutionary Games}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/264307}, doi = {10.1155/2014/264307}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LiuYSSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/OuyangLYZL14, author = {Aijia Ouyang and Libin Liu and Guangxue Yue and Xu Zhou and Kenli Li}, title = {{BFGS-GSO} for Global Optimization Problems}, journal = {J. Comput.}, volume = {9}, number = {4}, pages = {966--973}, year = {2014}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=83\&\#38;id=1170}, doi = {10.4304/JCP.9.4.966-973}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/OuyangLYZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/OuyangPYD14, author = {Aijia Ouyang and Guo Pan and Guangxue Yue and Jiayi Du}, title = {Chaotic Cuckoo Search Algorithm for High-dimensional Functions}, journal = {J. Comput.}, volume = {9}, number = {5}, pages = {1282--1290}, year = {2014}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=77\&\#38;id=1040}, doi = {10.4304/JCP.9.5.1282-1290}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/OuyangPYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DingYYY13, author = {Lei Ding and Fei Yu and Zhenghua Yang and Guangxue Yue}, title = {The System Design of a Node of {P2P} Networks for Intrusion Detection}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1920--1927}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1920-1927}, doi = {10.4304/JNW.8.8.1920-1927}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DingYYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/MengDPY13, author = {Fanbin Meng and Lei Ding and Sheng Peng and Guangxue Yue}, title = {A {P2P} Network Model Based on Hierarchical Interest Clustering Algorithm}, journal = {J. Softw.}, volume = {8}, number = {5}, pages = {1262--1267}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.5.1262-1267}, doi = {10.4304/JSW.8.5.1262-1267}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/MengDPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/XieWYXY12, author = {Linquan Xie and Ying Wang and Fei Yu and Chen Xu and Guangxue Yue}, title = {Research on Intrusion Detection Model of Heterogeneous Attributes Clustering}, journal = {J. Softw.}, volume = {7}, number = {12}, pages = {2823--2831}, year = {2012}, url = {https://doi.org/10.4304/jsw.7.12.2823-2831}, doi = {10.4304/JSW.7.12.2823-2831}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/XieWYXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenYCY11, author = {Shigen Shen and Guangxue Yue and Qiying Cao and Fei Yu}, title = {A Survey of Game Theory in Wireless Sensor Networks Security}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {521--532}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.521-532}, doi = {10.4304/JNW.6.3.521-532}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenYCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongSYLX11, author = {Xiaofeng Xiong and Jiajia Song and Guangxue Yue and Jiansheng Liu and Linquan Xie}, title = {Survey: Research on QoS of {P2P} Reliable Streaming Media}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1114--1121}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1114-1121}, doi = {10.4304/JNW.6.8.1114-1121}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongSYLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuWYXX11, author = {Jiansheng Liu and Jiajia Wei and Guangxue Yue and Linquan Xie and Xiaofeng Xiong}, title = {Application Layer Multicast Technology of Streaming Media}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1122--1128}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1122-1128}, doi = {10.4304/JNW.6.8.1122-1128}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuWYXX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YueWLXX11, author = {Guangxue Yue and Nanqing Wei and Jiansheng Liu and Xiaofeng Xiong and Linquan Xie}, title = {Survey on Scheduling Technologies of {P2P} Media Streaming}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1129--1136}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1129-1136}, doi = {10.4304/JNW.6.8.1129-1136}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YueWLXX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YueJWCSX11, author = {Guangxue Yue and Tao Jiang and Jiajin Wang and Zhi Chen and Jiajia Song and Cheng Xu}, title = {Underlying Technology of {P2P} Media Streaming}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1195--1205}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1195-1205}, doi = {10.4304/JNW.6.8.1195-1205}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YueJWCSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuLSYC11, author = {Fei Yu and Yiqin Lu and Jian Shu and Guangxue Yue and Chin{-}Chen Chang}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1387--1389}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1387-1389}, doi = {10.4304/JNW.6.10.1387-1389}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuLSYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhaoYXZYY11, author = {Liping Zhao and Guangxue Yue and Degui Xiao and Xu Zhou and Xiang Yu and Fei Yu}, title = {A Content-based Classified Hierarchical Vector Quantization Algorithm for Volume Compression}, journal = {J. Softw.}, volume = {6}, number = {2}, pages = {322--330}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.2.322-330}, doi = {10.4304/JSW.6.2.322-330}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhaoYXZYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhangYZY11, author = {Xixiang Zhang and Guangxue Yue and Xiajie Zheng and Fei Yu}, title = {Assigning Method for Decision Power Based on Linguisitc 2-tuple Judgment Matrices}, journal = {J. Softw.}, volume = {6}, number = {3}, pages = {508--515}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.3.508-515}, doi = {10.4304/JSW.6.3.508-515}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhangYZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhouYJW11, author = {Fang Zhou and Guangxue Yue and Jianguo Jiang and Peizhen Wang}, title = {A Novel Intelligent Technique for Recognition of Coke Optical Texture}, journal = {J. Softw.}, volume = {6}, number = {8}, pages = {1476--1483}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.8.1476-1483}, doi = {10.4304/JSW.6.8.1476-1483}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhouYJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/WangDZLYX11, author = {Wenjuan Wang and Weihui Dai and Weidong Zhao and Tong Li and Guangxue Yue and Chen Xu}, title = {Research on Mobile Agent System for Agile Supply Chain Management}, journal = {J. Softw.}, volume = {6}, number = {8}, pages = {1498--1505}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.8.1498-1505}, doi = {10.4304/JSW.6.8.1498-1505}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsw/WangDZLYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhaoWDWY11, author = {Weidong Zhao and Haifeng Wu and Weihui Dai and Wenjuan Wang and Guangxue Yue}, title = {A Framework of Transferring Mobile Services with Agent Based Middleware}, journal = {J. Softw.}, volume = {6}, number = {8}, pages = {1578--1585}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.8.1578-1585}, doi = {10.4304/JSW.6.8.1578-1585}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhaoWDWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/XiongY10, author = {Wanmin Xiong and Guangxue Yue}, title = {Almost periodic solutions for a class of fourth-order nonlinear differential equations with a deviating argument}, journal = {Comput. Math. Appl.}, volume = {60}, number = {5}, pages = {1184--1190}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2010.05.042}, doi = {10.1016/J.CAMWA.2010.05.042}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/XiongY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/YuCYZC10, author = {Fei Yu and Chin{-}Chen Chang and Guangxue Yue and Jiexian Zeng and Wen Chen}, title = {Guest Editorial}, journal = {J. Comput.}, volume = {5}, number = {4}, pages = {489--491}, year = {2010}, url = {https://doi.org/10.4304/jcp.5.4.489-491}, doi = {10.4304/JCP.5.4.489-491}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/YuCYZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/ZhangYLY10, author = {Xixiang Zhang and Guangxue Yue and Xiaojing Liu and Fei Yu}, title = {A New Judging and Revising Method for Ordinal Consistency of Fuzzy Judgment Matrix}, journal = {J. Comput.}, volume = {5}, number = {4}, pages = {573--580}, year = {2010}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=128\&\#38;id=1868}, doi = {10.4304/JCP.5.4.573-580}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/ZhangYLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/YuCSYZ10, author = {Fei Yu and Chin{-}Chen Chang and Jian Shu and Guangxue Yue and Jun Zhang}, title = {Guest Editorial}, journal = {J. Multim.}, volume = {5}, number = {3}, pages = {197--199}, year = {2010}, url = {https://doi.org/10.4304/jmm.5.3.197-199}, doi = {10.4304/JMM.5.3.197-199}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/YuCSYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuYW10, author = {Yiqin Lu and Guangxue Yue and Jiajin Wang}, title = {Detecting Intention-Violation Feature Interaction in {NGN} Based on Feature Re-presentation}, journal = {J. Networks}, volume = {5}, number = {5}, pages = {603--613}, year = {2010}, url = {https://doi.org/10.4304/jnw.5.5.603-613}, doi = {10.4304/JNW.5.5.603-613}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuCCZY10, author = {Fei Yu and Chin{-}Chen Chang and Wen Chen and Jun Zhang and Guangxue Yue}, title = {Guest Editorial}, journal = {J. Networks}, volume = {5}, number = {6}, pages = {631--633}, year = {2010}, url = {https://doi.org/10.4304/jnw.5.6.631-633}, doi = {10.4304/JNW.5.6.631-633}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuCCZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YuCSLY10, author = {Fei Yu and Chin{-}Chen Chang and Jian Shu and Guiping Liao and Guangxue Yue}, title = {Guest Editorial}, journal = {J. Softw.}, volume = {5}, number = {5}, pages = {455--457}, year = {2010}, url = {https://doi.org/10.4304/jsw.5.5.455-457}, doi = {10.4304/JSW.5.5.455-457}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YuCSLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZhouYYL10, author = {Xu Zhou and Guangxue Yue and ZhiBang Yang and Kenli Li}, title = {A New Approach for the Dominating-Set Problem by DNA-Based Supercomputing}, journal = {J. Softw.}, volume = {5}, number = {6}, pages = {662--670}, year = {2010}, url = {https://doi.org/10.4304/jsw.5.6.662-670}, doi = {10.4304/JSW.5.6.662-670}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/ZhouYYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YuCSYH10, author = {Fei Yu and Chin{-}Chen Chang and Jian Shu and Guangxue Yue and Naiping Hu}, title = {Guest Editorial}, journal = {J. Softw.}, volume = {5}, number = {9}, pages = {923--925}, year = {2010}, url = {https://doi.org/10.4304/jsw.5.9.923-925}, doi = {10.4304/JSW.5.9.923-925}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YuCSYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/YueZLLZY10, author = {Guangxue Yue and Xu Zhou and Kenli Li and Renfa Li and Liping Zhao and Xiang Yu}, title = {A novel solution for the {P2P} network observer placement problem on DNA-based supercomputing}, booktitle = {Fifth International Conference on Bio-Inspired Computing: Theories and Applications, {BIC-TA} 2010, University of Hunan, Liverpool Hope University, Liverpool, United Kingdom / Changsha, China, September 8-10 and September 23-26, 2010}, pages = {185--189}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BICTA.2010.5645333}, doi = {10.1109/BICTA.2010.5645333}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/YueZLLZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/ZhouYLYL10, author = {Xu Zhou and Guangxue Yue and Kenli Li and Xiang Yu and Renfa Li}, title = {A novel and fast parallel solution for the vertex cover problem on DNA-based supercomputing}, booktitle = {Fifth International Conference on Bio-Inspired Computing: Theories and Applications, {BIC-TA} 2010, University of Hunan, Liverpool Hope University, Liverpool, United Kingdom / Changsha, China, September 8-10 and September 23-26, 2010}, pages = {190--194}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BICTA.2010.5645330}, doi = {10.1109/BICTA.2010.5645330}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/ZhouYLYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/YuCCSY09, author = {Fei Yu and Chin{-}Chen Chang and Ben M. Chen and Jian Shu and Guangxue Yue}, title = {Editorial}, journal = {J. Comput.}, volume = {4}, number = {1}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.4304/jcp.4.1.1-2}, doi = {10.4304/JCP.4.1.1-2}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcp/YuCCSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/JiaYM09, author = {Xiaojun Jia and Guangxue Yue and Fang Mei}, title = {The Mathematical Model and Applications of Coded Structured Light System for Object Detecting}, journal = {J. Comput.}, volume = {4}, number = {1}, pages = {53--60}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=108\&\#38;id=1731}, doi = {10.4304/JCP.4.1.53-60}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/JiaYM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuYCSY09, author = {Jian Shu and Fei Yu and Chin{-}Chen Chang and Limin Sun and Guangxue Yue}, title = {Editorial}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {225--227}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.225-227}, doi = {10.4304/JNW.4.4.225-227}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShuYCSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenYYY09, author = {Shigen Shen and Lihua Ye and Guangxue Yue and Fei Yu}, title = {Research of Secure Intranet/Internet Access Platform Based on Ontology}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1009--1016}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1009-1016}, doi = {10.4304/JNW.4.10.1009-1016}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenYYY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YuCCZY09, author = {Fei Yu and Chin{-}Chen Chang and Ben M. Chen and Jun Zhang and Guangxue Yue}, title = {Editorial}, journal = {J. Softw.}, volume = {4}, number = {1}, pages = {1--2}, year = {2009}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YuCCZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/ZengYSWY09, author = {Jiexian Zeng and Fei Yu and Limin Sun and Mingwen Wang and Guangxue Yue}, title = {Editorial}, journal = {J. Softw.}, volume = {4}, number = {4}, pages = {271--273}, year = {2009}, url = {https://doi.org/10.4304/jsw.4.4.271-273}, doi = {10.4304/JSW.4.4.271-273}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsw/ZengYSWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/ChenYCZY08, author = {Wen Chen and Fei Yu and Chin{-}Chen Chang and Jiexian Zeng and Guangxue Yue}, title = {Editorial}, journal = {J. Commun.}, volume = {3}, number = {7}, pages = {1--2}, year = {2008}, url = {https://doi.org/10.4304/jcm.3.7.1-2}, doi = {10.4304/JCM.3.7.1-2}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcm/ChenYCZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/YinLQY08, author = {Haiming Yin and Xiaoyan Lou and Mangxian Qiu and Guangxue Yue}, title = {A Texture and Color Based Method for Color Image Segmentation}, booktitle = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24 September 2008, Proceedings}, pages = {714--717}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CW.2008.111}, doi = {10.1109/CW.2008.111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/YinLQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/LiYSY08, author = {Yonggang Li and Haiming Yin and Meihong Shi and Guangxue Yue}, title = {A Method of Color Image Segmentation Based on {DPCNN}}, booktitle = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24 September 2008, Proceedings}, pages = {725--729}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CW.2008.142}, doi = {10.1109/CW.2008.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/LiYSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/ShenY08, author = {Shigen Shen and Guangxue Yue}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Unified Certificate Validation System {DNS-OCSP}}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {394--397}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.53}, doi = {10.1109/ISECS.2008.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/ShenY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiXWY07, author = {Renfa Li and Yunlong Xie and Jigang Wen and Guangxue Yue}, title = {{EMMP:} a highly efficient membership management protocol}, journal = {Frontiers Comput. Sci. China}, volume = {1}, number = {2}, pages = {208--212}, year = {2007}, url = {https://doi.org/10.1007/s11704-007-0021-4}, doi = {10.1007/S11704-007-0021-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiXWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/ZhangLLZY07, author = {Zaimei Zhang and Renfa Li and Zhongsheng Li and Haiyan Zhang and Guangxue Yue}, editor = {J. Lei}, title = {An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea}, booktitle = {Fourth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3}, pages = {119--123}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FSKD.2007.167}, doi = {10.1109/FSKD.2007.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fskd/ZhangLLZY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/YuSYWX07, author = {Fei Yu and Yue Shen and Guangxue Yue and Ronghui Wu and Cheng Xu}, editor = {Yong Shi and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning}, booktitle = {Computational Science - {ICCS} 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4489}, pages = {109--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72588-6\_15}, doi = {10.1007/978-3-540-72588-6\_15}, timestamp = {Tue, 08 Nov 2022 08:34:35 +0100}, biburl = {https://dblp.org/rec/conf/iccS/YuSYWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/ChenYYSZ07, author = {Ken Chen and Guangxue Yue and Fei Yu and Yue Shen and Aiqing Zhu}, editor = {Yong Shi and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {Research on Speech Emotion Recognition System in E-Learning}, booktitle = {Computational Science - {ICCS} 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4489}, pages = {555--558}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72588-6\_91}, doi = {10.1007/978-3-540-72588-6\_91}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/ChenYYSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/WuLYYX07, author = {Ronghui Wu and Renfa Li and Fei Yu and Guangxue Yue and Cheng Xu}, editor = {Yong Shi and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {Research on Advanced Distributed Learning by Using {SCORM}}, booktitle = {Computational Science - {ICCS} 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4489}, pages = {571--574}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72588-6\_95}, doi = {10.1007/978-3-540-72588-6\_95}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/WuLYYX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/YueYCC07, author = {Guangxue Yue and Fei Yu and Li{-}ping Chen and Yi{-}jun Chen}, editor = {Yong Shi and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {An Access Control Model in Lager-Scale {P2P} File Sharing Systems}, booktitle = {Computational Science - {ICCS} 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {4490}, pages = {741--744}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72590-9\_111}, doi = {10.1007/978-3-540-72590-9\_111}, timestamp = {Tue, 08 Nov 2022 08:34:37 +0100}, biburl = {https://dblp.org/rec/conf/iccS/YueYCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iita/DuYX07, author = {Weifeng Du and Guangxue Yue and Cheng Xu}, editor = {Fei Yu and Renfa Li and Guiping Liao}, title = {A Brief Analysis about Boundary Region Partition Reduction Standard}, booktitle = {Proceedings of the Workshop on Intelligent Information Technology Application, {IITA} 2007, Zhang Jiajie, China, December 2-3, 2007}, pages = {34--37}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IITA.2007.67}, doi = {10.1109/IITA.2007.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iita/DuYX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imecs/DingYYX07, author = {Lei Ding and Fei Yu and Guangxue Yue and Cheng Xu}, editor = {Sio Iong Ao and Oscar Castillo and Craig Douglas and David Dagan Feng and Jeong{-}A Lee}, title = {An Improved Algorithm of Pattern Matching for Information Security Audit System}, booktitle = {Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, {IMECS} 2007, March 21-23, 2007, Hong Kong, China}, series = {Lecture Notes in Engineering and Computer Science}, pages = {459--463}, publisher = {Newswood Limited}, year = {2007}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imecs/DingYYX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/LuFYZ06, author = {Guang Lu and Fei Yu and Guangxue Yue and Miaoliang Zhu}, editor = {Jun Ni and Jack J. Dongarra}, title = {Worm Intrusion Alarm Modeling Based on Network Traffic Character}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.287}, doi = {10.1109/IMSCCS.2006.287}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/LuFYZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/JiangZYYY06, author = {Bin Jiang and Da{-}fung Zhang and Chao Yang and Guangxue Yue and Fei Yu}, editor = {Jun Ni and Jack J. Dongarra}, title = {A Privacy Policy of {P3P} Based on Relational Database}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {510--515}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.163}, doi = {10.1109/IMSCCS.2006.163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/JiangZYYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/AnYYL06, author = {Ji{-}yao An and Guangxue Yue and Fei Yu and Renfa Li}, editor = {Jun Wang and Zhang Yi and Jacek M. Zurada and Bao{-}Liang Lu and Hujun Yin}, title = {Intrusion Detection Based on Fuzzy Neural Networks}, booktitle = {Advances in Neural Networks - {ISNN} 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3973}, pages = {231--239}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760191\_34}, doi = {10.1007/11760191\_34}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/AnYYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/XuYDYL06, author = {Cheng Xu and Fei Yu and Zhenghui Dai and Guangxue Yue and Renfa Li}, title = {Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor}, booktitle = {2006 International Conference on Semantics, Knowledge and Grid {(SKG} 2006), 1-3 November 2006, Guilin, China}, pages = {27}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SKG.2006.44}, doi = {10.1109/SKG.2006.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/XuYDYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/WuLYYX06, author = {Ronghui Wu and Renfa Li and Fei Yu and Guangxue Yue and Cheng Xu}, title = {Research on User Authentication for Grid Computing Security}, booktitle = {2006 International Conference on Semantics, Knowledge and Grid {(SKG} 2006), 1-3 November 2006, Guilin, China}, pages = {72}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SKG.2006.78}, doi = {10.1109/SKG.2006.78}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/WuLYYX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/YueYCWAL06, author = {Guangxue Yue and Fei Yu and Yi{-}jun Chen and Ronghui Wu and Ji{-}yao An and Renfa Li}, title = {Access Control Model for {P2P} File-Sharing Systems Based on Trust and Recommendation}, booktitle = {2006 International Conference on Semantics, Knowledge and Grid {(SKG} 2006), 1-3 November 2006, Guilin, China}, pages = {74}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SKG.2006.19}, doi = {10.1109/SKG.2006.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/YueYCWAL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/WuLYYW06, author = {Ronghui Wu and Renfa Li and Fei Yu and Guangxue Yue and Jigang Wen}, title = {Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security}, booktitle = {2006 International Conference on Semantics, Knowledge and Grid {(SKG} 2006), 1-3 November 2006, Guilin, China}, pages = {75}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SKG.2006.77}, doi = {10.1109/SKG.2006.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/WuLYYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/YueLZW05, author = {Guangxue Yue and Renfa Li and Zude Zhou and Ronghui Wu}, editor = {Hai Zhuge and Geoffrey C. Fox}, title = {An Efficient Cluster-Hierarchy Architecture Model {ECHP2P} for {P2P} Networks}, booktitle = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3795}, pages = {776--786}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11590354\_98}, doi = {10.1007/11590354\_98}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/gcc/YueLZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.