Mingchu Li

Orcid: 0000-0001-7969-6415

Affiliations:
  • Dalian University of Technology, School of Software, Dalian, China
  • Tianjin University, Department of Computer Science and Technology, Tianjin, China
  • University of Toronto, Department of Mathematics, Toronto, Canada (PhD 1997)


According to our database1, Mingchu Li authored at least 235 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks.
Comput. Networks, January, 2024

Anatomy-guided fiber trajectory distribution estimation for cranial nerves tractography.
CoRR, 2024

2023
A novel zero-watermarking algorithm based on multi-feature and DNA encryption for medical images.
Multim. Tools Appl., September, 2023

MADDPG-based joint optimization of task partitioning and computation resource allocation in mobile edge computing.
Neural Comput. Appl., August, 2023

Independent tasks scheduling of collaborative computation offloading for SDN-powered MEC on 6G networks.
Soft Comput., July, 2023

Mathematical Modeling of the Tumor-Immune System with Time Delay and Diffusion.
Axioms, February, 2023

HierFedML: Aggregator Placement and UE Assignment for Hierarchical Federated Learning in Mobile Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2023

Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks.
J. Supercomput., 2023

A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment.
Reliab. Eng. Syst. Saf., 2023

Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave.
Proceedings of the 2nd International Conference on Networks, 2023

Task Migration Optimization Algorithm in Mobile Edge Computing.
Proceedings of the 2nd International Conference on Networks, 2023

Context-Aware Edge Caching Strategy Based On Mobility Prediction.
Proceedings of the 2nd International Conference on Networks, 2023

Computation Offloading in E-RAN via Deep Reinforcement Learning.
Proceedings of the 2nd International Conference on Networks, 2023

Dynamic Offloading Task for Internet of Things Based on Meta Supervised Learning.
Proceedings of the 2nd International Conference on Networks, 2023

Transformer Inference Acceleration in Edge Computing Environment.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022

Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing.
ACM Trans. Internet Techn., 2022

Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers.
Reliab. Eng. Syst. Saf., 2022

Modeling bluffing behavior in signaling security games.
Int. Trans. Oper. Res., 2022

Two completely independent spanning trees of claw-free graphs.
Discret. Math., 2022

Aerial-Aerial-Ground Computation Offloading Using High Altitude Aerial Vehicle and Mini-drones.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Dynamic Service Placement Algorithm for Partitionable Applications in Mobile Edge Computing.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms.
Wirel. Commun. Mob. Comput., 2021

Blockchain-Based Secure Computation Offloading in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2021

EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network.
IEEE Trans. Comput. Soc. Syst., 2021

An Upstream-Reciprocity-Based Strategy for Academic Social Networks Using Public Goods Game.
IEEE Trans. Comput. Soc. Syst., 2021

A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy.
Reliab. Eng. Syst. Saf., 2021

Resource Allocation Scheduling Algorithm Based on Incomplete Information Dynamic Game for Edge Computing.
Int. J. Web Serv. Res., 2021

A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information.
Int. Trans. Oper. Res., 2021

Task scheduling using edge computing system in smart city.
Int. J. Commun. Syst., 2021

Generalized lump solutions, classical lump solutions and rogue waves of the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like equation.
Appl. Math. Comput., 2021

Scientific Collaboration Analytics based on Multi-Player Game Theory.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

A scenario-based simultaneous game approach for risk-averse facility protection problem.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

Personalized and Quality-Aware Task Recommendation in Collaborative Crowdsourcing.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020

Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks.
Sensors, 2020

A game-theoretic approach for channel security against active time-varying attacks based on artificial noise.
J. Ambient Intell. Humaniz. Comput., 2020

Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020

Interrupt nesting method based on time slice in embedded software.
Int. J. Inf. Commun. Technol., 2020

Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020

Research on Real-Time Embedded Software Scheduling Model Based on EDF.
IEEE Access, 2020

A Reliable IoT Edge Computing Trust Management Mechanism for Smart Cities.
IEEE Access, 2020

Text Data Truth Discovery Using Self-confidence of Sources.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Age-Aware Query Evaluation for Big Data Analytics in Mobile Edge Clouds.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields.
Multim. Tools Appl., 2019

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
Mob. Networks Appl., 2019

RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.
Knowl. Based Syst., 2019

实时嵌入式系统的WCET分析与预测研究综述 (Survey of WCET Analysis and Prediction for Real-time Embedded Systems).
计算机科学, 2019

Cognitive radio assisted WSN with interference aware AODV routing protocol.
J. Ambient Intell. Humaniz. Comput., 2019

Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019

Stochastic Computation Offloading and Scheduling Based on Mobile Edge Computing.
IEEE Access, 2019

Solving Security Problems in MEC Systems.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Novel Crowd-sourcing Inference Method.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

Developing Patrol Strategies for the Cooperative Opportunistic Criminals.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Optimal Personalized DDoS Attacks Detection Strategy in Network Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

An Evolutionary Game-Based Mechanism for Unwanted Traffic Control.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems.
Sci. Program., 2018

Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing.
Pervasive Mob. Comput., 2018

Construction of compressed sensing matrices for signal processing.
Multim. Tools Appl., 2018

A novel proactive secret image sharing scheme based on LISS.
Multim. Tools Appl., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distributed Comput., 2018

Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control.
Future Gener. Comput. Syst., 2018

Spanning 3-ended trees in quasi-claw-free graphs.
Ars Comb., 2018

Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.
IEEE Access, 2018

Task Assignment for Simple Tasks with Small Budget in Mobile Crowdsourcing.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

The Competitions of Forgiving Strategies in the Iterated Prisoner's Dilemma.
Proceedings of the IEEE International Conference on Agents, 2018

Optimally Protecting Elections with Uncertainty about Voter Preferences.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
GroupTrust: Dependable Trust Management.
IEEE Trans. Parallel Distributed Syst., 2017

Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism.
ACM Trans. Internet Techn., 2017

Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference.
Peer-to-Peer Netw. Appl., 2017

Secure variable-capacity self-recovery watermarking scheme.
Multim. Tools Appl., 2017

(t, n) Threshold secret image sharing scheme with adversary structure.
Multim. Tools Appl., 2017

Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network.
KSII Trans. Internet Inf. Syst., 2017

Effective hybrid load scheduling of online and offline clusters for e-health service.
Neurocomputing, 2017

A Verifiable E-voting Scheme with Secret Sharing.
Int. J. Netw. Secur., 2017

An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings.
Future Internet, 2017

SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT.
Comput. Networks, 2017

A novel green software evaluation model for cloud robotics.
Comput. Electr. Eng., 2017

A hierarchical combinatorial testing method for smart phone software in wearable IoT systems.
Comput. Electr. Eng., 2017

Spanning 3-ended trees in k-connected claw-free graphs.
Ars Comb., 2017

Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems.
IEEE Access, 2017

Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN.
IEEE Access, 2017

Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV.
IEEE Access, 2017

Optimal patrol strategies against attacker's persistent attack with multiple resources.
Proceedings of the 2017 IEEE SmartWorld, 2017

TALENTED: An Advanced Guarantee Public Order Tool for Urban Inspectors.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Classification-Based Reputation Mechanism for Master-Worker Computing System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones.
Sensors, 2016

AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
Secur. Commun. Networks, 2016

An Eigentrust dynamic evolutionary model in P2P file-sharing systems.
Peer-to-Peer Netw. Appl., 2016

A region-adaptive semi-fragile dual watermarking scheme.
Multim. Tools Appl., 2016

A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multim. Tools Appl., 2016

A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems.
Knowl. Based Syst., 2016

Hamiltonian properties of almost locally connected claw-free graphs.
Ars Comb., 2016

Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

ETSTM: A New Green Software Model.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Study of Self-adaptive Strategy Based Incentive Mechanism in Structured P2P System.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

Personalized pre-trust reputation management in social P2P network.
Proceedings of the 2016 International Conference on Computing, 2016

An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
Reliable and Resilient Trust Management in Distributed Service Provision Networks.
ACM Trans. Web, 2015

Bridge Displacement Monitoring Method Based on Laser Projection-Sensing Technology.
Sensors, 2015

Reversible data hiding exploiting high-correlation regulation for high-quality images.
Secur. Commun. Networks, 2015

A novel weighted threshold secret image sharing scheme<sup>†</sup>.
Secur. Commun. Networks, 2015

Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking.
J. Netw. Comput. Appl., 2015

A Novel Proactive Multi-secret Sharing Scheme.
Int. J. Netw. Secur., 2015

Initial Validation of Mobile-Structural Health Monitoring Method Using Smartphones.
Int. J. Distributed Sens. Networks, 2015

[r, s, t]-Colorings of Friendship Graphs and Wheels.
Graphs Comb., 2015

Vertex Pancyclicity of Quadrangularly Connected Claw-free Graphs.
Graphs Comb., 2015

Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective.
Concurr. Comput. Pract. Exp., 2015

[r, s, t]-colorings of fans.
Ars Comb., 2015

LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage.
Proceedings of the 12th International Conference on Information Technology, 2015

Computational Models Based on Forgiveness Mechanism for Untrustworthy Agents.
Proceedings of the Intelligent and Evolutionary Systems - The 19th Asia Pacific Symposium, 2015

RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Prediction of Disease Dynamics with Structure Knowledge of Human Contact Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Identity-Based Broadcast Encryption Schemes for Open Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.
KSII Trans. Internet Inf. Syst., 2014

Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

2013
Evolution of cooperation in reputation system by group-based scheme.
J. Supercomput., 2013

Attribute-based ring signcryption scheme.
Secur. Commun. Networks, 2013

Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks.
Secur. Commun. Networks, 2013

Lossless Information Hiding in the VQ Index Table.
J. Softw., 2013

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013

Tank-Ring Factors in Supereulerian Claw-Free Graphs.
Graphs Comb., 2013

Hamiltonian Connectedness in Claw-Free Graphs.
Graphs Comb., 2013

Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digit. Signal Process., 2013

Hamiltonian claw-free graphs involving minimum degrees.
Discret. Appl. Math., 2013

Locating using prior information: wireless indoor localization algorithm.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets.
Proceedings of the Advanced Parallel Processing Technologies, 2013

Research on Indirect Cost of Irregular Flight.
Proceedings of the 4th International Conference on Ambient Systems, 2013

ServiceTrust: Trust Management in Service Provision Networks.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
A novel multi-group exploiting modification direction method based on switch map.
Signal Process., 2012

Reversible secret image sharing with steganography and dynamic embedding.
Secur. Commun. Networks, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012

Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

Behavior-based reputation management in P2P file-sharing networks.
J. Comput. Syst. Sci., 2012

A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing.
J. Comput., 2012

Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012

Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

A proportional fairness backoff scheme for funnelling effect in wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurr. Comput. Pract. Exp., 2012

Evolution of Cooperation Based on Reputation on Dynamical Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Research and simulation of transport protocols optimization on wireless multi-hop networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

FoSSicker: A personalized search engine by location-awareness.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

EigenTrustp<sup>++</sup>: Attack resilient trust management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
A formal separation method of protocols to eliminate parallel attacks in virtual organization.
Secur. Commun. Networks, 2011

FineTrust: a fine-grained trust model for peer-to-peer networks.
Secur. Commun. Networks, 2011

A Simple Image Encoding Method with Data Lossless Information Hiding.
J. Networks, 2011

Sharing a Secret Image in Binary Images with Verification.
J. Inf. Hiding Multim. Signal Process., 2011

Hamiltonian connectedness in 4-connected hourglass-free claw-free graphs.
J. Graph Theory, 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

An Improved Iris Localization Method for Authentication System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Multi-attribute Hierarchical Threshold Scheme.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors.
Proceedings of IEEE International Conference on Communications, 2011

2010
A robust iterative refinement clustering algorithm with smoothing search space.
Knowl. Based Syst., 2010

An encoding method for both image compression and data lossless information hiding.
J. Syst. Softw., 2010

A Novel Information Concealing Method Based on Exploiting Modification Direction.
J. Inf. Hiding Multim. Signal Process., 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
J. Commun., 2010

A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
Int. J. Inf. Process. Manag., 2010

Supereulerian index is stable under contractions and closures.
Ars Comb., 2010

Spanning eulerian subgraphs in N<sup>2</sup>-locally connected claw-free graphs.
Ars Comb., 2010

Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

A Novel Grid Resource Scheduling Model Based on Extended Second Price Sealed Auction.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Priority-Based Task Scheduling Algorithm in Grid.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

A Low-Level Security Solving Method in Grid.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

An Efficient Trust Mechanism in P2P Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Gabor-Based Kernel Independent Component Analysis for Face Recognition.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009

Modeling Security Bridge Certificate Authority Architecture.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A New Secret Sharing Scheme Based on the Multi-Dealer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Circumferences and minimum degrees in 3-connected claw-free graphs.
Discret. Math., 2009

A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Proportional Fair Backoff Scheme for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Ant Colony Optimization for Grid Task Scheduling with Multiple QoS Dimensions.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2008
Radius and subpancyclicity in line graphs.
Discret. Math., 2008

Connected even factors in claw-free graphs.
Discret. Math., 2008

Backbone analysis and algorithm design for the quadratic assignment problem.
Sci. China Ser. F Inf. Sci., 2008

A Creditable Subspace Labeling Method Based on D-S Evidence Theory.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Intelligent Security Multi-agent Framework in Grid Computing.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
On the 2-factor index of a graph.
Discret. Math., 2007

Quadrangularly connected claw-free graphs.
Discret. Math., 2007

Linear Polynomial-Time Algorithms To Construct 4-Connected 4-Regular Locally Connected Claw-Free Graphs.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Using Gavish-Grave LP to Formulate the Directed Black and White Traveling Salesman Problem.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Backbone of the p-Median Problem.
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007

2006
Circumferences of regular claw-free graphs.
Discret. Math., 2006

A New Architecture of Grid Security System Construction.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Recovery Mechanism of Online Certification Chain in Grid Computing.
Proceedings of the The First International Conference on Availability, 2006

Recovery Mechanism of Cooperative Process Chain in Grid.
Proceedings of the The First International Conference on Availability, 2006

2005
Hourglasses and Hamilton cycles in 4-connected claw-free graphs.
J. Graph Theory, 2005

Circumferences and Minimum Degrees in 3-Connected Claw-Free Graphs.
Electron. Notes Discret. Math., 2005

On the Connectedness of Peer-to-Peer Overlay Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Hamiltonian Connected Claw-Free Graphs.
Graphs Comb., 2004

The hamiltonian index of a graph and its branch-bonds.
Discret. Math., 2004

A new object-order volume-rendering algorithm based on two-step lookup tables.
Proceedings of the Visualization and Data Analysis 2004, 2004

Fuzzy weighted average filtering for mixture noises.
Proceedings of the Third International Conference on Image and Graphics, 2004

Image Coherence Based Adaptive Sampling for Image Synthesis.
Proceedings of the Computational Science and Its Applications, 2004

Vision-based navigation in a dynamic environment for virtual human.
Proceedings of the Human Vision and Electronic Imaging IX, 2004

Simple zoom-lens digital camera calibration method based on EXIF.
Proceedings of the Conference on Three-Dimensional Image Capture and Applications VI, 2004

2003
Circumferences of 2-Connected Claw-Free Graphs.
Ars Comb., 2003

2002
Hamiltonian Cycles in N<sup>2</sup>-Locally Connected Claw-Free Graphs.
Ars Comb., 2002

2001
Hamiltonian Cycles in Almost Claw-Free Graphs.
Graphs Comb., 2001

2000
Longest Cycles in Almost Claw-Free Graphs.
Graphs Comb., 2000

On hamiltonian connectedness of <i>K</i><sub>1, 4</sub>-free graphs.
Discret. Math., 2000

Pancyclicity and NP-completeness in Planar Graphs.
Discret. Appl. Math., 2000

1998
Hamiltonian Connectedness in Claw-Free Graphs.
Graphs Comb., 1998

Vertex pancyclism in claw-free graphs.
Discret. Math., 1998

On Pancyclic Claw-Free Graphs.
Ars Comb., 1998

1996
Hamiltonian cycles in regular 3-connected claw-free graphs.
Discret. Math., 1996

1995
Longest cycles in regular 2-connected claw-free graphs.
Discret. Math., 1995

1994
Two edge-disjoint hamiltonian cycles in graphs.
Graphs Comb., 1994

1993
Hamiltonian cycles in 3-connected claw-free graphs.
J. Graph Theory, 1993


  Loading...