Shoubao Yang

According to our database1, Shoubao Yang authored at least 58 papers between 1984 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Research on ARP Spoof Detection Strategies in Unreliable LAN.
Proceedings of the Human Centered Computing - First International Conference, 2014

2012
A Fair Electronic Cash System with Identity-Based Group Signature Scheme.
J. Information Security, 2012

2011
LiChord: A Linear Code Based Structured P2P for Approximate Match.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
QoS-TEOS: QoS Guaranteed Throughput-Efficiency Optimal Distributed Scheduling in WiMAX Mesh Networks.
J. Comput. Sci. Technol., 2010

Multi-gateway multi-path routing protocol for 802.11s WMN.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

A Fair Rate-Balance link Scheduling in WiMAX Mesh network.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

VMCTune: A Load Balancing Scheme for Virtual Machine Cluster Using Dynamic Resource Allocation.
Proceedings of the GCC 2010, 2010

An Application-Based Adaptive Replica Consistency for Cloud Storage.
Proceedings of the GCC 2010, 2010

Evaluating I/O Scheduler in Virtual Machines for Mapreduce Application.
Proceedings of the GCC 2010, 2010

A Trust Evaluation Model Based on Resistive Network.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010

2009
Parallel-Transmission: A New Usage of Multi-Radio Diversity in Wireless Mesh Network.
IJCNS, 2009

A new parallel scheduling system for multiple radio wireless mesh network.
Frontiers Comput. Sci. China, 2009

A Resource Service Risk Based Scheduling Algorithm in Grid Market.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

An Optimal Algorithm for Scheduling Tasks within Deadline and Budget Constraints.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Cache Scheduling Scheme Based on Layered Coding VOD System.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

A Markov Chain Based Resource Prediction in Computational Grid.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Research on Multi-QoS On-line Scheduling Based on Fuzzy Theory in the Grid.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

2008
Directional Double Metric Routing in Wireless Mesh Network.
Proceedings of the 2008 IEEE International Performance, 2008

A Super Node Selecting Mechanism Based on AHP.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

R-DLS: An Improved DLS Algorithm.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

Grid Resource Discovery Strategy Based on Historical Information.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Profit Sharing Based Routing Trust Evaluation Algorithm in P2P Network.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
A Distributed Trust-based Reputation Model in P2P System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Artificial Immunology Based Anti-Pollution P2P File Sharing System.
Proceedings of the Grid and Cooperative Computing, 2007

Balancing Risk and Price: An Opportunity-Cost Approach for Job Scheduling in the Grid Market.
Proceedings of the Grid and Cooperative Computing, 2007

Reputation-aware Transaction Mechanisms in Grid Resource Market.
Proceedings of the Grid and Cooperative Computing, 2007

GARM: A Group - Anonymity Reputation Model in Peer-to-Peer System.
Proceedings of the Grid and Cooperative Computing, 2007

Trust-aware Adaptive P2P Overlay Topology Based on Superpeer-partition.
Proceedings of the Grid and Cooperative Computing, 2007

2006
A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment.
J. Comput. Res. Dev., 2006

Analysis of low-rate TCP DoS attack against FAST TCP.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Markov-Based Analytical Model for TCP Unfairness over Wireless Mesh Networks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Content-Based Clustered P2P Search Model Depending on Set Distance.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

FCAN: A Structured P2P System Based on Content Query.
Proceedings of the Grid and Cooperative Computing, 2006

A Bidirectional Query Chord System Based on Latency-Sensitivity.
Proceedings of the Grid and Cooperative Computing, 2006

Towards a Uniform Monitoring Framework Supporting Interoperability in Grid.
Proceedings of the Grid and Cooperative Computing, 2006

2005
GReplica: A Web-based Data Grid Replica Management System.
Proceedings of the 2005 International Conference on Semantics, 2005

Research on Grid Resource Reliability Model Based on Promise.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Autonomous Pricing Strategy toward Market Economy in Computational Grids.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Transaction Mechanism Design in Decentralized Computational Market.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Design and Implementation of Dynamic-Role Based Access Control Framework in Grid Environment.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Towards Reputation-Aware Resource Discovery in Peer-to-Peer Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Trust Model Based on Similarity Measure of Vectors in P2P Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Dynamic-Role Based Access Control Framework Across Multi-domains in Grid Environment.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2003
A Distributed Media Service System Based on Globus Data-Management Technologies.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Grid Computing Framework for Large Scale Molecular Dynamics Simulations.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Decentralized Computational Market Model for Grid Resource Management.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Research on Integrating Service in Grid Portal.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Research on Security Architecture and Protocols of Grid Computing System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Grid Monitoring and Data Visualization.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Improving Topology-Aware Routing Efficiency in Chord.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

1993
ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
IEEE Journal on Selected Areas in Communications, 1993

1992
A software authentication system for information integrity.
Comput. Secur., 1992

Public-Key Cryptosystem Based on the Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology, 1992

Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
Proceedings of the Advances in Cryptology, 1992

A Software Authentication System for the Prevention of Computer Viruses.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1984
The Coverage Problem for Random Testing.
Proceedings of the Proceedings International Test Conference 1984, 1984


  Loading...