Xu Wu

According to our database1, Xu Wu authored at least 66 papers between 1989 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Context-Aware Cloud Service Selection Model for Mobile Cloud Computing Environments.
Wireless Communications and Mobile Computing, 2018

Sensitivity Enhancement in Surface Plasmon Resonance Biochemical Sensor Based on Transition Metal Dichalcogenides/Graphene Heterostructure.
Sensors, 2018

Radiation-Resistant Er3+-Doped Superfluorescent Fiber Sources.
Sensors, 2018

Analysis of Resonance Asymmetry Phenomenon in Resonant Fiber Optic Gyro.
Sensors, 2018

Temperature Stability of a Hybrid Polarization-Maintaining Photonic Crystal Fiber Resonator and Its Application in a Resonant Fiber Optic Gyro.
Sensors, 2018

Kriging-based inverse uncertainty quantification of nuclear fuel performance code BISON fission gas release model using time series measurement data.
Rel. Eng. & Sys. Safety, 2018

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments.
TIIS, 2018

Study on Trust Model for Multi-users in Cloud Computing.
I. J. Network Security, 2018

State Estimation for General Complex Dynamical Networks with Incompletely Measured Information.
Entropy, 2018

mmWave communications for 5G: implementation challenges and advances.
SCIENCE CHINA Information Sciences, 2018

How Shared Screen Affected Team Collaboration Task, A Case Study of Ergonomics Experiment on Team Situation Awareness.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2018

Dynamic Prediction Model of Situation Awareness in Flight Simulation.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2018

Efficient Identity-Based Offline/Online Encryption Scheme for Lightweight Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspacem, 2018

RansomTracer: Exploiting Cyber Deception for Ransomware Tracing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspacem, 2018

2017
Inhomogeneous Oxygen Vacancy Distribution in Semiconductor Gas Sensors: Formation, Migration and Determination on Gas Sensing Characteristics.
Sensors, 2017

Dynamic Measurement of Pilot Situation Awareness.
Proceedings of the Engineering Psychology and Cognitive Ergonomics: Cognition and Design, 2017

An Experimental Research Facing to the Humanity Design of HUD Failure Alerts.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

Structural controllability of complex dynamical networks with nodes being multidimensional dynamics.
Proceedings of the 2017 American Control Conference, 2017

2016
Stochastic stability and performance analysis of Cubature Kalman Filter.
Neurocomputing, 2016

Pilot Situational Awareness Modeling for Cockpit Interface Evaluation.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2016

A Topic Label Extraction Method for the University BBS.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Diffusion of Information in Mobile Social Networks: A Brief Survey.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

2014
A Super Peer-based Reputation Scheme for Mobile Computing Environments.
JCM, 2014

A Method to Build and Expand the Domain Dictionary Automatically Based on WordNet.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

The Design and Implementation of APK eBooks Online Generation System Based on FBReader.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Domain-Specific Semantic Retrieval of Institutional Repository Based on Query Extension.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Research of eID Mobile Identity Authentication Method.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

DAYcast: A dynamic transmission delay based broadcast protocol for vehicular ad hoc networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Research on Light-weight Trust Management Approach in Mobile Computing Environments.
JCM, 2013

An Improved Common Vulnerability Scoring System Based on K-means.
Proceedings of the Trustworthy Computing and Services, 2013

MEDAL: A moving direction and destination location based routing algorithm for vehicular ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

A destination information based probabilistic routing protocol for vehicular sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

Pilot Attention Allocation Modeling under Multiple Factors Condition.
Proceedings of the Engineering Psychology and Cognitive Ergonomics. Applications and Services, 2013

Discussion about traditional Chinese medicine causes, pathogenesis and distribution of syndromes of primary dysmenorrhea among female college students based on questionnaire investigation.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Steady-state control for signalized intersections modeled as switched server system.
Proceedings of the American Control Conference, 2013

2012
A distributed trust management model for mobile P2P networks.
Peer-to-Peer Networking and Applications, 2012

A Distributed Trust Evaluation Model for Mobile P2P Systems.
JNW, 2012

An Improved Mixed Gas Pipeline Multivariable Decoupling Control Method Based on ADRC Technology.
JCP, 2012

A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Improved Design of the Trustworthiness Authentication Mechanism of IaaS.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Pervasive Technology Approach to Social Trustworthiness.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Implementation of Trusted Remote Attestation Oriented the IaaSCloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research and implementation of a role-based trustworthiness mechanism for IaaS.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Ergonomics study of information coding of cockpit display under certain ambient illumination.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Active Disturbance Rejection Decoupling Control Method for Gas Mixing Butterfly Valve Group.
Proceedings of the Information Computing and Applications, 2011

Decoupling Method Based on Bi-directional Regulation Principle of Growth Hormone for Mixed Gas Pipeline Multi-systems.
Proceedings of the Information Computing and Applications, 2011

2010
A Study of Urgency Vehicle Routing Disruption Management Problem.
JNW, 2010

A Novel Trust Evaluation Model for Mobile P2P Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

An approach for tracking privacy disclosure.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A Quantifying Metric for Privacy Protection Based on Information Theory.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Research on tourist map visualization based on color images.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

2009
A distributed decision-making mechanism for wireless P2P networks.
Journal of Communications and Networks, 2009

A Distributed Decision-Making Mechanism for Wireless P2P Networks.
Proceedings of the ICPPW 2009, 2009

Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Power Peer-Based Reputation Scheme for Mobile P2P Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

A Group-Based Reputation Mechanism for Mobile P2P Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A Method for Privacy Protection in Location Based Services.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
An Enhanced Trust Model Based on Reputation for P2P Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

A New Decision-Making Approach for C2C Electronic Trade.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2004
Analysis, Design and Realization of Metadata Managing System for Multimedia Resources.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

1996
Knowledge-based assisted database retrieval systems.
World Scientific, ISBN: 978-981-02-1850-8, 1996

1995
A Knowledge-based System for Generating Informative Responsens to Indirect Database Queries.
J. Intell. Inf. Syst., 1995

A construction of neural-net based AI systems.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

1993
A Knowledge-Based System for Correcting Users' Misconceptions in Database Retrieval.
International Journal of Software Engineering and Knowledge Engineering, 1993

1992
KDA: A Knowledge-Base Database Assistant with a Query Guiding Facility.
IEEE Trans. Knowl. Data Eng., 1992

1989
KDA: A Knowledge-based Database Assistant.
Proceedings of the Fifth International Conference on Data Engineering, 1989


  Loading...