Yan Jia

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Yan Jia authored at least 185 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
IEEE Trans. Software Eng., March, 2024

2023
TSEE: a novel knowledge embedding framework for cyberspace security.
World Wide Web (WWW), November, 2023

Persistent graph stream summarization for real-time graph analytics.
World Wide Web (WWW), September, 2023

Extrapolation over temporal knowledge graph via hyperbolic embedding.
CAAI Trans. Intell. Technol., June, 2023

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model.
Knowl. Based Syst., 2023

A Multi-Modal Approach For Context-Aware Network Traffic Classification.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection.
CoRR, 2022

Mercury: A High-Performance Streaming Graph Method for Broad and Deep Flow Inspection.
Proceedings of the IEEE Smartworld, 2022

Multi-Semantics Learning for Social Event Detection via Heterogeneous GNNs.
Proceedings of the International Joint Conference on Neural Networks, 2022

Counterfactual Causal Adversarial Networks for Domain Adaptation.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Decoupling Consensus and Storage in Consortium Blockchains by Erasure Codes.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Temporal Knowledge Graph Reasoning based on Graph Convolution Network.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Detection and Defense Methods of Cyber Attacks.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Few-Shot Knowledge Reasoning: An Attention Mechanism Based Method.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Social Unrest Events Prediction by Contextual Gated Graph Convolutional Networks.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Distributed Framework for APT Attack Analysis.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Information Cascading in Social Networks.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

The Framework of the MDATA Computing Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Introduction to the MDATA Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021

Rumor Detection Based on SAGNN: Simplified Aggregation Graph Neural Networks.
Mach. Learn. Knowl. Extr., 2021

Target relational attention-oriented knowledge graph reasoning.
Neurocomputing, 2021

CGNN: Traffic Classification with Graph Neural Network.
CoRR, 2021

Performance Evaluation of Pre-trained Models in Sarcasm Detection Task.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

MSSF-GCN: Multi-scale Structural and Semantic Information Fusion Graph Convolutional Network for Controversy Detection.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Survey on Temporal Knowledge Graph.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Survey on Knowledge Graph Embedding Based on Hyperbolic Geometry.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Survey on social event detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Multi-source knowledge fusion: a survey.
World Wide Web, 2020

Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020

A Measurement Model of Mutual Influence for Information Dissemination.
Entropy, 2020

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Review of APT Attack Detection Methods and Defense Strategies.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Low-Dimensional Representation Learning Method for Text Classification and Clustering.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Contextual Gated Graph Convolutional Networks for Social Unrest Events Prediction.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Deep Learning for Social Network Information Cascade Analysis: a survey.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
A method for achieving provable data integrity in cloud computing.
J. Supercomput., 2019

Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019

Distribution-Sensitive Unbalanced Data Oversampling Method for Medical Diagnosis.
J. Medical Syst., 2019

Deep Entity Linking via Eliminating Semantic Ambiguity With BERT.
IEEE Access, 2019

Person Entity Attribute Extraction Based on Siamese Network.
IEEE Access, 2019

Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019

Few-shot Knowledge Reasoning Method based on Attention Mechanism.
Proceedings of the ICCPR '19: 8th International Conference on Computing and Pattern Recognition, 2019

Calculation of Network Security Index Based on Convolution Neural Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Identify Influentials Based on User Behavior Across Different Topics.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research of Trojan Attack Effect Evaluation Based on FAHP.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-source Knowledge Fusion: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Intrusion Detection Results Analysis Based on Variational Auto-Encoder.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Fusion: Introduction of Concepts and Techniques.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FSM-Based Cyber Security Status Analysis Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Construction of Cyber Range Network Security Indication System Based on Deep Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
User interest mining via tags and bidirectional interactions on Sina Weibo.
World Wide Web, 2018

Influence efficiency maximization: How can we spread information efficiently?
J. Comput. Sci., 2018

Repost prediction incorporating time-sensitive mutual influence in social networks.
J. Comput. Sci., 2018

Individual Analysis Model and Related Research in Social Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Joint Decoding Algorithm for Named Entity Recognition.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Practical Approach to Answer Extraction for Constructing QA Solution.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Virtual Community Detection Model and Related Research in Online Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks.
Sensors, 2017

Real-time personalized twitter search based on semantic expansion and quality model.
Neurocomputing, 2017

Leveraging local h-index to identify and rank influential spreaders in networks.
CoRR, 2017

CHRS: Cold Start Recommendation Across Multiple Heterogeneous Information Networks.
IEEE Access, 2017

A Refined Method for Detecting Interpretable and Real-Time Bursty Topic in Microblog Stream.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Neural Network Based Web Log Analysis for Web Intrusion Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

The Fine-Grained Topic Evolution Based on the Probability Model.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Semi-Supervised Collective Matrix Factorization for Topic Detection and Document Clustering.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Identifying users across social networks based on dynamic core interests.
Neurocomputing, 2016

Open Relation Extraction from Chinese Microblog Text.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Complementary Synthesis for Encoder with Flow Control Mechanism.
ACM Trans. Design Autom. Electr. Syst., 2015

Top (<i>k</i><sub>1</sub>, <i>k</i><sub>2</sub>) Query in Uncertain Datasets.
IEICE Trans. Inf. Syst., 2015

Detecting Internet Hidden Paid Posters Based on Group and Individual Characteristics.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Spammer Detection on Online Social Networks Based on Logistic Regression.
Proceedings of the Web-Age Information Management, 2015

Mining Personal Interests of Microbloggers Based on Free Tags in SINA Weibo.
Proceedings of the Web-Age Information Management, 2015

NUDTSNA at TREC 2015 Microblog Track: A Live Retrieval System Framework for Social Network based on Semantic Expansion and Quality Model.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

NudtMDP at TREC 2015 LiveQA Track.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Top (k1, k2) Distance-based outliers detection in an uncertain dataset.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Hierarchical classification with a topic taxonomy via LDA.
Int. J. Mach. Learn. Cybern., 2014

NaEPASC: a novel and efficient public auditing scheme for cloud data.
J. Zhejiang Univ. Sci. C, 2014

Predicting the topic influence trends in social media with multiple models.
Neurocomputing, 2014

Structure-aware CNF obfuscation for privacy-preserving SAT solving.
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014

Do neighbor buddies make a difference in reblog likelihood? An analysis on SINA Weibo data.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Measuring the spreadability of users in microblogs.
J. Zhejiang Univ. Sci. C, 2013

Improving Text Categorization with Semantic Knowledge in Wikipedia.
IEICE Trans. Inf. Syst., 2013

Detecting real-time burst topics in microblog streams: how sentiment can help.
Proceedings of the 22nd International World Wide Web Conference, 2013

A BP neural network text categorization method optimized by an improved genetic algorithm.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Social circle analysis on ego-network based on context frequent pattern mining.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

Mining users' activity on large Twitter text data.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

Predicting the social influence of upcoming contents in large social networks.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

An Efficient Approach on Answering Top-k Queries with Grid Dominant Graph Index.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

An Influence Strength Measurement via Time-Aware Probabilistic Generative Model for Microblogs.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

Research on Large Scale Hierarchical Classification Based on Candidate Search.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Contextual correlation based thread detection in short text message streams.
J. Intell. Inf. Syst., 2012

Community detection in incomplete information networks.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Community Detection Based on Robust Label Propagation Algorithm.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Multi-phase k-anonymity Algorithm Based on Clustering Techniques.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Chinese New Words Detection Using Mutual Information.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research and Implement of Security Situation Awareness System YH-SSAS.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Microblogging Sentiment Analysis Using Emotional Vector.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Local Community Detection Using Seeds Expansion.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Adaptive Topic Community Tracking in Social Network.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

Mining Tribe-Leaders Based on the Frequent Pattern of Propagation.
Proceedings of the Web Technologies and Applications, 2012

A New K-anonymity Algorithm towards Multiple Sensitive Attributes.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A Word Position-Related LDA Model.
Int. J. Pattern Recognit. Artif. Intell., 2011

A Hierarchical Algorithm for Document-Images Fast Matching.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Link-based hidden attribute discovery for objects on Web.
Proceedings of the EDBT 2011, 2011

Grid-Based Probabilistic Skyline Retrieval on Distributed Uncertain Data.
Proceedings of the Database Systems for Adanced Applications, 2011

Exploring Event Evolution Patterns at the Atomic Level.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2010
Join Directly on Heavy-Weight Compressed Data in Column-Oriented Database.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Study on Cost-Sensitive Communication Models on Large-scale Monitor Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Research on Broken Mappings Detecting Method Based on Fuzzy Aggregation Operators in Deep Web Integration Environment.
Proceedings of the International Conference on E-Business and E-Government, 2010

Protein Sequence Alignment Algorithm Based on Hybrid Profile Information.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

2009
Understanding Importance of Collaborations in Co-authorship Networks: A Supportiveness Analysis Approach.
Proceedings of the SIAM International Conference on Data Mining, 2009

Research of Massive Internet Text Data Real-Time Loading and Index System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Effective Feature Selection on Data with Uncertain Labels.
Proceedings of the 25th International Conference on Data Engineering, 2009

Continuous privacy preserving publishing of data streams.
Proceedings of the EDBT 2009, 2009

Research on Cost-Sensitive Communication Models over Distributed Data Streams Processing.
Proceedings of the First International Conference on Advances in Databases, 2009

A Grid Index Based Method for Continuous Constrained Skyline Query over Data Stream.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2009

2008
Conversation Extraction in Dynamic Text Message Stream.
J. Comput., 2008

Counting Data Stream Based on Improved Counting Bloom Filter.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Network Dynamic Risk Assessment Based on the Threat Stream Analysis.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Toward Public Opinions Detection: Measuring the Similarity between Instant Messages.
Proceedings of the 4th International VLDB Workshop on Ontology-based Techniques for DataBases in Information Systems and Knowledge Systems, 2008

Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Quantized Indexing Tree for Frequent Updates over Data Streams.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Fast similarity matching on data stream with noise.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Efficiently Filtering Duplicates over Distributed Data Streams.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Forward Semi-supervised Feature Selection Based on Relevant Set Correlation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Leakage-Aware Energy Efficient Scheduling for Fixed-Priority Tasks with Preemption Thresholds.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

2007
Deployment of Context-Aware Component-Based Applications Based on Middleware.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Resource Sharing in Continuous Extreme Values Monitoring on Sliding Windows.
Proceedings of the Third International Conference on Semantics, 2007

Detecting Broken Mappings for Deep Web Integration.
Proceedings of the Third International Conference on Semantics, 2007

Energy-Efficient Scheduling Fixed-Priority Tasks with Preemption Thresholds on Variable Voltage Processors.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Continuous monitoring of skyline query over highly dynamic moving objects.
Proceedings of the Sixth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2007

Continuous Kernel-Based Outlier Detection over Distributed Data Streams.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Instant Message Clustering Based on Extended Vector Space Model.
Proceedings of the Advances in Computation and Intelligence, 2007

An Adaptive <i>k</i> -Nearest Neighbors Clustering Algorithm for Complex Distribution Dataset.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

Stream Event Detection: A Unified Framework for Mining Outlier, Change and Burst Simultaneously over Data Stream.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

A Model for Service Composition with Multiple QoS Constraints.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007

Online Burst Detection Over High Speed Short Text Streams.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Adaptive Mining the Approximate Skyline over Data Stream.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

DRN: A CORBA-Based Distributed Resource Navigation System for Data Grid.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Continuous Adaptive Outlier Detection on Distributed Data Streams.
Proceedings of the High Performance Computing and Communications, 2007

A Grid Resource Discovery Method Based on Adaptive <i>k</i> -Nearest Neighbors Clustering.
Proceedings of the Combinatorial Optimization and Applications, 2007

A Scalable Method for Efficient Grid Resource Discovery.
Proceedings of the Cooperative Design, 2007

Middleware Based Context Management for the Component-Based Pervasive Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Continuous Skyline Tracking on Update Data Streams.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Context-Aware Middleware Support for Component Based Applications in Pervasive Computing.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

2006
Research on Aggregate Query Matching in Semantic Cache.
J. Comput. Res. Dev., 2006

Research and Implement of Real-Time Data Loading System IMIL.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Short Documents Clustering in Very Large Text Databases.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Supporting Efficient Distributed Top-k Monitoring.
Proceedings of the Advances in Web-Age Information Management, 2006

Research of Agent Based Multiple-Granularity Load Balancing Middleware for Service-Oriented Computing.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Cactus: A New Constant-Degree and Fault Tolerate P2P Overlay.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Towards A Context-Aware Middleware for Deploying Component-Based Applications in Pervasive Computing.
Proceedings of the Grid and Cooperative Computing, 2006

Efficient Non-Blocking Top-k Query Processing in Distributed Networks.
Proceedings of the Database Systems for Advanced Applications, 2006

Closed Queueing Network Model for Multi-tier Data Stream Processing Center.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Parallel Mining of Top-K Frequent Itemsets in Very Large Text Database.
Proceedings of the Advances in Web-Age Information Management, 2005

QoS Aware Service Composition with Multiple Quality Constraints.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

An Optimal Component Distribution Algorithm Based on MINLP.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A SLA-Based Resource Donation Mechanism for Service Hosting Utility Center.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Stratus: A Distributed Web Service Discovery Infrastructure Based on Double-Overlay Network.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

A Method of Aggregate Query Matching in Semantic Cache for Massive Database Applications.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

Implementing Component Persistence in CCM Based on StarPSS.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

2004
An Efficient Hierarchical Failure Recovery Algorithm Ensuring Semantic Atomicity for Workflow Applications.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

A Practice in Facilitating Service-Oriented Inter-Enterprise Application Integration.
Proceedings of the Technologies for E-Services, 5th International Workshop, 2004

Collaborative Process Execution for Service Composition with StarWebService.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

An Authorization Framework Based on Constrained Delegation.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A rule-based framework for role-based constrained delegation.
Proceedings of the 3rd International Conference on Information Security, 2004

Transactional Business Coordination and Failure Recovery for Web Services Composition.
Proceedings of the Grid and Cooperative Computing, 2004

Research and Implementation of CORBA Web Services.
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004

2003
A P2P Approach for Global Computing.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

A Simple Constructing Approach to Build P2P Global Computing Overlay Network.
Proceedings of the Artificial Neural Networks and Neural Information Processing, 2003

StarOTS: An Effcient Distributed Transaction Recovery Mechanism in the CORBA Component Runtime Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Dynamic Reconfiguration Platform Based on Distributed Component Technology CCM.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

2002
KF-Diff+: Highly Efficient Change Detection Algorithm for XML Documents.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002


  Loading...