Search


Current filters:


Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 39 (Search time: 0.002 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)
2005Discover multicast network internal characteristics based on Hamming distanceTian, H.; Shen, H.; IEEE International Conference on Communications (2005 : Seoul, Korea)
2005Flexible Mining of Association RulesShen, H.
2005Constructing multi-layered boundary to defend against intrusive anomalies: an autonomic detection coordinatorZhang, Z.; Shen, H.; International Conference on Dependable Systems and Networks (2005 : Yokohama-shi, Japan)
2005Distribution of mobile agents in vulnerable networksQu, W.; Shen, H.; Jin, Y.; GCC 2005 (2005 : Beijing, China)
2005Cache replacement for transcoding proxy cachingLi, K.; Tajima, K.; Shen, H.; IEEE/WIC/ACM International Conference on Intelligent Agent Technology (2005 : Compiègne, France)
2005GRIP1 mediates the interaction between the amino- and carboxyl-termini of the androgen receptor.Shen, H.; Buchanan, G.; Butler, L.; Prescott, J.; Henderson, M.; Tilley, W.; Coetzee, G.
2005A brief comparative study on analytical models of computer system dependability and securityZhang, Z.; Shen, H.; Defago, X.; Sang, Y.; International Conference on Parallel and Distributed Computing, Applications and Technologies (6th : 2005 : Dalian, China)
2005An efficient protocol for the problem of secure two-party vector dominanceSang, Y.; Shen, H.; Zhang, Z.; International Conference on Parallel and Distributed Computing, Applications and Technologies (6th : 2005 : Dalian, China)
2005Stochastic analysis of mobile agent-based e-shoppingQu, W.; Shen, H.; Sum, J.
2005Trellis properties of product codesKan, H.; Shen, H.