Author of the publication

A novel model on dynamic resource allocation in optical networks.

, , , , , , and . Science in China Series F: Information Sciences, 48 (1): 15-27 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Certificateless Signature from Pairings., , and . I. J. Network Security, 8 (1): 96-100 (2009)A novel model on dynamic resource allocation in optical networks., , , , , , and . Science in China Series F: Information Sciences, 48 (1): 15-27 (2005)Study and application of temporal index technology., , , , , and . Science in China Series F: Information Sciences, 52 (6): 899-913 (2009)An Automated Signature-Based Approach against Polymorphic Internet Worms., and . IEEE Trans. Parallel Distrib. Syst., 18 (7): 879-892 (2007)Extending soft sets with description logics., , , , and . Computers & Mathematics with Applications, 59 (6): 2087-2096 (2010)An interval type-2 fuzzy model of computing with words., and . Inf. Sci., (2014)Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms., , and . Computers & Security, 28 (8): 827-842 (2009)Defending against Internet worms: a signature-based approach., and . INFOCOM, page 1384-1394. IEEE, (2005)HonIDS: Enhancing Honeypot System with Intrusion Detection Models., , , and . IWIA, page 135-143. IEEE Computer Society, (2006)Interference Aware Adaptive Clear Channel Assessment for improving ZigBee packet transmission under Wi-Fi interference., , , and . SECON, page 336-343. IEEE, (2013)