Author of the publication

Research on XML-Based Active Interest Management in Distributed Virtual Environment.

, , , , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 315-324. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Flow Graph Approach to Identifying Covert Channels., and . JNW, 6 (12): 1740-1746 (2011)Self-certifying Object-based Network Storage., , , and . GCC Workshops, page 419-423. IEEE Computer Society, (2006)An Improved Mixture Gaussian Models to Detect Moving Object Under Real-Time Complex Background., , and . CW, page 730-734. IEEE Computer Society, (2008)SAT-based Bounded Model Checking for SE-LTL., and . SNPD (3), page 582-587. IEEE Computer Society, (2007)A Card-based Visual Query System for Geographical Information Systems., , and . ScanGIS, page 131-142. Department of Surveying, Helsinki University of Technology, (2003)A Survey of Chinese Text Similarity Computation., , and . AIRS, volume 4993 of Lecture Notes in Computer Science, page 592-597. Springer, (2008)Improvement of Page Ranking Algorithm Based on Timestamp and Link., , and . ISIP, page 36-40. IEEE Computer Society, (2008)Privacy-Preserving Hierarchical-k-Means Clustering on Horizontally Partitioned Data., , , , and . Int. J. Distributed Sens. Networks, 5 (1): 81 (2009)Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR)., , and . J. Inf. Secur. Appl., (2016)Random r-Continuous Matching Rule for Immune-Based Secure Storage System., , , and . CISIS, volume 53 of Advances in Soft Computing, page 294-300. Springer, (2008)