Author of the publication

Research on Intrusion Detection Model of Heterogeneous Attributes Clustering.

, , , , and . JSW, 7 (12): 2823-2831 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea., , , , and . FSKD (3), page 119-123. IEEE Computer Society, (2007)0-7695-2874-0.Research on Intrusion Detection Model of Heterogeneous Attributes Clustering., , , , and . JSW, 7 (12): 2823-2831 (2012)A Brief Analysis about Boundary Region Partition Reduction Standard., , and . IITA, page 34-37. IEEE Computer Society, (2007)An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 776-786. Springer, (2005)Research on Speech Emotion Recognition System in E-Learning., , , , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 555-558. Springer, (2007)The Mathematical Model and Applications of Coded Structured Light System for Object Detecting., , and . JCP, 4 (1): 53-60 (2009)Application Layer Multicast Technology of Streaming Media., , , , and . JNW, 6 (8): 1122-1128 (2011)Underlying Technology of P2P Media Streaming., , , , , and . JNW, 6 (8): 1195-1205 (2011)Guest Editorial., , , , and . JCP, 5 (4): 489-491 (2010)Editorial., , , , and . JCP, 4 (1): 1-2 (2009)