Showing 1 - 16 results of 16 for search 'YUN Xiao-chun', query time: 0.02s
Refine Results
-
1
Research on multi-objective grid task scheduling algorithms based on survivability and Makespan by WANG Shu-peng, YUN Xiao-chun, YU Xiang-zhan
Published 2006-01-01Get full text
Article -
2
Research on multi-objective grid task scheduling algorithms based on survivability and Makespan by WANG Shu-peng, YUN Xiao-chun, YU Xiang-zhan
Published 2006-01-01Get full text
Article -
3
Approach to remote routing computation and lookup in parallel network simulation by HAO Zhi-yu, YUN Xiao-chun, ZHANG Hong-li
Published 2007-01-01Get full text
Article -
4
Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong
Published 2006-01-01Get full text
Article -
5
Network-based malcode detection technology by WU Bing1, YUN Xiao-chun2, GAO Qi1
Published 2007-01-01Get full text
Article -
6
Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong
Published 2006-01-01Get full text
Article -
7
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01Get full text
Article -
8
Network latency clustering for detector placement on macroscopical prewarning by HE Hui, HU Ming-zeng, YUN Xiao-chun, ZHANG Hong-li
Published 2006-01-01Get full text
Article -
9
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01Get full text
Article -
10
Research on dynamic routing mechanism in network simulation by HAO Zhi-yu, ZHAI Jian-hong, YUN Xiao-chun, ZHANG Hong-li
Published 2007-01-01Get full text
Article -
11
Method of detecting network anomaly on multi-time-scale by WANG Feng-yu1, YUN Xiao-chun1, CAO Zhen-zhong4
Published 2007-01-01Get full text
Article -
12
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01Get full text
Article -
13
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01Get full text
Article -
14
Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1
Published 2011-01-01Get full text
Article -
15
Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2
Published 2011-01-01Get full text
Article -
16
Worm detection and signature extraction based on communication characteristics by XIN Yi1, FANG Bin-xing1, HE Long-tao2, YUN Xiao-chun2, LI Zhi-dong1
Published 2007-01-01Get full text
Article