BibTeX records: Zhengbing Hu

download as .bib file

@article{DBLP:journals/corr/HuBTS17,
  author    = {Zhengbing Hu and
               Yevgeniy V. Bodyanskiy and
               Oleksii K. Tyshchenko and
               Viktoriia O. Samitova},
  title     = {Fuzzy Clustering Data Given in the Ordinal Scale},
  journal   = {CoRR},
  volume    = {abs/1701.03571},
  year      = {2017},
  url       = {http://arxiv.org/abs/1701.03571},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/HuBTS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/HuBTS17a,
  author    = {Zhengbing Hu and
               Yevgeniy V. Bodyanskiy and
               Oleksii K. Tyshchenko and
               Viktoriia O. Samitova},
  title     = {Fuzzy Clustering Data Given on the Ordinal Scale Based on Membership
               and Likelihood Functions Sharing},
  journal   = {CoRR},
  volume    = {abs/1702.01200},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.01200},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/HuBTS17a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/is/HuJJKMKS16,
  author    = {Zhengbing Hu and
               Vladimir Jotsov and
               Su Jun and
               Orest Kochan and
               Mykola Mykyichuk and
               Roman V. Kochan and
               Taras Sasiuk},
  title     = {Data science applications to improve accuracy of thermocouples},
  booktitle = {8th {IEEE} International Conference on Intelligent Systems, {IS} 2016,
               Sofia, Bulgaria, September 4-6, 2016},
  pages     = {180--188},
  year      = {2016},
  crossref  = {DBLP:conf/is/2016},
  url       = {https://doi.org/10.1109/IS.2016.7737419},
  doi       = {10.1109/IS.2016.7737419},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/is/HuJJKMKS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/HuBTB16,
  author    = {Zhengbing Hu and
               Yevgeniy V. Bodyanskiy and
               Oleksii K. Tyshchenko and
               Olena O. Boiko},
  title     = {An Evolving Cascade System Based on {A} Set Of Neo Fuzzy Nodes},
  journal   = {CoRR},
  volume    = {abs/1610.06484},
  year      = {2016},
  url       = {http://arxiv.org/abs/1610.06484},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/HuBTB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/HuBTB16a,
  author    = {Zhengbing Hu and
               Yevgeniy V. Bodyanskiy and
               Oleksii K. Tyshchenko and
               Olena O. Boiko},
  title     = {Adaptive Forecasting of Non-Stationary Nonlinear Time Series Based
               on the Evolving Weighted Neuro-Neo-Fuzzy-ANARX-Model},
  journal   = {CoRR},
  volume    = {abs/1610.06486},
  year      = {2016},
  url       = {http://arxiv.org/abs/1610.06486},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/HuBTB16a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/HuBTB16b,
  author    = {Zhengbing Hu and
               Yevgeniy V. Bodyanskiy and
               Oleksii K. Tyshchenko and
               Olena O. Boiko},
  title     = {An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data
               Stream Fuzzy Clustering},
  journal   = {CoRR},
  volume    = {abs/1610.06490},
  year      = {2016},
  url       = {http://arxiv.org/abs/1610.06490},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/HuBTB16b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cin/YeWHL15,
  author    = {Zhiwei Ye and
               Mingwei Wang and
               Zhengbing Hu and
               Wei Liu},
  title     = {An Adaptive Image Enhancement Technique by Combining Cuckoo Search
               and Particle Swarm Optimization Algorithm},
  journal   = {Comp. Int. and Neurosc.},
  volume    = {2015},
  pages     = {825398:1--825398:12},
  year      = {2015},
  url       = {https://doi.org/10.1155/2015/825398},
  doi       = {10.1155/2015/825398},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cin/YeWHL15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/YatskivTH15,
  author    = {Vasyl Yatskiv and
               Taras Tsavolyk and
               Zhengbing Hu},
  title     = {Multiple error detection and correction based on modular arithmetic
               correcting codes},
  booktitle = {{IEEE} 8th International Conference on Intelligent Data Acquisition
               and Advanced Computing Systems: Technology and Applications, {IDAACS}
               2015, Warsaw, Poland, September 24-26, 2015},
  pages     = {850--854},
  year      = {2015},
  crossref  = {DBLP:conf/idaacs/2015},
  url       = {https://doi.org/10.1109/IDAACS.2015.7341423},
  doi       = {10.1109/IDAACS.2015.7341423},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/idaacs/YatskivTH15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/YatskivYJSH13,
  author    = {Vasyl Yatskiv and
               Nataliya Yatskiv and
               Su Jun and
               Anatoly Sachenko and
               Zhengbing Hu},
  title     = {The use of modified correction code based on residue number system
               in {WSN}},
  booktitle = {{IEEE} 7th International Conference on Intelligent Data Acquisition
               and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September
               12-14, 2013},
  pages     = {513--516},
  year      = {2013},
  crossref  = {DBLP:conf/idaacs/2013},
  url       = {https://doi.org/10.1109/IDAACS.2013.6662738},
  doi       = {10.1109/IDAACS.2013.6662738},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/idaacs/YatskivYJSH13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcp/HuHSLS12,
  author    = {Wenbin Hu and
               Zhengbing Hu and
               Lei Shi and
               Peng Luo and
               Wei Song},
  title     = {Combinatorial Optimization and Strategy for Ship Stowage and Loading
               Schedule of Container Terminal},
  journal   = {{JCP}},
  volume    = {7},
  number    = {8},
  pages     = {2078--2092},
  year      = {2012},
  url       = {https://doi.org/10.4304/jcp.7.8.2078-2092},
  doi       = {10.4304/jcp.7.8.2078-2092},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcp/HuHSLS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/LuH12,
  author    = {Chuiwei Lu and
               Zhengbing Hu},
  title     = {A Fuzzy Search Algorithm for Structured {P2P} Network Based on Multi-dimensional
               Semantic Matrix},
  journal   = {{JNW}},
  volume    = {7},
  number    = {2},
  pages     = {377--384},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.377-384},
  doi       = {10.4304/jnw.7.2.377-384},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/LuH12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jsw/YeHLC12,
  author    = {Zhiwei Ye and
               Zhengbing Hu and
               Xudong Lai and
               Hongwei Chen},
  title     = {Image Segmentation Using Thresholding and Swarm Intelligence},
  journal   = {{JSW}},
  volume    = {7},
  number    = {5},
  pages     = {1074--1082},
  year      = {2012},
  url       = {https://doi.org/10.4304/jsw.7.5.1074-1082},
  doi       = {10.4304/jsw.7.5.1074-1082},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jsw/YeHLC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcp/HuHCZS11,
  author    = {Wenbin Hu and
               Zhengbing Hu and
               Yuheng Cheng and
               Hai Zhang and
               Wei Song},
  title     = {Modeling and Simulation on Dynamic Allocation and Scheduling of Multi-resource
               problem},
  journal   = {{JCP}},
  volume    = {6},
  number    = {7},
  pages     = {1369--1377},
  year      = {2011},
  url       = {https://doi.org/10.4304/jcp.6.7.1369-1377},
  doi       = {10.4304/jcp.6.7.1369-1377},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcp/HuHCZS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/HuLZ11,
  author    = {Zhengbing Hu and
               Huaiqing Lin and
               Yonghong Zhou},
  title     = {A Fuzzy Reputation Management System with Punishment Mechanism for
               {P2P} Network},
  journal   = {{JNW}},
  volume    = {6},
  number    = {2},
  pages     = {190--197},
  year      = {2011},
  url       = {https://doi.org/10.4304/jnw.6.2.190-197},
  doi       = {10.4304/jnw.6.2.190-197},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/HuLZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/LinHZ11,
  author    = {Huaiqing Lin and
               Zhengbing Hu and
               Yonghong Zhou},
  title     = {An Efficient Secure Multicast Communication for {P2P} Network},
  journal   = {{JNW}},
  volume    = {6},
  number    = {3},
  pages     = {408--415},
  year      = {2011},
  url       = {https://doi.org/10.4304/jnw.6.3.408-415},
  doi       = {10.4304/jnw.6.3.408-415},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/LinHZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tjs/HeH11,
  author    = {Matthew He and
               Zhengbing Hu},
  title     = {Foreword},
  journal   = {The Journal of Supercomputing},
  volume    = {58},
  number    = {1},
  pages     = {1--3},
  year      = {2011},
  url       = {https://doi.org/10.1007/s11227-010-0526-8},
  doi       = {10.1007/s11227-010-0526-8},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tjs/HeH11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcp/PengHG10,
  author    = {Yongjun Peng and
               Zhengbing Hu and
               Xi Guo},
  title     = {Research on the Evolution Law and Response Capability Based on Resource
               Allocation Model of Unconventional Emergency},
  journal   = {{JCP}},
  volume    = {5},
  number    = {12},
  pages     = {1899--1906},
  year      = {2010},
  url       = {https://doi.org/10.4304/jcp.5.12.1899-1906},
  doi       = {10.4304/jcp.5.12.1899-1906},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcp/PengHG10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/LiHHWTY10,
  author    = {Zhitang Li and
               Jun Hu and
               Zhengbing Hu and
               Bingbing Wang and
               Liang Tang and
               Xin Yi},
  title     = {Measuring the botnet using the second character of bots},
  journal   = {{JNW}},
  volume    = {5},
  number    = {1},
  pages     = {98--105},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.1.98-105},
  doi       = {10.4304/jnw.5.1.98-105},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/LiHHWTY10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/HuHYFWT10,
  author    = {Wenbin Hu and
               Zhengbing Hu and
               Fu{-}qiang Yang and
               Cunlian Fan and
               Lei Wang and
               Xin{-}long Tan},
  title     = {Control Strategy of Scheduling Invalidation of Data Broadcasting},
  journal   = {{JNW}},
  volume    = {5},
  number    = {1},
  pages     = {106--111},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.1.106-111},
  doi       = {10.4304/jnw.5.1.106-111},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/HuHYFWT10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/LiuLHZLY10,
  author    = {Feng Liu and
               Zhitang Li and
               Zhengbing Hu and
               Lijuan Zhou and
               Bin Liu and
               Junfeng Yu},
  title     = {Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer
               Traffic},
  journal   = {{JNW}},
  volume    = {5},
  number    = {5},
  pages     = {577--585},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.5.577-585},
  doi       = {10.4304/jnw.5.5.577-585},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/LiuLHZLY10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/ZhengH10,
  author    = {Gengsheng Zheng and
               Zhengbing Hu},
  title     = {A Clustering Protocol Using Multiple Chain Strategy in WSNs},
  journal   = {{JNW}},
  volume    = {5},
  number    = {5},
  pages     = {586--593},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.5.586-593},
  doi       = {10.4304/jnw.5.5.586-593},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/ZhengH10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/SongHHZ10,
  author    = {Wei Song and
               Wenbin Hu and
               Zhengbing Hu and
               Xi Zeng},
  title     = {Reliable Resource Search in Scale Free Peer-to-Peer Network},
  journal   = {{JNW}},
  volume    = {5},
  number    = {11},
  pages     = {1365--1372},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.11.1365-1372},
  doi       = {10.4304/jnw.5.11.1365-1372},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/SongHHZ10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/ZhengH10a,
  author    = {Gengsheng Zheng and
               Zhengbing Hu},
  title     = {Tree Routing Protocol with Location-based Uniformly Clustering Strategy
               in WSNs},
  journal   = {{JNW}},
  volume    = {5},
  number    = {11},
  pages     = {1373--1380},
  year      = {2010},
  url       = {https://doi.org/10.4304/jnw.5.11.1373-1380},
  doi       = {10.4304/jnw.5.11.1373-1380},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/ZhengH10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbta/LuH10,
  author    = {Hong Lu and
               Zhengbing Hu},
  title     = {Study on the Virtual Learning Environment Construction Based on Virtools},
  booktitle = {Second International Workshop on Database Technology and Applications,
               {DBTA} 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings},
  pages     = {1--5},
  year      = {2010},
  crossref  = {DBLP:conf/dbta/2010},
  url       = {https://doi.org/10.1109/DBTA.2010.5659046},
  doi       = {10.1109/DBTA.2010.5659046},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/LuH10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbta/WeiSHH10,
  author    = {Li{-}shuang Wei and
               Wei Song and
               Wenbin Hu and
               Zhengbing Hu},
  title     = {Using Network Coding Make {P2P} Content Sharing Scalable},
  booktitle = {Second International Workshop on Database Technology and Applications,
               {DBTA} 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings},
  pages     = {1--4},
  year      = {2010},
  crossref  = {DBLP:conf/dbta/2010},
  url       = {https://doi.org/10.1109/DBTA.2010.5658937},
  doi       = {10.1109/DBTA.2010.5658937},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/WeiSHH10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dbta/2010,
  editor    = {Zhengbing Hu and
               Ping Ma},
  title     = {Second International Workshop on Database Technology and Applications,
               {DBTA} 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5658186},
  isbn      = {978-1-4244-6977-2},
  timestamp = {Wed, 19 Nov 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcp/HuD09,
  author    = {Zhengbing Hu and
               Kai Du},
  title     = {Towards High Availability and Performance Database Clusters for Archived
               Stream},
  journal   = {{JCP}},
  volume    = {4},
  number    = {12},
  pages     = {1332--1339},
  year      = {2009},
  url       = {https://doi.org/10.4304/jcp.4.12.1332-1339},
  doi       = {10.4304/jcp.4.12.1332-1339},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcp/HuD09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jnw/ShengZH09,
  author    = {Tao Sheng and
               Jingli Zhou and
               Zhengbing Hu},
  title     = {Error Resilient Video Transmission over Wireless Networks Based on
               Wyner-Ziv Coding of Motion Regions},
  journal   = {{JNW}},
  volume    = {4},
  number    = {9},
  pages     = {905--912},
  year      = {2009},
  url       = {https://doi.org/10.4304/jnw.4.9.905-912},
  doi       = {10.4304/jnw.4.9.905-912},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jnw/ShengZH09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jsw/HuD09,
  author    = {Zhengbing Hu and
               Kai Du},
  title     = {A Novel Approach to Improve Availability of Massive Database Systems
               {(MDS)}},
  journal   = {{JSW}},
  volume    = {4},
  number    = {10},
  pages     = {1145--1151},
  year      = {2009},
  url       = {https://doi.org/10.4304/jsw.4.10.1145-1151},
  doi       = {10.4304/jsw.4.10.1145-1151},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jsw/HuD09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbta/HuMS09,
  author    = {Zhengbing Hu and
               Rabah Moh'd and
               Al Shboul},
  title     = {The Application of Ant Colony Optimization Technique {(ACOT)} for
               Employees Selection and Training},
  booktitle = {First International Workshop on Database Technology and Applications,
               {DBTA} 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings},
  pages     = {497--502},
  year      = {2009},
  crossref  = {DBLP:conf/dbta/2009},
  url       = {https://doi.org/10.1109/DBTA.2009.172},
  doi       = {10.1109/DBTA.2009.172},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/HuMS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbta/WuHZY09,
  author    = {Junqi Wu and
               Zhengbing Hu and
               Yang Zongkai and
               Liu Yumei},
  title     = {Design of Collaborative Learning in Cyber-Schools},
  booktitle = {First International Workshop on Database Technology and Applications,
               {DBTA} 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings},
  pages     = {703--706},
  year      = {2009},
  crossref  = {DBLP:conf/dbta/2009},
  url       = {https://doi.org/10.1109/DBTA.2009.173},
  doi       = {10.1109/DBTA.2009.173},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/WuHZY09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcp/DuHWCYY08,
  author    = {Kai Du and
               Zhengbing Hu and
               Huaimin Wang and
               Yingwen Chen and
               Shuqiang Yang and
               Zhijian Yuan},
  title     = {Reliability Design for Large Scale Data Warehouses},
  journal   = {{JCP}},
  volume    = {3},
  number    = {10},
  pages     = {78--85},
  year      = {2008},
  url       = {https://doi.org/10.4304/jcp.3.10.78-85},
  doi       = {10.4304/jcp.3.10.78-85},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcp/DuHWCYY08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HuLW08,
  author    = {Zhengbing Hu and
               Zhitang Li and
               Junqi Wu},
  title     = {A novel Network Intrusion Detection System {(NIDS)} based on signatures
               search of data mining},
  booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques
               in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
               Adelaide, Australia, January 21-23, 2008},
  pages     = {45},
  year      = {2008},
  crossref  = {DBLP:conf/eforensics/2008},
  url       = {https://doi.org/10.4108/wkdd.2008.2686},
  doi       = {10.4108/wkdd.2008.2686},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eforensics/HuLW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isecs/ZhangLHTL08,
  author    = {Yejiang Zhang and
               Zhitang Li and
               Zhengbing Hu and
               Hao Tu and
               Huaiqing Lin},
  title     = {A {P2P} E-commerce Related Network Security Issue: {P2P} Worm},
  booktitle = {Proceedings of The International Symposium on Electronic Commerce
               and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages     = {114--117},
  year      = {2008},
  crossref  = {DBLP:conf/isecs/2008},
  url       = {https://doi.org/10.1109/ISECS.2008.187},
  doi       = {10.1109/ISECS.2008.187},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isecs/ZhangLHTL08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wkdd/ZhengbingZJ08,
  author    = {Zhengbing Hu and
               Zhitang Li and
               Junqi Wu},
  title     = {A Novel Network Intrusion Detection System {(NIDS)} Based on Signatures
               Search of Data Mining},
  booktitle = {Proceedings of the International Workshop on Knowledge Discovery and
               Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008},
  pages     = {10--16},
  year      = {2008},
  crossref  = {DBLP:conf/wkdd/2008},
  url       = {https://doi.org/10.1109/WKDD.2008.48},
  doi       = {10.1109/WKDD.2008.48},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wkdd/ZhengbingZJ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wkdd/ZhengbingJP08,
  author    = {Zhengbing Hu and
               Zhou Ji and
               Ping Ma},
  title     = {A Novel Anomaly Detection Algorithm Based on Real-Valued Negative
               Selection System},
  booktitle = {Proceedings of the International Workshop on Knowledge Discovery and
               Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008},
  pages     = {499--502},
  year      = {2008},
  crossref  = {DBLP:conf/wkdd/2008},
  url       = {https://doi.org/10.1109/WKDD.2008.110},
  doi       = {10.1109/WKDD.2008.110},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wkdd/ZhengbingJP08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icess/ZhengbingX07,
  author    = {Zhengbing Hu and
               Xiaomin Han},
  title     = {A QoS Provisioning {MAC} Protocol for {IEEE} 802.11 WLANs},
  booktitle = {Embedded Software and Systems, [Third] International Conference, {ICESS}
               2007, Daegu, Korea, May 14-16, 2007, Proceedings},
  pages     = {718--727},
  year      = {2007},
  crossref  = {DBLP:conf/icess/2007},
  url       = {https://doi.org/10.1007/978-3-540-72685-2_66},
  doi       = {10.1007/978-3-540-72685-2_66},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icess/ZhengbingX07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/is/2016,
  editor    = {Ronald R. Yager and
               Vassil Stoyanov Sgurev and
               Mincho Hadjiski and
               Vladimir Simov Jotsov},
  title     = {8th {IEEE} International Conference on Intelligent Systems, {IS} 2016,
               Sofia, Bulgaria, September 4-6, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7600987},
  isbn      = {978-1-5090-1354-8},
  timestamp = {Wed, 16 Nov 2016 13:44:16 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/is/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/idaacs/2015,
  title     = {{IEEE} 8th International Conference on Intelligent Data Acquisition
               and Advanced Computing Systems: Technology and Applications, {IDAACS}
               2015, Warsaw, Poland, September 24-26, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7324044},
  isbn      = {978-1-4673-8359-2},
  timestamp = {Tue, 15 Dec 2015 10:34:03 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/idaacs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/idaacs/2013,
  title     = {{IEEE} 7th International Conference on Intelligent Data Acquisition
               and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September
               12-14, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6653329},
  isbn      = {978-1-4799-1426-5},
  timestamp = {Thu, 27 Nov 2014 14:50:16 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/idaacs/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dbta/2010,
  editor    = {Zhengbing Hu and
               Ping Ma},
  title     = {Second International Workshop on Database Technology and Applications,
               {DBTA} 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5658186},
  isbn      = {978-1-4244-6977-2},
  timestamp = {Wed, 19 Nov 2014 17:04:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dbta/2009,
  title     = {First International Workshop on Database Technology and Applications,
               {DBTA} 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5207611},
  isbn      = {978-0-7695-3604-0},
  timestamp = {Wed, 19 Nov 2014 17:04:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dbta/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eforensics/2008,
  editor    = {Matthew Sorell and
               Lang White},
  title     = {1st International {ICST} Conference on Forensic Applications and Techniques
               in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
               Adelaide, Australia, January 21-23, 2008},
  publisher = {{ICST/ACM}},
  year      = {2008},
  url       = {http://eudl.eu/proceedings/E-FORENSICS/2008},
  isbn      = {978-963-9799-19-6},
  timestamp = {Tue, 24 Mar 2015 18:02:57 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eforensics/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isecs/2008,
  editor    = {Fei Yu and
               Qi Luo and
               Yongjun Chen and
               Zhigang Chen},
  title     = {Proceedings of The International Symposium on Electronic Commerce
               and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4606003},
  isbn      = {978-0-7695-3258-5},
  timestamp = {Fri, 27 Nov 2015 13:14:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isecs/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wkdd/2008,
  title     = {Proceedings of the International Workshop on Knowledge Discovery and
               Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4470328},
  isbn      = {0-7695-3090-7},
  timestamp = {Thu, 07 May 2015 18:17:01 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wkdd/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icess/2007,
  editor    = {Yann{-}Hang Lee and
               Heung{-}Nam Kim and
               Jong Kim and
               Yongwan Park and
               Laurence Tianruo Yang and
               Sung Won Kim},
  title     = {Embedded Software and Systems, [Third] International Conference, {ICESS}
               2007, Daegu, Korea, May 14-16, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4523},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72685-2},
  doi       = {10.1007/978-3-540-72685-2},
  isbn      = {978-3-540-72684-5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icess/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier