Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Chunming Rong
2010 – today
- 2013
[j20]Chunming Rong, Son Thanh Nguyen, Martin Gilje Jaatun: Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering 39(1): 47-54 (2013)
[j19]Jianguo Li, Gansen Zhao, Chunming Rong, Yong Tang: Semantic description of scholar-oriented social network cloud. The Journal of Supercomputing 65(1): 410-425 (2013)
[j18]Victor C. M. Leung, Yonggang Wen, Min Chen, Chunming Rong: Mobile cloud computing [Guest Editorial]. IEEE Wireless Commun. 20(3): 1-0 (2013)
[c62]Ming Hao, Tomasz Wiktor Wlodarczyk, Chunming Rong: Performance Analysis and Optimization of Map Only Left Outer Join. AINA Workshops 2013: 625-631
[c61]Aryan TaheriMonfared, Chunming Rong: Multi-tenant Network Monitoring Based on Software Defined Networking. OTM Conferences 2013: 327-341
[c60]Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong: Privacy Preserving Data Analytics for Smart Homes. IEEE Symposium on Security and Privacy Workshops 2013: 23-27- 2012
[j17]Tomasz Wiktor Wlodarczyk, Han Yi, Xiao Yu, Chunming Rong: Evaluation of some optimisation techniques for semantic query answering on shared-nothing architecture. IJSSC 2(1): 12-22 (2012)
[j16]Lili Sun, Hua Wang, Jeffrey Soar, Chunming Rong: Purpose Based Access Control for Privacy Protection in E-Healthcare Services. JSW 7(11): 2443-2449 (2012)
[j15]Chunming Rong, Frode Eika Sandnes, Rajkumar Buyya: Preface to special issue on Advances in Cloud Computing. The Journal of Supercomputing 61(2): 249-250 (2012)
[j14]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes: Reference deployment models for eliminating user concerns on cloud security. The Journal of Supercomputing 61(2): 337-352 (2012)
[c59]Byambajargal Byambajav, Tomasz Wiktor Wlodarczyk, Chunming Rong, Paea LePendu, Nigam Shah: Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size. AINA Workshops 2012: 1075-1080
[c58]Erdal Cayirci, Chunming Rong, Maciej Koczur, Kai Hwang: A multi-criteria design scheme for service federating inter-cloud applications. CloudCom 2012: 129-134
[c57]Rui Maximo Esteves, Thomas J. Hacker, Chunming Rong: Cluster analysis for the cloud: Parallel Competitive Fitness and parallel K-means++ for large dataset analysis. CloudCom 2012: 177-184
[c56]Jin Liu, Chunming Rong, Gansen Zhao: A fast estimation of shortest path distance for power-law network predominant cloud service. CloudCom 2012: 480-487
[c55]Siani Pearson, Vasilis Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier Lopez: Accountability for cloud and other future Internet services. CloudCom 2012: 629-632
[c54]Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong: A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. CSS 2012: 123-138- 2011
[c53]Hongbing Cheng, Chunming Rong, Geng Yang: Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks. AINA 2011: 475-480
[c52]Tomasz Wiktor Wlodarczyk, Yi Han, Chunming Rong: Performance Analysis of Hadoop for Query Processing. AINA Workshops 2011: 507-513
[c51]Rui Maximo Esteves, Rui Pais, Chunming Rong: K-means Clustering in the Cloud - A Mahout Test. AINA Workshops 2011: 514-519
[c50]Ching-Hsien Hsu, Shih-Chang Chen, Chih-Chun Lee, Hsi-Ya Chang, Kuan-Chou Lai, Kuan-Ching Li, Chunming Rong: Energy-Aware Task Consolidation Technique for Cloud Computing. CloudCom 2011: 115-121
[c49]Yuri Demchenko, Canh Ngo, Cees de Laat, Tomasz Wiktor Wlodarczyk, Chunming Rong, Wolfgang Ziegler: Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services. CloudCom 2011: 255-263
[c48]Rui Maximo Esteves, Chunming Rong: Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud. CloudCom 2011: 565-569
[c47]Tomasz Wiktor Wlodarczyk, Chunming Rong: An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing. CloudCom 2011: 612-617
[c46]Son Thanh Nguyen, Semere Tsehaye Ghebregiorgish, Nour Alabbasi, Chunming Rong: Integer Factorization Using Hadoop. CloudCom 2011: 628-633
[c45]Tomasz Wiktor Wlodarczyk, Chunming Rong: Applying SWRL-F to intercloud constraints analysis. HPCS 2011: 391-396
[c44]
[c43]Liang Yan, Hongbo Guo, Min Chen, Chunming Rong, Victor C. M. Leung: Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System. Networking Workshops 2011: 243-250
[c42]Tomasz Wiktor Wlodarczyk, Chunming Rong, Martin J. O'Connor, Mark A. Musen: SWRL-F: a fuzzy logic extension of the semantic web rule language. WIMS 2011: 39- 2010
[j13]Dingyi Pei, Jun-Wu Dong, Chunming Rong: A novel key pre-distribution scheme for wireless distributed sensor networks. SCIENCE CHINA Information Sciences 53(2): 288-298 (2010)
[c41]Wei Sun, Naixue Xiong, Laurence Tianruo Yang, Chunming Rong: Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors. CIT 2010: 1735-1742
[c40]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang: Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96
[c39]Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang: Trusted Data Sharing over Untrusted Cloud Storage Providers. CloudCom 2010: 97-103
[c38]Baodong Jia, Tomasz Wiktor Wlodarczyk, Chunming Rong: Performance Considerations of Data Acquisition in Hadoop System. CloudCom 2010: 545-549
[c37]Rui Maximo Esteves, Chunming Rong: Social Impact of Privacy in Cloud Computing. CloudCom 2010: 593-596
[c36]Tomasz Wiktor Wlodarczyk, Chunming Rong: On the Sustainability Impacts of Cloud-Enabled Cyber Physical Space. CloudCom 2010: 597-602
[c35]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes: Deployment models: Towards eliminating security concerns from cloud computing. HPCS 2010: 189-195
[c34]Tomasz Wiktor Wlodarczyk, Chunming Rong, Csongor Nyulas, Mark A. Musen: An efficient approach to intelligent real-time monitoring using ontologies and Hadoop. HPCS 2010: 209-215
[c33]Tomasz Wiktor Wlodarczyk, Martin J. O'Connor, Chunming Rong, Mark A. Musen: SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language. URSW 2010: 97-100
[c32]Tomasz Wiktor Wlodarczyk, Chunming Rong, Baodong Jia, Laurentiu Cocanu, Csongor Nyulas, Mark A. Musen: DataStorm. SERVICES 2010: 123-127
[e4]Tai-Hoon Kim, Alan Chin-Chen Chang, MingChu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2
2000 – 2009
- 2009
[j12]Son Thanh Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong: A shadow zone aware routing protocol for acoustic underwater sensor networks. IEEE Communications Letters 13(5): 366-368 (2009)
[c31]Kari Anne Haaland Thorsen, Trygve Eftestøl, Chunming Rong, Petter Andreas Steen: An Integrated Information Sharing Structure for Resuscitation Data. AINA Workshops 2009: 7-12
[c30]Chunming Rong: An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf. CloudCom 2009: 19-23
[c29]Erdal Cayirci, Chunming Rong, Wim Huiskamp, Cor Verkoelen: Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. CloudCom 2009: 57-68
[c28]Liang Yan, Chunming Rong, Gansen Zhao: Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. CloudCom 2009: 167-177
[c27]Tomasz Wiktor Wlodarczyk, Chunming Rong, Kari Anne Haaland Thorsen: Industrial Cloud: Toward Inter-enterprise Integration. CloudCom 2009: 460-471
[c26]Kari Anne Haaland Thorsen, Odd Frode Torbjørnse, Chunming Rong: Automatic Web Service Detection in Oil and Gas. FGIT-FGCN 2009: 193-200
[c25]Rui Maximo Esteves, Tomasz Wiktor Wlodarczyk, Chunming Rong, Einar Landre: Bayesian Networks for Fault Detection under Lack of Historical Data. ISPAN 2009: 732-736
[c24]Erdal Cayirci, Son Thanh Nguyen, Chunming Rong: Secure many to many routing for wireless sensor and actuator networks. SIN 2009: 172-178
[e3]Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (Eds.): Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings. Lecture Notes in Computer Science 5931, Springer 2009, ISBN 978-3-642-10664-4- 2008
[j11]Kari Anne Haaland Thorsen, Chunming Rong: On Ubiquitous Integrated Computing. IJCSA 5(3): 46-55 (2008)
[j10]George O. M. Yee, Chunming Rong, Laurence Tianruo Yang: Guest Editors' Introduction. Journal of Computer Security 16(3): 261-264 (2008)
[j9]Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong: Protection against unauthorized access and computer crime in Norwegian enterprises. Journal of Computer Security 16(3): 341-366 (2008)
[c23]Yi Wang, Furong Wang, Chunming Rong, Sufang Wang: SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. AINA Workshops 2008: 639-643
[c22]Furong Wang, Chen Huang, Jing Zhao, Chunming Rong: IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. AINA 2008: 978-984
[c21]Kari Anne Haaland Thorsen, Chunming Rong: Data Integration in Oil and Gas at Norwegian Continental Shelf. AINA Workshops 2008: 1597-1602
[c20]Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong: SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. ATC 2008: 134-148
[c19]Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong: Di-GAFR: Directed Greedy Adaptive Face-Based Routing. ATC 2008: 555-566
[c18]Kui Xu, Fan Zhang, Chunming Rong, Bin Dai, Benxiong Huang: Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. FGCN (1) 2008: 321-324
[c17]Tomomi Kawashima, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Chunming Rong: A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space. ICESS 2008: 229-236
[c16]
[c15]Kari Anne Haaland Thorsen, Chunming Rong: Towards Dataintegration from WITSML to ISO 15926. UIC 2008: 626-635
[e2]Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma (Eds.): Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5060, Springer 2008, ISBN 978-3-540-69294-2
[e1]Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang, Jianhua Ma (Eds.): Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5061, Springer 2008, ISBN 978-3-540-69292-8- 2007
[c14]Chunming Rong, Won-Chol Kim: Effective Storage Security in Incompletely Trusted Environment. AINA Workshops (1) 2007: 432-437
[c13]Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong: Information Security Threats and Access Control Practices in Norwegian Businesses. AINA Workshops (1) 2007: 470-476
[c12]Chunming Rong, Hein Meling, Dagfinn Waage: Towards Integrated Services for Health Monitoring. AINA Workshops (2) 2007: 776-781
[c11]
[c10]Son Thanh Nguyen, Chunming Rong: Electronic Payment Scheme Using Identity-Based Cryptography. EuroPKI 2007: 330-337- 2006
[j8]Anne Marie Hegland, Eli Winjum, Stig Fr. Mjølsnes, Chunming Rong, Øivind Kure, Pål Spilling: A survey of key management in ad hoc networks. IEEE Communications Surveys and Tutorials 8(1-4): 48-66 (2006)
[c9]Anne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong, Øivind Kure: Analysis of IBS for MANET Security in Emergency and Rescue Operations. AINA (2) 2006: 155-159
[c8]Christian Veigner, Chunming Rong: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ATC 2006: 521-530
[c7]Peng Jiang, Geng Yang, Chunming Rong: Combined Method for Nonlinear Systems of Equations. International Conference on Computational Science (4) 2006: 693-699
[c6]Peng Jiang, Geng Yang, Chunming Rong: Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. International Conference on Computational Science (1) 2006: 794-797
[c5]Christian Veigner, Chunming Rong: On Use of Identity-Based Encryption for Secure Emailing. SECRYPT 2006: 289-296
[c4]Kari Anne Haaland, Chunming Rong: Securing Web Services Using Identity-Based Encryption (IBE). SECRYPT 2006: 413-418- 2005
[c3]Christian Veigner, Chunming Rong: Flooding attack on the binding cache in mobile IPv6. ICETE 2005: 36-43
[c2]Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong: A Scalable Security Architecture for Grid. PDCAT 2005: 89-93- 2003
[j7]Stig Fr. Mjølsnes, Chunming Rong: On-Line E-Wallet System with Decentralized Credential Keepers. MONET 8(1): 87-99 (2003)
[c1]Geng Yang, Chunming Rong, Yunping Dai: A Distributed Honeypot System for Grid Security. GCC (1) 2003: 1083-1086- 2001
[j6]Tor Helleseth, Chunming Rong, Kyeongcheol Yang: New 3-designs from Goethals codes over Z4. Discrete Mathematics 226(1-3): 403-409 (2001)
[j5]Tor Helleseth, Chunming Rong, Kyeongcheol Yang: On t-designs from codes over Z4. Discrete Mathematics 238(1-3): 67-80 (2001)
1990 – 1999
- 1999
[j4]Iwan M. Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang: Split Weight Enumerators for the Preparata Codes with Applications to Designs. Des. Codes Cryptography 18(1/3): 103-124 (1999)
[j3]Tor Helleseth, Chunming Rong, Kyeongcheol Yang: New infinite families of 3-designs from preparata codes over Z4. Discrete Mathematics 195(1-3): 139-156 (1999)
[j2]Tor Helleseth, Chunming Rong, Daniel Sandberg: New Families of Almost Perfect Nonlinear Power Mappings. IEEE Transactions on Information Theory 45(2): 475-485 (1999)
[j1]Chunming Rong, Tor Helleseth, Jyrki T. Lahtonen: On algebraic decoding of the Z4-linear Calderbank-McGuire code. IEEE Transactions on Information Theory 45(5): 1423-1434 (1999)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:54 CEST by the dblp team



