dblp.uni-trier.dewww.uni-trier.de

Jianhua Sun Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
27EELin Shi, Hao Chen, Jianhua Sun: vCUDA: GPU accelerated high performance computing in virtual machines. IPDPS 2009: 1-11
2007
26EEJianhua Sun, Jizha Qin, Shu Chen, Hao Chen, Dingding Li: A Virus Immunization Model Based on Communities in Large Scale Networks. SNPD (3) 2007: 917-922
25EEQinghua Zhou, Jianhua Sun, Guanrong Chen: Global Exponential Stability and Periodic oscillations of Reaction-diffusion BAM Neural Networks with Periodic Coefficients and General Delays. I. J. Bifurcation and Chaos 17(1): 129-142 (2007)
24EEQinghua Zhou, Li Wan, Jianhua Sun: Exponential Stability of Reaction-diffusion Fuzzy Recurrent Neural Networks with Time-Varying Delays. I. J. Bifurcation and Chaos 17(9): 3099-3108 (2007)
23EELi Wan, Qinghua Zhou, Jianhua Sun: Mean Value Exponential Stability of Stochastic Reaction-diffusion Generalized Cohen-grossberg Neural Networks with Time-Varying Delay. I. J. Bifurcation and Chaos 17(9): 3219-3227 (2007)
2006
22EERanchao Wu, Jianhua Sun: A Brief Survey on Constructing homoclinic Structures of soliton Equations. I. J. Bifurcation and Chaos 16(10): 2799-2813 (2006)
21EEHao Chen, Hai Jin, Jianhua Sun: Measurements of topological characteristics for Peer-to-Peer systems. IJHPCN 4(1/2): 91-101 (2006)
20EEMaggie Xiaoyan Cheng, Jianhua Sun, Manki Min, Yingshu Li, Weili Wu: Energy-efficient broadcast and multicast routing in multihop ad hoc wireless networks. Wireless Communications and Mobile Computing 6: 213-223 (2006)
2005
19EEEn Cheng, Hai Jin, Zongfen Han, Jianhua Sun: Network-Based Anomaly Detection Using an Elman Network. ICCNMC 2005: 471-480
18EEHai Jin, Zhiling Yang, Jianhua Sun, Xuping Tu, Zongfen Han: CIPS: Coordinated Intrusion Prevention System. ICOIN 2005: 89-98
17EEWei Wang, Jianhua Sun, Guanrong Chen: Bifurcation, Exact Solutions and nonsmooth Behavior of solitary Waves in the Generalized Nonlinear SchrÖdinger equation. I. J. Bifurcation and Chaos 15(10): 3295-3305 (2005)
16EEJianhua Sun, Li Wan: Convergence Dynamics of Stochastic Reaction-diffusion Recurrent Neural Networks with Delays. I. J. Bifurcation and Chaos 15(7): 2131-2144 (2005)
2004
15 Hai Jin, Yi Pan, Nong Xiao, Jianhua Sun: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings Springer 2004
14EEHao Chen, Hai Jin, Jianhua Sun, Dafu Deng, Xiaofei Liao: Analysis of large-scale topological properties for peer-to-peer networks. CCGRID 2004: 27-34
13EEHai Jin, Jianhua Sun, Hao Chen, Zongfen Han: A Fuzzy Data Mining Based Intrusion Detection Model. FTDCS 2004: 191-197
12EEHao Chen, Hai Jin, Jianhua Sun, Zongfen Han: Efficient Immunization Algorithm for Peer-to-Peer Networks. HiPC 2004: 232-241
11EEHao Chen, Hai Jin, Jianhua Sun, Zongfen Han: Efficient Immunization Algorithm for Peer-to-Peer Networks. International Conference on Computational Science 2004: 623-626
10EEMaggie Xiaoyan Cheng, Mihaela Cardei, Jianhua Sun, Xiaochun Cheng, Lusheng Wang, Yinfeng Xu, Ding-Zhu Du: Topology Control of Ad Hoc Wireless Networks for Energy Efficiency. IEEE Trans. Computers 53(12): 1629-1635 (2004)
2003
9EEJianhua Sun, Hai Jin, Hao Chen, Zongfen Han: Server Scheduling Scheme for Asynchronous Cluster Video Server. AINA 2003: 509-513
8EEJianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han: A Compound Intrusion Detection Model. ICICS 2003: 370-381
7EEJianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou: A Data Mining Based Intrusion Detection Model. IDEAL 2003: 677-684
6 Hai Jin, Hao Chen, Jianhua Sun: Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems. MMM 2003: 493-
5EEHai Jin, Deqing Zou, Hanhua Chen, Jianhua Sun, Song Wu: Fault-Tolerant Grid Architecture and Practice. J. Comput. Sci. Technol. 18(4): 423-433 (2003)
4EEMaggie Xiaoyan Cheng, Xiufeng Du, Manki Min, Hung Q. Ngo, Lu Ruan, Jianhua Sun, Weili Wu: Super link-connectivity of iterated line digraphs. Theor. Comput. Sci. 1-3(304): 461-469 (2003)
2002
3EEHai Jin, Jianhua Sun, Hao Chen, Zongfen Han: A Risk-Sensitive Intrusion Detection Model. ICISC 2002: 107-117
1998
2EEHai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiaoping Chen, Yamin Wang, Jianhua Sun: Business rule extraction techniques for COBOL programs. Journal of Software Maintenance 10(1): 3-35 (1998)
1996
1EEHai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiaoping Chen, Yamin Wang, Jianhua Sun: Business Rule Extraction from Legacy Code. COMPSAC 1996: 162-167

Coauthor Index

1Sourav Bhattacharya [1] [2]
2Mihaela Cardei [10]
3Guanrong Chen [17] [25]
4Hanhua Chen [5]
5Hao Chen [3] [6] [7] [8] [9] [11] [12] [13] [14] [21] [26] [27]
6Shu Chen [26]
7Xiaoping Chen [1] [2]
8En Cheng [19]
9Maggie Xiaoyan Cheng [4] [10] [20]
10Xiaochun Cheng [10]
11Dafu Deng [14]
12Ding-Zhu Du [10]
13Xiufeng Du [4]
14Zongfen Han [3] [7] [8] [9] [11] [12] [13] [18] [19]
15Hai Huang [1] [2]
16Hai Jin [3] [5] [6] [7] [8] [9] [11] [12] [13] [14] [15] [18] [19] [21]
17Dingding Li [26]
18Yingshu Li [20]
19Xiaofei Liao [14]
20Manki Min [4] [20]
21Hung Q. Ngo (Hung Quang Ngo) [4]
22Yi Pan [15]
23Jizha Qin [26]
24Lu Ruan [4]
25Lin Shi [27]
26Wei-Tek Tsai [1] [2]
27Xuping Tu [18]
28Li Wan [16] [23] [24]
29Lusheng Wang [10]
30Wei Wang [17]
31Yamin Wang [1] [2]
32Ranchao Wu [22]
33Song Wu [5]
34Weili Wu [4] [20]
35Nong Xiao [15]
36Yinfeng Xu [10]
37Zhiling Yang [18]
38Qian Zhang [8]
39Qinghua Zhou [23] [24] [25]
40Deqing Zou [5] [7]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)