Browsing by Author Chen, J

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 98  next >
Issue DateTitleAuthor(s)
2012An agent-based service oriented architecture for risk miningChen, J
1-Jul-2003Alterations of the Birt-Hogg-Dubé gene (BHD) in sporadic colorectal tumoursKahnoski, K; Khoo, SK; Nassif, NT; Chen, J; Lobo, GP; Segelov, E; Teh, BT
15-Apr-2006Analysis of NDVI and scaled difference vegetation index retrievals of vegetation fractionJiang, Z; Huete, AR; Chen, J; Chen, Y; Li, J; Yan, G; Zhang, X
Jan-2008Ancilla-Assisted Discrimination Of Quantum GatesChen, J; Ying, M
Jan-2010Ancilla-assisted discrimination of quantum gatesChen, J; Ying, M
9-Nov-2012An association probability based noise generation strategy for privacy protection in cloud computingZhang, G; Zhang, X; Yang, Y; Liu, C; Chen, J
1-Jan-2016Automated Policy Combination for Secure Data Sharing in Cross-Organizational CollaborationsDuan, L; Zhang, Y; Chen, S; Zhao, S; Wang, S; Liu, D; Liu, RP; Cheng, B; Chen, J
Jan-2006Calculation of Power Loss in Output Diode of a Flyback Switching DC-DC ConverterChen, J; Zhu, J; Guo, Y; N/A
25-Dec-2013A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computingDeng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J
1-Jul-2018Colloidal spray pyrolysis: A new fabrication technology for nanostructured energy storage materialsLiang, Y; Tian, H; Repac, J; Liou, SC; Chen, J; Han, W; Wang, C; Ehrman, S
1-Dec-2013Combining top-down and bottom-up: Scalable sub-tree anonymization over big data using mapreduce on cloudZhang, X; Liu, C; Nepal, S; Yang, C; Dou, W; Chen, J
Jan-2007Comprehensive Performance Evaluation of a High Speed Brushless DC Motor Using an Improved Phase Variable ModelChen, J; Guo, Y; Zhu, J
21-Aug-2013Computation and Storage in the CloudYuan, D; Yang, Y; Chen, J
Jan-2011Computation and Storage Trade-Off for Cost-Effectively Storing Scientific Datasets in the CloudYuan, D; Yang, Y; Liu, X; Chen, J; Furht, B; Escalante, A
1-Jan-2013A confidence-based filtering method for DDoS attack defense in cloud environmentDou, W; Chen, Q; Chen, J
Jan-2011Connceptualization of a Context Aware Cloud Adaptation (CACA) FrameworkGill, AQ; Bunker, D; Chen, J; Dou, W; Liu, J; Yang, LT; Ma, J
1-Jan-2004Customers confidence in e-business: An evaluation of Australian practices - A case studyChandran, D; Chen, J
Jan-2006Design and Performance Simulation of a High Speed Brushless DC Motor for Embroidery Machine ApplicationChen, J; Guo, Y; Zhu, J; N/A
10-Aug-2015Discontinuity of maximum entropy inference and quantum phase transitionsChen, J; Ji, Z; Li, CK; Poon, YT; Shen, Y; Yu, N; Zeng, B; Zhou, D
1-Dec-2016DLSeF: A dynamic key-length-based efficient real-time security verification model for big data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J