Browsing by Author Chen, Q

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 34  next >
Issue DateTitleAuthor(s)
Jan-2006Bridging Local And Global Data Cleansing: Identifying Class Noise In Large, Distributed Data DatasetsZhu, X; Wu, X; Chen, Q
Jan-2013A Confidence-based Filtering Method For Ddos Attack Defense In Cloud EnvironmentDou, W; Chen, Q; Chen, J
Jan-2004Dealing with inconsistent secure messagesChen, Q; Zhang, S; Zhang, C; Guesgen, H; Yeap, W
1-Jan-2016Depth-first search encoding of RNA substructuresChen, Q; Lan, C; Li, J; Chen, B; Wang, L; Zhang, C
Jan-2006Detecting collusion attacks in security protocolsChen, Q; Chen, PY; Zhang, S; Zhang, C; NA
Jan-2006Detecting Collusion in Security protocolsChen, Q; Chen, PY; Zhang, S; Zhang, C; Zhou, X; Li, J; Shen, H
Jan-2007Detecting inconsistency in biological molecular databases using ontologiesChen, Q; Chen, PY; Zhang, C
1-Jun-2016Determination of active earth pressure on rigid retaining wall considering arching effect in cohesive backfill soilRao, P; Chen, Q; Zhou, Y; Nimbalkar, S; Chiaro, G
1-Jan-2016Document Similarity Analysis via Involving Both Explicit and Implicit Semantic CouplingsChen, Q; Hu, L; Xu, J; Liu, W; cao, L
12-Sep-2017Effects of human mesenchymal stem cells on airway inflammation in allergic asthma mice and the underlying mechanism of actionsRen, N; Chen, H; McGowan, EM; Chen, Q; An, J; Lin, Y
1-Aug-2013Electrospinning of poly(methyl methacrylate) nanofibers in a pump-free processBedi, JS; Lester, DW; Fang, YX; Turner, JFC; Zhou, J; Alfadul, SM; Perry, C; Chen, Q
Jan-2005ENDL: A logical framework for verifying secure transaction protocolsChen, Q; Zhang, C; Zhang, S
Jan-2005A Framework for Merging Inconsistent Belief in Security Protocol AnalysisChen, Q; Yi Ping, C; Zhang, C; Zhang, S; Shim, J
22-Dec-2016Grouping miRNAs of similar functions via weighted information content of gene ontology.Lan, C; Chen, Q; Li, J
Jan-2007Identifying Dependency Between Secure Messages for Protocol AnalysisChen, Q; Zhang, S; Chen, PY; Zili, Z; Jerg, HS
2014Intelligent strategies for pathway mining model and pattern identificationChen, Q; Chen, B; Zhang, C
1-Mar-2016Managing sub-branding affect transfer: the role of consideration set size and brand loyaltyHe, Y; Chen, Q; Tam, L; Lee, RP
Jan-2009Mining class-bridge rules based on rough setsZhang, S; Chen, Q; Jin, Z; Wang, R
Jan-2006Mining frequent itemsets for protein kinase regulationChen, Q; Chen, PY; Zhang, C; Li, L; Yang, Q; Webb, G
2016Multi-Cultural Democracy and Political Engagement of Mainland China Immigrants in Australia Since the 1980'sFeng, C; Feng, C; He, Y; Chen, Q