Manghui Tu, Ph.D. - Publications
Affiliations: | 2006 | University of Texas at Dallas, Richardson, TX, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2012 | Xu D, Tu M, Sanford M, Thomas L, Woodraska D, Xu W. Automated Security Test Generation with Formal Threat Models Ieee Transactions On Dependable and Secure Computing. 9: 526-539. DOI: 10.1109/Tdsc.2012.24 | 0.317 | |||
2011 | Tu M, Xu D, Xia Z, Smith L. Designing a Secure Epidemic based Update Protocol for P2P Systems Parallel and Distributed Computing and Systems. DOI: 10.2316/P.2011.757-008 | 0.533 | |||
2010 | Tu M, Li P, Yen I, Thuraisingham BM, Khan L. Secure Data Objects Replication in Data Grid Ieee Transactions On Dependable and Secure Computing. 7: 50-64. DOI: 10.1109/Tdsc.2008.19 | 0.565 | |||
2009 | Tu M, Xia Z, Li P, Tadayon N. Allocation of partitioned data by using a neural network based approach Neurocomputing. 72: 1000-1011. DOI: 10.1016/J.Neucom.2008.04.011 | 0.556 | |||
2007 | Li P, Tu M, Yen I, Xia Z. Preference update for e-commerce applications: Model, language, and processing Electronic Commerce Research. 7: 17-44. DOI: 10.1007/S10660-006-0061-0 | 0.616 | |||
2006 | Tu M, Li P, Xiao L, Yen IL, Bastani FB. Replica placement algorithms for mobile transaction systems Ieee Transactions On Knowledge and Data Engineering. 18: 954-970. DOI: 10.1109/Tkde.2006.114 | 0.625 | |||
2005 | Gupta M, Tu M, Khan L, Bastani F, Yen IL. A study of the model and algorithms for handling location-dependent continuous queries Knowledge and Information Systems. 8: 414-437. DOI: 10.1007/S10115-005-0196-7 | 0.567 | |||
Show low-probability matches. |