Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jianqing Ma
@article{DBLP:journals/iam/ChenMWY21, author = {Xiaofang Chen and Jianqing Ma and June Wei and Shuiqing Yang}, title = {The role of perceived integration in WeChat usages for seeking information and sharing comments: {A} social capital perspective}, journal = {Inf. Manag.}, volume = {58}, number = {1}, pages = {103280}, year = {2021}, url = {https://doi.org/10.1016/j.im.2020.103280}, doi = {10.1016/J.IM.2020.103280}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/ChenMWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gc/HuangLM17, author = {Ziwen Huang and Xiangwen Li and Jianqing Ma}, title = {Z\({}_{\mbox{3}}\)-Connectivity of Claw-Free Graphs}, journal = {Graphs Comb.}, volume = {33}, number = {1}, pages = {123--140}, year = {2017}, url = {https://doi.org/10.1007/s00373-016-1754-3}, doi = {10.1007/S00373-016-1754-3}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gc/HuangLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arsmc/LiM16, author = {Xiangwen Li and Jianqing Ma}, title = {Z{\_}3-connectivity of K{\_}\{1, 3\}-free graphs without induced cycle of length at least 5}, journal = {Ars Math. Contemp.}, volume = {11}, number = {1}, pages = {35--47}, year = {2016}, url = {https://doi.org/10.26493/1855-3974.733.105}, doi = {10.26493/1855-3974.733.105}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/arsmc/LiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/MaL14, author = {Jianqing Ma and Xiangwen Li}, title = {Nowhere-zero 3-flows of claw-free graphs}, journal = {Discret. Math.}, volume = {336}, pages = {57--68}, year = {2014}, url = {https://doi.org/10.1016/j.disc.2014.08.001}, doi = {10.1016/J.DISC.2014.08.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/MaL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/YiZMW13, author = {Ping Yi and Ting Zhu and Jianqing Ma and Yue Wu}, title = {An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {17}, number = {3-4}, pages = {269--292}, year = {2013}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-17-number-3-4-2013/ahswn-17-3-4-p-269-292/}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ahswn/YiZMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/uais/YaoQHDM11, author = {Dengfeng Yao and Yunfeng Qiu and Hairui Huang and Zaixin Du and Jianqing Ma}, title = {A survey of technology accessibility problems faced by older users in China}, journal = {Univers. Access Inf. Soc.}, volume = {10}, number = {4}, pages = {373--390}, year = {2011}, url = {https://doi.org/10.1007/s10209-011-0222-3}, doi = {10.1007/S10209-011-0222-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/uais/YaoQHDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/WuMZ11, author = {Aifeng Wu and Jianqing Ma and Shiyong Zhang}, editor = {Saad Biaz and Shaoen Wu}, title = {Towards realistic mobility modeling for vehicular ad hoc networks}, booktitle = {2011 Spring Simulation Multi-conference, SpringSim '11, Boston, MA, USA, April 03-07, 2011. Volume 2: Proceedings of the 44th Annual Simulation Symposium {(ANSS)}}, pages = {57--67}, publisher = {{SCS/ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2048379}, timestamp = {Mon, 15 Jun 2015 19:00:08 +0200}, biburl = {https://dblp.org/rec/conf/springsim/WuMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/ChenCMZG09, author = {Tianyuan Chen and Lei Chang and Jianqing Ma and Wei Zhang and Feng Gao}, editor = {Y{\"{u}}cel Saygin and Jeffrey Xu Yu and Hillol Kargupta and Wei Wang and Sanjay Ranka and Philip S. Yu and Xindong Wu}, title = {{HOCT:} {A} Highly Scalable Algorithm for Training Linear {CRF} on Modern Hardware}, booktitle = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining Workshops, Miami, Florida, USA, 6 December 2009}, pages = {276--281}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDMW.2009.69}, doi = {10.1109/ICDMW.2009.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/ChenCMZG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/YiTLWM09, author = {Ping Yi and Tianhao Tong and Ning Liu and Yue Wu and Jianqing Ma}, editor = {Shahram Latifi}, title = {Security in Wireless Mesh Networks: Challenges and Solutions}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {423--428}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.20}, doi = {10.1109/ITNG.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/YiTLWM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/ZhangCMZ09, author = {Wei Zhang and Lei Chang and Jianqing Ma and YiPing Zhong}, editor = {Dimitris Karagiannis and Zhi Jin}, title = {Aggregation Models for People Finding in Enterprise Corpora}, booktitle = {Knowledge Science, Engineering and Management, Third International Conference, {KSEM} 2009, Vienna, Austria, November 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5914}, pages = {180--191}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10488-6\_20}, doi = {10.1007/978-3-642-10488-6\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ksem/ZhangCMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/w4a/YaoQDMH09, author = {Dengfeng Yao and Yunfeng Qiu and Zaixin Du and Jianqing Ma and Harry Huang}, editor = {David Sloan and Chieko Asakawa and Hironobu Takagi}, title = {A survey of technology accessibility problems faced by older users in China}, booktitle = {Proceedings of the International Cross-Disciplinary Conference on Web Accessibility, {W4A} 2009, Madrid, Spain, April 20-21, 2009}, series = {{ACM} International Conference Proceeding Series}, pages = {16--25}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1535654.1535659}, doi = {10.1145/1535654.1535659}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/w4a/YaoQDMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/YuanMZZ08, author = {Ting Yuan and Jianqing Ma and YiPing Zhong and Shiyong Zhang}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {I}}, pages = {453--458}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.23}, doi = {10.1109/EUC.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/YuanMZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/YuanMZZ08, author = {Ting Yuan and Jianqing Ma and YiPing Zhong and Shiyong Zhang}, title = {Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks}, booktitle = {International Multisymposiums on Computer and Computational Sciences, {IMSCCS} 2008, Shanghai, China, October 18-20, 2008}, pages = {83--90}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IMSCCS.2008.13}, doi = {10.1109/IMSCCS.2008.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/YuanMZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/YuanZZM08, author = {Ting Yuan and Shiyong Zhang and YiPing Zhong and Jianqing Ma}, editor = {Ty Znati and Youtao Zhang}, title = {{KAEF:} An En-route Scheme of Filtering False Data in Wireless Sensor Networks}, booktitle = {2008 {IEEE} International Performance, Computing and Communications Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008}, pages = {193--200}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCCC.2008.4745144}, doi = {10.1109/PCCC.2008.4745144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/YuanZZM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/MaZZW06, author = {Jianqing Ma and Shiyong Zhang and YiPing Zhong and Yu Wu}, title = {{PEAN:} {A} Public Key Authentication Scheme in Wireless Sensor and Actor Network}, booktitle = {Sixth International Conference on Computer and Information Technology {(CIT} 2006), 20-22 September 2006, Seoul, Korea}, pages = {230}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CIT.2006.144}, doi = {10.1109/CIT.2006.144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/MaZZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/YuMWMG06, author = {Bo Yu and Jianqing Ma and Zhi Wang and Dilin Mao and Chuanshan Gao}, editor = {Heng Tao Shen and Jinbao Li and Minglu Li and Jun Ni and Wei Wang}, title = {Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks}, booktitle = {Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3842}, pages = {196--205}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11610496\_25}, doi = {10.1007/11610496\_25}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apweb/YuMWMG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/MaZZT06, author = {Jianqing Ma and Shiyong Zhang and YiPing Zhong and Xiaowen Tong}, title = {SeLoc: Secure Localization for Wireless Sensor and Actor Network}, booktitle = {{IEEE} 3rd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2006, 9-12 October 2006, Vancouver, BC, Canada}, pages = {864--869}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MOBHOC.2006.278666}, doi = {10.1109/MOBHOC.2006.278666}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/MaZZT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MaZZT06, author = {Jianqing Ma and Shiyong Zhang and YiPing Zhong and Xiaowen Tong}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {{SAID:} {A} Self-Adaptive Intrusion Detection System in Wireless Sensor Networks}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {60--73}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_5}, doi = {10.1007/978-3-540-71093-6\_5}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MaZZT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/MaZZ05, author = {Jianqing Ma and YiPing Zhong and Shiyong Zhang}, title = {Frequency-hopping based Secure Schemes in Sensornets}, booktitle = {Fifth International Conference on Computer and Information Technology {(CIT} 2005), 21-23 September 2005, Shanghai, China}, pages = {459--463}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CIT.2005.120}, doi = {10.1109/CIT.2005.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/MaZZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.