Research - Selected Journal Articles


  • Abawajy, J. H. (2009) Adaptive hierarchical scheduling policy for enterprise grid computing systems, Journal of network and computer applications, vol. 32, no. 3, pp. 770-779, Academic Press, London, England.
  • Abawajy, J. H. (2009) An efficient adaptive scheduling policy for high-performance computing, Future generation computer systems, vol. 25, no. 3, pp. 364-370, Elsevier BV, Amsterdam, The Netherlands.
  • An, Jiyuan and Chen, Yi-Ping Phoebe (2009) Finding rule groups to classify high dimensional gene expression datasets, Computational Biology and Chemistry, vol. 33, no. 1, pp. 108-113, Elsevier Ltd, Oxford, England.
  • Beliakov, Gleb (2009) Construction of aggregation functions from data using linear programming, Fuzzy sets and systems, vol. 160, no. 1, pp. 65-75, Elsevier, Amsterdam, Netherlands.
  • Beliakov, Gleb and Calvo, Tomasa (2009) Construction of k-Lipschitz triangular norms and conorms from empirical data, IEEE transactions on fuzzy systems, vol. 17, no. 5, pp. 1217-1220, IEEE, Piscataway, N.J.
  • Carminati, J., Karimian, H. R., van den Bergh, N. and Vu, K. T. (2009) Shear-free perfect fluids with a solenoidal magnetic curvature, Classical and quantum gravity, vol. 26, no. 19, pp. 1-14, Institute of Physics Publishing, London, England.
  • Chen, Qingfeng and Chen, Yi-Ping Phoebe (2009) Discovery of structural and functional features in RNA pseudoknots, IEEE transactions on knowledge and data engineering, vol. 21, no. 7, pp. 974-984, IEEE, Piscataway, NJ.
  • Chonka, Ashley and Zhou, Wanlei (2009) Chaos theory based detection against network mimicking DDoS attacks, IEEE communications letters, vol. 13, no. 9, pp. 717-719, IEEE, Piscataway, NJ.
  • Dong, Yucheng, Xu, Yinfeng and Yu, Shui (2009) Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model, IEEE transactions on fuzzy systems, vol. 17, no. 6, pp. 1366-1378, I E E E, Piscataway, NJ.
  • Dong, Yucheng, Xu, Yinfeng and Yu, Shui (2009) Linguistic multiperson decision making based on the use of multiple preference relations, Fuzzy sets and systems, vol. 160, no. 5, pp. 603-623, Elsevier BV, North-Holland, Amsterdam, Netherlands.
  • Doss, Robin, Li, Gang, Mak, Vicky, Yu, Shui and Chowdhury, Moshed (2009) Improving the qos for information discovery in autonomic wireless sensor networks, Pervasive and mobile computing, vol. 5, no. 4, pp. 334-349, Elsevier BV, Amsterdam, Netherlands.
  • Ernst, Andreas T., Mak, Vicky H. and Mason, Luke R. (2009) An exact method for the minimum cardinality problem in the treatment planning of intensity-modulated radiotherapy, I N F O R M S journal on computing, vol. 21, no. 4, pp. 562-574, Institute for Operations Research and the Management Sciences (I N F O R M S), Hanover, MD.
  • Islam, Md Rafiqul, Zhou, Wanlei, Guo, Minyi and Xiang, Yang (2009) An innovative analyser for multi-classifier e-mail classification based on grey list analysis, Journal of network and computer applications, vol. 32, no. 2, pp. 357-366, Academic Press, London, England.
  • Islam, Rafiqul, Zhou, Wanlei, Xiang, Yang and Mahmood, Abdun Naser (2009) Spam filtering for network traffic security on a multi-core environment, Concurrency and computation : practice & experience, vol. 21, no. 10, pp. 1307-1320, John Wiley & Sons Ltd., Bognor Regis, England.
  • Javadi, Bahman, Akbari, Mohammad K. and Abawajy, Jemal H. (2009) Multi-cluster computing interconnection network performance modeling and analysis, Future generation computer systems, vol. 25, no. 7, pp. 737-746, Elsevier BV, Amsterdam, The Netherlands.
  • Jiang, Da, Zhou, Shuigeng and Chen, Yi-Ping Phoebe (2009) Compensatory Ability to Null Mutation in Metabolic Networks, Biotechnology and bioengineering, vol. 103, no. 2, pp. 361-369, John Wiley & Sons, Inc, Malden, Mass.
  • Li, Bai and Batten, Lynn (2009) Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of network and computer applications, vol. 32, no. 2, pp. 377-387, Academic Press, London, England.
  • Liu, Zhaobin, Qu, Wenyu, Li, Haitao, Ruan, Min and Zhou, Wanlei (2009) I/O scheduling and performance analysis on multi-core platforms, Concurrency computation practice and experience, vol. 21, no. 10, pp. 1405-1417, John Wiley & Sons Ltd, West Sussex, England.
  • Maloney, Andrew and Goscinski, Andrzej (2009) A survey and review of the current state of rollback-recovery for cluster systems, Concurrency and computation : practice & experience, vol. 21, no. 12, pp. 1632-1666, John Wiley & Sons Ltd., West Sussex, England.
  • Peng, Dezhong and Xiang, Yong (2009) Underdetermined blind source separation based on relaxed sparsity condition of sources, IEEE transactions on signal processing, vol. 57, no. 2, pp. 809-814, IEEE, Piscataway, N.J.
  • Peng, Dezhong, Xiang, Yong and Yi, Zhang (2009) A new adaptive blind channel identification algorithm, Chaos, solitons and fractals, vol. 41, no. 1, pp. 354-359, Pergamon, Kidlington, England.
  • Peng, Dezhong, Yi, Zhang and Xiang, Yong (2009) A unified learning algorithm to extract principal and minor components, Digital signal processing, vol. 19, no. 4, pp. 640-649, Academic Press, Maryland Heights, Mo.
  • Perez, Maria S., Sanchez, Alberto, Abawajy, Jemal H., Robles, Victor and Pena, Jose M. (2009) An agent architecture for managing data resources in a grid environment, Future generation computer systems, vol. 25, no. 7, pp. 747-755, Elsevier BV, Amsterdam, The Netherlands.
  • Phua, Clifton, Gayler, Ross, Lee, Vincent and Smith-Miles, Kate (2009) On the communal analysis suspicion scoring for identity crime in streaming credit applications, European journal of operational research, vol. 195, no. 2, pp. 595-612, Elsevier BV, Amsterdam, Netherlands.
  • Rong, Jia, Li, Gang and Chen, Yi-Ping Phoebe (2009) Acoustic feature selection for automatic emotion recognition from speech, Information processing & management, vol. 45, no. 3, pp. 315-328, Elsevier, Oxford, England.
  • Rong, Jia, Li, Gang and Law, Rob (2009) A contrast analysis of online hotel web service purchasers and browsers, International journal of hospitality management, vol. 28, no. 3, pp. 466-478, Pergamon, Oxford, England.
  • Song, Xiao-Feng, Chen, Wei-Min, Chen, Yi-Ping Phoebe and Jiang, Bin (2009) Candidate working set strategy based SMO algorithm in support vector machine, Information processing & management, vol. 45, no. 5, pp. 584-592, Elsevier Ltd., London, England.
  • Xi, Yanping, Chen, Yi-Ping Phoebe, Cao, Ming, Wang, Weirong and Wang, Fei (2009) Analysis on relationship between extreme pathways and correlated reaction sets, BMC bioinformatics, vol. 10, no. Supplement 1, pp. S58-S71, BioMed Central Ltd, London, England.
  • Xiang, Yang, Zhou, Wanlei and Guo, Minyi (2009) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks, IEEE transactions on parallel and distributed systems, vol. 20, no. 4, pp. 567-580, IEEE, Piscataway, NJ.
  • Xiang, Yong and Ng, Sze Kui (2009) An approach to nonirreducible MIMO FIR channel equalization, IEEE transactions on circuits and systems - part 2 : express briefs, vol. 56, no. 6, pp. 494-498, IEEE, New York, N.Y.
  • Yang, Pengyi, Xu, Liang, Zhou, Bing B., Zhang, Zili and Zomaya, Albert Y. (2009) A particle swarm based hybrid system for imbalances medical data sampling, BMC genomics, vol. 10, BioMed Central, London, England.

Return to top

Back to top