Author of the publication

Web Application Security Gateway with Java Non-blocking IO.

, , , , and . NGITS, volume 4032 of Lecture Notes in Computer Science, page 96-105. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IBM research in China.. Interactions, 13 (2): 20-21 (2006)From offline to online: connecting people with a mobile social networking application at a conference., , , and . CCHI, page 40-49. ACM, (2014)Do We Talk Differently: Cross Culture Study on Conference Call., , and . HCI (10), volume 4559 of Lecture Notes in Computer Science, page 637-645. Springer, (2007)A New Reconstruction Algorithm in Spline Signal Spaces., , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 204-209. Springer, (2006)GERMPLASM SELECTION BASED ON THE DEPTH LEARNING NETWORK MOBILENET, , and . (2022)Graph-based deep Convolutional networks for Hyperspectral image classification., , and . IGARSS, page 3270-3273. IEEE, (2016)Long and Short Term Risk Control for Online Portfolio Selection., , , , and . KSEM (2), volume 12275 of Lecture Notes in Computer Science, page 472-480. Springer, (2020)Automatic Generation of Capability Leaks' Exploits for Android Applications., , , , , and . ICST Workshops, page 291-295. IEEE, (2019)KeggExp: a web server for visual integration of KEGG pathways and expression profile data., , , , , , , , , and 2 other author(s). Bioinform., 35 (8): 1430-1432 (2019)A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses., , and . IJCNN, page 1-7. IEEE, (2020)