default search action
Manghui Tu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j15]Bridget A. Nee, Manghui Tu:
The Social Economic, Environmental, Human Health, and Cybersecurity Impacts of Wireless and Mobile Computing. J. Commun. 13(1): 32-39 (2018) - [c19]Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, Jonathan White:
Game based Cybersecurity Training for High School Students. SIGCSE 2018: 68-73 - 2017
- [c18]Manghui Tu, Kyle W. Riordan, Geyang Xie, Shuhui Yang:
A secure contact protocol for delay tolerant networks. ICIS 2017: 5-11 - 2016
- [j14]Dianxiang Xu, Weifeng Xu, Manghui Tu, Ning Shen, William C. Chu, Chih-Hung Chang:
Automated Integration Testing Using Logical Contracts. IEEE Trans. Reliab. 65(3): 1205-1222 (2016) - 2015
- [j13]Manghui Tu:
Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments. J. Digit. Forensics Secur. Law 10(1): 27-44 (2015) - 2014
- [j12]Manghui Tu, I-Ling Yen:
Distributed replica placement algorithms for correlated data. J. Supercomput. 68(1): 245-273 (2014) - [c17]Dianxiang Xu, Weifeng Xu, Manghui Tu:
Automated Generation of Integration Test Sequences from Logical Contracts. COMPSAC Workshops 2014: 632-637 - 2013
- [j11]Manghui Tu, Hui Ma, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani, Dianxiang Xu:
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing. J. Grid Comput. 11(1): 103-127 (2013) - [j10]Manghui Tu, Dianxiang Xu:
Resilience as a New System Engineering for Cloud Computing. J. Commun. 8(4): 267-274 (2013) - [c16]Manghui Tu, Dianxiang Xu:
System resilience modeling and enhancement for the cloud. ICNC 2013: 1021-1025 - [c15]Manghui Tu, Liangliang Xiao, Dianxiang Xu:
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability. SERE 2013: 178-187 - 2012
- [j9]Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin:
On the Development of Digital Forensics Curriculum. J. Digit. Forensics Secur. Law 7(3): 13-32 (2012) - [j8]Manghui Tu:
Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System. J. Digit. Forensics Secur. Law 7(4): 73-98 (2012) - [j7]Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu:
Automated Security Test Generation with Formal Threat Models. IEEE Trans. Dependable Secur. Comput. 9(4): 526-540 (2012) - 2011
- [c14]Manghui Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu:
Reach Availability Modeling of Replicated Services. COMPSAC 2011: 688-693 - 2010
- [j6]Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thuraisingham, Latifur Khan:
Secure Data Objects Replication in Data Grid. IEEE Trans. Dependable Secur. Comput. 7(1): 50-64 (2010) - [c13]Zhonghang Xia, Wenke Zhang, Manghui Tu, I-Ling Yen:
Kernel-based Approaches for Collaborative Filtering. ICMLA 2010: 229-234
2000 – 2009
- 2009
- [j5]Manghui Tu, Zhonghang Xia, Peng Li, Nasser Tadayon:
Allocation of partitioned data by using a neural network based approach. Neurocomputing 72(4-6): 1000-1011 (2009) - 2008
- [c12]Nasser Tadayon, Ramin Tadayon, Manghui Tu:
Recruiting Students to Computer Science Program via Online Games. FECS 2008: 231-235 - [c11]Zhonghang Xia, Houduo Qi, Manghui Tu, Wenke Zhang:
Data Integration for Recommendation Systems. ICMLA 2008: 863-866 - [c10]Manghui Tu, Nasser Tadayon, Zhonghang Xia, Enyue Lu:
A Scalable Update Protocol for Peer-to-Peer Data Grids. PDPTA 2008: 826-832 - 2007
- [j4]Peng Li, Manghui Tu, I-Ling Yen, Zhonghang Xia:
Preference update for e-commerce applications: Model, language, and processing. Electron. Commer. Res. 7(1): 17-44 (2007) - [c9]Manghui Tu, Dongfeng Wang, Peng Li, Nasser Tadayon:
Allocation of Partitioned Data by Using A Neural Network Based Approach. Security and Management 2007: 381-387 - [c8]Manghui Tu, Liangliang Xiao, Hui Ma, I-Ling Yen, Farokh B. Bastani:
Placement in Dependable and Secure Peer-to-Peer Data Grids. HASE 2007: 133-140 - [c7]Manghui Tu, Nasser Tadayon, Zhonghang Xia, Enyue Lu:
A Secure and Scalable Update Protocol for P2P Data Grids. HASE 2007: 423-424 - [c6]Yulin Dong, Manghui Tu, Zhonghang Xia, Guangming Xing:
An optimization method for selecting parameters in support vector machines. ICMLA 2007: 1-6 - [c5]Manghui Tu, Dongfeng Wang, Yanjin Zhang, I-Ling Yen:
Correlated Data Placement in Widely Distributed Systems. PDPTA 2007: 44-50 - 2006
- [j3]Manghui Tu, Peng Li, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani:
Replica Placement Algorithms for Mobile Transaction Systems. IEEE Trans. Knowl. Data Eng. 18(7): 954-970 (2006) - 2005
- [j2]Peng Li, Zhonghang Xia, Manghui Tu, I-Ling Yen:
M3-Update: A New Update Model for E-Commerce and Web-Based Applications. Int. J. Comput. Their Appl. 12(3): 152-162 (2005) - [j1]Manish Gupta, Manghui Tu, Latifur Khan, Farokh B. Bastani, I-Ling Yen:
A study of the model and algorithms for handling location-dependent continuous queries. Knowl. Inf. Syst. 8(4): 414-437 (2005) - [c4]Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui Tu, Farokh B. Bastani:
An Adaptive Multiparty Protocol for Secure Data Protection. ICPADS (1) 2005: 43-49 - [c3]Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farokh B. Bastani:
On the Optimal Placement of Secure Data Objects over Internet. IPDPS 2005 - 2004
- [c2]Manghui Tu, Peng Li, I-Ling Yen:
Transaction Based Dynamic Partial Replication in Mobile Environments. IPDPS 2004 - 2003
- [c1]Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Yen:
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications. COMPSAC 2003: 690-695
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint