default search action
Chun Ruan
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Inoj Neupane, Seyed A. Shahrestani, Chun Ruan:
Indoor Localization of Resource-Constrained IoT Devices Using Wi-Fi Fingerprinting and Convolutional Neural Network. ACSW 2024: 20-25 - 2020
- [j12]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks. Int. J. Wirel. Networks Broadband Technol. 9(2): 17-42 (2020)
2010 – 2019
- 2019
- [j11]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems. Int. J. Interact. Commun. Syst. Technol. 9(1): 48-76 (2019) - 2018
- [j10]Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Experimenting sensitivity-based anonymization framework in apache spark. J. Big Data 5: 38 (2018) - 2017
- [j9]Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization. J. Big Data 4: 45 (2017) - [c36]Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Towards optimal sensitivity-based anonymization for big data. ITNAC 2017: 1-6 - [c35]Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Implementing A Framework for Big Data Anonymity and Analytics Access Control. TrustCom/BigDataSE/ICESS 2017: 873-880 - 2016
- [c34]Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Sensitivity-Based Anonymization of Big Data. LCN Workshops 2016: 58-64 - [i1]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
QoS Evaluation of Heterogeneous Networks: Application-based Approach. CoRR abs/1602.03563 (2016) - 2015
- [j8]Chun Ruan:
Designing and evaluating weighted delegatable authorizations. Concurr. Comput. Pract. Exp. 27(15): 3877-3891 (2015) - 2014
- [j7]Chun Ruan, Vijay Varadharajan:
Dynamic delegation framework for role based access control in distributed data management systems. Distributed Parallel Databases 32(2): 245-269 (2014) - [c33]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
A fuzzy logic approach for Quality of Service quantification in wireless and mobile networks. LCN Workshops 2014: 629-636 - 2013
- [c32]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
Application Based Handover: An Energy-Efficient Approach for Heterogeneous Networks. CSE 2013: 1185-1190 - [c31]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
QoS analysis and evaluations: Improving cellular-based distance education. LCN Workshops 2013: 17-23 - 2012
- [c30]Farnaz Farid, Seyed A. Shahrestani, Chun Ruan:
A User-Centric Network Architecture for Sustainable Rural Areas. ICAIT 2012: 138-150 - [c29]Chun Ruan:
Evaluating Role Based Authorization Programs. ISMIS 2012: 202-207 - [c28]Farnaz Farid, Chun Ruan, Seyed A. Shahrestani:
Sustainable Rural Areas - Network-based Architecture. SIGMAP 2012: 361-368 - 2011
- [c27]Chun Ruan, Vijay Varadharajan:
Reasoning about Dynamic Delegation in Role Based Access Control Systems. DASFAA (1) 2011: 239-253 - [c26]Chun Ruan, Seyed A. Shahrestani:
Logic based authorization program and its implementation. SIN 2011: 87-94 - 2010
- [j6]Chun Ruan, Vijay Varadharajan:
A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. Distributed Parallel Databases 27(1): 1-29 (2010) - [j5]Bing Du, Chun Ruan:
Robust performance modelling and scheduling of distributed real-time systems. J. Supercomput. 53(1): 122-137 (2010) - [c25]Bing Du, Chun Ruan:
Modeling and Robust Control for Trusted Web Server. EUC 2010: 659-665
2000 – 2009
- 2009
- [j4]Bing Du, Chun Ruan:
FEL-H Robust Control Real-Time Scheduling. J. Softw. Eng. Appl. 2(1): 60-65 (2009) - [j3]Chun Ruan, Sang-Soo Yeo:
Modeling of an Intelligent e-Consent System in a Healthcare Domain. J. Univers. Comput. Sci. 15(12): 2429-2444 (2009) - [c24]Chun Ruan, Vijay Varadharajan:
Reasoning on Weighted Delegatable Authorizations. DEXA 2009: 279-286 - [c23]Chun Ruan, Vijay Varadharajan:
Trust Enhanced Authorization for Mobile Agents. EC-Web 2009: 84-95 - [c22]Bing Du, Chun Ruan:
Real-Time Robust Adaptive Modeling and Scheduling for an Electronic Commerce Server. EC-Web 2009: 205-216 - [c21]Chun Ruan, Ewa Huebner:
Formalizing Computer Forensics Process with UML. UNISCON 2009: 184-189 - [c20]Magdalena Szezynska, Ewa Huebner, Derek Bem, Chun Ruan:
Methodology and Tools of IS Audit and Computer Forensics - The Common Denominator. ISA 2009: 110-121 - 2008
- [c19]Bing Du, Chun Ruan:
Embedded Robust Control Real-Time Scheduling. CSSE (2) 2008: 194-197 - [c18]Ewa Huebner, Derek Bem, Chun Ruan:
Computer Forensics Tertiary Education in Australia. CSSE (5) 2008: 1383-1387 - [c17]Bing Du, Chun Ruan:
Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems. EUC (1) 2008: 90-96 - 2006
- [j2]Chun Ruan, Scott Yang, Geoffrey D. Clarke, Maxwell R. Amurao, Scott R. Partyka, Yong C. Bradley, Kenneth Cusi:
First-Pass Contrast-Enhanced Myocardial Perfusion MRI Using a Maximum Up-Slope Parametric Map. IEEE Trans. Inf. Technol. Biomed. 10(3): 574-580 (2006) - [c16]Chun Ruan, Vijay Varadharajan:
Implementing Authorization Delegations Using Graph. DEXA 2006: 904-913 - [c15]Chun Ruan, Vijay Varadharajan:
Integration of Graph Based Authorization Policies. ISMIS 2006: 359-368 - 2005
- [c14]Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:
Access Policy Sheet for Access Control in Fine-Grained XML. EUC Workshops 2005: 1273-1282 - [c13]Jing Wu, Jennifer Seberry, Yi Mu, Chun Ruan:
Delegatable Access Control for Fine-Grained XML. ICPADS (2) 2005: 270-274 - [c12]Chun Ruan, Vijay Varadharajan:
Data Protection in Distributed Database Systems. ISMIS 2005: 191-199 - 2004
- [c11]Chun Ruan, Vijay Varadharajan:
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ACISP 2004: 402-413 - [c10]Yi Mu, Willy Susilo, Yan-Xia Lin, Chun Ruan:
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ASIAN 2004: 169-181 - 2003
- [j1]Chun Ruan, Vijay Varadharajan:
A formal graph based framework for supporting authorization delegations and conflict resolutions. Int. J. Inf. Sec. 1(4): 211-222 (2003) - [c9]Chun Ruan, Vijay Varadharajan:
An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003: 191-205 - [c8]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 - [c7]Chun Ruan, Vijay Varadharajan:
Decentralized Temporal Authorization Administration. DEXA 2003: 917-926 - [c6]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Evaluation of Authorization with Delegation and Negation. IIS 2003: 547-551 - [c5]Chun Ruan, Vijay Varadharajan:
Supporting E-consent on Health Data by Logic. ISMIS 2003: 392-396 - [c4]Chun Ruan, Vijay Varadharajan, Yan Zhang:
A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003: 310-324 - 2002
- [c3]Chun Ruan, Vijay Varadharajan:
Resolving Conflicts in Authorization Delegations. ACISP 2002: 271-285 - [c2]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002: 185-193
1980 – 1989
- 1985
- [c1]Shu Gang Shi, Zhen Mei Zheng, Mong Chi Liu, Chun Ruan:
Database Research and Development in China. FODO 1985: 621-622
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint