The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Li Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yunbo Wu, Zhishu Li, Yunhai Wu, Zhihua Chen, Tun Lu, Li Wang, Jianjun Hu
    Analysis of Real-Time Communication System with Queuing Priority. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2005, pp:707-713 [Conf]
  2. Fang Liu, Zhiliang Wang, Li Wang, Xiuyan Meng
    Facial Expression Recognition Using HLAC Features and WPCA. [Citation Graph (0, 0)][DBLP]
    ACII, 2005, pp:88-94 [Conf]
  3. Qingguo Shen, Li Wang
    Performance Comparison of Adaptation Approaches for Mobile Information System. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:215-218 [Conf]
  4. Li Wang, Amutha Ramaswamy, Ilya P. Ioshikhes
    Global Dynamics of Nucleosome Arrays: Influence of Variant Histone H2A.Z. [Citation Graph (0, 0)][DBLP]
    BIBE, 2005, pp:271-275 [Conf]
  5. Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyle Ellrott, Li Wang, Inna Vokler, Philip F. LoCascio, Dong Xu, Ying Xu
    A Computational Pipeline for Protein Structure Prediction and Analysis at Genome Scale. [Citation Graph (0, 0)][DBLP]
    BIBE, 2003, pp:3-10 [Conf]
  6. Wanlei Zhou, Li Wang
    Automating the Construction of Replicated Objects in a Cluster of Workstations. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2001, pp:634-639 [Conf]
  7. Baba C. Vemuri, Li Wang, Yunmei Chen
    A Coupled PDE Model of Nonlinear Diffusion for Image Smoothing and Segmentation. [Citation Graph (0, 0)][DBLP]
    CVPR, 1998, pp:132-137 [Conf]
  8. Li Wang, Gil I. Shamir
    BWT Based Universal Lossless Source Controlled Channel Decoding with Low Density Parity Check Codes. [Citation Graph (0, 0)][DBLP]
    DCC, 2005, pp:487- [Conf]
  9. Matthew French, Li Wang, Tyler Anderson, Michael J. Wirthlin
    Post Synthesis Level Power Modeling of FPGAs. [Citation Graph (0, 0)][DBLP]
    FCCM, 2005, pp:281-282 [Conf]
  10. Matthew French, Li Wang, Michael J. Wirthlin
    Power Visualization, Analysis, and Optimization Tools for FPGAs. [Citation Graph (0, 0)][DBLP]
    FCCM, 2006, pp:185-194 [Conf]
  11. Hui Wang, Xueli Yu, Li Wang, Xu Liu
    OGSA Based E-learning System: An Approach to Build Next Generation of Online Education. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:217-220 [Conf]
  12. Yong Wang, Li Wang, Chunming Hu
    A QoS Negotiation Protocol for Grid Workflow. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:195-198 [Conf]
  13. Hongbin Deng, Yihua Xu, Li Wang
    A Real-Time Virtual Environment Rendering System. [Citation Graph (0, 0)][DBLP]
    ICAT Workshops, 2006, pp:458-463 [Conf]
  14. Li Wang, Michael D. Gordon, Ji Zhu
    Regularized Least Absolute Deviations Regression and an Efficient Algorithm for Parameter Tuning. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:690-700 [Conf]
  15. Li Wang, Zhitang Li, Jie Lei, Yao Li
    A novel algorithm SF for mining attack scenarios model. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:55-61 [Conf]
  16. Li Wang, Zeng-zhi Li, Yanping Chen, Ke Xue
    Fluid-Based Stability Analysis of Mixed TCP and UDP Traffic under RED. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:341-348 [Conf]
  17. Yao Li, Zhitang Li, Li Wang
    Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:553-562 [Conf]
  18. Li Wang, Yushu Liu, Yuanqing Xu
    Multi-objective PSO Algorithm Based on Fitness Sharing and Online Elite Archiving. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:964-974 [Conf]
  19. Li Wang, Youren Wang, Rui Yao, Zhai Zhang
    Hardware Implementation of AES Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:904-907 [Conf]
  20. Li Wang, Abhir Bhalerao, Roland Wilson
    Robust Modelling of Local Image Structures and Its Application to Medical Imagery. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2004, pp:534-537 [Conf]
  21. Wei Tan, Zhong Tian, Fangyan Rao, Li Wang, Ru Fang
    Process Guided Service Composition in Building SoA Solutions: A Data Driven Approach. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:558-568 [Conf]
  22. Brian Schott, Michael Bajura, Joseph Czarnaski, Jaroslav Flidr, Tam Tho, Li Wang
    A modular power-aware microsensor with >1000X dynamic power range. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:469-474 [Conf]
  23. Li Wang, Abhir Bhalerao
    Detecting branching structures using local Gaussian models. [Citation Graph (0, 0)][DBLP]
    ISBI, 2002, pp:161-164 [Conf]
  24. Zhidong Tu, Li Wang, Michelle N. Arbeitman, Ting Chen, Fengzhu Sun
    An integrative approach for causal gene identification and gene regulatory pathway inference. [Citation Graph (0, 0)][DBLP]
    ISMB (Supplement of Bioinformatics), 2006, pp:489-496 [Conf]
  25. Li Wang, Qiao Guo
    Mobile Agent Oriented Software Engineering (MAOSE). [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:168-177 [Conf]
  26. Yunbo Wu, Zhishu Li, Zhihua Chen, Yunhai Wu, Li Wang, Tun Lu
    A QoS-Based Scheduling Mechanism for Overlay Aggregate Traffics. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:449-452 [Conf]
  27. Li Wang, Abhir Bhalerao
    Model Based Segmentation for Retinal Fundus Images. [Citation Graph (0, 0)][DBLP]
    SCIA, 2003, pp:422-429 [Conf]
  28. Paul A. Bailes, Dan B. Johnston, Eric J. Salzman, Li Wang
    Full Functional Programming in a Declarative Ada Dialect. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1992, pp:350-358 [Conf]
  29. Weiguo Fan, Ming Luo, Li Wang, Wensi Xi, Edward A. Fox
    Tuning before feedback: combining ranking discovery and blind feedback for robust retrieval. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2004, pp:138-145 [Conf]
  30. Li Wang, Weiguo Fan, Rui Yang, Wensi Xi, Ming Luo, Ye Zhou, Edward A. Fox
    Ranking Function Discovery by Genetic Programming for Robust Retrieval. [Citation Graph (0, 0)][DBLP]
    TREC, 2003, pp:828-836 [Conf]
  31. Rui Yang, Li Wang, Weiguo Fan, Wensi Xi, Ming Luo, Ye Zhou, Edward A. Fox
    VT at TREC-2003: The Web Track Report. [Citation Graph (0, 0)][DBLP]
    TREC, 2003, pp:837-0 [Conf]
  32. Yunlian Sun, Li Wang
    Application of Independent Component Analysis to Financial Time Series Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    VISION, 2005, pp:47-51 [Conf]
  33. Yingjie Li, Xueli Yu, Lili Geng, Li Wang
    Research on Reasoning of the Dynamic Semantic Web Services Composition. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:435-441 [Conf]
  34. Li Wang, Xueli Yu
    Research on Knowledge Communication of Dynamic Virtual Communities Based on Ontology. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:567-572 [Conf]
  35. Yanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang
    Service-Cloud Model of Composed Web Services. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:97-100 [Conf]
  36. Li Wang, Zeng-zhi Li, Yanping Chen
    A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:747-750 [Conf]
  37. Li Wang, Zhitang Li, Qi-hong Wang
    A novel technique of recognizing multi-stage attack behaviour. [Citation Graph (0, 0)][DBLP]
    IWNAS, 2006, pp:188-193 [Conf]
  38. Li Wang, Wenli Wu, Yingjie Li, Xueli Yu
    Content-aware Trust Statement for semantic Grid. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:95- [Conf]
  39. James Coplien, Christopher Exton, Andy Chung, Li Wang
    Distributed Object Technology; the Future. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:416-417 [Conf]
  40. Li Wang, Wanlei Zhou
    An Architecture for Building Reliable Distributed Object-Based Systems. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:260-265 [Conf]
  41. Li Wang, Wanlei Zhou
    Primary-Backup Object Replications in Java. [Citation Graph (0, 0)][DBLP]
    TOOLS (27), 1998, pp:78-82 [Conf]
  42. Li Wang, Wanlei Zhou
    A Tool for Constructing Service Replication Systems. [Citation Graph (0, 0)][DBLP]
    TOOLS (31), 1999, pp:358-361 [Conf]
  43. Zhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen
    A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:347-352 [Conf]
  44. Zuofeng Li, Li Wang, Yang Zhong
    Detecting horizontal gene transfer with T-REX and RHOM programs. [Citation Graph (0, 0)][DBLP]
    Briefings in Bioinformatics, 2005, v:6, n:4, pp:394-401 [Journal]
  45. Derek Kisman, Ming Li, Bin Ma, Li Wang
    tPatternHunter: gapped, fast and sensitive translated homology search . [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2005, v:21, n:4, pp:542-544 [Journal]
  46. Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyle Ellrott, Li Wang, Inna Vokler, Philip F. LoCascio, Dong Xu, Ying Xu
    A computational pipeline for protein structure prediction and analysis at genome scale. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2003, v:19, n:15, pp:1985-1996 [Journal]
  47. Xiaotu Ma, Hyunju Lee, Li Wang, Fengzhu Sun
    CGI: a new approach for prioritizing genes by combining gene expression and protein-protein interaction data. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2007, v:23, n:2, pp:215-221 [Journal]
  48. Li Wang, Yu-Kwong Kwok, Wing-cheong Lau, Vincent K. N. Lau
    Channel adaptive fair queueing for scheduling integrated voice and data services in multicode CDMA systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:9, pp:809-820 [Journal]
  49. Wanlei Zhou, Li Wang, Weijia Jia
    An analysis of update ordering in distributed replication systems. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:4, pp:565-590 [Journal]
  50. Li Wang, Jing-Yao Liu, Ze-Sheng Li, Chia-Chung Sun
    Direct ab initio dynamics studies on the hydrogen-abstraction reactions of OH radicals with HOX (X = F, Cl, and Br). [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2004, v:25, n:4, pp:558-564 [Journal]
  51. Li Wang, Jing-Yao Liu, Ze-Sheng Li, Chia-Chung Sun
    Theoretical study and rate constant calculation for the reactions of SH (SD) with Cl2, Br2, and BrCl. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2005, v:26, n:2, pp:184-193 [Journal]
  52. Li Wang, Nicholas D. Kazarinoff
    On the universal sequence generated by a class of unimodal functions. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1987, v:46, n:1, pp:39-49 [Journal]
  53. Li Wang, Wanlei Zhou, Weijia Jia
    The design and implementation of an active replication scheme for distributing services in a cluster of workstations. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:3, pp:199-210 [Journal]
  54. Li Wang, Yu-Kwong Kwok, Wing-cheong Lau, Vincent K. N. Lau
    Efficient Packet Scheduling Using Channel Adaptive Fair Queueing in Distributed Mobile Computing Systems. [Citation Graph (0, 0)][DBLP]
    MONET, 2004, v:9, n:4, pp:297-309 [Journal]
  55. Li Wang, Theodosios Pavlidis
    Direct Gray-Scale Extraction of Features for Character Recognition. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 1993, v:15, n:10, pp:1053-1067 [Journal]
  56. Dong-Chen He, Li Wang
    Texture features based on texture spectrum. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1991, v:24, n:5, pp:391-399 [Journal]
  57. Dong-Chen He, Li Wang
    Unsupervised textural classification of images using the texture spectrum. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1992, v:25, n:3, pp:247-255 [Journal]
  58. Dong-Chen He, Li Wang
    Textural filters based on the texture spectrum. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1991, v:24, n:12, pp:1187-1195 [Journal]
  59. Dong-Chen He, Li Wang
    Detecting texture edges from images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1992, v:25, n:6, pp:595-600 [Journal]
  60. Dong-Chien He, Li Wang, Jean Guibert
    Texture discrimination based on an optimal utilization of texture features. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1988, v:21, n:2, pp:141-146 [Journal]
  61. Hua-Bin Fang, Jing-Quan Liu, Zheng-Yi Xu, Lu Dong, Li Wang, Di Chen, Bing-Chu Cai, Yue Liu
    Fabrication and performance of MEMS-based piezoelectric power generator for vibration energy harvesting. [Citation Graph (0, 0)][DBLP]
    Microelectronics Journal, 2006, v:37, n:11, pp:1280-1284 [Journal]
  62. Yuan Liu, Hong An, Bo Liang, Li Wang
    An Online Profile Guided Optimization Approach for Speculative Parallel Threading. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2007, pp:28-39 [Conf]
  63. Zhitang Li, Aifang Zhang, Dong Li, Li Wang
    Discovering Novel Multistage Attack Strategies. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:45-56 [Conf]
  64. Yaobin Wang, Hong An, Bo Liang, Li Wang, Ming Cong, Yongqing Ren
    Balancing Thread Partition for Efficiently Exploiting Speculative Thread-Level Parallelism. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:40-49 [Conf]
  65. Sisi Huang, Zhitang Li, Li Wang
    Mining Attack Correlation Scenarios Based on Multi-agent System. [Citation Graph (0, 0)][DBLP]
    HCI (8), 2007, pp:632-641 [Conf]
  66. Min Xie, Youren Wang, Li Wang, Yuan Zhang
    Design on Operator-Based Reconfigurable Hardware Architecture and Cell Circuit. [Citation Graph (0, 0)][DBLP]
    ICES, 2007, pp:140-150 [Conf]
  67. Li Wang, Ji Zhu, Hui Zou
    Hybrid huberized support vector machines for microarray classification. [Citation Graph (0, 0)][DBLP]
    ICML, 2007, pp:983-990 [Conf]
  68. Li Wang, Xuejun Yang, Guibin Wang, Xiaobo Yan, Yu Deng, Jing Du, Ying Zhang, Tao Tang, Kun Zeng
    Implementation and Optimization of Sparse Matrix-Vector Multiplication on Imagine Stream Processor. [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:44-55 [Conf]
  69. Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
    Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:160-171 [Conf]
  70. Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:316-317 [Conf]
  71. Li Wang, Gil I. Shamir, Joseph Boutros
    Universal Context Based Decoding with Non-systematic Low-Density Parity-Check Codes. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:469-473 [Conf]
  72. Gil I. Shamir, Li Wang, Joseph Boutros
    Context Based Decoding of Split-LDPC Codes. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  73. Level Set Segmentation Based on Local Gaussian Distribution Fitting. [Citation Graph (, )][DBLP]


  74. Human Body Articulation for Action Recognition in Video Sequences. [Citation Graph (, )][DBLP]


  75. Remote Video Monitor of Vehicles in Cooperative Information Platform. [Citation Graph (, )][DBLP]


  76. Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR Spectroscopy. [Citation Graph (, )][DBLP]


  77. Novel Network Selection Mechanism Using AHP and Enhanced GA. [Citation Graph (, )][DBLP]


  78. Discriminative human action segmentation and recognition using semi-Markov model. [Citation Graph (, )][DBLP]


  79. A robust parametric method for bias field estimation and segmentation of MR images. [Citation Graph (, )][DBLP]


  80. Reuse-aware modulo scheduling for stream processors. [Citation Graph (, )][DBLP]


  81. Grinding Process Fuzzy Control System Design and Application Based on MATLAB. [Citation Graph (, )][DBLP]


  82. The Global Synthetical Processing of Network Security Events. [Citation Graph (, )][DBLP]


  83. Reducing False Positives Based on Time Sequence Analysis. [Citation Graph (, )][DBLP]


  84. A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. [Citation Graph (, )][DBLP]


  85. Limited Tolerance Relation-Based Decision Tree Algorithm. [Citation Graph (, )][DBLP]


  86. Study on function of urban land price on land spatial expansion based on the gravity model. [Citation Graph (, )][DBLP]


  87. Texture feature extraction and its application in fault signal recognition. [Citation Graph (, )][DBLP]


  88. A Study of Information Retrieval of En Route Display of Fire Information on PDA. [Citation Graph (, )][DBLP]


  89. A Study of Fire Information Detection on PDA Device. [Citation Graph (, )][DBLP]


  90. Design and Implementation of Parallel Lamarckian Genetic Algorithm for Automated Docking of Molecules. [Citation Graph (, )][DBLP]


  91. MMSE Soft-Interference-Cancellation Aided Iterative Center-Shifting K-Best Sphere Detection for MIMO Channels. [Citation Graph (, )][DBLP]


  92. Real-Time Correlation of Network Security Alerts. [Citation Graph (, )][DBLP]


  93. Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. [Citation Graph (, )][DBLP]


  94. Learning Sparse SVM for Feature Selection on Very High Dimensional Datasets. [Citation Graph (, )][DBLP]


  95. Stochastic transportation programming model based on effect synthesis. [Citation Graph (, )][DBLP]


  96. Dynamic Transfer Control of Components of Complex Software System Based on Multi-agent. [Citation Graph (, )][DBLP]


  97. A multistage scenario-based inexact fuzzy-stochastic chance-constrained programming for water resources management under uncertainty. [Citation Graph (, )][DBLP]


  98. Intelligent simulation on refrigeration system using artificial neural network. [Citation Graph (, )][DBLP]


  99. Efficient generation of stream programs from loops. [Citation Graph (, )][DBLP]


  100. The SOA-Based Knowledge Management in the VROs. [Citation Graph (, )][DBLP]


  101. Asymptotic behavior of stochastic Cohen-Grossberg neural networks with variable delays. [Citation Graph (, )][DBLP]


  102. An adjustable CMOS floating resistor. [Citation Graph (, )][DBLP]


  103. Optimizing scientific application loops on stream processors. [Citation Graph (, )][DBLP]


  104. Automatic Segmentation of Neonatal Images Using Convex Optimization and Coupled Level Set Method. [Citation Graph (, )][DBLP]


  105. Brain MR Image Segmentation Using Local and Global Intensity Fitting Active Contours/Surfaces. [Citation Graph (, )][DBLP]


  106. Query aware visual similarity propagation for image search reranking. [Citation Graph (, )][DBLP]


  107. Comparability graph coloring for optimizing utilization of stream register files in stream processors. [Citation Graph (, )][DBLP]


  108. Improving complex distributed software system availability through information hiding. [Citation Graph (, )][DBLP]


  109. Query sampling for ranking learning in web search. [Citation Graph (, )][DBLP]


  110. Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP]


  111. Automatic attack plan recognition from intrusion alerts. [Citation Graph (, )][DBLP]


  112. Can We Get A Better Retrieval Function From Machine? [Citation Graph (, )][DBLP]


  113. A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation. [Citation Graph (, )][DBLP]


  114. Channel Coded Iterative Center-Shifting K-Best Sphere Detection for Rank-Deficient Systems. [Citation Graph (, )][DBLP]


  115. Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels. [Citation Graph (, )][DBLP]


  116. A Dynamic Periodic Distributing Scheme for Authentication data based on EAP-AKA in Heterogeneous Interworking Networks. [Citation Graph (, )][DBLP]


  117. Multiple-Symbol Differential Sphere Detection for Amplifyand-Forward Cooperative Transmissions. [Citation Graph (, )][DBLP]


  118. A Near-Capacity Differentially Encoded Non-Coherent Adaptive Multiple-Symbol-Detection Aided Three-Stage Coded Scheme. [Citation Graph (, )][DBLP]


  119. To Cooperate or Not: A Capacity Perspective. [Citation Graph (, )][DBLP]


  120. An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks. [Citation Graph (, )][DBLP]


  121. Performance modeling on dynamic authentication data management in heterogeneous interworking networks. [Citation Graph (, )][DBLP]


  122. Urban Land Classification Research Based on Data Field. [Citation Graph (, )][DBLP]


  123. K-Best Sphere Detection for the Sphere Packing Modulation Aided SDMA/OFDM Uplink. [Citation Graph (, )][DBLP]


  124. The Resource-Optimized Differentially Modulated Hybrid AF/DF Cooperative Cellular Uplink. [Citation Graph (, )][DBLP]


  125. Research on Content-awareness Protocol of Knowledge Communication Based on Ontology. [Citation Graph (, )][DBLP]


  126. The Cleavage Furrow Contractile Stress Analysis in Dividing NRK Cells. [Citation Graph (, )][DBLP]


  127. Rebinning Methods for Cone Beam SPECT Reconstruction with Non-Uniform Attenuation. [Citation Graph (, )][DBLP]


  128. New Minitraumatic Method for a Simulation of Continuous Intracranial Pressure Curves with Strain Electrometric Technology in Rats. [Citation Graph (, )][DBLP]


  129. An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval. [Citation Graph (, )][DBLP]


  130. Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. [Citation Graph (, )][DBLP]


  131. A Double-Buffering Strategy for the SRF management in the Imagine Stream Processor. [Citation Graph (, )][DBLP]


  132. Three-Stage Serially Concatenated Codes and Iterative Center-Shifting K-Best Sphere Detection for SDM-OFDM: An EXIT Chart Aided Perspective. [Citation Graph (, )][DBLP]


  133. A Fiber-sensor-based Long-distance Safety Monitoring System for buried Oil Pipeline. [Citation Graph (, )][DBLP]


  134. Discovering Novel Multistage Attack Patterns in Alert Streams. [Citation Graph (, )][DBLP]


  135. Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP]


  136. Simulation-Based Optimization on MPEG-4 over SCTP Multi-streaming with Differentiated Retransmission Policy in Lossy Link. [Citation Graph (, )][DBLP]


  137. QGWEngine: A QoS-Aware Grid Workflow Engine. [Citation Graph (, )][DBLP]


  138. Scaling the Performance of Tiled Processor Architectures with On-Chip-Network Topology. [Citation Graph (, )][DBLP]


  139. Model and Algorithms for Emergency Service Facility Location Problem. [Citation Graph (, )][DBLP]


  140. Obstacle-avoidance Path Planning for Soccer Robots Using Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  141. Developing a computer system for health assessment. [Citation Graph (, )][DBLP]


  142. Illumination Invariant Color Model for Object Recognition in Robot Soccer. [Citation Graph (, )][DBLP]


  143. The Progress in Modeling Research of Urban Spheres of Influence in China. [Citation Graph (, )][DBLP]


  144. GDAL-based extend ArcGIS Engine's support for HDF file format. [Citation Graph (, )][DBLP]


  145. Hybrid huberized support vector machines for microarray classification and gene selection. [Citation Graph (, )][DBLP]


  146. Molecular field feature extraction and analysis with level set method. [Citation Graph (, )][DBLP]


  147. Scaling of critical connectivity of mobile ad hoc communication networks [Citation Graph (, )][DBLP]


Search in 0.011secs, Finished in 0.567secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002