Search the dblp DataBase
Ke Xu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ke Xu , Héctor Muñoz-Avila CaBMA: Case-Based Project Management Assistant. [Citation Graph (0, 0)][DBLP ] AAAI, 2004, pp:931-936 [Conf ] Ke Xu , Héctor Muñoz-Avila A Domain-Independent System for Case-Based Task Decomposition without Domain Theories. [Citation Graph (0, 0)][DBLP ] AAAI, 2005, pp:234-240 [Conf ] Dan Li , Jianping Wu , Ke Xu , Yong Cui , Ying Liu , Xiaoping Zhang Performance Analysis of Multicast Routing Protocol PIM-SM. [Citation Graph (0, 0)][DBLP ] AICT/SAPIR/ELETE, 2005, pp:157-162 [Conf ] Tran Cong Thien Qui , Ta Huynh Duy Nguyen , Asitha Mallawaarachchi , Ke Xu , Wei Liu , Shang Ping Lee , Zhiying Zhou , Sze Lee Teo , Hui Siang Teo , Le Nam Thang , Yu Li , Adrian David Cheok , Hirokazu Kato Magic land: live 3D human capture mixed reality interactive system. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2005, pp:1142-1143 [Conf ] Ke Xu , Yuexuan Wang , Cheng Wu Aspect Oriented Region Analysis for Efficient Grid Application Reasoning. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:28-31 [Conf ] Ke Xu , Yuexuan Wang , Cheng Wu Ensuring Secure and Robust Grid Applications - From a Formal Method Point of View. [Citation Graph (0, 0)][DBLP ] GPC, 2006, pp:537-546 [Conf ] Suogang Li , Jianping Wu , Ke Xu , Ying Liu Heterogeneous QoS Multicast and Its Improvement on Edge-Based Overlay Networks. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:436-446 [Conf ] Kun Wu , Jianping Wu , Ke Xu A Tree-Based Distributed Model for BGP Route Processing. [Citation Graph (0, 0)][DBLP ] HPCC, 2006, pp:119-128 [Conf ] Stephen R. Tate , Ke Xu Mobile Agent Security Through Multi-Agent Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2003, pp:462-470 [Conf ] Jin Qi , Yangsheng Wang , Zhongchao Shi , Ke Xu , Xuying Zhao Fingerprint Matching Integrating the Global Orientation Field with Minutia. [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:337-343 [Conf ] Guozhi Wei , Anne Wei , Ke Xu , Hui Deng Handover Control Function Based Handover for Mobile IPv6. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:17-24 [Conf ] Kun Wu , Jianping Wu , Ke Xu A Novel Control Plane Model of Extensible Routers. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:33-40 [Conf ] Ke Xu , Héctor Muñoz-Avila CBM-Gen+: An Algorithm for Reducing Case Base Inconsistencies in Hierarchical and Incomplete Domains. [Citation Graph (0, 0)][DBLP ] ICCBR, 2003, pp:665-678 [Conf ] Ke Xu , Héctor Muñoz-Avila Maintaining Consistency in Project Planning Reuse. [Citation Graph (0, 0)][DBLP ] ICCBR, 2003, pp:679-690 [Conf ] Ke Xu , Ying Liu , Cheng Wu Guided Reasoning of Complex E-Business Process with Business Bug Patterns. [Citation Graph (0, 0)][DBLP ] ICEBE, 2006, pp:195-202 [Conf ] Shilong Ma , Yuefei Sui , Ke Xu The Limits of Horn Logic Programs. [Citation Graph (0, 0)][DBLP ] ICLP, 2002, pp:467- [Conf ] Shen Lin , Yong Cui , Mingwei Xu , Ke Xu Quality of Service Routing Network and Performance Evaluation. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:202-209 [Conf ] Hui-shan Liu , Ke Xu , Mingwei Xu , Yong Cui S-Chord: Hybrid Topology Makes Chord Efficient. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:480-487 [Conf ] Luo Wen , Jianping Wu , Ke Xu Overlay Logging: An IP Traceback Scheme in MPLS Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:75-82 [Conf ] Yong Cui , Ke Xu , Jianping Wu Multi-constrained End-to-End Admission Control in Core-Stateless Networks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:420-429 [Conf ] Yong Cui , Ke Xu , Mingwei Xu , Jianping Wu Optimal QoS Routing Based on Extended Simulated Annealing. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:553-562 [Conf ] Suogang Li , Jianping Wu , Ke Xu ComBAQ: Provisioning Loss Differentiated Services for Hybrid Traffic in Routers. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:313-320 [Conf ] Zhiyong Liang , Ke Xu , Jianping Wu A Scalable Parallel Lookup Framework Avoiding Longest Prefix Match. [Citation Graph (0, 0)][DBLP ] ICOIN, 2004, pp:616-625 [Conf ] Hui-shan Liu , Ke Xu , Mingwei Xu , Yong Cui 3Sons: Semi-structured Substrate Support for Overlay Network Services. [Citation Graph (0, 0)][DBLP ] ICOIN, 2005, pp:590-599 [Conf ] Feng Shi , Jianping Wu , Ke Xu The Stability Problem of Multicast Trees in Layered Multicast. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:212-221 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu , Mingwei Xu SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:515-524 [Conf ] Yong Cui , Lingjian Song , Ke Xu RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:764-774 [Conf ] Lijun Wang , Ke Xu , Jianping Wu BGP Route Selection Notice. [Citation Graph (0, 0)][DBLP ] ICOIN, 2006, pp:440-449 [Conf ] Ke Xu , Frédéric Boussemart , Fred Hemery , Christophe Lecoutre A Simple Model to Generate Hard Satisfiable Instances. [Citation Graph (0, 0)][DBLP ] IJCAI, 2005, pp:337-342 [Conf ] Yong Cui , Ke Xu , Jianping Wu Precomputation for Multi-constrained QoS Routing in High-speed Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Miao Zhang , Fengyuan Ren , Jianping Wu , Ke Xu Using fuzzy-PI controller in active queue management. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:742-747 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:57-62 [Conf ] Dan Li , Jianping Wu , Yong Cui , Jiangchuan Liu , Ke Xu Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. [Citation Graph (0, 0)][DBLP ] ISCIS, 2006, pp:844-853 [Conf ] Ke Xu , Jiangchuan Liu , Lizheng Fu , Chunyu Liu On the Stability of Application-Layer Multicast Tree. [Citation Graph (0, 0)][DBLP ] ISCIS, 2006, pp:401-412 [Conf ] Qiang Ding , Ke Xu , Hui-shan Liu Construct Optimal Diameter Network and d-partition Routing Algorithm. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:74-81 [Conf ] Ke Xu , Stephen R. Tate Universally Composable Secure Mobile Agent Computation. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:304-317 [Conf ] Ke Xu , Adrian David Cheok , Kar Wee Chia , Simon Prince Visual Registration for Geographical Labeling in Wearable Computing. [Citation Graph (0, 0)][DBLP ] ISWC, 2002, pp:109-116 [Conf ] Lei Sun , Ke Xu , Weidong Liu , Jianping Wu TMS: A Scalable Transition Multicast Scheme. [Citation Graph (0, 0)][DBLP ] IWDC, 2003, pp:80-90 [Conf ] Adrian David Cheok , Ke Xu , Wei Liu , Diego Diaz Garcia , Clara Boj Tovar Aesthetic Entertainment of Social Network Interaction: Free Network Visible Network. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:527-530 [Conf ] Yuexuan Wang , Cheng Wu , Ke Xu Study on pi-Calculus Based Equipment Grid Service Chain Model. [Citation Graph (0, 0)][DBLP ] NPC, 2005, pp:40-47 [Conf ] Qingguo Zheng , Ke Xu , Shilong Ma When to Update the Sequential Patterns of Stream Data? [Citation Graph (0, 0)][DBLP ] PAKDD, 2003, pp:545-550 [Conf ] Dan Li , Yong Cui , Ke Xu , Jianping Wu Improvement of Multicast Routing Protocol Using Petri Nets. [Citation Graph (0, 0)][DBLP ] RSFDGrC (2), 2005, pp:634-643 [Conf ] JianJun Yu , Hao Su , Gang Zhou , Ke Xu SNet: skip graph based semantic web services discovery. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:1393-1397 [Conf ] Kun Wu , Jianping Wu , Lizheng Fu , Ke Xu PS2 : An HA-Enabled Memory Management Scheme In Core Routers. [Citation Graph (0, 0)][DBLP ] ICNS, 2006, pp:26- [Conf ] Ke Xu , Yuexuan Wang , Cheng Wu Service Provenance based Abstraction of Grid Application Knowledge. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:50- [Conf ] Zhao Li , Lizheng Fu , Ke Xu , Zhenyu Shi , Jianping Wu Smooth Handoff Based on Virtual Interface in Wireless Network. [Citation Graph (0, 0)][DBLP ] ICWMC, 2006, pp:79- [Conf ] Ke Xu , Wei Li An Average Analysis of Backtracking on Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2001, v:33, n:1, pp:21-37 [Journal ] Simon Prince , Ke Xu , Adrian David Cheok Augmented Reality Camera Tracking with Homographies. [Citation Graph (0, 0)][DBLP ] IEEE Computer Graphics and Applications, 2002, v:22, n:6, pp:39-45 [Journal ] Yong Cui , Jianping Wu , Ke Xu Precomputation for intra-domain QoS routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:47, n:6, pp:923-937 [Journal ] Ke Xu , Wei Li Exact Phase Transitions in Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li The SAT Phase Transition [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li On the Average Similarity Degree between Solutions of Random k-SAT and Random CSPs [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Shilong Ma , Yuefei Sui , Ke Xu The Prioritized Inductive Logic Programs [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Wen-Yu Dong , Ke Xu , Meng-Xiang Lin A Situation Calculus-based Approach To Model Ubiquitous Information Services [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li An Average Analysis of Backtracking on Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Qingguo Zheng , Ke Xu , Shilong Ma , Weifeng Lv The Algorithms of Updating Sequetial Patterns [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Qingguo Zheng , Ke Xu , Shilong Ma When to Update the sequential patterns of stream data? [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Shilong Ma , Yuefei Sui , Ke Xu The Limits of Horn Logic Programs [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Wei Li , Shilong Ma , Yuefei Sui , Ke Xu A Logical Framework for Convergent Infinite Computations [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Qingguo Zheng , Ke Xu , Weifeng Lv , Shilong Ma Intelligent Search of Correlated Alarms from Database containing Noise Data [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Qingguo Zheng , Ke Xu , Weifeng Lv , Shilong Ma Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li On the average similarity degree between solutions of random k-SAT and random CSPs. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:136, n:1, pp:125-149 [Journal ] Ke Xu , Wei Li Exact Phase Transitions in Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP ] J. Artif. Intell. Res. (JAIR), 2000, v:12, n:, pp:93-103 [Journal ] Ke Xu , Jianping Wu , Zhongchao Yu , Mingwei Xu A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:2, pp:219-226 [Journal ] Jian-Ping Wu , Ke Xu Research on Next-Generation Internet Architecture. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:5, pp:723-731 [Journal ] Ke Xu , Simon Prince , Adrian David Cheok , Yan Qiu , Krishnamoorthy Ganesh Kumar Visual registration for unprepared augmented reality environments. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 2003, v:7, n:5, pp:287-298 [Journal ] Ke Xu , Wei Li Many hard examples in exact phase transitions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:355, n:3, pp:291-302 [Journal ] Farzam Farbiz , Adrian David Cheok , Wei Liu , Zhiying Zhou , Ke Xu , Simon Prince , Mark Billinghurst , Hirokazu Kato Live three-dimensional content for augmented reality. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2005, v:7, n:3, pp:514-523 [Journal ] Ta Huynh Duy Nguyen , Tran Cong Thien Qui , Ke Xu , Adrian David Cheok , Sze Lee Teo , Zhiying Zhou , Asitha Mallawaarachchi , Shang Ping Lee , Wei Liu , Hui Siang Teo , Le Nam Thang , Yu Li , Hirokazu Kato Real-Time 3D Human Capture System for Mixed-Reality Art and Entertainment. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Vis. Comput. Graph., 2005, v:11, n:6, pp:706-721 [Journal ] Clara Boj , Diego J. Díaz , Adrian David Cheok , Ke Xu , Wei Liu Free network visible network. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2005, pp:395-396 [Conf ] Guozhi Wei , Anne Wei , Ke Xu , Gerard Dupeyrat Optimization of Mobile IPv6 Handover Performance Using E-HCF Method. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2007, pp:506-513 [Conf ] Ke Xu , Oliver Chiu-sing Choy , Cheong-fat Chan , Kong-Pong Pun Power-efficient VLSI implementation of bitstream parsing in H.264/AVC decoder. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Rui Sun , Ke Xu , Zhao Li , Li Zhang A Strategyproof Protocol in Mesh-Based Overlay Streaming System. [Citation Graph (0, 0)][DBLP ] MMM (1), 2007, pp:495-504 [Conf ] Xin Li , Tian Liu , Han Peng , Liyan Qian , Hongtao Sun , Jin Xu , Ke Xu , Jiaqi Zhu Improved Exponential Time Lower Bound of Knapsack Problem Under BT Model. [Citation Graph (0, 0)][DBLP ] TAMC, 2007, pp:624-631 [Conf ] Yu Jianjun , Guo Shengmin , Su Hao , Zhang Hui , Xu Ke A kernel based structure matching for web services search. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:1249-1250 [Conf ] Ke Xu , Frédéric Boussemart , Fred Hemery , Christophe Lecoutre Random constraint satisfaction: Easy generation of hard (satisfiable) instances. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2007, v:171, n:8-9, pp:514-534 [Journal ] Wang Lijun , Wu Jianping , Xu Ke Modified flap damping mechanism to improve inter-domain routing convergence. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:7, pp:1588-1599 [Journal ] AutoSig-Automatically Generating Signatures for Applications. [Citation Graph (, )][DBLP ] Mining Compressed Repetitive Gapped Sequential Patterns Efficiently. [Citation Graph (, )][DBLP ] Analysis of BGP Convergence Using SHLPN Model. [Citation Graph (, )][DBLP ] Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis. [Citation Graph (, )][DBLP ] Improving BitTorrent Network's Performance via Deploying Helpers. [Citation Graph (, )][DBLP ] Decision-Making for Ecological Reservoir Operation Based on Lamda Fuzzy Measures. [Citation Graph (, )][DBLP ] The Compound Consistency Induced Ordered Weighted Averaging operator and its application to reservoir operation. [Citation Graph (, )][DBLP ] A Hash Tree Based Authentication Scheme in SIP Applications. [Citation Graph (, )][DBLP ] Quadratic Residue Based Address Allocation for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Caching the P2P Traffic in ISP Network. [Citation Graph (, )][DBLP ] Concern Oriented Business Process Modeling. [Citation Graph (, )][DBLP ] A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System. [Citation Graph (, )][DBLP ] Evaluating Service Scalability of Network Architectures. [Citation Graph (, )][DBLP ] An application of support vector machines for image retrieval. [Citation Graph (, )][DBLP ] Low-power H.264/AVC baseline decoder for portable applications. [Citation Graph (, )][DBLP ] A Variation of Route Flap Damping to Improve BGP Routing Convergence. [Citation Graph (, )][DBLP ] Identify P2P Traffic by Inspecting Data Transfer Behaviour. [Citation Graph (, )][DBLP ] Web 2.0 traffic measurement: analysis on online map applications. [Citation Graph (, )][DBLP ] Collaborative delay-aware scheduling in peer-to-peer UGC video sharing. [Citation Graph (, )][DBLP ] On Tracker Selection for Peer-to-Peer Traffic Locality. [Citation Graph (, )][DBLP ] Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells. [Citation Graph (, )][DBLP ] Truthful application-layer multicast in mesh-based selfish overlays. [Citation Graph (, )][DBLP ] A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. [Citation Graph (, )][DBLP ] An improved Wu-Manber multiple patterns matching algorithm. [Citation Graph (, )][DBLP ] Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences. [Citation Graph (, )][DBLP ] Hierarchical Packet Scheduling for Satellite Multimedia Broadcasting: An Adaptive QoS-Aware Design. [Citation Graph (, )][DBLP ] Tod-Cache: Peer-to-Peer Traffic Management and Optimization Using Combined Caching and Redirection. [Citation Graph (, )][DBLP ] A Logic Distance-Based Method for Deploying Probing Sources in the Topology Discovery. [Citation Graph (, )][DBLP ] Intelligent search of correlated alarms from database containing noise data. [Citation Graph (, )][DBLP ] NetRiver, a computer network experiment system. [Citation Graph (, )][DBLP ] Proportional fairness of call blocking probability. [Citation Graph (, )][DBLP ] Proxy caching for peer-to-peer live streaming. [Citation Graph (, )][DBLP ] Performance model and evaluation on geographic-based routing. [Citation Graph (, )][DBLP ] Identify P2P traffic by inspecting data transfer behavior. [Citation Graph (, )][DBLP ] A Simple Model to Generate Hard Satisfiable Instances [Citation Graph (, )][DBLP ] From k-SAT to k-CSP: Two Generalized Algorithms [Citation Graph (, )][DBLP ] On the Scaling Window of Model RB [Citation Graph (, )][DBLP ] Exact phase transition of backtrack-free search with implications on the power of greedy algorithms [Citation Graph (, )][DBLP ] Time series of Internet AS-level topology graphs: four patterns and one model [Citation Graph (, )][DBLP ] Enhancing the robustness of scale-free networks [Citation Graph (, )][DBLP ] Modeling the IPv6 Internet AS-level Topology [Citation Graph (, )][DBLP ] Mining Compressed Repetitive Gapped Sequential Patterns Efficiently [Citation Graph (, )][DBLP ] Complex networks: A mixture of power-law and Weibull distributions [Citation Graph (, )][DBLP ] Weak Ties: A Subtle Role in the Information Diffusion of Online Social Networks [Citation Graph (, )][DBLP ] BPSL Modeler - Visual Notation Language for Intuitive Business Property Reasoning. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.763secs