The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ke Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ke Xu, Héctor Muñoz-Avila
    CaBMA: Case-Based Project Management Assistant. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:931-936 [Conf]
  2. Ke Xu, Héctor Muñoz-Avila
    A Domain-Independent System for Case-Based Task Decomposition without Domain Theories. [Citation Graph (0, 0)][DBLP]
    AAAI, 2005, pp:234-240 [Conf]
  3. Dan Li, Jianping Wu, Ke Xu, Yong Cui, Ying Liu, Xiaoping Zhang
    Performance Analysis of Multicast Routing Protocol PIM-SM. [Citation Graph (0, 0)][DBLP]
    AICT/SAPIR/ELETE, 2005, pp:157-162 [Conf]
  4. Tran Cong Thien Qui, Ta Huynh Duy Nguyen, Asitha Mallawaarachchi, Ke Xu, Wei Liu, Shang Ping Lee, Zhiying Zhou, Sze Lee Teo, Hui Siang Teo, Le Nam Thang, Yu Li, Adrian David Cheok, Hirokazu Kato
    Magic land: live 3D human capture mixed reality interactive system. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2005, pp:1142-1143 [Conf]
  5. Ke Xu, Yuexuan Wang, Cheng Wu
    Aspect Oriented Region Analysis for Efficient Grid Application Reasoning. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:28-31 [Conf]
  6. Ke Xu, Yuexuan Wang, Cheng Wu
    Ensuring Secure and Robust Grid Applications - From a Formal Method Point of View. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:537-546 [Conf]
  7. Suogang Li, Jianping Wu, Ke Xu, Ying Liu
    Heterogeneous QoS Multicast and Its Improvement on Edge-Based Overlay Networks. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:436-446 [Conf]
  8. Kun Wu, Jianping Wu, Ke Xu
    A Tree-Based Distributed Model for BGP Route Processing. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:119-128 [Conf]
  9. Stephen R. Tate, Ke Xu
    Mobile Agent Security Through Multi-Agent Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:462-470 [Conf]
  10. Jin Qi, Yangsheng Wang, Zhongchao Shi, Ke Xu, Xuying Zhao
    Fingerprint Matching Integrating the Global Orientation Field with Minutia. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:337-343 [Conf]
  11. Guozhi Wei, Anne Wei, Ke Xu, Hui Deng
    Handover Control Function Based Handover for Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:17-24 [Conf]
  12. Kun Wu, Jianping Wu, Ke Xu
    A Novel Control Plane Model of Extensible Routers. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:33-40 [Conf]
  13. Ke Xu, Héctor Muñoz-Avila
    CBM-Gen+: An Algorithm for Reducing Case Base Inconsistencies in Hierarchical and Incomplete Domains. [Citation Graph (0, 0)][DBLP]
    ICCBR, 2003, pp:665-678 [Conf]
  14. Ke Xu, Héctor Muñoz-Avila
    Maintaining Consistency in Project Planning Reuse. [Citation Graph (0, 0)][DBLP]
    ICCBR, 2003, pp:679-690 [Conf]
  15. Ke Xu, Ying Liu, Cheng Wu
    Guided Reasoning of Complex E-Business Process with Business Bug Patterns. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:195-202 [Conf]
  16. Shilong Ma, Yuefei Sui, Ke Xu
    The Limits of Horn Logic Programs. [Citation Graph (0, 0)][DBLP]
    ICLP, 2002, pp:467- [Conf]
  17. Shen Lin, Yong Cui, Mingwei Xu, Ke Xu
    Quality of Service Routing Network and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:202-209 [Conf]
  18. Hui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui
    S-Chord: Hybrid Topology Makes Chord Efficient. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:480-487 [Conf]
  19. Luo Wen, Jianping Wu, Ke Xu
    Overlay Logging: An IP Traceback Scheme in MPLS Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:75-82 [Conf]
  20. Yong Cui, Ke Xu, Jianping Wu
    Multi-constrained End-to-End Admission Control in Core-Stateless Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:420-429 [Conf]
  21. Yong Cui, Ke Xu, Mingwei Xu, Jianping Wu
    Optimal QoS Routing Based on Extended Simulated Annealing. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:553-562 [Conf]
  22. Suogang Li, Jianping Wu, Ke Xu
    ComBAQ: Provisioning Loss Differentiated Services for Hybrid Traffic in Routers. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:313-320 [Conf]
  23. Zhiyong Liang, Ke Xu, Jianping Wu
    A Scalable Parallel Lookup Framework Avoiding Longest Prefix Match. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:616-625 [Conf]
  24. Hui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui
    3Sons: Semi-structured Substrate Support for Overlay Network Services. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:590-599 [Conf]
  25. Feng Shi, Jianping Wu, Ke Xu
    The Stability Problem of Multicast Trees in Layered Multicast. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:212-221 [Conf]
  26. Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu, Mingwei Xu
    SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:515-524 [Conf]
  27. Yong Cui, Lingjian Song, Ke Xu
    RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:764-774 [Conf]
  28. Lijun Wang, Ke Xu, Jianping Wu
    BGP Route Selection Notice. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:440-449 [Conf]
  29. Ke Xu, Frédéric Boussemart, Fred Hemery, Christophe Lecoutre
    A Simple Model to Generate Hard Satisfiable Instances. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2005, pp:337-342 [Conf]
  30. Yong Cui, Ke Xu, Jianping Wu
    Precomputation for Multi-constrained QoS Routing in High-speed Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  31. Miao Zhang, Fengyuan Ren, Jianping Wu, Ke Xu
    Using fuzzy-PI controller in active queue management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:742-747 [Conf]
  32. Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu
    Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:57-62 [Conf]
  33. Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu
    Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:844-853 [Conf]
  34. Ke Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu
    On the Stability of Application-Layer Multicast Tree. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:401-412 [Conf]
  35. Qiang Ding, Ke Xu, Hui-shan Liu
    Construct Optimal Diameter Network and d-partition Routing Algorithm. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:74-81 [Conf]
  36. Ke Xu, Stephen R. Tate
    Universally Composable Secure Mobile Agent Computation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:304-317 [Conf]
  37. Ke Xu, Adrian David Cheok, Kar Wee Chia, Simon Prince
    Visual Registration for Geographical Labeling in Wearable Computing. [Citation Graph (0, 0)][DBLP]
    ISWC, 2002, pp:109-116 [Conf]
  38. Lei Sun, Ke Xu, Weidong Liu, Jianping Wu
    TMS: A Scalable Transition Multicast Scheme. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:80-90 [Conf]
  39. Adrian David Cheok, Ke Xu, Wei Liu, Diego Diaz Garcia, Clara Boj Tovar
    Aesthetic Entertainment of Social Network Interaction: Free Network Visible Network. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:527-530 [Conf]
  40. Yuexuan Wang, Cheng Wu, Ke Xu
    Study on pi-Calculus Based Equipment Grid Service Chain Model. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:40-47 [Conf]
  41. Qingguo Zheng, Ke Xu, Shilong Ma
    When to Update the Sequential Patterns of Stream Data? [Citation Graph (0, 0)][DBLP]
    PAKDD, 2003, pp:545-550 [Conf]
  42. Dan Li, Yong Cui, Ke Xu, Jianping Wu
    Improvement of Multicast Routing Protocol Using Petri Nets. [Citation Graph (0, 0)][DBLP]
    RSFDGrC (2), 2005, pp:634-643 [Conf]
  43. JianJun Yu, Hao Su, Gang Zhou, Ke Xu
    SNet: skip graph based semantic web services discovery. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1393-1397 [Conf]
  44. Kun Wu, Jianping Wu, Lizheng Fu, Ke Xu
    PS2: An HA-Enabled Memory Management Scheme In Core Routers. [Citation Graph (0, 0)][DBLP]
    ICNS, 2006, pp:26- [Conf]
  45. Ke Xu, Yuexuan Wang, Cheng Wu
    Service Provenance based Abstraction of Grid Application Knowledge. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:50- [Conf]
  46. Zhao Li, Lizheng Fu, Ke Xu, Zhenyu Shi, Jianping Wu
    Smooth Handoff Based on Virtual Interface in Wireless Network. [Citation Graph (0, 0)][DBLP]
    ICWMC, 2006, pp:79- [Conf]
  47. Ke Xu, Wei Li
    An Average Analysis of Backtracking on Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2001, v:33, n:1, pp:21-37 [Journal]
  48. Simon Prince, Ke Xu, Adrian David Cheok
    Augmented Reality Camera Tracking with Homographies. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2002, v:22, n:6, pp:39-45 [Journal]
  49. Yong Cui, Jianping Wu, Ke Xu
    Precomputation for intra-domain QoS routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:47, n:6, pp:923-937 [Journal]
  50. Ke Xu, Wei Li
    Exact Phase Transitions in Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  51. Ke Xu, Wei Li
    The SAT Phase Transition [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  52. Ke Xu, Wei Li
    On the Average Similarity Degree between Solutions of Random k-SAT and Random CSPs [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  53. Shilong Ma, Yuefei Sui, Ke Xu
    The Prioritized Inductive Logic Programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  54. Wen-Yu Dong, Ke Xu, Meng-Xiang Lin
    A Situation Calculus-based Approach To Model Ubiquitous Information Services [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  55. Ke Xu, Wei Li
    An Average Analysis of Backtracking on Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  56. Ke Xu, Wei Li
    Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  57. Qingguo Zheng, Ke Xu, Shilong Ma, Weifeng Lv
    The Algorithms of Updating Sequetial Patterns [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  58. Qingguo Zheng, Ke Xu, Shilong Ma
    When to Update the sequential patterns of stream data? [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  59. Shilong Ma, Yuefei Sui, Ke Xu
    The Limits of Horn Logic Programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  60. Wei Li, Shilong Ma, Yuefei Sui, Ke Xu
    A Logical Framework for Convergent Infinite Computations [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  61. Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
    Intelligent Search of Correlated Alarms from Database containing Noise Data [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  62. Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
    Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  63. Ke Xu, Wei Li
    On the average similarity degree between solutions of random k-SAT and random CSPs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:136, n:1, pp:125-149 [Journal]
  64. Ke Xu, Wei Li
    Exact Phase Transitions in Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP]
    J. Artif. Intell. Res. (JAIR), 2000, v:12, n:, pp:93-103 [Journal]
  65. Ke Xu, Jianping Wu, Zhongchao Yu, Mingwei Xu
    A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:2, pp:219-226 [Journal]
  66. Jian-Ping Wu, Ke Xu
    Research on Next-Generation Internet Architecture. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:723-731 [Journal]
  67. Ke Xu, Simon Prince, Adrian David Cheok, Yan Qiu, Krishnamoorthy Ganesh Kumar
    Visual registration for unprepared augmented reality environments. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2003, v:7, n:5, pp:287-298 [Journal]
  68. Ke Xu, Wei Li
    Many hard examples in exact phase transitions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:355, n:3, pp:291-302 [Journal]
  69. Farzam Farbiz, Adrian David Cheok, Wei Liu, Zhiying Zhou, Ke Xu, Simon Prince, Mark Billinghurst, Hirokazu Kato
    Live three-dimensional content for augmented reality. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:3, pp:514-523 [Journal]
  70. Ta Huynh Duy Nguyen, Tran Cong Thien Qui, Ke Xu, Adrian David Cheok, Sze Lee Teo, Zhiying Zhou, Asitha Mallawaarachchi, Shang Ping Lee, Wei Liu, Hui Siang Teo, Le Nam Thang, Yu Li, Hirokazu Kato
    Real-Time 3D Human Capture System for Mixed-Reality Art and Entertainment. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2005, v:11, n:6, pp:706-721 [Journal]
  71. Clara Boj, Diego J. Díaz, Adrian David Cheok, Ke Xu, Wei Liu
    Free network visible network. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2005, pp:395-396 [Conf]
  72. Guozhi Wei, Anne Wei, Ke Xu, Gerard Dupeyrat
    Optimization of Mobile IPv6 Handover Performance Using E-HCF Method. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:506-513 [Conf]
  73. Ke Xu, Oliver Chiu-sing Choy, Cheong-fat Chan, Kong-Pong Pun
    Power-efficient VLSI implementation of bitstream parsing in H.264/AVC decoder. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  74. Rui Sun, Ke Xu, Zhao Li, Li Zhang
    A Strategyproof Protocol in Mesh-Based Overlay Streaming System. [Citation Graph (0, 0)][DBLP]
    MMM (1), 2007, pp:495-504 [Conf]
  75. Xin Li, Tian Liu, Han Peng, Liyan Qian, Hongtao Sun, Jin Xu, Ke Xu, Jiaqi Zhu
    Improved Exponential Time Lower Bound of Knapsack Problem Under BT Model. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:624-631 [Conf]
  76. Yu Jianjun, Guo Shengmin, Su Hao, Zhang Hui, Xu Ke
    A kernel based structure matching for web services search. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:1249-1250 [Conf]
  77. Ke Xu, Frédéric Boussemart, Fred Hemery, Christophe Lecoutre
    Random constraint satisfaction: Easy generation of hard (satisfiable) instances. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2007, v:171, n:8-9, pp:514-534 [Journal]
  78. Wang Lijun, Wu Jianping, Xu Ke
    Modified flap damping mechanism to improve inter-domain routing convergence. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:7, pp:1588-1599 [Journal]

  79. AutoSig-Automatically Generating Signatures for Applications. [Citation Graph (, )][DBLP]


  80. Mining Compressed Repetitive Gapped Sequential Patterns Efficiently. [Citation Graph (, )][DBLP]


  81. Analysis of BGP Convergence Using SHLPN Model. [Citation Graph (, )][DBLP]


  82. Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis. [Citation Graph (, )][DBLP]


  83. Improving BitTorrent Network's Performance via Deploying Helpers. [Citation Graph (, )][DBLP]


  84. Decision-Making for Ecological Reservoir Operation Based on Lamda Fuzzy Measures. [Citation Graph (, )][DBLP]


  85. The Compound Consistency Induced Ordered Weighted Averaging operator and its application to reservoir operation. [Citation Graph (, )][DBLP]


  86. A Hash Tree Based Authentication Scheme in SIP Applications. [Citation Graph (, )][DBLP]


  87. Quadratic Residue Based Address Allocation for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  88. Caching the P2P Traffic in ISP Network. [Citation Graph (, )][DBLP]


  89. Concern Oriented Business Process Modeling. [Citation Graph (, )][DBLP]


  90. A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System. [Citation Graph (, )][DBLP]


  91. Evaluating Service Scalability of Network Architectures. [Citation Graph (, )][DBLP]


  92. An application of support vector machines for image retrieval. [Citation Graph (, )][DBLP]


  93. Low-power H.264/AVC baseline decoder for portable applications. [Citation Graph (, )][DBLP]


  94. A Variation of Route Flap Damping to Improve BGP Routing Convergence. [Citation Graph (, )][DBLP]


  95. Identify P2P Traffic by Inspecting Data Transfer Behaviour. [Citation Graph (, )][DBLP]


  96. Web 2.0 traffic measurement: analysis on online map applications. [Citation Graph (, )][DBLP]


  97. Collaborative delay-aware scheduling in peer-to-peer UGC video sharing. [Citation Graph (, )][DBLP]


  98. On Tracker Selection for Peer-to-Peer Traffic Locality. [Citation Graph (, )][DBLP]


  99. Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells. [Citation Graph (, )][DBLP]


  100. Truthful application-layer multicast in mesh-based selfish overlays. [Citation Graph (, )][DBLP]


  101. A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. [Citation Graph (, )][DBLP]


  102. An improved Wu-Manber multiple patterns matching algorithm. [Citation Graph (, )][DBLP]


  103. Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences. [Citation Graph (, )][DBLP]


  104. Hierarchical Packet Scheduling for Satellite Multimedia Broadcasting: An Adaptive QoS-Aware Design. [Citation Graph (, )][DBLP]


  105. Tod-Cache: Peer-to-Peer Traffic Management and Optimization Using Combined Caching and Redirection. [Citation Graph (, )][DBLP]


  106. A Logic Distance-Based Method for Deploying Probing Sources in the Topology Discovery. [Citation Graph (, )][DBLP]


  107. Intelligent search of correlated alarms from database containing noise data. [Citation Graph (, )][DBLP]


  108. NetRiver, a computer network experiment system. [Citation Graph (, )][DBLP]


  109. Proportional fairness of call blocking probability. [Citation Graph (, )][DBLP]


  110. Proxy caching for peer-to-peer live streaming. [Citation Graph (, )][DBLP]


  111. Performance model and evaluation on geographic-based routing. [Citation Graph (, )][DBLP]


  112. Identify P2P traffic by inspecting data transfer behavior. [Citation Graph (, )][DBLP]


  113. A Simple Model to Generate Hard Satisfiable Instances [Citation Graph (, )][DBLP]


  114. From k-SAT to k-CSP: Two Generalized Algorithms [Citation Graph (, )][DBLP]


  115. On the Scaling Window of Model RB [Citation Graph (, )][DBLP]


  116. Exact phase transition of backtrack-free search with implications on the power of greedy algorithms [Citation Graph (, )][DBLP]


  117. Time series of Internet AS-level topology graphs: four patterns and one model [Citation Graph (, )][DBLP]


  118. Enhancing the robustness of scale-free networks [Citation Graph (, )][DBLP]


  119. Modeling the IPv6 Internet AS-level Topology [Citation Graph (, )][DBLP]


  120. Mining Compressed Repetitive Gapped Sequential Patterns Efficiently [Citation Graph (, )][DBLP]


  121. Complex networks: A mixture of power-law and Weibull distributions [Citation Graph (, )][DBLP]


  122. Weak Ties: A Subtle Role in the Information Diffusion of Online Social Networks [Citation Graph (, )][DBLP]


  123. BPSL Modeler - Visual Notation Language for Intuitive Business Property Reasoning. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.763secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002