The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhi Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhi Li, Yu-Kwong Kwok
    Local Route Recovery Algorithms for Improving Multihop TCP Performance in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2004, pp:925-932 [Conf]
  2. Zhi Li, Zhongwei Zhang
    An Application of Fuzzy Logic to Usage Parameter control in ATM Networks. [Citation Graph (0, 0)][DBLP]
    FSKD, 2002, pp:295-299 [Conf]
  3. Zhongwei Zhang, Zhi Li, Shan Suthaharan
    Fuzzy Logic Strategy of Prognosticating TCP's Timeout ad Retransmission. [Citation Graph (0, 0)][DBLP]
    FSKD, 2002, pp:310-313 [Conf]
  4. Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
    A Secure Image-Based Authentication Scheme for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:751-760 [Conf]
  5. Zhi Li, Yu-Kwong Kwok
    A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2005, pp:372-379 [Conf]
  6. Zhi Li, Prasant Mohapatra
    Impact of Topology On Overlay Routing Service. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  7. Zhi Li, Zhongwei Zhang
    A Coupled Fuzzy Logic Control for Routers' Queue Management over TCP/AQM Networks. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:357-363 [Conf]
  8. Zhi Li, John Higgins, Mark J. Clement
    Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2001, pp:249-0 [Conf]
  9. Tao Zhang, Jian Li, Zhi Li
    Machine Learning for Identifying Troubled Life Insurer. [Citation Graph (0, 0)][DBLP]
    MLMTA, 2003, pp:216-222 [Conf]
  10. Zhi Li, Prasant Mohapatra, Chen-Nee Chuah
    Virtual Multi-Homing: On the Feasibility of Combining Overlay Routing with BGP Routing. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1348-1352 [Conf]
  11. Zhi Li, Lihua Yuan, Prasant Mohapatra
    An Efficient Overlay Link Performance Monitoring Technique. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:513-524 [Conf]
  12. Zhi Li, Yu-Kwong Kwok
    A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:300-307 [Conf]
  13. Donghong Qin, Zhi Li
    Evaluation and Research of Strong Migration of Mobile Agent for Exploiting Type Inference. [Citation Graph (0, 0)][DBLP]
    QSIC, 2006, pp:441-445 [Conf]
  14. Cunguo Wang, Qing Yang, Min Wei, Wei Sun, Zhi Li, Fuchuan Sun
    Open-loop system of optokinetic nystagmus eye movement in human. [Citation Graph (0, 0)][DBLP]
    SMC (3), 2004, pp:2664-0 [Conf]
  15. Zhi Li, Deming Zhu
    Global asymptotic stability of a higher order nonlinear difference equation. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2006, v:19, n:9, pp:926-930 [Journal]
  16. Zhi Li, Prasant Mohapatra
    QoS-aware multicasting in DiffServ domains. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:5, pp:47-57 [Journal]
  17. Zhi Li, Prasant Mohapatra
    On investigating overlay service topologies. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:1, pp:54-68 [Journal]
  18. Zhi Li, Prasant Mohapatra
    QMBF: a QoS-aware multicast routing protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:6, pp:611-621 [Journal]
  19. Yuan Cao, Xianlong Jin, Zhi Li
    A distributed simulation system and its application. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2007, v:15, n:1, pp:21-31 [Journal]
  20. Linqiang Chen, Gengdai Liu, Zhigeng Pan, Zhi Li
    Design of Water Transportation Story for Grand Canal Museum Based on Multi-projection Screens. [Citation Graph (0, 0)][DBLP]
    HCI (14), 2007, pp:627-632 [Conf]
  21. Qibin Sun, Zhi Li, Yong Lian, Chang Wen Chen
    Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:3471-3474 [Conf]
  22. Zhi Li, Qibin Sun, Yong Lian
    Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  23. Zhi Li, Hong Ma, Yongbing Mei
    A Unifying Method for Outlier and Change Detection from Data Streams Based on Local Polynomial Fitting. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:150-161 [Conf]
  24. Zhi Li, Guanglie Zhang
    A Physical Activities Healthcare System Based onWireless Sensing Technology. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:369-376 [Conf]
  25. Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah
    On the analysis of overlay failure detection and recovery. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:13, pp:3828-3843 [Journal]

  26. A flexible simulation environment for flash-aware algorithms. [Citation Graph (, )][DBLP]

  27. The Simulation Strategy and Realization on Hardware Circuit. [Citation Graph (, )][DBLP]

  28. On the Systematic Measurement Matrix for Compressed Sensing in the Presence of Gross Errors. [Citation Graph (, )][DBLP]

  29. Remote dynamic proxies for wave-based peer-to-peer haptic interaction. [Citation Graph (, )][DBLP]

  30. A novel scene change detection algorithm based on the 3D wavelet transform. [Citation Graph (, )][DBLP]

  31. Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach. [Citation Graph (, )][DBLP]

  32. An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications. [Citation Graph (, )][DBLP]

  33. An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack. [Citation Graph (, )][DBLP]

  34. Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption. [Citation Graph (, )][DBLP]

  35. An interactive and secure user authentication scheme for mobile devices. [Citation Graph (, )][DBLP]

  36. Object Categorization Using Hierarchical Wavelet Packet Texture Descriptors. [Citation Graph (, )][DBLP]

  37. A Fast and Effective Text Tracking in Compressed Video. [Citation Graph (, )][DBLP]

  38. RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network. [Citation Graph (, )][DBLP]

  39. Peer-assisted packet loss repair for IPTV video multicast. [Citation Graph (, )][DBLP]

  40. A Video Text Detection Method Based on Key Text Points. [Citation Graph (, )][DBLP]

  41. Scene Categorization Using Boosted Back-Propagation Neural Networks. [Citation Graph (, )][DBLP]

  42. Soccer Video Event Detection by Fusing Middle Level Visual Semantics of an Event Clip. [Citation Graph (, )][DBLP]

  43. Task-aware based co-scheduling for virtual machine system. [Citation Graph (, )][DBLP]

  44. Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks. [Citation Graph (, )][DBLP]

  45. A Distributed Multi-coordinate Localization Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  46. Networked Haptic Cooperation Using Remote Dynamic Proxies. [Citation Graph (, )][DBLP]

  47. Watermarking Relational Databases for Ownership Protection Based on DWT. [Citation Graph (, )][DBLP]

  48. An intelligent robotic assistive living system. [Citation Graph (, )][DBLP]

  49. Low-rate image retrieval with tree histogram coding. [Citation Graph (, )][DBLP]

  50. Distortion-aware retransmission and concealment of video packets using a Wyner-Ziv-coded thumbnail. [Citation Graph (, )][DBLP]

  51. Global Synchronization of General Complex Dynamical Networks with Time-Varying Delay. [Citation Graph (, )][DBLP]

  52. XJTU at TRECVID2008 High-Level Feature Extraction. [Citation Graph (, )][DBLP]

  53. Dimensional Reduction Based on Independent Component Analysis for Content Based Image Retrieval. [Citation Graph (, )][DBLP]

  54. Adaptive per hop differentiation for end-to-end delay assurance in multihop wireless networks. [Citation Graph (, )][DBLP]

  55. An adaptive clustering routing transition protocol in ad hoc networks. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002