Search the dblp DataBase
Yang Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Steven Dow , T. Scott Saponas , Yang Li , James A. Landay External representations in ubiquitous computing design and the implications for design tools. [Citation Graph (0, 0)][DBLP ] Conference on Designing Interactive Systems, 2006, pp:241-250 [Conf ] Yonggen Gu , Yuxi Fu , Yang Li , Xiaoju Dong A Generic Model for Symbolic Analyzing Security Protocols. [Citation Graph (0, 0)][DBLP ] CIT, 2005, pp:680-684 [Conf ] Hong Man , Yang Li Multi-stream video transport over MPLS networks. [Citation Graph (0, 0)][DBLP ] IEEE Workshop on Multimedia Signal Processing, 2002, pp:384-387 [Conf ] Yang Li , Hongji Yang , William C. Chu Fusing ambiguous domain knowledge slices in a reverse engineering process. [Citation Graph (0, 0)][DBLP ] APSEC, 2000, pp:266-273 [Conf ] Jianfeng Zhan , Gengpu Liu , Lei Wang , Bibo Tu , Yi Jin , Yang Li , Yan Hao , Xuehai Hong , Dan Meng , Ninghui Sun PhoenixG: A Unified Management Framework for Industrial Information Grid. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:489-496 [Conf ] Yang Li , Binxing Fang , Li Guo , You Chen Network anomaly detection based on TCM-KNN algorithm. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:13-19 [Conf ] Yang Li , Ken Hinckley , Zhiwei Guan , James A. Landay Experimental analysis of mode switching techniques in pen-based user interfaces. [Citation Graph (0, 0)][DBLP ] CHI, 2005, pp:461-470 [Conf ] Yang Li , Evan Welbourne , James A. Landay Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing. [Citation Graph (0, 0)][DBLP ] CHI, 2006, pp:1019-1022 [Conf ] Alan L. Liu , Yang Li BrickRoad: a light-weight tool for spontaneous design of location-enhanced applications. [Citation Graph (0, 0)][DBLP ] CHI, 2007, pp:295-298 [Conf ] Yang Li , William A. P. Smith , Edwin R. Hancock Face Recognition with Region Division and Spin Images. [Citation Graph (0, 0)][DBLP ] CIARP, 2006, pp:109-117 [Conf ] You Chen , Yang Li , Xueqi Cheng , Li Guo Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:153-167 [Conf ] Yang Li , Zhan Cui , Hongji Yang , Hewijin Christine Jiau Tolerating Changes in A Design P ychology Based Web Page Wrapper. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:399-404 [Conf ] Yang Li , Hongji Yang , William C. Chu Towards Building a Smarter Domain Knowledge Recovery Assistant1. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:155-160 [Conf ] Yang Li , Xueyin Lin Face Hallucination with Pose Variation. [Citation Graph (0, 0)][DBLP ] FGR, 2004, pp:723-728 [Conf ] Yang Li , Dorothea Blostein , Purang Abolmaesumi Asymmetric Inexact Matching of Spatially-Attributed Graphs. [Citation Graph (0, 0)][DBLP ] GbRPR, 2005, pp:253-262 [Conf ] Zhiwei Guan , Yang Li , Hongan Wang , Guozhong Dai A Comparison on Free Interaction Models for Mobile Layout System. [Citation Graph (0, 0)][DBLP ] HUC, 2000, pp:63-71 [Conf ] Yang Li , Johnson I. Agbinya Simulating a rural wireless network using SCILAB. [Citation Graph (0, 0)][DBLP ] IADIS AC, 2005, pp:357-364 [Conf ] Fuhua Shang , Ruishan Du , Yang Li Agent-Based Soft Computing Society Applied in the Research of Reservoir Sedimentary Facies in Oil Fields. [Citation Graph (0, 0)][DBLP ] IAT, 2006, pp:709-712 [Conf ] Yang Li Verb-Noun Directory for Telecommunications Services Look-up. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:307-311 [Conf ] Yang Li , Yangzhou Du , Xueyin Lin Kernel-Based Multifactor Analysis for Image Synthesis and Recognition. [Citation Graph (0, 0)][DBLP ] ICCV, 2005, pp:114-119 [Conf ] Yang Li , Ping Yi , Qiyan Li Optimizing Path Expression Queries of XML Data. [Citation Graph (0, 0)][DBLP ] ICEBE, 2005, pp:497-504 [Conf ] Yang Li , Hongji Yang Code Understanding Through Context-Oriented Uncertainty Reasoning for Enterprise Information System Reengineering. [Citation Graph (0, 0)][DBLP ] ICEIS, 2000, pp:163-170 [Conf ] Yang Li , Edwin R. Hancock Face Recognition with Generalized Entropy Measurements. [Citation Graph (0, 0)][DBLP ] ICIAR (2), 2004, pp:733-740 [Conf ] Yang Li , Johnson I. Agbinya Emerging Markets and Benefits of Fixed to Wireless Substitution in Africa. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:605-609 [Conf ] Zhiwei Guan , Yang Li , Youdi Chen , Guozhong Dai Heuristic Walkthroughs Evaluation of Pen-Based Chinese Word Edit System (PCWES) Usability. [Citation Graph (0, 0)][DBLP ] ICMI, 2000, pp:488-495 [Conf ] Yang Li , Zhiwei Guan , Youdi Chen , Guozhong Dai Penbuilder: Platform for the Development of Pen-Based User Interface. [Citation Graph (0, 0)][DBLP ] ICMI, 2000, pp:534-541 [Conf ] Yang Li , James A. Landay , Zhiwei Guan , Xiangshi Ren , Guozhong Dai Sketching informal presentations. [Citation Graph (0, 0)][DBLP ] ICMI, 2003, pp:234-241 [Conf ] Yang Li , Edwin R. Hancock Face Recognition using Shading-Based Curvature Attributes. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2004, pp:538-541 [Conf ] Yang Li , William A. P. Smith , Edwin R. Hancock Face Recognition using Patch-based Spin Images. [Citation Graph (0, 0)][DBLP ] ICPR (1), 2006, pp:408-411 [Conf ] Beihu Wang , Xiaodong Liu , Jon M. Kerridge , Yang Li Scenario Based Generative Component Adaptation in .NET Framework. [Citation Graph (0, 0)][DBLP ] IRI, 2004, pp:73-78 [Conf ] Yang Li , Hongji Yang Simplicity: A Key Engineering Concept for Program Understanding. [Citation Graph (0, 0)][DBLP ] IWPC, 2001, pp:98-110 [Conf ] Zhan Cui , Yang Li , John W. Shepherdson A Framework for ACL Message Translation for Information Agents. [Citation Graph (0, 0)][DBLP ] KES, 2003, pp:1380-1386 [Conf ] Hee-Dong Park , Yong-Ha Kwon , Kang-Won Lee , Sung-Hyup Lee , Young-Soo Choi , Yang Li , You Ze Cho Seamless Network Mobility Management for Realtime Service. [Citation Graph (0, 0)][DBLP ] MMNS, 2005, pp:71-81 [Conf ] Yang Li , Binxing Fang , Li Guo TTSF: A Novel Two-Tier Spam Filter. [Citation Graph (0, 0)][DBLP ] PDCAT, 2006, pp:503-508 [Conf ] Steven J. Stuart , Yang Li , J. W. Mintmire An Object-oriented Framework for Parallel, Reactive Molecular Dynamics Simulation. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2002, pp:471-476 [Conf ] Yang Li , Ningjiang Chen , Tao Huang An Event-Driven Adaptive Differentiated Service Web Container Architecture. [Citation Graph (0, 0)][DBLP ] QSIC, 2006, pp:22-29 [Conf ] Yang Li , Simon G. Thompson , Zhu Tan , Nick Giles , Hamid Gharib Beyond Ontology Construction; Ontology Services as Online Knowledge Sharing Communities. [Citation Graph (0, 0)][DBLP ] International Semantic Web Conference, 2003, pp:469-483 [Conf ] Yang Li , Zhaohui Wu , Can Wang Research on concurrent algorithm of component software architecture. [Citation Graph (0, 0)][DBLP ] SMC (4), 2004, pp:3451-3456 [Conf ] Yang Li , Can Wang , Yi Zhou , Zhaohui Wu Remote invoking algorithms of self-healing system. [Citation Graph (0, 0)][DBLP ] SMC (4), 2004, pp:3582-3587 [Conf ] Yang Li , Tong Zhang , Stephen E. Levinson Word Concept Model for Intelligent Dialogue Agents. [Citation Graph (0, 0)][DBLP ] TSD, 2000, pp:445-449 [Conf ] Yang Li , James A. Landay Informal prototyping of continuous graphical interactions by demonstration. [Citation Graph (0, 0)][DBLP ] UIST, 2005, pp:221-230 [Conf ] Yang Li , Jason I. Hong , James A. Landay Topiary: a tool for prototyping location-enhanced applications. [Citation Graph (0, 0)][DBLP ] UIST, 2004, pp:217-226 [Conf ] Yang Li , Binxing Fang , Li Guo , Shen Wang Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach. [Citation Graph (0, 0)][DBLP ] ICNS, 2006, pp:86- [Conf ] Yu Liu , Yang Li , Hong Man A distributed cross-layer intrusion detection system for ad hoc networks. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:357-378 [Journal ] Yang Li , Hong-Ji Yang , Xiao-Chun Cheng , Xiao-Yan Zhu Programming Style Based Program Partition. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2005, v:15, n:6, pp:1027-1062 [Journal ] Yang Li , W. Murray Wonham On Supervisory control of real-time discrete-event systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1988, v:46, n:3, pp:159-183 [Journal ] Yang Li , Zhiwei Guan , Guozhong Dai , Xiangshi Ren , Yong Han A Context-Aware Infrastructure for Supporting Applications with Pen-Based Interaction. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:3, pp:343-353 [Journal ] Simon G. Thompson , Nick Giles , Yang Li , Hamid Gharib , Thuc Duong Nguyen Using AI and semantic web technologies to attack process complexity in open systems. [Citation Graph (0, 0)][DBLP ] Knowl.-Based Syst., 2007, v:20, n:2, pp:152-159 [Journal ] Yang Li , Hongji Yang , William C. Chu A concept-oriented belief revision approach to domain knowledge recovery from source code. [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 2001, v:13, n:1, pp:31-52 [Journal ] Yang Li , Tiow-Seng Tan , Ihar Volkau , Wieslaw L. Nowinski Model-Guided Segmentation of 3D Neuroradiological Image Using Statistical Surface Wavelet Model. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Li Ding , Feng Yang , Chunxin Yang , Xiugan Yuan , Yang Li Study on the Appraisal Methods of Hand Fatigue. [Citation Graph (0, 0)][DBLP ] HCI (12), 2007, pp:33-41 [Conf ] Yang Li , Lin Zuo , Jun Wei , Hua Zhong , Tao Huang Sequential Pattern-Based Cache Replacement in Servlet Container. [Citation Graph (0, 0)][DBLP ] ICWE, 2007, pp:105-120 [Conf ] Huipeng Guo , Jinpeng Huai , Huan Li , Ting Deng , Yang Li , Zongxia Du ANGEL: Optimal Configuration for High Available Service Composition. [Citation Graph (0, 0)][DBLP ] ICWS, 2007, pp:280-287 [Conf ] Yang Li , Jinpeng Huai , Ting Deng , Hailong Sun , Huipeng Guo , Zongxia Du QoS-aware Service Composition in Service Overlay Networks. [Citation Graph (0, 0)][DBLP ] ICWS, 2007, pp:703-710 [Conf ] Xiangshi Ren , Jibin Yin , Shengdong Zhao , Yang Li The Adaptive Hybrid Cursor: A Pressure-Based Target Selection Technique for Pen-Based User Interfaces. [Citation Graph (0, 0)][DBLP ] INTERACT (1), 2007, pp:310-323 [Conf ] Yang Li , Binxing Fang , Li Guo A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2007, pp:1286-1292 [Conf ] Yang Li , William A. P. Smith , Edwin R. Hancock Face Recognition with Irregular Region Spin Images. [Citation Graph (0, 0)][DBLP ] SCIA, 2007, pp:730-739 [Conf ] Jacob O. Wobbrock , Andrew D. Wilson , Yang Li Gestures without libraries, toolkits or training: a $1 recognizer for user interface prototypes. [Citation Graph (0, 0)][DBLP ] UIST, 2007, pp:159-168 [Conf ] Yang Li , Binxing Fang , Li Guo , You Chen TCM-KNN Algorithm for Supervised Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:141-151 [Conf ] Hong Man , Yang Li A Game Theoretic Approach to Multi-Stream QoS Routing. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Spectrum Usage Prediction Based on High-order Markov Model for Cognitive Radio Networks. [Citation Graph (, )][DBLP ] PASS: An Approach to Personalized Automated Service Composition. [Citation Graph (, )][DBLP ] KAF: Kalman Filter Based Adaptive Maintenance for Dependability of Composite Services. [Citation Graph (, )][DBLP ] Remote Video Monitor of Vehicles in Cooperative Information Platform. [Citation Graph (, )][DBLP ] Fault Sensitivity Analysis. [Citation Graph (, )][DBLP ] Activity-based prototyping of ubicomp applications for long-lived, everyday human activities. [Citation Graph (, )][DBLP ] FrameWire: a tool for automatically extracting interaction logic from paper prototyping tests. [Citation Graph (, )][DBLP ] Protractor: a fast and accurate gesture recognizer. [Citation Graph (, )][DBLP ] Message from the BINDIS 2008 Workshop Organizers. [Citation Graph (, )][DBLP ] Service Productivity Improvement and Software Technology Support. [Citation Graph (, )][DBLP ] BINDIS 2008 Workshop Organization. [Citation Graph (, )][DBLP ] Towards Industry-Strength SLA Optimization Capabilities for Service Chains. [Citation Graph (, )][DBLP ] An Investigation of the Role of Service Level Agreements in Classified Advertisement Websites. [Citation Graph (, )][DBLP ] Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service Descriptions. [Citation Graph (, )][DBLP ] SRP Based Natural Interaction between Real and Virtual Worlds in Augmented Reality. [Citation Graph (, )][DBLP ] Power Variance Analysis breaks a masked ASIC implementation of AES. [Citation Graph (, )][DBLP ] Robust Hand Posture Recognition Integrating Multi-cue Hand Tracking. [Citation Graph (, )][DBLP ] Aesthetic Learning in an Interactive Evolutionary Art System. [Citation Graph (, )][DBLP ] Application of Temperature Fuzzy Control System in RF Treatment for Nerve Ache. [Citation Graph (, )][DBLP ] Optimized fuzzy information granulation based machine learning classification. [Citation Graph (, )][DBLP ] A fuzzy-based commodity cluster analysis for Harbin Central-Red supermarket. [Citation Graph (, )][DBLP ] Some properties of the sendograph metric by addition and scalar multiplication. [Citation Graph (, )][DBLP ] A Multihoming Support Scheme with Localized Shim Protocol in Proxy Mobile IPv6. [Citation Graph (, )][DBLP ] Agent-Based Distributed Component Services in Spatial Modeling. [Citation Graph (, )][DBLP ] Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP ] Incorporating Primal Sketch Based Learning Into Low Bit-Rate Image Compression. [Citation Graph (, )][DBLP ] Video Transport Over Multi Hop Directional Wireless Networks. [Citation Graph (, )][DBLP ] A Decision Mechanism for Processing Multimodal Services in Future Generation Network. [Citation Graph (, )][DBLP ] A Context-Based Error Detection Strategy into H.264/AVC CABAC. [Citation Graph (, )][DBLP ] Analysis of a Multi-Stream QoS Game for Multi-Path Routing. [Citation Graph (, )][DBLP ] Exponential Stability of Cellular Neural Networks with Uncertain and Time-Varying Delay. [Citation Graph (, )][DBLP ] Applying simulated annealing algorithm in regularized magnetotelluric inversion. [Citation Graph (, )][DBLP ] New condition for improved robust reliable controller design for neutral system with time delay. [Citation Graph (, )][DBLP ] Research on air-conditioning fault diagnosis method based on SVM. [Citation Graph (, )][DBLP ] A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. [Citation Graph (, )][DBLP ] Analysis of Tiling Microarray Data by Learning Vector Quantization and Relevance Learning. [Citation Graph (, )][DBLP ] The learning algorithm based on multiresolution analysis for neural networks. [Citation Graph (, )][DBLP ] A Classification of Flotation Froth Based on Geometry. [Citation Graph (, )][DBLP ] UBSF: A novel online URL-Based Spam Filter. [Citation Graph (, )][DBLP ] LDCOM: a Layered degree-constrained overlay multicast for interactive media. [Citation Graph (, )][DBLP ] Multimodal Image Registration by Information Fusion at Feature Level. [Citation Graph (, )][DBLP ] The Alzheimer's Disease Neuroimaging Initiative: Consistent 4D Cortical Thickness Measurement for Longitudinal Neuroimaging Study. [Citation Graph (, )][DBLP ] Cascadia: a system for specifying, detecting, and managing rfid events. [Citation Graph (, )][DBLP ] Integration of Routing and Switching in Delay-Disruption Tolerance Network. [Citation Graph (, )][DBLP ] SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth. [Citation Graph (, )][DBLP ] An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. [Citation Graph (, )][DBLP ] TCM-KNN scheme for network anomaly detection using feature-based optimizations. [Citation Graph (, )][DBLP ] Improving Component Container Development Process through Product Line Engineering. [Citation Graph (, )][DBLP ] A demonstration of Cascadia through a digital diary application. [Citation Graph (, )][DBLP ] A real-time multi-cue hand tracking algorithm based on computer vision. [Citation Graph (, )][DBLP ] Towards lightweight and efficient DDOS attacks detection for web server. [Citation Graph (, )][DBLP ] A P2P based distributed services network for next generation mobile internet communications. [Citation Graph (, )][DBLP ] Design of Signal Constellations in the Presence of Phase Noise. [Citation Graph (, )][DBLP ] Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism. [Citation Graph (, )][DBLP ] Knowledge Sharing for Supply Chain Management Based on Fuzzy Ontology on the Semantic Web. [Citation Graph (, )][DBLP ] A novel loose coupling interworking scheme between UMTS and WLAN systems for multihomed mobile stations. [Citation Graph (, )][DBLP ] Research on Green Effect of Eco-industrial Parks and its Formation Mechanism of Strategic Alliances' Stability. [Citation Graph (, )][DBLP ] Microbubble Suspensions Prepared via Electrohydrodynamic Jetting Process. [Citation Graph (, )][DBLP ] A Novel Nerve Ache Radio Frequency Treatment System with Multi-Channel Physiological Signal Monitoring. [Citation Graph (, )][DBLP ] SUEFUL-7: A 7DOF upper-limb exoskeleton robot with muscle-model-oriented EMG-based control. [Citation Graph (, )][DBLP ] The Numerical Simulation of Security of Groundwater Supply in the Centralized Exploitation Condition of a Large Irrigation District. [Citation Graph (, )][DBLP ] Research on Temperature Control and Anti-cracking Simulation for Xiaowan Concrete High Arch Dam. [Citation Graph (, )][DBLP ] Algorithm Research of Flexible Graphplan based on Heuristic. [Citation Graph (, )][DBLP ] Seamless Handover Scheme for Proxy Mobile IPv6. [Citation Graph (, )][DBLP ] The Research of MovementControl Policy on Tiered Mobile Network. [Citation Graph (, )][DBLP ] The Research of Security Asynchronous Web Services based on SOA Architecture. [Citation Graph (, )][DBLP ] Measurement and Statistics of Application Business in Complex Internet. [Citation Graph (, )][DBLP ] Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. [Citation Graph (, )][DBLP ] APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing. [Citation Graph (, )][DBLP ] The Organization and Application of Multimedia information Based on Ontology. [Citation Graph (, )][DBLP ] An Identifier-Based Control Method in Dynamic Tracking Neuro-Fuzzy Control System. [Citation Graph (, )][DBLP ] Non-subsampled Contourlet Transform Based Seismic Signal De-noising. [Citation Graph (, )][DBLP ] An Innovative Education System for International Service Engineering. [Citation Graph (, )][DBLP ] The Application of the Ant Colony Pheromones in Intelligent Learning. [Citation Graph (, )][DBLP ] A Small Power Switching Mode Power Supply Based on TOP Switch. [Citation Graph (, )][DBLP ] A Novel Video Annotation Framework Based on Video Object. [Citation Graph (, )][DBLP ] An End-to-End Loss Discrimination Scheme for Multimedia Transmission over Wireless IP Networks. [Citation Graph (, )][DBLP ] Aesthetic Evolution of Staged L-systems for Tiling Pattern Design. [Citation Graph (, )][DBLP ] Video Analysis and Trajectory Based Video Annotation System. [Citation Graph (, )][DBLP ] The Design and Implementation of Monitoring System for H2S Gas Volume Fraction with Virtual Instrument. [Citation Graph (, )][DBLP ] Edge-Neighbor-Scattering Number of Graphs. [Citation Graph (, )][DBLP ] designGG: an R-package and web tool for the optimal design of genetical genomics experiments. [Citation Graph (, )][DBLP ] Incorporating gene co-expression network in identification of cancer prognosis markers. [Citation Graph (, )][DBLP ] A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. [Citation Graph (, )][DBLP ] An active learning based TCM-KNN algorithm for supervised network intrusion detection. [Citation Graph (, )][DBLP ] Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. [Citation Graph (, )][DBLP ] Into the Wild: Low-Cost Ubicomp Prototype Testing. [Citation Graph (, )][DBLP ] Beyond Pinch and Flick: Enriching Mobile Gesture Interaction. [Citation Graph (, )][DBLP ] Capacity Limits of Multiuser Multiantenna Cognitive Networks [Citation Graph (, )][DBLP ] Covering arrays of strength 3 and 4 from holey difference matrices. [Citation Graph (, )][DBLP ] Search in 0.010secs, Finished in 0.017secs