The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Li Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou
    Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:394-0 [Conf]
  2. Noria Foukia, Li Zhou, Clifford Neuman
    Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:77-92 [Conf]
  3. Li Zhou, Chinya V. Ravishankar
    Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:759-770 [Conf]
  4. Jie Yang, Gang Huang, Li Zhou, Zhao Liu, Meng Ye, Ying Chen
    An Approach to Composing Multiple Component Implementations for Satisfying Quality Requirements. [Citation Graph (0, 0)][DBLP]
    QSIC, 2006, pp:295-302 [Conf]
  5. Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:139-146 [Conf]
  6. Li Zhou, Ying Tao, James J. Cimino, Elizabeth S. Chen, Hongfang Liu, Yves A. Lussier, George Hripcsak, Carol Friedman
    Terminology model discovery using natural language processing and visualization techniques. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:626-636 [Journal]
  7. Li Zhou, Genevieve B. Melton, Simon Parsons, George Hripcsak
    A temporal constraint structure for extracting temporal information from clinical narrative. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:424-439 [Journal]
  8. Li Zhou, George Hripcsak
    Temporal reasoning with medical data - A review with emphasis on medical natural language processing. [Citation Graph (0, 0)][DBLP]
    Journal of Biomedical Informatics, 2007, v:40, n:2, pp:183-202 [Journal]
  9. Gang Huang, Li Zhou, Xuanzhe Liu, Hong Mei, Shing-Chi Cheung
    Performance Aware Service Pool in Dependable Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:4, pp:565-573 [Journal]
  10. Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou
    Integrated Access Control and Intrusion Detection for Web Servers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:841-850 [Journal]
  11. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:55-62 [Conf]
  12. Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
    Supporting Secure Communication and Data Collection in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  13. Xi Sun, Li Zhou, Lei Zhuang, Wenpin Jiao, Hong Mei
    Towards Constructing High-available Decentralized Systems via Self-adaptive Components. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:296-301 [Conf]
  14. Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
    Towards service pool based approach for services discovery and subscription. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:1253-1254 [Conf]

  15. Towards Instant Automatic Model Refinement Based on OCL. [Citation Graph (, )][DBLP]


  16. Calculation method of nonmonotonic interval-valued and fuzzy-valued Choquet integrals. [Citation Graph (, )][DBLP]


  17. Automated Template-Based Metadata Extraction Architecture. [Citation Graph (, )][DBLP]


  18. A Collaborative Filtering Algorithm Based on Global and Domain Authorities. [Citation Graph (, )][DBLP]


  19. Consumer-Centric Web Services Discovery and Subscription. [Citation Graph (, )][DBLP]


  20. TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks. [Citation Graph (, )][DBLP]


  21. Novelty, Question Answering and Genomics: The University of Iowa Response. [Citation Graph (, )][DBLP]


  22. Efficient key establishment for group-based wireless sensor deployments. [Citation Graph (, )][DBLP]


  23. Learning and practising supply chain management strategies from a business simulation game: A comprehensive supply chain simulation. [Citation Graph (, )][DBLP]


  24. A bus arbitration scheme for HDTV decoder SoC. [Citation Graph (, )][DBLP]


  25. Use Closure of Relevant Sets of Attributes to Efficiently Find Candidate Keys. [Citation Graph (, )][DBLP]


  26. Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine. [Citation Graph (, )][DBLP]


  27. An ACO for Solving RCPSP. [Citation Graph (, )][DBLP]


  28. Research of FNF Internal Fixation Operation Parametric Planning and Evaluation System. [Citation Graph (, )][DBLP]


Search in 0.041secs, Finished in 0.042secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002