The SCEAS System
Navigation Menu

Search the dblp DataBase


Xiangyang Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohammad A. Ketabchi, Nipun Sehgal, Surapol Dasananda, Rani Mikkilineni, Xiangyang Li
    Modeling Activities of Application Domains. [Citation Graph (0, 0)][DBLP]
    ADB, 1994, pp:78-94 [Conf]
  2. Nong Ye, Xiangyang Li
    A Machine Learning Algorithm Based on Supervised Clustering and Classification. [Citation Graph (0, 0)][DBLP]
    Active Media Technology, 2001, pp:327-334 [Conf]
  3. Mohammad A. Ketabchi, Surapol Dasananda, Rani Mikkilineni, Xiangyang Li, F. Xu, M. Yan
    An Object-Centered Application Development System. [Citation Graph (0, 0)][DBLP]
    DEXA, 1994, pp:27-36 [Conf]
  4. Xiangyang Li, Dongming Lu, Yunhe Pan
    Virtual Dunhuang Mural Restoration System in Collaborative Network Environment. [Citation Graph (0, 0)][DBLP]
    Comput. Graph. Forum, 2000, v:19, n:3, pp:- [Journal]
  5. Xiangyang Li, Dongming Lu, Yunhe Pan
    Color Restoration and Image Retrieval for Dunhuang Fresco Preservation. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2000, v:7, n:2, pp:38-42 [Journal]
  6. Xiangyang Li, Mohammad A. Ketabchi
    A Model-Based Computer-Aided Prototyping System. [Citation Graph (0, 0)][DBLP]
    Journal of Systems Integration, 1996, v:6, n:1/2, pp:19-39 [Journal]
  7. Xiangyang Li, Nong Ye
    A supervised clustering algorithm for computer intrusion detection. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2005, v:8, n:4, pp:498-509 [Journal]
  8. Xiangyang Li, Peng-Jun Wan
    Constructing minimum energy mobile wireless networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2001, v:5, n:4, pp:55-67 [Journal]
  9. Xiangyang Li, Qiang Ji
    Active affective State detection and user assistance with dynamic bayesian networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2005, v:35, n:1, pp:93-105 [Journal]
  10. Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu
    Probabilistic techniques for intrusion detection based on computer audit data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:266-274 [Journal]
  11. Xiangyang Li, Nong Ye
    Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:226-238 [Conf]

  12. Knowledge Discovery from Virtual Enterprise Model Based on Semantic Annotation. [Citation Graph (, )][DBLP]

  13. A Soft Sensor Based on Multiple Neural Networks Combined with Two Information Fusion Methods. [Citation Graph (, )][DBLP]

  14. Security Management Modeling in Collaborative Systems. [Citation Graph (, )][DBLP]

  15. An Aspect Oriented Configuration Identification Model for Incremental Development. [Citation Graph (, )][DBLP]

  16. An Optimized Model for Blasting Parameters in Underground Mines' Deep-Hole Caving Based on Rough Set and Artificial Neural Network. [Citation Graph (, )][DBLP]

  17. IP multimedia subsystem converged call control services. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002