The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xue Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ding-Yi Chen, Xue Li, Zhao Yang Dong, Xia Chen
    Determining the Fitness of a Document Model by Using Conflict Instances. [Citation Graph (0, 0)][DBLP]
    ADC, 2005, pp:125-133 [Conf]
  2. Xin Yan, Xue Li, Dawei Song
    Document generality: its computation for ranking. [Citation Graph (0, 0)][DBLP]
    ADC, 2006, pp:109-118 [Conf]
  3. Juggapong Natwichai, Xue Li, Maria E. Orlowska
    A reconstruction-based algorithm for classification rules hiding. [Citation Graph (0, 0)][DBLP]
    ADC, 2006, pp:49-58 [Conf]
  4. Yi Ding, Xue Li, Maria E. Orlowska
    Recency-based collaborative filtering. [Citation Graph (0, 0)][DBLP]
    ADC, 2006, pp:99-107 [Conf]
  5. Xue Li
    Reflective Web Interface Agent. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:146-151 [Conf]
  6. Eng-huan Pek, Xue Li, Yaozong Liu
    Web Wrapper Validation. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:388-393 [Conf]
  7. Yi Ding, Xue Li
    Time weight collaborative filtering. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:485-492 [Conf]
  8. Xin Yan, Dawei Song, Xue Li
    Concept-based document readability in domain specific information retrieval. [Citation Graph (0, 0)][DBLP]
    CIKM, 2006, pp:540-549 [Conf]
  9. Juggapong Natwichai, Xue Li
    Knowledge Maintenance on Data Streams with Concept Drifting. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:705-710 [Conf]
  10. Xin Yan, Xue Li, Dawei Song
    A Correlation Analysis on LSA and HAL Semantic Space Models. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:711-717 [Conf]
  11. Xue Li, Sanjoy Paul
    Class-based bandwidth allocation and admission control for QoS VPN with DiffServ. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  12. Ding-Yi Chen, Xue Li, Zhao Yang Dong, Xia Chen
    Effectiveness of Document Representation for Classification. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2005, pp:368-377 [Conf]
  13. Juggapong Natwichai, Xue Li, Maria E. Orlowska
    Hiding Classification Rules for Data Sharing with Privacy Preservation. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2005, pp:468-477 [Conf]
  14. Xue Li, Zahir Tari
    Consistency Checking of Evolving Methods. [Citation Graph (0, 0)][DBLP]
    DEXA, 1994, pp:135-144 [Conf]
  15. Zahir Tari, Xue Li
    Method Restructuring and Consistency Checking for Object-Oriented Schemas. [Citation Graph (0, 11)][DBLP]
    ER, 1994, pp:152-170 [Conf]
  16. Xue Li, Mostafa H. Ammar
    Bandwidth Control for Replicated-Stream Multicast Video Distribution. [Citation Graph (0, 0)][DBLP]
    HPDC, 1996, pp:356-0 [Conf]
  17. Xingzhi Sun, Maria E. Orlowska, Xue Li
    Introducing Uncertainty into Pattern Discovery in Temporal Event Sequences. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:299-306 [Conf]
  18. Zheng Liu, Xue Li, ZhaoYang Dong
    A sensor-based multimedia authentication system. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:943-946 [Conf]
  19. Mohsin Ali, Xue Li, Zhao Yang Dong
    Efficient Spatial Clustering Algorithm Using Binary Tree. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2005, pp:294-301 [Conf]
  20. Shun Yan Cheung, Mostafa H. Ammar, Xue Li
    On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1996, pp:553-560 [Conf]
  21. Xue Li, Sanjoy Paul, Mostafa H. Ammar
    Layered Video Multicast with Retransmissions (LVMR): Evaluation of Hierarchical Rate Control. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1062-1072 [Conf]
  22. Mao Ye, Xue Li, Chengfu Yang, Zengan Gao
    Convergence Analysis of a Discrete-Time Single-Unit Gradient ICA Algorithm. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:1140-1146 [Conf]
  23. Zheng Liu, Xue Li, Zhao Yang Dong
    Enhancing security of frequency domain video encryption. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:304-307 [Conf]
  24. Zheng Liu, Xue Li
    Motion Vector Encryption in Multimedia Streaming. [Citation Graph (0, 0)][DBLP]
    MMM, 2004, pp:64-71 [Conf]
  25. Zheng Liu, Xue Li, ZhaoYang Dong
    Direct Fingerprinting on Multicasting Compressed Video. [Citation Graph (0, 0)][DBLP]
    MMM, 2005, pp:76-83 [Conf]
  26. Xingzhi Sun, Maria E. Orlowska, Xue Li
    Finding Negative Event-Oriented Patterns in Long Temporal Sequences. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2004, pp:212-221 [Conf]
  27. Xingzhi Sun, Maria E. Orlowska, Xue Li
    Finding Temporal Features of Event-Oriented Patterns. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:778-784 [Conf]
  28. Jorge M. Barajas, Xue Li
    Collaborative Filtering on Data Streams. [Citation Graph (0, 0)][DBLP]
    PKDD, 2005, pp:429-436 [Conf]
  29. Ding-Yi Chen, Xue Li
    PLD: A Distillation Algorithm for Misclassified Documents. [Citation Graph (0, 0)][DBLP]
    WAIM, 2004, pp:499-508 [Conf]
  30. Zheng Liu, Xue Li, ZhaoYang Dong
    A Lightweight Encryption Algorithm for Mobile Online Multimedia Devices. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:653-658 [Conf]
  31. Xin Yan, Xue Li, Dawei Song
    Document Re-ranking by Generality in Bio-medical Information Retrieval. [Citation Graph (0, 0)][DBLP]
    WISE, 2005, pp:376-389 [Conf]
  32. Xue Li, Wayne Huang
    Counter Inference of Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:148-157 [Conf]
  33. Xue Li
    A Survey of Schema Evolution in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    TOOLS (31), 1999, pp:362-371 [Conf]
  34. Xue Li, Jorge M. Barajas, Yi Ding
    Collaborative filtering on streaming data with interest-drifting. [Citation Graph (0, 0)][DBLP]
    Intell. Data Anal., 2007, v:11, n:1, pp:75-87 [Journal]
  35. Xue Li
    Fuzzy Logic in Web Data Mining for Website Assessment. [Citation Graph (0, 0)][DBLP]
    International Journal of Computational Intelligence and Applications, 2003, v:3, n:1, pp:119-133 [Journal]
  36. Zahir Tari, Xue Li
    Evolution of Methods in Object Schema. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 1994, v:18, n:3, pp:- [Journal]
  37. Zahir Tari, Xue Li, Ling Liu
    Type Safety in the Context of Method Updates. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 1999, v:13, n:3, pp:279-298 [Journal]
  38. Maria E. Orlowska, Xingzhi Sun, Xue Li
    Can exclusive clustering on streaming data be achieved? [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2006, v:8, n:2, pp:102-108 [Journal]
  39. Ramesh C. Gupta, Xue Li
    Statistical inference for the common mean of two log-normal distributions and some applications in reliability. [Citation Graph (0, 0)][DBLP]
    Computational Statistics & Data Analysis, 2006, v:50, n:11, pp:3141-3164 [Journal]
  40. Yin Ping Yang, John Lim, Yingqin Zhong, Xiaojia Guo, Xue Li
    Who Is Taking over Control? A Psychological Perspective in Examining Effects of Agent-Based Negotiation Support Technologies. [Citation Graph (0, 0)][DBLP]
    HCI (13), 2007, pp:222-231 [Conf]
  41. Mao Ye, Zengan Gao, Xue Li
    Blind Separation of Positive Signals by Using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:741-750 [Conf]
  42. Xingzhi Sun, Ming Chang, Xue Li, Maria E. Orlowska
    Discovering Correlated Items in Data Streams. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:260-271 [Conf]
  43. Jun Hua Zhao, Xue Li, Zhao Yang Dong
    Online Rare Events Detection. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:1114-1121 [Conf]
  44. Shanle Ma, Xue Li, Yi Ding, Maria E. Orlowska
    A Recommender System with Interest-Drifting. [Citation Graph (0, 0)][DBLP]
    WISE, 2007, pp:633-642 [Conf]
  45. Zheng Liu, Xue Li, ZhaoYang Dong
    Multimedia authentication with sensor-based watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:155-159 [Conf]
  46. Mao Ye, Xue Li
    An Efficient Measure of Signal Temporal Predictability for Blind Source Separation. [Citation Graph (0, 0)][DBLP]
    Neural Processing Letters, 2007, v:26, n:1, pp:57-68 [Journal]

  47. Graph Mining based on a Data Partitioning Approach. [Citation Graph (, )][DBLP]


  48. Data Reduction Approach for Sensitive Association Classification Rule Hiding. [Citation Graph (, )][DBLP]


  49. Ranking-Constrained Keyword Sequence Extraction from Web Documents. [Citation Graph (, )][DBLP]


  50. Data Quality in Privacy Preservation for Associative Classification. [Citation Graph (, )][DBLP]


  51. Dimension-Specific Search for Multimedia Retrieval. [Citation Graph (, )][DBLP]


  52. Supervised Dimensionality Reduction on Streaming Data. [Citation Graph (, )][DBLP]


  53. On Improving Learning Outcomes Through Sharing of Learning Experiences. [Citation Graph (, )][DBLP]


  54. One-Class Classification of Text Streams with Concept Drift. [Citation Graph (, )][DBLP]


  55. Research of knowledge evolution system on simulation of human scientific knowledge. [Citation Graph (, )][DBLP]


  56. A Neural Network based Technique for Automatic Classification of Road Cracks. [Citation Graph (, )][DBLP]


  57. A Novel Chinese Text Feature Selection Method Based on Probability Latent Semantic Analysis. [Citation Graph (, )][DBLP]


  58. OcVFDT: one-class very fast decision tree for one-class classification of data streams. [Citation Graph (, )][DBLP]


  59. Classifier Ensemble for Uncertain Data Stream Classification. [Citation Graph (, )][DBLP]


  60. A Heuristic Data Reduction Approach for Associative Classification Rule Hiding. [Citation Graph (, )][DBLP]


  61. Striking Similarities in Diverse Telomerase Proteins Revealed by Combining Structure Prediction and Machine Learning Approaches. [Citation Graph (, )][DBLP]


  62. Naive Bayes Classifier for Positive Unlabeled Learning with Uncertainty. [Citation Graph (, )][DBLP]


  63. Optimal Lifetime Model of Heterogeneous Surveillance Sensor Network in Cellular Coverage Condition. [Citation Graph (, )][DBLP]


  64. Associative Classifier for Uncertain Data. [Citation Graph (, )][DBLP]


  65. PAPR Analysis for SOFDM and NC-SOFDM Systems in Cognitive Radio. [Citation Graph (, )][DBLP]


  66. High performance frequency division MC-CDMA system via carrier interferometry codes. [Citation Graph (, )][DBLP]


  67. Inter-carrier interference self-cancellation in synchronous downlink MC-CDMA system. [Citation Graph (, )][DBLP]


  68. A software-defined radio based cognitive radio demonstration over FM band. [Citation Graph (, )][DBLP]


  69. A Combined Iteration Method for Probabilistic Load Flow Calculation Applied to Grid-Connected Induction Wind Power System. [Citation Graph (, )][DBLP]


  70. Intercarrier Interference Immune Single Carrier OFDM via Magnitude Shift Keying Modulation. [Citation Graph (, )][DBLP]


  71. Trust Framework for RFID Tracking in Supply Chain Management. [Citation Graph (, )][DBLP]


  72. A novel highly accurate log skew normal approximation method to lognormal sum distributions. [Citation Graph (, )][DBLP]


  73. Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System. [Citation Graph (, )][DBLP]


  74. The Research of the Non-uniformity in Land Use Map Patches and Image Segments. [Citation Graph (, )][DBLP]


  75. Construction of GIS scientific experience zone based on experience learning theory and constructivism. [Citation Graph (, )][DBLP]


  76. Enabling Next-Generation RFID Applications: Solutions and Challenges. [Citation Graph (, )][DBLP]


  77. On hamiltonian colorings for some graphs. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002