The SCEAS System
Navigation Menu

Search the dblp DataBase


Jun Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohammed Quaddus, Jun Xu, Zohurul Hoque
    Factors of adoption of online auction: a China study. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:93-100 [Conf]
  2. Soner Önder, Jun Xu, Rajiv Gupta
    Caching and Predicting Branch Sequences for Improved Fetch Effectiveness. [Citation Graph (0, 0)][DBLP]
    IEEE PACT, 1999, pp:294-302 [Conf]
  3. Guiling Wang, YuShun Li, ShengWen Yang, ChunYu Miao, Jun Xu, Meilin Shi
    Service-Oriented Grid Architecture and Middleware Technologies for Collaborative E-Learning. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:67-74 [Conf]
  4. Ivana Djurdjevic, Jun Xu, Khaled A. S. Abdel-Ghaffar, Shu Lin
    A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols. [Citation Graph (0, 0)][DBLP]
    AAECC, 2003, pp:98-107 [Conf]
  5. Jun Xu, Reza Sotudeh, Mark B. Josephs
    Asynchronous Packet-Switching for Networks-on-Chip. [Citation Graph (0, 0)][DBLP]
    ACSD, 2006, pp:201-207 [Conf]
  6. Xingjun Zhang, Joshua Zhexue Huang, Depei Qian, Jun Xu, Liping Jing
    Supplier Categorization with K-Means Type Subspace Clustering. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:226-237 [Conf]
  7. Jun Xu, Mukesh Singhal
    Design of a High-Performance ATM Firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:93-102 [Conf]
  8. Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt
    Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf]
  9. XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
    Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
  10. Hang Li, Yunbo Cao, Jun Xu, Yunhua Hu, Shenjie Li, Dmitriy Meyerzon
    A new approach to intranet search based on information extraction. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:460-468 [Conf]
  11. Ning Gu, Jun Xu, Wei Ye
    Approach to Indefinite Semantic Conflicts of Words in Collaborative Editing of Design Documents. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:671-676 [Conf]
  12. Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer
    A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:605-614 [Conf]
  13. Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant
    Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:495-504 [Conf]
  14. Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:378-387 [Conf]
  15. Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu
    An Architectural Framework for Providing Reliability and Security Support. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:585-594 [Conf]
  16. Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu
    Towards Dependable Home Networking: An Experience Report. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:43-48 [Conf]
  17. Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    An Experimental Study of Security Vulnerabilities Caused by Errors. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:421-432 [Conf]
  18. Jun Xu, Yunbo Cao, Hang Li, Nick Craswell, Yalou Huang
    Searching Documents Based on Relevance and Type. [Citation Graph (0, 0)][DBLP]
    ECIR, 2007, pp:629-636 [Conf]
  19. Jun Xu, Yunbo Cao, Hang Li, Yalou Huang
    Cost-Sensitive Learning of SVM for Ranking. [Citation Graph (0, 0)][DBLP]
    ECML, 2006, pp:833-840 [Conf]
  20. Jun Xu, Mukesh Singhal
    A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    HASE, 1998, pp:205-208 [Conf]
  21. Seung Jun, Mustaque Ahamad, Jun Xu
    Robust Information Dissemination in Uncooperative Environments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:293-302 [Conf]
  22. Minho Sung, Abhishek Kumar, Erran L. Li, Jia Wang, Jun Xu
    Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:27- [Conf]
  23. Jun Xu, Mohammed Quaddus
    A Managers' Guide to KMS Adoption and Diffusion. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:908-914 [Conf]
  24. Abhishek Kumar, Shashidhar Merugu, Jun Xu, Xingxing Yu
    Ulysses: A Robust, Low-Diameter, Low-Latency Peer-ti-Peer Network. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:258-267 [Conf]
  25. Minho Sung, Jun Xu
    IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:302-311 [Conf]
  26. Jun Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon
    Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:280-289 [Conf]
  27. Jun Xu, Mukesh Singhal
    Certificate Path Generation Protocol (CPGP) for Authenticated Signaling in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 1998, pp:282-289 [Conf]
  28. Jing Ding, Daniel Berleant, Jun Xu, Andy W. Fulmer
    Extracting Biochemical Interactions from MEDLINE Using a Link Grammar Parser. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2003, pp:467-0 [Conf]
  29. Jun Xu, Kainian Fang, Weixiang Shi
    A Computer-Controlled Tool Post Using a Piezoelectric Actuator for Turning Non-Rotationally Symmetric Surface. [Citation Graph (0, 0)][DBLP]
    ITAMS, 1991, pp:401-407 [Conf]
  30. Minghui Dong, Kim-Teng Lua, Jun Xu
    Selecting Prosody Parameters for Unit Selection Based Chinese TTS. [Citation Graph (0, 0)][DBLP]
    IJCNLP, 2004, pp:272-279 [Conf]
  31. Abhishek Kumar, Jun Xu, Erran L. Li, Jia Wang
    Space-code bloom filter for efficient traffic flow measurement. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:167-172 [Conf]
  32. Qi Zhao, Abhishek Kumar, Jun Xu
    Joint Data Streaming and Sampling Techniques for Detection of Super Sources and Destinations. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:77-90 [Conf]
  33. Jun Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon
    On the design and performance of prefix-preserving IP traffic trace anonymization. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2001, pp:263-266 [Conf]
  34. Abhishek Kumar, Jun Xu, Jia Wang, Oliver Spatscheck, Li Li
    Space-Code Bloom Filter for Efficient Per-Flow Traffic Measurement. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  35. Abhishek Kumar, Jun Xu, Ellen W. Zegura
    Efficient and scalable query routing for unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1162-1173 [Conf]
  36. Jun Xu
    On the Fundamental Tradeoffs between Routing Table Size andNetwork Diameter in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  37. Jun Xu, Mukesh Singhal, Joanne DeGroat
    A Novel Cache Architecture to Support Layer-Four Packet Classification at Memory Access Speeds. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1445-1454 [Conf]
  38. Qi Zhao, Jun Xu
    On the Computational Complexity of Maintaining GPS Clock in Packet Scheduling. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  39. David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer
    Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:31- [Conf]
  40. Xiaonan Zhang, Jun Xu, Lianhong Cai
    Prosodic Boundary Prediction Based on Maximum Entropy Model with Error-Driven Modification. [Citation Graph (0, 0)][DBLP]
    ISCSLP, 2006, pp:149-160 [Conf]
  41. Yan Zhai, Peng Ning, Jun Xu
    Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:272-284 [Conf]
  42. Jun Xu, Daoying Pi, Yong-Yan Cao
    Global Robust Stability of General Recurrent Neural Networks with Time-Varying Delays. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:179-184 [Conf]
  43. Mithun Acharya, Tao Xie, Jun Xu
    Mining Interface Specifications for Generating Checkable Robustness Properties. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2006, pp:311-320 [Conf]
  44. Xiangrong Wang, Jun Xu, Christopher H. Pham
    An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2004, pp:329-339 [Conf]
  45. Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie
    Effective Generation of Interface Robustness Properties for Static Analysis. [Citation Graph (0, 0)][DBLP]
    ASE, 2006, pp:293-296 [Conf]
  46. Liping Jing, Michael K. Ng, Jun Xu, Joshua Zhexue Huang
    Subspace Clustering of Text Documents with Feature Weighting K-Means Algorithm. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:802-812 [Conf]
  47. Qi Zhao, Mitsunori Ogihara, Haixun Wang, Jun Xu
    Finding global icebergs over distributed data sets. [Citation Graph (0, 0)][DBLP]
    PODS, 2006, pp:298-307 [Conf]
  48. Sheng Li, Jun Xu, Lijun Deng
    Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development Environment. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:401-406 [Conf]
  49. Jun Xu, Richard J. Lipton
    On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:279-292 [Conf]
  50. Yunbo Cao, Jun Xu, Tie-Yan Liu, Hang Li, Yalou Huang, Hsiao-Wuen Hon
    Adapting ranking SVM to document retrieval. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2006, pp:186-193 [Conf]
  51. Abhishek Kumar, Minho Sung, Jun Xu, Jia Wang
    Data streaming algorithms for efficient and accurate estimation of flow size distribution. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:177-188 [Conf]
  52. Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegura
    A data streaming algorithm for estimating subpopulation flow size distribution. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:61-72 [Conf]
  53. Ashwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, Hui Zhang
    Data streaming algorithms for estimating entropy of network traffic. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:145-156 [Conf]
  54. Qi Zhao, Zihui Ge, Jia Wang, Jun Xu
    Robust traffic matrix estimation with imperfect information: making use of multiple data sources. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:133-144 [Conf]
  55. Qi Zhao, Abhishek Kumar, Jia Wang, Jun Xu
    Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:350-361 [Conf]
  56. Qi Zhao, Jun Xu, Zhen Liu
    Design of a novel statistics counter architecture with optimal space and time efficiency. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:323-334 [Conf]
  57. Jun Xu, K. W. Li
    Scheduling bursty data at WCDMA downlink using fuzzy inference. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3647-3651 [Conf]
  58. Jun Li, Minho Sung, Jun Xu, Li Li
    Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf]
  59. Jun Xu
    A Unified Proof of Minimum Time Complexity for Reaching Consensus and Uniform Consensus - An Oracle-Based Approach. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:102-108 [Conf]
  60. Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Transparent Runtime Randomization for Security. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:260-0 [Conf]
  61. Huayun Zhang, Jun Xu
    Cepstrum Interpolation towards Robust Speech Recognition over the Phone. [Citation Graph (0, 0)][DBLP]
    SPPRA, 2006, pp:216-221 [Conf]
  62. Liping Jing, Michael K. Ng, Jun Xu, Joshua Zhexue Huang
    On the Performance of Feature Weighting K-Means for Text Subspace Clustering. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:502-512 [Conf]
  63. Guiling Wang, YuShun Li, ShengWen Yang, ChunYu Miao, Jun Xu, Meilin Shi
    Towards a Grid-Based Collaborative Platform for E-Learning. [Citation Graph (0, 0)][DBLP]
    WEBIST, 2005, pp:510-517 [Conf]
  64. Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk
    Security Vulnerabilities - From Data Analysis to Protection Mechanisms. [Citation Graph (0, 0)][DBLP]
    WORDS Fall, 2003, pp:331-338 [Conf]
  65. Jun Xu, Yunbo Cao, Hang Li, Min Zhao
    Ranking definitions with supervised learning methods. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:811-819 [Conf]
  66. Peng Yang, Jun Xu, Jie He, Lihua Liang, Guobin Li
    Hybrid Control Based on Improved Radial Basis Function Network for Electro-hydraulic Servo System. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:117-120 [Conf]
  67. Frank Castaneda, Emre Can Sezer, Jun Xu
    WORM vs. WORM: preliminary study of an active counter-attack mechanism. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:83-93 [Conf]
  68. Ning Gu, Jun Xu, Xiaoyuan Wu, Jiangming Yang, Wei Ye
    Ontology based semantic conflicts resolution in collaborative editing of design documents. [Citation Graph (0, 0)][DBLP]
    Advanced Engineering Informatics, 2005, v:19, n:2, pp:103-111 [Journal]
  69. Yongxi Tan, Leming M. Shi, Saber M. Hussain, Jun Xu, Weida Tong, John M. Frazier, Charles Wang
    Integrating time-course microarray gene expression profiles with cytotoxicity for identification of biomarkers in primary rat hepatocytes exposed to cadmium. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2006, v:22, n:1, pp:77-87 [Journal]
  70. Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon
    Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:2, pp:253-272 [Journal]
  71. Bin Wang, Badri Kasthurirangan, Jun Xu
    Subsidized RED: an active queue management mechanism for short-lived flows. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:5, pp:540-549 [Journal]
  72. Jun Xu, Mukesh Singhal
    A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 1999, v:9, n:2, pp:173-180 [Journal]
  73. Jun Xu
    GMA: A Generic Match Algorithm for Structural Homomorphism, Isomorphism, and Maximal Common Substructure Match and Its Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1996, v:36, n:1, pp:25-34 [Journal]
  74. Jun Xu, Philip N. Borer
    Rigorous Deduction Theory for Assignment of Multidimensional NMR Spectra Using the Independent Spin Coupling Network Approach. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1994, v:34, n:2, pp:349-356 [Journal]
  75. Jun Xu, James Stevenson
    Drug-like Index: A New Approach To Measure Drug-like Compounds and Their Diversity. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 2000, v:40, n:5, pp:1177-1187 [Journal]
  76. Jun Xu, Bryan C. Sanctuary
    CPA: Constrained partitioning algorithm for initial assignment of protein proton resonances from MQF-COSY. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1993, v:33, n:3, pp:490-500 [Journal]
  77. Jun Xu, Bryan C. Sanctuary, B. N. Gray
    Automated extraction of spin coupling topologies from 2D NMR correlation spectra for protein proton resonance assignment. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1993, v:33, n:3, pp:475-489 [Journal]
  78. Jun Xu, Suzana K. Straus, Bryan C. Sanctuary, Laird Trimble
    Automation of protein 2D proton NMR assignment by means of fuzzy mathematics and graph theory. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1993, v:33, n:5, pp:668-682 [Journal]
  79. Jun Xu, Yunbo Cao, Hang Li, Min Zhao, Yalou Huang
    A Supervised Learning Approach to Search of Definitions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:3, pp:439-449 [Journal]
  80. Mohammed Quaddus, Jun Xu
    Adoption and diffusion of knowledge management systems: field studies of factors and variables. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2005, v:18, n:2-3, pp:107-115 [Journal]
  81. Jiazhong Chen, Jingli Zhou, Shengsheng Yu, Jun Xu, Ling Zhong, Junhao Zheng
    A Very Low Bit Rate Video Coding Combined with Fast Adaptive Block Size Motion Estimation and Nonuniform Scalar Quantization Multiwavelet Transform. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2005, v:26, n:1, pp:123-144 [Journal]
  82. Jiazhong Chen, Xun Ouyang, Wu Zheng, Jun Xu, Jingli Zhou, Shengsheng Yu
    The application of symmetric orthogonal multiwavelets and prefilter technique for image compression. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2006, v:29, n:2, pp:175-187 [Journal]
  83. Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant
    Modeling and evaluating the security threats of transient errors in firewall software. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2004, v:56, n:1-4, pp:53-72 [Journal]
  84. Guantao Chen, Jun Xu, Xingxing Yu
    Circumference of Graphs with Bounded Degree. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2004, v:33, n:5, pp:1136-1170 [Journal]
  85. Jun Xu, Yalou Huang
    Using SVM to Extract Acronyms from Text. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2007, v:11, n:4, pp:369-373 [Journal]
  86. Jun Xu, Wooyong Lee
    Sustaining Availability of Web Services under Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:2, pp:195-208 [Journal]
  87. Jun Xu, Mukesh Singhal
    Cost-Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:9, pp:1089-1099 [Journal]
  88. Lei Chen, Jun Xu, Ivana Djurdjevic, Shu Lin
    Near-Shannon-limit quasi-cyclic low-density parity-check codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:7, pp:1038-1042 [Journal]
  89. Jun Xu, Lei Chen, Lingqi Zeng, Lan Lan, Shu Lin
    Construction of low-density parity-check codes by superposition. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:2, pp:243-251 [Journal]
  90. Jun Xu, Mukesh Singhal
    Design of a High-Performance ATM Firewall. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:269-294 [Journal]
  91. Bassem Ammar, Bahram Honary, Yu Kou, Jun Xu, Shu Lin
    Construction of Low-Density Parity-Check Codes Based on Balanced Incomplete Block Designs. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:6, pp:1257-1268 [Journal]
  92. Heng Tang, Jun Xu, Yu Kou, Shu Lin, Khaled A. S. Abdel-Ghaffar
    On Algebraic Construction of Gallager and Circulant Low-Density Parity-Check Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:6, pp:1269-1279 [Journal]
  93. Heng Tang, Jun Xu, Shu Lin, Khaled A. S. Abdel-Ghaffar
    Codes on finite geometries. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:572-596 [Journal]
  94. Jun Xu, Lei Chen, Ivana Djurdjevic, Shu Lin, Khaled A. S. Abdel-Ghaffar
    Construction of Regular and Irregular LDPC Codes: Geometry Decomposition and Masking. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:121-134 [Journal]
  95. Jun Xu, Richard J. Lipton
    On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:15-28 [Journal]
  96. Minho Sung, Jun Xu
    IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:861-872 [Journal]
  97. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning
    Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:339-348 [Conf]
  98. Reza Sotudeh, Jun Xu, Aladdin M. Ariyaeeinia
    Speech Processing on FPGA. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2007, pp:18-23 [Conf]
  99. Abhishek Kumar, Jun Xu
    Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  100. Lei Wang, Junyan Ren, Wenjing Yin, Tingqian Chen, Jun Xu
    A High-Speed High-Resolution Low-Distortion CMOS Bootstrapped Switch. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1721-1724 [Conf]
  101. Alexander Thomasian, Jun Xu
    Cost Analysis of the X-code Double Parity Array. [Citation Graph (0, 0)][DBLP]
    MSST, 2007, pp:269-274 [Conf]
  102. Jun Xu, Hang Li
    AdaRank: a boosting algorithm for information retrieval. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:391-398 [Conf]
  103. Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
    Mining API patterns as partial orders from source code: from usage scenarios to specifications. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:25-34 [Conf]

  104. Expectation Maximization driven Geodesic Active Contour with Overlap Resolution (EMaGACOR): Application to Lymphocyte Segmentation on Breast Cancer Histopathology. [Citation Graph (, )][DBLP]

  105. Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP]

  106. Group-based learning: a boosting approach. [Citation Graph (, )][DBLP]

  107. Research on grid-based cooperative platform. [Citation Graph (, )][DBLP]

  108. Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. [Citation Graph (, )][DBLP]

  109. Database preprocessing with AHP. [Citation Graph (, )][DBLP]

  110. Global iceberg detection over distributed data streams. [Citation Graph (, )][DBLP]

  111. Customizable Data Exchange Based on Web Service. [Citation Graph (, )][DBLP]

  112. Automatic Emphasis Labeling for Emotional Speech by Measuring Prosody Generation Error. [Citation Graph (, )][DBLP]

  113. Sparsity-based deartifacting filtering in video compression. [Citation Graph (, )][DBLP]

  114. Bit Allocation for Fine-Granular SNR Scalability Coding with Hierarchical B Pictures. [Citation Graph (, )][DBLP]

  115. Topic based automatic news recommendation using topic model and affinity propagation. [Citation Graph (, )][DBLP]

  116. Online topic detection and tracking of financial news based on hierarchical clustering. [Citation Graph (, )][DBLP]

  117. One-class classification models for financial industry information recommendation. [Citation Graph (, )][DBLP]

  118. Ant Colony Optimization Based on Estimation of Distribution for the Traveling Salesman Problem. [Citation Graph (, )][DBLP]

  119. Modeling user activities in a large IPTV system. [Citation Graph (, )][DBLP]

  120. A data streaming algorithm for estimating entropies of od flows. [Citation Graph (, )][DBLP]

  121. Multiplicity Adjustment for Intersection-union Test: Detecting Overlapping Genes from Multiple Microarray Gene Lists. [Citation Graph (, )][DBLP]

  122. Design and Analysis of a Robust Pipelined Memory System. [Citation Graph (, )][DBLP]

  123. Computer-Aided Prognosis of ER+ Breast Cancer Histopathology and Correlating Survival Outcome with Oncotype DX Assay. [Citation Graph (, )][DBLP]

  124. Segmentation and Classification of Triple Negative Breast Cancers Using DCE-MRI. [Citation Graph (, )][DBLP]

  125. Optimizing power and throughput for m-out-of-n encoded asynchronous circuits. [Citation Graph (, )][DBLP]

  126. High-Throughput Prostate Cancer Gland Detection, Segmentation, and Classification from Digitized Needle Core Biopsies. [Citation Graph (, )][DBLP]

  127. Markov Random Field driven Region-Based Active Contour Model (MaRACel): Application to Medical Image Segmentation. [Citation Graph (, )][DBLP]

  128. ACES: adaptive clock estimation and synchronization using Kalman filtering. [Citation Graph (, )][DBLP]

  129. Networked Windows NT System Field Failure Data Analysis. [Citation Graph (, )][DBLP]

  130. Understanding Chinese Characteristics of Requirements Engineering. [Citation Graph (, )][DBLP]

  131. Directly optimizing evaluation measures in learning to rank. [Citation Graph (, )][DBLP]

  132. Modeling channel popularity dynamics in a large IPTV system. [Citation Graph (, )][DBLP]

  133. MapDupReducer: detecting near duplicates over massive datasets. [Citation Graph (, )][DBLP]

  134. Study on Feature Selection in Finance Text Categorization. [Citation Graph (, )][DBLP]

  135. Using Role Determination and Expert Mining in the Enterprise Environment. [Citation Graph (, )][DBLP]

  136. WIM at TREC 2007. [Citation Graph (, )][DBLP]

  137. Using Profile Matching and Text Categorization for Answer Extraction in TREC Genomics. [Citation Graph (, )][DBLP]

  138. Controlled sequential bifurcation for software reliability study. [Citation Graph (, )][DBLP]

  139. Theoretical Lower Bound for UWB TDOA Positioning. [Citation Graph (, )][DBLP]

  140. Channel Modeling for a Land Mobile Satellite System. [Citation Graph (, )][DBLP]

  141. A New Design of Bloom Filter for Packet Inspection Speedup. [Citation Graph (, )][DBLP]

  142. Analytical Framework for Performance Evaluation of Hybrid ARQ Schemes. [Citation Graph (, )][DBLP]

  143. AOA Cooperative Position Localization. [Citation Graph (, )][DBLP]

  144. Scalable Video Multicast on Broadcast Channels. [Citation Graph (, )][DBLP]

  145. Study of Artificial Neural Network Appraisal to Mine Coordination Development Ability. [Citation Graph (, )][DBLP]

  146. Hinfinity estimation of discrete-time piecewise linear systems. [Citation Graph (, )][DBLP]

  147. Topic Detection by Topic Model Induced Distance Using Biased Initiation. [Citation Graph (, )][DBLP]

  148. Nonlinear model predictive control using adaptive hinging hyperplanes model. [Citation Graph (, )][DBLP]

  149. Efficient Physical Design Methodology for Reducing Test Power Dissipation of Scan-Based Designs. [Citation Graph (, )][DBLP]

  150. Urban Traffic Flow Forecasting Based on Adaptive Hinging Hyperplanes. [Citation Graph (, )][DBLP]

  151. Entropy Evaluation Model of Enterprises Performance Based on Supply Chain Management Theory. [Citation Graph (, )][DBLP]

  152. Using Statistical Similarity to Identify Corresponding Attributes between Heterogeneous Spatial Databases. [Citation Graph (, )][DBLP]

  153. Dynamic Linkages between Stock Market Volatility and Macroeconomic Variables: Empirical Evidence Based on China. [Citation Graph (, )][DBLP]

  154. Role Centralized Modeling for Expert Search in Enterprise Corporation. [Citation Graph (, )][DBLP]

  155. An Information Acquisition Method of City Bus Integrated Control Network. [Citation Graph (, )][DBLP]

  156. Design on the Higher Layer Protocol of City-Bus Information Integrated Control Network Based on Embedded Component. [Citation Graph (, )][DBLP]

  157. Conflict Analysis of Multi-source SST Distribution. [Citation Graph (, )][DBLP]

  158. A high sensitivity quartz tuning fork temperature sensor. [Citation Graph (, )][DBLP]

  159. Improving the power for detecting overlapping genes from multiple DNA microarray-derived gene lists. [Citation Graph (, )][DBLP]

  160. Reliability and Performance of Mirrored Disk Organizations. [Citation Graph (, )][DBLP]

Search in 0.316secs, Finished in 0.323secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002