Search the dblp DataBase
Jun Xu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mohammed Quaddus , Jun Xu , Zohurul Hoque Factors of adoption of online auction: a China study. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:93-100 [Conf ] Soner Önder , Jun Xu , Rajiv Gupta Caching and Predicting Branch Sequences for Improved Fetch Effectiveness. [Citation Graph (0, 0)][DBLP ] IEEE PACT, 1999, pp:294-302 [Conf ] Guiling Wang , YuShun Li , ShengWen Yang , ChunYu Miao , Jun Xu , Meilin Shi Service-Oriented Grid Architecture and Middleware Technologies for Collaborative E-Learning. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:67-74 [Conf ] Ivana Djurdjevic , Jun Xu , Khaled A. S. Abdel-Ghaffar , Shu Lin A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols. [Citation Graph (0, 0)][DBLP ] AAECC, 2003, pp:98-107 [Conf ] Jun Xu , Reza Sotudeh , Mark B. Josephs Asynchronous Packet-Switching for Networks-on-Chip. [Citation Graph (0, 0)][DBLP ] ACSD, 2006, pp:201-207 [Conf ] Xingjun Zhang , Joshua Zhexue Huang , Depei Qian , Jun Xu , Liping Jing Supplier Categorization with K -Means Type Subspace Clustering. [Citation Graph (0, 0)][DBLP ] APWeb, 2006, pp:226-237 [Conf ] Jun Xu , Mukesh Singhal Design of a High-Performance ATM Firewall. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:93-102 [Conf ] Jun Xu , Peng Ning , Chongkyung Kil , Yan Zhai , Christopher Bookholt Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf ] XiaoFeng Wang , Zhuowei Li , Jun Xu , Michael K. Reiter , Chongkyung Kil , Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf ] Hang Li , Yunbo Cao , Jun Xu , Yunhua Hu , Shenjie Li , Dmitriy Meyerzon A new approach to intranet search based on information extraction. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:460-468 [Conf ] Ning Gu , Jun Xu , Wei Ye Approach to Indefinite Semantic Conflicts of Words in Collaborative Editing of Design Documents. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:671-676 [Conf ] Shuo Chen , Zbigniew Kalbarczyk , Jun Xu , Ravishankar K. Iyer A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:605-614 [Conf ] Shuo Chen , Jun Xu , Ravishankar K. Iyer , Keith Whisnant Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:495-504 [Conf ] Shuo Chen , Jun Xu , Nithin Nakka , Zbigniew Kalbarczyk , Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:378-387 [Conf ] Nithin Nakka , Zbigniew Kalbarczyk , Ravishankar K. Iyer , Jun Xu An Architectural Framework for Providing Reliability and Security Support. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:585-594 [Conf ] Yi-Min Wang , Wilf Russell , Anish Arora , Rajesh Jagannathan , Jun Xu Towards Dependable Home Networking: An Experience Report. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:43-48 [Conf ] Jun Xu , Shuo Chen , Zbigniew Kalbarczyk , Ravishankar K. Iyer An Experimental Study of Security Vulnerabilities Caused by Errors. [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:421-432 [Conf ] Jun Xu , Yunbo Cao , Hang Li , Nick Craswell , Yalou Huang Searching Documents Based on Relevance and Type. [Citation Graph (0, 0)][DBLP ] ECIR, 2007, pp:629-636 [Conf ] Jun Xu , Yunbo Cao , Hang Li , Yalou Huang Cost-Sensitive Learning of SVM for Ranking. [Citation Graph (0, 0)][DBLP ] ECML, 2006, pp:833-840 [Conf ] Jun Xu , Mukesh Singhal A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. [Citation Graph (0, 0)][DBLP ] HASE, 1998, pp:205-208 [Conf ] Seung Jun , Mustaque Ahamad , Jun Xu Robust Information Dissemination in Uncooperative Environments. [Citation Graph (0, 0)][DBLP ] ICDCS, 2005, pp:293-302 [Conf ] Minho Sung , Abhishek Kumar , Erran L. Li , Jia Wang , Jun Xu Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2006, pp:27- [Conf ] Jun Xu , Mohammed Quaddus A Managers' Guide to KMS Adoption and Diffusion. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:908-914 [Conf ] Abhishek Kumar , Shashidhar Merugu , Jun Xu , Xingxing Yu Ulysses: A Robust, Low-Diameter, Low-Latency Peer-ti-Peer Network. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:258-267 [Conf ] Minho Sung , Jun Xu IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ICNP, 2002, pp:302-311 [Conf ] Jun Xu , Jinliang Fan , Mostafa H. Ammar , Sue B. Moon Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. [Citation Graph (0, 0)][DBLP ] ICNP, 2002, pp:280-289 [Conf ] Jun Xu , Mukesh Singhal Certificate Path Generation Protocol (CPGP) for Authenticated Signaling in ATM Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 1998, pp:282-289 [Conf ] Jing Ding , Daniel Berleant , Jun Xu , Andy W. Fulmer Extracting Biochemical Interactions from MEDLINE Using a Link Grammar Parser. [Citation Graph (0, 0)][DBLP ] ICTAI, 2003, pp:467-0 [Conf ] Jun Xu , Kainian Fang , Weixiang Shi A Computer-Controlled Tool Post Using a Piezoelectric Actuator for Turning Non-Rotationally Symmetric Surface. [Citation Graph (0, 0)][DBLP ] ITAMS, 1991, pp:401-407 [Conf ] Minghui Dong , Kim-Teng Lua , Jun Xu Selecting Prosody Parameters for Unit Selection Based Chinese TTS. [Citation Graph (0, 0)][DBLP ] IJCNLP, 2004, pp:272-279 [Conf ] Abhishek Kumar , Jun Xu , Erran L. Li , Jia Wang Space-code bloom filter for efficient traffic flow measurement. [Citation Graph (0, 0)][DBLP ] Internet Measurement Comference, 2003, pp:167-172 [Conf ] Qi Zhao , Abhishek Kumar , Jun Xu Joint Data Streaming and Sampling Techniques for Detection of Super Sources and Destinations. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:77-90 [Conf ] Jun Xu , Jinliang Fan , Mostafa H. Ammar , Sue B. Moon On the design and performance of prefix-preserving IP traffic trace anonymization. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2001, pp:263-266 [Conf ] Abhishek Kumar , Jun Xu , Jia Wang , Oliver Spatscheck , Li Li Space-Code Bloom Filter for Efficient Per-Flow Traffic Measurement. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Abhishek Kumar , Jun Xu , Ellen W. Zegura Efficient and scalable query routing for unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1162-1173 [Conf ] Jun Xu On the Fundamental Tradeoffs between Routing Table Size andNetwork Diameter in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Jun Xu , Mukesh Singhal , Joanne DeGroat A Novel Cache Architecture to Support Layer-Four Packet Classification at Memory Access Speeds. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:1445-1454 [Conf ] Qi Zhao , Jun Xu On the Computational Complexity of Maintaining GPS Clock in Packet Scheduling. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] David T. Stott , Neil A. Speirs , Zbigniew Kalbarczyk , Saurabh Bagchi , Jun Xu , Ravishankar K. Iyer Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:31- [Conf ] Xiaonan Zhang , Jun Xu , Lianhong Cai Prosodic Boundary Prediction Based on Maximum Entropy Model with Error-Driven Modification. [Citation Graph (0, 0)][DBLP ] ISCSLP, 2006, pp:149-160 [Conf ] Yan Zhai , Peng Ning , Jun Xu Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:272-284 [Conf ] Jun Xu , Daoying Pi , Yong-Yan Cao Global Robust Stability of General Recurrent Neural Networks with Time-Varying Delays. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2006, pp:179-184 [Conf ] Mithun Acharya , Tao Xie , Jun Xu Mining Interface Specifications for Generating Checkable Robustness Properties. [Citation Graph (0, 0)][DBLP ] ISSRE, 2006, pp:311-320 [Conf ] Xiangrong Wang , Jun Xu , Christopher H. Pham An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior. [Citation Graph (0, 0)][DBLP ] ISSRE, 2004, pp:329-339 [Conf ] Mithun Acharya , Tanu Sharma , Jun Xu , Tao Xie Effective Generation of Interface Robustness Properties for Static Analysis. [Citation Graph (0, 0)][DBLP ] ASE, 2006, pp:293-296 [Conf ] Liping Jing , Michael K. Ng , Jun Xu , Joshua Zhexue Huang Subspace Clustering of Text Documents with Feature Weighting K -Means Algorithm. [Citation Graph (0, 0)][DBLP ] PAKDD, 2005, pp:802-812 [Conf ] Qi Zhao , Mitsunori Ogihara , Haixun Wang , Jun Xu Finding global icebergs over distributed data sets. [Citation Graph (0, 0)][DBLP ] PODS, 2006, pp:298-307 [Conf ] Sheng Li , Jun Xu , Lijun Deng Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development Environment. [Citation Graph (0, 0)][DBLP ] PRDC, 2004, pp:401-406 [Conf ] Jun Xu , Richard J. Lipton On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:279-292 [Conf ] Yunbo Cao , Jun Xu , Tie-Yan Liu , Hang Li , Yalou Huang , Hsiao-Wuen Hon Adapting ranking SVM to document retrieval. [Citation Graph (0, 0)][DBLP ] SIGIR, 2006, pp:186-193 [Conf ] Abhishek Kumar , Minho Sung , Jun Xu , Jia Wang Data streaming algorithms for efficient and accurate estimation of flow size distribution. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2004, pp:177-188 [Conf ] Abhishek Kumar , Minho Sung , Jun Xu , Ellen W. Zegura A data streaming algorithm for estimating subpopulation flow size distribution. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2005, pp:61-72 [Conf ] Ashwin Lall , Vyas Sekar , Mitsunori Ogihara , Jun Xu , Hui Zhang Data streaming algorithms for estimating entropy of network traffic. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:145-156 [Conf ] Qi Zhao , Zihui Ge , Jia Wang , Jun Xu Robust traffic matrix estimation with imperfect information: making use of multiple data sources. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:133-144 [Conf ] Qi Zhao , Abhishek Kumar , Jia Wang , Jun Xu Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2005, pp:350-361 [Conf ] Qi Zhao , Jun Xu , Zhen Liu Design of a novel statistics counter architecture with optimal space and time efficiency. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:323-334 [Conf ] Jun Xu , K. W. Li Scheduling bursty data at WCDMA downlink using fuzzy inference. [Citation Graph (0, 0)][DBLP ] SMC (4), 2004, pp:3647-3651 [Conf ] Jun Li , Minho Sung , Jun Xu , Li Li Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf ] Jun Xu A Unified Proof of Minimum Time Complexity for Reaching Consensus and Uniform Consensus - An Oracle-Based Approach. [Citation Graph (0, 0)][DBLP ] SRDS, 2002, pp:102-108 [Conf ] Jun Xu , Zbigniew Kalbarczyk , Ravishankar K. Iyer Transparent Runtime Randomization for Security. [Citation Graph (0, 0)][DBLP ] SRDS, 2003, pp:260-0 [Conf ] Huayun Zhang , Jun Xu Cepstrum Interpolation towards Robust Speech Recognition over the Phone. [Citation Graph (0, 0)][DBLP ] SPPRA, 2006, pp:216-221 [Conf ] Liping Jing , Michael K. Ng , Jun Xu , Joshua Zhexue Huang On the Performance of Feature Weighting K -Means for Text Subspace Clustering. [Citation Graph (0, 0)][DBLP ] WAIM, 2005, pp:502-512 [Conf ] Guiling Wang , YuShun Li , ShengWen Yang , ChunYu Miao , Jun Xu , Meilin Shi Towards a Grid-Based Collaborative Platform for E-Learning. [Citation Graph (0, 0)][DBLP ] WEBIST, 2005, pp:510-517 [Conf ] Ravishankar K. Iyer , Shuo Chen , Jun Xu , Zbigniew Kalbarczyk Security Vulnerabilities - From Data Analysis to Protection Mechanisms. [Citation Graph (0, 0)][DBLP ] WORDS Fall, 2003, pp:331-338 [Conf ] Jun Xu , Yunbo Cao , Hang Li , Min Zhao Ranking definitions with supervised learning methods. [Citation Graph (0, 0)][DBLP ] WWW (Special interest tracks and posters), 2005, pp:811-819 [Conf ] Peng Yang , Jun Xu , Jie He , Lihua Liang , Guobin Li Hybrid Control Based on Improved Radial Basis Function Network for Electro-hydraulic Servo System. [Citation Graph (0, 0)][DBLP ] ICICIC (1), 2006, pp:117-120 [Conf ] Frank Castaneda , Emre Can Sezer , Jun Xu WORM vs. WORM: preliminary study of an active counter-attack mechanism. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:83-93 [Conf ] Ning Gu , Jun Xu , Xiaoyuan Wu , Jiangming Yang , Wei Ye Ontology based semantic conflicts resolution in collaborative editing of design documents. [Citation Graph (0, 0)][DBLP ] Advanced Engineering Informatics, 2005, v:19, n:2, pp:103-111 [Journal ] Yongxi Tan , Leming M. Shi , Saber M. Hussain , Jun Xu , Weida Tong , John M. Frazier , Charles Wang Integrating time-course microarray gene expression profiles with cytotoxicity for identification of biomarkers in primary rat hepatocytes exposed to cadmium. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2006, v:22, n:1, pp:77-87 [Journal ] Jinliang Fan , Jun Xu , Mostafa H. Ammar , Sue B. Moon Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:2, pp:253-272 [Journal ] Bin Wang , Badri Kasthurirangan , Jun Xu Subsidized RED: an active queue management mechanism for short-lived flows. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:5, pp:540-549 [Journal ] Jun Xu , Mukesh Singhal A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 1999, v:9, n:2, pp:173-180 [Journal ] Jun Xu GMA: A Generic Match Algorithm for Structural Homomorphism, Isomorphism, and Maximal Common Substructure Match and Its Applications. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1996, v:36, n:1, pp:25-34 [Journal ] Jun Xu , Philip N. Borer Rigorous Deduction Theory for Assignment of Multidimensional NMR Spectra Using the Independent Spin Coupling Network Approach. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1994, v:34, n:2, pp:349-356 [Journal ] Jun Xu , James Stevenson Drug-like Index: A New Approach To Measure Drug-like Compounds and Their Diversity. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 2000, v:40, n:5, pp:1177-1187 [Journal ] Jun Xu , Bryan C. Sanctuary CPA: Constrained partitioning algorithm for initial assignment of protein proton resonances from MQF-COSY. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1993, v:33, n:3, pp:490-500 [Journal ] Jun Xu , Bryan C. Sanctuary , B. N. Gray Automated extraction of spin coupling topologies from 2D NMR correlation spectra for protein proton resonance assignment. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1993, v:33, n:3, pp:475-489 [Journal ] Jun Xu , Suzana K. Straus , Bryan C. Sanctuary , Laird Trimble Automation of protein 2D proton NMR assignment by means of fuzzy mathematics and graph theory. [Citation Graph (0, 0)][DBLP ] Journal of Chemical Information and Computer Sciences, 1993, v:33, n:5, pp:668-682 [Journal ] Jun Xu , Yunbo Cao , Hang Li , Min Zhao , Yalou Huang A Supervised Learning Approach to Search of Definitions. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:3, pp:439-449 [Journal ] Mohammed Quaddus , Jun Xu Adoption and diffusion of knowledge management systems: field studies of factors and variables. [Citation Graph (0, 0)][DBLP ] Knowl.-Based Syst., 2005, v:18, n:2-3, pp:107-115 [Journal ] Jiazhong Chen , Jingli Zhou , Shengsheng Yu , Jun Xu , Ling Zhong , Junhao Zheng A Very Low Bit Rate Video Coding Combined with Fast Adaptive Block Size Motion Estimation and Nonuniform Scalar Quantization Multiwavelet Transform. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2005, v:26, n:1, pp:123-144 [Journal ] Jiazhong Chen , Xun Ouyang , Wu Zheng , Jun Xu , Jingli Zhou , Shengsheng Yu The application of symmetric orthogonal multiwavelets and prefilter technique for image compression. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2006, v:29, n:2, pp:175-187 [Journal ] Shuo Chen , Jun Xu , Zbigniew Kalbarczyk , Ravishankar K. Iyer , Keith Whisnant Modeling and evaluating the security threats of transient errors in firewall software. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2004, v:56, n:1-4, pp:53-72 [Journal ] Guantao Chen , Jun Xu , Xingxing Yu Circumference of Graphs with Bounded Degree. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2004, v:33, n:5, pp:1136-1170 [Journal ] Jun Xu , Yalou Huang Using SVM to Extract Acronyms from Text. [Citation Graph (0, 0)][DBLP ] Soft Comput., 2007, v:11, n:4, pp:369-373 [Journal ] Jun Xu , Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:2, pp:195-208 [Journal ] Jun Xu , Mukesh Singhal Cost-Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:9, pp:1089-1099 [Journal ] Lei Chen , Jun Xu , Ivana Djurdjevic , Shu Lin Near-Shannon-limit quasi-cyclic low-density parity-check codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2004, v:52, n:7, pp:1038-1042 [Journal ] Jun Xu , Lei Chen , Lingqi Zeng , Lan Lan , Shu Lin Construction of low-density parity-check codes by superposition. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2005, v:53, n:2, pp:243-251 [Journal ] Jun Xu , Mukesh Singhal Design of a High-Performance ATM Firewall. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:269-294 [Journal ] Bassem Ammar , Bahram Honary , Yu Kou , Jun Xu , Shu Lin Construction of Low-Density Parity-Check Codes Based on Balanced Incomplete Block Designs. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:6, pp:1257-1268 [Journal ] Heng Tang , Jun Xu , Yu Kou , Shu Lin , Khaled A. S. Abdel-Ghaffar On Algebraic Construction of Gallager and Circulant Low-Density Parity-Check Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:6, pp:1269-1279 [Journal ] Heng Tang , Jun Xu , Shu Lin , Khaled A. S. Abdel-Ghaffar Codes on finite geometries. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:2, pp:572-596 [Journal ] Jun Xu , Lei Chen , Ivana Djurdjevic , Shu Lin , Khaled A. S. Abdel-Ghaffar Construction of Regular and Irregular LDPC Codes: Geometry Decomposition and Masking. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:121-134 [Journal ] Jun Xu , Richard J. Lipton On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:15-28 [Journal ] Minho Sung , Jun Xu IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:861-872 [Journal ] Chongkyung Kil , Jinsuk Jun , Christopher Bookholt , Jun Xu , Peng Ning Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:339-348 [Conf ] Reza Sotudeh , Jun Xu , Aladdin M. Ariyaeeinia Speech Processing on FPGA. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2007, pp:18-23 [Conf ] Abhishek Kumar , Jun Xu Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Lei Wang , Junyan Ren , Wenjing Yin , Tingqian Chen , Jun Xu A High-Speed High-Resolution Low-Distortion CMOS Bootstrapped Switch. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:1721-1724 [Conf ] Alexander Thomasian , Jun Xu Cost Analysis of the X-code Double Parity Array. [Citation Graph (0, 0)][DBLP ] MSST, 2007, pp:269-274 [Conf ] Jun Xu , Hang Li AdaRank: a boosting algorithm for information retrieval. [Citation Graph (0, 0)][DBLP ] SIGIR, 2007, pp:391-398 [Conf ] Mithun Acharya , Tao Xie , Jian Pei , Jun Xu Mining API patterns as partial orders from source code: from usage scenarios to specifications. [Citation Graph (0, 0)][DBLP ] ESEC/SIGSOFT FSE, 2007, pp:25-34 [Conf ] Expectation Maximization driven Geodesic Active Contour with Overlap Resolution (EMaGACOR): Application to Lymphocyte Segmentation on Breast Cancer Histopathology. [Citation Graph (, )][DBLP ] Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP ] Group-based learning: a boosting approach. [Citation Graph (, )][DBLP ] Research on grid-based cooperative platform. [Citation Graph (, )][DBLP ] Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. [Citation Graph (, )][DBLP ] Database preprocessing with AHP. [Citation Graph (, )][DBLP ] Global iceberg detection over distributed data streams. [Citation Graph (, )][DBLP ] Customizable Data Exchange Based on Web Service. [Citation Graph (, )][DBLP ] Automatic Emphasis Labeling for Emotional Speech by Measuring Prosody Generation Error. [Citation Graph (, )][DBLP ] Sparsity-based deartifacting filtering in video compression. [Citation Graph (, )][DBLP ] Bit Allocation for Fine-Granular SNR Scalability Coding with Hierarchical B Pictures. [Citation Graph (, )][DBLP ] Topic based automatic news recommendation using topic model and affinity propagation. [Citation Graph (, )][DBLP ] Online topic detection and tracking of financial news based on hierarchical clustering. [Citation Graph (, )][DBLP ] One-class classification models for financial industry information recommendation. [Citation Graph (, )][DBLP ] Ant Colony Optimization Based on Estimation of Distribution for the Traveling Salesman Problem. [Citation Graph (, )][DBLP ] Modeling user activities in a large IPTV system. [Citation Graph (, )][DBLP ] A data streaming algorithm for estimating entropies of od flows. [Citation Graph (, )][DBLP ] Multiplicity Adjustment for Intersection-union Test: Detecting Overlapping Genes from Multiple Microarray Gene Lists. [Citation Graph (, )][DBLP ] Design and Analysis of a Robust Pipelined Memory System. [Citation Graph (, )][DBLP ] Computer-Aided Prognosis of ER+ Breast Cancer Histopathology and Correlating Survival Outcome with Oncotype DX Assay. [Citation Graph (, )][DBLP ] Segmentation and Classification of Triple Negative Breast Cancers Using DCE-MRI. [Citation Graph (, )][DBLP ] Optimizing power and throughput for m-out-of-n encoded asynchronous circuits. [Citation Graph (, )][DBLP ] High-Throughput Prostate Cancer Gland Detection, Segmentation, and Classification from Digitized Needle Core Biopsies. [Citation Graph (, )][DBLP ] Markov Random Field driven Region-Based Active Contour Model (MaRACel): Application to Medical Image Segmentation. [Citation Graph (, )][DBLP ] ACES: adaptive clock estimation and synchronization using Kalman filtering. [Citation Graph (, )][DBLP ] Networked Windows NT System Field Failure Data Analysis. [Citation Graph (, )][DBLP ] Understanding Chinese Characteristics of Requirements Engineering. [Citation Graph (, )][DBLP ] Directly optimizing evaluation measures in learning to rank. [Citation Graph (, )][DBLP ] Modeling channel popularity dynamics in a large IPTV system. [Citation Graph (, )][DBLP ] MapDupReducer: detecting near duplicates over massive datasets. [Citation Graph (, )][DBLP ] Study on Feature Selection in Finance Text Categorization. [Citation Graph (, )][DBLP ] Using Role Determination and Expert Mining in the Enterprise Environment. [Citation Graph (, )][DBLP ] WIM at TREC 2007. [Citation Graph (, )][DBLP ] Using Profile Matching and Text Categorization for Answer Extraction in TREC Genomics. [Citation Graph (, )][DBLP ] Controlled sequential bifurcation for software reliability study. [Citation Graph (, )][DBLP ] Theoretical Lower Bound for UWB TDOA Positioning. [Citation Graph (, )][DBLP ] Channel Modeling for a Land Mobile Satellite System. [Citation Graph (, )][DBLP ] A New Design of Bloom Filter for Packet Inspection Speedup. [Citation Graph (, )][DBLP ] Analytical Framework for Performance Evaluation of Hybrid ARQ Schemes. [Citation Graph (, )][DBLP ] AOA Cooperative Position Localization. [Citation Graph (, )][DBLP ] Scalable Video Multicast on Broadcast Channels. [Citation Graph (, )][DBLP ] Study of Artificial Neural Network Appraisal to Mine Coordination Development Ability. [Citation Graph (, )][DBLP ] Hinfinity estimation of discrete-time piecewise linear systems. [Citation Graph (, )][DBLP ] Topic Detection by Topic Model Induced Distance Using Biased Initiation. [Citation Graph (, )][DBLP ] Nonlinear model predictive control using adaptive hinging hyperplanes model. [Citation Graph (, )][DBLP ] Efficient Physical Design Methodology for Reducing Test Power Dissipation of Scan-Based Designs. [Citation Graph (, )][DBLP ] Urban Traffic Flow Forecasting Based on Adaptive Hinging Hyperplanes. [Citation Graph (, )][DBLP ] Entropy Evaluation Model of Enterprises Performance Based on Supply Chain Management Theory. [Citation Graph (, )][DBLP ] Using Statistical Similarity to Identify Corresponding Attributes between Heterogeneous Spatial Databases. [Citation Graph (, )][DBLP ] Dynamic Linkages between Stock Market Volatility and Macroeconomic Variables: Empirical Evidence Based on China. [Citation Graph (, )][DBLP ] Role Centralized Modeling for Expert Search in Enterprise Corporation. [Citation Graph (, )][DBLP ] An Information Acquisition Method of City Bus Integrated Control Network. [Citation Graph (, )][DBLP ] Design on the Higher Layer Protocol of City-Bus Information Integrated Control Network Based on Embedded Component. [Citation Graph (, )][DBLP ] Conflict Analysis of Multi-source SST Distribution. [Citation Graph (, )][DBLP ] A high sensitivity quartz tuning fork temperature sensor. [Citation Graph (, )][DBLP ] Improving the power for detecting overlapping genes from multiple DNA microarray-derived gene lists. [Citation Graph (, )][DBLP ] Reliability and Performance of Mirrored Disk Organizations. [Citation Graph (, )][DBLP ] Search in 0.010secs, Finished in 0.760secs