The SCEAS System
Navigation Menu

Search the dblp DataBase


Jun Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhangxi Lin, Jun Li
    The online auction market in China: a comparative study between Taobao and eBay. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:123-129 [Conf]
  2. Jun Li, Xun Kang
    mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:397-408 [Conf]
  3. Jun Li, Yingyi Bu, Shaxun Chen, XianPing Tao, Jian Lu
    FollowMe: On Research of Pluggable Infrastructure for Context-Awareness. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:199-204 [Conf]
  4. Bo Xu, Dongyi Jiang, Jun Li
    HSM: A Fast Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:987-992 [Conf]
  5. Zaiping Chen, Jun Li, Youjun Yue, Qiang Gao, Hui Zhao, Zhenlin Xu
    A Neural Network Online Training Algorithm Based on Compound Gradient Vector. [Citation Graph (0, 0)][DBLP]
    Australian Joint Conference on Artificial Intelligence, 2002, pp:374-384 [Conf]
  6. Jun Li, Xiongfei Li, Hui Liu, Xinying Chen
    The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:449-456 [Conf]
  7. Jun Li, Ian R. Greenshields
    De-Noising ENMR Spectra by Wavelet Shrinkage. [Citation Graph (0, 0)][DBLP]
    CBMS, 1998, pp:252-0 [Conf]
  8. Jun Li, Wei-Yun Yau, Han Wang
    Continuous fingerprints classification by symmetrical filters. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:357- [Conf]
  9. Yunfang Feng, Zhiyuan Liu, Jun Li
    Securing Membership Control in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:160-163 [Conf]
  10. Jun Li, Amitava Bose, Yiqiang Q. Zhao
    Rayleigh Flat Fading Channels' Capacity. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:214-217 [Conf]
  11. Jun Li, Keith Moore
    Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE (2), 2004, pp:1482-1501 [Conf]
  12. Jianming Yu, Jun Li
    A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:375-384 [Conf]
  13. Xiaoyang Tan, Songcan Chen, Jun Li, Zhi-Hua Zhou
    Learning Non-Metric Partial Similarity Based on Maximal Margin Criterion. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:138-145 [Conf]
  14. Janet Meiling Wang, Omar Hafiz, Jun Li
    A linear fractional transform (LFT) based model for interconnect parametric uncertainty. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:375-380 [Conf]
  15. Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Meiling Wang
    A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching. [Citation Graph (0, 0)][DBLP]
    DATE, 2005, pp:770-775 [Conf]
  16. Jun Li, Edward Omiecinski
    Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:69-83 [Conf]
  17. Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian Lu
    Context Consistency Management Using Ontology Based Model. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2006, pp:741-755 [Conf]
  18. Yuzhen Li, Jun Li, Shuigeng Zhou
    GML Storage: A Spatial Database Approach. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2004, pp:55-66 [Conf]
  19. Yingyi Bu, Jun Li, Shaxun Chen, XianPing Tao, Jian Lu
    An Enhanced Ontology Based Context Model and Fusion Mechanism. [Citation Graph (0, 0)][DBLP]
    EUC, 2005, pp:920-929 [Conf]
  20. Wentian Lu, Jun Li, XianPing Tao, Xiaoxing Ma, Jian Lu
    Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. [Citation Graph (0, 0)][DBLP]
    EuroSSC, 2006, pp:143-158 [Conf]
  21. Jun Li
    Order Continuity of Fuzzy Measure and Convergence of Measurable Functions Sequence. [Citation Graph (0, 0)][DBLP]
    FUZZ-IEEE, 2001, pp:170-172 [Conf]
  22. Jun Li, Roy D. Yates, Dipankar Raychaudhuri
    Handoff Control in the PNNI Hierarchy of Mobile ATM Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  23. Jun Li, Keith Moore
    A Runtime and Analysis Framework Support for Unit Component Testing in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:261- [Conf]
  24. Jun Li, Shunyi Zhang
    Modeling and Analyzing Peer-to-Peer File-Sharing System. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:433-436 [Conf]
  25. Jun Li, Constantine N. Manikopoulos
    Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:53-59 [Conf]
  26. Hao Xiong, Jun Li, Momiao Xiong
    Identification of Differentially Regulated Genetic Network. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:444-450 [Conf]
  27. Yaxuan Qi, Bo Xu, Jun Li
    Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification. [Citation Graph (0, 0)][DBLP]
    ICAS/ICNS, 2005, pp:7- [Conf]
  28. Janet Meiling Wang, Bharat Srinivas, Dongsheng Ma, Charlie Chung-Ping Chen, Jun Li
    System-level power and thermal modeling and analysis by orthogonal polynomial based response surface approach (OPRS). [Citation Graph (0, 0)][DBLP]
    ICCAD, 2005, pp:728-735 [Conf]
  29. Jun Li, Allen A. Rovick, Joel A. Michael
    ABASE: A Hypermedia-based Tutoring and Authoring System. [Citation Graph (0, 0)][DBLP]
    ICCAL, 1992, pp:380-390 [Conf]
  30. Xi-Ping Luo, Li-Xin Zhen, Gang Peng, Jun Li, Bai-Hua Xiao
    Camera based mixed-lingual card reader for mobile device. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:665-669 [Conf]
  31. Jun Li
    Monitoring and Characterization of Component-Based Systems with Global Causality Capture. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:422-0 [Conf]
  32. Jun Li, Haofeng Zhou, Wei Wang
    Gradual Cube: Customize Profile on Mobile OLAP. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:943-947 [Conf]
  33. Xingsen Li, Yong Shi, Ying Liu, Jun Li, Aihua Li
    A Knowledge Management Platform for Optimization-based Data Mining. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:833-837 [Conf]
  34. Jun Li, Fumin Yang, Yansheng Lu
    A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:176-183 [Conf]
  35. Cuimei Bo, Jun Li, Zhiquan Wang, Jinguo Lin
    Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:596-601 [Conf]
  36. Jun Li, Cuimei Bo, Jiugen Zhang, Jie Du
    Fault Diagnosis and Accommodation Based on Online Multi-model for Nonlinear Process. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:661-666 [Conf]
  37. Hong-Nan Li, Zhiguo Chang, Jun Li
    Semi-active Control for Eccentric Structures with MR Damper by Hybrid Intelligent Algorithm. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:139-148 [Conf]
  38. Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li
    Empirical Study on the Evolution of PlanetLab. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:64- [Conf]
  39. Jun Li, Wei-Yun Yau
    Prediction of Fingerprint Orientation. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2004, pp:436-439 [Conf]
  40. Jun Li, Wei-Yun Yau, Han Wang
    Fingerprint Indexing Based On Symmetrical Measurement. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:1038-1041 [Conf]
  41. Xi-Ping Luo, Jun Li, Li-Xin Zhen
    Design and Implementation of a Card Reader based on Build-in Camera. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2004, pp:417-420 [Conf]
  42. Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li
    Analysis and Improvement of An Iris Identification Algorithm. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:362-365 [Conf]
  43. Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li
    Iris Recognition Algorithm Using Modified Log-Gabor Filters. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:461-464 [Conf]
  44. Jun Li, Peter H. Feiler
    Impact Analysis in Real-Time Control Systems. [Citation Graph (0, 0)][DBLP]
    ICSM, 1999, pp:443-452 [Conf]
  45. Jun Li, Keith Moore
    Exploiting Global Causality in Testing of Distributed and Component-Based Applications. [Citation Graph (0, 0)][DBLP]
    ICSM, 2004, pp:527- [Conf]
  46. Wuzheng Tan, Lizhuang Ma, Jun Li, Zuxiu Xiao
    Application MDA in a Conception Design Environment. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:702-704 [Conf]
  47. Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang
    SAVE: Source Address Validity Enforcement Protocol. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  48. Jun Li, Roy D. Yates, Dipankar Raychaudhuri
    Performance Analysis on Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:1195-1203 [Conf]
  49. Miles N. Wernick, Jovan G. Brankov, Dean Chapman, Mark A. Anastasio, Zhong Zhong, Carol Muehleman, Jun Li
    Multiple-Image Computed Tomography. [Citation Graph (0, 0)][DBLP]
    ISBI, 2004, pp:948-951 [Conf]
  50. Satish K. Yanamanamanda, Jun Li, Janet Meiling Wang
    Uncertainty modeling of gate delay considering multiple input switching. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2457-2460 [Conf]
  51. Hongli Gao, Mingheng Xu, Jun Li, Chunjun Chen
    Tool Wear Monitoring Using FNN with Compact Support Gaussian Function. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:957-963 [Conf]
  52. Jun Li, Jun-Hua Liu
    Identification and Control of Dynamic Systems Based on Least Squares Wavelet Vector Machines. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:934-942 [Conf]
  53. Jun Li, Xun Kang
    Proof of Service in a Hybrid P2P Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:64-73 [Conf]
  54. Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li
    Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:301-313 [Conf]
  55. Huifang Yin, Jun Li
    An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:373-382 [Conf]
  56. Joo-Hwee Lim, Jun Li, Philippe Mulhem, Qi Tian
    Content-Based Summarization for Personal Image Library. [Citation Graph (0, 0)][DBLP]
    JCDL, 2003, pp:393- [Conf]
  57. Wei Yu, Jun Li, Greg Butler
    Refactoring Use Case Models on Episodes. [Citation Graph (0, 0)][DBLP]
    ASE, 2004, pp:328-331 [Conf]
  58. Jun Li, Constantine N. Manikopoulos
    Investigation of the Performance of GAFT, a Novel Network Anomaly Fault Detection System. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:249-260 [Conf]
  59. Jun Li, Constantine N. Manikopoulos
    Network Fault Detection: Classifier Training Method for Anomaly Fault Detection in a Production Network Using Test Network Information. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:473-482 [Conf]
  60. Jun Li, Bruce Christianson, Martin Loomes
    "Fair" Authentication in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:132-143 [Conf]
  61. Li Tang, Hui Zhang, Jun Li, Yanda Li
    End-to-End Delay Behavior in the Internet. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2006, pp:373-382 [Conf]
  62. Jun Li, Masami Yasuda, Jinjie Song
    Regularity Properties of Null-Additive Fuzzy Measure on Metric Spaces. [Citation Graph (0, 0)][DBLP]
    MDAI, 2005, pp:59-66 [Conf]
  63. Li Tang, Jun Li, Jin Zhou, Zhizhi Zhou, Hao Wang, Kai Li
    FreeRank: implementing independent ranking service for multiplayer online games. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2005, pp:1-7 [Conf]
  64. Jun Li, Xin-ming Ye, Ye Tian
    Topologically-Aware AAA Overlay Network in Mobile IPv6 Environment. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:293-306 [Conf]
  65. Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher
    Simulation and Analysis on the Resiliency and Efficiency of Malnets. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:262-269 [Conf]
  66. Yonggang Chu, Jun Li, Yixian Yang
    The Architecture of the Large-scale Distributed Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:130-133 [Conf]
  67. Yingyi Bu, Tao Gu, XianPing Tao, Jun Li, Shaxun Chen, Jian Lu
    Managing Quality of Context in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    QSIC, 2006, pp:193-200 [Conf]
  68. Jun Li, Minho Sung, Jun Xu, Li Li
    Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf]
  69. Shaxun Chen, Yingyi Bu, Jun Li, XianPing Tao, Jian Lu
    Toward Context-Awareness: A Workflow Embedded Middleware. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:766-775 [Conf]
  70. Lingling Zhang, Jun Li, Yong Shi
    Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:816-825 [Conf]
  71. Jun Li, Kazutaka Furuse, Kazunori Yamaguchi
    Focused crawling by exploiting anchor text using decision tree. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1190-1191 [Conf]
  72. Yong-Zeng Xue, Sheng Li, Tie-Jun Zhao, Muyun Yang, Jun Li
    Bilingual Phrase Extraction from N-Best Alignments. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:410-414 [Conf]
  73. Yaxuan Qi, Jun Li
    An efficient hybrid algorithm for multidimensional packet classification. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:185-190 [Conf]
  74. Yaxuan Qi, Jun Li
    Towards effective packet classification. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:216-223 [Conf]
  75. Jun Li, Natasha Barrett, Yan-Qing Zhang, D. A. Washburn
    Genetic granular cognitive fuzzy neural networks and human brains for pattern recognition. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:172-175 [Conf]
  76. Jun Li, Jingli Zhou, Shengsheng Yu
    A Low Bit-Rate Video Codec Based on Control Grid Interpolation Motion Compensation Using Edge Feature. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2002, v:34, n:2, pp:98-109 [Journal]
  77. Jun Li, Zhong-Quan He
    Gap functions and existence of solutions to generalized vector variational inequalities. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2005, v:18, n:9, pp:989-1000 [Journal]
  78. Jun Li, Nan-Jing Huang
    Vector F-implicit complementarity problems in Banach spaces. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2006, v:19, n:5, pp:464-471 [Journal]
  79. Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal
    An internet routing forensics framework for discovering rules of abnormal BGP events. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2005, v:35, n:5, pp:55-66 [Journal]
  80. Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz
    BGP routing dynamics revisited. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:2, pp:5-16 [Journal]
  81. Jun Li, Mark Yarvis, Peter L. Reiher
    Securing distributed adaptation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:3, pp:347-371 [Journal]
  82. Jun Li
    A note on the null-additivity of the fuzzy measure: Corrigendum to "On the null-additivity of the fuzzy measure" [Fuzzy Sets and Systems 78 (1996) 337-339]. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2002, v:125, n:2, pp:269-271 [Journal]
  83. Jun Li
    On Egoroff's theorems on fuzzy measure spaces. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:135, n:3, pp:367-375 [Journal]
  84. Jun Li, Masami Yasuda
    Lusin's theorem on fuzzy measure spaces. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2004, v:146, n:1, pp:121-133 [Journal]
  85. Jun Li, Masami Yasuda
    On Egoroff's theorems on finite monotone non-additive measure space. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2005, v:153, n:1, pp:71-78 [Journal]
  86. Yao Ouyang, Jun Li
    A note on the monotone set functions defined by Choquet integral. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2004, v:146, n:1, pp:147-151 [Journal]
  87. Jinjie Song, Jun Li
    Lebesgue theorems in non-additive measure theory. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2005, v:149, n:3, pp:543-548 [Journal]
  88. Yao Ouyang, Jinxuan Fang, Jun Li
    A conditionally cancellative left-continuous t-norm is not necessarily continuous. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2006, v:157, n:17, pp:2328-2332 [Journal]
  89. Yao Ouyang, Hongxia Sun, Jun Li
    Some notes on V-homogeneity property of semiconormed fuzzy integrals. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2006, v:157, n:11, pp:1572-1575 [Journal]
  90. Jun Li, Peter H. Feiler
    Managing inconsistency in reconfigurable systems. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1998, v:145, n:5, pp:172-179 [Journal]
  91. Jun Li, Masami Yasuda
    Egoroff'S Theorem On Monotone Non-Additive Measure Spaces. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2004, v:12, n:1, pp:61-68 [Journal]
  92. Yao Ouyang, Jun Li
    An answer to an open problem on triangular norms. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2005, v:175, n:1-2, pp:78-84 [Journal]
  93. Gui-Chang Wang, Jun Li, Xiu-Fang Xu, Rui-Fang Li, Junji Nakamura
    The relationship between adsorption energies of methyl on metals and the metallic electronic properties: A first-principles DFT study. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2005, v:26, n:9, pp:871-878 [Journal]
  94. Jun Li, Michael G. Parsons
    Complete design of fuzzy systems using a real-coded genetic algorithm with imbedded constraints. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Fuzzy Systems, 2001, v:10, n:1, pp:13-37 [Journal]
  95. Jun Li
    A Note on Partial Meet Package Contraction. [Citation Graph (0, 0)][DBLP]
    Journal of Logic, Language and Information, 1998, v:7, n:2, pp:139-142 [Journal]
  96. Joseph Y. Hui, Ezhan Karasan, Jun Li, Junbiao Zhang
    Client-Server Synchronization and Buffering for Variable Rate Multimedia Retrievals. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1996, v:14, n:1, pp:226-237 [Journal]
  97. Joseph Y. Hui, Junbiao Zhang, Jun Li
    Quality-of-Service Control in GRAMS for ATM Local Area Network. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:4, pp:700-709 [Journal]
  98. Jun Li
    On Remainder Equations. [Citation Graph (0, 0)][DBLP]
    Math. Log. Q., 1997, v:43, n:, pp:355-368 [Journal]
  99. Ruixi Yuan, Subir K. Biswas, Leslie J. French, Jun Li, Dipankar Raychaudhuri
    A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 1996, v:1, n:3, pp:287-298 [Journal]
  100. Jun Li, Wei-Yun Yau, Han Wang
    Constrained nonlinear models of fingerprint orientations with prediction. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:1, pp:102-114 [Journal]
  101. Jun Li, Fahima Nekka
    The Hausdorff measure functions: A new way to characterize fractal sets. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2003, v:24, n:15, pp:2723-2730 [Journal]
  102. Jingli Zhou, Jun Li, Shengsheng Yu
    Modified winner-update search algorithm for fast block matching. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:7, pp:807-816 [Journal]
  103. Junbiao Zhang, Jun Li, Stephen B. Weinstein, Nan Tu
    Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:10-21 [Journal]
  104. Janet Meiling Wang, Jun Li, Satish K. Yanamanamanda, Lakshmi Kalpana Vakati, Kishore Kumar Muchherla
    Modeling the Driver Load in the Presence of Process Variations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:10, pp:2264-2275 [Journal]
  105. Yuntao Wu, Lin Ma, Chaohuan Hou, Guangbin Zhang, Jun Li
    Subspace-based method for joint range and DOA estimation of multiple near-field sources. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2006, v:86, n:8, pp:2129-2133 [Journal]
  106. Jun Li, Hong Peng, Zheng Pei
    Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:207-211 [Conf]
  107. Mingsong Dou, Chao Zhang, Pengwei Hao, Jun Li
    Converting Thermal Infrared Face Images into Normal Gray-Level Images. [Citation Graph (0, 0)][DBLP]
    ACCV (2), 2007, pp:722-732 [Conf]
  108. Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu
    Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:529-538 [Conf]
  109. Jun Li, Pengwei Hao
    Hierarchical Structuring of Data on Manifolds. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  110. Yuanhui Li, Depeng Zhao, Jun Li
    Scheduling Algorithm Based on Integrated Utility of Multiple QoS Attributes on Service Grid. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:288-295 [Conf]
  111. Jun Wang, Ning Jing, Jun Li, Zhong Hui Chen
    A multi-objective imaging scheduling approach for earth observing satellites. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:2211-2218 [Conf]
  112. Jun Li, Wei-Yun Yau, Jian-Gang Wang, Wee Ser
    Stability Analysis of Constrained Nonlinear Phase Portrait Models of Fingerprint Orientation Images. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:493-502 [Conf]
  113. Xingsen Li, Lingling Zhang, Maoliang Ding, Yong Shi, Jun Li
    A Combined Web Mining Model and Its Application in Crisis Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:906-910 [Conf]
  114. Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
    MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:201-215 [Conf]
  115. Yaxuan Qi, Bo Xu, Fei He, Xin Zhou, Jianming Yu, Jun Li
    Towards Optimized Packet Classification Algorithms for Multi-Core Network Processors. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:2- [Conf]
  116. Lei Shi, Yue Zhang, Jianming Yu, Bo Xu, Bin Liu, Jun Li
    On the Extreme Parallelism Inside Next-Generation Network Processors. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1379-1387 [Conf]
  117. Jun Li, You-Peng Zhang
    Modelling of Dynamic Systems Using Generalized RBF Neural Networks Based on Kalman Filter Mehtod. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:676-684 [Conf]
  118. Jun Li, Masami Yasuda, Jianzeng Li
    A Version of Lebesgue Decomposition Theorem for Non-additive Measure. [Citation Graph (0, 0)][DBLP]
    MDAI, 2007, pp:168-173 [Conf]
  119. Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong
    Understanding and Utilizing the Hierarchy of Abnormal BGP Events. [Citation Graph (0, 0)][DBLP]
    SDM, 2007, pp:- [Conf]
  120. Ismail Ari, Jun Li, Riddhiman Ghosh, Mohamed Dekhil
    Providing session management as core business service. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:1263-1264 [Conf]
  121. Jun Li, Gang Wei
    Further reduced search for optimal diagonal space-time constellations from groups. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:119-122 [Conf]
  122. Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui
    A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:184-195 [Conf]
  123. Jun Li, Zhen Wu, Eric Purpus
    Toward Understanding the Behavior of BGP During Large-Scale Power Outages. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  124. Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Wang
    A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  125. Yao Ouyang, Jun Li, Jinxuan Fang
    Further properties of reversible triangular norms. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2007, v:158, n:22, pp:2504-2509 [Journal]
  126. Jun Li, Wei-Yun Yau, Han Wang
    Combining singular points and orientation image information for fingerprint classification. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2008, v:41, n:1, pp:353-366 [Journal]
  127. Yang Shi, Weiqi Qian, Weisheng Yan, Jun Li
    Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks. [Citation Graph (0, 0)][DBLP]
    IJCSA, 2007, v:4, n:3, pp:107-118 [Journal]

  128. A Policy Framework for Data Management in Services Marketplaces. [Citation Graph (, )][DBLP]

  129. Solving the Transitive Access Problem for the Services Oriented Architecture. [Citation Graph (, )][DBLP]

  130. Analyzing Performance for Complex Protocol using Validated CP-nets Models. [Citation Graph (, )][DBLP]

  131. A Customer-Centric Privacy Protection Framework for Mobile Service-Oriented Architectures. [Citation Graph (, )][DBLP]

  132. The Knowledge Discovery Research on User's Mobility of Communication Service Provider. [Citation Graph (, )][DBLP]

  133. Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty. [Citation Graph (, )][DBLP]

  134. A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]

  135. Online Linear Discriminative Learning for Spam Filter. [Citation Graph (, )][DBLP]

  136. A Genetic Algorithm to Logistics Distribution Vehicle Routing Problem with Fuzzy Due Time. [Citation Graph (, )][DBLP]

  137. Compatibility Function Based on t-operation. [Citation Graph (, )][DBLP]

  138. A quantitative method of n-Valued R0 propositional logic. [Citation Graph (, )][DBLP]

  139. Study of cache placement for time-shifted TV cluster using genetic algorithm. [Citation Graph (, )][DBLP]

  140. An Adaptive Refinement Ratio Algorithm for Structured AMR Method Based on SAMRAI Framework. [Citation Graph (, )][DBLP]

  141. DEA-Based Comprehensive Evaluation of Intelligent Knowledge. [Citation Graph (, )][DBLP]

  142. Reference Point Detection for Arch Type Fingerprints. [Citation Graph (, )][DBLP]

  143. On the Throughput-Reliability Tradeoff Analysis in Amplify-and-Forward Cooperative Channels. [Citation Graph (, )][DBLP]

  144. Security Verification of 802.11i 4-Way Handshake Protocol. [Citation Graph (, )][DBLP]

  145. A Typical Cooperative MIMO Scheme in Wireless Ad Hoc Networks and Its Channel Capacity. [Citation Graph (, )][DBLP]

  146. Cooperative Cognitive Radio with Priority Queueing Analysis. [Citation Graph (, )][DBLP]

  147. VLS: A Map-Based Vehicle Location Service for City Environments. [Citation Graph (, )][DBLP]

  148. Fast Path Session Creation on Network Processors. [Citation Graph (, )][DBLP]

  149. Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. [Citation Graph (, )][DBLP]

  150. Hallucinating faces from thermal infrared images. [Citation Graph (, )][DBLP]

  151. On Knowledge-Based Classification of Abnormal BGP Events. [Citation Graph (, )][DBLP]

  152. Investigating the Impact of Real-World Factors on Internet Worm Propagation. [Citation Graph (, )][DBLP]

  153. Empirical Study on Multi-Path Benefits on Interactive Video. [Citation Graph (, )][DBLP]

  154. MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. [Citation Graph (, )][DBLP]

  155. Consistency Degrees of Theories in the Revised n-Valued Kleene Logical System. [Citation Graph (, )][DBLP]

  156. Scheduled PSM for Minimizing Energy in Wireless LANs. [Citation Graph (, )][DBLP]

  157. Bi-model tracking of object of interest using invariant spatiogram descriptor. [Citation Graph (, )][DBLP]

  158. Fingerprint orientation analysis with topological modeling. [Citation Graph (, )][DBLP]

  159. A model for dynamic and adaptable services management. [Citation Graph (, )][DBLP]

  160. Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition. [Citation Graph (, )][DBLP]

  161. Incorporating Security Requirements into Service Composition: From Modelling to Execution. [Citation Graph (, )][DBLP]

  162. Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling. [Citation Graph (, )][DBLP]

  163. Mobile In-store Personalized Services. [Citation Graph (, )][DBLP]

  164. A Study on the Relationship Between ERP Logic and Direct Consume Coefficient of I/O Table. [Citation Graph (, )][DBLP]

  165. Packet Classification Algorithms: From Theory to Practice. [Citation Graph (, )][DBLP]

  166. Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes. [Citation Graph (, )][DBLP]

  167. Absolute Continuity of Monotone Measure and Convergence in Measure. [Citation Graph (, )][DBLP]

  168. A framework for peer-to-peer service interaction. [Citation Graph (, )][DBLP]

  169. Stability Analysis of Discrete Hopfield Neural Networks Combined with Small Ones. [Citation Graph (, )][DBLP]

  170. Feature Extraction for fMRI-Based Human Brain Activity Recognition. [Citation Graph (, )][DBLP]

  171. Automatic Nipple Detection Using Shape and Statistical Skin Color Information. [Citation Graph (, )][DBLP]

  172. Model for Survivability of Wireless Sensor Network. [Citation Graph (, )][DBLP]

  173. A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. [Citation Graph (, )][DBLP]

  174. Feature Subsumption for Sentiment Classification in Multiple Languages. [Citation Graph (, )][DBLP]

  175. Behavior-Based Worm Detectors Compared. [Citation Graph (, )][DBLP]

  176. Non-rigid Registration in 3D Implicit Vector Space. [Citation Graph (, )][DBLP]

  177. Trellis Structure for Uncoded DUSTM System. [Citation Graph (, )][DBLP]

  178. CP-Nets Based Methodology for Integrating Functional Verification and Performance Analysis of Network Protocol. [Citation Graph (, )][DBLP]

  179. Towards System-level Optimization for High Performance Unified Threat Management. [Citation Graph (, )][DBLP]

  180. On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing. [Citation Graph (, )][DBLP]

  181. An XML Firewall on Embedded Network Processor. [Citation Graph (, )][DBLP]

  182. Mining Algorithm of Maximal Frequent Itemsets Based on Position Lattice. [Citation Graph (, )][DBLP]

  183. Towards high-performance flow-level packet processing on multi-core network processors. [Citation Graph (, )][DBLP]

  184. Towards effective network algorithms on multi-core network processors. [Citation Graph (, )][DBLP]

  185. Analysis of the impact of swarm mobility on performance of routing protocols in MANETs. [Citation Graph (, )][DBLP]

  186. Stability Analysis of Discrete Hopfield Neural Networks with Weight Function Matrix. [Citation Graph (, )][DBLP]

  187. Complex Field Network Coding for Wireless Cooperative Multicast Flows. [Citation Graph (, )][DBLP]

  188. Real-Time P2P Traffic Identification. [Citation Graph (, )][DBLP]

  189. Analysis and Optimization for Multicast System with Regenerative Network Coding. [Citation Graph (, )][DBLP]

  190. Optimized Spreading Code Reallocation Technique for PAPR Reduction in MC-CDMA Systems. [Citation Graph (, )][DBLP]

  191. Genetic Granular Cognitive Fuzzy Neural Networks and Human Brains for Pattern Recognition. [Citation Graph (, )][DBLP]

  192. A Middleware Approach for Behavior Consistent Composition of Services in Smart Space. [Citation Graph (, )][DBLP]

  193. Implementation of a Specific Information System for a Web-Based E-learning Environment. [Citation Graph (, )][DBLP]

  194. Access control for the services oriented architecture. [Citation Graph (, )][DBLP]

  195. Is your IP address prefix well-served by internet routing? [Citation Graph (, )][DBLP]

  196. McLab: an extensible compiler toolkit for MATLAB and related languages. [Citation Graph (, )][DBLP]

  197. Microbubble Suspensions Prepared via Electrohydrodynamic Jetting Process. [Citation Graph (, )][DBLP]

  198. Development of a Human Neck Finite Element Model. [Citation Graph (, )][DBLP]

  199. DWT-Based Shot Boundary Detection Using Support Vector Machine. [Citation Graph (, )][DBLP]

  200. Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network. [Citation Graph (, )][DBLP]

  201. SOA-based Enterprise Service Bus. [Citation Graph (, )][DBLP]

  202. Q-RAN: A Constructive Reinforcement Learning Approach for Robot Behavior Learning. [Citation Graph (, )][DBLP]

  203. Understanding the challenges faced during the management of data mining models. [Citation Graph (, )][DBLP]

  204. Designing dashboards for managing model lifecycle. [Citation Graph (, )][DBLP]

  205. The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration Algorithm. [Citation Graph (, )][DBLP]

  206. A Novel Data Replication and Placement Scheme for Time-Shifted TV Cluster. [Citation Graph (, )][DBLP]

  207. Some Misunderstandings and Reflections on Multi-media CAI. [Citation Graph (, )][DBLP]

  208. Singular Points Detection Using Interactive Mechanism In Fingerprint Images. [Citation Graph (, )][DBLP]

  209. A systematic topological method for fingerprint singular point detection. [Citation Graph (, )][DBLP]

  210. Nonlinear phase portrait modeling of fingerprint orientation. [Citation Graph (, )][DBLP]

  211. The IEEE 802.11 Power Saving Mechanism: An Experimental Study. [Citation Graph (, )][DBLP]

  212. Dynamic Differentiated Service Management for IP over Broadcasting Network. [Citation Graph (, )][DBLP]

  213. Efficient Shot Boundary Detection Based on Scale Invariant Features. [Citation Graph (, )][DBLP]

  214. A new fractional-order chaotic system and its synchronization control. [Citation Graph (, )][DBLP]

  215. Clinical Communication Ontology for Medical Errors. [Citation Graph (, )][DBLP]

  216. A novel traffic information system for VANET based on location service. [Citation Graph (, )][DBLP]

  217. Efficient hierarchical content distribution using P2P technology. [Citation Graph (, )][DBLP]

  218. Solution Reuse for Service Composition and Integration. [Citation Graph (, )][DBLP]

  219. A New Research Field: Intelligent Knowledge Management. [Citation Graph (, )][DBLP]

  220. Method to Improve the Performance of Common Channel Framework. [Citation Graph (, )][DBLP]

  221. Research on Authentication Security of Wireless Local Area Network Based on L2TP Protocol. [Citation Graph (, )][DBLP]

  222. The Lab Reservation System Design and Implementation Based on Greedy Algorithm. [Citation Graph (, )][DBLP]

  223. Study of Protein Extraction Technics from Dictyoploca japonica Pupae. [Citation Graph (, )][DBLP]

  224. Sliding-window caching algorithm for streaming media server. [Citation Graph (, )][DBLP]

  225. A new data mining tool for analyzing coumarin-based prodrugs. [Citation Graph (, )][DBLP]

  226. Survivability for Wireless Sensor Network: Model, Evaluation and Experiment. [Citation Graph (, )][DBLP]

  227. VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series. [Citation Graph (, )][DBLP]

  228. A system design of the Tahe's forest -fire -prevention management system. [Citation Graph (, )][DBLP]

  229. Boundary Condition Identification of Fluid-Filled Piping Systems Using Neural Networks. [Citation Graph (, )][DBLP]

  230. Equivalence and existence of weak Pareto optima for multiobjective optimization problems with cone constraints. [Citation Graph (, )][DBLP]

  231. Exceptional families of elements for set-valued mappings: An application to nonlinear complementarity problems. [Citation Graph (, )][DBLP]

  232. Learning the valid incoming direction of IP packets. [Citation Graph (, )][DBLP]

  233. An investigation of the Internet's IP-layer connectivity. [Citation Graph (, )][DBLP]

  234. Functional similarities between computer worms and biological pathogens. [Citation Graph (, )][DBLP]

  235. Design of network-coding based multi-edge type LDPC codes for multi-source relaying systems [Citation Graph (, )][DBLP]

  236. Data Mining Consulting Improve Data Quality. [Citation Graph (, )][DBLP]

  237. Online consumer-to-consumer market in China - A comparative study of Taobao and eBay. [Citation Graph (, )][DBLP]

Search in 0.505secs, Finished in 0.512secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002