Search the dblp DataBase
Jun Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhangxi Lin , Jun Li The online auction market in China: a comparative study between Taobao and eBay. [Citation Graph (0, 0)][DBLP ] ICEC, 2005, pp:123-129 [Conf ] Jun Li , Xun Kang mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:397-408 [Conf ] Jun Li , Yingyi Bu , Shaxun Chen , XianPing Tao , Jian Lu FollowMe: On Research of Pluggable Infrastructure for Context-Awareness. [Citation Graph (0, 0)][DBLP ] AINA (1), 2006, pp:199-204 [Conf ] Bo Xu , Dongyi Jiang , Jun Li HSM: A Fast Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:987-992 [Conf ] Zaiping Chen , Jun Li , Youjun Yue , Qiang Gao , Hui Zhao , Zhenlin Xu A Neural Network Online Training Algorithm Based on Compound Gradient Vector. [Citation Graph (0, 0)][DBLP ] Australian Joint Conference on Artificial Intelligence, 2002, pp:374-384 [Conf ] Jun Li , Xiongfei Li , Hui Liu , Xinying Chen The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:449-456 [Conf ] Jun Li , Ian R. Greenshields De-Noising ENMR Spectra by Wavelet Shrinkage. [Citation Graph (0, 0)][DBLP ] CBMS, 1998, pp:252-0 [Conf ] Jun Li , Wei-Yun Yau , Han Wang Continuous fingerprints classification by symmetrical filters. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:357- [Conf ] Yunfang Feng , Zhiyuan Liu , Jun Li Securing Membership Control in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICIT, 2006, pp:160-163 [Conf ] Jun Li , Amitava Bose , Yiqiang Q. Zhao Rayleigh Flat Fading Channels' Capacity. [Citation Graph (0, 0)][DBLP ] CNSR, 2005, pp:214-217 [Conf ] Jun Li , Keith Moore Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge. [Citation Graph (0, 0)][DBLP ] CoopIS/DOA/ODBASE (2), 2004, pp:1482-1501 [Conf ] Jianming Yu , Jun Li A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:375-384 [Conf ] Xiaoyang Tan , Songcan Chen , Jun Li , Zhi-Hua Zhou Learning Non-Metric Partial Similarity Based on Maximal Margin Criterion. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2006, pp:138-145 [Conf ] Janet Meiling Wang , Omar Hafiz , Jun Li A linear fractional transform (LFT) based model for interconnect parametric uncertainty. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:375-380 [Conf ] Y. Satish Kumar , Jun Li , Claudio Talarico , Janet Meiling Wang A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching. [Citation Graph (0, 0)][DBLP ] DATE, 2005, pp:770-775 [Conf ] Jun Li , Edward Omiecinski Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:69-83 [Conf ] Yingyi Bu , Shaxun Chen , Jun Li , XianPing Tao , Jian Lu Context Consistency Management Using Ontology Based Model. [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2006, pp:741-755 [Conf ] Yuzhen Li , Jun Li , Shuigeng Zhou GML Storage: A Spatial Database Approach. [Citation Graph (0, 0)][DBLP ] ER (Workshops), 2004, pp:55-66 [Conf ] Yingyi Bu , Jun Li , Shaxun Chen , XianPing Tao , Jian Lu An Enhanced Ontology Based Context Model and Fusion Mechanism. [Citation Graph (0, 0)][DBLP ] EUC, 2005, pp:920-929 [Conf ] Wentian Lu , Jun Li , XianPing Tao , Xiaoxing Ma , Jian Lu Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. [Citation Graph (0, 0)][DBLP ] EuroSSC, 2006, pp:143-158 [Conf ] Jun Li Order Continuity of Fuzzy Measure and Convergence of Measurable Functions Sequence. [Citation Graph (0, 0)][DBLP ] FUZZ-IEEE, 2001, pp:170-172 [Conf ] Jun Li , Roy D. Yates , Dipankar Raychaudhuri Handoff Control in the PNNI Hierarchy of Mobile ATM Networks. [Citation Graph (0, 0)][DBLP ] HICSS, 1999, pp:- [Conf ] Jun Li , Keith Moore A Runtime and Analysis Framework Support for Unit Component Testing in Distributed Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:261- [Conf ] Jun Li , Shunyi Zhang Modeling and Analyzing Peer-to-Peer File-Sharing System. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:433-436 [Conf ] Jun Li , Constantine N. Manikopoulos Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:53-59 [Conf ] Hao Xiong , Jun Li , Momiao Xiong Identification of Differentially Regulated Genetic Network. [Citation Graph (0, 0)][DBLP ] IC-AI, 2003, pp:444-450 [Conf ] Yaxuan Qi , Bo Xu , Jun Li Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification. [Citation Graph (0, 0)][DBLP ] ICAS/ICNS, 2005, pp:7- [Conf ] Janet Meiling Wang , Bharat Srinivas , Dongsheng Ma , Charlie Chung-Ping Chen , Jun Li System-level power and thermal modeling and analysis by orthogonal polynomial based response surface approach (OPRS). [Citation Graph (0, 0)][DBLP ] ICCAD, 2005, pp:728-735 [Conf ] Jun Li , Allen A. Rovick , Joel A. Michael ABASE: A Hypermedia-based Tutoring and Authoring System. [Citation Graph (0, 0)][DBLP ] ICCAL, 1992, pp:380-390 [Conf ] Xi-Ping Luo , Li-Xin Zhen , Gang Peng , Jun Li , Bai-Hua Xiao Camera based mixed-lingual card reader for mobile device. [Citation Graph (0, 0)][DBLP ] ICDAR, 2005, pp:665-669 [Conf ] Jun Li Monitoring and Characterization of Component-Based Systems with Global Causality Capture. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:422-0 [Conf ] Jun Li , Haofeng Zhou , Wei Wang Gradual Cube: Customize Profile on Mobile OLAP. [Citation Graph (0, 0)][DBLP ] ICDM, 2006, pp:943-947 [Conf ] Xingsen Li , Yong Shi , Ying Liu , Jun Li , Aihua Li A Knowledge Management Platform for Optimization-based Data Mining. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:833-837 [Conf ] Jun Li , Fumin Yang , Yansheng Lu A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems. [Citation Graph (0, 0)][DBLP ] ICECCS, 2005, pp:176-183 [Conf ] Cuimei Bo , Jun Li , Zhiquan Wang , Jinguo Lin Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2006, pp:596-601 [Conf ] Jun Li , Cuimei Bo , Jiugen Zhang , Jie Du Fault Diagnosis and Accommodation Based on Online Multi-model for Nonlinear Process. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2006, pp:661-666 [Conf ] Hong-Nan Li , Zhiguo Chang , Jun Li Semi-active Control for Eccentric Structures with MR Damper by Hybrid Intelligent Algorithm. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2005, pp:139-148 [Conf ] Li Tang , Yin Chen , Fei Li , Hui Zhang , Jun Li Empirical Study on the Evolution of PlanetLab. [Citation Graph (0, 0)][DBLP ] ICN, 2007, pp:64- [Conf ] Jun Li , Wei-Yun Yau Prediction of Fingerprint Orientation. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2004, pp:436-439 [Conf ] Jun Li , Wei-Yun Yau , Han Wang Fingerprint Indexing Based On Symmetrical Measurement. [Citation Graph (0, 0)][DBLP ] ICPR (1), 2006, pp:1038-1041 [Conf ] Xi-Ping Luo , Jun Li , Li-Xin Zhen Design and Implementation of a Card Reader based on Build-in Camera. [Citation Graph (0, 0)][DBLP ] ICPR (1), 2004, pp:417-420 [Conf ] Peng Yao , Jun Li , Xueyi Ye , Zhenquan Zhuang , Bin Li Analysis and Improvement of An Iris Identification Algorithm. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2006, pp:362-365 [Conf ] Peng Yao , Jun Li , Xueyi Ye , Zhenquan Zhuang , Bin Li Iris Recognition Algorithm Using Modified Log-Gabor Filters. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2006, pp:461-464 [Conf ] Jun Li , Peter H. Feiler Impact Analysis in Real-Time Control Systems. [Citation Graph (0, 0)][DBLP ] ICSM, 1999, pp:443-452 [Conf ] Jun Li , Keith Moore Exploiting Global Causality in Testing of Distributed and Component-Based Applications. [Citation Graph (0, 0)][DBLP ] ICSM, 2004, pp:527- [Conf ] Wuzheng Tan , Lizhuang Ma , Jun Li , Zuxiu Xiao Application MDA in a Conception Design Environment. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:702-704 [Conf ] Jun Li , Jelena Mirkovic , Mengqiu Wang , Peter L. Reiher , Lixia Zhang SAVE: Source Address Validity Enforcement Protocol. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Jun Li , Roy D. Yates , Dipankar Raychaudhuri Performance Analysis on Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:1195-1203 [Conf ] Miles N. Wernick , Jovan G. Brankov , Dean Chapman , Mark A. Anastasio , Zhong Zhong , Carol Muehleman , Jun Li Multiple-Image Computed Tomography. [Citation Graph (0, 0)][DBLP ] ISBI, 2004, pp:948-951 [Conf ] Satish K. Yanamanamanda , Jun Li , Janet Meiling Wang Uncertainty modeling of gate delay considering multiple input switching. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2005, pp:2457-2460 [Conf ] Hongli Gao , Mingheng Xu , Jun Li , Chunjun Chen Tool Wear Monitoring Using FNN with Compact Support Gaussian Function. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2006, pp:957-963 [Conf ] Jun Li , Jun-Hua Liu Identification and Control of Dynamic Systems Based on Least Squares Wavelet Vector Machines. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2006, pp:934-942 [Conf ] Jun Li , Xun Kang Proof of Service in a Hybrid P2P Environment. [Citation Graph (0, 0)][DBLP ] ISPA Workshops, 2005, pp:64-73 [Conf ] Minghui Zheng , Guohua Cui , Muxiang Yang , Jun Li Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:301-313 [Conf ] Huifang Yin , Jun Li An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:373-382 [Conf ] Joo-Hwee Lim , Jun Li , Philippe Mulhem , Qi Tian Content-Based Summarization for Personal Image Library. [Citation Graph (0, 0)][DBLP ] JCDL, 2003, pp:393- [Conf ] Wei Yu , Jun Li , Greg Butler Refactoring Use Case Models on Episodes. [Citation Graph (0, 0)][DBLP ] ASE, 2004, pp:328-331 [Conf ] Jun Li , Constantine N. Manikopoulos Investigation of the Performance of GAFT, a Novel Network Anomaly Fault Detection System. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:249-260 [Conf ] Jun Li , Constantine N. Manikopoulos Network Fault Detection: Classifier Training Method for Anomaly Fault Detection in a Production Network Using Test Network Information. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:473-482 [Conf ] Jun Li , Bruce Christianson , Martin Loomes "Fair" Authentication in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:132-143 [Conf ] Li Tang , Hui Zhang , Jun Li , Yanda Li End-to-End Delay Behavior in the Internet. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2006, pp:373-382 [Conf ] Jun Li , Masami Yasuda , Jinjie Song Regularity Properties of Null-Additive Fuzzy Measure on Metric Spaces. [Citation Graph (0, 0)][DBLP ] MDAI, 2005, pp:59-66 [Conf ] Li Tang , Jun Li , Jin Zhou , Zhizhi Zhou , Hao Wang , Kai Li FreeRank: implementing independent ranking service for multiplayer online games. [Citation Graph (0, 0)][DBLP ] NETGAMES, 2005, pp:1-7 [Conf ] Jun Li , Xin-ming Ye , Ye Tian Topologically-Aware AAA Overlay Network in Mobile IPv6 Environment. [Citation Graph (0, 0)][DBLP ] Networking, 2006, pp:293-306 [Conf ] Jun Li , Toby Ehrenkranz , Geoffrey H. Kuenning , Peter L. Reiher Simulation and Analysis on the Resiliency and Efficiency of Malnets. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:262-269 [Conf ] Yonggang Chu , Jun Li , Yixian Yang The Architecture of the Large-scale Distributed Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:130-133 [Conf ] Yingyi Bu , Tao Gu , XianPing Tao , Jun Li , Shaxun Chen , Jian Lu Managing Quality of Context in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] QSIC, 2006, pp:193-200 [Conf ] Jun Li , Minho Sung , Jun Xu , Li Li Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:115-129 [Conf ] Shaxun Chen , Yingyi Bu , Jun Li , XianPing Tao , Jian Lu Toward Context-Awareness: A Workflow Embedded Middleware. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:766-775 [Conf ] Lingling Zhang , Jun Li , Yong Shi Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:816-825 [Conf ] Jun Li , Kazutaka Furuse , Kazunori Yamaguchi Focused crawling by exploiting anchor text using decision tree. [Citation Graph (0, 0)][DBLP ] WWW (Special interest tracks and posters), 2005, pp:1190-1191 [Conf ] Yong-Zeng Xue , Sheng Li , Tie-Jun Zhao , Muyun Yang , Jun Li Bilingual Phrase Extraction from N-Best Alignments. [Citation Graph (0, 0)][DBLP ] ICICIC (3), 2006, pp:410-414 [Conf ] Yaxuan Qi , Jun Li An efficient hybrid algorithm for multidimensional packet classification. [Citation Graph (0, 0)][DBLP ] Communication, Network, and Information Security, 2006, pp:185-190 [Conf ] Yaxuan Qi , Jun Li Towards effective packet classification. [Citation Graph (0, 0)][DBLP ] Communication, Network, and Information Security, 2006, pp:216-223 [Conf ] Jun Li , Natasha Barrett , Yan-Qing Zhang , D. A. Washburn Genetic granular cognitive fuzzy neural networks and human brains for pattern recognition. [Citation Graph (0, 0)][DBLP ] GrC, 2005, pp:172-175 [Conf ] Jun Li , Jingli Zhou , Shengsheng Yu A Low Bit-Rate Video Codec Based on Control Grid Interpolation Motion Compensation Using Edge Feature. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2002, v:34, n:2, pp:98-109 [Journal ] Jun Li , Zhong-Quan He Gap functions and existence of solutions to generalized vector variational inequalities. [Citation Graph (0, 0)][DBLP ] Appl. Math. Lett., 2005, v:18, n:9, pp:989-1000 [Journal ] Jun Li , Nan-Jing Huang Vector F -implicit complementarity problems in Banach spaces. [Citation Graph (0, 0)][DBLP ] Appl. Math. Lett., 2006, v:19, n:5, pp:464-471 [Journal ] Jun Li , Dejing Dou , Zhen Wu , Shiwoong Kim , Vikash Agarwal An internet routing forensics framework for discovering rules of abnormal BGP events. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2005, v:35, n:5, pp:55-66 [Journal ] Jun Li , Michael Guidero , Zhen Wu , Eric Purpus , Toby Ehrenkranz BGP routing dynamics revisited. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2007, v:37, n:2, pp:5-16 [Journal ] Jun Li , Mark Yarvis , Peter L. Reiher Securing distributed adaptation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:3, pp:347-371 [Journal ] Jun Li A note on the null-additivity of the fuzzy measure: Corrigendum to "On the null-additivity of the fuzzy measure" [Fuzzy Sets and Systems 78 (1996) 337-339]. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2002, v:125, n:2, pp:269-271 [Journal ] Jun Li On Egoroff's theorems on fuzzy measure spaces. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2003, v:135, n:3, pp:367-375 [Journal ] Jun Li , Masami Yasuda Lusin's theorem on fuzzy measure spaces. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2004, v:146, n:1, pp:121-133 [Journal ] Jun Li , Masami Yasuda On Egoroff's theorems on finite monotone non-additive measure space. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2005, v:153, n:1, pp:71-78 [Journal ] Yao Ouyang , Jun Li A note on the monotone set functions defined by Choquet integral. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2004, v:146, n:1, pp:147-151 [Journal ] Jinjie Song , Jun Li Lebesgue theorems in non-additive measure theory. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2005, v:149, n:3, pp:543-548 [Journal ] Yao Ouyang , Jinxuan Fang , Jun Li A conditionally cancellative left-continuous t-norm is not necessarily continuous. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2006, v:157, n:17, pp:2328-2332 [Journal ] Yao Ouyang , Hongxia Sun , Jun Li Some notes on V-homogeneity property of semiconormed fuzzy integrals. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2006, v:157, n:11, pp:1572-1575 [Journal ] Jun Li , Peter H. Feiler Managing inconsistency in reconfigurable systems. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 1998, v:145, n:5, pp:172-179 [Journal ] Jun Li , Masami Yasuda Egoroff'S Theorem On Monotone Non-Additive Measure Spaces. [Citation Graph (0, 0)][DBLP ] International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2004, v:12, n:1, pp:61-68 [Journal ] Yao Ouyang , Jun Li An answer to an open problem on triangular norms. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2005, v:175, n:1-2, pp:78-84 [Journal ] Gui-Chang Wang , Jun Li , Xiu-Fang Xu , Rui-Fang Li , Junji Nakamura The relationship between adsorption energies of methyl on metals and the metallic electronic properties: A first-principles DFT study. [Citation Graph (0, 0)][DBLP ] Journal of Computational Chemistry, 2005, v:26, n:9, pp:871-878 [Journal ] Jun Li , Michael G. Parsons Complete design of fuzzy systems using a real-coded genetic algorithm with imbedded constraints. [Citation Graph (0, 0)][DBLP ] Journal of Intelligent and Fuzzy Systems, 2001, v:10, n:1, pp:13-37 [Journal ] Jun Li A Note on Partial Meet Package Contraction. [Citation Graph (0, 0)][DBLP ] Journal of Logic, Language and Information, 1998, v:7, n:2, pp:139-142 [Journal ] Joseph Y. Hui , Ezhan Karasan , Jun Li , Junbiao Zhang Client-Server Synchronization and Buffering for Variable Rate Multimedia Retrievals. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1996, v:14, n:1, pp:226-237 [Journal ] Joseph Y. Hui , Junbiao Zhang , Jun Li Quality-of-Service Control in GRAMS for ATM Local Area Network. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:4, pp:700-709 [Journal ] Jun Li On Remainder Equations. [Citation Graph (0, 0)][DBLP ] Math. Log. Q., 1997, v:43, n:, pp:355-368 [Journal ] Ruixi Yuan , Subir K. Biswas , Leslie J. French , Jun Li , Dipankar Raychaudhuri A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks. [Citation Graph (0, 0)][DBLP ] MONET, 1996, v:1, n:3, pp:287-298 [Journal ] Jun Li , Wei-Yun Yau , Han Wang Constrained nonlinear models of fingerprint orientations with prediction. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2006, v:39, n:1, pp:102-114 [Journal ] Jun Li , Fahima Nekka The Hausdorff measure functions: A new way to characterize fractal sets. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2003, v:24, n:15, pp:2723-2730 [Journal ] Jingli Zhou , Jun Li , Shengsheng Yu Modified winner-update search algorithm for fast block matching. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2004, v:25, n:7, pp:807-816 [Journal ] Junbiao Zhang , Jun Li , Stephen B. Weinstein , Nan Tu Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2002, v:6, n:3, pp:10-21 [Journal ] Janet Meiling Wang , Jun Li , Satish K. Yanamanamanda , Lakshmi Kalpana Vakati , Kishore Kumar Muchherla Modeling the Driver Load in the Presence of Process Variations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 2006, v:25, n:10, pp:2264-2275 [Journal ] Yuntao Wu , Lin Ma , Chaohuan Hou , Guangbin Zhang , Jun Li Subspace-based method for joint range and DOA estimation of multiple near-field sources. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2006, v:86, n:8, pp:2129-2133 [Journal ] Jun Li , Hong Peng , Zheng Pei Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:207-211 [Conf ] Mingsong Dou , Chao Zhang , Pengwei Hao , Jun Li Converting Thermal Infrared Face Images into Normal Gray-Level Images. [Citation Graph (0, 0)][DBLP ] ACCV (2), 2007, pp:722-732 [Conf ] Jun Li , Fumin Yang , Gang Tu , Wan-hua Cao , Yansheng Lu Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:529-538 [Conf ] Jun Li , Pengwei Hao Hierarchical Structuring of Data on Manifolds. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Yuanhui Li , Depeng Zhao , Jun Li Scheduling Algorithm Based on Integrated Utility of Multiple QoS Attributes on Service Grid. [Citation Graph (0, 0)][DBLP ] GCC, 2007, pp:288-295 [Conf ] Jun Wang , Ning Jing , Jun Li , Zhong Hui Chen A multi-objective imaging scheduling approach for earth observing satellites. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:2211-2218 [Conf ] Jun Li , Wei-Yun Yau , Jian-Gang Wang , Wee Ser Stability Analysis of Constrained Nonlinear Phase Portrait Models of Fingerprint Orientation Images. [Citation Graph (0, 0)][DBLP ] ICB, 2007, pp:493-502 [Conf ] Xingsen Li , Lingling Zhang , Maoliang Ding , Yong Shi , Jun Li A Combined Web Mining Model and Its Application in Crisis Management. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:906-910 [Conf ] Zongwei Zhou , Yibo Xue , Junda Liu , Wei Zhang , Jun Li MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:201-215 [Conf ] Yaxuan Qi , Bo Xu , Fei He , Xin Zhou , Jianming Yu , Jun Li Towards Optimized Packet Classification Algorithms for Multi-Core Network Processors. [Citation Graph (0, 0)][DBLP ] ICPP, 2007, pp:2- [Conf ] Lei Shi , Yue Zhang , Jianming Yu , Bo Xu , Bin Liu , Jun Li On the Extreme Parallelism Inside Next-Generation Network Processors. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:1379-1387 [Conf ] Jun Li , You-Peng Zhang Modelling of Dynamic Systems Using Generalized RBF Neural Networks Based on Kalman Filter Mehtod. [Citation Graph (0, 0)][DBLP ] ISNN (1), 2007, pp:676-684 [Conf ] Jun Li , Masami Yasuda , Jianzeng Li A Version of Lebesgue Decomposition Theorem for Non-additive Measure. [Citation Graph (0, 0)][DBLP ] MDAI, 2007, pp:168-173 [Conf ] Dejing Dou , Jun Li , Han Qin , Shiwoong Kim , Sheng Zhong Understanding and Utilizing the Hierarchy of Abnormal BGP Events. [Citation Graph (0, 0)][DBLP ] SDM, 2007, pp:- [Conf ] Ismail Ari , Jun Li , Riddhiman Ghosh , Mohamed Dekhil Providing session management as core business service. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:1263-1264 [Conf ] Jun Li , Gang Wei Further reduced search for optimal diagonal space-time constellations from groups. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:119-122 [Conf ] Shejie Lu , Jun Li , Zhiyuan Liu , Guohua Cui A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] PAISI, 2007, pp:184-195 [Conf ] Jun Li , Zhen Wu , Eric Purpus Toward Understanding the Behavior of BGP During Large-Scale Power Outages. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Y. Satish Kumar , Jun Li , Claudio Talarico , Janet Wang A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Yao Ouyang , Jun Li , Jinxuan Fang Further properties of reversible triangular norms. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2007, v:158, n:22, pp:2504-2509 [Journal ] Jun Li , Wei-Yun Yau , Han Wang Combining singular points and orientation image information for fingerprint classification. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2008, v:41, n:1, pp:353-366 [Journal ] Yang Shi , Weiqi Qian , Weisheng Yan , Jun Li Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks. [Citation Graph (0, 0)][DBLP ] IJCSA, 2007, v:4, n:3, pp:107-118 [Journal ] A Policy Framework for Data Management in Services Marketplaces. [Citation Graph (, )][DBLP ] Solving the Transitive Access Problem for the Services Oriented Architecture. [Citation Graph (, )][DBLP ] Analyzing Performance for Complex Protocol using Validated CP-nets Models. [Citation Graph (, )][DBLP ] A Customer-Centric Privacy Protection Framework for Mobile Service-Oriented Architectures. [Citation Graph (, )][DBLP ] The Knowledge Discovery Research on User's Mobility of Communication Service Provider. [Citation Graph (, )][DBLP ] Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty. [Citation Graph (, )][DBLP ] A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP ] Online Linear Discriminative Learning for Spam Filter. [Citation Graph (, )][DBLP ] A Genetic Algorithm to Logistics Distribution Vehicle Routing Problem with Fuzzy Due Time. [Citation Graph (, )][DBLP ] Compatibility Function Based on t-operation. [Citation Graph (, )][DBLP ] A quantitative method of n-Valued R0 propositional logic. [Citation Graph (, )][DBLP ] Study of cache placement for time-shifted TV cluster using genetic algorithm. [Citation Graph (, )][DBLP ] An Adaptive Refinement Ratio Algorithm for Structured AMR Method Based on SAMRAI Framework. [Citation Graph (, )][DBLP ] DEA-Based Comprehensive Evaluation of Intelligent Knowledge. [Citation Graph (, )][DBLP ] Reference Point Detection for Arch Type Fingerprints. [Citation Graph (, )][DBLP ] On the Throughput-Reliability Tradeoff Analysis in Amplify-and-Forward Cooperative Channels. [Citation Graph (, )][DBLP ] Security Verification of 802.11i 4-Way Handshake Protocol. [Citation Graph (, )][DBLP ] A Typical Cooperative MIMO Scheme in Wireless Ad Hoc Networks and Its Channel Capacity. [Citation Graph (, )][DBLP ] Cooperative Cognitive Radio with Priority Queueing Analysis. [Citation Graph (, )][DBLP ] VLS: A Map-Based Vehicle Location Service for City Environments. [Citation Graph (, )][DBLP ] Fast Path Session Creation on Network Processors. [Citation Graph (, )][DBLP ] Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. [Citation Graph (, )][DBLP ] Hallucinating faces from thermal infrared images. [Citation Graph (, )][DBLP ] On Knowledge-Based Classification of Abnormal BGP Events. [Citation Graph (, )][DBLP ] Investigating the Impact of Real-World Factors on Internet Worm Propagation. [Citation Graph (, )][DBLP ] Empirical Study on Multi-Path Benefits on Interactive Video. [Citation Graph (, )][DBLP ] MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. [Citation Graph (, )][DBLP ] Consistency Degrees of Theories in the Revised n-Valued Kleene Logical System. [Citation Graph (, )][DBLP ] Scheduled PSM for Minimizing Energy in Wireless LANs. [Citation Graph (, )][DBLP ] Bi-model tracking of object of interest using invariant spatiogram descriptor. [Citation Graph (, )][DBLP ] Fingerprint orientation analysis with topological modeling. [Citation Graph (, )][DBLP ] A model for dynamic and adaptable services management. [Citation Graph (, )][DBLP ] Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition. [Citation Graph (, )][DBLP ] Incorporating Security Requirements into Service Composition: From Modelling to Execution. [Citation Graph (, )][DBLP ] Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling. [Citation Graph (, )][DBLP ] Mobile In-store Personalized Services. [Citation Graph (, )][DBLP ] A Study on the Relationship Between ERP Logic and Direct Consume Coefficient of I/O Table. [Citation Graph (, )][DBLP ] Packet Classification Algorithms: From Theory to Practice. [Citation Graph (, )][DBLP ] Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes. [Citation Graph (, )][DBLP ] Absolute Continuity of Monotone Measure and Convergence in Measure. [Citation Graph (, )][DBLP ] A framework for peer-to-peer service interaction. [Citation Graph (, )][DBLP ] Stability Analysis of Discrete Hopfield Neural Networks Combined with Small Ones. [Citation Graph (, )][DBLP ] Feature Extraction for fMRI-Based Human Brain Activity Recognition. [Citation Graph (, )][DBLP ] Automatic Nipple Detection Using Shape and Statistical Skin Color Information. [Citation Graph (, )][DBLP ] Model for Survivability of Wireless Sensor Network. [Citation Graph (, )][DBLP ] A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. [Citation Graph (, )][DBLP ] Feature Subsumption for Sentiment Classification in Multiple Languages. [Citation Graph (, )][DBLP ] Behavior-Based Worm Detectors Compared. [Citation Graph (, )][DBLP ] Non-rigid Registration in 3D Implicit Vector Space. [Citation Graph (, )][DBLP ] Trellis Structure for Uncoded DUSTM System. [Citation Graph (, )][DBLP ] CP-Nets Based Methodology for Integrating Functional Verification and Performance Analysis of Network Protocol. [Citation Graph (, )][DBLP ] Towards System-level Optimization for High Performance Unified Threat Management. [Citation Graph (, )][DBLP ] On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing. [Citation Graph (, )][DBLP ] An XML Firewall on Embedded Network Processor. [Citation Graph (, )][DBLP ] Mining Algorithm of Maximal Frequent Itemsets Based on Position Lattice. [Citation Graph (, )][DBLP ] Towards high-performance flow-level packet processing on multi-core network processors. [Citation Graph (, )][DBLP ] Towards effective network algorithms on multi-core network processors. [Citation Graph (, )][DBLP ] Analysis of the impact of swarm mobility on performance of routing protocols in MANETs. [Citation Graph (, )][DBLP ] Stability Analysis of Discrete Hopfield Neural Networks with Weight Function Matrix. [Citation Graph (, )][DBLP ] Complex Field Network Coding for Wireless Cooperative Multicast Flows. [Citation Graph (, )][DBLP ] Real-Time P2P Traffic Identification. [Citation Graph (, )][DBLP ] Analysis and Optimization for Multicast System with Regenerative Network Coding. [Citation Graph (, )][DBLP ] Optimized Spreading Code Reallocation Technique for PAPR Reduction in MC-CDMA Systems. [Citation Graph (, )][DBLP ] Genetic Granular Cognitive Fuzzy Neural Networks and Human Brains for Pattern Recognition. [Citation Graph (, )][DBLP ] A Middleware Approach for Behavior Consistent Composition of Services in Smart Space. [Citation Graph (, )][DBLP ] Implementation of a Specific Information System for a Web-Based E-learning Environment. [Citation Graph (, )][DBLP ] Access control for the services oriented architecture. [Citation Graph (, )][DBLP ] Is your IP address prefix well-served by internet routing? [Citation Graph (, )][DBLP ] McLab: an extensible compiler toolkit for MATLAB and related languages. [Citation Graph (, )][DBLP ] Microbubble Suspensions Prepared via Electrohydrodynamic Jetting Process. [Citation Graph (, )][DBLP ] Development of a Human Neck Finite Element Model. [Citation Graph (, )][DBLP ] DWT-Based Shot Boundary Detection Using Support Vector Machine. [Citation Graph (, )][DBLP ] Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network. [Citation Graph (, )][DBLP ] SOA-based Enterprise Service Bus. [Citation Graph (, )][DBLP ] Q-RAN: A Constructive Reinforcement Learning Approach for Robot Behavior Learning. [Citation Graph (, )][DBLP ] Understanding the challenges faced during the management of data mining models. [Citation Graph (, )][DBLP ] Designing dashboards for managing model lifecycle. [Citation Graph (, )][DBLP ] The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration Algorithm. [Citation Graph (, )][DBLP ] A Novel Data Replication and Placement Scheme for Time-Shifted TV Cluster. [Citation Graph (, )][DBLP ] Some Misunderstandings and Reflections on Multi-media CAI. [Citation Graph (, )][DBLP ] Singular Points Detection Using Interactive Mechanism In Fingerprint Images. [Citation Graph (, )][DBLP ] A systematic topological method for fingerprint singular point detection. [Citation Graph (, )][DBLP ] Nonlinear phase portrait modeling of fingerprint orientation. [Citation Graph (, )][DBLP ] The IEEE 802.11 Power Saving Mechanism: An Experimental Study. [Citation Graph (, )][DBLP ] Dynamic Differentiated Service Management for IP over Broadcasting Network. [Citation Graph (, )][DBLP ] Efficient Shot Boundary Detection Based on Scale Invariant Features. [Citation Graph (, )][DBLP ] A new fractional-order chaotic system and its synchronization control. [Citation Graph (, )][DBLP ] Clinical Communication Ontology for Medical Errors. [Citation Graph (, )][DBLP ] A novel traffic information system for VANET based on location service. [Citation Graph (, )][DBLP ] Efficient hierarchical content distribution using P2P technology. [Citation Graph (, )][DBLP ] Solution Reuse for Service Composition and Integration. [Citation Graph (, )][DBLP ] A New Research Field: Intelligent Knowledge Management. [Citation Graph (, )][DBLP ] Method to Improve the Performance of Common Channel Framework. [Citation Graph (, )][DBLP ] Research on Authentication Security of Wireless Local Area Network Based on L2TP Protocol. [Citation Graph (, )][DBLP ] The Lab Reservation System Design and Implementation Based on Greedy Algorithm. [Citation Graph (, )][DBLP ] Study of Protein Extraction Technics from Dictyoploca japonica Pupae. [Citation Graph (, )][DBLP ] Sliding-window caching algorithm for streaming media server. [Citation Graph (, )][DBLP ] A new data mining tool for analyzing coumarin-based prodrugs. [Citation Graph (, )][DBLP ] Survivability for Wireless Sensor Network: Model, Evaluation and Experiment. [Citation Graph (, )][DBLP ] VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series. [Citation Graph (, )][DBLP ] A system design of the Tahe's forest -fire -prevention management system. [Citation Graph (, )][DBLP ] Boundary Condition Identification of Fluid-Filled Piping Systems Using Neural Networks. [Citation Graph (, )][DBLP ] Equivalence and existence of weak Pareto optima for multiobjective optimization problems with cone constraints. [Citation Graph (, )][DBLP ] Exceptional families of elements for set-valued mappings: An application to nonlinear complementarity problems. [Citation Graph (, )][DBLP ] Learning the valid incoming direction of IP packets. [Citation Graph (, )][DBLP ] An investigation of the Internet's IP-layer connectivity. [Citation Graph (, )][DBLP ] Functional similarities between computer worms and biological pathogens. [Citation Graph (, )][DBLP ] Design of network-coding based multi-edge type LDPC codes for multi-source relaying systems [Citation Graph (, )][DBLP ] Data Mining Consulting Improve Data Quality. [Citation Graph (, )][DBLP ] Online consumer-to-consumer market in China - A comparative study of Taobao and eBay. [Citation Graph (, )][DBLP ] Search in 0.011secs, Finished in 0.920secs