The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Liang Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Asif Iqbal, Ning He, Liang Li, Naeem Ullah Dar
    Simulated Annealing Assisted Optimization of Fuzzy Rules for Maximizing Tool Life in High-Speed Milling Process. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Applications, 2006, pp:335-340 [Conf]
  2. Huadong Ma, Liang Li, Jianzhong Wang, Naijun Zhan
    Automatic Synthesis of the DC Specifications of Lip Synchronisation Protocol. [Citation Graph (0, 0)][DBLP]
    APSEC, 2001, pp:371-0 [Conf]
  3. Liang Li, Xin Yang, Yuliang He, Jie Tian
    Palmprint Recognition Using Fourier-Mellin Transformation Based Registration Method. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2005, pp:730-738 [Conf]
  4. Liang Li, Herman D. Hughes, Lewis H. Greenberg
    Performance Analysis of a Shortest-Delay Protocol. [Citation Graph (0, 0)][DBLP]
    Berkeley Workshop, 1982, pp:259-281 [Conf]
  5. Herman D. Hughes, Liang Li
    A Performance Study of Ethernet. [Citation Graph (0, 0)][DBLP]
    Int. CMG Conference, 1982, pp:79-85 [Conf]
  6. Guoqiang Yu, Liang Li, Jianwei Gu, Li Zhang
    Total Variation Based Iterative Image Reconstruction. [Citation Graph (0, 0)][DBLP]
    CVBIA, 2005, pp:526-534 [Conf]
  7. Liang Li, Jie Tian, Yuliang He, Xin Yang
    Multi-scale Palmprint Recognition Using Registration Information and 2D Gabor Feature. [Citation Graph (0, 0)][DBLP]
    ICAPR (2), 2005, pp:127-135 [Conf]
  8. Yunni Xia, Hanpin Wang, Chunxiang Xu, Liang Li
    Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2006, pp:988-995 [Conf]
  9. Herman D. Hughes, Liang Li
    A Capacity Planning Methodology for Large-Scale Computer Systems. [Citation Graph (0, 0)][DBLP]
    IMACS World Congress, 1982, pp:3-14 [Conf]
  10. Jie Tian, Yuliang He, Xin Yang, Liang Li, Xinjian Chen
    Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern. [Citation Graph (0, 0)][DBLP]
    SINOBIOMETRICS, 2004, pp:57-66 [Conf]
  11. Huafeng Liu, Liang Li, Shiyao Jin
    Cluster Number Variability Problem in LEACH. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:429-437 [Conf]
  12. Liang Li, Jie Tian, Xin Yang
    A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:175-176 [Conf]
  13. Liang Li, Herman D. Hughes, Lewis H. Greenberg
    Performance Analysis of a Shortest-Delay Protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1982, v:6, n:3, pp:189-200 [Journal]
  14. Asif Iqbal, Ning He, Liang Li, Naeem Ullah Dar
    A fuzzy expert system for optimizing parameters and predicting performance measures in hard-milling process. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2007, v:32, n:4, pp:1020-1027 [Journal]
  15. Asif Iqbal, Ning He, Naeem Ullah Dar, Liang Li
    Comparison of fuzzy expert system based strategies of offline and online estimation of flank wear in hard milling process. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2007, v:33, n:1, pp:61-66 [Journal]
  16. Jie Tian, Liang Li, Xin Yang
    Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:861-870 [Journal]
  17. David S. Wishart, Dan Tzur, Craig Knox, Roman Eisner, Anchi Guo, Nelson Young, Dean Cheng, Kevin Jewell, David Arndt, Summit Sawhney, Chris Fung, Lisa Nikolai, Mike Lewis, Marie-Aude Coutouly, Ian J. Forsythe, Peter Tang, Savita Shrivastava, Kevin Jeroncic, Paul Stothard, Godwin Amegbey, David Block, David. D. Hau, James Wagner, Jessica Miniaci, Melisa Clements, Mulu Gebremedhin, Natalie Guo, Ying Zhang, Gavin E. Duggan, Glen D. MacInnis, Alim M. Weljie, Reza Dowlatabadi, Fiona Bamforth, Derrick Clive, Russell Greiner, Liang Li, Tom Marrie, Brian D. Sykes, Hans J. Vogel, Lori Querengesser
    HMDB: the Human Metabolome Database. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2007, v:35, n:Database-Issue, pp:521-526 [Journal]
  18. Yuliang He, Jie Tian, Liang Li, Hong Chen, Xin Yang
    Fingerprint Matching Based on Global Comprehensive Similarity. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:6, pp:850-862 [Journal]
  19. Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang
    A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:129-132 [Conf]
  20. Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang
    A Secure Email System Based on Fingerprint Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:250-253 [Conf]

  21. mPlogP: A Parallel Computation Model for Heterogeneous Multi-core Computer. [Citation Graph (, )][DBLP]


  22. The Harmony Search Algorithm in Combination with Particle Swarm Optimization and its Application in the Slope Stability Analysis. [Citation Graph (, )][DBLP]


  23. Evaluation of Human Visual Impressions in Gray Scale Textures Using Morphological Manipulation. [Citation Graph (, )][DBLP]


  24. Obstacle-avoiding rectilinear Steiner tree construction. [Citation Graph (, )][DBLP]


  25. Generation of optimal obstacle-avoiding rectilinear Steiner minimum tree. [Citation Graph (, )][DBLP]


  26. An Improved Harmony Search Algorithm for the Location of Critical Slip Surfaces in Slope Stability Analysis. [Citation Graph (, )][DBLP]


  27. Directional entropy feature for human detection. [Citation Graph (, )][DBLP]


  28. A full-custom design of AES SubByte module with signal independent power consumption. [Citation Graph (, )][DBLP]


  29. D-S Theory-based Trust Model FIRE+ in Multi-agent Systems. [Citation Graph (, )][DBLP]


  30. A Policy Language for Adaptive Web Services Security Framework. [Citation Graph (, )][DBLP]


  31. Cloning and Characterization of Duck (Anas Platyrhynchos) Myf5 Gene and Comparison with Other Vertebrates. [Citation Graph (, )][DBLP]


  32. A Fuzzy Multi-objective Optimization Algorithm in Mine Ore Blending. [Citation Graph (, )][DBLP]


  33. Classfication and Evolution of HLH Family Members in Poultry Genome. [Citation Graph (, )][DBLP]


  34. User Model's Realization of the Personalized Service of Digital Library. [Citation Graph (, )][DBLP]


  35. Harmony Search Algorithm with Dynamic Adaptation for the Determination of Minimum Factor of Safety of Soil Slopes. [Citation Graph (, )][DBLP]


  36. An Advanced Genetic Algorithm for Traveling Salesman Problem. [Citation Graph (, )][DBLP]


  37. An Improved Harmony Search Algorithm with Dynamic Adaptation for Location of Critical Slip Surface. [Citation Graph (, )][DBLP]


  38. From k-SAT to k-CSP: Two Generalized Algorithms [Citation Graph (, )][DBLP]


  39. Exact phase transition of backtrack-free search with implications on the power of greedy algorithms [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002