The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xing Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xing Li, Shiqi Wu
    Generation and Applications of Bi-Shaping Shadowing in Mobile Systems Modeling. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:483-486 [Conf]
  2. Jinxiang Zhang, Jilong Wang, Jianping Wu, Xing Li
    A Distributed Network Management Framework Based on NGI. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:430-434 [Conf]
  3. Yue Li, Xing Li, Jingfang Xu
    Systematic Study on Query Expansion. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2005, pp:276-277 [Conf]
  4. Yangbo Zhu, Shaozhi Ye, Xing Li
    Distributed PageRank computation based on iterative aggregation-disaggregation methods. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:578-585 [Conf]
  5. Wu Liu, Haixin Duan, Jianping Wu, Xing Li
    PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:518-525 [Conf]
  6. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
    New Algorithm Mining Intrusion Patterns. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:774-777 [Conf]
  7. Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren
    Algorithms for Congestion Detection and Control. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:374-381 [Conf]
  8. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren
    XML Based X.509 Authorization in CERNET Grid. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:325-332 [Conf]
  9. Xiao-hui Shi, Yang Chen, Beixing Deng, Xing Li
    Network Distance Prediction based on Network Coordinate System. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:170-175 [Conf]
  10. Yang Chen, Beixing Deng, Xing Li
    Rainbow: A Locality-aware Peer-to-Peer Overlay Multicast System. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:151-155 [Conf]
  11. Qianli Zhang, Xing Li
    On the Generation of Fast Verifiable IPv6 Addresses. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:176-179 [Conf]
  12. Jiang Liu, Tao He, Xing Li
    An Accounting System Building on Network Processor. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:543- [Conf]
  13. Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li
    New Method for Intrusion Features Mining in IDS. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:429-437 [Conf]
  14. Lanjia Wang, Haixin Duan, Xing Li
    Port Scan Behavior Diagnosis by Clustering. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:243-255 [Conf]
  15. Xin-Jing Wang, Wei-Ying Ma, Xing Li
    Data-driven approach for bridging the cognitive gap in image retrieval. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2231-2234 [Conf]
  16. Maoke Chen, Xing Li
    Potential Risks of Deploying Large Scale Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:508-517 [Conf]
  17. Haisang Wu, Huai-Rong Shao, Xing Li
    Enhanced End-System Support for Multimedia Transmission over the Differentiated Services Network. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:235-244 [Conf]
  18. Jun Luv, Xing Li, Tong Li
    The New Detection Algorithms for Network Traffic Anomalies. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:52- [Conf]
  19. Maoke Chen, Tao He, Xing Li
    A Mean-Field Theory of Cellular Automata Model for Distributed Packet Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:773-783 [Conf]
  20. Qianli Zhang, Xing Li
    An IP Address Anonymization Scheme with Multiple Access Levels. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:793-802 [Conf]
  21. Yi Wang, Guohan Lu, Xing Li
    A Study of Internet Packet Reordering. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:350-359 [Conf]
  22. Qianli Zhang, Xing Li
    A Hypothesis Testing Based Scalable TCP Scan Detection. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:785-792 [Conf]
  23. Shijin Kong, Tao He, Xiaoxin Shao, Changqing An, Xing Li
    Time-Out Bloom Filter: A New Sampling Method for Recording More Flows. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:590-599 [Conf]
  24. Xiaoxin Shao, Tao He, Shijin Kong, Changqing An, Xing Li
    Time-Driven vs Packet-Driven: A Deep Study on Traffic Sampling. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:610-619 [Conf]
  25. Jingfang Xu, Yangbo Zhu, Xing Li
    An Article Language Model for BBS Search. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:152-160 [Conf]
  26. Guohan Lu, Xing Li
    On the correspondency between TCP acknowledgment packet and data packet. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Comference, 2003, pp:259-272 [Conf]
  27. Ruixiong Tian, Yongqiang Xiong, Qian Zhang, Bo Li, Ben Y. Zhao, Xing Li
    Hybrid Overlay Structure Based on Random Walks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:152-162 [Conf]
  28. Jun Lv, Xing Li, Quang-Anh Tran, Tong Li
    A New Algorithm for Network Traffic Prediction. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:1006-1012 [Conf]
  29. Yi Wang, Shaozhi Ye, Xing Li
    Understanding Current IPv6 Performance: A Measurement Study. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:71-76 [Conf]
  30. Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li
    Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:476-481 [Conf]
  31. Xin-Jing Wang, Wei-Ying Ma, Qi-Cai He, Xing Li
    Grouping web image search result. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:436-439 [Conf]
  32. Xin-Jing Wang, Wei-Ying Ma, Gui-Rong Xue, Xing Li
    Multi-model similarity propagation and its application for web image retrieval. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:944-951 [Conf]
  33. Xin-Jing Wang, Wei-Ying Ma, Lei Zhang, Xing Li
    Iteratively clustering web images based on link and attribute reinforcements. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:122-131 [Conf]
  34. Xin-Jing Wang, Wei-Ying Ma, Xing Li
    Learning Image Manifold Using Web Data. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:907-914 [Conf]
  35. Qianli Zhang, Xing Li
    Session State Transition Based Large Network IDS. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  36. Liang Chen, Shaozhi Ye, Xing Li
    Template detection for large scale search engines. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1094-1098 [Conf]
  37. Chongrong Li, Xing Li, Jianping Wu, Yue You, Maoke Chen
    IPv6 Development in China. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:153-156 [Conf]
  38. Xing Li, Jian-Huang Lai, ZhiBin Zhang
    An Efficient Compression and Reconstruction Method of Face Image for Low Rate Net. [Citation Graph (0, 0)][DBLP]
    SINOBIOMETRICS, 2004, pp:379-385 [Conf]
  39. Jingfang Xu, Shaozhi Ye, Xing Li
    Query Based Chinese Phrase Extraction for Site Search. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:125-134 [Conf]
  40. Wu Liu, Hai-Xin Duan, Jian-Ping Wu, Xing Li
    Improved Marking Model ERPPM Tracing Back to DDoS Attacker. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:759-762 [Conf]
  41. Wu Liu, Jian-Ping Wu, Hai-Xin Duan, Xing Li
    The Authorization Service in Dynamic Trust Domains. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:564-567 [Conf]
  42. Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang
    NTS6: IPv6 based Network Topology Service System of CERNET2. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1010-1015 [Conf]
  43. T. Y. Li, Xing Li
    Finding Mixed Cells in the Mixed Volume Computation. [Citation Graph (0, 0)][DBLP]
    Foundations of Computational Mathematics, 2001, v:1, n:2, pp:161-181 [Journal]
  44. Jianping Wu, Yong Cui, Xing Li, Chris Metz
    The Transition to IPv6, Part 1: 4over6 for the China Education and Research Network. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:3, pp:80-85 [Journal]
  45. Jie Hao, Xing Li
    Word Spotting Based on a posterior Measure of Keyword Confidence. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:4, pp:491-497 [Journal]
  46. Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li
    Workflow Oriented Network Management - A Web/Java Approach. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:4, pp:- [Journal]
  47. Xin-Jing Wang, Wei-Ying Ma, Xing Li
    Exploring statistical correlations for image retrieval. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2006, v:11, n:4, pp:340-351 [Journal]
  48. Quang-Anh Tran, Xing Li, Hai-Xin Duan
    Efficient performance estimate for one-class support vector machine. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2005, v:26, n:8, pp:1174-1182 [Journal]
  49. Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li
    Using SMV for Cryptographic Protocol Analysis: A Case Study. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:2, pp:43-50 [Journal]
  50. Ruixiong Tian, Qian Zhang, Zhe Xiang, Yongqiang Xiong, Xing Li, Wenwu Zhu
    Robust and efficient path diversity in application-layer multicast for video streaming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:8, pp:961-972 [Journal]
  51. Xuan Zhang, Xing Li, Chongrong Li
    Controllable Multi-party Audio/Video Collaboration Based on Multicast over CERNET. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2007, pp:819-828 [Conf]
  52. Lin Cong, Yang Chen, Xiao-hui Shi, Ye Wang, Weiyu Wu, Beixing Deng, Xing Li
    Telemeter: Network Distance Prediction Base on Network Topology. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:34-41 [Conf]
  53. Xuan Zhang, Xing Li, Qingguo Zhao
    Service and Management for Multicast Based Audio/Video Collaboration System on CERNET. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:853-856 [Conf]
  54. Xuan Zhang, Dongtao Liu, Xing Li
    Design and Implement Controllable Multicast Based Audio/Video Collaboration. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:701-704 [Conf]
  55. Jun Lv, Xing Li, Tong Li
    Network Traffic Prediction and Applications Based on Time Series Model. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2007, pp:1306-1315 [Conf]
  56. Qianli Zhang, Jilong Wang, Xing Li
    On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:177-188 [Conf]
  57. G. Lu, Y. Chen, Stefan Birrer, Fabián E. Bustamante, C. Y. Cheung, X. Li
    End-to-End Inference of Router Packet Forwarding Priority. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1784-1792 [Conf]
  58. Xin-Jing Wang, Wei-Ying Ma, Lei Zhang, Xing Li
    Multi-graph enabled active learning for multimodal web image retrieval. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Retrieval, 2005, pp:65-72 [Conf]
  59. Jingfang Xu, Sheng Wu, Xing Li
    Estimating collection size with logistic regression. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:789-790 [Conf]
  60. Jingfang Xu, Xing Li
    Learning to rank collections. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:765-766 [Conf]
  61. Yong Cui, Jianping Wu, Xing Li, Mingwei Xu, Chris Metz
    The Transition to IPv6, Part II: The Softwire Mesh Framework Solution. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:5, pp:76-80 [Journal]

  62. Security and Reliability Design of Olympic Games Network. [Citation Graph (, )][DBLP]


  63. Web Site Recommendation Using HTTP Traffic. [Citation Graph (, )][DBLP]


  64. Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. [Citation Graph (, )][DBLP]


  65. Source Address Validation: Architecture and Protocol Design. [Citation Graph (, )][DBLP]


  66. Inter-Domain Access Volume Model: Ranking Autonomous Systems. [Citation Graph (, )][DBLP]


  67. Research on Network Traffic Anomaly Detection Algorithm. [Citation Graph (, )][DBLP]


  68. Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. [Citation Graph (, )][DBLP]


  69. Evaluate the Performance and Scalability of Image Deployment in Virtual Data Center. [Citation Graph (, )][DBLP]


  70. A Low Bit Rate Audio Bandwidth Extension Method for Mobile Communication. [Citation Graph (, )][DBLP]


  71. Unbiased sampling in directed social graph. [Citation Graph (, )][DBLP]


  72. Concept based Query and Document Expansion using Hidden Markov Model. [Citation Graph (, )][DBLP]


  73. Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction. [Citation Graph (, )][DBLP]


  74. PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts. [Citation Graph (, )][DBLP]


  75. Stateless Mapping and Multiplexing of IPv4 Addresses in Migration to IPv6 Internet. [Citation Graph (, )][DBLP]


  76. Modeling for image processing system validation, verification and testing. [Citation Graph (, )][DBLP]


  77. 2D-to-3D TV Image Mapping on TriMedias. [Citation Graph (, )][DBLP]


  78. Web-Based Application for Traffic Anomaly Detection Algorithm. [Citation Graph (, )][DBLP]


  79. Nonlinear modeling of the internet delay structure. [Citation Graph (, )][DBLP]


  80. Developing a Multi-Sectoral Dynamic Applied General Equilibrium Model to Simulate the Emission Reduction of Nitrogen and Phosphorus at a Catchment Extent. [Citation Graph (, )][DBLP]


  81. Multicast Congestion Control on Many-to-Many Videoconferencing. [Citation Graph (, )][DBLP]


  82. Forwarding IPv4 Traffics in Pure IPv6 Backbone with Stateless Address Mapping. [Citation Graph (, )][DBLP]


  83. SANTT: Sharing Anonymized Network Traffic Traces among Researchers. [Citation Graph (, )][DBLP]


  84. WIND: A scalable and lightweight network topology service for peer-to-peer applications. [Citation Graph (, )][DBLP]


  85. HATS: High Accuracy Timestamping System Based on NetFPGA. [Citation Graph (, )][DBLP]


  86. pathWave: Combined estimation of network link capacity and available bandwidth using statistical signal processing. [Citation Graph (, )][DBLP]


  87. Building A Robust and Economical Internet Testbed: 6PlanetLab. [Citation Graph (, )][DBLP]


  88. Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate. [Citation Graph (, )][DBLP]


  89. A Peer-To-Peer Traffic Identification Method Using Machine Learning. [Citation Graph (, )][DBLP]


  90. DV-Based Extensible Video Transport Terminal for Standard-Definition Video Conference. [Citation Graph (, )][DBLP]


  91. A Tunnels-Between-Hosts Based Method for IPv4 Application over Native IPv6 Network. [Citation Graph (, )][DBLP]


  92. Construct Intra-Cluster Load-Balancing Overlay. [Citation Graph (, )][DBLP]


  93. Two-layer network coordinate system for Internet distance prediction. [Citation Graph (, )][DBLP]


  94. An empirical study on Embeddable Overlay Networks. [Citation Graph (, )][DBLP]


  95. Experimental study on neighbor selection policy for Phoenix Network Coordinate system. [Citation Graph (, )][DBLP]


  96. Hybrid Multicast Scheme for Many-to-Many Videoconferencing. [Citation Graph (, )][DBLP]


  97. Log management approach in three-dimensional spatial data management system. [Citation Graph (, )][DBLP]


  98. Determination of sedimentation rate of tidal flats at the Yangtze estuary, China, using multi-temporal Landsat TM images. [Citation Graph (, )][DBLP]


  99. The application of the unequal interval difference method in the terrestrial heat field distribution simulation. [Citation Graph (, )][DBLP]


Search in 0.011secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002