The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianxin Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jianxin Li
    Improvements to systematic program development. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1992, pp:308-311 [Conf]
  2. Hailong Sun, Yanmin Zhu, Chunming Hu, Jinpeng Huai, Yunhao Liu, Jianxin Li
    Early Experience of Remote and Hot Service Deployment with Trustworthiness in CROWN Grid. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:301-312 [Conf]
  3. Nan Tang, Jeffrey Xu Yu, Kam-Fai Wong, Kevin Lü, Jianxin Li
    Accelerating XML Structural Join by Partitioning. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:280-289 [Conf]
  4. Jianxin Li, Benjamin J. Leon
    A Formal Approach to Model SNMP Network Management Systems. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:284- [Conf]
  5. Jianxin Li, Guangming Xu
    The First Industrial Enterprise CIMS Implementation Program in China. [Citation Graph (0, 0)][DBLP]
    ITAMS, 1991, pp:45-52 [Conf]
  6. Jianxin Li, Benjamin J. Leon
    ISOS: intelligent shell of SNMP. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1995, pp:711- [Conf]
  7. Jianxin Li, Jinpeng Huai, Qin Li, Xian-xian Li
    Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:1073-1080 [Conf]
  8. Jianxin Li
    Transforming Postconditions To Aid Program Development. [Citation Graph (0, 0)][DBLP]
    SEKE, 1993, pp:689-694 [Conf]
  9. Chengfei Liu, Jianxin Li
    Designing Quality XML Schemas from E-R Diagrams. [Citation Graph (0, 0)][DBLP]
    WAIM, 2006, pp:508-519 [Conf]
  10. Qin Li, Jianxin Li, Jinpeng Huai, Xingang Liu, Chunming Hu
    CROWN-ST: A Security and Trustworthiness Architecture for CROWN. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:23- [Conf]
  11. Jianxin Li, Jinpeng Huai, Jie Xu, Yanmin Zhu, Wei Xue
    TOWER: Practical Trust Negotiation Framework for Grids. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:26- [Conf]
  12. Jinpeng Huai, Hailong Sun, Chunming Hu, Yanmin Zhu, Yunhao Liu, Jianxin Li
    ROST: Remote and hot service deployment with trustworthiness in CROWN Grid. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:6, pp:825-835 [Journal]

  13. Semantics based Buffer Reduction for Queries over XML Data Streams. [Citation Graph (, )][DBLP]


  14. Computing Structural Similarity of Source XML Schemas against Domain XML Schema. [Citation Graph (, )][DBLP]


  15. HiTrust: A Hybrid Tree Based Trust Negotiation Service. [Citation Graph (, )][DBLP]


  16. A Hybrid Language Combining Business Rules with Object-Orientation. [Citation Graph (, )][DBLP]


  17. Efficient Top-k Search Across Heterogeneous XML Data Sources. [Citation Graph (, )][DBLP]


  18. Holistic Constraint-Preserving Transformation from Relational Schema into XML Schema. [Citation Graph (, )][DBLP]


  19. Containment between Unions of XPath Queries. [Citation Graph (, )][DBLP]


  20. Matching Top-k Answers of Twig Patterns in Probabilistic XML. [Citation Graph (, )][DBLP]


  21. Fast ELCA computation for keyword queries on XML data. [Citation Graph (, )][DBLP]


  22. Suggestion of promising result types for XML keyword search. [Citation Graph (, )][DBLP]


  23. CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. [Citation Graph (, )][DBLP]


  24. HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. [Citation Graph (, )][DBLP]


  25. Formalizing workflow patterns with Extended Petri-Net. [Citation Graph (, )][DBLP]


  26. Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. [Citation Graph (, )][DBLP]


  27. CROWN: A Service-Oriented Grid Middleware System: Experience and Applications. [Citation Graph (, )][DBLP]


  28. A Policy Language for Adaptive Web Services Security Framework. [Citation Graph (, )][DBLP]


  29. CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration. [Citation Graph (, )][DBLP]


  30. PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations. [Citation Graph (, )][DBLP]


  31. Processing XML Keyword Search by Constructing Effective Structured Queries. [Citation Graph (, )][DBLP]


  32. Filtering Techniques for Rewriting XPath Queries Using Views. [Citation Graph (, )][DBLP]


  33. SNMK: simple network management knowledge. [Citation Graph (, )][DBLP]


  34. Refinement of UML Interaction for Correct Embedded System Design. [Citation Graph (, )][DBLP]


  35. A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  36. CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002