|
Search the dblp DataBase
Jianxin Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jianxin Li
Improvements to systematic program development. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1992, pp:308-311 [Conf]
- Hailong Sun, Yanmin Zhu, Chunming Hu, Jinpeng Huai, Yunhao Liu, Jianxin Li
Early Experience of Remote and Hot Service Deployment with Trustworthiness in CROWN Grid. [Citation Graph (0, 0)][DBLP] APPT, 2005, pp:301-312 [Conf]
- Nan Tang, Jeffrey Xu Yu, Kam-Fai Wong, Kevin Lü, Jianxin Li
Accelerating XML Structural Join by Partitioning. [Citation Graph (0, 0)][DBLP] DEXA, 2005, pp:280-289 [Conf]
- Jianxin Li, Benjamin J. Leon
A Formal Approach to Model SNMP Network Management Systems. [Citation Graph (0, 0)][DBLP] ICCCN, 1995, pp:284- [Conf]
- Jianxin Li, Guangming Xu
The First Industrial Enterprise CIMS Implementation Program in China. [Citation Graph (0, 0)][DBLP] ITAMS, 1991, pp:45-52 [Conf]
- Jianxin Li, Benjamin J. Leon
ISOS: intelligent shell of SNMP. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 1995, pp:711- [Conf]
- Jianxin Li, Jinpeng Huai, Qin Li, Xian-xian Li
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. [Citation Graph (0, 0)][DBLP] MSN, 2005, pp:1073-1080 [Conf]
- Jianxin Li
Transforming Postconditions To Aid Program Development. [Citation Graph (0, 0)][DBLP] SEKE, 1993, pp:689-694 [Conf]
- Chengfei Liu, Jianxin Li
Designing Quality XML Schemas from E-R Diagrams. [Citation Graph (0, 0)][DBLP] WAIM, 2006, pp:508-519 [Conf]
- Qin Li, Jianxin Li, Jinpeng Huai, Xingang Liu, Chunming Hu
CROWN-ST: A Security and Trustworthiness Architecture for CROWN. [Citation Graph (0, 0)][DBLP] e-Science, 2006, pp:23- [Conf]
- Jianxin Li, Jinpeng Huai, Jie Xu, Yanmin Zhu, Wei Xue
TOWER: Practical Trust Negotiation Framework for Grids. [Citation Graph (0, 0)][DBLP] e-Science, 2006, pp:26- [Conf]
- Jinpeng Huai, Hailong Sun, Chunming Hu, Yanmin Zhu, Yunhao Liu, Jianxin Li
ROST: Remote and hot service deployment with trustworthiness in CROWN Grid. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2007, v:23, n:6, pp:825-835 [Journal]
Semantics based Buffer Reduction for Queries over XML Data Streams. [Citation Graph (, )][DBLP]
Computing Structural Similarity of Source XML Schemas against Domain XML Schema. [Citation Graph (, )][DBLP]
HiTrust: A Hybrid Tree Based Trust Negotiation Service. [Citation Graph (, )][DBLP]
A Hybrid Language Combining Business Rules with Object-Orientation. [Citation Graph (, )][DBLP]
Efficient Top-k Search Across Heterogeneous XML Data Sources. [Citation Graph (, )][DBLP]
Holistic Constraint-Preserving Transformation from Relational Schema into XML Schema. [Citation Graph (, )][DBLP]
Containment between Unions of XPath Queries. [Citation Graph (, )][DBLP]
Matching Top-k Answers of Twig Patterns in Probabilistic XML. [Citation Graph (, )][DBLP]
Fast ELCA computation for keyword queries on XML data. [Citation Graph (, )][DBLP]
Suggestion of promising result types for XML keyword search. [Citation Graph (, )][DBLP]
CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. [Citation Graph (, )][DBLP]
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. [Citation Graph (, )][DBLP]
Formalizing workflow patterns with Extended Petri-Net. [Citation Graph (, )][DBLP]
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. [Citation Graph (, )][DBLP]
CROWN: A Service-Oriented Grid Middleware System: Experience and Applications. [Citation Graph (, )][DBLP]
A Policy Language for Adaptive Web Services Security Framework. [Citation Graph (, )][DBLP]
CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration. [Citation Graph (, )][DBLP]
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations. [Citation Graph (, )][DBLP]
Processing XML Keyword Search by Constructing Effective Structured Queries. [Citation Graph (, )][DBLP]
Filtering Techniques for Rewriting XPath Queries Using Views. [Citation Graph (, )][DBLP]
SNMK: simple network management knowledge. [Citation Graph (, )][DBLP]
Refinement of UML Interaction for Correct Embedded System Design. [Citation Graph (, )][DBLP]
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|