The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhoujun Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jian Wen, Zhoujun Li, Lijuan Zhang, Xiaohua Hu, Huowang Chen
    A New Method of Cluster-Based Topic Language Model for Genomic IR. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:301-306 [Conf]
  2. Xutao Du, Zhoujun Li
    A Proof Assistant for Mobile Processes. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:204-214 [Conf]
  3. Yuejin Yan, Zhoujun Li, Tao Wang, Yuexin Chen, Huowang Chen
    Mining Maximal Frequent ItemSets Using Combined FP-Tree. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2004, pp:475-487 [Conf]
  4. Lijuan Zhang, Zhoujun Li
    Gene Selection for Classifying Microarray Data Using Grey Relation Analysis. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 2006, pp:378-382 [Conf]
  5. Yuejin Yan, Zhoujun Li, Huowang Chen
    Fast Mining Maximal Frequent ItemSets Based on FP-Tree. [Citation Graph (0, 0)][DBLP]
    ER, 2004, pp:348-361 [Conf]
  6. Xiaoming Chen, Zhoujun Li, Yongzhen Zhuang, Jinsong Han, Lei Chen 0002
    HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:290-299 [Conf]
  7. Zhoujun Li, Huowang Chen
    Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the pi-Calculus. [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:707-718 [Conf]
  8. Lijuan Zhang, Zhoujun Li, Huowang Chen, Jian Wen
    Minimum Redundancy Gene Selection Based on Grey Relational Analysis. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:120-124 [Conf]
  9. Bo Chen, Zhoujun Li, Huowang Chen
    A New Component-Oriented Programming Language with the First-Class Connector. [Citation Graph (0, 0)][DBLP]
    JMLC, 2006, pp:271-286 [Conf]
  10. Bo Chen, Zhoujun Li, Huowang Chen
    Supporting Connector in Programming Language. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:369-374 [Conf]
  11. Zhoujun Li, Huowang Chen
    Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes. [Citation Graph (0, 0)][DBLP]
    TACAS, 1999, pp:300-314 [Conf]
  12. Chunming Gao, Jin Li, Zhoujun Li, Huowang Chen
    Model Checking for BPEL4WS with Time. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:528-533 [Conf]
  13. Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen
    An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:166-180 [Conf]
  14. Jian Wen, Zhoujun Li, Xiaohua Hu
    Ontology Based Clustering for Improving Genomic IR. [Citation Graph (0, 0)][DBLP]
    CBMS, 2007, pp:225-230 [Conf]
  15. Xiao-ming Zhang, Yi-Jie Wang, Zhoujun Li
    Research of Routing Algorithm in Hierarchy-Adaptive P2P Systems. [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:728-739 [Conf]
  16. Yun Sun, Zhoujun Li, Deqiang Wang
    Hamiltonicity and Pancyclicity of Binary Recursive Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2007, pp:786-796 [Conf]
  17. Wen-Han Chao, Zhoujun Li, Yuexin Chen
    An Integrated Reordering Model for Statistical Machine Translation. [Citation Graph (0, 0)][DBLP]
    MICAI, 2007, pp:955-965 [Conf]
  18. Tao Wang, Zhoujun Li, Yuejin Yan, Huowang Chen
    An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams. [Citation Graph (0, 0)][DBLP]
    MLDM, 2007, pp:91-103 [Conf]
  19. Lijuan Zhang, Zhoujun Li, Huowang Chen
    An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:1088-1095 [Conf]
  20. Zhoujun Li, Tao Wang, Ruoxue Wang, Yuejin Yan, Huowang Chen
    A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees. [Citation Graph (0, 0)][DBLP]
    FAW, 2007, pp:216-227 [Conf]
  21. Zhoujun Li, Ti Zhou, Mengjun Li, Huowang Chen
    Constraints Solution for Time Sensitive Security Protocols. [Citation Graph (0, 0)][DBLP]
    FAW, 2007, pp:191-203 [Conf]
  22. Yun Sun, Zhoujun Li, Deqiang Wang
    Hamiltonian Property on Binary Recursive Networks. [Citation Graph (0, 0)][DBLP]
    FAW, 2007, pp:228-235 [Conf]

  23. Simplifying Buffer Overflow Detection Using Site-Safe Expressions. [Citation Graph (, )][DBLP]


  24. Online New Event Detection Based on IPLSA. [Citation Graph (, )][DBLP]


  25. A Tree Graph Model Based on Mobile Environment. [Citation Graph (, )][DBLP]


  26. Similar Sentence Retrieval for Machine Translation Based on Word-Aligned Bilingual Corpus. [Citation Graph (, )][DBLP]


  27. Local abstract verification and refinement of security protocols. [Citation Graph (, )][DBLP]


  28. SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. [Citation Graph (, )][DBLP]


  29. Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia. [Citation Graph (, )][DBLP]


  30. User's Latent Interest-Based Collaborative Filtering. [Citation Graph (, )][DBLP]


  31. Improving Information Retrieval within Language Model Framework by Integrating Adjacent and Distant Relation. [Citation Graph (, )][DBLP]


  32. A context approach to measuring similarity between questions in the community-based QA services. [Citation Graph (, )][DBLP]


  33. Answer summarization via term hierarchical structure. [Citation Graph (, )][DBLP]


  34. Microarray Data Biclustering with Multi-objective Immune Optimization Algorithm. [Citation Graph (, )][DBLP]


  35. Diameter bounds of cubelike recursive networks. [Citation Graph (, )][DBLP]


  36. Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction. [Citation Graph (, )][DBLP]


  37. Misusing Kademlia Protocol to Perform DDoS Attacks. [Citation Graph (, )][DBLP]


  38. The topic-perspective model for social tagging systems. [Citation Graph (, )][DBLP]


  39. ID Repetition in Kad. [Citation Graph (, )][DBLP]


  40. A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees. [Citation Graph (, )][DBLP]


  41. Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study. [Citation Graph (, )][DBLP]


  42. A Method for Mobile User Profile and Reasoning. [Citation Graph (, )][DBLP]


  43. Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic. [Citation Graph (, )][DBLP]


  44. A survival modeling approach to biomedical search result diversification using wikipedia. [Citation Graph (, )][DBLP]


  45. Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. [Citation Graph (, )][DBLP]


  46. A Novel Composite Kernel for Finding Similar Questions in CQA Services. [Citation Graph (, )][DBLP]


  47. A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. [Citation Graph (, )][DBLP]


  48. Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification. [Citation Graph (, )][DBLP]


  49. Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules. [Citation Graph (, )][DBLP]


  50. Multi-objective ant colony optimization biclustering of microarray data. [Citation Graph (, )][DBLP]


  51. Predicting gene function with positive and unlabeled examples. [Citation Graph (, )][DBLP]


  52. Research on Mixture Language Model-based Document Clustering. [Citation Graph (, )][DBLP]


  53. A Novel Unsupervised Feature Selection Method for Bioinformatics Data Sets through Feature Clustering. [Citation Graph (, )][DBLP]


  54. Multi-objective Evolutionary Algorithm for Mining 3D Clusters in Gene-sample-time Microarray Data. [Citation Graph (, )][DBLP]


  55. Constructing Program Invariants via Solving QBF. [Citation Graph (, )][DBLP]


  56. Constraint Abstraction in Verification of Security Protocols. [Citation Graph (, )][DBLP]


  57. Server-Controlled Identity-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  58. A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. [Citation Graph (, )][DBLP]


  59. A distributed topology-aware overlays construction algorithm. [Citation Graph (, )][DBLP]


  60. Multi-objective Particle Swarm Optimization Biclustering of Microarray Data. [Citation Graph (, )][DBLP]


  61. BioCLink: A Probabilistic Approach for Improving Genomics Search with Citation Links. [Citation Graph (, )][DBLP]


  62. Microarray Biclustering with Crowding Based MOACO. [Citation Graph (, )][DBLP]


  63. Towards a Better Ranking for Biomedical Information Retrieval Using Context. [Citation Graph (, )][DBLP]


  64. A Survey of Fuzzy Decision Tree Classifier Methodology. [Citation Graph (, )][DBLP]


  65. Timed Component-Interaction Automata for Specification and Verification of Real-Time Reactive Systems. [Citation Graph (, )][DBLP]


  66. VM-based Architecture for Network Monitoring and Analysis. [Citation Graph (, )][DBLP]


  67. An Efficient Certificateless Encryption Scheme in the Standard Model. [Citation Graph (, )][DBLP]


  68. A Digital Signature Scheme on the Conic Curve over Zn Based on Two Hard Problems. [Citation Graph (, )][DBLP]


  69. Biclustering of microarray data with MOSPO based on crowding distance. [Citation Graph (, )][DBLP]


  70. Cryptanalysis of simple three-party key exchange protocol. [Citation Graph (, )][DBLP]


  71. Digital multisignature on the generalized conic curve over Zn. [Citation Graph (, )][DBLP]


  72. Modeling and Verifying Time Sensitive Security Protocols with Constraints. [Citation Graph (, )][DBLP]


  73. fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol. [Citation Graph (, )][DBLP]


  74. A Novel Derivation Framework For Definite Logic Program. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.324secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002