The SCEAS System
Navigation Menu

Search the dblp DataBase


Li Guo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hai Jin, Li Guo, Zongfen Han
    Global System Image Architecture for Cluster Computing. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:665-675 [Conf]
  2. Yang Li, Binxing Fang, Li Guo, You Chen
    Network anomaly detection based on TCM-KNN algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:13-19 [Conf]
  3. You Chen, Yang Li, Xueqi Cheng, Li Guo
    Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:153-167 [Conf]
  4. Li Guo, David Robertson, Yun-Heh Chen-Burger
    A Generic Multi-agent System Platform For Business Workflows Using Web Services Composition. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:301-307 [Conf]
  5. Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo
    Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:853-862 [Conf]
  6. Li Guo, David Robertson, Yun-Heh Chen-Burger
    A Novel Approach for Enacting the Distributed Business Workflows Using BPEL4WS on the Multi-Agent Platform. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:657-664 [Conf]
  7. Li Guo, Yun-Heh Chen-Burger, Dave Roberston
    Mapping a Business Process Model to a Semantic Web Service Model. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:746-0 [Conf]
  8. Li Guo, Yih-Fang Huang
    SMF robust filtering in impulsive noise. [Citation Graph (0, 0)][DBLP]
    ISCAS (6), 2005, pp:5998-6001 [Conf]
  9. Li Guo, William Y. Sit
    Enumeration of Rota-Baxter words. [Citation Graph (0, 0)][DBLP]
    ISSAC, 2006, pp:124-131 [Conf]
  10. Li Guo, David Robertson, Yun-Heh Chen-Burger
    Enacting the Distributed Business Workflows Using BPEL4WS on the Multi-agent Platform. [Citation Graph (0, 0)][DBLP]
    MATES, 2005, pp:35-46 [Conf]
  11. Yang Li, Binxing Fang, Li Guo
    TTSF: A Novel Two-Tier Spam Filter. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:503-508 [Conf]
  12. Ni Zhang, Binxing Fang, Li Guo
    Techniques of IP Data Management in Network Address Resource platform. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:540-545 [Conf]
  13. Chunyan Liang, Li Guo, Zhaojie Xia, Xiaoxia Li, Zhangyuan Yang
    Dictionary-Based Voting Text Categorization in a Chemistry-Focused Search Engine. [Citation Graph (0, 0)][DBLP]
    WISE, 2005, pp:601-602 [Conf]
  14. Ying Wang, Shuo Bai, Jianlong Tan, Li Guo
    Efficient Filtering Query Indexing in Data Stream. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2006, pp:1-12 [Conf]
  15. Yang Li, Binxing Fang, Li Guo, Shen Wang
    Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach. [Citation Graph (0, 0)][DBLP]
    ICNS, 2006, pp:86- [Conf]
  16. Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo
    Building Scale-Free Overlay Mix Networks with Small-World Properties. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:529-534 [Conf]
  17. Li Guo
    Ascending Chain Conditions in Free Baxter Algebras. [Citation Graph (0, 0)][DBLP]
    IJAC, 2002, v:12, n:4, pp:601-622 [Journal]
  18. Chunyan Liang, Li Guo, Zhaojie Xia, Feng-Guang Nie, Xiaoxia Li, Liang Su, Zhangyuan Yang
    Dictionary-based text categorization of chemical web pages. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2006, v:42, n:4, pp:1017-1029 [Journal]
  19. Zhihong Xu, Qian Dong, Xinjian Yan, Xiaoxia Li, Li Guo
    The knowledge-based organic physical property data system (KB-OPDS). [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1990, v:30, n:3, pp:256-263 [Journal]
  20. Ming Fang, Yantao Tian, Li Guo
    Fault diagnosis of nonlinear system based on generalized observer. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:2, pp:1131-1137 [Journal]
  21. Yang Li, Binxing Fang, Li Guo
    A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:1286-1292 [Conf]
  22. Kun Wang, Liqun Gao, Zhaoyu Pian, Li Guo, Jianhua Wu
    Edge Detection Combined Entropy Threshold and Self-Organizing Map (SOM). [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:931-937 [Conf]
  23. Zhaoyu Pian, Liqun Gao, Kun Wang, Li Guo, Jianhua Wu
    Edge Enhancement Post-processing Using Hopfield Neural Net. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:846-852 [Conf]
  24. Yang Li, Binxing Fang, Li Guo, You Chen
    TCM-KNN Algorithm for Supervised Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:141-151 [Conf]

  25. Enabling QoS for Service-Oriented Workflow on GRID. [Citation Graph (, )][DBLP]

  26. A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration Coefficients. [Citation Graph (, )][DBLP]

  27. Acceleration of MELP Algorithm Using DSP Coprocessor with Extended Registers. [Citation Graph (, )][DBLP]

  28. Quantum and biogeography based optimization for a class of combinatorial optimization. [Citation Graph (, )][DBLP]

  29. Mining Data Streams with Labeled and Unlabeled Training Examples. [Citation Graph (, )][DBLP]

  30. Towards an Open, Self-Adaptive and P2P Based e-Market Infrastructure. [Citation Graph (, )][DBLP]

  31. Contribution of airborne full-waveform lidar and image data for urban scene classification. [Citation Graph (, )][DBLP]

  32. One New In-Operation Self-Testability Mechanism Designed for SoC Microchips following IEEE STD 1500. [Citation Graph (, )][DBLP]

  33. LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems. [Citation Graph (, )][DBLP]

  34. UBSF: A novel online URL-Based Spam Filter. [Citation Graph (, )][DBLP]

  35. Stitching Video from Webcams. [Citation Graph (, )][DBLP]

  36. An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. [Citation Graph (, )][DBLP]

  37. Inferring Protocol State Machine from Real-World Trace. [Citation Graph (, )][DBLP]

  38. TCM-KNN scheme for network anomaly detection using feature-based optimizations. [Citation Graph (, )][DBLP]

  39. Intelligent Agents in the Service-Oriented World - An Industrial Experience Report. [Citation Graph (, )][DBLP]

  40. Incremental web page template detection. [Citation Graph (, )][DBLP]

  41. Towards lightweight and efficient DDOS attacks detection for web server. [Citation Graph (, )][DBLP]

  42. Enabling Virtual Markets on an Economically Scalable Multi-agent Platform. [Citation Graph (, )][DBLP]

  43. A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter. [Citation Graph (, )][DBLP]

  44. A traffic-classified technique for filtering spam from bulk delivery E-mails. [Citation Graph (, )][DBLP]

  45. Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. [Citation Graph (, )][DBLP]

  46. The ArguGRID Platform: An Overview. [Citation Graph (, )][DBLP]

  47. The GridEcon Platform: A Business Scenario Testbed for Commercial Cloud Services. [Citation Graph (, )][DBLP]

  48. Load Balancing for Flow-Based Parallel Processing Systems in CMP Architecture. [Citation Graph (, )][DBLP]

  49. Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism. [Citation Graph (, )][DBLP]

  50. Automatic Audio Classification and Segmentation for Video Content Analysis. [Citation Graph (, )][DBLP]

  51. Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture. [Citation Graph (, )][DBLP]

  52. Simulation Analysis of Probabilistic Timing Covert Channels. [Citation Graph (, )][DBLP]

  53. An Array Computer for Low-and Intermediate-Level Image Processing. [Citation Graph (, )][DBLP]

  54. Application of Data Mining in Psychological Evaluation. [Citation Graph (, )][DBLP]

  55. Matching algorithms and tactics on vector area data based on spatial directional similarity. [Citation Graph (, )][DBLP]

  56. Global expression analysis of miRNA gene cluster and family based on isomiRs from deep sequencing data. [Citation Graph (, )][DBLP]

  57. A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. [Citation Graph (, )][DBLP]

  58. An active learning based TCM-KNN algorithm for supervised network intrusion detection. [Citation Graph (, )][DBLP]

Search in 0.110secs, Finished in 0.112secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002