The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tong Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shuguang Gong, Huawei Li, Yufeng Xu, Tong Liu, Xiaowei Li
    Design of an efficient memory subsystem for network processor. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:897-900 [Conf]
  2. Tong Liu, Pengwei Hao, Chao Zhang
    Fingerprint Singular Points Detection and Direction Estimation with a "T" Shape Model. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2005, pp:201-207 [Conf]
  3. Chokchai Leangsuksun, Lixin Shen, Tong Liu, Hertong Song, Stephen L. Scott
    Availability Prediction and Modeling of High Availability OSCAR Cluster. [Citation Graph (0, 0)][DBLP]
    CLUSTER, 2003, pp:380-386 [Conf]
  4. Tong Liu, Fabrizio Lombardi
    On Soft Switch Programming for Reconfigurable Array Systems. [Citation Graph (0, 0)][DBLP]
    DFT, 1994, pp:203-211 [Conf]
  5. Tong Liu, Wei-Kang Huang, Fabrizio Lombardi
    Testing of Uncustomized Segmented Channel Field Programmable Gate Arrays. [Citation Graph (0, 0)][DBLP]
    FPGA, 1995, pp:125-131 [Conf]
  6. Tong Liu, Guocai Zhu, Chao Zhang, Pengwei Hao
    Fingerprint indexing based on singular point correlation. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:293-296 [Conf]
  7. Tong Liu, Wei-Kang Huang, Fabrizio Lombardi, Laxmi N. Bhuyan
    A Submesh Allocation Scheme for Mesh-Connected Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1995, pp:159-163 [Conf]
  8. Qiang Fu, X. Q. Ding, Tong Liu, Yan Jiang, Zheng Ren
    A Novel Segmentation and Recognition Algorithm for Chinese Handwritten Address Character Strings. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:974-977 [Conf]
  9. Tong Liu, Chao Zhang, Pengwei Hao
    Fingerprint Reference Point Detection Based on Local Axial Symmetry. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:1050-1053 [Conf]
  10. Tong Liu, Bertil Schmidt
    Parallel RNA Sequence-Structure Alignment. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  11. Chokchai Leangsuksun, Tong Liu, Yudan Liu, Stephen L. Scott, Richard Libby, Ibrahim Haddad
    Highly Reliable Linux HPC Clusters: Self-Awareness Approach. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:217-222 [Conf]
  12. Dongmei Sun, Qiang Li, Tong Liu, Bing He, ZhengDing Qiu
    A Secure Multimodal Biometric Verification Scheme. [Citation Graph (0, 0)][DBLP]
    IWBRS, 2005, pp:233-240 [Conf]
  13. Tong Liu, Shih-Lien Lu
    Performance improvement with circuit-level speculation. [Citation Graph (0, 0)][DBLP]
    MICRO, 2000, pp:348-355 [Conf]
  14. Brian Whitworth, Aldo de Moor, Tong Liu
    Towards a Theory of Online Social Rights. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:247-256 [Conf]
  15. Chokchai Leangsuksun, Lixin Shen, Tong Liu, Hertong Song, Stephen L. Scott
    Dependability Prediction of High Availability OSCAR Cluster Server. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2003, pp:227-230 [Conf]
  16. Philip E. Bourne, C. K. J. Allerston, Werner G. Krebs, Wilfred W. Li, Ilya N. Shindyalov, Adam Godzik, Iddo Friedberg, Tong Liu, David L. Wild, Seungwoo Hwang, Zoubin Ghahramani, Li Chen, John D. Westbrook
    The Status of Structural Genomics Defined Through the Analysis of Current Targets and Structures. [Citation Graph (0, 0)][DBLP]
    Pacific Symposium on Biocomputing, 2004, pp:375-386 [Conf]
  17. Tong Liu, Xiaoqing Ding, Qiang Fu, Zheng Ren
    A Fast Algorithm of Address Lines Extraction on Complex Chinese Mail Pieces. [Citation Graph (0, 0)][DBLP]
    SPPRA, 2006, pp:38-43 [Conf]
  18. Yi Wang, Kunmi Otitoju, Tong Liu, Sijung Kim, Doug A. Bowman
    Evaluating the effects of real world distraction on user performance in virtual environments. [Citation Graph (0, 0)][DBLP]
    VRST, 2006, pp:19-26 [Conf]
  19. Tong Liu, Fabrizio Lombardi, José Salinas
    Diagnosis of interconnects and FPICs using a structured walking-1 approach. [Citation Graph (0, 0)][DBLP]
    VTS, 1995, pp:256-261 [Conf]
  20. Tong Liu, Bertil Schmidt
    Parallel RNA secondary structure prediction using stochastic context-free grammars. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2005, v:17, n:14, pp:1669-1685 [Journal]
  21. Chokchai Leangsuksun, Lixin Shen, Tong Liu, Stephen L. Scott
    Achieving high availability and performance computing with an HA-OSCAR cluster. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2005, v:21, n:4, pp:597-606 [Journal]
  22. Tong Liu, Wei-Kang Huang, Fred J. Meyer, Fabrizio Lombardi
    Testing and testable designs for one-time programmable FPGAs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2000, v:19, n:11, pp:1370-1375 [Journal]
  23. Tong Liu, Chao Zhang, Pengwei Hao
    Fingerprint Indexing Based on LAS Registration. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:301-304 [Conf]
  24. Tong Liu, Michael Yu Wang
    Computation of Multi-rigid-body Contact Dynamics. [Citation Graph (0, 0)][DBLP]
    ICRA, 2004, pp:3220-3225 [Conf]
  25. Tong Liu, Huawei Li, Xiaowei Li, Yinhe Han
    Fast Packet Classification using Group Bit Vector. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  26. Tong Liu, Xiao-Tao Chen, Fred J. Meyer, Fabrizio Lombardi
    Test generation and scheduling for layout-based detection of bridge faults in interconnects. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 1999, v:7, n:1, pp:48-55 [Journal]

  27. Intrusion-resilient, DDoS-resistant and agent-assisted network security system. [Citation Graph (, )][DBLP]


  28. Scheduling strategies for HPC as a service (HPCaaS). [Citation Graph (, )][DBLP]


  29. Passive force analysis with elastic contacts for fixturing and grasping. [Citation Graph (, )][DBLP]


  30. Research on Data Protection System in Computer Network. [Citation Graph (, )][DBLP]


  31. Research on File Content Tamper-proofing System for Distribution Environment. [Citation Graph (, )][DBLP]


  32. Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). [Citation Graph (, )][DBLP]


  33. A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. [Citation Graph (, )][DBLP]


  34. Cognitive experiment based on the landmark of determine directions: Take haidian District in Beijing for example. [Citation Graph (, )][DBLP]


  35. Channel E-mail: A Sociotechnical Response to Spam. [Citation Graph (, )][DBLP]


Search in 0.069secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002