The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Li Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhide Chen, Li Xu
    Anti-Collusion Anonymous Credentials Scheme. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:150- [Conf]
  2. Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn
    A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:428-438 [Conf]
  3. Li Xu, Zhiwei Lin, Ayong Ye
    Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:1027-1030 [Conf]
  4. Li Xu, David W. Embley
    Discovering Direct and Indirect Matches for Schema Elements. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2003, pp:39-46 [Conf]
  5. David W. Embley, Yiu-Kai Ng, Li Xu
    Recognizing Ontology-Applicable Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP]
    ER, 2001, pp:555-570 [Conf]
  6. Li Xu, David W. Embley, Yihong Ding
    Combining Declarative and Procedural Knowledge to Automate and Represent Ontology Mapping. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2006, pp:395-404 [Conf]
  7. Hai Jin, Minghu Zhang, Pengliu Tan, Hanhua Chen, Li Xu
    Lightweight Real-Time Network Communication Protocol for Commodity Cluster Systems. [Citation Graph (0, 0)][DBLP]
    EUC, 2005, pp:1075-1084 [Conf]
  8. Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn
    A Parallel GNFS Algorithm Based on a Reliable Look-Ahead Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP]
    EUC, 2006, pp:110-120 [Conf]
  9. Li Xu, Bao-yu Zheng
    Power Management Based Grid Routing Protocol for IEEE 802.11 Based MANET. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:753-760 [Conf]
  10. Zhiwei Lin, Li Xu, Dajin Wang, Jianliang Gao
    A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    GPC, 2006, pp:509-516 [Conf]
  11. Laurence Tianruo Yang, Li Xu, Man Lin
    Integer Factorization by a Parallel GNFS Algorithm for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICESS, 2005, pp:683-695 [Conf]
  12. Liang Chen, Li Xu
    Collective Behavior of an Anisotropic Swarm Model Based on Unbounded Repulsion in Social Potential Fields. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:164-173 [Conf]
  13. Li Xu, Wen-xiang Gu, Xin-mei Zhang
    Backward-Chaining Flexible Planning. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:1-10 [Conf]
  14. Li Xu, Yuan F. Zheng
    Real-Time Motion Planning for Personal Robots Using Primitive Motions. [Citation Graph (0, 0)][DBLP]
    ICRA, 2000, pp:1414-1419 [Conf]
  15. Li Xu, Yuan F. Zheng
    Reflexive Behavior of Personal Robots Using Primitive Motions. [Citation Graph (0, 0)][DBLP]
    ICRA, 1999, pp:3189-0 [Conf]
  16. Wang Ying, Chen Wei, Li Xu, Cheng Bing
    Degenerated Primer Design to Amplify the Heavy Chain Variable Region from Immunoglobulin cDNA. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:64-68 [Conf]
  17. Li Xu, Chunping Li
    Multi-objective Parameters Selection for SVM Classification Using NSGA-II. [Citation Graph (0, 0)][DBLP]
    Industrial Conference on Data Mining, 2006, pp:365-376 [Conf]
  18. Zhiping Lin, Li Xu, Qinghe Wu
    Design of multidimensional filter banks using Grobner bases: a survey. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2004, pp:277-280 [Conf]
  19. Yegui Xiao, Liying Ma, Khashayar Khorasani, Akira Ikuta, Li Xu
    A filtered-X RLS based narrowband active noise control system in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP]
    ISCAS (1), 2005, pp:260-263 [Conf]
  20. Yegui Xiao, Liying Ma, Rabab Kreidieh Ward, Li Xu
    Fast RLS Fourier analyzers in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2004, pp:497-500 [Conf]
  21. Yegui Xiao, Rabab Kreidieh Ward, Li Xu
    A new LMS-based Fourier analyzer in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP]
    ISCAS (4), 2003, pp:369-372 [Conf]
  22. Li Xu, Huijin Fan, Zhiping Lin, Yegui Xiao, Yoshihisa Anazawa
    A constructive procedure for multidimensional realization and LFR uncertainty modelling. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2044-2047 [Conf]
  23. Li Xu, Lianku Wu, Qinghe Wu, Zhiping Lin, Yegui Xiao
    Reduced-order realization of Fornasini-Marchesini model for 2D systems. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2004, pp:289-292 [Conf]
  24. Zhiping Lin, Jiang Qian Ying, Li Xu
    Further results on primitive factorizations for nD polynomial matrices. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2001, pp:373-376 [Conf]
  25. Li Xu, O. Saito, Jiang Qian Ying
    2D feedback system design: the tracking and disturbance rejection problems. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 1999, pp:13-16 [Conf]
  26. Li Xu, David W. Embley
    Combining the Best of Global-as-View and Local-as-View for Data Integration. [Citation Graph (0, 0)][DBLP]
    ISTA, 2004, pp:123-136 [Conf]
  27. Keith D. Cooper, Li Xu
    An efficient static analysis algorithm to detect redundant memory operations. [Citation Graph (0, 0)][DBLP]
    MSP/ISMM, 2002, pp:97-107 [Conf]
  28. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:618-624 [Conf]
  29. Keith D. Cooper, Li Xu
    Memory Redundancy Elimination to Improve Application Energy Efficiency. [Citation Graph (0, 0)][DBLP]
    LCPC, 2003, pp:288-305 [Conf]
  30. Li Xu, Laurence Tianruo Yang, Man Lin
    Factoring large integers using parallel general number field sieve. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:1017-1023 [Conf]
  31. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    A novel solution for achieving anonymity in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2004, pp:30-38 [Conf]
  32. Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos
    SafeCard: A Gigabit IPS on the Network Card. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:311-330 [Conf]
  33. Li Xu
    RobotStudio: a modern IDE-based approach to reality computing. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:440-444 [Conf]
  34. Li Xu, Fred G. Martin
    Chirp on crickets: teaching compilers using an embedded robot controller. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2006, pp:82-86 [Conf]
  35. Li Xu, Bao-yu Zheng, Zhen Yang
    Power and Mobility-aware Adaptive Dynamic Source Routing in MANET. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:174-180 [Conf]
  36. David W. Embley, Li Xu
    Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP]
    WebDB (Selected Papers), 2000, pp:256-274 [Conf]
  37. David W. Embley, Li Xu
    Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP]
    WebDB (Informal Proceedings), 2000, pp:123-128 [Conf]
  38. David W. Embley, David Jackman, Li Xu
    Multifaceted Exploitation of Metadata for Attribute Match Discovery in Information Integration. [Citation Graph (0, 0)][DBLP]
    Workshop on Information Integration on the Web, 2001, pp:110-117 [Conf]
  39. Li Xu, Yuan F. Zheng
    Moving Personal Robots in Real-Time Using Primitive Motions. [Citation Graph (0, 0)][DBLP]
    Auton. Robots, 2001, v:10, n:2, pp:175-183 [Journal]
  40. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:10, pp:1193-1203 [Journal]
  41. Li Xu, David W. Embley
    A composite approach to automating direct and indirect schema mappings. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2006, v:31, n:8, pp:697-732 [Journal]
  42. David W. Embley, David Jackman, Li Xu
    Atribute Match Discovery in Information Integration: Exploiting Multiple Facets of Metadata. [Citation Graph (0, 0)][DBLP]
    J. Braz. Comp. Soc., 2002, v:8, n:2, pp:32-43 [Journal]
  43. Jiang Qian Ying, Li Xu, Zhiping Lin
    A Computational Method for Determining Strong Stabilizability of n-D Systems. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1999, v:27, n:5, pp:479-499 [Journal]
  44. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:11, pp:1094-1109 [Journal]
  45. David W. Embley, Li Xu, Yihong Ding
    Automatic Direct and Indirect Schema Mapping: Experiences and Lessons Learned. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:4, pp:14-19 [Journal]
  46. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang
    Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:374-384 [Conf]
  47. Zhiping Lin, Li Xu, Yoshihisa Anazawa
    Revisiting the Absolutely Minimal Realization for Two-dimensional Digital Filters. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:597-600 [Conf]
  48. Zhiping Lin, M. S. Boudellioua, Li Xu
    On the equivalence and factorization of multivariate polynomial matrices. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  49. Rohini K. Srihari, Li Xu, Tushar Saxena
    Use of ranked cross document evidence trails for hypothesis generation. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:677-686 [Conf]
  50. Yihong Ding, Deryle W. Lonsdale, David W. Embley, Martin Hepp, Li Xu
    Generating Ontologies Via Language Components and Ontology Reuse. [Citation Graph (0, 0)][DBLP]
    NLDB, 2007, pp:131-142 [Conf]
  51. Yong-Bing Shi, Yin-Cai Tang, Hua Tang, Ling-Liu Gong, Li Xu
    Two Classes of Simple MCD Graphs. [Citation Graph (0, 0)][DBLP]
    CJCDGCGT, 2005, pp:177-188 [Conf]
  52. Azzedine Boukerche, Li Xu, Khalil El-Khatib
    Trust-based security for wireless ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2413-2427 [Journal]

  53. Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network. [Citation Graph (, )][DBLP]


  54. An Improved Immune-Based Multi-modal Function Optimization Algorithm. [Citation Graph (, )][DBLP]


  55. Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP]


  56. A Segmentation Based Variational Model for Accurate Optical Flow Estimation. [Citation Graph (, )][DBLP]


  57. Stereo Matching: An Outlier Confidence Approach. [Citation Graph (, )][DBLP]


  58. Regional Ecological Environment Spatial Data Mining Based on GIS and RS: A Case Study in Zhangjiajie, China. [Citation Graph (, )][DBLP]


  59. A Hybrid Selective Classifier for Categorizing Incomplete Data. [Citation Graph (, )][DBLP]


  60. Face Recognition Based on Two Dimension Double PCA and Affinity Propagation. [Citation Graph (, )][DBLP]


  61. QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels. [Citation Graph (, )][DBLP]


  62. The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. [Citation Graph (, )][DBLP]


  63. Language engineering in the context of a popular, inexpensive robot platform. [Citation Graph (, )][DBLP]


  64. An Architecture for Software Systems with time constraints. [Citation Graph (, )][DBLP]


  65. A new group rekeying scheme based on t-packing designs for ad hoc networks. [Citation Graph (, )][DBLP]


  66. Research and Analysis of Topology Control in NS-2 for Ad-hoc Wireless Network. [Citation Graph (, )][DBLP]


  67. Cluster Analysis Based on Spatial Feature Selecting in Spatial Data Mining. [Citation Graph (, )][DBLP]


  68. A Steganographic Algorithm for JPEG2000 Image. [Citation Graph (, )][DBLP]


  69. Hierarchical Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP]


  70. Further results on realization of 2D filters by Fornasini-Marchesini model. [Citation Graph (, )][DBLP]


  71. Routing Protocols Based on Double Auction for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  72. A New Mollification Method for Numerical Differentiation of 2D Periodic Functions. [Citation Graph (, )][DBLP]


  73. A New Security Mechanism Based on SIP in Wireless LAN-3G Integration. [Citation Graph (, )][DBLP]


  74. Online Real Boosting for Object Tracking Under Severe Appearance Changes and Occlusion. [Citation Graph (, )][DBLP]


  75. RFID System Security Using Identity-Based Cryptography. [Citation Graph (, )][DBLP]


  76. How to Construct a Divisible Online/Offline Signature. [Citation Graph (, )][DBLP]


  77. Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427]. [Citation Graph (, )][DBLP]


  78. Reusing ontologies and language components for ontology generation. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002