Search the dblp DataBase
Li Xu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhide Chen , Li Xu Anti-Collusion Anonymous Credentials Scheme. [Citation Graph (0, 0)][DBLP ] CIT, 2006, pp:150- [Conf ] Laurence Tianruo Yang , Li Xu , Man Lin , John P. Quinn A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:428-438 [Conf ] Li Xu , Zhiwei Lin , Ayong Ye Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:1027-1030 [Conf ] Li Xu , David W. Embley Discovering Direct and Indirect Matches for Schema Elements. [Citation Graph (0, 0)][DBLP ] DASFAA, 2003, pp:39-46 [Conf ] David W. Embley , Yiu-Kai Ng , Li Xu Recognizing Ontology-Applicable Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP ] ER, 2001, pp:555-570 [Conf ] Li Xu , David W. Embley , Yihong Ding Combining Declarative and Procedural Knowledge to Automate and Represent Ontology Mapping. [Citation Graph (0, 0)][DBLP ] ER (Workshops), 2006, pp:395-404 [Conf ] Hai Jin , Minghu Zhang , Pengliu Tan , Hanhua Chen , Li Xu Lightweight Real-Time Network Communication Protocol for Commodity Cluster Systems. [Citation Graph (0, 0)][DBLP ] EUC, 2005, pp:1075-1084 [Conf ] Laurence Tianruo Yang , Li Xu , Man Lin , John P. Quinn A Parallel GNFS Algorithm Based on a Reliable Look-Ahead Block Lanczos Method for Integer Factorization. [Citation Graph (0, 0)][DBLP ] EUC, 2006, pp:110-120 [Conf ] Li Xu , Bao-yu Zheng Power Management Based Grid Routing Protocol for IEEE 802.11 Based MANET. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:753-760 [Conf ] Zhiwei Lin , Li Xu , Dajin Wang , Jianliang Gao A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] GPC, 2006, pp:509-516 [Conf ] Laurence Tianruo Yang , Li Xu , Man Lin Integer Factorization by a Parallel GNFS Algorithm for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICESS, 2005, pp:683-695 [Conf ] Liang Chen , Li Xu Collective Behavior of an Anisotropic Swarm Model Based on Unbounded Repulsion in Social Potential Fields. [Citation Graph (0, 0)][DBLP ] ICIC (3), 2006, pp:164-173 [Conf ] Li Xu , Wen-xiang Gu , Xin-mei Zhang Backward-Chaining Flexible Planning. [Citation Graph (0, 0)][DBLP ] ICMLC, 2005, pp:1-10 [Conf ] Li Xu , Yuan F. Zheng Real-Time Motion Planning for Personal Robots Using Primitive Motions. [Citation Graph (0, 0)][DBLP ] ICRA, 2000, pp:1414-1419 [Conf ] Li Xu , Yuan F. Zheng Reflexive Behavior of Personal Robots Using Primitive Motions. [Citation Graph (0, 0)][DBLP ] ICRA, 1999, pp:3189-0 [Conf ] Wang Ying , Chen Wei , Li Xu , Cheng Bing Degenerated Primer Design to Amplify the Heavy Chain Variable Region from Immunoglobulin cDNA. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:64-68 [Conf ] Li Xu , Chunping Li Multi-objective Parameters Selection for SVM Classification Using NSGA-II. [Citation Graph (0, 0)][DBLP ] Industrial Conference on Data Mining, 2006, pp:365-376 [Conf ] Zhiping Lin , Li Xu , Qinghe Wu Design of multidimensional filter banks using Grobner bases: a survey. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2004, pp:277-280 [Conf ] Yegui Xiao , Liying Ma , Khashayar Khorasani , Akira Ikuta , Li Xu A filtered-X RLS based narrowband active noise control system in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP ] ISCAS (1), 2005, pp:260-263 [Conf ] Yegui Xiao , Liying Ma , Rabab Kreidieh Ward , Li Xu Fast RLS Fourier analyzers in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2004, pp:497-500 [Conf ] Yegui Xiao , Rabab Kreidieh Ward , Li Xu A new LMS-based Fourier analyzer in the presence of frequency mismatch. [Citation Graph (0, 0)][DBLP ] ISCAS (4), 2003, pp:369-372 [Conf ] Li Xu , Huijin Fan , Zhiping Lin , Yegui Xiao , Yoshihisa Anazawa A constructive procedure for multidimensional realization and LFR uncertainty modelling. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2005, pp:2044-2047 [Conf ] Li Xu , Lianku Wu , Qinghe Wu , Zhiping Lin , Yegui Xiao Reduced-order realization of Fornasini-Marchesini model for 2D systems. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2004, pp:289-292 [Conf ] Zhiping Lin , Jiang Qian Ying , Li Xu Further results on primitive factorizations for nD polynomial matrices. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2001, pp:373-376 [Conf ] Li Xu , O. Saito , Jiang Qian Ying 2D feedback system design: the tracking and disturbance rejection problems. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 1999, pp:13-16 [Conf ] Li Xu , David W. Embley Combining the Best of Global-as-View and Local-as-View for Data Integration. [Citation Graph (0, 0)][DBLP ] ISTA, 2004, pp:123-136 [Conf ] Keith D. Cooper , Li Xu An efficient static analysis algorithm to detect redundant memory operations. [Citation Graph (0, 0)][DBLP ] MSP/ISMM, 2002, pp:97-107 [Conf ] Azzedine Boukerche , Khalil El-Khatib , Li Xu , Larry Korba SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:618-624 [Conf ] Keith D. Cooper , Li Xu Memory Redundancy Elimination to Improve Application Energy Efficiency. [Citation Graph (0, 0)][DBLP ] LCPC, 2003, pp:288-305 [Conf ] Li Xu , Laurence Tianruo Yang , Man Lin Factoring large integers using parallel general number field sieve. [Citation Graph (0, 0)][DBLP ] PDPTA, 2005, pp:1017-1023 [Conf ] Azzedine Boukerche , Khalil El-Khatib , Li Xu , Larry Korba A novel solution for achieving anonymity in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] PE-WASUN, 2004, pp:30-38 [Conf ] Willem de Bruijn , Asia Slowinska , Kees van Reeuwijk , Tomas Hruby , Li Xu , Herbert Bos SafeCard: A Gigabit IPS on the Network Card. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:311-330 [Conf ] Li Xu RobotStudio: a modern IDE-based approach to reality computing. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2007, pp:440-444 [Conf ] Li Xu , Fred G. Martin Chirp on crickets: teaching compilers using an embedded robot controller. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2006, pp:82-86 [Conf ] Li Xu , Bao-yu Zheng , Zhen Yang Power and Mobility-aware Adaptive Dynamic Source Routing in MANET. [Citation Graph (0, 0)][DBLP ] SNPD, 2004, pp:174-180 [Conf ] David W. Embley , Li Xu Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP ] WebDB (Selected Papers), 2000, pp:256-274 [Conf ] David W. Embley , Li Xu Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents. [Citation Graph (0, 0)][DBLP ] WebDB (Informal Proceedings), 2000, pp:123-128 [Conf ] David W. Embley , David Jackman , Li Xu Multifaceted Exploitation of Metadata for Attribute Match Discovery in Information Integration. [Citation Graph (0, 0)][DBLP ] Workshop on Information Integration on the Web, 2001, pp:110-117 [Conf ] Li Xu , Yuan F. Zheng Moving Personal Robots in Real-Time Using Primitive Motions. [Citation Graph (0, 0)][DBLP ] Auton. Robots, 2001, v:10, n:2, pp:175-183 [Journal ] Azzedine Boukerche , Khalil El-Khatib , Li Xu , Larry Korba An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:10, pp:1193-1203 [Journal ] Li Xu , David W. Embley A composite approach to automating direct and indirect schema mappings. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2006, v:31, n:8, pp:697-732 [Journal ] David W. Embley , David Jackman , Li Xu Atribute Match Discovery in Information Integration: Exploiting Multiple Facets of Metadata. [Citation Graph (0, 0)][DBLP ] J. Braz. Comp. Soc., 2002, v:8, n:2, pp:32-43 [Journal ] Jiang Qian Ying , Li Xu , Zhiping Lin A Computational Method for Determining Strong Stabilizability of n-D Systems. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 1999, v:27, n:5, pp:479-499 [Journal ] Azzedine Boukerche , Khalil El-Khatib , Li Xu , Larry Korba Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2006, v:63, n:11, pp:1094-1109 [Journal ] David W. Embley , Li Xu , Yihong Ding Automatic Direct and Indirect Schema Mapping: Experiences and Lessons Learned. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2004, v:33, n:4, pp:14-19 [Journal ] Fuchun Guo , Zhide Chen , Yi Mu , Li Xu , Shengyuan Zhang Secure and Efficient Trust Negotiation. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:374-384 [Conf ] Zhiping Lin , Li Xu , Yoshihisa Anazawa Revisiting the Absolutely Minimal Realization for Two-dimensional Digital Filters. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:597-600 [Conf ] Zhiping Lin , M. S. Boudellioua , Li Xu On the equivalence and factorization of multivariate polynomial matrices. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Rohini K. Srihari , Li Xu , Tushar Saxena Use of ranked cross document evidence trails for hypothesis generation. [Citation Graph (0, 0)][DBLP ] KDD, 2007, pp:677-686 [Conf ] Yihong Ding , Deryle W. Lonsdale , David W. Embley , Martin Hepp , Li Xu Generating Ontologies Via Language Components and Ontology Reuse. [Citation Graph (0, 0)][DBLP ] NLDB, 2007, pp:131-142 [Conf ] Yong-Bing Shi , Yin-Cai Tang , Hua Tang , Ling-Liu Gong , Li Xu Two Classes of Simple MCD Graphs. [Citation Graph (0, 0)][DBLP ] CJCDGCGT, 2005, pp:177-188 [Conf ] Azzedine Boukerche , Li Xu , Khalil El-Khatib Trust-based security for wireless ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2413-2427 [Journal ] Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network. [Citation Graph (, )][DBLP ] An Improved Immune-Based Multi-modal Function Optimization Algorithm. [Citation Graph (, )][DBLP ] Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP ] A Segmentation Based Variational Model for Accurate Optical Flow Estimation. [Citation Graph (, )][DBLP ] Stereo Matching: An Outlier Confidence Approach. [Citation Graph (, )][DBLP ] Regional Ecological Environment Spatial Data Mining Based on GIS and RS: A Case Study in Zhangjiajie, China. [Citation Graph (, )][DBLP ] A Hybrid Selective Classifier for Categorizing Incomplete Data. [Citation Graph (, )][DBLP ] Face Recognition Based on Two Dimension Double PCA and Affinity Propagation. [Citation Graph (, )][DBLP ] QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels. [Citation Graph (, )][DBLP ] The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. [Citation Graph (, )][DBLP ] Language engineering in the context of a popular, inexpensive robot platform. [Citation Graph (, )][DBLP ] An Architecture for Software Systems with time constraints. [Citation Graph (, )][DBLP ] A new group rekeying scheme based on t-packing designs for ad hoc networks. [Citation Graph (, )][DBLP ] Research and Analysis of Topology Control in NS-2 for Ad-hoc Wireless Network. [Citation Graph (, )][DBLP ] Cluster Analysis Based on Spatial Feature Selecting in Spatial Data Mining. [Citation Graph (, )][DBLP ] A Steganographic Algorithm for JPEG2000 Image. [Citation Graph (, )][DBLP ] Hierarchical Identity-Based Online/Offline Encryption. [Citation Graph (, )][DBLP ] Further results on realization of 2D filters by Fornasini-Marchesini model. [Citation Graph (, )][DBLP ] Routing Protocols Based on Double Auction for Ad Hoc Networks. [Citation Graph (, )][DBLP ] A New Mollification Method for Numerical Differentiation of 2D Periodic Functions. [Citation Graph (, )][DBLP ] A New Security Mechanism Based on SIP in Wireless LAN-3G Integration. [Citation Graph (, )][DBLP ] Online Real Boosting for Object Tracking Under Severe Appearance Changes and Occlusion. [Citation Graph (, )][DBLP ] RFID System Security Using Identity-Based Cryptography. [Citation Graph (, )][DBLP ] How to Construct a Divisible Online/Offline Signature. [Citation Graph (, )][DBLP ] Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427]. [Citation Graph (, )][DBLP ] Reusing ontologies and language components for ontology generation. [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.023secs