The SCEAS System
Navigation Menu

Search the dblp DataBase


Tao Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chang-Burm Cho, Tao Li
    Complexity-based program phase analysis and classification. [Citation Graph (0, 0)][DBLP]
    PACT, 2006, pp:105-113 [Conf]
  2. Chris H. Q. Ding, Tao Li, Wei Peng
    Nonnegative Matrix Factorization and Probabilistic Latent Semantic Indexing: Equivalence Chi-Square Statistic, and a Hybrid Method. [Citation Graph (0, 0)][DBLP]
    AAAI, 2006, pp:- [Conf]
  3. Tao Li, L. Fang
    Competition and Cooperation in Analog Neural Networks for Combinatorial Optimization (Abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1990, pp:444- [Conf]
  4. Tao Li, Chuanbo Chen
    PromPredictor: A Hybrid Machine Learning System for Recognition and Location of Transcription Start Sites in Human Genome. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:552-563 [Conf]
  5. Tao Li, Ben-Wei Rong
    A Versatile Directory Scheme(Dir2NB+L) and Its Implementation on BY91-1 Multiprocessors System. [Citation Graph (0, 0)][DBLP]
    APDC, 1997, pp:180-185 [Conf]
  6. Tao Li, Lizy Kurian John, Anand Sivasubramaniam, Narayanan Vijaykrishnan, Juan Rubio
    Understanding and improving operating system effects in control flow prediction. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2002, pp:68-80 [Conf]
  7. Tamer Kahveci, Venkatakrishnan Ramaswamy, Han Tao, Tao Li
    Approximate Global Alignment of Sequences. [Citation Graph (0, 0)][DBLP]
    BIBE, 2005, pp:81-88 [Conf]
  8. Wei Peng, Tao Li
    IntClust: A Software Package for Clustering Replicated Microarray Data. [Citation Graph (0, 0)][DBLP]
    BIBE, 2006, pp:103-109 [Conf]
  9. Wei Peng, Tao Li, Giri Narasimhan
    Mining the Database of Transcription Binding Sites. [Citation Graph (0, 0)][DBLP]
    BIBE, 2006, pp:61-64 [Conf]
  10. Tao Li, XiaoJie Liu, Hongbin Li
    An Immune-Based Model for Computer Virus Detection. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:59-71 [Conf]
  11. Tao Li, XiaoJie Liu, Hongbin Li
    A New Model for Dynamic Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:72-84 [Conf]
  12. Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu
    An Immune-Based Model for Service Survivability. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:354-363 [Conf]
  13. Tao Li, Mitsunori Ogihara
    Semi-supervised learning for music artists style identification. [Citation Graph (0, 0)][DBLP]
    CIKM, 2004, pp:152-153 [Conf]
  14. Tao Li, Mitsunori Ogihara, Sheng Ma
    On combining multiple clusterings. [Citation Graph (0, 0)][DBLP]
    CIKM, 2004, pp:294-303 [Conf]
  15. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    Efficient multi-way text categorization via generalized discriminant analysis. [Citation Graph (0, 0)][DBLP]
    CIKM, 2003, pp:317-324 [Conf]
  16. Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan
    Clustering Genes Using Gene Expression and Text Literature Data. [Citation Graph (0, 0)][DBLP]
    CSB, 2005, pp:329-340 [Conf]
  17. Tao Li, Shenghuo Zhu, Mitsunori Ogihara, Yinhe Cheng
    Estimating Joint Probabilities from Marginal Ones. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2002, pp:31-41 [Conf]
  18. Shenghuo Zhu, Tao Li, Mitsunori Ogihara
    CoFD : An Algorithm for Non-distance Based Clustering in High Dimensional Spaces. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2002, pp:52-62 [Conf]
  19. Tao Li, Wei Peng
    A Clustering Model Based on Matrix Approximation with Applications to Cluster System Log Files. [Citation Graph (0, 0)][DBLP]
    ECML, 2005, pp:625-632 [Conf]
  20. Zhou Yu, Tao Li, Jindong Zhao, Jingchu Luo
    PGAAS: A prokaryotic genome assembly assistant system. [Citation Graph (0, 0)][DBLP]
    German Conference on Bioinformatics, 2001, pp:45- [Conf]
  21. Tao Li, Ravi Bhargava, Lizy Kurian John
    Rehashable BTB: An Adaptive Branch Target Buffer to Improve the Target Predictability of Java Code. [Citation Graph (0, 0)][DBLP]
    HiPC, 2002, pp:597-608 [Conf]
  22. Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary Jane Irwin, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Tao Li, Lizy Kurian John
    Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach. [Citation Graph (0, 0)][DBLP]
    HPCA, 2002, pp:141-150 [Conf]
  23. Wei Peng, Tao Li, Sheng Ma
    Mining Logs Files for Computing System Management. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:309-310 [Conf]
  24. Jian-Hao Hu, Kwan Lawrence Yeung, Tao Li
    Routing and Re-Routing in a LEO/MEO Two-tier Mobile Satellite Communications System with Inter-Satellite Links. [Citation Graph (0, 0)][DBLP]
    ICC (1), 2000, pp:134-138 [Conf]
  25. Tao Li, Ximeng Guan, Zhiping Yu, Wei Xue
    Computation of Si Nanowire Bandstructures on Parallel Machines Through Domain Decomposition. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:250-257 [Conf]
  26. Tao Li, Sheng Ma
    Mining Temporal Patterns Without Predefined Time Windows. [Citation Graph (0, 0)][DBLP]
    ICDM, 2004, pp:451-454 [Conf]
  27. Qi Li, Tao Li, Shenghuo Zhu, Chandra Kambhamettu
    Improving Medical/Biological Data Classification Performance by Wavelet Preprocessing. [Citation Graph (0, 0)][DBLP]
    ICDM, 2002, pp:657-660 [Conf]
  28. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    Using Discriminant Analysis for Multi-class Classification. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:589-592 [Conf]
  29. Tao Li, Chris H. Q. Ding
    The Relationships Among Various Nonnegative Matrix Factorization Methods for Clustering. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:362-371 [Conf]
  30. Chris H. Q. Ding, Ya Zhang, Tao Li, Stephen R. Holbrook
    Biclustering Protein Complex Interactions with a Biclique Finding Algorithm. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:178-187 [Conf]
  31. Fei Wang, Sheng Ma, Liuzhong Yang, Tao Li
    Recommendation on Item Graphs. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:1119-1123 [Conf]
  32. Tao Li, Mitsunori Ogihara, Shenghuo Zhu
    Integrating Features from Different Sources for Music Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:372-381 [Conf]
  33. Yue Li, Tao Li
    Bioinformatics on Embedded Systems: A Case Study of Computational Biology Applications on VLIW Architecture. [Citation Graph (0, 0)][DBLP]
    ICESS, 2005, pp:16-29 [Conf]
  34. Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu
    Immunity and Mobile Agent Based Grid Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:651-659 [Conf]
  35. Tao Li, Hongbin Li
    A Big-Neuron Based Expert System. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:268-273 [Conf]
  36. Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni
    NASC: A Novel Approach for Spam Classification. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:672-681 [Conf]
  37. Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong
    An Immunity-Based Dynamic Multilayer Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICIC (3), 2006, pp:641-650 [Conf]
  38. Yibin Zheng, Tao Li, Peter C. Doerschuk, John E. Johnson
    Low Resolution 3D Reconstructions of Viruses from X-Ray Crystal Diffraction Data. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1998, pp:358-360 [Conf]
  39. Tao Li, Sheng Ma, Mitsunori Ogihara
    Entropy-based criterion in categorical clustering. [Citation Graph (0, 0)][DBLP]
    ICML, 2004, pp:- [Conf]
  40. Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu
    Grid Intrusion Detection Based on Immune Agent. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:73-82 [Conf]
  41. Tao Li, Juling Ding, XiaoJie Liu, Pin Yang
    A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:804-813 [Conf]
  42. Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao
    Family Gene Based Grid Trust Model. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:110-113 [Conf]
  43. Chunlin Xu, Tao Li, Xuemei Huang, Yaping Jiang
    A Weather Forecast System Based on Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:800-803 [Conf]
  44. Tao Li, Lizy Kurian John, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Jyotsna Sabarinathan, Anupama Murthy
    Using complete system simulation to characterize SPECjvm98 benchmarks. [Citation Graph (0, 0)][DBLP]
    ICS, 2000, pp:22-33 [Conf]
  45. Tao Li, Chengliang Zhang, Shenghuo Zhu
    Empirical Studies on Multi-label Classification. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:86-92 [Conf]
  46. Wei Peng, Tao Li
    Interval Data Clustering with Applications. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:355-362 [Conf]
  47. Tao Li, Chris D. Marlin
    Algorithms for the Parallel Execution of Rule-Based Expert Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:331-336 [Conf]
  48. Mei Huang, Jiliu Zhou, Kun He, Shuhua Xiong, Tao Li
    Local Feature Based Face Recognition. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:274-277 [Conf]
  49. Jianhua Zhang, Tao Li, Nan Zhang, Diangang Wang, SunJun Liu
    An Immune Evolutionary Algorithm Based on Chaos Mutation. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:925-929 [Conf]
  50. Tao Li, Lizy Kurian John
    Routine based OS-aware microprocessor resource adaptation for run-time operating system power saving. [Citation Graph (0, 0)][DBLP]
    ISLPED, 2003, pp:241-246 [Conf]
  51. Tao Li, Mitsunori Ogihara
    Detecting emotion in music. [Citation Graph (0, 0)][DBLP]
    ISMIR, 2003, pp:- [Conf]
  52. Yanlai Li, Kuanquan Wang, Tao Li
    A Goal Programming Based Approach for Hidden Targets in Layer-by-Layer Algorithm of Multilayer Perceptron Classifiers. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:889-894 [Conf]
  53. Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan
    A Knowledge-Driven Method to Evaluate Multi-source Clustering. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:196-202 [Conf]
  54. Tao Li, Yang Yu, Peng Li, Jingpeng Xu, Xirong Ma, Yulu Yang
    Practical Routing and Torus Assignment for RDT. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:30-36 [Conf]
  55. Tao Li
    A general model for clustering binary data. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:188-197 [Conf]
  56. Chris H. Q. Ding, Tao Li, Wei Peng, Haesun Park
    Orthogonal nonnegative matrix t-factorizations for clustering. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:126-135 [Conf]
  57. Tao Li, Feng Liang, Sheng Ma, Wei Peng
    An integrated framework on mining logs files for computing system management. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:776-781 [Conf]
  58. Tao Li, Chen Ding
    Instruction Balance and Its Relation to Program Energy Consumption. [Citation Graph (0, 0)][DBLP]
    LCPC, 2001, pp:71-85 [Conf]
  59. Tao Li, Lizy Kurian John, Robert H. Bell Jr.
    Modeling and Evaluation of Control Flow Prediction Schemes Using Complete System Simulation and Java Workloads. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:391-400 [Conf]
  60. Yue Li, Tao Li, Tamer Kahveci, José A. B. Fortes
    Workload Characterization of Bioinformatics Applications. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:15-22 [Conf]
  61. Xin Fu, James Poe, Tao Li, José A. B. Fortes
    Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2006, pp:147-155 [Conf]
  62. Tao Li, Mitsunori Ogihara
    Music artist style identification by semi-supervised learning from both lyrics and content. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:364-367 [Conf]
  63. Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun
    Immunity and Mobile Agent Based Intrusion Detection for Grid. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:187-198 [Conf]
  64. Ji Lu, Tao Li, Xun Gong
    Parameter Evolution for Quality of Service in Multimedia Networking. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:233-244 [Conf]
  65. Qi Li, Chris Brown, Chandra Kambhamettu, Tao Li, Shenghuo Zhu
    A Framework of Individually-Focused Teleconferencing (IFT) via an Efficient 3D Reprojection Technique. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:951-955 [Conf]
  66. Tao Li, Shenghuo Zhu, Qi Li, Mitsunori Ogihara
    Gene Functional Classification by Semisupervised Learning from Heterogeneous Data. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:78-82 [Conf]
  67. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    A New Distributed Data Mining Model Based on Similarity. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:432-436 [Conf]
  68. Tao Li
    Hierarchical Document Classification Using Automatically Generated Hierarchy. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  69. Tao Li
    On Clustering Binary Data. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  70. Tao Li, Sheng Ma
    IFD: Iterative Feature and Data Clustering. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]
  71. SunJun Liu, Tao Li, Diangang Wang, Kui Zhao, Xun Gong, XiaoQing Hu, Chun Xu, Gang Liang
    Immune Multi-agent Active Defense Model for Network Intrusion. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:104-111 [Conf]
  72. SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang
    Immune-Based Dynamic Intrusion Response Model. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:96-103 [Conf]
  73. Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang
    An Immune Mobile Agent Based Grid Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    SEAL, 2006, pp:112-119 [Conf]
  74. Chris H. Q. Ding, Tao Li, Wei Peng
    NMF and PLSI: equivalence and a hybrid algorithm. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2006, pp:641-642 [Conf]
  75. Tao Li, Sheng Ma, Mitsunori Ogihara
    Document clustering via adaptive subspace iteration. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2004, pp:218-225 [Conf]
  76. Tao Li, Mitsunori Ogihara, Qi Li
    A comparative study on content-based music genre classification. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2003, pp:282-289 [Conf]
  77. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    Topic hierarchy generation via linear discriminant projection. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2003, pp:421-422 [Conf]
  78. Ramakrishna Varadarajan, Vagelis Hristidis, Tao Li
    Searching the web using composed pages. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2006, pp:713-714 [Conf]
  79. Tao Li, Lizy Kurian John
    Run-time modeling and estimation of operating system power consumption. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:160-171 [Conf]
  80. Bin Xu, Tao Li, Zhifeng Gu, Gang Wu
    SWSDS: Quick Web Service Discovery and Composition in SEWSIP. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:71- [Conf]
  81. Tao Li, Luyuan Fang
    CODAR: General purpose design tool for rule-based engineering expert systems. [Citation Graph (0, 0)][DBLP]
    AI in Engineering, 1987, v:2, n:2, pp:76-81 [Journal]
  82. Ning Wei, Bing Zhang, Tao Li, Abdul Fattah, Miyuki Yamamoto
    Holistic Approach for Problem Improvement in Health Education: A Human Centred Basis. A Case Study on AIDS Prevention and Control at a Chinese Medical School. [Citation Graph (0, 0)][DBLP]
    AI Soc., 1998, v:12, n:4, pp:264-286 [Journal]
  83. Tao Li, Chengliang Zhang, Mitsunori Ogihara
    A comparative study of feature selection and multiclass classification methods for tissue classification based on gene expression. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2004, v:20, n:15, pp:2429-2437 [Journal]
  84. Zhou Yu, Tao Li, Jindong Zhao, Jingchu Luo
    PGAAS: a prokaryotic genome assembly assistant system. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2002, v:18, n:5, pp:661-665 [Journal]
  85. Shaosheng Zhou, Tao Li
    Robust stabilization for delayed discrete-time fuzzy systems via basis-dependent Lyapunov-Krasovskii function. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2005, v:151, n:1, pp:139-153 [Journal]
  86. Tao Li, Mitsunori Ogihara, Shenghuo Zhu
    Association-based similarity testing and its applications. [Citation Graph (0, 0)][DBLP]
    Intell. Data Anal., 2003, v:7, n:3, pp:209-232 [Journal]
  87. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    Algorithms for clustering high dimensional and distributed data. [Citation Graph (0, 0)][DBLP]
    Intell. Data Anal., 2003, v:7, n:4, pp:305-326 [Journal]
  88. Luyuan Fang, Tao Li
    Design of Competition-Based Neural Networks for Combinatorial Optimization. [Citation Graph (0, 0)][DBLP]
    Int. J. Neural Syst., 1990, v:1, n:3, pp:221-235 [Journal]
  89. Yun Peng, James A. Reggia, Tao Li
    A Connectionist Approach to Vertex Covering Problems. [Citation Graph (0, 0)][DBLP]
    Int. J. Neural Syst., 1992, v:3, n:1, pp:43-56 [Journal]
  90. Tao Li, Luyuan Fang, Ken Q-Q. Li
    Hierarchical classification and vector quantization with neural trees. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 1993, v:5, n:2, pp:119-139 [Journal]
  91. Tao Li, Mitsunori Ogihara
    Semisupervised learning from different information sources. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2005, v:7, n:3, pp:289-309 [Journal]
  92. Tao Li, Shenghuo Zhu, Mitsunori Ogihara
    Using discriminant analysis for multi-class classification: an experimental investigation. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2006, v:10, n:4, pp:453-472 [Journal]
  93. Tao Li
    A Unified View on Clustering Binary Data. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 2006, v:62, n:3, pp:199-215 [Journal]
  94. Tao Li
    Parallel implementation of rule-based expert systems for interactive applications. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1989, v:10, n:3, pp:309-318 [Journal]
  95. Tao Li, Yuan Y. Tang, Luyuan Fang
    A structure-parameter-adaptive (SPA) neural tree for the recognition of large character set. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1995, v:28, n:3, pp:315-329 [Journal]
  96. Tao Li, Chang-Shing Perng
    KDD-2006 workshop report: Theory and Practice of Temporal Data Mining. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2006, v:8, n:2, pp:96-97 [Journal]
  97. Tao Li, Qi Li, Shenghuo Zhu, Mitsunori Ogihara
    A Survey on Wavelet Applications in Data Mining. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:49-68 [Journal]
  98. Wei Peng, Tao Li, Sheng Ma
    Mining logs files for data-driven system management. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2005, v:7, n:1, pp:44-51 [Journal]
  99. Tao Li
    A Rule-based and Object-Oriented AI Programming Language. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1995, v:30, n:12, pp:17-24 [Journal]
  100. Tao Li, XiaoJie Liu
    An Intelligent Neural Network Programming System (NNPS). [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 2000, v:35, n:3, pp:65-72 [Journal]
  101. Tao Li, XiaoJie Liu
    The Denotational Semantics of NIPL. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 2001, v:36, n:6, pp:28-37 [Journal]
  102. Tao Li, Ravi Bhargava, Lizy Kurian John
    Adapting branch-target buffer to improve the target predictability of java code. [Citation Graph (0, 0)][DBLP]
    TACO, 2005, v:2, n:2, pp:109-130 [Journal]
  103. Tao Li, Lizy Kurian John
    ADir_pNB: A Cost-Effective Way to Implement Full Map Directory-Based Cache Coherence Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2001, v:50, n:9, pp:921-934 [Journal]
  104. Tao Li, Lizy Kurian John, Anand Sivasubramaniam, Narayanan Vijaykrishnan, Juan Rubio
    OS-Aware Branch Prediction: Improving Microprocessor Control Flow Prediction for Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:1, pp:2-17 [Journal]
  105. Jieping Ye, Tao Li, Tao Xiong, Ravi Janardan
    Using Uncorrelated Discriminant Analysis for Tissue Classification with Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Comput. Biology Bioinform., 2004, v:1, n:4, pp:181-190 [Journal]
  106. Tao Li, Mitsunori Ogihara
    Toward intelligent music information retrieval. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:564-574 [Journal]
  107. Guangleng Xiong, Tao Li
    Robust design based on constraint networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2002, v:32, n:5, pp:596-604 [Journal]
  108. Ning Gong, Tao Li
    Role of index bonds in an optimal dynamic asset allocation model with real subsistence consumption. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:174, n:1, pp:710-731 [Journal]
  109. Zhengping Wu, Zhihong Guan, Xianyong Wu, Tao Li
    Consensus Based Formation Control and Trajectory Tracing of Multi-Agent Robot Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Robotic Systems, 2007, v:48, n:3, pp:397-410 [Journal]
  110. Tao Li, Lizy Kurian John
    Operating system power minimization through run-time processor resource adaptation. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2006, v:30, n:4, pp:189-198 [Journal]
  111. Fei Wang, Changshui Zhang, Tao Li
    Clustering with Local and Global Regularization. [Citation Graph (0, 0)][DBLP]
    AAAI, 2007, pp:657-662 [Conf]
  112. Tao Li, Zhiping Yu
    Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage. [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:99-102 [Conf]
  113. Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao
    Artificial Immunity-Based Discovery for Popular Information in WEB Pages. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:166-169 [Conf]
  114. Chris H. Q. Ding, Tao Li
    Adaptive dimension reduction using discriminant analysis and K-means clustering. [Citation Graph (0, 0)][DBLP]
    ICML, 2007, pp:521-528 [Conf]
  115. Qing Zhu, Shumin Fei, Tao Li, Tianping Zhang
    Robust Neural Networks Control for Uncertain Systems with Time-Varying Delays and Sector Bounded Perturbations. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:81-86 [Conf]
  116. Yang Yi, Tao Li, Lei Guo, Hong Wang
    Adaptive Tracking Control for the Output PDFs Based on Dynamic Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:93-101 [Conf]
  117. Tao Li, Dongbin Zhao, Jianqiang Yi
    Application of ADP to Intersection Signal Control. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:374-379 [Conf]
  118. Xianyong Wu, Zhi-Hong Guan, Tao Li
    Chaos Synchronization Between Unified Chaotic System and Genesio System. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:8-15 [Conf]
  119. Wei Peng, Charles Perng, Tao Li, Haixun Wang
    Event summarization for system management. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:1028-1032 [Conf]
  120. Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
    IMDS: intelligent malware detection system. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:1043-1047 [Conf]
  121. Chris H. Q. Ding, Rong Jin, Tao Li, Horst D. Simon
    A learning framework using Green's function and kernel regularization with application to recommender system. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:260-269 [Conf]
  122. Fei Wang, Changshui Zhang, Tao Li
    Regularized clustering for documents. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:95-102 [Conf]
  123. Zhiyuan Chen, Tao Li
    Addressing diverse user preferences in SQL-query-result navigation. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:641-652 [Conf]
  124. Yi-Cheng Zhang, Matus Medo, Jie Ren, Tao Zhou, Tao Li, Fan Yang
    Recommendation model based on opinion diffusion [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  125. Tao Li, Lei Guo, Changyin Sun
    Robust stability for neural networks with time-varying delays and linear fractional uncertainties. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2007, v:71, n:1-3, pp:421-427 [Journal]
  126. Tao Li, Lei Guo, Changyin Sun
    Further result on asymptotic stability criterion of neural networks with time-varying delays. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2007, v:71, n:1-3, pp:439-447 [Journal]
  127. Tao Li, Shumin Fei
    Exponential state estimation for recurrent neural networks with distributed delays. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2007, v:71, n:1-3, pp:428-438 [Journal]
  128. Baoyong Zhang, Shaosheng Zhou, Tao Li
    A new approach to robust and non-fragile Hinfinity control for uncertain fuzzy systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:22, pp:5118-5133 [Journal]

  129. A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech. [Citation Graph (, )][DBLP]

  130. Efficient Heuristic Algorithm for Rapid Custom-Instruction Selection. [Citation Graph (, )][DBLP]

  131. Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures. [Citation Graph (, )][DBLP]

  132. Semi-supervised Classification Using Local and Global Regularization. [Citation Graph (, )][DBLP]

  133. Multi-View Local Learning. [Citation Graph (, )][DBLP]

  134. A Novel Immune Based Approach for Detection of Windows PE Virus. [Citation Graph (, )][DBLP]

  135. Building a Scalable P2P Network with Small Routing Delay. [Citation Graph (, )][DBLP]

  136. Managing multi-core soft-error reliability through utility-driven cross domain optimization. [Citation Graph (, )][DBLP]

  137. Improving Transductive Support Vector Machine by Ensembling. [Citation Graph (, )][DBLP]

  138. Gene Selection via Matrix Factorization. [Citation Graph (, )][DBLP]

  139. A Two-Stage Gene Selection Algorithm by Combining ReliefF and mRMR. [Citation Graph (, )][DBLP]

  140. On the Effectiveness of Constraints Sets in Clustering Genes. [Citation Graph (, )][DBLP]

  141. Fast enumeration of maximal valid subgraphs for custom-instruction identification. [Citation Graph (, )][DBLP]

  142. Diva: a variance-based clustering approach for multi-type relational data. [Citation Graph (, )][DBLP]

  143. Clustering multi-way data via adaptive subspace iteration. [Citation Graph (, )][DBLP]

  144. Semi-supervised metric learning by maximizing constraint margin. [Citation Graph (, )][DBLP]

  145. Integrating clustering and multi-document summarization to improve document understanding. [Citation Graph (, )][DBLP]

  146. Comparative document summarization via discriminative sentence selection. [Citation Graph (, )][DBLP]

  147. Cooperation Controlled Competitive Learning Approach for Data Clustering. [Citation Graph (, )][DBLP]

  148. Beyond the graphs: Semi-parametric semi-supervised discriminant analysis. [Citation Graph (, )][DBLP]

  149. Full-chip leakage analysis in nano-scale technologies: mechanisms, variation sources, and verification. [Citation Graph (, )][DBLP]

  150. Labeling Nodes of Automatically Generated Taxonomy for Multi-type Relational Datasets. [Citation Graph (, )][DBLP]

  151. Towards a business continuity information network for rapid disaster recovery. [Citation Graph (, )][DBLP]

  152. Automated Taxonomy Generation for Summarizing Multi-Type Relational Datasets. [Citation Graph (, )][DBLP]

  153. Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. [Citation Graph (, )][DBLP]

  154. Exploiting Domain Knowledge by Automated Taxonomy Generation in Recommender Systems. [Citation Graph (, )][DBLP]

  155. An Efficient Fuzzy Kohonen Clustering Network Algorithm. [Citation Graph (, )][DBLP]

  156. A New BP Neural Network Model Based on the Random Fuzzy Theory. [Citation Graph (, )][DBLP]

  157. Exploration of Network Security Information Hid in Web Pages Based on Immunology. [Citation Graph (, )][DBLP]

  158. Soft error vulnerability aware process variation mitigation. [Citation Graph (, )][DBLP]

  159. Anatomy of a Real-Time Intrusion Prevention System. [Citation Graph (, )][DBLP]

  160. Signaling Transport Options in GMPLS Networks: In-band or Out-of-band. [Citation Graph (, )][DBLP]

  161. On Virtualizing Ethernet Switches. [Citation Graph (, )][DBLP]

  162. Using Analog Network Coding to Improve the RFID Reading Throughput. [Citation Graph (, )][DBLP]

  163. Compromised Sensor Nodes Detection: A Quantitative Approach. [Citation Graph (, )][DBLP]

  164. Solving Consensus and Semi-supervised Clustering Problems Using Nonnegative Matrix Factorization. [Citation Graph (, )][DBLP]

  165. Binary Matrix Factorization with Applications. [Citation Graph (, )][DBLP]

  166. Nonnegative Matrix Factorization for Combinatorial Optimization: Spectral Clustering, Graph Matching, and Clique Finding. [Citation Graph (, )][DBLP]

  167. HIREL: An Incremental Clustering Algorithm for Relational Datasets. [Citation Graph (, )][DBLP]

  168. Two Heads Better Than One: Metric+Active Learning and its Applications for IT Service Classification. [Citation Graph (, )][DBLP]

  169. Maximum Margin Clustering on Data Manifolds. [Citation Graph (, )][DBLP]

  170. Semi-supervised Multi-task Learning with Task Regularizations. [Citation Graph (, )][DBLP]

  171. Non-negative Laplacian Embedding. [Citation Graph (, )][DBLP]

  172. Knowledge Transformation by Cross-Domain Belief Propagation. [Citation Graph (, )][DBLP]

  173. Computer Virus Evolution Model Inspired by Biological DNA. [Citation Graph (, )][DBLP]

  174. An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. [Citation Graph (, )][DBLP]

  175. A New Intrusion Detection Method Based on Antibody Concentration. [Citation Graph (, )][DBLP]

  176. Efficient label propagation for interactive image segmentation. [Citation Graph (, )][DBLP]

  177. Weighted Consensus Clustering for Identifying Functional Modules in Protein-Protein Interaction Networks. [Citation Graph (, )][DBLP]

  178. Label Propagation on K-partite Graphs. [Citation Graph (, )][DBLP]

  179. Optimizing Issue Queue Reliability to Soft Errors on Simultaneous Multithreaded Architectures. [Citation Graph (, )][DBLP]

  180. TransMetric: architecture independent workload characterization for transactional memory benchmarks. [Citation Graph (, )][DBLP]

  181. Finding Hotspots in Document Collection. [Citation Graph (, )][DBLP]

  182. M3IC: Maximum Margin Multiple Instance Clustering. [Citation Graph (, )][DBLP]

  183. Generalized Cluster Aggregation. [Citation Graph (, )][DBLP]

  184. Preference Learning with Extreme Examples. [Citation Graph (, )][DBLP]

  185. Adaptive dynamic neuro-fuzzy system for traffic signal control. [Citation Graph (, )][DBLP]

  186. Fit a Spread Estimator in Small Memory. [Citation Graph (, )][DBLP]

  187. Energy Efficient Algorithms for the RFID Estimation Problem. [Citation Graph (, )][DBLP]

  188. N-Gram Chord Profiles for Composer Style Representation. [Citation Graph (, )][DBLP]

  189. Stability Criteria with Less Variables for Neural Networks with Time-Varying Delay. [Citation Graph (, )][DBLP]

  190. Research on Logging Evaluation of Reservoir Contamination Based on PSO-BP Neural Network. [Citation Graph (, )][DBLP]

  191. Fault-Tolerant Routing Schemes in RDT(2, 2, 1)/a-Based Interconnection Network for Networks-on-Chip Designs. [Citation Graph (, )][DBLP]

  192. Fault-Tolerant Routing Algorithm for RDT Structure. [Citation Graph (, )][DBLP]

  193. Using Wavelet Domain Workload Execution Characteristics to Improve Accuracy, Scalability and Robustness in Program Phase Analysis. [Citation Graph (, )][DBLP]

  194. An Analysis of Microarchitecture Vulnerability to Soft Errors on Simultaneous Multithreaded Architectures. [Citation Graph (, )][DBLP]

  195. Full-Chip Leakage Verification for Manufacturing Considering Process Variations. [Citation Graph (, )][DBLP]

  196. Simultaneous tensor subspace selection and clustering: the equivalence of high order svd and k-means clustering. [Citation Graph (, )][DBLP]

  197. Intelligent file scoring system for malware detection from the gray list. [Citation Graph (, )][DBLP]

  198. Automatic malware categorization using cluster ensemble. [Citation Graph (, )][DBLP]

  199. Using data mining techniques to address critical information exchange needs in disaster affected public-private networks. [Citation Graph (, )][DBLP]

  200. Modeling and Analyzing the Effect of Microarchitecture Design Parameters on Microprocessor Soft Error Vulnerability. [Citation Graph (, )][DBLP]

  201. Accurate, scalable and informative design space exploration for large and sophisticated multi-core oriented architectures. [Citation Graph (, )][DBLP]

  202. TransPlant: A parameterized methodology for generating transactional memory workloads. [Citation Graph (, )][DBLP]

  203. Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology. [Citation Graph (, )][DBLP]

  204. Informed Microarchitecture Design Space Exploration Using Workload Dynamics. [Citation Graph (, )][DBLP]

  205. Characterizing and mitigating the impact of process variations on phase change based memory systems. [Citation Graph (, )][DBLP]

  206. NBTI tolerant microarchitecture design in the presence of process variation. [Citation Graph (, )][DBLP]

  207. K-Subspace Clustering. [Citation Graph (, )][DBLP]

  208. Using Analytical Models to Efficiently Explore Hardware Transactional Memory and Multi-Core Co-Design. [Citation Graph (, )][DBLP]

  209. ORBIT: Effective Issue Queue Soft-Error Vulnerability Mitigation on Simultaneous Multithreaded Architectures Using Operand Readiness-Based Instruction Dispatch. [Citation Graph (, )][DBLP]

  210. Weighted Consensus Clustering. [Citation Graph (, )][DBLP]

  211. Semi-Supervised Clustering via Matrix Factorization. [Citation Graph (, )][DBLP]

  212. Integrated KL (K-means - Laplacian) Clustering: A New Clustering Approach by Combining Attribute Data and Pairwise Relations. [Citation Graph (, )][DBLP]

  213. Bridging Domains with Words: Opinion Analysis with Matrix Tri-factorizations. [Citation Graph (, )][DBLP]

  214. Author-topic evolution analysis using three-way non-negative Paratucker. [Citation Graph (, )][DBLP]

  215. Evolutionary document summarization for disaster management. [Citation Graph (, )][DBLP]

  216. Knowledge transformation from word space to document space. [Citation Graph (, )][DBLP]

  217. Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization. [Citation Graph (, )][DBLP]

  218. Posterior probabilistic clustering using NMF. [Citation Graph (, )][DBLP]

  219. Knowledge transformation for cross-domain sentiment classification. [Citation Graph (, )][DBLP]

  220. Mining product reviews based on shallow dependency parsing. [Citation Graph (, )][DBLP]

  221. HCC: a hierarchical co-clustering algorithm. [Citation Graph (, )][DBLP]

  222. Ontology-enriched multi-document summarization in disaster management. [Citation Graph (, )][DBLP]

  223. Many are better than one: improving multi-document summarization via weighted consensus. [Citation Graph (, )][DBLP]

  224. Feature subset non-negative matrix factorization and its applications to document understanding. [Citation Graph (, )][DBLP]

  225. VisualSum: an interactive multi-document summarizationsystem using visualization. [Citation Graph (, )][DBLP]

  226. DynaNP - A Coarse-grain Dataflow Network Processor Architecture with Dynamic Configurable Processing Path. [Citation Graph (, )][DBLP]

  227. Research experiences for undergraduates: autonomic computing research at FIU. [Citation Graph (, )][DBLP]

  228. OrdRank: Learning to Rank with Ordered Multiple Hyperplanes. [Citation Graph (, )][DBLP]

  229. Quantify music artist similarity based on style and mood. [Citation Graph (, )][DBLP]

  230. Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education. [Citation Graph (, )][DBLP]

  231. Modular Neural Network Structure with Fast Training/Recognition Algorithm for Pattern Recognition. [Citation Graph (, )][DBLP]

  232. OS-aware tuning: improving instruction cache energy efficiency on system workloads. [Citation Graph (, )][DBLP]

  233. On the (dis)similarity of transactional memory workloads. [Citation Graph (, )][DBLP]

  234. Accelerating multi-core processor design space evaluation using automatic multi-threaded workload synthesis. [Citation Graph (, )][DBLP]

  235. Thermal Design Space Exploration of 3D Die Stacked Multi-core Processors Using Geospatial-Based Predictive Models. [Citation Graph (, )][DBLP]

  236. An Immune Multi-agent System for Network Intrusion Detection. [Citation Graph (, )][DBLP]

  237. A Novel Biology-Inspired Virus Detection Model with RVNS. [Citation Graph (, )][DBLP]

  238. An Analytical Model for a Book-Ahead Bandwidth Scheduler. [Citation Graph (, )][DBLP]

  239. A Dynamic Immunity-Based Model for Computer Virus Detection. [Citation Graph (, )][DBLP]

  240. Photodynamic Therapy of New Amphiphilic Phthalocyanine Zinc Inhibits the Proliferation of Human Hepatoma Bel-7402 Cells through the Induction of Apoptosis. [Citation Graph (, )][DBLP]

  241. Cancelable Voiceprint Templates Based on Knowledge Signatures. [Citation Graph (, )][DBLP]

  242. Research of Group Decision Consensus Degree Based on Extended Intuitionistic Fuzzy Set. [Citation Graph (, )][DBLP]

  243. A multimedia-based intelligent configurator for network access equipment. [Citation Graph (, )][DBLP]

  244. Quantized consensus over expander networks and communication energy minimization. [Citation Graph (, )][DBLP]

  245. Robust stability analysis on discrete-time Cohen-Grossberg neural networks with distributed delay. [Citation Graph (, )][DBLP]

  246. A Multi-objective Optimization Evolutionary Algorithm Addressing Diversity Maintenance. [Citation Graph (, )][DBLP]

  247. Research on Distributed Database Application for Integrated Urban Underground Pipelines. [Citation Graph (, )][DBLP]

  248. A Dynamic Programming Model about Optimized Port Transport Expense Paper. [Citation Graph (, )][DBLP]

  249. The Application of Saftey Audit and Monitor Technology in Power Management. [Citation Graph (, )][DBLP]

  250. Numerical Simulation of Water-Filling Process in Long-Distance Diversion Tunnel with Free Flow. [Citation Graph (, )][DBLP]

  251. Application Study of PS-DInSAR Technique Fusing Multi-metadata in Urban Ground Deformation Survey. [Citation Graph (, )][DBLP]

  252. The Application of EDI Technology in Electronic Commerce System. [Citation Graph (, )][DBLP]

  253. Research on Motion Detection and Target Contour Extraction in Wearable Video System. [Citation Graph (, )][DBLP]

  254. Modeling and analyzing the spread of active worms based on P2P systems. [Citation Graph (, )][DBLP]

  255. Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education [Citation Graph (, )][DBLP]

  256. Guest editorial: special issue on temporal data mining: theory, algorithms and applications. [Citation Graph (, )][DBLP]

  257. Binary matrix factorization for analyzing gene expression data. [Citation Graph (, )][DBLP]

  258. Addressing Diverse User Preferences: A Framework for Query Results Navigation. [Citation Graph (, )][DBLP]

Search in 0.085secs, Finished in 0.095secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002