Search the dblp DataBase
Wei Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Wei Li , Susan Gauch , John M. Gauch , Kok Meng Pua VISION: A Digital Video Library. [Citation Graph (1, 0)][DBLP ] Digital Libraries, 1996, pp:19-27 [Conf ] Wei Li Implementing first order logic in Modula-2 using an intuitionistic approach. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1988, pp:27-36 [Conf ] Junzhou Luo , Wei Li , Jiuxin Cao , Liang Ge Integrating Heterogeneous E-learning Systems. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:9- [Conf ] Bo Liu , Junzhou Luo , Wei Li Multi-Agent Based Network Management Task Decomposition and Scheduling. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:41-46 [Conf ] Wei Li , Maosong Sun Incorporating Prior Knowledge into Multi-label Boosting for Cross-Modal Image Annotation and Retrieval. [Citation Graph (0, 0)][DBLP ] AIRS, 2006, pp:404-415 [Conf ] Wei Li , Kam-Fai Wong , Chunfa Yuan , Wenjie Li , Yunqing Xia Improving Text Similarity Measurement by Critical Sentence Vector Model. [Citation Graph (0, 0)][DBLP ] AIRS, 2005, pp:522-527 [Conf ] Wei Li An Inductive Inference System and Its Rationality. [Citation Graph (0, 0)][DBLP ] AISC, 2006, pp:3-17 [Conf ] Wei Li What Is the Right Logical Framework for Evolution of Knowledge. [Citation Graph (0, 0)][DBLP ] APLAS, 2002, pp:84-94 [Conf ] Wei Li , Harry S. Delugach Software Metrics and Application Domain Complexity. [Citation Graph (0, 0)][DBLP ] APSEC, 1997, pp:513-514 [Conf ] Weifeng Lu , Wei Li Information Agency Framework: A Novel Architecture of Internet Information Service. [Citation Graph (0, 0)][DBLP ] ARCS, 1997, pp:291-300 [Conf ] Fangqing Chu , Wei Li , Junyan Ren An implementation of a CMOS down-conversion mixer for GSM1900 receiver. [Citation Graph (0, 0)][DBLP ] ASP-DAC, 2006, pp:100-101 [Conf ] Wei Li A Logical Framework for Inductive Inference and Its Rationality. [Citation Graph (0, 0)][DBLP ] Australian Joint Conference on Artificial Intelligence, 1999, pp:304-315 [Conf ] Wei Li , Jeffrey D. Johnson A Computational Model of the Role of Deficit-Related Drives in Sequential Movement Learning in a T-Maze Environment. [Citation Graph (0, 0)][DBLP ] BIBE, 2003, pp:275-275 [Conf ] Jeffrey D. Johnson , D. Plenz , J. Beggs , Wei Li , M. Mieier , N. Miltner , K. Owe Analysis of Spontaneous Activity in Cultured Brain Tissue Using the Discrete Wavelet Transfor. [Citation Graph (0, 0)][DBLP ] BIBE, 2003, pp:60-0 [Conf ] Jan Vandewege , Xing-Zhi Qiu , Brecht Stubbe , Chris Coene , Peter Vaes , Wei Li , Jan Codenie , Claire Martin , B. Hans Slabbinck , Ingrid Van de Voorde , Paolo Solina , Pietro Obino A lab demonstration of a SuperPON optical access network. [Citation Graph (0, 0)][DBLP ] Broadband Communications, 1998, pp:69-80 [Conf ] Wei Li A security engineering process for vulnerability assessment. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:352-357 [Conf ] Wei Li , Rayford B. Vaughn Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:26- [Conf ] Susanta Nanda , Wei Li , Lap-Chung Lam , Tzi-cker Chiueh BIRD: Binary Interpretation using Runtime Disassembly. [Citation Graph (0, 0)][DBLP ] CGO, 2006, pp:358-370 [Conf ] Wei Li , Sun Maosong Automatic Image Annotation Based on WordNet and Hierarchical Ensembles. [Citation Graph (0, 0)][DBLP ] CICLing, 2006, pp:417-428 [Conf ] Wei Xu , Wenjie Li , Mingli Wu , Wei Li , Chunfa Yuan Deriving Event Relevance from the Ontology Constructed with Formal Concept Analysis. [Citation Graph (0, 0)][DBLP ] CICLing, 2006, pp:480-489 [Conf ] Jin Zheng , Bo Li , Bing Zhou , Wei Li Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:291-296 [Conf ] Wei Li , Maosong Sun Semi-supervised Learning for Image Annotation Based on Conditional Random Fields. [Citation Graph (0, 0)][DBLP ] CIVR, 2006, pp:463-472 [Conf ] Qingkai Ma , Wei Hao , Wei Li , Manghui Tu , I-Ling Yen PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2003, pp:690-695 [Conf ] Wei Li , Gilles Gagnon , Hong Liu , André Vincent Throughput Analysis of IP Data Transmission over Terrestrial ATSC DTV Channels. [Citation Graph (0, 0)][DBLP ] Communication Systems and Applications, 2005, pp:164-169 [Conf ] Junzhou Luo , Wei Li , Bo Liu Distributed Intelligent Network Management Model for the Large-Scale Computer Network. [Citation Graph (0, 0)][DBLP ] CSCWD (Selected papers), 2005, pp:313-323 [Conf ] Bo Liu , Junzhou Luo , Wei Li Semi-online Task Allocation Algorithm among Cooperative Agents. [Citation Graph (0, 0)][DBLP ] CSCWD, 2006, pp:488-493 [Conf ] Wei Li , Sudhakar M. Reddy , Irith Pomeranz On test generation for transition faults with minimized peak power dissipation. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:504-509 [Conf ] Wei Li , Chaowen Yu , Sudhakar M. Reddy , Irith Pomeranz A scan BIST generation method using a markov source and partial bit-fixing. [Citation Graph (0, 0)][DBLP ] DAC, 2003, pp:554-559 [Conf ] Beibei Ren , Anru Wang , Joyopriya Bakshi , Kai Liu , Wei Li , Wayne Wei-Ming Dai A Domain-Specific Cell Based ASIC Design Methodology for Digital Signal Processing Applications. [Citation Graph (0, 0)][DBLP ] DATE, 2004, pp:280-285 [Conf ] Lap-Chung Lam , Wei Li , Tzi-cker Chiueh Accurate and Automated System Call Policy-Based Intrusion Prevention. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:413-424 [Conf ] Srikant Sharma , Jiawu Chen , Wei Li , Kartik Gopalan , Tzi-cker Chiueh Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:501-510 [Conf ] Wei Li A Logical Framework for Evolution of Specifications. [Citation Graph (0, 0)][DBLP ] ESOP, 1994, pp:394-408 [Conf ] Wei Li , Dilip K. Banerji Routability Prediction for Hierarchical FPGAs. [Citation Graph (0, 0)][DBLP ] Great Lakes Symposium on VLSI, 1999, pp:256-259 [Conf ] Wei Li , Edward B. Allen An Access Control Model for Secure Cluster-Computing Environments. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] Wei Li , Rayford B. Vaughn Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. [Citation Graph (0, 0)][DBLP ] HICSS, 2006, pp:- [Conf ] Yinglong Ma , Kehe Wu , Yi Zheng , Wei Li Multi-agent Coordination Based on Semantic Approximation. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:510-513 [Conf ] Yunchun Li , Wei Li , Mingfeng Zhang , Chunyan Hou An Active Method to Building Dynamic Dependency Model for Distributed Components. [Citation Graph (0, 0)][DBLP ] ICAC, 2005, pp:337-338 [Conf ] Liang Zhang , Guowen Wu , Yanfei Xu , Wei Li , Yang Zhong Multilingual Collection Retrieving Via Ontology Alignment. [Citation Graph (0, 0)][DBLP ] ICADL, 2004, pp:510-514 [Conf ] Craig C. Douglas , Jonathan D. Beezley , Janice L. Coen , Deng Li , Wei Li , Alan K. Mandel , Jan Mandel , Guan Qin , Anthony Vodacek Demonstrating the Validity of a Wildfire DDDAS. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2006, pp:522-529 [Conf ] Wei Li , Richard T. Snodgrass , Shiyan Deng , Vineel Kumar Gattu , Aravindan Kasthurirangan Efficient Sequenced Integrity Constraint Checking. [Citation Graph (0, 0)][DBLP ] ICDE, 2001, pp:131-140 [Conf ] Wei Li , Wenhui Zhang , Vincenzo Liberatore , Vince Penkrot , Jonathan Beaver , Mohamed A. Sharaf , Siddhartha Roychowdhury , Panos K. Chrysanthis , Kirk Pruhs An Optimized Multicast-based Data Dissemination Middleware. [Citation Graph (0, 0)][DBLP ] ICDE, 2003, pp:762-764 [Conf ] MingHong Zhou , Rubao Li , Wei Li Understanding theWeb Page Layout. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:438-442 [Conf ] Wei Li On Auxiliary Algorithm for the Simplex Method by H. Luh and R. Tsaih. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:925-930 [Conf ] Darong Huang , Xiyue Huang , Changcheng Xiang , Wei Li , Yin Zhang The Covariance Constraint Control Method of Fault Detect for Complicated Systems. [Citation Graph (0, 0)][DBLP ] ICIC (2), 2006, pp:580-588 [Conf ] Wei Li , Yupu Yang , Zhong Yang T-S Fuzzy Modeling Based on Support Vector Learning. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:1294-1299 [Conf ] Olivier Egger , Wei Li Very Low Bit Rate Image Coding using Morphological Operators and Adaptive Decompositions. [Citation Graph (0, 0)][DBLP ] ICIP (2), 1994, pp:326-330 [Conf ] Wei Li , Véronique Haese-Coat , Joseph Ronsin Quantitative evaluation of detail-preserving and noise-removal abilities of morphological filters. [Citation Graph (0, 0)][DBLP ] ICIP, 1995, pp:510-513 [Conf ] Sha Guo , Wei Sun , Yi Deng , Wei Li , Qing Liu , Weiping Zhang Panther: An Inexpensive and Integrated Multimedia Environment. [Citation Graph (0, 0)][DBLP ] ICMCS, 1994, pp:382-391 [Conf ] Dong Jiang , Bo Li , Wei Li , Bi Bo , Xue-mei Hu , Jing-jie Li Adaptive MPEG-4 video transmission over PSTN using buffer constraints and RTP feedback. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:1923-1926 [Conf ] Wei Li , Xue-feng Zhu A New Algorithm of Multi-modality Medical Image Fusion Based on Pulse-Coupled Neural Networks. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2005, pp:995-1001 [Conf ] Yan-fei Zhu , Lian-fang Tian , Zong-yuan Mao , Wei Li Mixtures of Kernels for SVM Modeling. [Citation Graph (0, 0)][DBLP ] ICNC (1), 2005, pp:601-607 [Conf ] Tzi-cker Chiueh , Kartik Gopalan , Anindya Neogi , Chang Li , Srikant Sharma , Sheng-Ming Shan , Jiawu Chen , Wei Li , Nikolai Joukov , Jie Zhang , Fu-Hau Hsu , Fanglu Guo , Sheng-I Doong Sago: A Network Resource Management System for Real-Time Content Distribution. [Citation Graph (0, 0)][DBLP ] ICPADS, 2002, pp:557-562 [Conf ] Wei Li Compiler Cache Optimizations for Banded Matrix Problems. [Citation Graph (0, 0)][DBLP ] International Conference on Supercomputing, 1995, pp:21-30 [Conf ] Wei Li An Interactive Consistency Maintenance System and Its Logical Framework. [Citation Graph (0, 0)][DBLP ] ICTAI, 1993, pp:100-107 [Conf ] Wei Li , Ningchuan Shen , Ju Wang R-calculus: A Logical Approach for Knowledge Base Maintenance. [Citation Graph (0, 0)][DBLP ] ICTAI, 1994, pp:375-381 [Conf ] Wei Li , Hang Chen , Dharma P. Agrawal A Reverse Channel Call Admission Control Scheme Based on Total Received Power for CDMA Systems Supporting Integrated Voice/Data Services. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:335-341 [Conf ] Wei Li A Computational Framework for Convergent Agents. [Citation Graph (0, 0)][DBLP ] IDEAL, 2000, pp:295-300 [Conf ] Wei Li , Kin Lam Potential Gains from Global Market Timing Involving Three or More Markets. [Citation Graph (0, 0)][DBLP ] IDEAL, 2003, pp:811-815 [Conf ] Wei Li , Hong Liu , Gilles Gagnon Integration of an Interactive Multimedia Datacasting System. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2004, pp:325-334 [Conf ] Wei Li A Type-Theoretic Approach to Program Development. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:1133-1138 [Conf ] Xianchang Wang , Huowang Chen , Quingping Zhao , Wei Li W - A Logic System Based on the Shared Common Knowledge Views. [Citation Graph (0, 0)][DBLP ] IJCAI, 1993, pp:410-415 [Conf ] Wei Li , Wenjie Li , Qin Lu , Kam-Fai Wong A Preliminary Work on Classifying Time Granularities of Temporal Questions. [Citation Graph (0, 0)][DBLP ] IJCNLP, 2005, pp:414-425 [Conf ] Wei Li , Sun Maosong Automatic Image Annotation Using Maximum Entropy Model. [Citation Graph (0, 0)][DBLP ] IJCNLP, 2005, pp:34-45 [Conf ] Fanglu Guo , Jiawu Chen , Wei Li , Tzi-cker Chiueh Experiences in Building A Multihoming Load Balancing System. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Chaowen Yu , Wei Li , Sudhakar M. Reddy , Irith Pomeranz An Improved Markov Source Design for Scan BIST. [Citation Graph (0, 0)][DBLP ] IOLTS, 2003, pp:106-110 [Conf ] Wei Li , Jiang He , Qingkai Ma , I-Ling Yen , Farokh B. Bastani , Raymond A. Paul A Framework to Support Survivable Web Services. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Qingkai Ma , Wei Li , I-Ling Yen , Farokh B. Bastani , Ing-Ray Chen Survivable Systems Based on an Adaptive NMR Algorithm. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Wenhui Zhang , Wei Li , Vincenzo Liberatore Application-Perceived Multicast Push Performance. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Mohammad Alshayeb , Wei Li , Sara J. Graves An Empirical Study of Refactoring, New Design, and Error-Fix Efforts in Extreme Programming. [Citation Graph (0, 0)][DBLP ] ISAS-SCI (1), 2001, pp:323-325 [Conf ] Ioana Coman , Andrzej Król , David H. Feiglin , Wei Li , Edward Lipson , James A. Mandel , Karl G. Baum , Mehmet Z. Unlu Intermodality Nonrigid Breast-Image Registration. [Citation Graph (0, 0)][DBLP ] ISBI, 2004, pp:1439-1442 [Conf ] D. Zhou , Wei Li , W. Cai , N. Guo An efficient balanced truncation realization algorithm for interconnect model order reduction. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2001, pp:383-386 [Conf ] Wei Li , Renhui Huang , Jie Bai , Xiue Yuan , Dongxiao Niu A New Intelligent Method for Power Load Forecasting. [Citation Graph (0, 0)][DBLP ] ISDA (1), 2006, pp:1098-1103 [Conf ] Wei Li , Clifford A. Meyer , X. Shirley Liu A hidden Markov model for analyzing ChIP-chip experiments on genome tiling arrays and its application to p53 binding sequences. [Citation Graph (0, 0)][DBLP ] ISMB (Supplement of Bioinformatics), 2005, pp:274-282 [Conf ] Zuoquan Lin , Wei Li On Logic of Paradox. [Citation Graph (0, 0)][DBLP ] ISMVL, 1995, pp:248-0 [Conf ] Wei Li , Martin Jonsson , Fredrik Kilander , Carl Gustaf Jansson Building Infrastructure Support for Ubiquitous Context-Aware Systems. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:509-518 [Conf ] Xingfu Wu , Wei Li Scalability of Parallel Algorithm Implementation. [Citation Graph (0, 0)][DBLP ] ISPAN, 1996, pp:559-561 [Conf ] X. Zeng , D. Zhou , Wei Li Buffer insertion for clock delay and skew minimization. [Citation Graph (0, 0)][DBLP ] ISPD, 1999, pp:36-41 [Conf ] Wei Li , Qiang Li , J. S. Yuan , Joshua McConkey , Yuan Chen , Sundar Chetlur , Jonathan Zhou , A. S. Oates Hot-carrier-Induced Circuit Degradation for 0.18 µm CMOS Technology. [Citation Graph (0, 0)][DBLP ] ISQED, 2001, pp:284-289 [Conf ] Wei Li , Sudhakar M. Reddy , Irith Pomeranz On Reducing Peak Current and Power during Test. [Citation Graph (0, 0)][DBLP ] ISVLSI, 2005, pp:156-161 [Conf ] Wei Li Towards a Theory of Epistemic Processes. [Citation Graph (0, 0)][DBLP ] IWAR, 1992, pp:33-46 [Conf ] Bo Qin , Chuangde Zhang , Zhenghua Fang , Wei Li A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region. [Citation Graph (0, 0)][DBLP ] JCIS, 2006, pp:- [Conf ] Zuoquan Lin , Wei Li A Note on Tableaux of Logic of Paradox. [Citation Graph (0, 0)][DBLP ] KI, 1994, pp:296-307 [Conf ] Wei Li , Qing-lei Meng , Chao-Gang Wu , Wei-Jin Huang An embedded 4-channel real-time multimedia coding system. [Citation Graph (0, 0)][DBLP ] MMM, 2006, pp:- [Conf ] Yongguang Zhang , Wei Li An integrated environment for testing mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2002, pp:104-111 [Conf ] Yinglong Ma , Kehe Wu , Beihong Jin , Wei Li A Combination Framework for Semantic Based Query Across Multiple Ontologies. [Citation Graph (0, 0)][DBLP ] PRIMA, 2006, pp:463-470 [Conf ] Wei Li , Deren Sheng , Jianhong Chen , Zhenfu Yuan , Kefa Cen A New Method Based on Immune Algorithm to Solve the Unit Commitment Problem. [Citation Graph (0, 0)][DBLP ] PROLAMAT, 2006, pp:840-846 [Conf ] Wei Li , Lei Wang Real-Time Solution in Petroleum Industry's Cyber Data Acquisition Simulation System. [Citation Graph (0, 0)][DBLP ] RTCSA, 2005, pp:369-372 [Conf ] Jin Zhou , Yinglong Ma , Wei Li , Zhilin Wu A Formal Framework of UML. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2004, pp:151-157 [Conf ] Sallie M. Henry , Nancy Miller , Wei Li , Joseph Chase , K. Todd Stevens Using software development teams in a classroom environment. [Citation Graph (0, 0)][DBLP ] SIGCSE, 1999, pp:356-357 [Conf ] Wei Li , Dengfeng Gao , Richard T. Snodgrass Skew handling techniques in sort-merge join. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2002, pp:169-180 [Conf ] Wei Li A Theory of Requirements Capture and Its Applications. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1993, pp:406-420 [Conf ] Wei Li , Ari Mozes Computing Frequent Itemsets Inside Oracle 10G. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:1253-1256 [Conf ] Wei Li , Seongmoon Wang , Srimat T. Chakradhar , Sudhakar M. Reddy Distance Restricted Scan Chain Reordering to Enhance Delay Fault Coverage. [Citation Graph (0, 0)][DBLP ] VLSI Design, 2005, pp:471-478 [Conf ] Wenbi Rao , Wei Li Design of An Open and Secure Ubiquitous Computing System. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2004, pp:656-659 [Conf ] Shucai Huang , Weimin Li , Wei Li Fuzzy Neural Network for Evaluating Sensor Task Priorities. [Citation Graph (0, 0)][DBLP ] ICICIC (1), 2006, pp:415-419 [Conf ] Wei Li , John R. Talburt , Y.-T. Chen Quantitatively Evaluate Object Oriented Software Evolution. [Citation Graph (0, 0)][DBLP ] TOOLS (24), 1997, pp:362-367 [Conf ] Ke Xu , Wei Li An Average Analysis of Backtracking on Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2001, v:33, n:1, pp:21-37 [Journal ] Wei Li , Junwen Wang , Jin-An Feng NdPASA: a pairwise sequence alignment server for distantly related proteins. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2005, v:21, n:19, pp:3803-3805 [Journal ] Geoff Coulson , Paul Grace , Gordon S. Blair , Wei Cai , Christopher S. Cooper , David A. Duce , Laurent Mathy , Wai Kit Yeung , Barry Porter , Musbah Shahop Sagar , Wei Li A component-based middleware framework for configurable and reconfigurable Grid computing. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2006, v:18, n:8, pp:865-874 [Journal ] Ke Xu , Wei Li Exact Phase Transitions in Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li The SAT Phase Transition [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li On the Average Similarity Degree between Solutions of Random k-SAT and Random CSPs [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li An Average Analysis of Backtracking on Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ke Xu , Wei Li Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Wei Li , Shilong Ma , Yuefei Sui , Ke Xu A Logical Framework for Convergent Infinite Computations [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Wei Li A Development Calculus for Specifications [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Wei Li , Shilong Ma Limits of theory sequences over algebraically closed fields and applications. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:136, n:1, pp:23-43 [Journal ] Ke Xu , Wei Li On the average similarity degree between solutions of random k-SAT and random CSPs. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:136, n:1, pp:125-149 [Journal ] Wei Li , X. G. Chang , Friedrich M. Wahl , Jay A. Farrell Tracking control of a manipulator under uncertainty by FUZZY P+ID controller. [Citation Graph (0, 0)][DBLP ] Fuzzy Sets and Systems, 2001, v:122, n:1, pp:125-137 [Journal ] Kaile Su , Wei Li Computation of Extensions of Seminormal Default Theories. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 1999, v:40, n:1, pp:79-102 [Journal ] Zhiwei Xu , Wei Li , Li Zha , Haiyan Yu , Donghua Liu Vega: A Computer Systems Approach to Grid Computing. [Citation Graph (0, 0)][DBLP ] J. Grid Comput., 2004, v:2, n:2, pp:109-120 [Journal ] Guangwen Yang , Hai Jin , Minglu Li , Nong Xiao , Wei Li , Zhaohui Wu , Yongwei Wu , Feilong Tang Grid Computing in China. [Citation Graph (0, 0)][DBLP ] J. Grid Comput., 2004, v:2, n:2, pp:193-206 [Journal ] Rong Yao (Frank) Fu , Hui Su , James C. Fletcher , Wei Li , Xiao Xi Liu , Shi Wan Zhao , Chang Yan Chi A framework for device capability on demand and virtual device user experience. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 2004, v:48, n:5-6, pp:635-648 [Journal ] Cheng Niu , Wei Li , Jihong Ding , Rohini K. Srihari Orthographic case restoration using supervised learning without manual annotation. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 2004, v:13, n:1, pp:141-156 [Journal ] Wei Li , G. P. Steven , Y. M. Xie Shape Design for Two- and Three-Dimensional Contact Problems Using an Evolutionary Method. [Citation Graph (0, 0)][DBLP ] International Journal of Computational Engineering Science, 2001, v:2, n:2, pp:181-198 [Journal ] Wei Li , Nasser M. Nasrabadi Invariant Object Recognition Based on A Neural Network of Cascaded RCE Nets. [Citation Graph (0, 0)][DBLP ] IJPRAI, 1993, v:7, n:4, pp:815-829 [Journal ] Wei Li , Letha H. Etzkorn , Carl G. Davis , John R. Talburt An empirical study of object-oriented system evolution. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2000, v:42, n:6, pp:373-381 [Journal ] Mohammad Alshayeb , Wei Li An empirical study of relationships among extreme programming engineering activities. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2006, v:48, n:11, pp:1068-1072 [Journal ] Ke Xu , Wei Li Exact Phase Transitions in Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP ] J. Artif. Intell. Res. (JAIR), 2000, v:12, n:, pp:93-103 [Journal ] Jing Ma , Shuhua Li , Wei Li A multireference configuration interaction method based on the separated electron pair wave functions. [Citation Graph (0, 0)][DBLP ] Journal of Computational Chemistry, 2006, v:27, n:1, pp:39-47 [Journal ] Yili Gong , Fangpeng Dong , Wei Li , Zhiwei Xu VEGA Infrastructure for Resource Discovery in Grids. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:4, pp:413-422 [Journal ] Bo Li , Wei Li , Yaming Tu A Fast Block-Matching Algorithm Using Smooth Motion Vector Field Adaptive Search Technique. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:1, pp:14-21 [Journal ] Shangmin Luan , Guozhong Dai , Wei Li A Programmable Approach to Maintenance of a Finite Knowledge Base. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:1, pp:102-108 [Journal ] Wei Li , Shangmin Luan Operational and Complete Approaches to Belief Revision. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2000, v:15, n:3, pp:202-212 [Journal ] Aoying Zhou , Wei Li , Yu Fang Effective Discovery of Exception Class Association Rules. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:3, pp:304-313 [Journal ] Jagdish Bansiya , Letha H. Etzkorn , Carl G. Davis , Wei Li A Class Cohesion Metric For Object-Oriented Designs. [Citation Graph (0, 0)][DBLP ] JOOP, 1999, v:11, n:8, pp:47-52 [Journal ] Letha H. Etzkorn , Carl G. Davis , Wei Li A Practical Look at the Lack of Cohesion in Methods Metric. [Citation Graph (0, 0)][DBLP ] JOOP, 1998, v:11, n:5, pp:27-34 [Journal ] Wei Li An Empirical Study of Object Analysis and Design. [Citation Graph (0, 0)][DBLP ] JOOP, 1997, v:9, n:8, pp:44-47 [Journal ] Wei Li , Sallie M. Henry , Dennis G. Kafura , Robert S. Schulman Measuring Object-Oriented Design. [Citation Graph (0, 0)][DBLP ] JOOP, 1995, v:8, n:4, pp:48-55 [Journal ] Wei Li , John R. Talburt Empirically Analyzing Object-Oriented Software Evolution. [Citation Graph (0, 0)][DBLP ] JOOP, 1998, v:11, n:5, pp:15-19 [Journal ] Mohammed Javeed Zaki , Wei Li , Srinivasan Parthasarathy Customized Dynamic Load Balancing for a Network of Workstations. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1997, v:43, n:2, pp:156-162 [Journal ] Mohammad Alshayeb , Wei Li An empirical study of system design instability metric and design evolution in an agile software process. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:74, n:3, pp:269-274 [Journal ] Wei Li Another metric suite for object-oriented programming. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:44, n:2, pp:155-162 [Journal ] Wei Li , Sallie M. Henry Object-oriented metrics that predict maintainability. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1993, v:23, n:2, pp:111-122 [Journal ] Srinivasan Parthasarathy , Mohammed Javeed Zaki , Mitsunori Ogihara , Wei Li Parallel Data Mining for Association Rules on Shared-Memory Systems. [Citation Graph (0, 0)][DBLP ] Knowl. Inf. Syst., 2001, v:3, n:1, pp:1-29 [Journal ] Minjie Zhang , Wei Li Identifying potential synthesis cases in distributed expert systems: a fuzzy logic approach. [Citation Graph (0, 0)][DBLP ] Knowl.-Based Syst., 2001, v:14, n:7, pp:359-365 [Journal ] Rakesh Krishnaiyer , Dattatraya Kulkarni , Daniel M. Lavery , Wei Li , Chu-Cheow Lim , John Ng , David C. Sehr An Advanced Optimizer for the IA-64 Architecture. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2000, v:20, n:6, pp:60-68 [Journal ] Wei Li , Jocelyn E. Shaw A variant Tc4 transposable element in the nematode C. elegans could encode a novel protein. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 1993, v:21, n:1, pp:59-67 [Journal ] Xuwo Ji , Wei Li , Jun Song , Liping Wei , X. Shirley Liu CEAS: cis -regulatory element annotation system. [Citation Graph (0, 0)][DBLP ] Nucleic Acids Research, 2006, v:34, n:Web-Server-Issue, pp:551-554 [Journal ] Wei Li , Xiaohu Huang , Nanning Zheng Parallel Implementing OpenGL on PVM. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1997, v:23, n:12, pp:1839-1850 [Journal ] Attahiru Sule Alfa , Wei Li Optimal (N, T)-policy for M/G/1 system with cost structures. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2000, v:42, n:4, pp:265-277 [Journal ] Wei Li , Véronique Haese-Coat , Joseph Ronsin Residues of morphological filtering by reconstruction for texture classification. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1997, v:30, n:7, pp:1081-1093 [Journal ] Wei Li , Goutao Lu , Yongqiang Wang Recognizing white line markings for vision-guided vehicle navigation by fuzzy reasoning. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1997, v:18, n:8, pp:771-780 [Journal ] Yiqiang Q. Zhao , Wei Li , W. John Braun Correction to: On a decomposition for infinite stochastic matrices. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 2000, v:35, n:1-4, pp:399- [Journal ] Yiqiang Q. Zhao , Wei Li , W. John Braun On a decomposition for infinite transition matrices. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 1997, v:27, n:1-2, pp:127-130 [Journal ] Wei Li , Hilmar Jaschek , Dieter Wloka Modifizierung des Roberts' Algorithmus zur graphischen Darstellung von Robotern. [Citation Graph (0, 0)][DBLP ] Robotersysteme, 1990, v:6, n:, pp:76-80 [Journal ] Wei Li Schnelle Abbildung von Hindernissen in den Konfigurationsraum. [Citation Graph (0, 0)][DBLP ] Robotersysteme, 1991, v:7, n:, pp:148-154 [Journal ] Wei Li Automatische Bestimmung kollisionsfreier Bewegungsbahnen für Industrieroboter. [Citation Graph (0, 0)][DBLP ] Robotersysteme, 1990, v:6, n:, pp:218-224 [Journal ] Wei Li , Gansheng Li Making C++ Concurrent and Real-time. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 1997, v:32, n:9, pp:39-46 [Journal ] Hector M. Olague , Letha H. Etzkorn , Wei Li , Glenn W. Cox Assessing design instability in iterative (agile) object-oriented projects. [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 2006, v:18, n:4, pp:237-266 [Journal ] Bruce Greer , John Harrison , Greg Henry , Wei Li , Peter Tang Scientific computing on the Itanium® processor. [Citation Graph (0, 0)][DBLP ] Scientific Programming, 2002, v:10, n:4, pp:329-337 [Journal ] Wei Li , Andrew McCallum Rapid development of Hindi named entity recognition using conditional random fields and feature induction. [Citation Graph (0, 0)][DBLP ] ACM Trans. Asian Lang. Inf. Process., 2003, v:2, n:3, pp:290-294 [Journal ] Xiuli Chao , Wei Li Performance analysis of a cellular network with multiple classes of calls. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2005, v:53, n:9, pp:1542-1550 [Journal ] Hao Zhang , Wei Li , T. Aaron Gulliver Pulse Position Amplitude Modulation for Time-Hopping Multiple-Access UWB Communications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2005, v:53, n:8, pp:1269-1273 [Journal ] Ke Xu , Wei Li Many hard examples in exact phase transitions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:355, n:3, pp:291-302 [Journal ] Shensheng Tang , Wei Li Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2006, v:32, n:1, pp:71-91 [Journal ] Wei Li , Kazuo Tanaka , Hua O. Wang Acrobatic control of a pendubot. [Citation Graph (0, 0)][DBLP ] IEEE T. Fuzzy Systems, 2004, v:12, n:4, pp:549-554 [Journal ] Olivier Egger , Wei Li Subband coding of images using asymmetrical filter banks. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1995, v:4, n:4, pp:478-485 [Journal ] Wei Li , Xiangyang Xue , Peizhong Lu Localized audio watermarking technique robust against time-scale modification. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:60-69 [Journal ] Wei Li , Keshav Pingali Access Normalization: Loop Restructuring for NUMA Compilers. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1993, v:11, n:4, pp:353-375 [Journal ] Wei Li , Daniel Blakely , Scott Van Sooy , Keven Dunn , David Kidd , Robert Rogenmoser , Dian Zhou LVS verification across multiple power domains for a quad-core microprocessor. [Citation Graph (0, 0)][DBLP ] ACM Trans. Design Autom. Electr. Syst., 2006, v:11, n:2, pp:490-500 [Journal ] Wei Li , Xiuli Chao Modeling and performance evaluation of a cellular mobile network. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:131-145 [Journal ] Mohammad Alshayeb , Wei Li An Empirical Validation of Object-Oriented Metrics in Two Different Iterative Software Processes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:11, pp:1043-1049 [Journal ] Jay A. Farrell , Shuo Pang , Wei Li Plume mapping via hidden Markov methods. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2003, v:33, n:6, pp:850-863 [Journal ] Wei Li , X. G. Chang , Jay A. Farrell , Friedrich M. Wahl Design of an enhanced hybrid fuzzy P+ID controller for a mechanical manipulator. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2001, v:31, n:6, pp:938-945 [Journal ] Xiaoming Wei , Wei Li , Klaus Mueller , Arie E. Kaufman The Lattice-Boltzmann Method for Simulating Gaseous Phenomena. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Vis. Comput. Graph., 2004, v:10, n:2, pp:164-176 [Journal ] Xiaoming Wei , Ye Zhao , Zhe Fan , Wei Li , Feng Qiu , Suzanne Yoakum-Stover , Arie E. Kaufman Lattice-Based Flow Field Modeling. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Vis. Comput. Graph., 2004, v:10, n:6, pp:719-729 [Journal ] Shijie Cai , Wei Li , Honggang Zhang A visual tool for user-interface development. [Citation Graph (0, 0)][DBLP ] The Visual Computer, 1992, v:8, n:2, pp:134-143 [Journal ] Wei Li , Xiaoming Wei , Arie E. Kaufman Implementing lattice Boltzmann computation on graphics hardware. [Citation Graph (0, 0)][DBLP ] The Visual Computer, 2003, v:19, n:7-8, pp:444-456 [Journal ] Wei Li , Daehyoung Hong , Demetrios Kazakos , Li-Chun Wang Special issue: modeling and performance evaluation of radio resource QoS for next-generation wireless and mobile networks. [Citation Graph (0, 0)][DBLP ] , 2005, v:, n:, pp:863-866 [Journal ] Attahiru Sule Alfa , Wei Li A Homogeneous PCS network with Markov Call Arrival Process and Phase Type Cell Residence Time. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2002, v:8, n:6, pp:597-605 [Journal ] Wei Li Practical criteria for positive-definite matrix, M-matrix and Hurwitz matrix. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2007, v:185, n:1, pp:397-401 [Journal ] Wei Li , Rong Zhang , Zhengkai Liu , Huijing Zhao , Ryosuke Shibasaki An approach of laser-based vehicle monitor. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2007, v:185, n:2, pp:953-962 [Journal ] Cher Ming Tan , Wei Li , Kok Tong Tan , Frankie Low Development of highly accelerated electromigration test. [Citation Graph (0, 0)][DBLP ] Microelectronics Reliability, 2006, v:46, n:9-11, pp:1638-1642 [Journal ] Wei Li A note on two direct methods in linear programming. [Citation Graph (0, 0)][DBLP ] European Journal of Operational Research, 2004, v:158, n:1, pp:262-265 [Journal ] Wei Li , Vincent Arena , Nancy B. Sussman , Sati Mazumdar Model validation software for classification models using repeated partitioning: MVREP. [Citation Graph (0, 0)][DBLP ] Computer Methods and Programs in Biomedicine, 2003, v:72, n:1, pp:81-87 [Journal ] Wei Li , Sati Mazumdar , Vincent Arena , Nancy B. Sussman A resampling approach for adjustment in prediction models for covariate measurement error. [Citation Graph (0, 0)][DBLP ] Computer Methods and Programs in Biomedicine, 2005, v:77, n:3, pp:199-207 [Journal ] Wei Li , Lap-Chung Lam , Tzi-cker Chiueh How to Automatically and Accurately Sandbox Microsoft IIS. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:213-222 [Conf ] Susanta Nanda , Wei Li , Lap-Chung Lam , Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:279-288 [Conf ] Wei Li , Zibin Dai , Tao Chen , Tao Meng , Xuan Yang Design and Implementation of a High-Speed Reconfigurable Modular Arithmetic Unit. [Citation Graph (0, 0)][DBLP ] APPT, 2007, pp:50-59 [Conf ] Shaohua Liu , Junsheng Yu , Yuan'an Liu , Jun Wei , Peng Gao , Wei Li , Jiani Ma Make Highly Clustered Grid a Small World with Shorter Diameter. [Citation Graph (0, 0)][DBLP ] GCC, 2007, pp:109-116 [Conf ] Xin Zhang , Bin Liu , Wei Li , Y. Xi , D. Bermingham , Xiaojun Wang IPv6-Oriented 4*OC768 Packet Classification with Deriving-Merging Partition and Field-Variable Encoding Algorithm. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Zhujin Zhou , Ning Li , Wei Li , Junyan Ren A Power-Optimized CMOS Quadrature VCO with Wide-Tuning Range for UWB Receivers. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:437-440 [Conf ] Kangshun Li , Wei Li , Zhangxin Chen , Feng Wang A Particle Gradient Evolutionary Algorithm Based on Statistical Mechanics and Convergence Analysis. [Citation Graph (0, 0)][DBLP ] VECPAR, 2006, pp:530-543 [Conf ] Wei Li , Hang Chen , Qing-An Zeng , Dharma P. Agrawal Resource allocation for handoffs in integrated wireless cellular networks. [Citation Graph (0, 0)][DBLP ] ISICT, 2004, pp:238-243 [Conf ] Jun S. Song , Kaveh Maghsoudi , Wei Li , Edward Fox , John Quackenbush , X. Shirley Liu Microarray blob-defect removal improves array analysis. [Citation Graph (0, 0)][DBLP ] Bioinformatics, 2007, v:23, n:8, pp:966-971 [Journal ] Wei Li R-Calculus: An Inference System for Belief Revision. [Citation Graph (0, 0)][DBLP ] Comput. J., 2007, v:50, n:4, pp:378-390 [Journal ] Wei Li , Raed Shatnawi An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:7, pp:1120-1128 [Journal ] Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. [Citation Graph (, )][DBLP ] Research on the Reconstruction Technology of Diagnosis Sytstem Based on Immune Mechanism. [Citation Graph (, )][DBLP ] Applied Research in Fuzzy Neural Network Predictive Control. [Citation Graph (, )][DBLP ] Gait Recognition Using Procrustes Shape Analysis and Shape Context. [Citation Graph (, )][DBLP ] Automated Format String Attack Prevention for Win32/X86 Binaries. [Citation Graph (, )][DBLP ] A Comparison of Three Programming Models for Telecom Service Composition. [Citation Graph (, )][DBLP ] SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments. [Citation Graph (, )][DBLP ] UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent. [Citation Graph (, )][DBLP ] Polony Identification Using the EM Algorithm Based on a Gaussian Mixture Model. [Citation Graph (, )][DBLP ] xMAN: extreme MApping of oligoNucleotides. [Citation Graph (, )][DBLP ] Efficient Update on Exploitation Graphs for Vulnerability Analysis. [Citation Graph (, )][DBLP ] Using Exploit Similarities for Concise Representation of Attack Scenarios. [Citation Graph (, )][DBLP ] Using Ponder as a Standard Security Specification Language in Heterogeneous Networks. [Citation Graph (, )][DBLP ] A Space-Efficient Approach to Consistency Check of Firewall Rules. [Citation Graph (, )][DBLP ] Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme. [Citation Graph (, )][DBLP ] A Text-Based Approach to the ImageCLEF 2010 Photo Annotation Task. [Citation Graph (, )][DBLP ] Research on Shared Objects Cooperative Manipulating Systems. [Citation Graph (, )][DBLP ] Application of improved grey prediction model for power load forecasting. [Citation Graph (, )][DBLP ] Distributed network self-management model based on CSCW. [Citation Graph (, )][DBLP ] Phishpin: An Integrated Anti-Phishing Framework. [Citation Graph (, )][DBLP ] Uncertain Measure of Knowledge Based on Generalized Rough Sets in Incomplete Infomration Systems. [Citation Graph (, )][DBLP ] Methods of Chlorophyll Concentration Retrieval. [Citation Graph (, )][DBLP ] A Supervised Algorithm for Fuzzy Multi-criteria Decision Making. [Citation Graph (, )][DBLP ] Optimizing Schemas of Flood Control and Disaster Reduction Engineering Based on Variable Fuzzy Sets Theory. [Citation Graph (, )][DBLP ] A Hybrid Method of Feature Selection for Chinese Text Sentiment Classification. [Citation Graph (, )][DBLP ] A Model Combined Fuzzy Optimum Theory with Analytical Hierarchy Process for Engineering Design. [Citation Graph (, )][DBLP ] The Fuzzy Binomial Option Pricing Model under Knightian Uncertainty. [Citation Graph (, )][DBLP ] Optimization Model for Locating City Fire Stations Based on Fuzzy Matter-Element Analysis. [Citation Graph (, )][DBLP ] Algorithm for Interval Quadratic Programming with Equality Constraints. [Citation Graph (, )][DBLP ] Adaptive Background Updating Algorithm in Complex Scene. [Citation Graph (, )][DBLP ] An Efficient Moving Object Detection Algorithm Using Multi-mask. [Citation Graph (, )][DBLP ] Cooperation strategy for robot soccer based on defuzzification. [Citation Graph (, )][DBLP ] A Real-Time Scheduling Strategy Based on Priority in Data Stream System. [Citation Graph (, )][DBLP ] Traffic Shaping in BitTorrent Systems by Centralized Hierarchical Peer-Node Assignment. [Citation Graph (, )][DBLP ] An Evolutionary Topology Unaware TDMA MAC Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP ] p-Cycle Network Design for Specified Minimum Dual-Failure Restorability. [Citation Graph (, )][DBLP ] Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. [Citation Graph (, )][DBLP ] Analytical thermal placement for VLSI lifetime improvement and minimum performance variation. [Citation Graph (, )][DBLP ] Design and Analysis of a New GPS Algorithm. [Citation Graph (, )][DBLP ] NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network. [Citation Graph (, )][DBLP ] HSN-PAM: Finding Hierarchical Probabilistic Groups from Large-Scale Networks. [Citation Graph (, )][DBLP ] Growing Algorithm of Laguerre Orthogonal Basis Neural Network with Weights Directly Determined. [Citation Graph (, )][DBLP ] A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling. [Citation Graph (, )][DBLP ] Multi-layer Ensemble Classifiers on Protein Secondary Structure Prediction. [Citation Graph (, )][DBLP ] Contour tracking with abrupt motion. [Citation Graph (, )][DBLP ] Saliency-based automatic target detection in forward looking infrared images. [Citation Graph (, )][DBLP ] Principal line based ICP alignment for palmprint verification. [Citation Graph (, )][DBLP ] New iterative schemes for equilibrium problems and fixed point problems of nonspreading mappings and nonexpansive mappings. [Citation Graph (, )][DBLP ] The topology and test technology of Digitally Controlled Potentiometers. [Citation Graph (, )][DBLP ] Research on Magnetic Flux Leakage Signals Quantity Technology of Tank Floor Corrosion Defects Based on Artificial Neural Network. [Citation Graph (, )][DBLP ] Predicting Protein Structural Class Based on Ensemble Binary Classification. [Citation Graph (, )][DBLP ] A Fuzzy Context Neural Network Classifier for Land Cover Classification. [Citation Graph (, )][DBLP ] Analysis and correction of the nonuniformity of light field in the high resolution X-ray digital radiography. [Citation Graph (, )][DBLP ] Chinese video characters recognition based on cluster and multi neural network. [Citation Graph (, )][DBLP ] Automatic pavement cracks detection system based on Visual Studio C++ 6.0. [Citation Graph (, )][DBLP ] COX-2 activity prediction in Chinese medicine using neural network based ensemble learning methods. [Citation Graph (, )][DBLP ] Control information description model and processing mechanism in the trustworthy and controllable network. [Citation Graph (, )][DBLP ] Network Traffic Classification Using K-means Clustering. [Citation Graph (, )][DBLP ] A novel distribution signaling protocol based on mobile agents and obs for intelligent optical networks. [Citation Graph (, )][DBLP ] Quality Assessment of Video Content for HD IPTV Applications. [Citation Graph (, )][DBLP ] A Practical Clustering Algorithm. [Citation Graph (, )][DBLP ] Primary Research on Urban Mass Panic Based on Computational Methods for Experiments. [Citation Graph (, )][DBLP ] Enlargement of Measurement Range in a Fiber-Optic Ice Sensor by Artificial Neural Network. [Citation Graph (, )][DBLP ] Practical Criss-Cross Method for Linear Programming. [Citation Graph (, )][DBLP ] Globally Exponential Stability of a Class of Neural Networks with Impulses and Variable Delays. [Citation Graph (, )][DBLP ] Global Exponential Stability of BAM Type Cohen-Grossberg Neural Network with Delays on Time Scales. [Citation Graph (, )][DBLP ] A Novel Level Set Based Shape Prior Method for Liver Segmentation from MRI Images. [Citation Graph (, )][DBLP ] Optimal Data Rate and Opportunistic Scheme on Network Coding over Rayleigh Fading Channels. [Citation Graph (, )][DBLP ] Multi-modal Multi-label Semantic Indexing of Images Based on Hybrid Ensemble Learning. [Citation Graph (, )][DBLP ] Key Elements Tracing Method for Parallel XML Parsing in Multi-Core System. [Citation Graph (, )][DBLP ] Improving the Performance of Service-based Applications by Dynamic Service Execution. [Citation Graph (, )][DBLP ] Inference of Isoforms from Short Sequence Reads. [Citation Graph (, )][DBLP ] Mining functional associated patterns from biological network data. [Citation Graph (, )][DBLP ] An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP ] An Experimental Approach to Prove Metrics Properties. [Citation Graph (, )][DBLP ] A GPU-based voxelization approach to 3D Minkowski sum computation. [Citation Graph (, )][DBLP ] Risk Assessment of Marine Traffic Environment Using Unascertained Quantity. [Citation Graph (, )][DBLP ] Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. [Citation Graph (, )][DBLP ] Research on the Knowledge-based Decision Support System for the Safety of Rockets. [Citation Graph (, )][DBLP ] CommunityCommands: command recommendations for software applications. [Citation Graph (, )][DBLP ] An Affinity Path Based Wireless Broadcast Scheduling Approach for Multi-item Queries. [Citation Graph (, )][DBLP ] Towards Small World for Collaborative Enterprises in Grid. [Citation Graph (, )][DBLP ] The recurrence dynamics of social tagging. [Citation Graph (, )][DBLP ] Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs. [Citation Graph (, )][DBLP ] Objective Evaluation of Seam Pucker Using an Adaptive Neuro-Fuzzy Inference System. [Citation Graph (, )][DBLP ] HTML integrity authentication based on fragile digital watermarking. [Citation Graph (, )][DBLP ] Using Feature Component for Spatial Data Modeling of GIS. [Citation Graph (, )][DBLP ] Performance of OFDM System on Link Simulation with Measured Outdoor Channels at 3.5GHz. [Citation Graph (, )][DBLP ] A Logical Framework for Software Testing. [Citation Graph (, )][DBLP ] Modeling Hysteresis in Piezo Actuator Based on Neural Networks. [Citation Graph (, )][DBLP ] Long Distance Optical Wireless Network Employing Multiple Access Scheme. [Citation Graph (, )][DBLP ] A Combination Scheme of Topology Control and Channel Assignment in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP ] A Neural Network Approach to Objective Evaluation of Seam Pucker. [Citation Graph (, )][DBLP ] Cellular automata based models of wireless sensor networks. [Citation Graph (, )][DBLP ] Short-Term Power Load Forecasting Using Improved Ant Colony Clustering. [Citation Graph (, )][DBLP ] A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication. [Citation Graph (, )][DBLP ] A Three-Dimensional Method for Detection of Pulmonary Nodule. [Citation Graph (, )][DBLP ] Accurate Application-Specific Sandboxing for Win32/Intel Binaries. [Citation Graph (, )][DBLP ] A trust-incentive-based combinatorial double auction algorithm. [Citation Graph (, )][DBLP ] A Verifying Method of Controller Synthesis. [Citation Graph (, )][DBLP ] A new kind of real-time control scheduling algorithm. [Citation Graph (, )][DBLP ] An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP ] Low-complexity implementation of PN correlator for wireless transmission systems. [Citation Graph (, )][DBLP ] Automatic Chinese Term Extraction based on Cognition Theory. [Citation Graph (, )][DBLP ] Safety Assessment Modelling Based on Recipe Engineering for Power Plants. [Citation Graph (, )][DBLP ] Efficient Shot Boundary Detection Based on Scale Invariant Features. [Citation Graph (, )][DBLP ] Comparing Networks from a Data Analysis Perspective. [Citation Graph (, )][DBLP ] Integrated design of an observer-based fault detection system over unreliable digital channels. [Citation Graph (, )][DBLP ] Optimal Hi=Hinfinity fault detection filter design: An iterative LMI approach. [Citation Graph (, )][DBLP ] Photon tunneling and mode selection due to the absorptive layers. [Citation Graph (, )][DBLP ] Formal Specification and Analysis of Intelligent Network Management System by Using Colored Petri Net. [Citation Graph (, )][DBLP ] Fast Iris Segmentation by Rotation Average Analysis of Intensity-Inversed Image. [Citation Graph (, )][DBLP ] Application of Bayesian Balance for Biding in Power Projects. [Citation Graph (, )][DBLP ] Multi-modal Multi-label Semantic Indexing of Images Using Unlabeled Data. [Citation Graph (, )][DBLP ] Nonlinear Prediction of Network Traffic Measurements Data. [Citation Graph (, )][DBLP ] Design Methods of Multi-DSP Parallel Processing System. [Citation Graph (, )][DBLP ] Globally Exponential Stability of Neural Networks with Impulses and Distributed Delays. [Citation Graph (, )][DBLP ] Exponential Stability of Impulsive Neural Networks with Distributed Delays. [Citation Graph (, )][DBLP ] ZPD-Based Multi-level Teaching Pattern in Software Engineering--A Case Study of Data Structure and Algorithm Course. [Citation Graph (, )][DBLP ] A portable USB-based microphone array device for robust speech recognition. [Citation Graph (, )][DBLP ] A Spatial Decision Support System for Citrus Management - A Case Study of the Three Gorges Area of China. [Citation Graph (, )][DBLP ] Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. [Citation Graph (, )][DBLP ] A Research to Retention Index of Saturated Alcohols Based on RBF Neural Network. [Citation Graph (, )][DBLP ] SPIHT Algorithm Combined with Huffman Encoding. [Citation Graph (, )][DBLP ] The simulation of frequency-capacitance characteristics of fresh water conductivity sensor. [Citation Graph (, )][DBLP ] An Extension of Differential Fault Analysis on AES. [Citation Graph (, )][DBLP ] Analysis of Multiple Objective Decision Methods Based on Entropy Weight. [Citation Graph (, )][DBLP ] Non-degeneracy and uniqueness of periodic solutions for some superlinear beam equations. [Citation Graph (, )][DBLP ] Development of an epitope conservancy analysis tool to facilitate the design of epitope-based diagnostics and vaccines. [Citation Graph (, )][DBLP ] ElliPro: a new structure-based tool for the prediction of antibody epitopes. [Citation Graph (, )][DBLP ] BSMAP: whole genome bisulfite sequence MAPping program. [Citation Graph (, )][DBLP ] An efficient heuristic for adaptive production scheduling and control in one-of-a-kind production. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.040secs