The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wei Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei Li, Susan Gauch, John M. Gauch, Kok Meng Pua
    VISION: A Digital Video Library. [Citation Graph (1, 0)][DBLP]
    Digital Libraries, 1996, pp:19-27 [Conf]
  2. Wei Li
    Implementing first order logic in Modula-2 using an intuitionistic approach. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1988, pp:27-36 [Conf]
  3. Junzhou Luo, Wei Li, Jiuxin Cao, Liang Ge
    Integrating Heterogeneous E-learning Systems. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:9- [Conf]
  4. Bo Liu, Junzhou Luo, Wei Li
    Multi-Agent Based Network Management Task Decomposition and Scheduling. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:41-46 [Conf]
  5. Wei Li, Maosong Sun
    Incorporating Prior Knowledge into Multi-label Boosting for Cross-Modal Image Annotation and Retrieval. [Citation Graph (0, 0)][DBLP]
    AIRS, 2006, pp:404-415 [Conf]
  6. Wei Li, Kam-Fai Wong, Chunfa Yuan, Wenjie Li, Yunqing Xia
    Improving Text Similarity Measurement by Critical Sentence Vector Model. [Citation Graph (0, 0)][DBLP]
    AIRS, 2005, pp:522-527 [Conf]
  7. Wei Li
    An Inductive Inference System and Its Rationality. [Citation Graph (0, 0)][DBLP]
    AISC, 2006, pp:3-17 [Conf]
  8. Wei Li
    What Is the Right Logical Framework for Evolution of Knowledge. [Citation Graph (0, 0)][DBLP]
    APLAS, 2002, pp:84-94 [Conf]
  9. Wei Li, Harry S. Delugach
    Software Metrics and Application Domain Complexity. [Citation Graph (0, 0)][DBLP]
    APSEC, 1997, pp:513-514 [Conf]
  10. Weifeng Lu, Wei Li
    Information Agency Framework: A Novel Architecture of Internet Information Service. [Citation Graph (0, 0)][DBLP]
    ARCS, 1997, pp:291-300 [Conf]
  11. Fangqing Chu, Wei Li, Junyan Ren
    An implementation of a CMOS down-conversion mixer for GSM1900 receiver. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2006, pp:100-101 [Conf]
  12. Wei Li
    A Logical Framework for Inductive Inference and Its Rationality. [Citation Graph (0, 0)][DBLP]
    Australian Joint Conference on Artificial Intelligence, 1999, pp:304-315 [Conf]
  13. Wei Li, Jeffrey D. Johnson
    A Computational Model of the Role of Deficit-Related Drives in Sequential Movement Learning in a T-Maze Environment. [Citation Graph (0, 0)][DBLP]
    BIBE, 2003, pp:275-275 [Conf]
  14. Jeffrey D. Johnson, D. Plenz, J. Beggs, Wei Li, M. Mieier, N. Miltner, K. Owe
    Analysis of Spontaneous Activity in Cultured Brain Tissue Using the Discrete Wavelet Transfor. [Citation Graph (0, 0)][DBLP]
    BIBE, 2003, pp:60-0 [Conf]
  15. Jan Vandewege, Xing-Zhi Qiu, Brecht Stubbe, Chris Coene, Peter Vaes, Wei Li, Jan Codenie, Claire Martin, B. Hans Slabbinck, Ingrid Van de Voorde, Paolo Solina, Pietro Obino
    A lab demonstration of a SuperPON optical access network. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1998, pp:69-80 [Conf]
  16. Wei Li
    A security engineering process for vulnerability assessment. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:352-357 [Conf]
  17. Wei Li, Rayford B. Vaughn
    Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:26- [Conf]
  18. Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
    BIRD: Binary Interpretation using Runtime Disassembly. [Citation Graph (0, 0)][DBLP]
    CGO, 2006, pp:358-370 [Conf]
  19. Wei Li, Sun Maosong
    Automatic Image Annotation Based on WordNet and Hierarchical Ensembles. [Citation Graph (0, 0)][DBLP]
    CICLing, 2006, pp:417-428 [Conf]
  20. Wei Xu, Wenjie Li, Mingli Wu, Wei Li, Chunfa Yuan
    Deriving Event Relevance from the Ontology Constructed with Formal Concept Analysis. [Citation Graph (0, 0)][DBLP]
    CICLing, 2006, pp:480-489 [Conf]
  21. Jin Zheng, Bo Li, Bing Zhou, Wei Li
    Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:291-296 [Conf]
  22. Wei Li, Maosong Sun
    Semi-supervised Learning for Image Annotation Based on Conditional Random Fields. [Citation Graph (0, 0)][DBLP]
    CIVR, 2006, pp:463-472 [Conf]
  23. Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Yen
    PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:690-695 [Conf]
  24. Wei Li, Gilles Gagnon, Hong Liu, André Vincent
    Throughput Analysis of IP Data Transmission over Terrestrial ATSC DTV Channels. [Citation Graph (0, 0)][DBLP]
    Communication Systems and Applications, 2005, pp:164-169 [Conf]
  25. Junzhou Luo, Wei Li, Bo Liu
    Distributed Intelligent Network Management Model for the Large-Scale Computer Network. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:313-323 [Conf]
  26. Bo Liu, Junzhou Luo, Wei Li
    Semi-online Task Allocation Algorithm among Cooperative Agents. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:488-493 [Conf]
  27. Wei Li, Sudhakar M. Reddy, Irith Pomeranz
    On test generation for transition faults with minimized peak power dissipation. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:504-509 [Conf]
  28. Wei Li, Chaowen Yu, Sudhakar M. Reddy, Irith Pomeranz
    A scan BIST generation method using a markov source and partial bit-fixing. [Citation Graph (0, 0)][DBLP]
    DAC, 2003, pp:554-559 [Conf]
  29. Beibei Ren, Anru Wang, Joyopriya Bakshi, Kai Liu, Wei Li, Wayne Wei-Ming Dai
    A Domain-Specific Cell Based ASIC Design Methodology for Digital Signal Processing Applications. [Citation Graph (0, 0)][DBLP]
    DATE, 2004, pp:280-285 [Conf]
  30. Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
    Accurate and Automated System Call Policy-Based Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:413-424 [Conf]
  31. Srikant Sharma, Jiawu Chen, Wei Li, Kartik Gopalan, Tzi-cker Chiueh
    Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:501-510 [Conf]
  32. Wei Li
    A Logical Framework for Evolution of Specifications. [Citation Graph (0, 0)][DBLP]
    ESOP, 1994, pp:394-408 [Conf]
  33. Wei Li, Dilip K. Banerji
    Routability Prediction for Hierarchical FPGAs. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1999, pp:256-259 [Conf]
  34. Wei Li, Edward B. Allen
    An Access Control Model for Secure Cluster-Computing Environments. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  35. Wei Li, Rayford B. Vaughn
    Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  36. Yinglong Ma, Kehe Wu, Yi Zheng, Wei Li
    Multi-agent Coordination Based on Semantic Approximation. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:510-513 [Conf]
  37. Yunchun Li, Wei Li, Mingfeng Zhang, Chunyan Hou
    An Active Method to Building Dynamic Dependency Model for Distributed Components. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:337-338 [Conf]
  38. Liang Zhang, Guowen Wu, Yanfei Xu, Wei Li, Yang Zhong
    Multilingual Collection Retrieving Via Ontology Alignment. [Citation Graph (0, 0)][DBLP]
    ICADL, 2004, pp:510-514 [Conf]
  39. Craig C. Douglas, Jonathan D. Beezley, Janice L. Coen, Deng Li, Wei Li, Alan K. Mandel, Jan Mandel, Guan Qin, Anthony Vodacek
    Demonstrating the Validity of a Wildfire DDDAS. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2006, pp:522-529 [Conf]
  40. Wei Li, Richard T. Snodgrass, Shiyan Deng, Vineel Kumar Gattu, Aravindan Kasthurirangan
    Efficient Sequenced Integrity Constraint Checking. [Citation Graph (0, 0)][DBLP]
    ICDE, 2001, pp:131-140 [Conf]
  41. Wei Li, Wenhui Zhang, Vincenzo Liberatore, Vince Penkrot, Jonathan Beaver, Mohamed A. Sharaf, Siddhartha Roychowdhury, Panos K. Chrysanthis, Kirk Pruhs
    An Optimized Multicast-based Data Dissemination Middleware. [Citation Graph (0, 0)][DBLP]
    ICDE, 2003, pp:762-764 [Conf]
  42. MingHong Zhou, Rubao Li, Wei Li
    Understanding theWeb Page Layout. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:438-442 [Conf]
  43. Wei Li
    On Auxiliary Algorithm for the Simplex Method by H. Luh and R. Tsaih. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:925-930 [Conf]
  44. Darong Huang, Xiyue Huang, Changcheng Xiang, Wei Li, Yin Zhang
    The Covariance Constraint Control Method of Fault Detect for Complicated Systems. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:580-588 [Conf]
  45. Wei Li, Yupu Yang, Zhong Yang
    T-S Fuzzy Modeling Based on Support Vector Learning. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1294-1299 [Conf]
  46. Olivier Egger, Wei Li
    Very Low Bit Rate Image Coding using Morphological Operators and Adaptive Decompositions. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1994, pp:326-330 [Conf]
  47. Wei Li, Véronique Haese-Coat, Joseph Ronsin
    Quantitative evaluation of detail-preserving and noise-removal abilities of morphological filters. [Citation Graph (0, 0)][DBLP]
    ICIP, 1995, pp:510-513 [Conf]
  48. Sha Guo, Wei Sun, Yi Deng, Wei Li, Qing Liu, Weiping Zhang
    Panther: An Inexpensive and Integrated Multimedia Environment. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1994, pp:382-391 [Conf]
  49. Dong Jiang, Bo Li, Wei Li, Bi Bo, Xue-mei Hu, Jing-jie Li
    Adaptive MPEG-4 video transmission over PSTN using buffer constraints and RTP feedback. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1923-1926 [Conf]
  50. Wei Li, Xue-feng Zhu
    A New Algorithm of Multi-modality Medical Image Fusion Based on Pulse-Coupled Neural Networks. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2005, pp:995-1001 [Conf]
  51. Yan-fei Zhu, Lian-fang Tian, Zong-yuan Mao, Wei Li
    Mixtures of Kernels for SVM Modeling. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2005, pp:601-607 [Conf]
  52. Tzi-cker Chiueh, Kartik Gopalan, Anindya Neogi, Chang Li, Srikant Sharma, Sheng-Ming Shan, Jiawu Chen, Wei Li, Nikolai Joukov, Jie Zhang, Fu-Hau Hsu, Fanglu Guo, Sheng-I Doong
    Sago: A Network Resource Management System for Real-Time Content Distribution. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2002, pp:557-562 [Conf]
  53. Wei Li
    Compiler Cache Optimizations for Banded Matrix Problems. [Citation Graph (0, 0)][DBLP]
    International Conference on Supercomputing, 1995, pp:21-30 [Conf]
  54. Wei Li
    An Interactive Consistency Maintenance System and Its Logical Framework. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1993, pp:100-107 [Conf]
  55. Wei Li, Ningchuan Shen, Ju Wang
    R-calculus: A Logical Approach for Knowledge Base Maintenance. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1994, pp:375-381 [Conf]
  56. Wei Li, Hang Chen, Dharma P. Agrawal
    A Reverse Channel Call Admission Control Scheme Based on Total Received Power for CDMA Systems Supporting Integrated Voice/Data Services. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:335-341 [Conf]
  57. Wei Li
    A Computational Framework for Convergent Agents. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2000, pp:295-300 [Conf]
  58. Wei Li, Kin Lam
    Potential Gains from Global Market Timing Involving Three or More Markets. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:811-815 [Conf]
  59. Wei Li, Hong Liu, Gilles Gagnon
    Integration of an Interactive Multimedia Datacasting System. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:325-334 [Conf]
  60. Wei Li
    A Type-Theoretic Approach to Program Development. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:1133-1138 [Conf]
  61. Xianchang Wang, Huowang Chen, Quingping Zhao, Wei Li
    W - A Logic System Based on the Shared Common Knowledge Views. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1993, pp:410-415 [Conf]
  62. Wei Li, Wenjie Li, Qin Lu, Kam-Fai Wong
    A Preliminary Work on Classifying Time Granularities of Temporal Questions. [Citation Graph (0, 0)][DBLP]
    IJCNLP, 2005, pp:414-425 [Conf]
  63. Wei Li, Sun Maosong
    Automatic Image Annotation Using Maximum Entropy Model. [Citation Graph (0, 0)][DBLP]
    IJCNLP, 2005, pp:34-45 [Conf]
  64. Fanglu Guo, Jiawu Chen, Wei Li, Tzi-cker Chiueh
    Experiences in Building A Multihoming Load Balancing System. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  65. Chaowen Yu, Wei Li, Sudhakar M. Reddy, Irith Pomeranz
    An Improved Markov Source Design for Scan BIST. [Citation Graph (0, 0)][DBLP]
    IOLTS, 2003, pp:106-110 [Conf]
  66. Wei Li, Jiang He, Qingkai Ma, I-Ling Yen, Farokh B. Bastani, Raymond A. Paul
    A Framework to Support Survivable Web Services. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  67. Qingkai Ma, Wei Li, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen
    Survivable Systems Based on an Adaptive NMR Algorithm. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  68. Wenhui Zhang, Wei Li, Vincenzo Liberatore
    Application-Perceived Multicast Push Performance. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  69. Mohammad Alshayeb, Wei Li, Sara J. Graves
    An Empirical Study of Refactoring, New Design, and Error-Fix Efforts in Extreme Programming. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:323-325 [Conf]
  70. Ioana Coman, Andrzej Król, David H. Feiglin, Wei Li, Edward Lipson, James A. Mandel, Karl G. Baum, Mehmet Z. Unlu
    Intermodality Nonrigid Breast-Image Registration. [Citation Graph (0, 0)][DBLP]
    ISBI, 2004, pp:1439-1442 [Conf]
  71. D. Zhou, Wei Li, W. Cai, N. Guo
    An efficient balanced truncation realization algorithm for interconnect model order reduction. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:383-386 [Conf]
  72. Wei Li, Renhui Huang, Jie Bai, Xiue Yuan, Dongxiao Niu
    A New Intelligent Method for Power Load Forecasting. [Citation Graph (0, 0)][DBLP]
    ISDA (1), 2006, pp:1098-1103 [Conf]
  73. Wei Li, Clifford A. Meyer, X. Shirley Liu
    A hidden Markov model for analyzing ChIP-chip experiments on genome tiling arrays and its application to p53 binding sequences. [Citation Graph (0, 0)][DBLP]
    ISMB (Supplement of Bioinformatics), 2005, pp:274-282 [Conf]
  74. Zuoquan Lin, Wei Li
    On Logic of Paradox. [Citation Graph (0, 0)][DBLP]
    ISMVL, 1995, pp:248-0 [Conf]
  75. Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gustaf Jansson
    Building Infrastructure Support for Ubiquitous Context-Aware Systems. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:509-518 [Conf]
  76. Xingfu Wu, Wei Li
    Scalability of Parallel Algorithm Implementation. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:559-561 [Conf]
  77. X. Zeng, D. Zhou, Wei Li
    Buffer insertion for clock delay and skew minimization. [Citation Graph (0, 0)][DBLP]
    ISPD, 1999, pp:36-41 [Conf]
  78. Wei Li, Qiang Li, J. S. Yuan, Joshua McConkey, Yuan Chen, Sundar Chetlur, Jonathan Zhou, A. S. Oates
    Hot-carrier-Induced Circuit Degradation for 0.18 µm CMOS Technology. [Citation Graph (0, 0)][DBLP]
    ISQED, 2001, pp:284-289 [Conf]
  79. Wei Li, Sudhakar M. Reddy, Irith Pomeranz
    On Reducing Peak Current and Power during Test. [Citation Graph (0, 0)][DBLP]
    ISVLSI, 2005, pp:156-161 [Conf]
  80. Wei Li
    Towards a Theory of Epistemic Processes. [Citation Graph (0, 0)][DBLP]
    IWAR, 1992, pp:33-46 [Conf]
  81. Bo Qin, Chuangde Zhang, Zhenghua Fang, Wei Li
    A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  82. Zuoquan Lin, Wei Li
    A Note on Tableaux of Logic of Paradox. [Citation Graph (0, 0)][DBLP]
    KI, 1994, pp:296-307 [Conf]
  83. Wei Li, Qing-lei Meng, Chao-Gang Wu, Wei-Jin Huang
    An embedded 4-channel real-time multimedia coding system. [Citation Graph (0, 0)][DBLP]
    MMM, 2006, pp:- [Conf]
  84. Yongguang Zhang, Wei Li
    An integrated environment for testing mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2002, pp:104-111 [Conf]
  85. Yinglong Ma, Kehe Wu, Beihong Jin, Wei Li
    A Combination Framework for Semantic Based Query Across Multiple Ontologies. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:463-470 [Conf]
  86. Wei Li, Deren Sheng, Jianhong Chen, Zhenfu Yuan, Kefa Cen
    A New Method Based on Immune Algorithm to Solve the Unit Commitment Problem. [Citation Graph (0, 0)][DBLP]
    PROLAMAT, 2006, pp:840-846 [Conf]
  87. Wei Li, Lei Wang
    Real-Time Solution in Petroleum Industry's Cyber Data Acquisition Simulation System. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:369-372 [Conf]
  88. Jin Zhou, Yinglong Ma, Wei Li, Zhilin Wu
    A Formal Framework of UML. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2004, pp:151-157 [Conf]
  89. Sallie M. Henry, Nancy Miller, Wei Li, Joseph Chase, K. Todd Stevens
    Using software development teams in a classroom environment. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1999, pp:356-357 [Conf]
  90. Wei Li, Dengfeng Gao, Richard T. Snodgrass
    Skew handling techniques in sort-merge join. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2002, pp:169-180 [Conf]
  91. Wei Li
    A Theory of Requirements Capture and Its Applications. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1993, pp:406-420 [Conf]
  92. Wei Li, Ari Mozes
    Computing Frequent Itemsets Inside Oracle 10G. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:1253-1256 [Conf]
  93. Wei Li, Seongmoon Wang, Srimat T. Chakradhar, Sudhakar M. Reddy
    Distance Restricted Scan Chain Reordering to Enhance Delay Fault Coverage. [Citation Graph (0, 0)][DBLP]
    VLSI Design, 2005, pp:471-478 [Conf]
  94. Wenbi Rao, Wei Li
    Design of An Open and Secure Ubiquitous Computing System. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:656-659 [Conf]
  95. Shucai Huang, Weimin Li, Wei Li
    Fuzzy Neural Network for Evaluating Sensor Task Priorities. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:415-419 [Conf]
  96. Wei Li, John R. Talburt, Y.-T. Chen
    Quantitatively Evaluate Object Oriented Software Evolution. [Citation Graph (0, 0)][DBLP]
    TOOLS (24), 1997, pp:362-367 [Conf]
  97. Ke Xu, Wei Li
    An Average Analysis of Backtracking on Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2001, v:33, n:1, pp:21-37 [Journal]
  98. Wei Li, Junwen Wang, Jin-An Feng
    NdPASA: a pairwise sequence alignment server for distantly related proteins. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2005, v:21, n:19, pp:3803-3805 [Journal]
  99. Geoff Coulson, Paul Grace, Gordon S. Blair, Wei Cai, Christopher S. Cooper, David A. Duce, Laurent Mathy, Wai Kit Yeung, Barry Porter, Musbah Shahop Sagar, Wei Li
    A component-based middleware framework for configurable and reconfigurable Grid computing. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:8, pp:865-874 [Journal]
  100. Ke Xu, Wei Li
    Exact Phase Transitions in Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  101. Ke Xu, Wei Li
    The SAT Phase Transition [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  102. Ke Xu, Wei Li
    On the Average Similarity Degree between Solutions of Random k-SAT and Random CSPs [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  103. Ke Xu, Wei Li
    An Average Analysis of Backtracking on Random Constraint Satisfaction Problems [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  104. Ke Xu, Wei Li
    Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  105. Wei Li, Shilong Ma, Yuefei Sui, Ke Xu
    A Logical Framework for Convergent Infinite Computations [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  106. Wei Li
    A Development Calculus for Specifications [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  107. Wei Li, Shilong Ma
    Limits of theory sequences over algebraically closed fields and applications. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:136, n:1, pp:23-43 [Journal]
  108. Ke Xu, Wei Li
    On the average similarity degree between solutions of random k-SAT and random CSPs. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:136, n:1, pp:125-149 [Journal]
  109. Wei Li, X. G. Chang, Friedrich M. Wahl, Jay A. Farrell
    Tracking control of a manipulator under uncertainty by FUZZY P+ID controller. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2001, v:122, n:1, pp:125-137 [Journal]
  110. Kaile Su, Wei Li
    Computation of Extensions of Seminormal Default Theories. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1999, v:40, n:1, pp:79-102 [Journal]
  111. Zhiwei Xu, Wei Li, Li Zha, Haiyan Yu, Donghua Liu
    Vega: A Computer Systems Approach to Grid Computing. [Citation Graph (0, 0)][DBLP]
    J. Grid Comput., 2004, v:2, n:2, pp:109-120 [Journal]
  112. Guangwen Yang, Hai Jin, Minglu Li, Nong Xiao, Wei Li, Zhaohui Wu, Yongwei Wu, Feilong Tang
    Grid Computing in China. [Citation Graph (0, 0)][DBLP]
    J. Grid Comput., 2004, v:2, n:2, pp:193-206 [Journal]
  113. Rong Yao (Frank) Fu, Hui Su, James C. Fletcher, Wei Li, Xiao Xi Liu, Shi Wan Zhao, Chang Yan Chi
    A framework for device capability on demand and virtual device user experience. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2004, v:48, n:5-6, pp:635-648 [Journal]
  114. Cheng Niu, Wei Li, Jihong Ding, Rohini K. Srihari
    Orthographic case restoration using supervised learning without manual annotation. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 2004, v:13, n:1, pp:141-156 [Journal]
  115. Wei Li, G. P. Steven, Y. M. Xie
    Shape Design for Two- and Three-Dimensional Contact Problems Using an Evolutionary Method. [Citation Graph (0, 0)][DBLP]
    International Journal of Computational Engineering Science, 2001, v:2, n:2, pp:181-198 [Journal]
  116. Wei Li, Nasser M. Nasrabadi
    Invariant Object Recognition Based on A Neural Network of Cascaded RCE Nets. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 1993, v:7, n:4, pp:815-829 [Journal]
  117. Wei Li, Letha H. Etzkorn, Carl G. Davis, John R. Talburt
    An empirical study of object-oriented system evolution. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2000, v:42, n:6, pp:373-381 [Journal]
  118. Mohammad Alshayeb, Wei Li
    An empirical study of relationships among extreme programming engineering activities. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:11, pp:1068-1072 [Journal]
  119. Ke Xu, Wei Li
    Exact Phase Transitions in Random Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP]
    J. Artif. Intell. Res. (JAIR), 2000, v:12, n:, pp:93-103 [Journal]
  120. Jing Ma, Shuhua Li, Wei Li
    A multireference configuration interaction method based on the separated electron pair wave functions. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Chemistry, 2006, v:27, n:1, pp:39-47 [Journal]
  121. Yili Gong, Fangpeng Dong, Wei Li, Zhiwei Xu
    VEGA Infrastructure for Resource Discovery in Grids. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:4, pp:413-422 [Journal]
  122. Bo Li, Wei Li, Yaming Tu
    A Fast Block-Matching Algorithm Using Smooth Motion Vector Field Adaptive Search Technique. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:1, pp:14-21 [Journal]
  123. Shangmin Luan, Guozhong Dai, Wei Li
    A Programmable Approach to Maintenance of a Finite Knowledge Base. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:1, pp:102-108 [Journal]
  124. Wei Li, Shangmin Luan
    Operational and Complete Approaches to Belief Revision. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2000, v:15, n:3, pp:202-212 [Journal]
  125. Aoying Zhou, Wei Li, Yu Fang
    Effective Discovery of Exception Class Association Rules. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:3, pp:304-313 [Journal]
  126. Jagdish Bansiya, Letha H. Etzkorn, Carl G. Davis, Wei Li
    A Class Cohesion Metric For Object-Oriented Designs. [Citation Graph (0, 0)][DBLP]
    JOOP, 1999, v:11, n:8, pp:47-52 [Journal]
  127. Letha H. Etzkorn, Carl G. Davis, Wei Li
    A Practical Look at the Lack of Cohesion in Methods Metric. [Citation Graph (0, 0)][DBLP]
    JOOP, 1998, v:11, n:5, pp:27-34 [Journal]
  128. Wei Li
    An Empirical Study of Object Analysis and Design. [Citation Graph (0, 0)][DBLP]
    JOOP, 1997, v:9, n:8, pp:44-47 [Journal]
  129. Wei Li, Sallie M. Henry, Dennis G. Kafura, Robert S. Schulman
    Measuring Object-Oriented Design. [Citation Graph (0, 0)][DBLP]
    JOOP, 1995, v:8, n:4, pp:48-55 [Journal]
  130. Wei Li, John R. Talburt
    Empirically Analyzing Object-Oriented Software Evolution. [Citation Graph (0, 0)][DBLP]
    JOOP, 1998, v:11, n:5, pp:15-19 [Journal]
  131. Mohammed Javeed Zaki, Wei Li, Srinivasan Parthasarathy
    Customized Dynamic Load Balancing for a Network of Workstations. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1997, v:43, n:2, pp:156-162 [Journal]
  132. Mohammad Alshayeb, Wei Li
    An empirical study of system design instability metric and design evolution in an agile software process. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:74, n:3, pp:269-274 [Journal]
  133. Wei Li
    Another metric suite for object-oriented programming. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:44, n:2, pp:155-162 [Journal]
  134. Wei Li, Sallie M. Henry
    Object-oriented metrics that predict maintainability. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1993, v:23, n:2, pp:111-122 [Journal]
  135. Srinivasan Parthasarathy, Mohammed Javeed Zaki, Mitsunori Ogihara, Wei Li
    Parallel Data Mining for Association Rules on Shared-Memory Systems. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2001, v:3, n:1, pp:1-29 [Journal]
  136. Minjie Zhang, Wei Li
    Identifying potential synthesis cases in distributed expert systems: a fuzzy logic approach. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2001, v:14, n:7, pp:359-365 [Journal]
  137. Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M. Lavery, Wei Li, Chu-Cheow Lim, John Ng, David C. Sehr
    An Advanced Optimizer for the IA-64 Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2000, v:20, n:6, pp:60-68 [Journal]
  138. Wei Li, Jocelyn E. Shaw
    A variant Tc4 transposable element in the nematode C. elegans could encode a novel protein. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 1993, v:21, n:1, pp:59-67 [Journal]
  139. Xuwo Ji, Wei Li, Jun Song, Liping Wei, X. Shirley Liu
    CEAS: cis-regulatory element annotation system. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2006, v:34, n:Web-Server-Issue, pp:551-554 [Journal]
  140. Wei Li, Xiaohu Huang, Nanning Zheng
    Parallel Implementing OpenGL on PVM. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:23, n:12, pp:1839-1850 [Journal]
  141. Attahiru Sule Alfa, Wei Li
    Optimal (N, T)-policy for M/G/1 system with cost structures. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2000, v:42, n:4, pp:265-277 [Journal]
  142. Wei Li, Véronique Haese-Coat, Joseph Ronsin
    Residues of morphological filtering by reconstruction for texture classification. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1997, v:30, n:7, pp:1081-1093 [Journal]
  143. Wei Li, Goutao Lu, Yongqiang Wang
    Recognizing white line markings for vision-guided vehicle navigation by fuzzy reasoning. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1997, v:18, n:8, pp:771-780 [Journal]
  144. Yiqiang Q. Zhao, Wei Li, W. John Braun
    Correction to: On a decomposition for infinite stochastic matrices. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2000, v:35, n:1-4, pp:399- [Journal]
  145. Yiqiang Q. Zhao, Wei Li, W. John Braun
    On a decomposition for infinite transition matrices. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1997, v:27, n:1-2, pp:127-130 [Journal]
  146. Wei Li, Hilmar Jaschek, Dieter Wloka
    Modifizierung des Roberts' Algorithmus zur graphischen Darstellung von Robotern. [Citation Graph (0, 0)][DBLP]
    Robotersysteme, 1990, v:6, n:, pp:76-80 [Journal]
  147. Wei Li
    Schnelle Abbildung von Hindernissen in den Konfigurationsraum. [Citation Graph (0, 0)][DBLP]
    Robotersysteme, 1991, v:7, n:, pp:148-154 [Journal]
  148. Wei Li
    Automatische Bestimmung kollisionsfreier Bewegungsbahnen für Industrieroboter. [Citation Graph (0, 0)][DBLP]
    Robotersysteme, 1990, v:6, n:, pp:218-224 [Journal]
  149. Wei Li, Gansheng Li
    Making C++ Concurrent and Real-time. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1997, v:32, n:9, pp:39-46 [Journal]
  150. Hector M. Olague, Letha H. Etzkorn, Wei Li, Glenn W. Cox
    Assessing design instability in iterative (agile) object-oriented projects. [Citation Graph (0, 0)][DBLP]
    Journal of Software Maintenance, 2006, v:18, n:4, pp:237-266 [Journal]
  151. Bruce Greer, John Harrison, Greg Henry, Wei Li, Peter Tang
    Scientific computing on the Itanium® processor. [Citation Graph (0, 0)][DBLP]
    Scientific Programming, 2002, v:10, n:4, pp:329-337 [Journal]
  152. Wei Li, Andrew McCallum
    Rapid development of Hindi named entity recognition using conditional random fields and feature induction. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Asian Lang. Inf. Process., 2003, v:2, n:3, pp:290-294 [Journal]
  153. Xiuli Chao, Wei Li
    Performance analysis of a cellular network with multiple classes of calls. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:9, pp:1542-1550 [Journal]
  154. Hao Zhang, Wei Li, T. Aaron Gulliver
    Pulse Position Amplitude Modulation for Time-Hopping Multiple-Access UWB Communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:8, pp:1269-1273 [Journal]
  155. Ke Xu, Wei Li
    Many hard examples in exact phase transitions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:355, n:3, pp:291-302 [Journal]
  156. Shensheng Tang, Wei Li
    Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2006, v:32, n:1, pp:71-91 [Journal]
  157. Wei Li, Kazuo Tanaka, Hua O. Wang
    Acrobatic control of a pendubot. [Citation Graph (0, 0)][DBLP]
    IEEE T. Fuzzy Systems, 2004, v:12, n:4, pp:549-554 [Journal]
  158. Olivier Egger, Wei Li
    Subband coding of images using asymmetrical filter banks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1995, v:4, n:4, pp:478-485 [Journal]
  159. Wei Li, Xiangyang Xue, Peizhong Lu
    Localized audio watermarking technique robust against time-scale modification. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:60-69 [Journal]
  160. Wei Li, Keshav Pingali
    Access Normalization: Loop Restructuring for NUMA Compilers. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1993, v:11, n:4, pp:353-375 [Journal]
  161. Wei Li, Daniel Blakely, Scott Van Sooy, Keven Dunn, David Kidd, Robert Rogenmoser, Dian Zhou
    LVS verification across multiple power domains for a quad-core microprocessor. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Design Autom. Electr. Syst., 2006, v:11, n:2, pp:490-500 [Journal]
  162. Wei Li, Xiuli Chao
    Modeling and performance evaluation of a cellular mobile network. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:131-145 [Journal]
  163. Mohammad Alshayeb, Wei Li
    An Empirical Validation of Object-Oriented Metrics in Two Different Iterative Software Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:11, pp:1043-1049 [Journal]
  164. Jay A. Farrell, Shuo Pang, Wei Li
    Plume mapping via hidden Markov methods. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2003, v:33, n:6, pp:850-863 [Journal]
  165. Wei Li, X. G. Chang, Jay A. Farrell, Friedrich M. Wahl
    Design of an enhanced hybrid fuzzy P+ID controller for a mechanical manipulator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2001, v:31, n:6, pp:938-945 [Journal]
  166. Xiaoming Wei, Wei Li, Klaus Mueller, Arie E. Kaufman
    The Lattice-Boltzmann Method for Simulating Gaseous Phenomena. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2004, v:10, n:2, pp:164-176 [Journal]
  167. Xiaoming Wei, Ye Zhao, Zhe Fan, Wei Li, Feng Qiu, Suzanne Yoakum-Stover, Arie E. Kaufman
    Lattice-Based Flow Field Modeling. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2004, v:10, n:6, pp:719-729 [Journal]
  168. Shijie Cai, Wei Li, Honggang Zhang
    A visual tool for user-interface development. [Citation Graph (0, 0)][DBLP]
    The Visual Computer, 1992, v:8, n:2, pp:134-143 [Journal]
  169. Wei Li, Xiaoming Wei, Arie E. Kaufman
    Implementing lattice Boltzmann computation on graphics hardware. [Citation Graph (0, 0)][DBLP]
    The Visual Computer, 2003, v:19, n:7-8, pp:444-456 [Journal]
  170. Wei Li, Daehyoung Hong, Demetrios Kazakos, Li-Chun Wang
    Special issue: modeling and performance evaluation of radio resource QoS for next-generation wireless and mobile networks. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:863-866 [Journal]
  171. Attahiru Sule Alfa, Wei Li
    A Homogeneous PCS network with Markov Call Arrival Process and Phase Type Cell Residence Time. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:6, pp:597-605 [Journal]
  172. Wei Li
    Practical criteria for positive-definite matrix, M-matrix and Hurwitz matrix. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:1, pp:397-401 [Journal]
  173. Wei Li, Rong Zhang, Zhengkai Liu, Huijing Zhao, Ryosuke Shibasaki
    An approach of laser-based vehicle monitor. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:2, pp:953-962 [Journal]
  174. Cher Ming Tan, Wei Li, Kok Tong Tan, Frankie Low
    Development of highly accelerated electromigration test. [Citation Graph (0, 0)][DBLP]
    Microelectronics Reliability, 2006, v:46, n:9-11, pp:1638-1642 [Journal]
  175. Wei Li
    A note on two direct methods in linear programming. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2004, v:158, n:1, pp:262-265 [Journal]
  176. Wei Li, Vincent Arena, Nancy B. Sussman, Sati Mazumdar
    Model validation software for classification models using repeated partitioning: MVREP. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2003, v:72, n:1, pp:81-87 [Journal]
  177. Wei Li, Sati Mazumdar, Vincent Arena, Nancy B. Sussman
    A resampling approach for adjustment in prediction models for covariate measurement error. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2005, v:77, n:3, pp:199-207 [Journal]
  178. Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
    How to Automatically and Accurately Sandbox Microsoft IIS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:213-222 [Conf]
  179. Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
    Foreign Code Detection on the Windows/X86 Platform. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:279-288 [Conf]
  180. Wei Li, Zibin Dai, Tao Chen, Tao Meng, Xuan Yang
    Design and Implementation of a High-Speed Reconfigurable Modular Arithmetic Unit. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:50-59 [Conf]
  181. Shaohua Liu, Junsheng Yu, Yuan'an Liu, Jun Wei, Peng Gao, Wei Li, Jiani Ma
    Make Highly Clustered Grid a Small World with Shorter Diameter. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:109-116 [Conf]
  182. Xin Zhang, Bin Liu, Wei Li, Y. Xi, D. Bermingham, Xiaojun Wang
    IPv6-Oriented 4*OC768 Packet Classification with Deriving-Merging Partition and Field-Variable Encoding Algorithm. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  183. Zhujin Zhou, Ning Li, Wei Li, Junyan Ren
    A Power-Optimized CMOS Quadrature VCO with Wide-Tuning Range for UWB Receivers. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:437-440 [Conf]
  184. Kangshun Li, Wei Li, Zhangxin Chen, Feng Wang
    A Particle Gradient Evolutionary Algorithm Based on Statistical Mechanics and Convergence Analysis. [Citation Graph (0, 0)][DBLP]
    VECPAR, 2006, pp:530-543 [Conf]
  185. Wei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal
    Resource allocation for handoffs in integrated wireless cellular networks. [Citation Graph (0, 0)][DBLP]
    ISICT, 2004, pp:238-243 [Conf]
  186. Jun S. Song, Kaveh Maghsoudi, Wei Li, Edward Fox, John Quackenbush, X. Shirley Liu
    Microarray blob-defect removal improves array analysis. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2007, v:23, n:8, pp:966-971 [Journal]
  187. Wei Li
    R-Calculus: An Inference System for Belief Revision. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2007, v:50, n:4, pp:378-390 [Journal]
  188. Wei Li, Raed Shatnawi
    An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1120-1128 [Journal]

  189. Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. [Citation Graph (, )][DBLP]


  190. Research on the Reconstruction Technology of Diagnosis Sytstem Based on Immune Mechanism. [Citation Graph (, )][DBLP]


  191. Applied Research in Fuzzy Neural Network Predictive Control. [Citation Graph (, )][DBLP]


  192. Gait Recognition Using Procrustes Shape Analysis and Shape Context. [Citation Graph (, )][DBLP]


  193. Automated Format String Attack Prevention for Win32/X86 Binaries. [Citation Graph (, )][DBLP]


  194. A Comparison of Three Programming Models for Telecom Service Composition. [Citation Graph (, )][DBLP]


  195. SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments. [Citation Graph (, )][DBLP]


  196. UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent. [Citation Graph (, )][DBLP]


  197. Polony Identification Using the EM Algorithm Based on a Gaussian Mixture Model. [Citation Graph (, )][DBLP]


  198. xMAN: extreme MApping of oligoNucleotides. [Citation Graph (, )][DBLP]


  199. Efficient Update on Exploitation Graphs for Vulnerability Analysis. [Citation Graph (, )][DBLP]


  200. Using Exploit Similarities for Concise Representation of Attack Scenarios. [Citation Graph (, )][DBLP]


  201. Using Ponder as a Standard Security Specification Language in Heterogeneous Networks. [Citation Graph (, )][DBLP]


  202. A Space-Efficient Approach to Consistency Check of Firewall Rules. [Citation Graph (, )][DBLP]


  203. Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme. [Citation Graph (, )][DBLP]


  204. A Text-Based Approach to the ImageCLEF 2010 Photo Annotation Task. [Citation Graph (, )][DBLP]


  205. Research on Shared Objects Cooperative Manipulating Systems. [Citation Graph (, )][DBLP]


  206. Application of improved grey prediction model for power load forecasting. [Citation Graph (, )][DBLP]


  207. Distributed network self-management model based on CSCW. [Citation Graph (, )][DBLP]


  208. Phishpin: An Integrated Anti-Phishing Framework. [Citation Graph (, )][DBLP]


  209. Uncertain Measure of Knowledge Based on Generalized Rough Sets in Incomplete Infomration Systems. [Citation Graph (, )][DBLP]


  210. Methods of Chlorophyll Concentration Retrieval. [Citation Graph (, )][DBLP]


  211. A Supervised Algorithm for Fuzzy Multi-criteria Decision Making. [Citation Graph (, )][DBLP]


  212. Optimizing Schemas of Flood Control and Disaster Reduction Engineering Based on Variable Fuzzy Sets Theory. [Citation Graph (, )][DBLP]


  213. A Hybrid Method of Feature Selection for Chinese Text Sentiment Classification. [Citation Graph (, )][DBLP]


  214. A Model Combined Fuzzy Optimum Theory with Analytical Hierarchy Process for Engineering Design. [Citation Graph (, )][DBLP]


  215. The Fuzzy Binomial Option Pricing Model under Knightian Uncertainty. [Citation Graph (, )][DBLP]


  216. Optimization Model for Locating City Fire Stations Based on Fuzzy Matter-Element Analysis. [Citation Graph (, )][DBLP]


  217. Algorithm for Interval Quadratic Programming with Equality Constraints. [Citation Graph (, )][DBLP]


  218. Adaptive Background Updating Algorithm in Complex Scene. [Citation Graph (, )][DBLP]


  219. An Efficient Moving Object Detection Algorithm Using Multi-mask. [Citation Graph (, )][DBLP]


  220. Cooperation strategy for robot soccer based on defuzzification. [Citation Graph (, )][DBLP]


  221. A Real-Time Scheduling Strategy Based on Priority in Data Stream System. [Citation Graph (, )][DBLP]


  222. Traffic Shaping in BitTorrent Systems by Centralized Hierarchical Peer-Node Assignment. [Citation Graph (, )][DBLP]


  223. An Evolutionary Topology Unaware TDMA MAC Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  224. p-Cycle Network Design for Specified Minimum Dual-Failure Restorability. [Citation Graph (, )][DBLP]


  225. Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. [Citation Graph (, )][DBLP]


  226. Analytical thermal placement for VLSI lifetime improvement and minimum performance variation. [Citation Graph (, )][DBLP]


  227. Design and Analysis of a New GPS Algorithm. [Citation Graph (, )][DBLP]


  228. NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network. [Citation Graph (, )][DBLP]


  229. HSN-PAM: Finding Hierarchical Probabilistic Groups from Large-Scale Networks. [Citation Graph (, )][DBLP]


  230. Growing Algorithm of Laguerre Orthogonal Basis Neural Network with Weights Directly Determined. [Citation Graph (, )][DBLP]


  231. A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling. [Citation Graph (, )][DBLP]


  232. Multi-layer Ensemble Classifiers on Protein Secondary Structure Prediction. [Citation Graph (, )][DBLP]


  233. Contour tracking with abrupt motion. [Citation Graph (, )][DBLP]


  234. Saliency-based automatic target detection in forward looking infrared images. [Citation Graph (, )][DBLP]


  235. Principal line based ICP alignment for palmprint verification. [Citation Graph (, )][DBLP]


  236. New iterative schemes for equilibrium problems and fixed point problems of nonspreading mappings and nonexpansive mappings. [Citation Graph (, )][DBLP]


  237. The topology and test technology of Digitally Controlled Potentiometers. [Citation Graph (, )][DBLP]


  238. Research on Magnetic Flux Leakage Signals Quantity Technology of Tank Floor Corrosion Defects Based on Artificial Neural Network. [Citation Graph (, )][DBLP]


  239. Predicting Protein Structural Class Based on Ensemble Binary Classification. [Citation Graph (, )][DBLP]


  240. A Fuzzy Context Neural Network Classifier for Land Cover Classification. [Citation Graph (, )][DBLP]


  241. Analysis and correction of the nonuniformity of light field in the high resolution X-ray digital radiography. [Citation Graph (, )][DBLP]


  242. Chinese video characters recognition based on cluster and multi neural network. [Citation Graph (, )][DBLP]


  243. Automatic pavement cracks detection system based on Visual Studio C++ 6.0. [Citation Graph (, )][DBLP]


  244. COX-2 activity prediction in Chinese medicine using neural network based ensemble learning methods. [Citation Graph (, )][DBLP]


  245. Control information description model and processing mechanism in the trustworthy and controllable network. [Citation Graph (, )][DBLP]


  246. Network Traffic Classification Using K-means Clustering. [Citation Graph (, )][DBLP]


  247. A novel distribution signaling protocol based on mobile agents and obs for intelligent optical networks. [Citation Graph (, )][DBLP]


  248. Quality Assessment of Video Content for HD IPTV Applications. [Citation Graph (, )][DBLP]


  249. A Practical Clustering Algorithm. [Citation Graph (, )][DBLP]


  250. Primary Research on Urban Mass Panic Based on Computational Methods for Experiments. [Citation Graph (, )][DBLP]


  251. Enlargement of Measurement Range in a Fiber-Optic Ice Sensor by Artificial Neural Network. [Citation Graph (, )][DBLP]


  252. Practical Criss-Cross Method for Linear Programming. [Citation Graph (, )][DBLP]


  253. Globally Exponential Stability of a Class of Neural Networks with Impulses and Variable Delays. [Citation Graph (, )][DBLP]


  254. Global Exponential Stability of BAM Type Cohen-Grossberg Neural Network with Delays on Time Scales. [Citation Graph (, )][DBLP]


  255. A Novel Level Set Based Shape Prior Method for Liver Segmentation from MRI Images. [Citation Graph (, )][DBLP]


  256. Optimal Data Rate and Opportunistic Scheme on Network Coding over Rayleigh Fading Channels. [Citation Graph (, )][DBLP]


  257. Multi-modal Multi-label Semantic Indexing of Images Based on Hybrid Ensemble Learning. [Citation Graph (, )][DBLP]


  258. Key Elements Tracing Method for Parallel XML Parsing in Multi-Core System. [Citation Graph (, )][DBLP]


  259. Improving the Performance of Service-based Applications by Dynamic Service Execution. [Citation Graph (, )][DBLP]


  260. Inference of Isoforms from Short Sequence Reads. [Citation Graph (, )][DBLP]


  261. Mining functional associated patterns from biological network data. [Citation Graph (, )][DBLP]


  262. An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP]


  263. An Experimental Approach to Prove Metrics Properties. [Citation Graph (, )][DBLP]


  264. A GPU-based voxelization approach to 3D Minkowski sum computation. [Citation Graph (, )][DBLP]


  265. Risk Assessment of Marine Traffic Environment Using Unascertained Quantity. [Citation Graph (, )][DBLP]


  266. Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. [Citation Graph (, )][DBLP]


  267. Research on the Knowledge-based Decision Support System for the Safety of Rockets. [Citation Graph (, )][DBLP]


  268. CommunityCommands: command recommendations for software applications. [Citation Graph (, )][DBLP]


  269. An Affinity Path Based Wireless Broadcast Scheduling Approach for Multi-item Queries. [Citation Graph (, )][DBLP]


  270. Towards Small World for Collaborative Enterprises in Grid. [Citation Graph (, )][DBLP]


  271. The recurrence dynamics of social tagging. [Citation Graph (, )][DBLP]


  272. Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs. [Citation Graph (, )][DBLP]


  273. Objective Evaluation of Seam Pucker Using an Adaptive Neuro-Fuzzy Inference System. [Citation Graph (, )][DBLP]


  274. HTML integrity authentication based on fragile digital watermarking. [Citation Graph (, )][DBLP]


  275. Using Feature Component for Spatial Data Modeling of GIS. [Citation Graph (, )][DBLP]


  276. Performance of OFDM System on Link Simulation with Measured Outdoor Channels at 3.5GHz. [Citation Graph (, )][DBLP]


  277. A Logical Framework for Software Testing. [Citation Graph (, )][DBLP]


  278. Modeling Hysteresis in Piezo Actuator Based on Neural Networks. [Citation Graph (, )][DBLP]


  279. Long Distance Optical Wireless Network Employing Multiple Access Scheme. [Citation Graph (, )][DBLP]


  280. A Combination Scheme of Topology Control and Channel Assignment in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  281. A Neural Network Approach to Objective Evaluation of Seam Pucker. [Citation Graph (, )][DBLP]


  282. Cellular automata based models of wireless sensor networks. [Citation Graph (, )][DBLP]


  283. Short-Term Power Load Forecasting Using Improved Ant Colony Clustering. [Citation Graph (, )][DBLP]


  284. A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication. [Citation Graph (, )][DBLP]


  285. A Three-Dimensional Method for Detection of Pulmonary Nodule. [Citation Graph (, )][DBLP]


  286. Accurate Application-Specific Sandboxing for Win32/Intel Binaries. [Citation Graph (, )][DBLP]


  287. A trust-incentive-based combinatorial double auction algorithm. [Citation Graph (, )][DBLP]


  288. A Verifying Method of Controller Synthesis. [Citation Graph (, )][DBLP]


  289. A new kind of real-time control scheduling algorithm. [Citation Graph (, )][DBLP]


  290. An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  291. Low-complexity implementation of PN correlator for wireless transmission systems. [Citation Graph (, )][DBLP]


  292. Automatic Chinese Term Extraction based on Cognition Theory. [Citation Graph (, )][DBLP]


  293. Safety Assessment Modelling Based on Recipe Engineering for Power Plants. [Citation Graph (, )][DBLP]


  294. Efficient Shot Boundary Detection Based on Scale Invariant Features. [Citation Graph (, )][DBLP]


  295. Comparing Networks from a Data Analysis Perspective. [Citation Graph (, )][DBLP]


  296. Integrated design of an observer-based fault detection system over unreliable digital channels. [Citation Graph (, )][DBLP]


  297. Optimal Hi=Hinfinity fault detection filter design: An iterative LMI approach. [Citation Graph (, )][DBLP]


  298. Photon tunneling and mode selection due to the absorptive layers. [Citation Graph (, )][DBLP]


  299. Formal Specification and Analysis of Intelligent Network Management System by Using Colored Petri Net. [Citation Graph (, )][DBLP]


  300. Fast Iris Segmentation by Rotation Average Analysis of Intensity-Inversed Image. [Citation Graph (, )][DBLP]


  301. Application of Bayesian Balance for Biding in Power Projects. [Citation Graph (, )][DBLP]


  302. Multi-modal Multi-label Semantic Indexing of Images Using Unlabeled Data. [Citation Graph (, )][DBLP]


  303. Nonlinear Prediction of Network Traffic Measurements Data. [Citation Graph (, )][DBLP]


  304. Design Methods of Multi-DSP Parallel Processing System. [Citation Graph (, )][DBLP]


  305. Globally Exponential Stability of Neural Networks with Impulses and Distributed Delays. [Citation Graph (, )][DBLP]


  306. Exponential Stability of Impulsive Neural Networks with Distributed Delays. [Citation Graph (, )][DBLP]


  307. ZPD-Based Multi-level Teaching Pattern in Software Engineering--A Case Study of Data Structure and Algorithm Course. [Citation Graph (, )][DBLP]


  308. A portable USB-based microphone array device for robust speech recognition. [Citation Graph (, )][DBLP]


  309. A Spatial Decision Support System for Citrus Management - A Case Study of the Three Gorges Area of China. [Citation Graph (, )][DBLP]


  310. Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. [Citation Graph (, )][DBLP]


  311. A Research to Retention Index of Saturated Alcohols Based on RBF Neural Network. [Citation Graph (, )][DBLP]


  312. SPIHT Algorithm Combined with Huffman Encoding. [Citation Graph (, )][DBLP]


  313. The simulation of frequency-capacitance characteristics of fresh water conductivity sensor. [Citation Graph (, )][DBLP]


  314. An Extension of Differential Fault Analysis on AES. [Citation Graph (, )][DBLP]


  315. Analysis of Multiple Objective Decision Methods Based on Entropy Weight. [Citation Graph (, )][DBLP]


  316. Non-degeneracy and uniqueness of periodic solutions for some superlinear beam equations. [Citation Graph (, )][DBLP]


  317. Development of an epitope conservancy analysis tool to facilitate the design of epitope-based diagnostics and vaccines. [Citation Graph (, )][DBLP]


  318. ElliPro: a new structure-based tool for the prediction of antibody epitopes. [Citation Graph (, )][DBLP]


  319. BSMAP: whole genome bisulfite sequence MAPping program. [Citation Graph (, )][DBLP]


  320. An efficient heuristic for adaptive production scheduling and control in one-of-a-kind production. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002