The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dong Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangyang Geng, Linpeng Huang, Dong Li
    Intelligent Data Transferring Based on Semantic Web Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:463-466 [Conf]
  2. Mei Ming, Dong Li, Bo Fu
    kd-Clos: New No-Blocking Permutation Network. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:152-156 [Conf]
  3. Jong Chan Lee, Dong Li, Ki Hong Park, Hong-Jin Kim
    New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:1006-1011 [Conf]
  4. Dong Li, Linpeng Huang, Minglu Li
    LFC-K Cache Replacement Algorithm for Grid Index Information Service (GIIS). [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:795-798 [Conf]
  5. Weisi Lin, Dong Li, Ping Xue
    Discriminative analysis of pixel difference towards picture quality prediction. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2003, pp:193-196 [Conf]
  6. Guozhen Tan, Dong Li, Xiaohui Ping, Ningning Han, Yi Liu
    Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:184-191 [Conf]
  7. Tao Han, He-qing Guo, Dong Li, Ying Gao
    An Evaluation Model for Web Service. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:698-701 [Conf]
  8. Dong Li, Yingxiong Jin, Zhuo Yang, Tao Zhang
    Analysis of Multifibre Renal Sympathetic Nerve Recordings. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:734-739 [Conf]
  9. Jun Wang, Dong Li
    A Light-weight, Temporary File System for Large-scale Web Servers. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2003, pp:96-103 [Conf]
  10. Dong Li, Jun Wang
    eRAID: A Queueing Model Based Energy Saving Policy. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2006, pp:77-86 [Conf]
  11. Dong Li, Linpeng Huang, Minglu Li
    Dynamic Semantic Consistency Checking of Multiple Collaborative Ontologies in Knowledge Management System. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:76-80 [Conf]
  12. Guozhen Tan, Ningning Han, Yi Liu, Hengwei Yao, Dong Li
    Aggregation Tree Routing Algorithm for Dynamic Topology in Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:733-735 [Conf]
  13. Vladimir Vlassov, Dong Li, Konstantin Popov, Seif Haridi
    A Scalable Autonomous Replica Management Framework for Grids. [Citation Graph (0, 0)][DBLP]
    John Vincent Atanasoff Symposium, 2006, pp:33-40 [Conf]
  14. Hailong Cai, Jun Wang, Dong Li, Jitender S. Deogun
    A novel state cache scheme in structured P2P systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:2, pp:154-168 [Journal]
  15. Zhitang Li, Aifang Zhang, Dong Li, Li Wang
    Discovering Novel Multistage Attack Strategies. [Citation Graph (0, 0)][DBLP]
    ADMA, 2007, pp:45-56 [Conf]
  16. Jingjing Liu, Yalou Huang, Dong Li, Fanghao Wu, Bin Li
    A web-based aggregated platform for user-contributed interactive media broadcasting. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2007, pp:541-544 [Conf]
  17. Jingjing Liu, Yalou Huang, Dong Li, Fanghao Wu, Bin Li
    DJ DreamFactory. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2007, pp:465-466 [Conf]
  18. Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma
    Towards Identifying True Threat from Network Security Data. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:160-171 [Conf]
  19. Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li
    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:316-317 [Conf]

  20. Boosting over Groups and Its Application to Acronym-Expansion Extraction. [Citation Graph (, )][DBLP]


  21. Semi-Supervised Graph-Ranking for Text Retrieval. [Citation Graph (, )][DBLP]


  22. The Ontology Relation Extraction for Semantic Web Annotation. [Citation Graph (, )][DBLP]


  23. Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice. [Citation Graph (, )][DBLP]


  24. An Ensemble Approach to Learning to Rank. [Citation Graph (, )][DBLP]


  25. Impulsive Control of T-S Fuzzy Systems. [Citation Graph (, )][DBLP]


  26. The Global Synthetical Processing of Network Security Events. [Citation Graph (, )][DBLP]


  27. Reducing False Positives Based on Time Sequence Analysis. [Citation Graph (, )][DBLP]


  28. A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. [Citation Graph (, )][DBLP]


  29. Hotness-Aware Sensor Networks. [Citation Graph (, )][DBLP]


  30. A FAHP-Based Technology Selection and Specification Methodology. [Citation Graph (, )][DBLP]


  31. Multiple Ranker Method in Document Retrieval. [Citation Graph (, )][DBLP]


  32. Event Detection and Tracking Based on Improved Incremental K-Means and Transductive SVM. [Citation Graph (, )][DBLP]


  33. Researches on Robust Fault-Tolerant Control for Actuator Failures in Time-Varying Delay System. [Citation Graph (, )][DBLP]


  34. Elastic block set reconstruction for face recognition. [Citation Graph (, )][DBLP]


  35. Partially occluded face completion and recognition. [Citation Graph (, )][DBLP]


  36. Gabor Boost Linear Discriminant Analysis for face recognition. [Citation Graph (, )][DBLP]


  37. System-level, thermal-aware, fully-loaded process scheduling. [Citation Graph (, )][DBLP]


  38. Demonstration of a WSN Application in Relic Protection and an Optimized System Deployment Tool. [Citation Graph (, )][DBLP]


  39. Data Warehouse-Based Personalized Information Service Scheme in E-Government. [Citation Graph (, )][DBLP]


  40. EERAID: energy efficient redundant and inexpensive disk array. [Citation Graph (, )][DBLP]


  41. Attack scenario construction with a new sequential mining technique. [Citation Graph (, )][DBLP]


  42. A quadratic lower bound for the permanent and determinant problem over any characteristic != 2. [Citation Graph (, )][DBLP]


  43. EESM Based Link Error Prediction for Adaptive MIMO-OFDM System. [Citation Graph (, )][DBLP]


  44. Enhanced DFT Interpolation-based Channel Estimation for OFDM Systems with Virtual Subcarriers. [Citation Graph (, )][DBLP]


  45. Enhanced Phase-Shifted Pilots Based Channel Estimation for MIMO-OFDM Systems with Virtual Subcarriers. [Citation Graph (, )][DBLP]


  46. A Novel Timing Synchronization Method for Distributed MIMO-OFDM System. [Citation Graph (, )][DBLP]


  47. A Novel Precoding Method for MIMO Systems with Multi-Cell Joint Transmission. [Citation Graph (, )][DBLP]


  48. CG-Cell: An NPB Benchmark Implementation on Cell Broadband Engine. [Citation Graph (, )][DBLP]


  49. A Top-K-based cache model for deep web query. [Citation Graph (, )][DBLP]


  50. PS-GIS: personalized and semantics-based grid information services. [Citation Graph (, )][DBLP]


  51. Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. [Citation Graph (, )][DBLP]


  52. Processing Intrusion Detection Alerts in Large-scale Network. [Citation Graph (, )][DBLP]


  53. A novel double-polarized SFBC-OFDM scheme for ICI suppression. [Citation Graph (, )][DBLP]


  54. Discovering Novel Multistage Attack Patterns in Alert Streams. [Citation Graph (, )][DBLP]


  55. Assessing Attack Threat by the Probability of Following Attacks. [Citation Graph (, )][DBLP]


  56. Research on Mobile SVG Map Service Based on Java Mobile Phone. [Citation Graph (, )][DBLP]


  57. Design and Implementation of XSQS System. [Citation Graph (, )][DBLP]


  58. Conceptual Workflow Verification and Optimization for Artifact-Centric Business Process. [Citation Graph (, )][DBLP]


  59. A Trust Evaluation Model for Web Service Selection. [Citation Graph (, )][DBLP]


  60. A Test Platform for Evaluation of Web Service Composition Algorithm. [Citation Graph (, )][DBLP]


  61. SigFlux: A novel network feature to evaluate the importance of proteins in signal transduction networks. [Citation Graph (, )][DBLP]


  62. Computational identification of rare codons of Escherichia coli based on codon pairs preference. [Citation Graph (, )][DBLP]


  63. Quadratic Lower Bound for Permanent Vs. Determinant in any Characteristic. [Citation Graph (, )][DBLP]


  64. A study for end users' perceptions of business strategic factors among different IS/IT contexts. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002