University of Oregon, Ph.D. UCLA
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
191 | EE | Toby Ehrenkranz, Jun Li: On the state of IP spoofing defense. ACM Trans. Internet Techn. 9(2): (2009) |
190 | EE | Li Tang, Jun Li, Yanda Li, Scott Shenker: An investigation of the Internet's IP-layer connectivity. Computer Communications 32(5): 913-926 (2009) |
189 | EE | Ming Jin, Guisheng Liao, Jun Li: Joint DOD and DOA estimation for bistatic MIMO radar. Signal Processing 89(2): 244-251 (2009) |
2008 | ||
188 | EE | Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo Xue, Jun Li: Towards effective network algorithms on multi-core network processors. ANCS 2008: 125-126 |
187 | EE | Jin Sun, Yue Huang, Jun Li, Janet Meiling Wang: Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty. ASP-DAC 2008: 531-536 |
186 | EE | Yang Li, Jun Li, Hongbo Zhang, Yongsheng Su: Microbubble Suspensions Prepared via Electrohydrodynamic Jetting Process. BMEI (2) 2008: 445-449 |
185 | EE | Jhilmil Jain, Ismail Ari, Jun Li: Understanding the challenges faced during the management of data mining models. CHIMIT 2008: 11 |
184 | EE | Jhilmil Jain, Ismail Ari, Jun Li: Designing dashboards for managing model lifecycle. CHIMIT 2008: 12 |
183 | EE | Xiuyan Guo, Jun Li, Jian Yang, Jinlin Wang: The Research on Dynamic Replication and Placement of File Using Dual-Threshold Dynamic File Migration Algorithm. CSSE (3) 2008: 236-240 |
182 | EE | Ju-Chao Zhuo, Jun Li, Gang Wu, Li-Yue Zhu: A Novel Data Replication and Placement Scheme for Time-Shifted TV Cluster. CSSE (3) 2008: 241-245 |
181 | EE | Peihe Tang, Jun Li, Qiong Wei, Yousuo J. Zou: Some Misunderstandings and Reflections on Multi-media CAI. CSSE (5) 2008: 1361-1364 |
180 | EE | Haoliang Qi, Xiaoning He, Muyun Yang, Jun Li, Guohua Lei, Zhongyuan Han, Sheng Li: Online Linear Discriminative Learning for Spam Filter. FSKD (2) 2008: 306-309 |
179 | EE | Jun Li, Shunyi Zhang, Yanqing Lu, Junrong Yan: Real-Time P2P Traffic Identification. GLOBECOM 2008: 2474-2478 |
178 | EE | Jun Li, Wen Chen, Xinbing Wang: Complex Field Network Coding for Wireless Cooperative Multicast Flows. GLOBECOM 2008: 4604-4608 |
177 | EE | Jun Li, Wen Zhang, Xiaomei Li: An Adaptive Refinement Ratio Algorithm for Structured AMR Method Based on SAMRAI Framework. HPCC 2008: 907-912 |
176 | EE | Hwee Keong Lam, Zujun Hou, Wei-Yun Yau, Tai Pang Chen, Jun Li: A systematic topological method for fingerprint singular point detection. ICARCV 2008: 967-972 |
175 | EE | Jun Li, Wen Chen, Cheng Zhao, Xiaoting Yang, Xinbing Wang: On the Throughput-Reliability Tradeoff Analysis in Amplify-and-Forward Cooperative Channels. ICC 2008: 1034-1038 |
174 | EE | Jing Liu, Xinming Ye, Jun Zhang, Jun Li: Security Verification of 802.11i 4-Way Handshake Protocol. ICC 2008: 1642-1647 |
173 | EE | Haitao Zhao, Yong Xi, Jibo Wei, Jun Li: A Typical Cooperative MIMO Scheme in Wireless Ad Hoc Networks and Its Channel Capacity. ICC 2008: 4644-4648 |
172 | EE | Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, Jun Li: Fast Path Session Creation on Network Processors. ICDCS 2008: 573-580 |
171 | EE | Yin Chen, Li Tang, Jun Li: Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. ICDCS Workshops 2008: 465-470 |
170 | EE | Jun Li, Pengwei Hao, Chao Zhang, Mingsong Dou: Hallucinating faces from thermal infrared images. ICIP 2008: 465-468 |
169 | EE | Xin Zhou, Bo Xu, Yaxuan Qi, Jun Li: MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications. ICN 2008: 256-261 |
168 | EE | Jun Li, Wei-Yun Yau, Jian-Gang Wang, Wee Ser: Bi-model tracking of object of interest using invariant spatiogram descriptor. ICPR 2008: 1-4 |
167 | EE | Zujun Hou, Jun Li, Hwee Keong Lam, Tai Pang Chen, Hee Lin Wang, Wei-Yun Yau: Fingerprint orientation analysis with topological modeling. ICPR 2008: 1-4 |
166 | EE | Hao Chen, Jun Li, Ning Jing, Yu Tang: Hybrid Algorithms for Electromagnetic Detection Satellites Scheduling. ICTAI (1) 2008: 411-418 |
165 | EE | Winnie Cheng, Jun Li, Keith Moore, Alan H. Karp: A Customer-Centric Privacy Protection Framework for Mobile Service-Oriented Architectures. IEEE SCC (2) 2008: 13-20 |
164 | EE | Jun Li: A framework for peer-to-peer service interaction. IPDPS 2008: 1-8 |
163 | EE | Jianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao: SOA-based Enterprise Service Bus. ISECS 2008: 536-539 |
162 | EE | Jun Li, Yongfeng Diao, Jia-li Mao, Ying Zhang, Xing Yin: Stability Analysis of Discrete Hopfield Neural Networks with Weight Function Matrix. ISICA 2008: 760-768 |
161 | EE | Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li: The IEEE 802.11 Power Saving Mechanism: An Experimental Study. WCNC 2008: 1362-1367 |
160 | EE | Zheng-wang Ye, Ying Zhang, Jun Li, Jia-li Mao, Wen-gang Zhao: Implementation of a Specific Information System for a Web-Based E-learning Environment. WKDD 2008: 351-354 |
159 | EE | Lingling Zhang, Jie Wei, Anqiang Huang, Jun Li, Peng Zhang: DEA-Based Comprehensive Evaluation of Intelligent Knowledge. Web Intelligence/IAT Workshops 2008: 432-435 |
158 | EE | Xingsen Li, Jun Li, Yuejin Zhang, Yong Shi: A Framework of Knowledge Management Platform for Middle and Small Business. Communications and Discoveries from Multidisciplinary Data 2008: 233-248 |
157 | EE | Jun Li, Nan-Jing Huang: Exceptional families of elements for set-valued mappings: An application to nonlinear complementarity problems. Appl. Math. Lett. 21(1): 42-46 (2008) |
156 | EE | Lun Li, Jun Li: Equivalence and existence of weak Pareto optima for multiobjective optimization problems with cone constraints. Appl. Math. Lett. 21(6): 599-606 (2008) |
155 | EE | Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: Learning the valid incoming direction of IP packets. Computer Networks 52(2): 399-417 (2008) |
154 | EE | Dahui Li, Jun Li, Zhangxi Lin: Online consumer-to-consumer market in China - A comparative study of Taobao and eBay. Electronic Commerce Research and Applications 7(1): 55-67 (2008) |
153 | EE | Jin Sun, Jun Li, Dongsheng Ma, Janet Meiling Wang: Chebyshev Affine-Arithmetic-Based Parametric Yield Prediction Under Limited Descriptions of Uncertainty. IEEE Trans. on CAD of Integrated Circuits and Systems 27(10): 1852-1865 (2008) |
152 | EE | Minho Sung, Jun Xu, Jun Li, Li Li: Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Trans. Netw. 16(6): 1253-1266 (2008) |
151 | EE | Jun Li, Ling Ling Zhang, Yong Shi: Research on Evaluation Model of Organisational Knowledge Assets. JIKM 7(1): 47-54 (2008) |
150 | EE | Jun Li, Xianzhong Dai, Zhengda Meng, Libo Xu: Improved Net Rewriting Systems-extended Petri Nets Supporting Dynamic Changes. Journal of Circuits, Systems, and Computers 17(6): 1027-1052 (2008) |
149 | EE | Jun Li, Wei-Yun Yau, Han Wang: Combining singular points and orientation image information for fingerprint classification. Pattern Recognition 41(1): 353-366 (2008) |
2007 | ||
148 | EE | Mingsong Dou, Chao Zhang, Pengwei Hao, Jun Li: Converting Thermal Infrared Face Images into Normal Gray-Level Images. ACCV (2) 2007: 722-732 |
147 | EE | Jun Li, Hong Peng, Zheng Pei: Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. ACIS-ICIS 2007: 207-211 |
146 | EE | Yaxuan Qi, Bo Xu, Fei He, Baohua Yang, Jianming Yu, Jun Li: Towards high-performance flow-level packet processing on multi-core network processors. ANCS 2007: 17-26 |
145 | EE | Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu: Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. ATC 2007: 529-538 |
144 | EE | Lingling Zhang, Jun Li, Qin Wang, Rencheng Tong, Yuejin Zhang, Xingsen Li: A Study on the Relationship Between ERP Logic and Direct Consume Coefficient of I/O Table. CONFENIS (1) 2007: 145-152 |
143 | EE | Jun Li, Pengwei Hao: Hierarchical Structuring of Data on Manifolds. CVPR 2007 |
142 | EE | Yibo Wang, Jun Li: Is your IP address prefix well-served by internet routing? CoNEXT 2007: 69 |
141 | EE | Yuanhui Li, Depeng Zhao, Jun Li: Scheduling Algorithm Based on Integrated Utility of Multiple QoS Attributes on Service Grid. GCC 2007: 288-295 |
140 | EE | Jun Wang, Ning Jing, Jun Li, Zhong Hui Chen: A multi-objective imaging scheduling approach for earth observing satellites. GECCO 2007: 2211-2218 |
139 | EE | Jun Li, Keith Moore: A Runtime and Analysis Framework Support for Unit Component Testing in Distributed Systems. HICSS 2007: 261 |
138 | EE | Jun Li, Wei-Yun Yau, Jian-Gang Wang, Wee Ser: Stability Analysis of Constrained Nonlinear Phase Portrait Models of Fingerprint Orientation Images. ICB 2007: 493-502 |
137 | EE | Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li: MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. ICICS 2007: 201-215 |
136 | EE | Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li: Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24 |
135 | EE | Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang: On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271 |
134 | EE | Hui Zhang, Li Tang, Zhen Chen, Jun Li: Empirical Study on Multi-Path Benefits on Interactive Video. ICME 2007: 2154-2157 |
133 | EE | Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li: Empirical Study on the Evolution of PlanetLab. ICN 2007: 64 |
132 | EE | Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang: Scheduled PSM for Minimizing Energy in Wireless LANs. ICNP 2007: 154-163 |
131 | EE | Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li: Towards System-level Optimization for High Performance Unified Threat Management. ICNS 2007: 7 |
130 | EE | Li Tang, Zhijie Sun, Zhen Chen, Jun Li: On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing. ICNS 2007: 95 |
129 | EE | Yaxuan Qi, Bo Xu, Fei He, Xin Zhou, Jianming Yu, Jun Li: Towards Optimized Packet Classification Algorithms for Multi-Core Network Processors. ICPP 2007: 2 |
128 | EE | Lei Shi, Yue Zhang, Jianming Yu, Bo Xu, Bin Liu, Jun Li: On the Extreme Parallelism Inside Next-Generation Network Processors. INFOCOM 2007: 1379-1387 |
127 | EE | Jun Li, You-Peng Zhang: Modelling of Dynamic Systems Using Generalized RBF Neural Networks Based on Kalman Filter Mehtod. ISNN (1) 2007: 676-684 |
126 | EE | Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li: Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. ISPEC 2007: 301-313 |
125 | EE | Xingsen Li, Lingling Zhang, Maoliang Ding, Yong Shi, Jun Li: A Combined Web Mining Model and Its Application in Crisis Management. International Conference on Computational Science (3) 2007: 906-910 |
124 | EE | Jun Li, Masami Yasuda, Jianzeng Li: A Version of Lebesgue Decomposition Theorem for Non-additive Measure. MDAI 2007: 168-173 |
123 | EE | Xianghui Liu, Jing Ning, Jun Li, Jianping Yin, Ming Li: Model for Survivability of Wireless Sensor Network. MSN 2007: 705-714 |
122 | EE | Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui: A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. PAISI 2007: 184-195 |
121 | EE | Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong: Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007 |
120 | EE | Qin Yin, Hao Hu, Jun Li, Jian Lu: A Middleware Approach for Behavior Consistent Composition of Services in Smart Space. SOCA 2007: 233-240 |
119 | EE | Jun Li, Alan H. Karp: Access control for the services oriented architecture. SWS 2007: 9-17 |
118 | EE | Ismail Ari, Jun Li, Riddhiman Ghosh, Mohamed Dekhil: Providing session management as core business service. WWW 2007: 1263-1264 |
117 | EE | Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Meiling Wang: A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching CoRR abs/0710.4634: (2007) |
116 | EE | Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz: BGP routing dynamics revisited. Computer Communication Review 37(2): 5-16 (2007) |
115 | EE | Jun Li, Paul Knickerbocker: Functional similarities between computer worms and biological pathogens. Computers & Security 26(4): 338-347 (2007) |
114 | EE | Xingsen Li, Yong Shi, Jun Li, Peng Zhang: Data Mining Consulting Improve Data Quality. Data Science Journal 6: 658-666 (2007) |
113 | EE | Yao Ouyang, Jun Li, Jinxuan Fang: Further properties of reversible triangular norms. Fuzzy Sets and Systems 158(22): 2504-2509 (2007) |
112 | EE | Besma Smida, Sofiène Affes, Jun Li, Paul Mermelstein: A Spectrum-Efficient Multicarrier CDMA Array-Receiver with Diversity-Based Enhanced Time and Frequency Synchronization. IEEE Transactions on Wireless Communications 6(6): 2315-2327 (2007) |
111 | EE | Yang Shi, Weiqi Qian, Weisheng Yan, Jun Li: Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks. IJCSA 4(3): 107-118 (2007) |
2006 | ||
110 | EE | Jun Li, Yingyi Bu, Shaxun Chen, XianPing Tao, Jian Lu: FollowMe: On Research of Pluggable Infrastructure for Context-Awareness. AINA (1) 2006: 199-204 |
109 | EE | Jun Li, Wei-Yun Yau, Han Wang: Continuous fingerprints classification by symmetrical filters. ASIACCS 2006: 357 |
108 | EE | Xiaoyang Tan, Songcan Chen, Jun Li, Zhi-Hua Zhou: Learning Non-Metric Partial Similarity Based on Maximal Margin Criterion. CVPR (1) 2006: 138-145 |
107 | Yaxuan Qi, Jun Li: An efficient hybrid algorithm for multidimensional packet classification. Communication, Network, and Information Security 2006: 185-190 | |
106 | Yaxuan Qi, Jun Li: Towards effective packet classification. Communication, Network, and Information Security 2006: 216-223 | |
105 | EE | Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian Lu: Context Consistency Management Using Ontology Based Model. EDBT Workshops 2006: 741-755 |
104 | EE | Wentian Lu, Jun Li, XianPing Tao, Xiaoxing Ma, Jian Lu: Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. EuroSSC 2006: 143-158 |
103 | EE | Jun Li, Zhen Wu, Eric Purpus: Toward Understanding the Behavior of BGP During Large-Scale Power Outages. GLOBECOM 2006 |
102 | EE | Jun Li, Shunyi Zhang: Modeling and Analyzing Peer-to-Peer File-Sharing System. IAT Workshops 2006: 433-436 |
101 | EE | Jun Li, Wei-Yun Yau, Han Wang: Singular Points Detection Using Interactive Mechanism In Fingerprint Images. ICARCV 2006: 1-6 |
100 | EE | Jun Li, Haofeng Zhou, Wei Wang: Gradual Cube: Customize Profile on Mobile OLAP. ICDM 2006: 943-947 |
99 | EE | Xingsen Li, Yong Shi, Ying Liu, Jun Li, Aihua Li: A Knowledge Management Platform for Optimization-based Data Mining. ICDM Workshops 2006: 833-837 |
98 | EE | Cuimei Bo, Jun Li, Zhiquan Wang, Jinguo Lin: Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process. ICIC (2) 2006: 596-601 |
97 | EE | Jun Li, Cuimei Bo, Jiugen Zhang, Jie Du: Fault Diagnosis and Accommodation Based on Online Multi-model for Nonlinear Process. ICIC (2) 2006: 661-666 |
96 | EE | Yong-Zeng Xue, Sheng Li, Tiejun Zhao, Muyun Yang, Jun Li: Bilingual Phrase Extraction from N-Best Alignments. ICICIC (3) 2006: 410-414 |
95 | EE | Yunfang Feng, Zhiyuan Liu, Jun Li: Securing Membership Control in Mobile Ad Hoc Networks. ICIT 2006: 160-163 |
94 | EE | Jun Li, Wei-Yun Yau, Han Wang: Fingerprint Indexing Based On Symmetrical Measurement. ICPR (1) 2006: 1038-1041 |
93 | EE | Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li: Analysis and Improvement of An Iris Identification Algorithm. ICPR (4) 2006: 362-365 |
92 | EE | Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li: Iris Recognition Algorithm Using Modified Log-Gabor Filters. ICPR (4) 2006: 461-464 |
91 | EE | Wuzheng Tan, Lizhuang Ma, Jun Li, Zuxiu Xiao: Application MDA in a Conception Design Environment. IMSCCS (1) 2006: 702-704 |
90 | EE | Jun Li, Achim J. Lilienthal, Tomás Martínez-Marín, Tom Duckett: Q-RAN: A Constructive Reinforcement Learning Approach for Robot Behavior Learning. IROS 2006: 2656-2662 |
89 | EE | Huifang Yin, Jun Li: An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). ISC 2006: 373-382 |
88 | EE | Jun Li, Jun-Hua Liu: Identification and Control of Dynamic Systems Based on Least Squares Wavelet Vector Machines. ISNN (2) 2006: 934-942 |
87 | EE | Hongli Gao, Mingheng Xu, Jun Li, Chunjun Chen: Tool Wear Monitoring Using FNN with Compact Support Gaussian Function. ISNN (2) 2006: 957-963 |
86 | EE | Li Tang, Hui Zhang, Jun Li, Yanda Li: End-to-End Delay Behavior in the Internet. MASCOTS 2006: 373-382 |
85 | EE | Jun Li, Xinming Ye, Ye Tian: Topologically-Aware AAA Overlay Network in Mobile IPv6 Environment. Networking 2006: 293-306 |
84 | EE | Yingyi Bu, Tao Gu, XianPing Tao, Jun Li, Shaxun Chen, Jian Lu: Managing Quality of Context in Pervasive Computing. QSIC 2006: 193-200 |
83 | EE | Shaxun Chen, Yingyi Bu, Jun Li, XianPing Tao, Jian Lu: Toward Context-Awareness: A Workflow Embedded Middleware. UIC 2006: 766-775 |
82 | EE | Cui Lin, Jun Li, Natasha Barrett, Yan-Qing Zhang, David A. Washburn: Genetic Granular Cognitive Fuzzy Neural Networks and Human Brains for Pattern Recognition. WImBI 2006: 267-277 |
81 | EE | Jun Li, Nan-Jing Huang: Vector F-implicit complementarity problems in Banach spaces. Appl. Math. Lett. 19(5): 464-471 (2006) |
80 | EE | Yao Ouyang, Hongxia Sun, Jun Li: Some notes on V-homogeneity property of semiconormed fuzzy integrals. Fuzzy Sets and Systems 157(11): 1572-1575 (2006) |
79 | EE | Yao Ouyang, Jinxuan Fang, Jun Li: A conditionally cancellative left-continuous t-norm is not necessarily continuous. Fuzzy Sets and Systems 157(17): 2328-2332 (2006) |
78 | EE | Zhang Zhang, Jun Li, Xiao-Qian Zhao, Jun Wang, Gane Ka-Shu Wong, Jun Yu: KaKs_Calculator: Calculating Ka and Ks Through Model Selection and Model Averaging. Genomics, Proteomics & Bioinformatics 4(4): 259-263 (2006) |
77 | EE | Janet Meiling Wang, Jun Li, Satish K. Yanamanamanda, Lakshmi Kalpana Vakati, Kishore Kumar Muchherla: Modeling the Driver Load in the Presence of Process Variations. IEEE Trans. on CAD of Integrated Circuits and Systems 25(10): 2264-2275 (2006) |
76 | EE | Jun Li, Wei-Yun Yau, Han Wang: Constrained nonlinear models of fingerprint orientations with prediction. Pattern Recognition 39(1): 102-114 (2006) |
75 | EE | Jun Li, Guojun Wang: Theory of truth degrees of propositions in the logic system Ln*. Science in China Series F: Information Sciences 49(4): 471-483 (2006) |
74 | EE | Yuntao Wu, Lin Ma, Chaohuan Hou, Guangbin Zhang, Jun Li: Subspace-based method for joint range and DOA estimation of multiple near-field sources. Signal Processing 86(8): 2129-2133 (2006) |
2005 | ||
73 | EE | Jun Li, Xun Kang: mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. ACSAC 2005: 397-408 |
72 | EE | Bo Xu, Dongyi Jiang, Jun Li: HSM: A Fast Packet Classification Algorithm. AINA 2005: 987-992 |
71 | EE | Jun Li, Amitava Bose, Yiqiang Q. Zhao: Rayleigh Flat Fading Channels' Capacity. CNSR 2005: 214-217 |
70 | EE | Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Meiling Wang: A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching. DATE 2005: 770-775 |
69 | EE | Jun Li, Edward Omiecinski: Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. DBSec 2005: 69-83 |
68 | EE | Yingyi Bu, Jun Li, Shaxun Chen, XianPing Tao, Jian Lu: An Enhanced Ontology Based Context Model and Fusion Mechanism. EUC 2005: 920-929 |
67 | EE | Jun Li, Natasha Barrett, Yan-Qing Zhang, David A. Washburn: Genetic granular cognitive fuzzy neural networks and human brains for pattern recognition. GrC 2005: 172-175 |
66 | EE | Yaxuan Qi, Bo Xu, Jun Li: Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification. ICAS/ICNS 2005: 7 |
65 | Janet Meiling Wang, Bharat Srinivas, Dongsheng Ma, Charlie Chung-Ping Chen, Jun Li: System-level power and thermal modeling and analysis by orthogonal polynomial based response surface approach (OPRS). ICCAD 2005: 728-735 | |
64 | EE | Xi-Ping Luo, Li-Xin Zhen, Gang Peng, Jun Li, Bai-Hua Xiao: Camera based mixed-lingual card reader for mobile device. ICDAR 2005: 665-669 |
63 | EE | Zhangxi Lin, Jun Li: The online auction market in China: a comparative study between Taobao and eBay. ICEC 2005: 123-129 |
62 | EE | Jun Li, Fumin Yang, Yansheng Lu: A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems. ICECCS 2005: 176-183 |
61 | EE | Hong-Nan Li, Zhiguo Chang, Jun Li: Semi-active Control for Eccentric Structures with MR Damper by Hybrid Intelligent Algorithm. ICIC (2) 2005: 139-148 |
60 | EE | Jun Li, Gang Wei: Further reduced search for optimal diagonal space-time constellations from groups. IPCCC 2005: 119-122 |
59 | EE | Satish K. Yanamanamanda, Jun Li, Janet Meiling Wang: Uncertainty modeling of gate delay considering multiple input switching. ISCAS (3) 2005: 2457-2460 |
58 | EE | Jun Li, Xun Kang: Proof of Service in a Hybrid P2P Environment. ISPA Workshops 2005: 64-73 |
57 | EE | Jun Li, Bruce Christianson, Martin Loomes: "Fair" Authentication in Pervasive Computing. MADNES 2005: 132-143 |
56 | EE | Jun Li, Masami Yasuda, Jinjie Song: Regularity Properties of Null-Additive Fuzzy Measure on Metric Spaces. MDAI 2005: 59-66 |
55 | EE | Li Tang, Jun Li, Jin Zhou, Zhizhi Zhou, Hao Wang, Kai Li: FreeRank: implementing independent ranking service for multiplayer online games. NETGAMES 2005: 1-7 |
54 | EE | Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher: Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 |
53 | EE | Yonggang Chu, Jun Li, Yixian Yang: The Architecture of the Large-scale Distributed Intrusion Detection System. PDCAT 2005: 130-133 |
52 | Jianming Yu, Jun Li: A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor. Security and Management 2005: 375-384 | |
51 | EE | Lingling Zhang, Jun Li, Yong Shi: Study on Improving Efficiency of Knowledge Sharing in Knowledge-Intensive Organization. WINE 2005: 816-825 |
50 | EE | Jun Li, Kazutaka Furuse, Kazunori Yamaguchi: Focused crawling by exploiting anchor text using decision tree. WWW (Special interest tracks and posters) 2005: 1190-1191 |
49 | EE | Jun Li, Zhong-Quan He: Gap functions and existence of solutions to generalized vector variational inequalities. Appl. Math. Lett. 18(9): 989-1000 (2005) |
48 | EE | Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal: An internet routing forensics framework for discovering rules of abnormal BGP events. Computer Communication Review 35(5): 55-66 (2005) |
47 | EE | Jinjie Song, Jun Li: Lebesgue theorems in non-additive measure theory. Fuzzy Sets and Systems 149(3): 543-548 (2005) |
46 | EE | Jun Li, Masami Yasuda: On Egoroff's theorems on finite monotone non-additive measure space. Fuzzy Sets and Systems 153(1): 71-78 (2005) |
45 | EE | Yao Ouyang, Jun Li: An answer to an open problem on triangular norms. Inf. Sci. 175(1-2): 78-84 (2005) |
44 | EE | Gui-Chang Wang, Jun Li, Xiu-Fang Xu, Rui-Fang Li, Junji Nakamura: The relationship between adsorption energies of methyl on metals and the metallic electronic properties: A first-principles DFT study. Journal of Computational Chemistry 26(9): 871-878 (2005) |
2004 | ||
43 | EE | Wei Yu, Jun Li, Greg Butler: Refactoring Use Case Models on Episodes. ASE 2004: 328-331 |
42 | EE | Jun Li, Xiongfei Li, Hui Liu, Xinying Chen: The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute. AWCC 2004: 449-456 |
41 | EE | Jun Li, Keith Moore: Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge. CoopIS/DOA/ODBASE (2) 2004: 1482-1501 |
40 | EE | Janet Meiling Wang, Omar Hafiz, Jun Li: A linear fractional transform (LFT) based model for interconnect parametric uncertainty. DAC 2004: 375-380 |
39 | EE | Yuzhen Li, Jun Li, Shuigeng Zhou: GML Storage: A Spatial Database Approach. ER (Workshops) 2004: 55-66 |
38 | EE | Wei-Yun Yau, Jun Li, Han Wang: Nonlinear phase portrait modeling of fingerprint orientation. ICARCV 2004: 1262-1267 |
37 | EE | Xi-Ping Luo, Jun Li, Li-Xin Zhen: Design and Implementation of a Card Reader based on Build-in Camera. ICPR (1) 2004: 417-420 |
36 | EE | Jun Li, Wei-Yun Yau: Prediction of Fingerprint Orientation. ICPR (4) 2004: 436-439 |
35 | EE | Jun Li, Keith Moore: Exploiting Global Causality in Testing of Distributed and Component-Based Applications. ICSM 2004: 527 |
34 | EE | Jun Li, Minho Sung, Jun Xu, Li Li: Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. IEEE Symposium on Security and Privacy 2004: 115-129 |
33 | Miles N. Wernick, Jovan G. Brankov, Dean Chapman, Mark A. Anastasio, Zhong Zhong, Carol Muehleman, Jun Li: Multiple-Image Computed Tomography. ISBI 2004: 948-951 | |
32 | EE | Jun Li, Masami Yasuda: Lusin's theorem on fuzzy measure spaces. Fuzzy Sets and Systems 146(1): 121-133 (2004) |
31 | EE | Yao Ouyang, Jun Li: A note on the monotone set functions defined by Choquet integral. Fuzzy Sets and Systems 146(1): 147-151 (2004) |
30 | EE | Jun Li, Peter L. Reiher, Gerald J. Popek: Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004) |
29 | EE | Jun Li, Masami Yasuda: Egoroff'S Theorem On Monotone Non-Additive Measure Spaces. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 12(1): 61-68 (2004) |
28 | EE | Jingli Zhou, Jun Li, Shengsheng Yu: Modified winner-update search algorithm for fast block matching. Pattern Recognition Letters 25(7): 807-816 (2004) |
2003 | ||
27 | Jun Li, Constantine N. Manikopoulos: Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. IAW 2003: 53-59 | |
26 | Hao Xiong, Jun Li, Momiao Xiong: Identification of Differentially Regulated Genetic Network. IC-AI 2003: 444-450 | |
25 | EE | Jun Li: Monitoring and Characterization of Component-Based Systems with Global Causality Capture. ICDCS 2003: 422- |
24 | EE | Joo-Hwee Lim, Jun Li, Philippe Mulhem, Qi Tian: Content-Based Summarization for Personal Image Library. JCDL 2003: 393 |
23 | EE | Jun Li: On Egoroff's theorems on fuzzy measure spaces. Fuzzy Sets and Systems 135(3): 367-375 (2003) |
22 | EE | Jun Li, Fahima Nekka: The Hausdorff measure functions: A new way to characterize fractal sets. Pattern Recognition Letters 24(15): 2723-2730 (2003) |
2002 | ||
21 | EE | Zaiping Chen, Jun Li, Youjun Yue, Qiang Gao, Hui Zhao, Zhenlin Xu: A Neural Network Online Training Algorithm Based on Compound Gradient Vector. Australian Joint Conference on Artificial Intelligence 2002: 374-384 |
20 | EE | Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002 |
19 | EE | Jun Li, Constantine N. Manikopoulos: Investigation of the Performance of GAFT, a Novel Network Anomaly Fault Detection System. LCN 2002: 249-260 |
18 | EE | Jun Li, Constantine N. Manikopoulos: Network Fault Detection: Classifier Training Method for Anomaly Fault Detection in a Production Network Using Test Network Information. LCN 2002: 473-482 |
17 | EE | Jun Li, Mark Yarvis, Peter L. Reiher: Securing distributed adaptation. Computer Networks 38(3): 347-371 (2002) |
16 | EE | Jun Li: A note on the null-additivity of the fuzzy measure: Corrigendum to "On the null-additivity of the fuzzy measure" [Fuzzy Sets and Systems 78 (1996) 337-339]. Fuzzy Sets and Systems 125(2): 269-271 (2002) |
15 | Jun Li, Jingli Zhou, Shengsheng Yu: A Low Bit-Rate Video Codec Based on Control Grid Interpolation Motion Compensation Using Edge Feature. Journal of Research and Practice in Information Technology 34(2): 98-109 (2002) | |
14 | EE | Junbiao Zhang, Jun Li, Stephen B. Weinstein, Nan Tu: Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support. Mobile Computing and Communications Review 6(3): 10-21 (2002) |
2001 | ||
13 | Jun Li: Order Continuity of Fuzzy Measure and Convergence of Measurable Functions Sequence. FUZZ-IEEE 2001: 170-172 | |
12 | EE | Jun Li, Michael G. Parsons: Complete design of fuzzy systems using a real-coded genetic algorithm with imbedded constraints. Journal of Intelligent and Fuzzy Systems 10(1): 13-37 (2001) |
1999 | ||
11 | EE | Jun Li, Roy D. Yates, Dipankar Raychaudhuri: Handoff Control in the PNNI Hierarchy of Mobile ATM Networks. HICSS 1999 |
10 | EE | Jun Li, Peter H. Feiler: Impact Analysis in Real-Time Control Systems. ICSM 1999: 443-452 |
9 | Jun Li, Roy D. Yates, Dipankar Raychaudhuri: Performance Analysis on Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks. INFOCOM 1999: 1195-1203 | |
1998 | ||
8 | EE | Jun Li, Ian R. Greenshields: De-Noising ENMR Spectra by Wavelet Shrinkage. CBMS 1998: 252- |
7 | Jun Li, Peter H. Feiler: Managing inconsistency in reconfigurable systems. IEE Proceedings - Software 145(5): 172-179 (1998) | |
6 | Jun Li: A Note on Partial Meet Package Contraction. Journal of Logic, Language and Information 7(2): 139-142 (1998) | |
1997 | ||
5 | Jun Li: On Remainder Equations. Math. Log. Q. 43: 355-368 (1997) | |
1996 | ||
4 | Joseph Y. Hui, Ezhan Karasan, Jun Li, Junbiao Zhang: Client-Server Synchronization and Buffering for Variable Rate Multimedia Retrievals. IEEE Journal on Selected Areas in Communications 14(1): 226-237 (1996) | |
3 | Ruixi Yuan, Subir K. Biswas, Leslie J. French, Jun Li, Dipankar Raychaudhuri: A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks. MONET 1(3): 287-298 (1996) | |
1995 | ||
2 | Joseph Y. Hui, Junbiao Zhang, Jun Li: Quality-of-Service Control in GRAMS for ATM Local Area Network. IEEE Journal on Selected Areas in Communications 13(4): 700-709 (1995) | |
1992 | ||
1 | Jun Li, Allen A. Rovick, Joel A. Michael: ABASE: A Hypermedia-based Tutoring and Authoring System. ICCAL 1992: 380-390 |