2008 | ||
---|---|---|
30 | EE | Liang Li, Evangeline F. Y. Young: Obstacle-avoiding rectilinear Steiner tree construction. ICCAD 2008: 523-528 |
29 | EE | Long Meng, Liang Li, Shuqi Mei, Weiguo Wu: Directional entropy feature for human detection. ICPR 2008: 1-4 |
28 | EE | Liang Li, Jun Han, Xiaoyang Zeng, Jia Zhao: A full-custom design of AES SubByte module with signal independent power consumption. ISCAS 2008: 3302-3305 |
27 | EE | Liang Li, Xin Li, Tian Liu, Ke Xu: From k-SAT to k-CSP: Two Generalized Algorithms CoRR abs/0801.3147: (2008) |
26 | EE | Liang Li, Tian Liu, Ke Xu: Exact phase transition of backtrack-free search with implications on the power of greedy algorithms CoRR abs/0811.3055: (2008) |
25 | EE | Liang Li, Bin Li, Junwu Zhu: Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web. JDCTA 2(1): 35-45 (2008) |
2007 | ||
24 | EE | Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang: A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. ISI 2007: 129-132 |
23 | EE | Zhe Wu, Jie Tian, Liang Li, Cai-Ping Jiang, Xin Yang: A Secure Email System Based on Fingerprint Authentication Scheme. ISI 2007: 250-253 |
22 | EE | Pingping Lu, Bin Li, Maolin Xing, Liang Li: D-S Theory-based Trust Model FIRE+ in Multi-agent Systems. SNPD (1) 2007: 255-260 |
21 | EE | Jianxin Li, Bin Li, Liang Li, Tongsheng Che: A Policy Language for Adaptive Web Services Security Framework. SNPD (1) 2007: 261-266 |
20 | EE | Asif Iqbal, Ning He, Liang Li, Naeem Ullah Dar: A fuzzy expert system for optimizing parameters and predicting performance measures in hard-milling process. Expert Syst. Appl. 32(4): 1020-1027 (2007) |
19 | EE | Asif Iqbal, Ning He, Naeem Ullah Dar, Liang Li: Comparison of fuzzy expert system based strategies of offline and online estimation of flank wear in hard milling process. Expert Syst. Appl. 33(1): 61-66 (2007) |
18 | EE | Xiaoguang He, Jie Tian, Liang Li, Yuliang He, Xin Yang: Modeling and Analysis of Local Comprehensive Minutia Relation for Fingerprint Matching. IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(5): 1204-1211 (2007) |
17 | EE | David S. Wishart, Dan Tzur, Craig Knox, Roman Eisner, Anchi Guo, Nelson Young, Dean Cheng, Kevin Jewell, David Arndt, Summit Sawhney, Chris Fung, Lisa Nikolai, Mike Lewis, Marie-Aude Coutouly, Ian J. Forsythe, Peter Tang, Savita Shrivastava, Kevin Jeroncic, Paul Stothard, Godwin Amegbey, David Block, David. D. Hau, James Wagner, Jessica Miniaci, Melisa Clements, Mulu Gebremedhin, Natalie Guo, Ying Zhang, Gavin E. Duggan, Glen D. MacInnis, Alim M. Weljie, Reza Dowlatabadi, Fiona Bamforth, Derrick Clive, Russell Greiner, Liang Li, Tom Marrie, Brian D. Sykes, Hans J. Vogel, Lori Querengesser: HMDB: the Human Metabolome Database. Nucleic Acids Research 35(Database-Issue): 521-526 (2007) |
16 | EE | Zhigang Yang, Jing Chen, Qiang Huang, Xihong Wu, Yanhong Wu, Bruce A. Schneider, Liang Li: The effect of voice cuing on releasing Chinese speech from informational masking. Speech Communication 49(12): 892-904 (2007) |
2006 | ||
15 | Asif Iqbal, Ning He, Liang Li, Naeem Ullah Dar: Simulated Annealing Assisted Optimization of Fuzzy Rules for Maximizing Tool Life in High-Speed Milling Process. Artificial Intelligence and Applications 2006: 335-340 | |
14 | EE | Yunni Xia, Hanpin Wang, Chunxiang Xu, Liang Li: Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets. International Conference on Computational Science (3) 2006: 988-995 |
13 | EE | Huafeng Liu, Liang Li, Shiyao Jin: Cluster Number Variability Problem in LEACH. UIC 2006: 429-437 |
12 | EE | Liang Li, Jie Tian, Xin Yang: A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. WISI 2006: 175-176 |
11 | EE | Yuliang He, Jie Tian, Liang Li, Hong Chen, Xin Yang: Fingerprint Matching Based on Global Comprehensive Similarity. IEEE Trans. Pattern Anal. Mach. Intell. 28(6): 850-862 (2006) |
10 | EE | Jie Tian, Liang Li, Xin Yang: Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. J. Comput. Sci. Technol. 21(5): 861-870 (2006) |
2005 | ||
9 | EE | Liang Li, Xin Yang, Yuliang He, Jie Tian: Palmprint Recognition Using Fourier-Mellin Transformation Based Registration Method. AVBPA 2005: 730-738 |
8 | EE | Guoqiang Yu, Liang Li, Jianwei Gu, Li Zhang: Total Variation Based Iterative Image Reconstruction. CVBIA 2005: 526-534 |
7 | EE | Liang Li, Jie Tian, Yuliang He, Xin Yang: Multi-scale Palmprint Recognition Using Registration Information and 2D Gabor Feature. ICAPR (2) 2005: 127-135 |
2004 | ||
6 | EE | Jie Tian, Yuliang He, Xin Yang, Liang Li, Xinjian Chen: Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern. SINOBIOMETRICS 2004: 57-66 |
2001 | ||
5 | EE | Huadong Ma, Liang Li, Jianzhong Wang, Naijun Zhan: Automatic Synthesis of the DC Specifications of Lip Synchronisation Protocol. APSEC 2001: 371- |
1982 | ||
4 | Liang Li, Herman D. Hughes, Lewis H. Greenberg: Performance Analysis of a Shortest-Delay Protocol. Berkeley Workshop 1982: 259-281 | |
3 | Herman D. Hughes, Liang Li: A Capacity Planning Methodology for Large-Scale Computer Systems. IMACS World Congress 1982: 3-14 | |
2 | Herman D. Hughes, Liang Li: A Performance Study of Ethernet. Int. CMG Conference 1982: 79-85 | |
1 | Liang Li, Herman D. Hughes, Lewis H. Greenberg: Performance Analysis of a Shortest-Delay Protocol. Computer Networks 6(3): 189-200 (1982) |