| 2009 |
| 22 | EE | Yan Liu,
Renfa Li,
Cheng Xu,
Fei Yu:
HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience.
JCP 4(3): 238-244 (2009) |
| 2008 |
| 21 | EE | Jianbo Xu,
Yong He,
Renfa Li:
An Energy-Aware Distributed Clustering Algorithm in Wireless Sensor Networks.
CSSE (3) 2008: 528-531 |
| 20 | EE | Yan Liu,
Renfa Li,
Cheng Xu,
Fei Yu:
Design and Implementation of Embedded Multimedia Surveillance System.
WKDD 2008: 570-573 |
| 2007 |
| 19 | | Fei Yu,
Renfa Li,
Guiping Liao:
Proceedings of the Workshop on Intelligent Information Technology Application (IITA'07), Zhang Jiajie, China, 2-3 December, 2007, Sponsored by Hunan Agricultural University, Hunan University, Wuhan Institute of Technology
IEEE Computer Society 2007 |
| 18 | EE | Zaimei Zhang,
Renfa Li,
Zhongsheng Li,
Haiyan Zhang,
Guangxue Yue:
An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea.
FSKD (3) 2007: 119-123 |
| 17 | EE | Ji-yao An,
Ronghui Wu,
Renfa Li,
Cheng Xu:
An Intrusion Alarm System Based on Fuzzy Reasoning Machine.
IITA 2007: 165-168 |
| 16 | | Ronghui Wu,
Yiming Liang,
Renfa Li,
Cheng Xu,
Fei Yu:
Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network.
IMECS 2007: 650-653 |
| 15 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on Advanced Distributed Learning by Using SCORM.
International Conference on Computational Science (3) 2007: 571-574 |
| 14 | EE | Renfa Li,
Yunlong Xie,
Jigang Wen,
Guangxue Yue:
EMMP: a highly efficient membership management protocol.
Frontiers of Computer Science in China 1(2): 208-212 (2007) |
| 2006 |
| 13 | EE | Ji-yao An,
Guangxue Yue,
Fei Yu,
Renfa Li:
Intrusion Detection Based on Fuzzy Neural Networks.
ISNN (2) 2006: 231-239 |
| 12 | EE | Cheng Xu,
Fei Yu,
Zhenghui Dai,
Guangxue Yue,
Renfa Li:
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor.
SKG 2006: 27 |
| 11 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on User Authentication for Grid Computing Security.
SKG 2006: 72 |
| 10 | EE | Rui Li,
Renfa Li,
Fei Yu,
Jigang Wen:
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing.
SKG 2006: 73 |
| 9 | EE | Guangxue Yue,
Fei Yu,
Yi-jun Chen,
Ronghui Wu,
Ji-yao An,
Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
SKG 2006: 74 |
| 8 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Jigang Wen:
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
SKG 2006: 75 |
| 7 | EE | Ying Wang,
Kenli Li,
Lang Li,
Renfa Li:
A Vertical and Horizontal Multiway Algorithm for Parallel-Merging.
Journal of Computer Research and Development 43(12): 2180-2186 (2006) |
| 2005 |
| 6 | EE | Kenli Li,
Yan He,
Renfa Li,
Tao Yang:
A Scheduling Algorithm Based on a Trust Mechanism in Grid.
CIS (2) 2005: 463-468 |
| 5 | EE | Guangxue Yue,
Renfa Li,
Zude Zhou,
Ronghui Wu:
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks.
GCC 2005: 776-786 |
| 4 | EE | Kenli Li,
Renfa Li,
Lei Yang,
Yan-Tao Zhou:
A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems.
NPC 2005: 197-204 |
| 2004 |
| 3 | EE | Zude Zhou,
Cheng Xu,
ChunQing Ling,
Renfa Li:
An optimization design and simulation of Ptolemy-based motor speed control.
ICARCV 2004: 847-850 |
| 2 | EE | Kenli Li,
Renfa Li,
Qing-Hua Li:
Optimal Parallel Algorithm for the Knapsack Problem Without Memory Conflicts.
J. Comput. Sci. Technol. 19(6): 760-768 (2004) |
| 2003 |
| 1 | EE | Yuan-ni Guo,
Renfa Li:
Design and Performance of Firewall System Based on Embedded Computing.
GCC (1) 2003: 992-995 |