2009 |
22 | EE | Y. Pang,
Y. Yuan,
X. Li:
Iterative Subspace Analysis Based on Feature Line Distance.
IEEE Transactions on Image Processing 18(4): 903-907 (2009) |
2008 |
21 | EE | X. Li,
Sarah Ruepp,
Lars Dittmann,
Anna V. Manolova:
Survivability-Enhancing Routing Scheme for Multi-Domain Networks.
GLOBECOM 2008: 2232-2236 |
20 | EE | Charalambos D. Charalambous,
Robert J. C. Bultitude,
X. Li,
J. Zhan:
Modeling wireless fading channels via stochastic differential equations: identification and estimation based on noisy measurements.
IEEE Transactions on Wireless Communications 7(2): 434-439 (2008) |
2007 |
19 | EE | G. Lu,
Y. Chen,
Stefan Birrer,
Fabián E. Bustamante,
C. Y. Cheung,
X. Li:
End-to-End Inference of Router Packet Forwarding Priority.
INFOCOM 2007: 1784-1792 |
18 | EE | D. Butcher,
X. Li,
Jinhua Guo:
Security Challenge and Defense in VoIP Infrastructures.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 37(6): 1152-1162 (2007) |
2006 |
17 | EE | X. Li,
Z. P. Fang,
F. L. Ng,
L. P. Zhao,
L. Zhao:
Inspection and Image Analysis of Nickel Sulphide Inclusions in Toughened Glass Panels.
ICARCV 2006: 1-6 |
16 | | Chi-Hung Chi,
Lin Liu,
X. Li:
Performance modeling for real-time content adaptation network.
IRI 2006: 444-447 |
15 | EE | X. Li,
P. Zhao:
Some Aging Properties of the Residual Life of$k$-out-of-$n$Systems.
IEEE Transactions on Reliability 55(3): 535-541 (2006) |
14 | EE | X. Li,
N. Ye:
A Supervised Clustering and Classification Algorithm for Mining Data With Mixed Variables.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(2): 396-406 (2006) |
2004 |
13 | EE | Yiping Hong,
Jianqiang Yi,
Dongbin Zhao,
X. Li:
A robust doorplate recognition system.
ICARCV 2004: 821-825 |
2002 |
12 | EE | J. W. Bruce,
Mitchell A. Thornton,
L. Shivakumaraiah,
P. S. Kokate,
X. Li:
Efficient Adder Circuits Based on a Conservative Reversible Logic Gate.
ISVLSI 2002: 83-88 |
2001 |
11 | EE | Z. Hu,
X. Li,
Donald Mills,
Eva Nuria Müller,
W. Sun,
Wolfgang Willems,
Y. Yang,
Z. Zhang:
On the Crosscorrelation of Sequences with the Decimation Factor d = (pn+1)/(p+1) - (pn-1)/2.
Appl. Algebra Eng. Commun. Comput. 12(3): 255-263 (2001) |
1998 |
10 | | X. Li,
Z. Guan:
Research on design and appraisal of management information systems.
Information Systems in the WWW Environment 1998: 233-236 |
9 | EE | Richard Lai,
X. Li:
Applying a new decomposition method to verify communication protocols.
Journal of Systems and Software 40(1): 29-50 (1998) |
1997 |
8 | EE | Richard Lai,
X. Li:
Verification of the ISO ACSE protocol using Deductive Machine.
Journal of Systems and Software 39(3): 223-247 (1997) |
1995 |
7 | EE | X. Li,
J. Hong:
A Robust Method of Extracting Rectangle Blocks for Form Reading .
ICDAR 1995: 760- |
6 | | S. H. De Boer,
L. J. Ward,
X. Li,
S. Chittaranjan:
Attenuation of PCR inhibition in the presence of plant compounds by addition of BLOTTO.
Nucleic Acids Research 23(13): 2567-2568 (1995) |
1993 |
5 | | X. Li,
Richard Lai,
Tharam S. Dillon:
A New Decomposition Method to Relieve the State Space Explosion Problem.
ICCI 1993: 150-154 |
4 | | Hans Grabowski,
Reiner Anderl,
X. Li,
M. Schmitt:
Exchange of Freeform Surfaces Using Standard Interfaces.
Interfaces in Industrial Systems for Production Engineering 1993: 201-219 |
1992 |
3 | | X. Li,
Richard Lai,
Tharam S. Dillon:
Theory of Deductive Systems for Protocol Verification.
ICCI 1992: 422-425 |
2 | EE | Hans Grabowski,
X. Li:
Coefficient formula and matrix of nonuniform B-spline functions.
Computer-Aided Design 24(12): 637-642 (1992) |
1988 |
1 | | X. Li,
Miroslaw Malek:
Analysis of Speedup and Communication/Computation Ratio in Multiprocessor Systems.
IEEE Real-Time Systems Symposium 1988: 282-288 |