2008 |
20 | EE | Chengzhu Sun,
Xiaofei Xu,
Xiangyang Li,
Shengchun Deng:
Knowledge Discovery from Virtual Enterprise Model Based on Semantic Annotation.
FSKD (5) 2008: 546-551 |
19 | EE | Jiun-Yan Shiau,
Xiangyang Li,
Pei-Hua Tseng:
An Aspect Oriented Configuration Identification Model for Incremental Development.
ICNSC 2008: 1525-1530 |
18 | EE | Xiangyang Li,
Jiun-Yan Shiau:
Security Management Modeling in Collaborative Systems.
ICNSC 2008: 1553-1558 |
17 | EE | Deke Guo,
Yunhao Liu,
Xiangyang Li:
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks.
INFOCOM 2008: 2450-2457 |
16 | EE | Wei-Fang Cheng,
Mo Li,
Kebin Liu,
Yunhao Liu,
Xiangyang Li,
Xiangke Liao:
Sweep coverage with mobile sensors.
IPDPS 2008: 1-9 |
2007 |
15 | EE | Xiangyang Li,
Shaojie Tang,
Ophir Frieder:
Multicast capacity for large scale wireless ad hoc networks.
MOBICOM 2007: 266-277 |
14 | EE | Sheng Chen,
Xiangyang Li,
Yigang Cai:
IP multimedia subsystem converged call control services.
Bell Labs Technical Journal 12(1): 145-160 (2007) |
13 | EE | Xiangyang Li,
Charu Chandra:
Efficient knowledge integration to support a complex supply network management.
IJMTM 10(1): 1-18 (2007) |
2006 |
12 | EE | Tao Ye,
Xuefeng Zhu,
Xiangyang Li,
Yan Li,
Jun Zeng:
A Soft Sensor Based on Multiple Neural Networks Combined with Two Information Fusion Methods.
ICARCV 2006: 1-6 |
2005 |
11 | EE | Xiangyang Li,
Qiang Ji:
Active affective State detection and user assistance with dynamic bayesian networks.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 35(1): 93-105 (2005) |
10 | EE | Xiangyang Li,
Nong Ye:
A supervised clustering algorithm for computer intrusion detection.
Knowl. Inf. Syst. 8(4): 498-509 (2005) |
2004 |
9 | | Xiangyang Li,
Nong Ye:
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.
ISI 2004: 226-238 |
2001 |
8 | EE | Nong Ye,
Xiangyang Li:
A Machine Learning Algorithm Based on Supervised Clustering and Classification.
Active Media Technology 2001: 327-334 |
7 | | Nong Ye,
Xiangyang Li,
Qiang Chen,
Syed Masum Emran,
Mingming Xu:
Probabilistic techniques for intrusion detection based on computer audit data.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 266-274 (2001) |
6 | EE | Xiangyang Li,
Peng-Jun Wan:
Constructing minimum energy mobile wireless networks.
Mobile Computing and Communications Review 5(4): 55-67 (2001) |
2000 |
5 | | Xiangyang Li,
Dongming Lu,
Yunhe Pan:
Virtual Dunhuang Mural Restoration System in Collaborative Network Environment.
Comput. Graph. Forum 19(3): (2000) |
4 | EE | Xiangyang Li,
Dongming Lu,
Yunhe Pan:
Color Restoration and Image Retrieval for Dunhuang Fresco Preservation.
IEEE MultiMedia 7(2): 38-42 (2000) |
1996 |
3 | | Xiangyang Li,
Mohammad A. Ketabchi:
A Model-Based Computer-Aided Prototyping System.
Journal of Systems Integration 6(1/2): 19-39 (1996) |
1994 |
2 | | Mohammad A. Ketabchi,
Nipun Sehgal,
Surapol Dasananda,
Rani Mikkilineni,
Xiangyang Li:
Modeling Activities of Application Domains.
ADB 1994: 78-94 |
1 | | Mohammad A. Ketabchi,
Surapol Dasananda,
Rani Mikkilineni,
Xiangyang Li,
F. Xu,
M. Yan:
An Object-Centered Application Development System.
DEXA 1994: 27-36 |