dblp.uni-trier.dewww.uni-trier.de

Zhi Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
42EEZhi Li, Daniela Constantinescu: Networked Haptic Cooperation Using Remote Dynamic Proxies. ACHI 2009: 243-248
2008
41EEYali Liu, Canhui Ou, Zhi Li, Cherita L. Corbett, Cherita Mukherjee, Dipak Ghosal: Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks. GLOBECOM 2008: 1746-1751
40EEZhi Li, Guizhong Liu: A novel scene change detection algorithm based on the 3D wavelet transform. ICIP 2008: 1536-1539
39EEQibin Sun, Zhi Li, Xudong Jiang, Alex ChiChung Kot: An interactive and secure user authentication scheme for mobile devices. ISCAS 2008: 2973-2976
38EEZhi Li, Hui Chen, Jing Qian, Shouyin Liu: A Distributed Multi-coordinate Localization Algorithm for Wireless Sensor Networks. ISIP 2008: 573-577
37EEHaixia Jiang, Guizhong Liu, Xueming Qian, Nan Nan, Danping Guo, Zhi Li, Li Sun: A Fast and Effective Text Tracking in Compressed Video. ISM 2008: 136-141
36EEZhi Li, Yao-Chung Lin, David P. Varodayan, Pierpaolo Baccichet, Bernd Girod: Distortion-aware retransmission and concealment of video packets using a Wyner-Ziv-coded thumbnail. MMSP 2008: 424-428
35EEJia Xu, Zhi Li, Qian-Mu Li, Feng-Yu Liu: An adaptive clustering routing transition protocol in ad hoc networks. Computer Communications 31(10): 1952-1960 (2008)
34EEZhi Li, Hong Ma, Enbin Song: Notes on design of transformation-based reduced-rank generalized sidelobe canceller for matrix LCMV filter. Signal Processing 88(11): 2631-2639 (2008)
2007
33EELinqiang Chen, Gengdai Liu, Zhigeng Pan, Zhi Li: Design of Water Transportation Story for Grand Canal Museum Based on Multi-projection Screens. HCI (14) 2007: 627-632
32EEZhi Li, Xinglei Zhu, Yong Lian, Qibin Sun: Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption. ICME 2007: 627-630
31EEQibin Sun, Zhi Li, Yong Lian, Chang Wen Chen: Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks. ISCAS 2007: 3471-3474
30EEZhi Li, Hong Ma, Yongbing Mei: A Unifying Method for Outlier and Change Detection from Data Streams Based on Local Polynomial Fitting. PAKDD 2007: 150-161
29EEZhi Li, Guanglie Zhang: A Physical Activities Healthcare System Based onWireless Sensing Technology. RTCSA 2007: 369-376
28EEZhi Li, Xianlong Jin, Yuan Cao, Xiaoyun Zhang, Yuanyin Li: Architecture of collaborative design grid and its application based on LAN. Advances in Engineering Software 38(2): 121-132 (2007)
27EEZhi Li, Prasant Mohapatra: On investigating overlay service topologies. Computer Networks 51(1): 54-68 (2007)
26EEZhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah: On the analysis of overlay failure detection and recovery. Computer Networks 51(13): 3828-3843 (2007)
25EEZhi Li, Qibin Sun, Yong Lian, Chang Wen Chen: Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. IEEE Transactions on Multimedia 9(4): 837-850 (2007)
24EEYuan Cao, Xianlong Jin, Zhi Li: A distributed simulation system and its application. Simulation Modelling Practice and Theory 15(1): 21-31 (2007)
2006
23EEZhi Li, Yong Lian, Qibin Sun, Chang Chen: Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach. ICME 2006: 545-548
22EEZhi Li, Qibin Sun, Yong Lian: Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. ISCAS 2006
21EEZhi Li, Lihua Yuan, Prasant Mohapatra: An Efficient Overlay Link Performance Monitoring Technique. Networking 2006: 513-524
20EEDonghong Qin, Zhi Li: Evaluation and Research of Strong Migration of Mobile Agent for Exploiting Type Inference. QSIC 2006: 441-445
19EEZhi Li, Deming Zhu: Global asymptotic stability of a higher order nonlinear difference equation. Appl. Math. Lett. 19(9): 926-930 (2006)
2005
18EEZhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto: A Secure Image-Based Authentication Scheme for Mobile Devices. ICIC (2) 2005: 751-760
17EEZhi Li, Qibin Sun, Yong Lian: An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications. ICME 2005: 241-244
16EEZhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto: An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack. ICME 2005: 245-248
15EEZhi Li, Yu-Kwong Kwok: A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. ICPP Workshops 2005: 372-379
14EEZhi Li, Zhongwei Zhang: A Coupled Fuzzy Logic Control for Routers' Queue Management over TCP/AQM Networks. KES (2) 2005: 357-363
13EEZhi Li, Prasant Mohapatra, Chen-Nee Chuah: Virtual Multi-Homing: On the Feasibility of Combining Overlay Routing with BGP Routing. NETWORKING 2005: 1348-1352
12EEZhongwei Zhang, Zhi Li, Shan Suthaharan: Fuzzy Logic Strategy of Prognosticating TCP's Timeout and Retransmission. Computational Intelligence for Modelling and Prediction 2005: 309-320
2004
11EEZhi Li, Yu-Kwong Kwok: Local Route Recovery Algorithms for Improving Multihop TCP Performance in Ad Hoc Wireless Networks. Euro-Par 2004: 925-932
10EEZhi Li, Prasant Mohapatra: Impact of Topology On Overlay Routing Service. INFOCOM 2004
9EEZhi Li, Yu-Kwong Kwok: A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks. NPC 2004: 300-307
8EECunguo Wang, Qing Yang, Min Wei, Wei Sun, Zhi Li, Fuchuan Sun: Open-loop system of optokinetic nystagmus eye movement in human. SMC (3) 2004: 2664-2668
7EEZhi Li, Prasant Mohapatra: QoS-aware multicasting in DiffServ domains. Computer Communication Review 34(5): 47-57 (2004)
6EEZhi Li, Prasant Mohapatra: QRON: QoS-aware routing in overlay networks. IEEE Journal on Selected Areas in Communications 22(1): 29-40 (2004)
2003
5 Tao Zhang, Jian Li, Zhi Li: Machine Learning for Identifying Troubled Life Insurer. MLMTA 2003: 216-222
4EEZhi Li, Prasant Mohapatra: QMBF: a QoS-aware multicast routing protocol. Computer Communications 26(6): 611-621 (2003)
2002
3 Zhi Li, Zhongwei Zhang: An Application of Fuzzy Logic to Usage Parameter control in ATM Networks. FSKD 2002: 295-299
2 Zhongwei Zhang, Zhi Li, Shan Suthaharan: Fuzzy Logic Strategy of Prognosticating TCP's Timeout ad Retransmission. FSKD 2002: 310-313
2001
1EEZhi Li, John Higgins, Mark J. Clement: Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. MASCOTS 2001: 249-

Coauthor Index

1Pierpaolo Baccichet [36]
2Yuan Cao [24] [28]
3Chang Chen [23]
4Chang Wen Chen [25] [31]
5Hui Chen [38]
6Linqiang Chen [33]
7Chen-Nee Chuah [13] [26]
8Mark J. Clement [1]
9Daniela Constantinescu [42]
10Cherita L. Corbett [41]
11Dipak Ghosal [41]
12Bernd Girod [36]
13Daniele D. Giusto [16] [18]
14Danping Guo [37]
15John Higgins [1]
16Haixia Jiang [37]
17Xudong Jiang [39]
18Xianlong Jin [24] [28]
19Alex ChiChung Kot (Alex C. Kot) [39]
20Yu-Kwong Kwok [9] [11] [15]
21Jian Li [5]
22Qian-Mu Li [35]
23Yuanyin Li [28]
24Yong Lian [16] [17] [18] [22] [23] [25] [31] [32]
25Yao-Chung Lin [36]
26Feng-Yu Liu [35]
27Gengdai Liu [33]
28Guizhong Liu [37] [40]
29Shouyin Liu [38]
30Yali Liu [41]
31Hong Ma [30] [34]
32Yongbing Mei [30]
33Prasant Mohapatra [4] [6] [7] [10] [13] [21] [26] [27]
34Cherita Mukherjee [41]
35Nan Nan [37]
36Canhui Ou [41]
37Zhigeng Pan [33]
38Jing Qian [38]
39Xueming Qian [37]
40Donghong Qin [20]
41Enbin Song [34]
42Fuchuan Sun [8]
43Li Sun [37]
44Qibin Sun [16] [17] [18] [22] [23] [25] [31] [32] [39]
45Wei Sun [8]
46Shan Suthaharan [2] [12]
47David P. Varodayan [36]
48Cunguo Wang [8]
49Min Wei [8]
50Jia Xu [35]
51Qing Yang [8]
52Lihua Yuan [21] [26]
53Guanglie Zhang [29]
54Tao Zhang [5]
55Xiaoyun Zhang [28]
56Zhongwei Zhang [2] [3] [12] [14]
57Deming Zhu [19]
58Xinglei Zhu [32]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)