dblp.uni-trier.dewww.uni-trier.de

Zhoujun Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
42EEXiaoshi Yin, Xiangji Huang, Qinmin Hu, Zhoujun Li: Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study. PAKDD 2009: 949-956
2008
41EEWen-Han Chao, Zhoujun Li: Similar Sentence Retrieval for Machine Translation Based on Word-Aligned Bilingual Corpus. AIRS 2008: 578-585
40EEYangli Jia, Zhoujun Li, Zhenling Zhang: Timed Component-Interaction Automata for Specification and Verification of Real-Time Reactive Systems. CSSE (2) 2008: 135-138
39EETi Zhou, Zhoujun Li, Mengjun Li, Huowang Chen: Constraint Abstraction in Verification of Security Protocols. FAW 2008: 252-263
38EETi Zhou, Mengjun Li, Zhoujun Li: Local abstract verification and refinement of security protocols. FMSE 2008: 21-30
37EEJian Wen, Zhoujun Li: Improving Information Retrieval within Language Model Framework by Integrating Adjacent and Distant Relation. FSKD (4) 2008: 186-192
36EEQiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li: VM-based Architecture for Network Monitoring and Analysis. ICYCS 2008: 1395-1400
35EEZhoujun Li, Xiaoming Chen: Misusing Kademlia Protocol to Perform DDoS Attacks. ISPA 2008: 80-86
34EEMengjun Li, Ti Zhou, Zhoujun Li: SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. Inscrypt 2008: 125-140
33EEXiaoming Zhang, Zhoujun Li, Yijie Wang: A distributed topology-aware overlays construction algorithm. Mardi Gras Conference 2008: 5
32 Feng Liu, Zhoujun Li, Ti Zhou, Mengjun Li: Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic. SEKE 2008: 795-801
31EEHua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang: Cryptanalysis of simple three-party key exchange protocol. Computers & Security 27(1-2): 16-21 (2008)
30EETi Zhou, Mengjun Li, Zhoujun Li, Huowang Chen: Modeling and Verifying Time Sensitive Security Protocols with Constraints. Electr. Notes Theor. Comput. Sci. 212: 103-118 (2008)
29EEZhoujun Li, Hua Guo, Xiyong Zhang: fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol. Electr. Notes Theor. Comput. Sci. 212: 257-268 (2008)
28EEMengjun Li, Zhoujun Li, Huowang Chen, Ti Zhou: A Novel Derivation Framework For Definite Logic Program. Electr. Notes Theor. Comput. Sci. 212: 71-85 (2008)
2007
27EEJian Wen, Zhoujun Li, Lijuan Zhang, Xiaohua Hu, Huowang Chen: A New Method of Cluster-Based Topic Language Model for Genomic IR. AINA Workshops (1) 2007: 301-306
26EEChunming Gao, Jin Li, Zhoujun Li, Huowang Chen: Model Checking for BPEL4WS with Time. APWeb/WAIM Workshops 2007: 528-533
25EEMengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen: An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. ASIAN 2007: 166-180
24EEJian Wen, Zhoujun Li, Xiaohua Hu: Ontology Based Clustering for Improving Genomic IR. CBMS 2007: 225-230
23EEZhoujun Li, Ti Zhou, Mengjun Li, Huowang Chen: Constraints Solution for Time Sensitive Security Protocols. FAW 2007: 191-203
22EEZhoujun Li, Tao Wang, Ruoxue Wang, Yuejin Yan, Huowang Chen: A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees. FAW 2007: 216-227
21EEYun Sun, Zhoujun Li, Deqiang Wang: Hamiltonian Property on Binary Recursive Networks. FAW 2007: 228-235
20EEChen Wu, Xiaohua Hu, Zhoujun Li, Xiaohua Zhou, Palakorn Achananuparp: Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules. GrC 2007: 169-174
19EEJian Wen, Zhoujun Li: Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification. GrC 2007: 648-
18EETao Wang, Zhoujun Li, Yuejin Yan, Huowang Chen: A Survey of Fuzzy Decision Tree Classifier Methodology. ICFIE 2007: 959-968
17EEJie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. ICNS 2007: 54
16EEZhoujun Li, Yun Sun, Deqiang Wang: Diameter bounds of cubelike recursive networks. ICPADS 2007: 1-8
15EEYun Sun, Zhoujun Li, Deqiang Wang: Hamiltonicity and Pancyclicity of Binary Recursive Networks. ISPA 2007: 786-796
14EEWen-Han Chao, Zhoujun Li, Yuexin Chen: An Integrated Reordering Model for Statistical Machine Translation. MICAI 2007: 955-965
13EETao Wang, Zhoujun Li, Yuejin Yan, Huowang Chen: An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams. MLDM 2007: 91-103
12EELijuan Zhang, Zhoujun Li, Huowang Chen: An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix. PAKDD 2007: 1088-1095
11EETao Wang, Zhoujun Li, Xiaohua Hu, Yuejin Yan, Huowang Chen: A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees. PAKDD Workshops 2007: 256-267
2006
10EELijuan Zhang, Zhoujun Li: Gene Selection for Classifying Microarray Data Using Grey Relation Analysis. Discovery Science 2006: 378-382
9EEXiaoming Chen, Zhoujun Li, Yongzhen Zhuang, Jinsong Han, Lei Chen: HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems. HPCC 2006: 290-299
8EELijuan Zhang, Zhoujun Li, Huowang Chen, Jian Wen: Minimum Redundancy Gene Selection Based on Grey Relational Analysis. ICDM Workshops 2006: 120-124
7EEBo Chen, Zhoujun Li, Huowang Chen: A New Component-Oriented Programming Language with the First-Class Connector. JMLC 2006: 271-286
6 Bo Chen, Zhoujun Li, Huowang Chen: Supporting Connector in Programming Language. SEKE 2006: 369-374
2004
5EEYuejin Yan, Zhoujun Li, Tao Wang, Yuexin Chen, Huowang Chen: Mining Maximal Frequent ItemSets Using Combined FP-Tree. Australian Conference on Artificial Intelligence 2004: 475-487
4EEYuejin Yan, Zhoujun Li, Huowang Chen: Fast Mining Maximal Frequent ItemSets Based on FP-Tree. ER 2004: 348-361
2003
3EEXutao Du, Zhoujun Li: A Proof Assistant for Mobile Processes. APPT 2003: 204-214
1999
2EEZhoujun Li, Huowang Chen: Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes. TACAS 1999: 300-314
1998
1EEZhoujun Li, Huowang Chen: Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the pi-Calculus. ICALP 1998: 707-718

Coauthor Index

1Palakorn Achananuparp [20]
2Wen-Han Chao [14] [41]
3Bo Chen [6] [7]
4Huowang Chen [1] [2] [4] [5] [6] [7] [8] [11] [12] [13] [17] [18] [22] [23] [25] [26] [27] [28] [30] [39]
5Xiaoming Chen [9] [17] [35]
6Yuexin Chen [5] [14]
7Lei Chen [9]
8Xutao Du [3]
9Chunming Gao [26]
10Hua Guo [29] [31]
11Jinsong Han [9]
12Qinfen Hao [36]
13Qinmin Hu [42]
14Xiaohua Hu [11] [20] [24] [27]
15Xiangji Huang [42]
16Yangli Jia [40]
17Jin Li [26]
18Mengjun Li [23] [25] [28] [30] [32] [34] [38] [39]
19Qiang Li [36]
20Feng Liu [32]
21Yi Mu [31]
22Yun Sun [15] [16] [21]
23Deqiang Wang [15] [16] [21]
24Ruoxue Wang [22]
25Tao Wang [5] [11] [13] [18] [22]
26Yijie Wang [33]
27Jian Wen [8] [19] [24] [27] [37]
28Chen Wu [20]
29Limin Xiao [36]
30Yuejin Yan [4] [5] [11] [13] [18] [22]
31Xiaoshi Yin [42]
32Jie Yu [17]
33Lijuan Zhang [8] [10] [12] [27]
34Xiaoming Zhang [33]
35Xiyong Zhang [29] [31]
36Zhenling Zhang [40]
37Ti Zhou [23] [25] [28] [30] [32] [34] [38] [39]
38Xiaohua Zhou [20]
39Yongzhen Zhuang [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)