2009 |
75 | EE | Paola Grosso,
Damien Marchal,
Jason Maassen,
Eric Bernier,
Li Xu,
Cees de Laat:
Dynamic photonic lightpaths in the StarPlane network.
Future Generation Comp. Syst. 25(2): 132-136 (2009) |
74 | EE | Leon Gommans,
Li Xu,
Yuri Demchenko,
Alfred Wan,
Mihai Cristea,
Robert J. Meijer,
Cees de Laat:
Multi-domain lightpath authorization, using tokens.
Future Generation Comp. Syst. 25(2): 153-160 (2009) |
2008 |
73 | EE | Li Xu,
Hui Bo,
Liu Haixia,
Yang Mingqiang,
Song Mei,
Guo Wei:
Research and Analysis of Topology Control in NS-2 for Ad-hoc Wireless Network.
CISIS 2008: 461-465 |
72 | EE | Zhongyuan Wang,
Qingwen Qi,
Li Xu:
Cluster Analysis Based on Spatial Feature Selecting in Spatial Data Mining.
CSSE (4) 2008: 386-389 |
71 | EE | Gao Hai-ying,
Xu Yin,
Li Xu,
Liu Guo-qiang:
A Steganographic Algorithm for JPEG2000 Image.
CSSE (5) 2008: 1263-1266 |
70 | EE | Li Xu,
Jianing Chen,
Jiaya Jia:
A Segmentation Based Variational Model for Accurate Optical Flow Estimation.
ECCV (1) 2008: 671-684 |
69 | EE | Li Xu,
Jiaya Jia:
Stereo Matching: An Outlier Confidence Approach.
ECCV (4) 2008: 775-787 |
68 | EE | Li Xu,
Qingwen Qi,
Zhongyuan Wang:
Regional Ecological Environment Spatial Data Mining Based on GIS and RS: A Case Study in Zhangjiajie, China.
FSKD (4) 2008: 266-270 |
67 | EE | Zhongren Liu,
Li Xu,
Zhide Chen,
Yi Mu,
Fuchun Guo:
Hierarchical Identity-Based Online/Offline Encryption.
ICYCS 2008: 2115-2119 |
66 | EE | Li Xu:
Language engineering in the context of a popular, inexpensive robot platform.
SIGCSE 2008: 43-47 |
65 | EE | Suzhen Wang,
Jielai Xia,
Lili Yu,
Chanjuan Li,
Li Xu:
A SAS macro for sample size adjustment and randomization test for internal pilot study.
Computer Methods and Programs in Biomedicine 90(1): 66-88 (2008) |
64 | EE | Xiaotian Zhu,
Hong Wang,
Li Xu,
Huaizu Li:
Predicting stock index increments by neural networks: The role of trading volume under different horizons.
Expert Syst. Appl. 34(4): 3043-3054 (2008) |
63 | EE | Li Xu,
David W. Embley:
Categorisation of web documents using extraction ontologies.
IJMSO 3(1): 3-20 (2008) |
62 | EE | Ling Li,
Li Xu,
Hueiwang Anna Jeng,
Dayanand N. Naik,
Thomas Allen,
Maria Frontini:
Creation of environmental health information system for public health service: A pilot study.
Information Systems Frontiers 10(5): 531-542 (2008) |
61 | EE | Yihui Zhang,
Li Xu,
Xiaoding Wang:
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
JCM 3(6): 43-50 (2008) |
60 | EE | Li Xu,
Jianwei Chen,
Xiaoding Wang:
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
JCM 3(6): 51-58 (2008) |
2007 |
59 | EE | Zhiping Lin,
Li Xu,
Yoshihisa Anazawa:
Revisiting the Absolutely Minimal Realization for Two-dimensional Digital Filters.
ISCAS 2007: 597-600 |
58 | EE | Jianwei Chen,
Li Xu,
Yi Mu:
A new group rekeying scheme based on t-packing designs for ad hoc networks.
Infoscale 2007: 54 |
57 | EE | Fuchun Guo,
Yi Mu,
Zhide Chen,
Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles.
Inscrypt 2007: 384-398 |
56 | EE | Rohini K. Srihari,
Li Xu,
Tushar Saxena:
Use of ranked cross document evidence trails for hypothesis generation.
KDD 2007: 677-686 |
55 | EE | Yihong Ding,
Deryle W. Lonsdale,
David W. Embley,
Martin Hepp,
Li Xu:
Generating Ontologies Via Language Components and Ontology Reuse.
NLDB 2007: 131-142 |
54 | EE | Mihai-Lucian Cristea,
Leon Gommans,
Li Xu,
Herbert Bos:
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts.
Networking 2007: 945-957 |
53 | EE | Li Xu:
RobotStudio: a modern IDE-based approach to reality computing.
SIGCSE 2007: 440-444 |
52 | EE | Jianmin Jiang,
Hongping Shu,
Li Xu:
An Architecture for Software Systems with time constraints.
SNPD (2) 2007: 154-159 |
51 | EE | Azzedine Boukerche,
Li Xu,
Khalil El-Khatib:
Trust-based security for wireless ad hoc and sensor networks.
Computer Communications 30(11-12): 2413-2427 (2007) |
50 | EE | Azzedine Boukerche,
Li Xu,
Khalil El-Khatib:
Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427].
Computer Communications 30(18): 3905 (2007) |
2006 |
49 | EE | Laurence Tianruo Yang,
Li Xu,
Man Lin,
John P. Quinn:
A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization.
ATC 2006: 428-438 |
48 | EE | Fuchun Guo,
Zhide Chen,
Yi Mu,
Li Xu,
Shengyuan Zhang:
Secure and Efficient Trust Negotiation.
CIS 2006: 374-384 |
47 | EE | Huang Jianzhong,
Xie Changsheng,
Li Xu:
iOBS3: An iSCSI-Based Object Storage Security System.
CIS 2006: 652-660 |
46 | EE | Zhide Chen,
Li Xu:
Anti-Collusion Anonymous Credentials Scheme.
CIT 2006: 150 |
45 | EE | Li Xu,
Zhiwei Lin,
Ayong Ye:
Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network.
CSCWD 2006: 1027-1030 |
44 | EE | Li Xu,
David W. Embley,
Yihong Ding:
Combining Declarative and Procedural Knowledge to Automate and Represent Ontology Mapping.
ER (Workshops) 2006: 395-404 |
43 | EE | Laurence Tianruo Yang,
Li Xu,
Man Lin,
John P. Quinn:
A Parallel GNFS Algorithm Based on a Reliable Look-Ahead Block Lanczos Method for Integer Factorization.
EUC 2006: 110-120 |
42 | EE | Zhiwei Lin,
Li Xu,
Dajin Wang,
Jianliang Gao:
A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network.
GPC 2006: 509-516 |
41 | EE | Liang Chen,
Li Xu:
Collective Behavior of an Anisotropic Swarm Model Based on Unbounded Repulsion in Social Potential Fields.
ICIC (3) 2006: 164-173 |
40 | EE | Wang Ying,
Chen Wei,
Li Xu,
Cheng Bing:
Degenerated Primer Design to Amplify the Heavy Chain Variable Region from Immunoglobulin cDNA.
IMSCCS (1) 2006: 64-68 |
39 | EE | Zhiping Lin,
M. S. Boudellioua,
Li Xu:
On the equivalence and factorization of multivariate polynomial matrices.
ISCAS 2006 |
38 | EE | Li Xu,
Chunping Li:
Multi-objective Parameters Selection for SVM Classification Using NSGA-II.
Industrial Conference on Data Mining 2006: 365-376 |
37 | EE | Willem de Bruijn,
Asia Slowinska,
Kees van Reeuwijk,
Tomas Hruby,
Li Xu,
Herbert Bos:
SafeCard: A Gigabit IPS on the Network Card.
RAID 2006: 311-330 |
36 | EE | Li Xu,
Fred G. Martin:
Chirp on crickets: teaching compilers using an embedded robot controller.
SIGCSE 2006: 82-86 |
35 | EE | Li Xu,
David W. Embley:
A composite approach to automating direct and indirect schema mappings.
Inf. Syst. 31(8): 697-732 (2006) |
34 | EE | Azzedine Boukerche,
Khalil El-Khatib,
Li Xu,
Larry Korba:
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks.
Perform. Eval. 63(11): 1094-1109 (2006) |
2005 |
33 | EE | Yong-Bing Shi,
Yin-Cai Tang,
Hua Tang,
Ling-Liu Gong,
Li Xu:
Two Classes of Simple MCD Graphs.
CJCDGCGT 2005: 177-188 |
32 | EE | Hai Jin,
Minghu Zhang,
Pengliu Tan,
Hanhua Chen,
Li Xu:
Lightweight Real-Time Network Communication Protocol for Commodity Cluster Systems.
EUC 2005: 1075-1084 |
31 | EE | Laurence Tianruo Yang,
Li Xu,
Man Lin:
Integer Factorization by a Parallel GNFS Algorithm for Public Key Cryptosystems.
ICESS 2005: 683-695 |
30 | EE | Li Xu,
Wen-xiang Gu,
Xin-mei Zhang:
Backward-Chaining Flexible Planning.
ICMLC 2005: 1-10 |
29 | EE | Yegui Xiao,
Liying Ma,
Khashayar Khorasani,
Akira Ikuta,
Li Xu:
A filtered-X RLS based narrowband active noise control system in the presence of frequency mismatch.
ISCAS (1) 2005: 260-263 |
28 | EE | Li Xu,
Huijin Fan,
Zhiping Lin,
Yegui Xiao,
Yoshihisa Anazawa:
A constructive procedure for multidimensional realization and LFR uncertainty modelling.
ISCAS (3) 2005: 2044-2047 |
27 | | Li Xu,
Laurence Tianruo Yang,
Man Lin:
Factoring large integers using parallel general number field sieve.
PDPTA 2005: 1017-1023 |
26 | EE | Azzedine Boukerche,
Khalil El-Khatib,
Li Xu,
Larry Korba:
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks.
Computer Communications 28(10): 1193-1203 (2005) |
2004 |
25 | EE | Li Xu,
Bao-yu Zheng:
Power Management Based Grid Routing Protocol for IEEE 802.11 Based MANET.
GCC 2004: 753-760 |
24 | EE | Li Xu,
Qinghe Wu,
Zhiping Lin,
Yegui Xiao,
Yoshihisa Anazawa:
Further results on realization of 2D filters by Fornasini-Marchesini model.
ICARCV 2004: 1460-1464 |
23 | EE | Zhiping Lin,
Li Xu,
Qinghe Wu:
Design of multidimensional filter banks using Grobner bases: a survey.
ISCAS (3) 2004: 277-280 |
22 | EE | Li Xu,
Lianku Wu,
Qinghe Wu,
Zhiping Lin,
Yegui Xiao:
Reduced-order realization of Fornasini-Marchesini model for 2D systems.
ISCAS (3) 2004: 289-292 |
21 | EE | Yegui Xiao,
Liying Ma,
Rabab Kreidieh Ward,
Li Xu:
Fast RLS Fourier analyzers in the presence of frequency mismatch.
ISCAS (3) 2004: 497-500 |
20 | | Li Xu,
David W. Embley:
Combining the Best of Global-as-View and Local-as-View for Data Integration.
ISTA 2004: 123-136 |
19 | EE | Azzedine Boukerche,
Khalil El-Khatib,
Li Xu,
Larry Korba:
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks.
LCN 2004: 618-624 |
18 | EE | Azzedine Boukerche,
Khalil El-Khatib,
Li Xu,
Larry Korba:
A novel solution for achieving anonymity in wireless ad hoc networks.
PE-WASUN 2004: 30-38 |
17 | | Li Xu,
Bao-yu Zheng,
Zhen Yang:
Power and Mobility-aware Adaptive Dynamic Source Routing in MANET.
SNPD 2004: 174-180 |
16 | EE | David W. Embley,
Li Xu,
Yihong Ding:
Automatic Direct and Indirect Schema Mapping: Experiences and Lessons Learned.
SIGMOD Record 33(4): 14-19 (2004) |
2003 |
15 | EE | Li Xu,
David W. Embley:
Discovering Direct and Indirect Matches for Schema Elements.
DASFAA 2003: 39-46 |
14 | EE | Yegui Xiao,
Rabab Kreidieh Ward,
Li Xu:
A new LMS-based Fourier analyzer in the presence of frequency mismatch.
ISCAS (4) 2003: 369-372 |
13 | EE | Keith D. Cooper,
Li Xu:
Memory Redundancy Elimination to Improve Application Energy Efficiency.
LCPC 2003: 288-305 |
2002 |
12 | EE | Keith D. Cooper,
Li Xu:
An efficient static analysis algorithm to detect redundant memory operations.
MSP/ISMM 2002: 97-107 |
11 | | David W. Embley,
David Jackman,
Li Xu:
Atribute Match Discovery in Information Integration: Exploiting Multiple Facets of Metadata.
J. Braz. Comp. Soc. 8(2): 32-43 (2002) |
2001 |
10 | EE | David W. Embley,
Yiu-Kai Ng,
Li Xu:
Recognizing Ontology-Applicable Multiple-Record Web Documents.
ER 2001: 555-570 |
9 | EE | Zhiping Lin,
Jiang Qian Ying,
Li Xu:
Further results on primitive factorizations for nD polynomial matrices.
ISCAS (2) 2001: 373-376 |
8 | | David W. Embley,
David Jackman,
Li Xu:
Multifaceted Exploitation of Metadata for Attribute Match Discovery in Information Integration.
Workshop on Information Integration on the Web 2001: 110-117 |
7 | | Li Xu,
Yuan F. Zheng:
Moving Personal Robots in Real-Time Using Primitive Motions.
Auton. Robots 10(2): 175-183 (2001) |
2000 |
6 | | Li Xu,
Yuan F. Zheng:
Real-Time Motion Planning for Personal Robots Using Primitive Motions.
ICRA 2000: 1414-1419 |
5 | EE | David W. Embley,
Li Xu:
Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents.
WebDB (Informal Proceedings) 2000: 123-128 |
4 | EE | David W. Embley,
Li Xu:
Record Location and Reconfiguration in Unstructured Multiple-Record Web Documents.
WebDB (Selected Papers) 2000: 256-274 |
1999 |
3 | | Li Xu,
Yuan F. Zheng:
Reflexive Behavior of Personal Robots Using Primitive Motions.
ICRA 1999: 3189- |
2 | EE | Li Xu,
O. Saito,
Jiang Qian Ying:
2D feedback system design: the tracking and disturbance rejection problems.
ISCAS (5) 1999: 13-16 |
1 | | Jiang Qian Ying,
Li Xu,
Zhiping Lin:
A Computational Method for Determining Strong Stabilizability of n-D Systems.
J. Symb. Comput. 27(5): 479-499 (1999) |