![]() | 2009 | |
---|---|---|
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yan Wang, Vijay Varadharajan: Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. ATC 2009: 221-235 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yanling Hao: A Framework of Marine Geography Information System for Ship. CSO (2) 2009: 228-231 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Yanling Hao, Lei Li, Ning Li: A Raster-Based Marine Data Model with Its Application. CSO (2) 2009: 294-297 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yuemei Ren, Changyu Yang: Path Planning Based on Dynamic Sub-population Pseudo-Parallel Genetic Algorithm. ESIAT (1) 2009: 523-526 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Zhang, Zhiguang Liu, Lei Li: Analysis of Factors Affecting the Motivation of Female College Students in Participation in Physical Training. ETT 2009: 64-66 |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Hankui Zhuo, Qiang Yang, Lei Li: Constraint-Based Case-Based Planning Using Weighted MAX-SAT. ICCBR 2009: 374-388 |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Liming Guan, Jian Lin, Lei Li: Control and Measurement on Printing-Image Color with Complete Color Management. ICNC (3) 2009: 362-366 |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Li, Lei Li: A Novel Split and Merge EM Algorithm for Gaussian Mixture Model. ICNC (6) 2009: 479-483 |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yan Wang, Ee-Peng Lim: Trust-Oriented Composite Service Selection and Discovery. ICSOC/ServiceWave 2009: 50-67 |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yan Wang: Trust Evaluation in Composite Services Selection and Discovery. IEEE SCC 2009: 482-485 |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Wang, Jiancheng Yang, Xiaoqin Han, Lei Li, Yan Liu, Liangchao Cong: The Research on Controlling Method of Loom Warp Tension. ISCID (1) 2009: 115-118 |
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, James McCann, Nancy S. Pollard, Christos Faloutsos: DynaMMo: mining and summarization of coevolving sequences with missing values. KDD 2009: 507-516 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Hankui Zhuo, Qiang Yang, Lei Li: Transfer Learning Action Models by Measuring the Similarity of Different Domains. PAKDD 2009: 697-704 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiangfeng Wang, Zhihui Yu, Xiaozeng Yang, Xing Wang Deng, Lei Li: Transcriptionally active gene fragments derived from potentially fast-evolving donor genes in the rice genome. Bioinformatics 25(10): 1215-1218 (2009) |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Koya Hattori: An Asymptotic Approach for Testing P0-Matrices. Electr. Notes Theor. Comput. Sci. 225: 195-200 (2009) |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Chunlei Niu, Ningjiang Chen, Jun Wei, Tao Huang: High Performance Approach for Server Side SOAP Processing. Int. J. Web Service Res. 6(2): 66-93 (2009) |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Sang-Il Han, Soo-Ik Chae, Lisane B. de Brisolara, Luigi Carro, Katalin Popovici, Xavier Guerin, Ahmed Amine Jerraya, Kai Huang, Lei Li, Xiaolang Yan: Simulink®-based heterogeneous multiprocessor SoC design flow for mixed hardware/software refinement and simulation. Integration 42(2): 227-245 (2009) |
2008 | ||
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, John G. Hosking, John C. Grundy: MaramaEML: An Integrated Multi-View Business Process Modelling Environment with Tree-Overlays, Zoomable Interfaces and Code Generation. ASE 2008: 477-478 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Wang, Lei Li, Ee-Peng Lim: Price Trust Evaluation in E-service Oriented Applications. CEC/EEE 2008: 165-172 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang: A Role-Based Access Control Model for Complex Affairs. CSSE (3) 2008: 646-650 |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Yanqing Wang, Xiao-fei Xu, Lei Li, Jian-zheng Wang: An AHP-Based Evaluation Index System of Coding Standards. CSSE (5) 2008: 620-623 |
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Changjia Chen: Exploring Possible Strategies for Competitions between Autonomous Systems. ICC 2008: 5919-5923 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Wanhong Xu, Xi Zhou, Lei Li: Inferring privacy information via social relations. ICDE Workshops 2008: 525-530 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Hengyu Wang, Lei Li, Jinwen Ma: The Competitive EM Algorithm for Gaussian Mixtures with BYY Harmony Criterion. ICIC (1) 2008: 552-560 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Jinwen Ma, Lei Li: Automatic Straight Line Detection through Fixed-Point BYY Harmony Learning. ICIC (1) 2008: 569-576 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Hankui Zhuo, Lei Li, Qiang Yang, Rui Bian: Learning Action Models with Quantified Conditional Effects for Software Requirement Specification. ICIC (1) 2008: 874-881 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Siyuan Liu, Lei Li, Yiyang Zhao, Jianping Fan: GMIP: A Novel Optical Interconnect Gridded Memory Service Protocol. ICPADS 2008: 138-144 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Yan Wang: A Trust Vector Approach to Service-Oriented Applications. ICWS 2008: 270-277 |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Zheng Cao, Mingyu Chen, Jianping Fan: Design and Evaluation of Optical Bus in High Performance Computer. ICYCS 2008: 1326-1330 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Jinwen Ma: A BYY Split-and-Merge EM Algorithm for Gaussian Mixture Learning. ISNN (1) 2008: 600-609 |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Gang Chen, Lei Li, Jinwen Ma: A Gradient BYY Harmony Learning Algorithm for Straight Line Detection. ISNN (1) 2008: 618-626 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Wenjie Fu, Fan Guo, Todd C. Mowry, Christos Faloutsos: Cut-and-stitch: efficient parallel learning of linear dynamical systems on smps. KDD 2008: 471-479 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Hankui Zhuo, Qiang Yang, Derek Hao Hu, Lei Li: Transferring Knowledge from Another Domain for Learning Action Models. PRICAI 2008: 1110-1115 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Yasushi Sakurai, Rosalynn Chong, Lei Li, Christos Faloutsos: Efficient Distribution Mining and Classification. SDM 2008: 632-643 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Yadong Wan, Lei Li, Jie He, Xiaotong Zhang, Qin Wang: Anshan: Wireless Sensor Networks for Equipment Fault Diagnosis in the Process Industry. SECON 2008: 314-322 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Shaolong Li, Changjia Chen, Lei Li: Prevent In-Game Cheat in Network Games. WKDD 2008: 513-518 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Jinwen Ma: A BYY scale-incremental EM algorithm for Gaussian mixture learning. Applied Mathematics and Computation 205(2): 832-840 (2008) |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Tao Huang, Lei Li, Jun Wei: Efficient Approach for Web Services Selection with Multi-QOS Constraints. Int. J. Cooperative Inf. Syst. 17(3): 349-371 (2008) |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Keil, Lei Li, Lars Mathiassen, Guangzhi Zheng: The influence of checklists and roles on software practitioner risk perception and decision-making. Journal of Systems and Software 81(6): 908-919 (2008) |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Fan Guo, Lei Li, Christos Faloutsos, Eric P. Xing: C-DEM: a multi-modal query system for Drosophila Embryo databases. PVLDB 1(2): 1508-1511 (2008) |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Rongqing Xu, Gaopeng Li: Robust ionospheric clutter mitigation method for high frequency surface wave radar. Science in China Series F: Information Sciences 51(12): 2087-2093 (2008) |
2007 | ||
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Jin Jiang, Lei Li, Zhihong Huang: Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis. CIS 2007: 781-784 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Yunxiang Zheng, Lei Li, Hai Wan: State-based Process Description Model in Chinese E-government Affair System. COMPSAC (1) 2007: 565-568 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhifang Li, Lei Li, Hao Cui, Hai Wan: An Adaptive-Granularity Locking Algorithm and Its Application in Collaborative Authoring System. CSCWD 2007: 168-173 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Kai Huang, Sang-Il Han, Katalin Popovici, Lisane B. de Brisolara, Xavier Guerin, Lei Li, Xiaolang Yan, Soo-Ik Chae, Luigi Carro, Ahmed Amine Jerraya: Simulink-Based MPSoC Design Flow: Case Study of Motion-JPEG and H.264. DAC 2007: 39-42 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, John G. Hosking, John C. Grundy: EML: A Tree Overlay-Based Visual Language for Business Process Modelling. ICEIS (3) 2007: 131-137 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Hankui Zhuo, Lei Li, Rui Bian, Hai Wan: Requirement Specification Based on Action Model Learning. ICIC (1) 2007: 565-574 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Jun Wei, Tao Huang: High Performance Approach for Multi-QoS Constrained Web Services Selection. ICSOC 2007: 283-294 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Guoquan Wu, Jun Wei, Xiaoqiang Qiao, Lei Li: A Bayesian network based Qos assessment model for web services. IEEE SCC 2007: 498-505 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang: Topology and Binary Routing Schemes of A PRDT-Based NoC. ITNG 2007: 920-924 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Congwu Chen, Lei Li, Jun Wei: AOP Based Trustable SLA Compliance Monitoring for Web Services. QSIC 2007: 225-230 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinwu Cheng, Lei Li, Jun Wei: Automatic enactment of message exchange pattern for web services. SAC 2007: 1649-1653 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, John G. Hosking, John C. Grundy: Visual Modelling of Complex Business Processes with Trees, Overlays and Distortion-based Displays. VL/HCC 2007: 137-144 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Zhanglei Wang, Krishnendu Chakrabarty: Scan-BIST based on cluster analysis and the encoding of repeating sequences. ACM Trans. Design Autom. Electr. Syst. 12(1): (2007) |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Junfeng Wang, Lei Li, Mingtian Zhou: Topological dynamics characterization for LEO satellite networks. Computer Networks 51(1): 43-53 (2007) |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Shaolong Li, Changjia Chen, Lei Li: A new method for path prediction in network games. Computers in Entertainment 5(4): (2007) |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Junfeng Pan, Qiang Yang, Yiming Yang, Lei Li, Frances Tianyi Li, George Wenmin Li: Cost-Sensitive-Data Preprocessing for Mining Customer Relationship Management Databases. IEEE Intelligent Systems 22(1): 46-51 (2007) |
2006 | ||
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Changjia Chen: Anti-loop Probing: Achieving Fast BGP Convergence. AINA (2) 2006: 697-701 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Qiaoling Liu, Yunfeng Tao, Lei Zhang, Jian Zhou, Yong Yu: Providing an Uncertainty Reasoning Service for Semantic Web Application. APWeb 2006: 628-639 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Huang, Lei Li, Qiang Tan: Behavior-Based Trust in Wireless Sensor Network. APWeb Workshops 2006: 214-223 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Huaimin Wang, Dian-xi Shi, Hui Liu: An Efficient Optimistic Atomic Broadcast Algorithm. GCC Workshops 2006: 315-320 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Keil, Lei Li, Lars Mathiassen, Guangzhi Zheng: The Influence of Checklists and Roles on Software Practitioner Risk Perception and Decision-Making. HICSS 2006 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Qin Wang, Cheng Youn Lu: A Novel Stopping Criterion for Turbo Decoding. ICICIC (1) 2006: 201-205 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Weixing Wang, Lei Li: Pattern Recognition and Computer vision for Mineral Froth. ICPR (4) 2006: 622-625 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Chunlei Niu, Ningjiang Chen, Jun Wei: High Performance Web Services Based on Service-Specific SOAP Processor. ICWS 2006: 603-610 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Suxiang Zhang, Juan Wen, Xiaojie Wang, Lei Li: Automatic Entity Relation Extraction Based on Maximum Entropy. ISDA (1) 2006: 540-544 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Heyong Wang, Jie Zheng, Zheng-an Yao, Lei Li: Improved Locally Linear Embedding Through New Distance Computing. ISNN (1) 2006: 1326-1333 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoling Cui, Lei Li, Jun Wei: A Novel SOAP Attachment-Oriented Security Model. ISSRE 2006: 127-135 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Chunlei Niu, Haoran Zheng, Jun Wei: An Adaptive Caching Mechanism for Web Services. QSIC 2006: 303-312 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Yu Ding, Qidan Zhu, Zhuoyi Xing, Lei Li: An Adaptive-Fuzzy Filter Algorithm for Vision Preprocessing. ROBIO 2006: 578-582 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Hai Wan, Yunxiang Zheng, Yin Chen, Lei Li: Building Business Process Description and Reasoning Meta-model Mbp in A-Prolog. SPW/ProSim 2006: 195-203 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Panagiota Kitsantas, Myles Hollander, Lei Li: Using classification trees to assess low birth weight outcomes. Artificial Intelligence in Medicine 38(3): 275-289 (2006) |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiangfeng Wang, Hang He, Lei Li, Runsheng Chen, Xing Wang Deng, Songgang Li: NMPP: a user-customized NimbleGen microarray data processing pipeline. Bioinformatics 22(23): 2955-2957 (2006) |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Daniel J. Fonseca, Der-San Chen: Earliness-tardiness production planning for just-in-time manufacturing: A unifying approach by goal programming. European Journal of Operational Research 175(1): 508-515 (2006) |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Grottke, Lei Li, Kalyanaraman Vaidyanathan, Kishor S. Trivedi: Analysis of Software Aging in a Web Server. IEEE Transactions on Reliability 55(3): 411-420 (2006) |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Anton Valouev, Lei Li, Yu-Chi Liu, David C. Schwartz, Yi Yang, Yu Zhang, Michael S. Waterman: Alignment of Optical Maps. Journal of Computational Biology 13(2): 442-462 (2006) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Huaimin Wang, Yang-Bin Tang, Gang Yin, Lei Li: Trustworthiness of Internet-based software. Science in China Series F: Information Sciences 49(6): 759-773 (2006) |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Junfeng Wang, Hongxia Zhou, Mingtian Zhou, Lei Li: A general model for long-tailed network traffic approximation. The Journal of Supercomputing 38(2): 155-172 (2006) |
2005 | ||
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong Pan, Qiang Yang, Jeffrey Junfeng Pan, Lei Li: Competence Driven Case-Base Mining. AAAI 2005: 228-233 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Roop G. Singh, Guangzhi Zheng, Art Vandenberg, Vijay K. Vaishnavi, Shamkant B. Navathe: A methodology for semantic integration of metadata in bioinformatics data sources. ACM Southeast Regional Conference (1) 2005: 131-136 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Hai Wan, Lei Li: Design and Implementation of Semantic Caching Coherency Control Scheme Toward Distributed Environment. APPT 2005: 41-51 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Xunxun Chen, Binxing Fang, Lei Li, Yu Jiang: WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm. APPT 2005: 515-523 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Yasumi Doi, Seiji Kajihara, Xiaoqing Wen, Lei Li, Krishnendu Chakrabarty: Test compression for scan circuits using scan polarity adjustment and pinpoint test relaxation. ASP-DAC 2005: 59-64 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Yin Chen, Fangzhen Lin, Lei Li: SELP - A System for Studying Strong Equivalence between Logic Programs. Answer Set Programming 2005 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Yiming Yang, Qiang Yang, Wei Lu, Sinno Jialin Pan, Rong Pan, Chenhui Lu, Lei Li, Zhenxing Qin: Preprocessing Time Series Data for Classification with Application to CRM. Australian Conference on Artificial Intelligence 2005: 133-142 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Shunji Abe: A Novel Mobile Routing System for IPv6. Communication Systems and Applications 2005: 125-130 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty: Hybrid BIST Based on Repeating Sequences and Cluster Analysis. DATE 2005: 1142-1147 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Hai Wan, Lei Li: E-business Software Architecture based on Temporal ECA Rules and Actions Conflicts Management. ICEBE 2005: 208-211 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Lin Zhang, Lei Li, Huimin Zhang: Delay Constraint Dynamic Bandwidth Allocation for Differentiated Service in Ethernet Passive Optical Networks. ICN (1) 2005: 350-357 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiao-Wei Hao, Tao Zhang, Lei Li: Semantic Caching for Web Based Learning Systems. ICWL 2005: 226-235 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenzhou Chen, Lei Li: Generalized Foley-Sammon Transform with Kernels. ISNN (1) 2005: 817-823 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Junfeng Wang, Hongxia Zhou, Fanjiang Xu, Lei Li: Hyper-Erlang Based Model for Network Traffic Approximation. ISPA 2005: 1012-1023 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Junfeng Wang, Hongxia Zhou, Lei Li, Fanjiang Xu: Accurate Long-tailed Network Traffic Approximation and Its Queueing Analysis by Hyper-Erlang Distributions. LCN 2005: 148-155 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Yin Chen, Fangzhen Lin, Lei Li: SELP - A System for Studying Strong Equivalence Between Logic Programs. LPNMR 2005: 442-446 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Zheng Cao, Mingyu Chen, Jianping Fan: A Reconfigurable Optical Interconnect System for DSAG. PDCAT 2005: 31-34 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Anton Valouev, Lei Li, Yu-Chi Liu, David C. Schwartz, Yi Yang, Yu Zhang, Michael S. Waterman: Alignment of Optical Maps. RECOMB 2005: 489-504 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty, Seiji Kajihara, Shivakumar Swaminathan: Efficient Space/Time Compression to Reduce Test Data Volume and Testing Time for IP Cores. VLSI Design 2005: 53-58 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Junfeng Wang, Lei Li, Fuchun Sun, Mingtian Zhou: A probability-guaranteed adaptive timeout algorithm for high-speed network flow detection. Computer Networks 48(2): 215-233 (2005) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Dong-Xia Chang, Da-Zheng Feng, Wei Xing Zheng, Lei Li: A fast recursive total least squares algorithm for adaptive IIR filtering. IEEE Transactions on Signal Processing 53(3): 957-965 (2005) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Shinji Abe: A Xcast-Based Seamless Handover Scheme over Wireless LAN. IEICE Transactions 88-B(3): 965-972 (2005) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Maojun Zhang, Fangjiang Xu, Shaohua Liu: ERT-VR: an immersive virtual reality system for emergency rescue training. Virtual Reality 8(3): 194-197 (2005) |
2004 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Chris Phillips, Chris Scogings: The Automatic Generation of a Graphical Dialogue Model from Delphi Source Code. APCHI 2004: 221-230 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Hong Li, Lei Li: A DTD-Conscious Sparse Numbering Scheme. CIT 2004: 295-302 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ian Horrocks, Lei Li, Daniele Turi, Sean Bechhofer: The Instance Store: DL Reasoning with Large Numbers of Individuals. Description Logics 2004 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong Pan, Qiang Yang, Lei Li: Case Retrieval Using Nonlinear Feature-Space Transformation. ECCBR 2004: 361-374 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Hai Wan, Xiao-Wei Hao, Tao Zhang, Lei Li: Semantic Caching Services for Data Grids. GCC 2004: 959-962 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li: Reasoning with large numbers of individuals moves on: extending the instance store. IJCAR Doctoral Programme 2004 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Vijay K. Vaishnavi, Art Vandenberg: An Architecture for Semantic Facilitation and Reuse of Directory Metadata. IKE 2004: 332-338 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty: Test set embedding for deterministic BIST using a reconfigurable interconnection network. IEEE Trans. on CAD of Integrated Circuits and Systems 23(9): 1289-1305 (2004) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty: On Using Exponential-Golomb Codes and Subexponential Codes for System-on-a-Chip Test Data Compression. J. Electronic Testing 20(6): 667-670 (2004) |
2003 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Chong-zhi Gao, Zheng-an Yao, Lei Li: A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. ACNS 2003: 169-175 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Ian Horrocks: Matchmarking Using an Instance Store: Some Preliminary Results. Description Logics 2003 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Seiji Kajihara, Yasumi Doi, Lei Li, Krishnendu Chakrabarty: On Combining Pinpoint Test Set Relaxation and Run-Length Codes for Reducing Test Data Volume. ICCD 2003: 387-396 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty: Deterministic BIST Based on a Reconfigurable Interconnection Network. ITC 2003: 460-469 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li: A Parallel Algorithm for the Linear Complementarity Problem with an M-Matirx. PDPTA 2003: 1312-1316 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Jong Hyun Kim, Michael S. Waterman: Haplotype reconstruction from SNP alignment. RECOMB 2003: 207-216 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty: Test Data Compression Using Dictionaries with Fixed-Length Indices. VTS 2003: 219-224 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Ian Horrocks: A software framework for matchmaking based on semantic web technology. WWW 2003: 331-339 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Krishnendu Chakrabarty, Nur A. Touba: Test data compression using dictionaries with selective entries and fixed-length indices. ACM Trans. Design Autom. Electr. Syst. 8(4): 470-490 (2003) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Fuchun Sun, Zengqi Sun, Lei Li, Han-Xiong Li: Neuro-fuzzy adaptive control based on dynamic inversion for robotic manipulators. Fuzzy Sets and Systems 134(1): 117-133 (2003) |
2002 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Dong Chen, Selvamuthu Dharmaraja, Dongyan Chen, Lei Li, Kishor S. Trivedi, Raphael R. Some, Allen P. Nikora: Reliability and Availability Analysis for the JPL Remote Exploration and Experimentation System. DSN 2002: 337-344 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Kalyanaraman Vaidyanathan, Kishor S. Trivedi: An Approach for Estimation of Software Aging in a Web Server. ISESE 2002: 91-102 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Qingshi Gao, Yue Hu, Lei Li, Xu Chen, Honglan Liu: A Novel Computer Architecture to Prevent Destruction by Viruses. J. Comput. Sci. Technol. 17(3): 241-248 (2002) |
2000 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Bin Yu: Iterated logarithmic expansions of the pathwise code lengths for exponential families. IEEE Transactions on Information Theory 46(7): 2683-2689 (2000) |
1997 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Jie Hu, Tadao Nakamura, Lei Li: Convergence, Complexity and Simulation of Monotone Asynchronous Iterative Method for Computing Fixed Point on a Distributed Computer. Parallel Algorithms Appl. 11(1-2): 1-11 (1997) |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Jie Hu, Tadao Nakamura, Lei Li: Asynchronous Monotone Newton Iterative Method on Distributed Computers. Parallel Algorithms Appl. 12(4): 341-348 (1997) |
1995 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Jie Hu, Tadao Nakamura, Lei Li: The Convergence of Asynchronous Monotone Newton Iterations on Distributed Computer. PPSC 1995: 106-107 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jie Hu, Lei Li, Tadao Nakamura: A Divide-and-inner Product Parallel Algorithm for Polynomial Evaluation. Parallel Algorithms Appl. 6(1): 63-66 (1995) |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Li, Tadao Nakamura: The Convergence of Asynchronous Iterations for the Fixed Point of a Splitting Operator. Parallel Algorithms Appl. 7(3-4): 229-235 (1995) |
1990 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Selmin Nurcan, Jacques Kouloumdjian, Lei Li: Integrating Database Technology and iogic Programming Paradigm. SEKE 1990: 147-152 |