2009 | ||
---|---|---|
155 | Yang Lu, Jianming Hu, Jun Xu, Shuning Wang: Urban Traffic Flow Forecasting Based on Adaptive Hinging Hyperplanes. AICI 2009: 658-667 | |
154 | Hussain Fatakdawala, Ajay Basavanhally, Jun Xu, Gyan Bhanot, Shridar Ganesan, Michael D. Feldman, John Tomaszewski, Anant Madabhushi: Expectation Maximization driven Geodesic Active Contour with Overlap Resolution (EMaGACOR): Application to Lymphocyte Segmentation on Breast Cancer Histopathology. BIBE 2009: 69-76 | |
153 | Zhaoxu Chen, Jun Xu: Dynamic Linkages between Stock Market Volatility and Macroeconomic Variables: Empirical Evidence Based on China. BIFE 2009: 831-835 | |
152 | Gangyan Li, Jun Xu: An Information Acquisition Method of City Bus Integrated Control Network. CSIE (3) 2009: 722-725 | |
151 | Gangyan Li, Jian Hu, Duanfeng Chu, Jun Xu: Design on the Higher Layer Protocol of City-Bus Information Integrated Control Network Based on Embedded Component. CSIE (7) 2009: 575-579 | |
150 | Jun Xu, Raju Hormis, Xiaodong Wang: Scalable Video Multicast on Broadcast Channels. GLOBECOM 2009: 1-8 | |
149 | Jun Xu, Gang Xiao, JiaWei Lu, Qianhui Liang, Jun Shen: Customizable Data Exchange Based on Web Service. ICEBE 2009: 522-525 | |
148 | Jun Xu, Lianhong Cai: Automatic Emphasis Labeling for Emotional Speech by Measuring Prosody Generation Error. ICIC (1) 2009: 177-186 | |
147 | Chang Xu, Jun Xu, Huiyou Chang: Ant Colony Optimization Based on Estimation of Distribution for the Traveling Salesman Problem. ICNC (3) 2009: 19-23 | |
146 | Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, Jun Xu, Qi Zhao: Modeling user activities in a large IPTV system. Internet Measurement Conference 2009: 430-441 | |
145 | Jun Xu, Xiangku Li: Efficient Physical Design Methodology for Reducing Test Power Dissipation of Scan-Based Designs. NAS 2009: 365-370 | |
144 | Lin Liu, Hongyu Zhang, Fei Peng, Wenting Ma, Yuhui Shan, Jun Xu, Tomas Burda: Understanding Chinese Characteristics of Requirements Engineering. RE 2009: 261-266 | |
143 | Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, Qi Zhao, Jun Xu: Modeling channel popularity dynamics in a large IPTV system. SIGMETRICS/Performance 2009: 275-286 | |
142 | Xutao Deng, Jun Xu, James Hui, Charles Wang: Probability fold change: A robust computational approach for identifying differentially expressed gene lists. Computer Methods and Programs in Biomedicine 93(2): 124-139 (2009) | |
141 | Atish Das Sarma, Ashwin Lall, Danupon Nanongkai, Jun Xu: Randomized Multi-pass Streaming Skyline Algorithms. PVLDB 2(1): 85-96 (2009) | |
2008 | ||
140 | Weijian Ni, Jun Xu, Hang Li, Yalou Huang: Group-based learning: a boosting approach. CIKM 2008: 1443-1444 | |
139 | Kai Zheng, Yongxin Zhu, Jun Xu: Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor Simulator. EUC (2) 2008: 486-491 | |
138 | Jun Xu, Maode Ma, Choi Look Law: AOA Cooperative Position Localization. GLOBECOM 2008: 3751-3755 | |
137 | Jun Xu, Harish Ramchandran, Je-Hong Jong, C. Ravishankar: Analytical Framework for Performance Evaluation of Hybrid ARQ Schemes. GLOBECOM 2008: 3902-3906 | |
136 | Jun Xu: Study of Artificial Neural Network Appraisal to Mine Coordination Development Ability. ISIP 2008: 97-101 | |
135 | Benjamin R. Hamilton, Xiaoli Ma, Qi Zhao, Jun Xu: ACES: adaptive clock estimation and synchronization using Kalman filtering. MOBICOM 2008: 152-162 | |
134 | Jun Xu, Tie-Yan Liu, Min Lu, Hang Li, Wei-Ying Ma: Directly optimizing evaluation measures in learning to rank. SIGIR 2008: 107-114 | |
133 | Jing Yao, Jun Xu, Junyu Niu: Using Role Determination and Expert Mining in the Enterprise Environment. TREC 2008 | |
132 | XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008) | |
131 | Xutao Deng, Jun Xu, Charles Wang: Improving the power for detecting overlapping genes from multiple DNA microarray-derived gene lists. BMC Bioinformatics 9(S-6): (2008) | |
130 | Alexander Thomasian, Jun Xu: Reliability and Performance of Mirrored Disk Organizations. Comput. J. 51(6): 615-629 (2008) | |
129 | Jun Xu, Yong-Yan Cao, Youxian Sun, Jinshan Tang: Absolute Exponential Stability of Recurrent Neural Networks With Generalized Activation Function. IEEE Transactions on Neural Networks 19(6): 1075-1089 (2008) | |
128 | Jun Xu, Xuemin Shen, Jon W. Mark, Jun Cai: Quasi-Optimal Channel Assignment for Real-Time Video in OFDM Wireless Systems. IEEE Transactions on Wireless Communications 7(4): 1417-1427 (2008) | |
127 | Minho Sung, Jun Xu, Jun Li, Li Li: Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Trans. Netw. 16(6): 1253-1266 (2008) | |
126 | Jun Xu, Yong-Yan Cao, Daoying Pi, Youxian Sun: An estimation of the domain of attraction for recurrent neural networks with time-varying delays. Neurocomputing 71(7-9): 1566-1577 (2008) | |
2007 | ||
125 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572 | |
124 | Jing Yao, Jun Xu, Cheng Jin, Junyu Niu: Role Centralized Modeling for Expert Search in Enterprise Corporation. ALPIT 2007: 498-503 | |
123 | Reza Sotudeh, Jun Xu, Aladdin M. Ariyaeeinia: Speech Processing on FPGA. Computers and Their Applications 2007: 18-23 | |
122 | Jun Xu, Yunbo Cao, Hang Li, Nick Craswell, Yalou Huang: Searching Documents Based on Relevance and Type. ECIR 2007: 629-636 | |
121 | Mithun Acharya, Tao Xie, Jian Pei, Jun Xu: Mining API patterns as partial orders from source code: from usage scenarios to specifications. ESEC/SIGSOFT FSE 2007: 25-34 | |
120 | Yang Chen, Abhishek Kumar, Jun Xu: A New Design of Bloom Filter for Packet Inspection Speedup. GLOBECOM 2007: 1-5 | |
119 | Jun Xu, Maode Ma, Choi Look Law: Theoretical Lower Bound for UWB TDOA Positioning. GLOBECOM 2007: 4101-4105 | |
118 | Jun Xu, Je-Hong Jong, C. Ravishankar: Channel Modeling for a Land Mobile Satellite System. GLOBECOM 2007: 4596-4600 | |
117 | Jun Xu, Li Song, Shibao Zheng, Xiaokang Yang, Rong Xie: Bit Allocation for Fine-Granular SNR Scalability Coding with Hierarchical B Pictures. ICME 2007: 1151-1154 | |
116 | Xutao Deng, Jun Xu, Charles Wang: Multiplicity Adjustment for Intersection-union Test: Detecting Overlapping Genes from Multiple Microarray Gene Lists. IMSCCS 2007: 52-59 | |
115 | Lei Wang, Junyan Ren, Wenjing Yin, Tingqian Chen, Jun Xu: A High-Speed High-Resolution Low-Distortion CMOS Bootstrapped Switch. ISCAS 2007: 1721-1724 | |
114 | Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogihara, Oliver Spatscheck, Jia Wang, Jun Xu: A data streaming algorithm for estimating entropies of od flows. Internet Measurement Comference 2007: 279-290 | |
113 | Alexander Thomasian, Jun Xu: Cost Analysis of the X-code Double Parity Array. MSST 2007: 269-274 | |
112 | Jun Xu, Hang Li: AdaRank: a boosting algorithm for information retrieval. SIGIR 2007: 391-398 | |
111 | Jun Xu, Jing Yao, Jiaqian Zheng, Qi Sun, Junyu Niu: WIM at TREC 2007. TREC 2007 | |
110 | Jun Xu, Feng Yang, Hong Wan: Controlled sequential bifurcation for software reliability study. Winter Simulation Conference 2007: 281-288 | |
109 | Jun Xu, Lei Chen, Ivana Djurdjevic, Shu Lin, Khaled A. S. Abdel-Ghaffar: Construction of Regular and Irregular LDPC Codes: Geometry Decomposition and Masking. IEEE Transactions on Information Theory 53(1): 121-134 (2007) | |
108 | Jun Xu, Xuemin Shen, Jon W. Mark, Jun Cai: Adaptive Transmission of Multi-Layered Video over Wireless Fading Channels. IEEE Transactions on Wireless Communications 6(6): 2305-2314 (2007) | |
107 | Jun Xu: Formalizing natural-language spatial relations between linear objects with topological and metric properties. International Journal of Geographical Information Science 21(4): 377-395 (2007) | |
106 | Jun Xu, Xiaomin Zha: Secret Sharing Schemes With General Access Structure Based On MSPs. JCM 2(1): 52-55 (2007) | |
105 | Jun Xu, Yalou Huang: Using SVM to Extract Acronyms from Text. Soft Comput. 11(4): 369-373 (2007) | |
104 | Jun Xu, Xuemin Shen, Jon W. Mark, Jun Cai: Mobile location estimation for DS-CDMA systems using self-organizing maps. Wireless Communications and Mobile Computing 7(3): 285-298 (2007) | |
2006 | ||
103 | XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46 | |
102 | Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348 | |
101 | Jun Xu, Reza Sotudeh, Mark B. Josephs: Asynchronous Packet-Switching for Networks-on-Chip. ACSD 2006: 201-207 | |
100 | Xingjun Zhang, Joshua Zhexue Huang, Depei Qian, Jun Xu, Liping Jing: Supplier Categorization with K-Means Type Subspace Clustering. APWeb 2006: 226-237 | |
99 | Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie: Effective Generation of Interface Robustness Properties for Static Analysis. ASE 2006: 293-296 | |
98 | Ning Gu, Jun Xu, Wei Ye: Approach to Indefinite Semantic Conflicts of Words in Collaborative Editing of Design Documents. CSCWD 2006: 671-676 | |
97 | Jun Xu, Yunbo Cao, Hang Li, Yalou Huang: Cost-Sensitive Learning of SVM for Ranking. ECML 2006: 833-840 | |
96 | Minho Sung, Abhishek Kumar, Erran L. Li, Jia Wang, Jun Xu: Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic. ICDE Workshops 2006: 27 | |
95 | Peng Yang, Jun Xu, Jie He, Lihua Liang, Guobin Li: Hybrid Control Based on Improved Radial Basis Function Network for Electro-hydraulic Servo System. ICICIC (1) 2006: 117-120 | |
94 | Abhishek Kumar, Jun Xu: Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection. INFOCOM 2006 | |
93 | Xiaonan Zhang, Jun Xu, Lianhong Cai: Prosodic Boundary Prediction Based on Maximum Entropy Model with Error-Driven Modification. ISCSLP 2006: 149-160 | |
92 | Yan Zhai, Peng Ning, Jun Xu: Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 | |
91 | Jun Xu, Daoying Pi, Yong-Yan Cao: Global Robust Stability of General Recurrent Neural Networks with Time-Varying Delays. ISNN (1) 2006: 179-184 | |
90 | Mithun Acharya, Tao Xie, Jun Xu: Mining Interface Specifications for Generating Checkable Robustness Properties. ISSRE 2006: 311-320 | |
89 | Qi Zhao, Mitsunori Ogihara, Haixun Wang, Jun Xu: Finding global icebergs over distributed data sets. PODS 2006: 298-307 | |
88 | Yunbo Cao, Jun Xu, Tie-Yan Liu, Hang Li, Yalou Huang, Hsiao-Wuen Hon: Adapting ranking SVM to document retrieval. SIGIR 2006: 186-193 | |
87 | Qi Zhao, Zihui Ge, Jia Wang, Jun Xu: Robust traffic matrix estimation with imperfect information: making use of multiple data sources. SIGMETRICS/Performance 2006: 133-144 | |
86 | Ashwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, Hui Zhang: Data streaming algorithms for estimating entropy of network traffic. SIGMETRICS/Performance 2006: 145-156 | |
85 | Qi Zhao, Jun Xu, Zhen Liu: Design of a novel statistics counter architecture with optimal space and time efficiency. SIGMETRICS/Performance 2006: 323-334 | |
84 | Huayun Zhang, Jun Xu: Cepstrum Interpolation towards Robust Speech Recognition over the Phone. SPPRA 2006: 216-221 | |
83 | Haiqing Zheng, Chen Lin, Lishen Huang, Jun Xu, Jiaqian Zheng, Qi Sun, Junyu Niu: Using Profile Matching and Text Categorization for Answer Extraction in TREC Genomics. TREC 2006 | |
82 | Yongxi Tan, Leming M. Shi, Saber M. Hussain, Jun Xu, Weida Tong, John M. Frazier, Charles Wang: Integrating time-course microarray gene expression profiles with cytotoxicity for identification of biomarkers in primary rat hepatocytes exposed to cadmium. Bioinformatics 22(1): 77-87 (2006) | |
81 | Qi Zhao, Jun Xu, Abhishek Kumar: Detection of Super Sources and Destinations in High-Speed Networks: Algorithms, Analysis and Evaluation. IEEE Journal on Selected Areas in Communications 24(10): 1840-1852 (2006) | |
80 | Jun Xu, Xuemin Shen, Jon W. Mark, Jun Cai: Efficient channel utilization for real-time video in OVSF-CDMA systems with QoS assurance. IEEE Transactions on Wireless Communications 5(6): 1382-1391 (2006) | |
79 | Jun Xu, Yunbo Cao, Hang Li, Min Zhao, Yalou Huang: A Supervised Learning Approach to Search of Definitions. J. Comput. Sci. Technol. 21(3): 439-449 (2006) | |
78 | Jiazhong Chen, Xun Ouyang, Wu Zheng, Jun Xu, Jingli Zhou, Shengsheng Yu: The application of symmetric orthogonal multiwavelets and prefilter technique for image compression. Multimedia Tools Appl. 29(2): 175-187 (2006) | |
2005 | ||
77 | Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234 | |
76 | Hang Li, Yunbo Cao, Jun Xu, Yunhua Hu, Shenjie Li, Dmitriy Meyerzon: A new approach to intranet search based on information extraction. CIKM 2005: 460-468 | |
75 | YuShun Li, Guiling Wang, ShengWen Yang, Meilin Shi, Jun Xu: Research on grid-based cooperative platform. CSCWD (1) 2005: 378-383 | |
74 | Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387 | |
73 | Seung Jun, Mustaque Ahamad, Jun Xu: Robust Information Dissemination in Uncooperative Environments. ICDCS 2005: 293-302 | |
72 | Mohammed Quaddus, Jun Xu, Zohurul Hoque: Factors of adoption of online auction: a China study. ICEC 2005: 93-100 | |
71 | Guiling Wang, YuShun Li, ShengWen Yang, ChunYu Miao, Jun Xu, Meilin Shi: Service-Oriented Grid Architecture and Middleware Technologies for Collaborative E-Learning. IEEE SCC 2005: 67-74 | |
70 | Abhishek Kumar, Jun Xu, Ellen W. Zegura: Efficient and scalable query routing for unstructured peer-to-peer networks. INFOCOM 2005: 1162-1173 | |
69 | Qi Zhao, Abhishek Kumar, Jun Xu: Joint Data Streaming and Sampling Techniques for Detection of Super Sources and Destinations. Internet Measurment Conference 2005: 77-90 | |
68 | Liping Jing, Michael K. Ng, Jun Xu, Joshua Zhexue Huang: Subspace Clustering of Text Documents with Feature Weighting K-Means Algorithm. PAKDD 2005: 802-812 | |
67 | Qi Zhao, Abhishek Kumar, Jia Wang, Jun Xu: Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices. SIGMETRICS 2005: 350-361 | |
66 | Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegura: A data streaming algorithm for estimating subpopulation flow size distribution. SIGMETRICS 2005: 61-72 | |
65 | Liping Jing, Michael K. Ng, Jun Xu, Joshua Zhexue Huang: On the Performance of Feature Weighting K-Means for Text Subspace Clustering. WAIM 2005: 502-512 | |
64 | Guiling Wang, YuShun Li, ShengWen Yang, ChunYu Miao, Jun Xu, Meilin Shi: Towards a Grid-Based Collaborative Platform for E-Learning. WEBIST 2005: 510-517 | |
63 | Jun Xu, Yunbo Cao, Hang Li, Min Zhao: Ranking definitions with supervised learning methods. WWW (Special interest tracks and posters) 2005: 811-819 | |
62 | Ning Gu, Jun Xu, Xiaoyuan Wu, Jiangming Yang, Wei Ye: Ontology based semantic conflicts resolution in collaborative editing of design documents. Advanced Engineering Informatics 19(2): 103-111 (2005) | |
61 | Bin Wang, Badri Kasthurirangan, Jun Xu: Subsidized RED: an active queue management mechanism for short-lived flows. Computer Communications 28(5): 540-549 (2005) | |
60 | Jun Xu, Lei Chen, Lingqi Zeng, Lan Lan, Shu Lin: Construction of low-density parity-check codes by superposition. IEEE Transactions on Communications 53(2): 243-251 (2005) | |
59 | Heng Tang, Jun Xu, Shu Lin, Khaled A. S. Abdel-Ghaffar: Codes on finite geometries. IEEE Transactions on Information Theory 51(2): 572-596 (2005) | |
58 | Jun Xu, Richard J. Lipton: On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. IEEE/ACM Trans. Netw. 13(1): 15-28 (2005) | |
57 | Mohammed Quaddus, Jun Xu: Adoption and diffusion of knowledge management systems: field studies of factors and variables. Knowl.-Based Syst. 18(2-3): 107-115 (2005) | |
56 | Jiazhong Chen, Jingli Zhou, Shengsheng Yu, Jun Xu, Ling Zhong, Junhao Zheng: A Very Low Bit Rate Video Coding Combined with Fast Adaptive Block Size Motion Estimation and Nonuniform Scalar Quantization Multiwavelet Transform. Multimedia Tools Appl. 26(1): 123-144 (2005) | |
2004 | ||
55 | Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu: An Architectural Framework for Providing Reliability and Security Support. DSN 2004: 585-594 | |
54 | Jun Xu, Lihua Xie: Hinfinity estimation of discrete-time piecewise linear systems. ICARCV 2004: 1163-1168 | |
53 | Jun Xu, Mohammed Quaddus: A Managers' Guide to KMS Adoption and Diffusion. ICEB 2004: 908-914 | |
52 | Jun Li, Minho Sung, Jun Xu, Li Li: Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. IEEE Symposium on Security and Privacy 2004: 115-129 | |
51 | Minghui Dong, Kim-Teng Lua, Jun Xu: Selecting Prosody Parameters for Unit Selection Based Chinese TTS. IJCNLP 2004: 272-279 | |
50 | Qi Zhao, Jun Xu: On the Computational Complexity of Maintaining GPS Clock in Packet Scheduling. INFOCOM 2004 | |
49 | Abhishek Kumar, Jun Xu, Jia Wang, Oliver Spatscheck, Li Li: Space-Code Bloom Filter for Efficient Per-Flow Traffic Measurement. INFOCOM 2004 | |
48 | Xiangrong Wang, Jun Xu, Christopher H. Pham: An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior. ISSRE 2004: 329-339 | |
47 | Sheng Li, Jun Xu, Lijun Deng: Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development Environment. PRDC 2004: 401-406 | |
46 | Abhishek Kumar, Minho Sung, Jun Xu, Jia Wang: Data streaming algorithms for efficient and accurate estimation of flow size distribution. SIGMETRICS 2004: 177-188 | |
45 | Jun Xu, K. W. Li: Scheduling bursty data at WCDMA downlink using fuzzy inference. SMC (4) 2004: 3647-3651 | |
44 | Frank Castaneda, Emre Can Sezer, Jun Xu: WORM vs. WORM: preliminary study of an active counter-attack mechanism. WORM 2004: 83-93 | |
43 | Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon: Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46(2): 253-272 (2004) | |
42 | Jun Xu, Abhishek Kumar, Xingxing Yu: On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks. IEEE Journal on Selected Areas in Communications 22(1): 151-163 (2004) | |
41 | Lei Chen, Jun Xu, Ivana Djurdjevic, Shu Lin: Near-Shannon-limit quasi-cyclic low-density parity-check codes. IEEE Transactions on Communications 52(7): 1038-1042 (2004) | |
40 | Bassem Ammar, Bahram Honary, Yu Kou, Jun Xu, Shu Lin: Construction of Low-Density Parity-Check Codes Based on Balanced Incomplete Block Designs. IEEE Transactions on Information Theory 50(6): 1257-1268 (2004) | |
39 | Heng Tang, Jun Xu, Yu Kou, Shu Lin, Khaled A. S. Abdel-Ghaffar: On Algebraic Construction of Gallager and Circulant Low-Density Parity-Check Codes. IEEE Transactions on Information Theory 50(6): 1269-1279 (2004) | |
38 | Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant: Modeling and evaluating the security threats of transient errors in firewall software. Perform. Eval. 56(1-4): 53-72 (2004) | |
37 | Guantao Chen, Jun Xu, Xingxing Yu: Circumference of Graphs with Bounded Degree. SIAM J. Comput. 33(5): 1136-1170 (2004) | |
2003 | ||
36 | Ivana Djurdjevic, Jun Xu, Khaled A. S. Abdel-Ghaffar, Shu Lin: A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols. AAECC 2003: 98-107 | |
35 | Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer: A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. DSN 2003: 605-614 | |
34 | Abhishek Kumar, Shashidhar Merugu, Jun Xu, Xingxing Yu: Ulysses: A Robust, Low-Diameter, Low-Latency Peer-ti-Peer Network. ICNP 2003: 258-267 | |
33 | Jing Ding, Daniel Berleant, Jun Xu, Andy W. Fulmer: Extracting Biochemical Interactions from MEDLINE Using a Link Grammar Parser. ICTAI 2003: 467- | |
32 | Jun Xu: On the Fundamental Tradeoffs between Routing Table Size andNetwork Diameter in Peer-to-Peer Networks. INFOCOM 2003 | |
31 | Abhishek Kumar, Jun Xu, Erran L. Li, Jia Wang: Space-code bloom filter for efficient traffic flow measurement. Internet Measurement Comference 2003: 167-172 | |
30 | Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Transparent Runtime Randomization for Security. SRDS 2003: 260- | |
29 | Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk: Security Vulnerabilities - From Data Analysis to Protection Mechanisms. WORDS Fall 2003: 331-338 | |
28 | Jun Xu, Wooyong Lee: Sustaining Availability of Web Services under Distributed Denial of Service Attacks. IEEE Trans. Computers 52(2): 195-208 (2003) | |
27 | Minho Sung, Jun Xu: IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. IEEE Trans. Parallel Distrib. Syst. 14(9): 861-872 (2003) | |
26 | Yanming Li, Peisun Ma, Changjun Qin, Jun Xu, Xueguan Gao: A novel mobile robot for finned tubes inspection. Robotica 21(6): 691-695 (2003) | |
2002 | ||
25 | Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant: Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. DSN 2002: 495-504 | |
24 | Jun Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon: Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. ICNP 2002: 280-289 | |
23 | Minho Sung, Jun Xu: IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. ICNP 2002: 302-311 | |
22 | Jun Xu, Richard J. Lipton: On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. SIGCOMM 2002: 279-292 | |
21 | Jun Xu: A Unified Proof of Minimum Time Complexity for Reaching Consensus and Uniform Consensus - An Oracle-Based Approach. SRDS 2002: 102-108 | |
20 | Jun Xu, Mukesh Singhal: Cost-Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation. IEEE Trans. Computers 51(9): 1089-1099 (2002) | |
2001 | ||
19 | Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer: An Experimental Study of Security Vulnerabilities Caused by Errors. DSN 2001: 421-432 | |
18 | David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer: Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. IPDPS 2001: 31 | |
17 | Jun Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon: On the design and performance of prefix-preserving IP traffic trace anonymization. Internet Measurement Workshop 2001: 263-266 | |
2000 | ||
16 | Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu: Towards Dependable Home Networking: An Experience Report. DSN 2000: 43-48 | |
15 | Jun Xu, Mukesh Singhal, Joanne DeGroat: A Novel Cache Architecture to Support Layer-Four Packet Classification at Memory Access Speeds. INFOCOM 2000: 1445-1454 | |
14 | Jun Xu, James Stevenson: Drug-like Index: A New Approach To Measure Drug-like Compounds and Their Diversity. Journal of Chemical Information and Computer Sciences 40(5): 1177-1187 (2000) | |
1999 | ||
13 | Soner Önder, Jun Xu, Rajiv Gupta: Caching and Predicting Branch Sequences for Improved Fetch Effectiveness. IEEE PACT 1999: 294-302 | |
12 | Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Networked Windows NT System Field Failure Data Analysis. PRDC 1999: 178-185 | |
11 | Jun Xu, Mukesh Singhal: Design of a High-Performance ATM Firewall. ACM Trans. Inf. Syst. Secur. 2(3): 269-294 (1999) | |
10 | Jun Xu, Mukesh Singhal: A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. International Journal of Software Engineering and Knowledge Engineering 9(2): 173-180 (1999) | |
1998 | ||
9 | Jun Xu, Mukesh Singhal: Design of a High-Performance ATM Firewall. ACM Conference on Computer and Communications Security 1998: 93-102 | |
8 | Jun Xu, Mukesh Singhal: A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. HASE 1998: 205-208 | |
7 | Jun Xu, Mukesh Singhal: Certificate Path Generation Protocol (CPGP) for Authenticated Signaling in ATM Networks. ICNP 1998: 282-289 | |
1996 | ||
6 | Jun Xu: GMA: A Generic Match Algorithm for Structural Homomorphism, Isomorphism, and Maximal Common Substructure Match and Its Applications. Journal of Chemical Information and Computer Sciences 36(1): 25-34 (1996) | |
1994 | ||
5 | Jun Xu, Philip N. Borer: Rigorous Deduction Theory for Assignment of Multidimensional NMR Spectra Using the Independent Spin Coupling Network Approach. Journal of Chemical Information and Computer Sciences 34(2): 349-356 (1994) | |
1993 | ||
4 | Jun Xu, Bryan C. Sanctuary, B. N. Gray: Automated extraction of spin coupling topologies from 2D NMR correlation spectra for protein proton resonance assignment. Journal of Chemical Information and Computer Sciences 33(3): 475-489 (1993) | |
3 | Jun Xu, Bryan C. Sanctuary: CPA: Constrained partitioning algorithm for initial assignment of protein proton resonances from MQF-COSY. Journal of Chemical Information and Computer Sciences 33(3): 490-500 (1993) | |
2 | Jun Xu, Suzana K. Straus, Bryan C. Sanctuary, Laird Trimble: Automation of protein 2D proton NMR assignment by means of fuzzy mathematics and graph theory. Journal of Chemical Information and Computer Sciences 33(5): 668-682 (1993) | |
1991 | ||
1 | Jun Xu, Kainian Fang, Weixiang Shi: A Computer-Controlled Tool Post Using a Piezoelectric Actuator for Turning Non-Rotationally Symmetric Surface. ITAMS 1991: 401-407 |