other persons with the same name:
2010 | ||
---|---|---|
452 | Wei Li, Wenqi Huang, Dongchen Jiang, Xianglong Liu: A heuristic algorithm for cube packing with time schedule. Science in China Series F: Information Sciences 53(1): 18-29 (2010) | |
451 | Midhun Kalyan Anantapalli, Wei Li: Multipath multihop routing analysis in mobile ad hoc networks. Wireless Networks 16(1): 79-94 (2010) | |
450 | Midhun Kalyan Anantapalli, Wei Li: Multipath multihop routing analysis in mobile ad hoc networks. Wireless Networks 16(2): 573-575 (2010) | |
2009 | ||
449 | Wei Li, Albert Y. Zomaya, Adel Al-Jumaily: Proceedings of the Seventh ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2009, Tenerife, Canary Islands, Spain, October 26-27, 2009 ACM 2009 | |
448 | Wei Li: Proceedings of the ISCA 24th International Conference on Computers and Their Applications, CATA 2009, April 8-10, 2009, Holiday Inn Downtown-Superdome, New Orleans, Louisiana, USA ISCA 2009 | |
447 | Tao Qin, Xiaohong Guan, Yi Long, Wei Li: Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks. ACIS-ICIS 2009: 323-328 | |
446 | Wei Li, Lin-Hua Jiang: Fast Iris Segmentation by Rotation Average Analysis of Intensity-Inversed Image. AICI 2009: 340-349 | |
445 | Wei Li, Zhuoyao Zhang, Weiwei Sun, Dingding Mao, Jingjing Wu: An Affinity Path Based Wireless Broadcast Scheduling Approach for Multi-item Queries. APWeb/WAIM 2009: 617-622 | |
444 | Raouf Alomainy, Wei Li: Using Ponder as a Standard Security Specification Language in Heterogeneous Networks. CAINE 2009: 145-150 | |
443 | Wei Li: A Space-Efficient Approach to Consistency Check of Firewall Rules. CAINE 2009: 19-24 | |
442 | Wei Wu, Jun Wang, Wei Li, Wenhao Zhang: Design Methods of Multi-DSP Parallel Processing System. CSIE (3) 2009: 458-464 | |
441 | Qingfang Meng, Yuehui Chen, Yuhua Peng, Wei Li: Nonlinear Prediction of Network Traffic Measurements Data. CSO (1) 2009: 336-339 | |
440 | Wei Li, Jing-Yu Yang: Comparing Networks from a Data Analysis Perspective. Complex (2) 2009: 1907-1916 | |
439 | Wei Li, Yanjiao Ji, Lihong Cai: Application of Bayesian Balance for Biding in Power Projects. DBTA 2009: 650-653 | |
438 | Wei Wu, Hongbin Liu, Henglin Dai, Wei Li, Pengshou Sun: A Spatial Decision Support System for Citrus Management - A Case Study of the Three Gorges Area of China. ESIAT (1) 2009: 601-603 | |
437 | Lingfen Wang, Xizuo Li, Wei Li, Haiyu Song: ZPD-Based Multi-level Teaching Pattern in Software Engineering--A Case Study of Data Structure and Algorithm Course. ETT 2009: 7-9 | |
436 | Jing Xin, Liwen Liu, Guangjun Zhang, Wei Li, Xiangxin Li: Optimization Model for Locating City Fire Stations Based on Fuzzy Matter-Element Analysis. FSKD (4) 2009: 346-350 | |
435 | Wei Li, Liyan Han: The Fuzzy Binomial Option Pricing Model under Knightian Uncertainty. FSKD (4) 2009: 399-403 | |
434 | Guanghui Zhao, Wei Li, Chunfen Xia, Chengming Zou: Adaptive Background Updating Algorithm in Complex Scene. FSKD (5) 2009: 101-104 | |
433 | Chunlian Yao, Wei Li, Yi Chen, Lihua Gao: An Efficient Moving Object Detection Algorithm Using Multi-mask. FSKD (5) 2009: 354-358 | |
432 | Wei Li: Algorithm for Interval Quadratic Programming with Equality Constraints. FSKD (6) 2009: 78-81 | |
431 | Yan Wang, Weihong Xuan, Wei Li, Baoyan Song, Xiaoguang Li: A Real-Time Scheduling Strategy Based on Priority in Data Stream System. HIS (3) 2009: 268-272 | |
430 | Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang: Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. ICC 2009: 1-5 | |
429 | Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu: NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network. ICDCS Workshops 2009: 221-226 | |
428 | Yuehui Chen, Wei Li, Nana Cai: Predicting Protein Structural Class Based on Ensemble Binary Classification. ICNC (2) 2009: 167-170 | |
427 | Zhijun Yang, Guang Dai, Wei Li, Yanbiao Jiang: Research on Magnetic Flux Leakage Signals Quantity Technology of Tank Floor Corrosion Defects Based on Artificial Neural Network. ICNC (2) 2009: 245-249 | |
426 | Hao Gong, Man Zhu, Wei Li: A Fuzzy Context Neural Network Classifier for Land Cover Classification. ICNC (3) 2009: 565-569 | |
425 | Yong Wang, Dawu Gu, Wei Li, Hongjiao Li, Jing Li: Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network. ISNN (1) 2009: 60-67 | |
424 | Xi Chen, Qi Fei, Wei Li: Primary Research on Urban Mass Panic Based on Computational Methods for Experiments. ISNN (3) 2009: 1222-1229 | |
423 | Wei Li, Jie Zhang, Ying Zheng, Lin Ye: Enlargement of Measurement Range in a Fiber-Optic Ice Sensor by Artificial Neural Network. ISNN (3) 2009: 929-936 | |
422 | HuiYu Jiang, Min Dong, Wei Li: A Research to Retention Index of Saturated Alcohols Based on RBF Neural Network. JCAI 2009: 727-730 | |
421 | Wei Li, Albert Y. Zomaya, Adel Al-Jumaily: Cellular automata based models of wireless sensor networks. MOBIWAC 2009: 1-6 | |
420 | Feng Yu, Junzhou Luo, Wei Li, La-Lin Jiang: Formal Specification and Analysis of Intelligent Network Management System by Using Colored Petri Net. NAS 2009: 200-203 | |
419 | Xiaosong Li, Hao Wang, Taoying Liu, Wei Li: Key Elements Tracing Method for Parallel XML Parsing in Multi-Core System. PDCAT 2009: 439-444 | |
418 | Xuequn Shang, Zhanhuai Li, Wei Li: Mining functional associated patterns from biological network data. SAC 2009: 1488-1489 | |
417 | Hicham Tout, William Hafner, Wei Li, Easwar A. Nyshadham: Phishpin: An Integrated Anti-Phishing Framework. Security and Management 2009: 463-468 | |
416 | Wei Li, Raouf Alomainy: An Experimental Approach to Prove Metrics Properties. Software Engineering Research and Practice 2009: 408-413 | |
415 | Marco Canini, Wei Li, Andrew W. Moore, Raffaele Bolla: GTVS: Boosting the Collection of Application Traffic Ground Truth. TMA 2009: 54-63 | |
414 | Justin Matejka, Wei Li, Tovi Grossman, George W. Fitzmaurice: CommunityCommands: command recommendations for software applications. UIST 2009: 193-202 | |
413 | Jianfu Yang, Ren Liu, Fengjian Yang, Wei Li, Dongqing Wu: Globally Exponential Stability of Neural Networks with Impulses and Distributed Delays. WGEC 2009: 472-475 | |
412 | Jianfu Yang, Fengjian Yang, Ren Liu, Wei Li, Dongqing Wu: Exponential Stability of Impulsive Neural Networks with Distributed Delays. WGEC 2009: 480-483 | |
411 | Wei Li, Qiaoliang Li: A Resilient In-Network Data Aggregation Scheme for Wireless Sensor Networks Based on Interleaved Authentication. WKDD 2009: 343-348 | |
410 | Dell Zhang, Robert Mao, Wei Li: The recurrence dynamics of social tagging. WWW 2009: 1205-1206 | |
409 | Wei Li, Meirong Zhang: Non-degeneracy and uniqueness of periodic solutions for some superlinear beam equations. Appl. Math. Lett. 22(3): 314-319 (2009) | |
408 | Yuanxin Xi, Wei Li: BSMAP: whole genome bisulfite sequence MAPping program. BMC Bioinformatics 10: (2009) | |
407 | Wei Li, Marco Canini, Andrew W. Moore, Raffaele Bolla: Efficient application identification and the temporal and spatial stability of classification schema. Computer Networks 53(6): 790-809 (2009) | |
406 | John Araujo, Catherine Pepper, Janise Richards, Mona Choi, Jian Xing, Wei Li: The profession of public health informatics: Still emerging? I. J. Medical Informatics 78(6): 375-385 (2009) | |
405 | Wenlong Ni, Wei Li, Mansoor Alam: Determination of optimal call admission control policy in wireless networks. IEEE Transactions on Wireless Communications 8(2): 1038-1044 (2009) | |
404 | Yi Ma, Wei Li, Pingyi Fan, Khaled Ben Letaief, Xuming Liu: On the characteristics of queueing and scheduling at encoding nodes for network coding. Int. J. Communication Systems 22(6): 755-772 (2009) | |
403 | Wei Li: DynaQoS(c)-RDF: a best effort for QoS-assurance of dynamic reconfiguration of dataflow systems. Journal of Software Maintenance 21(1): 19-48 (2009) | |
402 | Wei Li, Dawu Gu, Yi Wang: Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin. Journal of Systems and Software 82(2): 346-354 (2009) | |
401 | Cristina Aurrecoechea, John Brestelli, Brian P. Brunk, Jane M. Carlton, Jennifer Dommer, Steve Fischer, Bindu Gajria, Xin Gao, Alan Gingle, Gregory R. Grant, Omar S. Harb, Mark Heiges, Frank Innamorato, John Iodice, Jessica C. Kissinger, Eileen Kraemer, Wei Li, John A. Miller, Hilary G. Morrison, Vishal Nayak, Cary Pennington, Deborah F. Pinney, David S. Roos, Chris Ross, Christian J. Stoeckert Jr., Steven Sullivan, Charles Treatman, Haiming Wang: GiardiaDB and TrichDB: integrated genomic resources for the eukaryotic protist pathogens Giardia lamblia and Trichomonas vaginalis. Nucleic Acids Research 37(Database-Issue): 526-530 (2009) | |
400 | Cristina Aurrecoechea, John Brestelli, Brian P. Brunk, Jennifer Dommer, Steve Fischer, Bindu Gajria, Xin Gao, Alan Gingle, Gregory R. Grant, Omar S. Harb, Mark Heiges, Frank Innamorato, John Iodice, Jessica C. Kissinger, Eileen Kraemer, Wei Li, John A. Miller, Vishal Nayak, Cary Pennington, Deborah F. Pinney, David S. Roos, Chris Ross, Christian J. Stoeckert Jr., Charles Treatman, Haiming Wang: PlasmoDB: a functional genomic database for malaria parasites. Nucleic Acids Research 37(Database-Issue): 539-543 (2009) | |
399 | ZhiMing Zheng, Shilong Ma, Wei Li, Wei Wei, Xin Jiang, ZhanLi Zhang, BingHui Guo: Dynamical characteristics of software trustworthiness and their evolutionary complexity. Science in China Series F: Information Sciences 52(8): 1328-1334 (2009) | |
398 | ZhiMing Zheng, Shilong Ma, Wei Li, Xin Jiang, Wei Wei, LiLi Ma, ShaoTing Tang: Complexity of software trustworthiness and its dynamical statistical analysis methods. Science in China Series F: Information Sciences 52(9): 1651-1657 (2009) | |
397 | Wei Li, Pingyi Fan, Khaled Ben Letaief: Joint processing of topology control and channel assignment in wireless ad hoc networks. Wireless Communications and Mobile Computing 9(2): 269-281 (2009) | |
2008 | ||
396 | Wei Li, Shanzhi Chen, Tao Yu: UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent. AINA 2008: 539-545 | |
395 | Yansheng Qu, Junzhou Luo, Wei Li, Bo Liu, Laurence Tianruo Yang: SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments. AINA 2008: 636-643 | |
394 | Wei Li, Maosong Sun: Multi-modal Multi-label Semantic Indexing of Images Using Unlabeled Data. ALPIT 2008: 204-209 | |
393 | Wei Li: Using Exploit Similarities for Concise Representation of Attack Scenarios. CAINE 2008: 161-167 | |
392 | Wei Li, Steven X. Ding: Integrated design of an observer-based fault detection system over unreliable digital channels. CDC 2008: 2710-2715 | |
391 | Wei Li, Gang Li, Xiangjun Xin: Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme. CIS (2) 2008: 342-346 | |
390 | Xiao Liang, Wei Li, T. Aaron Gulliver: Distributed Transmission Power Control for Wireless Sensor Networks. CNSR 2008: 417-421 | |
389 | Wei Li, Zhu-Hua Han: Application of improved grey prediction model for power load forecasting. CSCWD 2008: 1116-1121 | |
388 | Wei Li, Ying Lu, Yi-Chao Zhang, Jian-Guo Wu: A Verifying Method of Controller Synthesis. CSSE (2) 2008: 796-800 | |
387 | Ming He, Wei Li: Uncertain Measure of Knowledge Based on Generalized Rough Sets in Incomplete Infomration Systems. DMIN 2008: 323-327 | |
386 | Wei Li, Cindy Chen, Jie Wang: PCS: An Efficient Clustering Method for High-Dimensional Data. DMIN 2008: 597-603 | |
385 | Wei Li, Gaocai Wang, Wei Zhao: Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System. DS-RT 2008: 83-88 | |
384 | Wei Li, S. M. Sadeghi, Anthony E. Gregerson: Photon tunneling and mode selection due to the absorptive layers. EIT 2008: 377-382 | |
383 | Xiaoshen Zheng, Wei Li, Wenling Liu, Jing Wang: Methods of Chlorophyll Concentration Retrieval. FSKD (4) 2008: 76-80 | |
382 | Wei Li, Cindy X. Chen: Efficient data modeling and querying system for multi-dimensional spatial data. GIS 2008: 58 | |
381 | Wenlong Ni, Wei Li, Mansoor Alam: Optimal CAC Policy in Multimedia Wireless Networks with Reservation Channel Schemes. GLOBECOM 2008: 1443-1447 | |
380 | Ting Wang, Li Wen, Wei Li, Jing Tao, Alan Wang, Fred Baker: Traffic Shaping in BitTorrent Systems by Centralized Hierarchical Peer-Node Assignment. ICC 2008: 1787-1791 | |
379 | Wenlong Ni, Wei Li, Mansoor Alam: Optimal Call Admission Control Policy for the RCS Schemes in Wireless Networks. ICC 2008: 2845-2848 | |
378 | Wei Li, Shan Wang, Ji-Bo Wei: An Evolutionary Topology Unaware TDMA MAC Protocol for Ad Hoc Networks. ICC 2008: 4825-4829 | |
377 | Wei Li, Cindy Chen: SQS - A Secure XML Querying System. ICEIS (1) 2008: 413-416 | |
376 | Shu-bo Liu, Zheng-quan Xu, Wei Li, Jin Liu, Zhi-yong Yuan: A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling. ICIC (1) 2008: 1087-1094 | |
375 | Wei Li, Yuehui Chen, Yaou Zhao: Multi-layer Ensemble Classifiers on Protein Secondary Structure Prediction. ICIC (1) 2008: 79-85 | |
374 | Yunong Zhang, Tongke Zhong, Wei Li, Xiuchun Xiao, Chenfu Yi: Growing Algorithm of Laguerre Orthogonal Basis Neural Network with Weights Directly Determined. ICIC (2) 2008: 60-67 | |
373 | Wei Li, Mingchuan Zhang, Wei Yang: Safety Assessment Modelling Based on Recipe Engineering for Power Plants. ICNSC 2008: 1648-1653 | |
372 | Wei Li, Cong Wang, Dong-na Shi: Automatic Chinese Term Extraction based on Cognition Theory. ICNSC 2008: 170-174 | |
371 | Wei Li, Yannan Zhao, Yixu Song, Zehong Yang: COX-2 activity prediction in Chinese medicine using neural network based ensemble learning methods. IJCNN 2008: 1853-1858 | |
370 | Wei Li, Yuan Li, Hong Liu, Nan Chi, Dexiu Huang: A novel distribution signaling protocol based on mobile agents and obs for intelligent optical networks. IPDPS 2008: 1-6 | |
369 | Xuefeng Yang, Wei Li, Yuqiao Wang, Guo Ye: Modeling Hysteresis in Piezo Actuator Based on Neural Networks. ISICA 2008: 290-296 | |
368 | Wei Li, Haohao Li, Jianye Chen: A Practical Clustering Algorithm. ISNN (1) 2008: 555-560 | |
367 | Kan Cheng, Lixu Gu, Jianghua Wu, Wei Li, Jianrong Xu: A Novel Level Set Based Shape Prior Method for Liver Segmentation from MRI Images. MIAR 2008: 150-159 | |
366 | Shuai Liu, Wei Li, Lingyu Wang: Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5 | |
365 | Hong Liu, Xiaoning Wang, Tian Luo, Xiaosong Li, Wei Li: Improving the Performance of Service-based Applications by Dynamic Service Execution. PDP 2008: 174-182 | |
364 | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 | |
363 | Wei Li, Shanzhi Chen, YaNing Liu, Xin Li: Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. SNPD 2008: 700-705 | |
362 | Wei Li: A Logical Framework for Software Testing. TASE 2008: 11 | |
361 | K. L. Mak, Wei Li: Objective Evaluation of Seam Pucker Using an Adaptive Neuro-Fuzzy Inference System. VISAPP (2) 2008: 234-239 | |
360 | Wei Li, Ping Wang, Zhen Wang, Yingzhe Li: Performance of OFDM System on Link Simulation with Measured Outdoor Channels at 3.5GHz. VTC Fall 2008: 1-5 | |
359 | Pascal Pagani, Maxim Piz, Isabelle Siaud, Eckhard Grass, Wei Li, Klaus Tittelbach-Helmrich, Anne-Marie Ulmer-Moll, Frank Herzel: OFDM-Based Millimeter Wave System for High Data Rate WPAN Applications. VTC Fall 2008: 1-6 | |
358 | Wei Li, Ji-Bo Wei, Shan Wang: An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks. WCNC 2008: 1781-1785 | |
357 | Wenlong Ni, Wei Li, Mansoor Alam: Optimal Call Admission Control Policy In Wireless Networks. WCNC 2008: 2975-2979 | |
356 | Wei Li, Zhu-Hua Han: Short-Term Power Load Forecasting Using Improved Ant Colony Clustering. WKDD 2008: 221-224 | |
355 | Wei Li, Xiaoli Tian: Numerical solution method for general interval quadratic programming. Applied Mathematics and Computation 202(2): 589-595 (2008) | |
354 | Wei Li, Ping Zhang, Steven X. Ding, Ionut C. Chihaia, Eberhard Goldschmidt, Oliver Bredtmann, Andreas Czylwik: Networked Fault Detection Systems with Noisy Data Transmission (Vernetzte Fehlerdetektionssysteme mit verrauschter Datenübertragung). Automatisierungstechnik 56(1): 49-57 (2008) | |
353 | Julia V. Ponomarenko, Huynh-Hoa Bui, Wei Li, Nicholas Fusseder, Philip E. Bourne, Alessandro Sette, Björn Peters: ElliPro: a new structure-based tool for the prediction of antibody epitopes. BMC Bioinformatics 9: (2008) | |
352 | Wei Li: Stability Analysis of Swarms With General Topology. IEEE Transactions on Systems, Man, and Cybernetics, Part B 38(4): 1084-1097 (2008) | |
351 | Wei Li, Yu Fang: Performance Evaluation of Wireless Cellular Networks with Mixed Channel Holding Times. IEEE Transactions on Wireless Communications 7(6): 2154-2160 (2008) | |
350 | Wei Li, Dawu Gu, Juanru Li: Differential fault analysis on the ARIA algorithm. Inf. Sci. 178(19): 3727-3737 (2008) | |
349 | Wei Li, Jun Wei, Michael Smith: Performance and Capacity Analysis of UWB Networks over 60GHz WPAN Channel. JCM 3(1): 51-55 (2008) | |
348 | Raed Shatnawi, Wei Li: The effectiveness of software metrics in identifying error-prone classes in post-release software evolution process. Journal of Systems and Software 81(11): 1868-1882 (2008) | |
347 | Rohini K. Srihari, Wei Li, Thomas L. Cornell, Cheng Niu: InfoXtract: A customizable intermediate level information extraction engine. Natural Language Engineering 14(1): 33-69 (2008) | |
2007 | ||
346 | Zhikun Zhao, Wei Li: Dynamic Reconfiguration Planning with Influence Control. ACIS-ICIS 2007: 867-872 | |
345 | Wei Li, Tzi-cker Chiueh: Automated Format String Attack Prevention for Win32/X86 Binaries. ACSAC 2007: 398-409 | |
344 | Yuan Yuan, Jia Jia Wen, Wei Li, Bing Bing Zhang: A Comparison of Three Programming Models for Telecom Service Composition. AICT 2007: 1 | |
343 | Wei Li, Zibin Dai, Tao Chen, Tao Meng, Xuan Yang: Design and Implementation of a High-Speed Reconfigurable Modular Arithmetic Unit. APPT 2007: 50-59 | |
342 | Zhikun Zhao, Wei Li: Influence Control for Dynamic Reconfiguration. ASWEC 2007: 59-70 | |
341 | Wei Li, Jason S. Carroll, Myles Brown, X. Shirley Liu: xMAN: extreme MApping of oligoNucleotides. BIOCOMP 2007: 631-637 | |
340 | Wei Li, Rayford B. Vaughn: Efficient Update on Exploitation Graphs for Vulnerability Analysis. CAINE 2007: 295-300 | |
339 | Wei Li: An Iterative Fuzzy Segmentation Algorithm for Recognizing an Odor Source in Near Shore Ocean Environments. CIRA 2007: 101-106 | |
338 | Wei Li, J. E. Sutton: Optimization of Source Identification Algorithm Derived from Moth-Inspired Plume Tracing Strategies. CIRA 2007: 79-84 | |
337 | Hao Zhang, Wei Li, T. Aaron Gulliver: Performance Analysis of Non-Orthogonal Pulse Position Modulation for Time-Hopping UWB Transmission. CNSR 2007: 287-293 | |
336 | Wei Li, Zhikun Zhao: Automating Dynamic Reconfiguration for Non-Stop Dataflow Systems. COMPSAC (1) 2007: 260-267 | |
335 | Zhikun Zhao, Wei Li: Dynamic Reconfiguration of Distributed Data Flow Systems. COMPSAC (2) 2007: 535-540 | |
334 | Zhikun Zhao, Wei Li: Preserving Global Consistency for Dynamic Reconfiguration. Computers and Their Applications 2007: 64-71 | |
333 | Chi Zhang, Wei Li, Xumei Song, Jianming Wang: A Supervised Algorithm for Fuzzy Multi-criteria Decision Making. FSKD (1) 2007: 77-80 | |
332 | Huicheng Zhou, Wei Li, Chi Zhang: Optimizing Schemas of Flood Control and Disaster Reduction Engineering Based on Variable Fuzzy Sets Theory. FSKD (2) 2007: 598-603 | |
331 | Suge Wang, Yingjie Wei, Wu Zhang, Deyu Li, Wei Li: A Hybrid Method of Feature Selection for Chinese Text Sentiment Classification. FSKD (3) 2007: 435-439 | |
330 | Chi Zhang, Xumei Song, Wei Li: A Model Combined Fuzzy Optimum Theory with Analytical Hierarchy Process for Engineering Design. FSKD (4) 2007: 447-454 | |
329 | Shaohua Liu, Junsheng Yu, Yuan'an Liu, Jun Wei, Peng Gao, Wei Li, Jiani Ma: Make Highly Clustered Grid a Small World with Shorter Diameter. GCC 2007: 109-116 | |
328 | Wei Li, Pingyi Fan, Khaled Ben Letaief: A Combination Scheme of Topology Control and Channel Assignment in Wireless Ad Hoc Networks. GLOBECOM 2007: 1227-1231 | |
327 | Jiang Liu, Jin Sando, Wei Li, Hiroshi Takano, Shigeru Shimamoto: Long Distance Optical Wireless Network Employing Multiple Access Scheme. GLOBECOM 2007: 2258-2262 | |
326 | Wei Li, Lap-Chung Lam, Tzi-cker Chiueh: Accurate Application-Specific Sandboxing for Win32/Intel Binaries. IAS 2007: 375-382 | |
325 | Wei Li, John Doucette, Ming Zuo: p-Cycle Network Design for Specified Minimum Dual-Failure Restorability. ICC 2007: 2204-2210 | |
324 | Andrew B. Kahng, Sung-Mo Kang, Wei Li, Bao Liu: Analytical thermal placement for VLSI lifetime improvement and minimum performance variation. ICCD 2007: 71-77 | |
323 | Haizheng Zhang, Wei Li, Xuerui Wang, C. Lee Giles, Henry C. Foley, John Yen: HSN-PAM: Finding Hierarchical Probabilistic Groups from Large-Scale Networks. ICDM Workshops 2007: 27-32 | |
322 | David M. Mimno, Wei Li, Andrew McCallum: Mixtures of hierarchical topics with Pachinko allocation. ICML 2007: 633-640 | |
321 | Qiang Yue, Zhiwei Xu, Haiyan Yu, Wei Li, Li Zha: An Approach to Debugging Grid or Web Services. ICWS 2007: 330-337 | |
320 | Yong-Wei Li, Wei Li, Guo-Qing Yu, Zhen-Yu Wang, Peng Guo: Applied Research in Fuzzy Neural Network Predictive Control. IEEE ICCI 2007: 408-410 | |
319 | Yingqiu Liu, Wei Li, Yunchun Li: Network Traffic Classification Using K-means Clustering. IMSCCS 2007: 360-365 | |
318 | Wei Li: Moth plume-tracing derived algorithm for identifying chemical source in near-shore ocean environments. IROS 2007: 2162-2167 | |
317 | Zhujin Zhou, Ning Li, Wei Li, Junyan Ren: A Power-Optimized CMOS Quadrature VCO with Wide-Tuning Range for UWB Receivers. ISCAS 2007: 437-440 | |
316 | Wei Li, Andrew W. Moore: A Machine Learning Approach for Efficient Traffic Classification. MASCOTS 2007: 310-317 | |
315 | Wei Li, Maosong Sun, Christopher Habel: Multi-modal Multi-label Semantic Indexing of Images Based on Hybrid Ensemble Learning. PCM 2007: 744-754 | |
314 | Arun Kejariwal, Xinmin Tian, Milind Girkar, Wei Li, Sergey Kozhukhov, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos: Tight analysis of the performance potential of thread speculation using spec CPU 2006. PPOPP 2007: 215-225 | |
313 | Wei Li, Dawu Gu: An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. ProvSec 2007: 178-187 | |
312 | Wei Li: Research on the Knowledge-based Decision Support System for the Safety of Rockets. SNPD (2) 2007: 226-231 | |
311 | Shaohua Liu, Junsheng Yu, Yuan'an Liu, Jun Wei, Peng Gao, Wei Li: Towards Small World for Collaborative Enterprises in Grid. WETICE 2007: 253-254 | |
310 | K. L. Mak, Wei Li: A Neural Network Approach to Objective Evaluation of Seam Pucker. World Congress on Engineering 2007: 183-188 | |
309 | Wei Li: Practical criteria for positive-definite matrix, M-matrix and Hurwitz matrix. Applied Mathematics and Computation 185(1): 397-401 (2007) | |
308 | Wei Li, Rong Zhang, Zhengkai Liu, Huijing Zhao, Ryosuke Shibasaki: An approach of laser-based vehicle monitor. Applied Mathematics and Computation 185(2): 953-962 (2007) | |
307 | Huynh-Hoa Bui, John Sidney, Wei Li, Nicholas Fusseder, Alessandro Sette: Development of an epitope conservancy analysis tool to facilitate the design of epitope-based diagnostics and vaccines. BMC Bioinformatics 8: (2007) | |
306 | Jun S. Song, Kaveh Maghsoudi, Wei Li, Edward Fox, John Quackenbush, X. Shirley Liu: Microarray blob-defect removal improves array analysis. Bioinformatics 23(8): 966-971 (2007) | |
305 | Wei Li: R-Calculus: An Inference System for Belief Revision. Comput. J. 50(4): 378-390 (2007) | |
304 | Wei Li, Xiuli Chao: Call admission control for an adaptive heterogeneous multimedia mobile network. IEEE Transactions on Wireless Communications 6(2): 515-525 (2007) | |
303 | Wei Li, Alexander Ardichvili, Martin Maurer, Tim Wentling, Reed Stuedemann: Impact of Chinese Culture Calues on Knowledge Sharing Through Online Communities of Practice. IJKM 3(3): 46-59 (2007) | |
302 | Shensheng Tang, Wei Li: Modelling and evaluation of the 3G mobile networks with hot-spot WLANs. IJWMC 2(4): 303-313 (2007) | |
301 | Shensheng Tang, Wei Li: Performance analysis of a channel allocation scheme for multi-service mobile cellular networks. Int. J. Communication Systems 20(2): 177-205 (2007) | |
300 | Kangshun Li, Wei Li: Hybrid evolutionary algorithm for solving optimization problems. Int. J. Comput. Math. 84(11): 1567-1590 (2007) | |
299 | Wei Li, Zhikun Zhao: Influence Control for Dynamic Reconfiguration of Data Flow Systems. JSW 2(6): 1-13 (2007) | |
298 | Wei Li, Raed Shatnawi: An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. Journal of Systems and Software 80(7): 1120-1128 (2007) | |
2006 | ||
297 | Xiuzhen Cheng, Wei Li, Taieb Znati: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings Springer 2006 | |
296 | Wei Li, Lap-Chung Lam, Tzi-cker Chiueh: How to Automatically and Accurately Sandbox Microsoft IIS. ACSAC 2006: 213-222 | |
295 | Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh: Foreign Code Detection on the Windows/X86 Platform. ACSAC 2006: 279-288 | |
294 | Junzhou Luo, Wei Li, Jiuxin Cao, Liang Ge: Integrating Heterogeneous E-learning Systems. AICT/ICIW 2006: 9 | |
293 | Wei Li, Maosong Sun: Incorporating Prior Knowledge into Multi-label Boosting for Cross-Modal Image Annotation and Retrieval. AIRS 2006: 404-415 | |
292 | Wei Li: An Inductive Inference System and Its Rationality. AISC 2006: 3-17 | |
291 | Fangqing Chu, Wei Li, Junyan Ren: An implementation of a CMOS down-conversion mixer for GSM1900 receiver. ASP-DAC 2006: 100-101 | |
290 | Raed Shatnawi, Wei Li: An empirical study of the boundary values of the object-oriented metrics. CAINE 2006: 181-186 | |
289 | Wei Li: A security engineering process for vulnerability assessment. CAINE 2006: 352-357 | |
288 | Wei Li, Karen Daniels, Konstantin A. Rybnikov: A Study of Conway's Thrackle Conjecture. CCCG 2006 | |
287 | Wei Li, Rayford B. Vaughn: Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. CCGRID 2006: 26 | |
286 | Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh: BIRD: Binary Interpretation using Runtime Disassembly. CGO 2006: 358-370 | |
285 | Wei Li, Maosong Sun: Automatic Image Annotation Based on WordNet and Hierarchical Ensembles. CICLing 2006: 417-428 | |
284 | Wei Xu, Wenjie Li, Mingli Wu, Wei Li, Chunfa Yuan: Deriving Event Relevance from the Ontology Constructed with Formal Concept Analysis. CICLing 2006: 480-489 | |
283 | Wei Li, Maosong Sun: Semi-supervised Learning for Image Annotation Based on Conditional Random Fields. CIVR 2006: 463-472 | |
282 | Bo Liu, Junzhou Luo, Wei Li: Semi-online Task Allocation Algorithm among Cooperative Agents. CSCWD 2006: 488-493 | |
281 | Wei Li, Andrew W. Moore: Learning for accurate classification of real-time traffic. CoNEXT 2006: 36 | |
280 | Lap-Chung Lam, Wei Li, Tzi-cker Chiueh: Accurate and Automated System Call Policy-Based Intrusion Prevention. DSN 2006: 413-424 | |
279 | Wei Li, Rayford B. Vaughn: Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. HICSS 2006 | |
278 | Yinglong Ma, Kehe Wu, Yi Zheng, Wei Li: Multi-agent Coordination Based on Semantic Approximation. IAT Workshops 2006: 510-513 | |
277 | Minghong Zhou, Rubao Li, Wei Li: Understanding theWeb Page Layout. ICDM Workshops 2006: 438-442 | |
276 | Wei Li, Yupu Yang, Zhong Yang: T-S Fuzzy Modeling Based on Support Vector Learning. ICIC (1) 2006: 1294-1299 | |
275 | Wei Li: On Auxiliary Algorithm for the Simplex Method by H. Luh and R. Tsaih. ICIC (1) 2006: 925-930 | |
274 | Darong Huang, Xiyue Huang, Changcheng Xiang, Wei Li, Yin Zhang: The Covariance Constraint Control Method of Fault Detect for Complicated Systems. ICIC (2) 2006: 580-588 | |
273 | Shucai Huang, Weimin Li, Wei Li: Fuzzy Neural Network for Evaluating Sensor Task Priorities. ICICIC (1) 2006: 415-419 | |
272 | Wei Li, Andrew McCallum: Pachinko allocation: DAG-structured mixture models of topic correlations. ICML 2006: 577-584 | |
271 | Arun Kejariwal, Xinmin Tian, Wei Li, Milind Girkar, Sergey Kozhukhov, Hideki Saito, Utpal Banerjee, Alexandru Nicolau, Alexander V. Veidenbaum, Constantine D. Polychronopoulos: On the performance potential of different types of speculative thread-level parallelism: The DL version of this paper includes corrections that were not made available in the printed proceedings. ICS 2006: 24 | |
270 | Arun Kejariwal, Hideki Saito, Xinmin Tian, Milind Girkar, Wei Li, Utpal Banerjee, Alexandru Nicolau, Constantine D. Polychronopoulos: Lightweight lock-free synchronization methods for multithreading. ICS 2006: 361-371 | |
269 | Wei Li, Li Zhang, Darong Huang, Ying Zhang: Research on the Reconstruction Technology of Diagnosis Sytstem Based on Immune Mechanism. IEEE ICCI 2006: 623-628 | |
268 | Xiaoning Wang, Wei Li, Hong Liu, Zhiwei Xu: A Language-based Approach to Service Deployment. IEEE SCC 2006: 69-76 | |
267 | Xin Zhang, Bin Liu, Wei Li, Y. Xi, David Bermingham, Xiaojun Wang: IPv6-Oriented 4*OC768 Packet Classification with Deriving-Merging Partition and Field-Variable Encoding Algorithm. INFOCOM 2006 | |
266 | Wei Li, Mohamound M. Elgassier, Thomas Rutledge, Joseph Sutton: Design of a source identification zone for declaring an odor source location in turbulent fluid-advected environments. IRI 2006: 466-471 | |
265 | Wei Li, Carl Bloomquist, Mohamoud M. Elgassier, Karan Srivasta: Multisensor Integration for Declaring the Odor Source of a Plume in Turbulent Fluid-Advected Environments. IROS 2006: 5534-5539 | |
264 | Wei Li, Renhui Huang, Jie Bai, Xiue Yuan, Dongxiao Niu: A New Intelligent Method for Power Load Forecasting. ISDA (1) 2006: 1098-1103 | |
263 | Raed Shatnawi, Wei Li: An Investigation of Bad Smells in Object-Oriented Design. ITNG 2006: 161-165 | |
262 | Craig C. Douglas, Jonathan D. Beezley, Janice L. Coen, Deng Li, Wei Li, Alan K. Mandel, Jan Mandel, Guan Qin, Anthony Vodacek: Demonstrating the Validity of a Wildfire DDDAS. International Conference on Computational Science (3) 2006: 522-529 | |
261 | Bo Qin, Chuangde Zhang, Zhenghua Fang, Wei Li: A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region. JCIS 2006 | |
260 | Wei Li, Qing-lei Meng, Chao-Gang Wu, Wei-Jin Huang: An embedded 4-channel real-time multimedia coding system. MMM 2006 | |
259 | Hong Liu, Wei Li, Xiaoning Wang, Yili Gong, Tian Luo: A Service-Oriented Virtual Machine for Grid Applications. PDCAT 2006: 525-530 | |
258 | Yinglong Ma, Kehe Wu, Beihong Jin, Wei Li: A Combination Framework for Semantic Based Query Across Multiple Ontologies. PRIMA 2006: 463-470 | |
257 | Zhikun Zhao, Wei Li: An Agent-Based Adaptive Task-Scheduling Model for Peer-to-Peer Computational Grids. PRIMA 2006: 721-727 | |
256 | Wei Li, Deren Sheng, Jianhong Chen, Zhenfu Yuan, Kefa Cen: A New Method Based on Immune Algorithm to Solve the Unit Commitment Problem. PROLAMAT 2006: 840-846 | |
255 | Wei Li: Abstraction of Odor Source Declaration Algorithm from Moth-Inspired Plume Tracing Strategies. ROBIO 2006: 1024-1029 | |
254 | Wei Li, Huaming Zhang, Raed Shatnawi: A Graph-Based Representation of Object-Oriented Designs. Software Engineering Research and Practice 2006: 198-204 | |
253 | Raed Shatnawi, Wei Li, Huaming Zhang: Predicting Error Probability in the Eclipse Project. Software Engineering Research and Practice 2006: 422-428 | |
252 | Kangshun Li, Wei Li, Zhangxin Chen, Feng Wang: A Particle Gradient Evolutionary Algorithm Based on Statistical Mechanics and Convergence Analysis. VECPAR 2006: 530-543 | |
251 | Wei Li, T. Aaron Gulliver: Optimal Pulse Shaping for Pulse Position Modulation UWB Systems with Sparsity-Driven Signal Detection. VTC Spring 2006: 1455-1458 | |
250 | Wei Li, T. Aaron Gulliver: Sparsity-Driven Multiple Access Ultra-Wideband Signal Detection. VTC Spring 2006: 2364-2367 | |
249 | Wei Li, Daniel Blakely, Scott Van Sooy, Keven Dunn, David Kidd, Robert Rogenmoser, Dian Zhou: LVS verification across multiple power domains for a quad-core microprocessor. ACM Trans. Design Autom. Electr. Syst. 11(2): 490-500 (2006) | |
248 | Shensheng Tang, Wei Li: QoS supporting and optimal energy allocation for a cluster based wireless sensor network. Computer Communications 29(13-14): 2569-2577 (2006) | |
247 | Stephany Edosa Ogbonmwan, Wei Li: Multi-threshold bandwidth reservation scheme of an integrated voice/data wireless network. Computer Communications 29(9): 1504-1515 (2006) | |
246 | Geoff Coulson, Paul Grace, Gordon S. Blair, Wei Cai, Christopher S. Cooper, David A. Duce, Laurent Mathy, Wai Kit Yeung, Barry Porter, Musbah Shahop Sagar, Wei Li: A component-based middleware framework for configurable and reconfigurable Grid computing. Concurrency and Computation: Practice and Experience 18(8): 865-874 (2006) | |
245 | Wei Li, Toshimitsu Ushio: Control of a Chaotic Switched Arrival System with Controlled Internal Connections. I. J. Bifurcation and Chaos 16(3): 701-707 (2006) | |
244 | Wei Li, Xiangyang Xue, Peizhong Lu: Localized audio watermarking technique robust against time-scale modification. IEEE Transactions on Multimedia 8(1): 60-69 (2006) | |
243 | Shensheng Tang, Wei Li: An adaptive bandwidth allocation scheme with preemptive priority for integrated voice/data mobile networks. IEEE Transactions on Wireless Communications 5(10): 2874-2886 (2006) | |
242 | Wei Li, T. Aaron Gulliver, Wei Zou: A Novel Circle Construction for SONET/WDM Wavelength Assignment. IEICE Transactions 89-B(3): 966-969 (2006) | |
241 | Mohammad Alshayeb, Wei Li: An empirical study of relationships among extreme programming engineering activities. Information & Software Technology 48(11): 1068-1072 (2006) | |
240 | Alexander Ardichvili, Martin Maurer, Wei Li, Tim Wentling, Reed Stuedemann: Cultural influences on knowledge sharing through online communities of practice. J. Knowledge Management 10(1): 94-107 (2006) | |
239 | Jing Ma, Shuhua Li, Wei Li: A multireference configuration interaction method based on the separated electron pair wave functions. Journal of Computational Chemistry 27(1): 39-47 (2006) | |
238 | Hector M. Olague, Letha H. Etzkorn, Wei Li, Glenn W. Cox: Assessing design instability in iterative (agile) object-oriented projects. Journal of Software Maintenance 18(4): 237-266 (2006) | |
237 | Cher Ming Tan, Wei Li, Kok Tong Tan, Frankie Low: Development of highly accelerated electromigration test. Microelectronics Reliability 46(9-11): 1638-1642 (2006) | |
236 | Xuwo Ji, Wei Li, Jun Song, Liping Wei, X. Shirley Liu: CEAS: cis-regulatory element annotation system. Nucleic Acids Research 34(Web-Server-Issue): 551-554 (2006) | |
235 | Wei Li, Rayford B. Vaughn, Yoginder S. Dandass: An Approach to Model Network Exploitations Using Exploitation Graphs. Simulation 82(8): 523-541 (2006) | |
234 | Shensheng Tang, Wei Li: Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. Telecommunication Systems 32(1): 71-91 (2006) | |
233 | Ke Xu, Wei Li: Many hard examples in exact phase transitions. Theor. Comput. Sci. 355(3): 291-302 (2006) | |
2005 | ||
232 | Wei Li, Andrew McCallum: Semi-Supervised Sequence Modeling with Syntactic Topic Models. AAAI 2005: 813-818 | |
231 | Bo Liu, Junzhou Luo, Wei Li: Multi-Agent Based Network Management Task Decomposition and Scheduling. AINA 2005: 41-46 | |
230 | Wei Li, Kam-Fai Wong, Chunfa Yuan, Wenjie Li, Yunqing Xia: Improving Text Similarity Measurement by Critical Sentence Vector Model. AIRS 2005: 522-527 | |
229 | Jin Zheng, Bo Li, Bing Zhou, Wei Li: Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. CIS (2) 2005: 291-296 | |
228 | Hao Zhang, Wei Li, T. Aaron Gulliver: Biorthogonal Pulse Position Modulation for Time-Hopping UWB Systems. CNSR 2005: 209-213 | |
227 | Junzhou Luo, Wei Li, Bo Liu: Distributed network self-management model based on CSCW. CSCWD (1) 2005: 223-228 | |
226 | Junzhou Luo, Wei Li, Bo Liu: Distributed Intelligent Network Management Model for the Large-Scale Computer Network. CSCWD (Selected papers) 2005: 313-323 | |
225 | Wei Li, Gilles Gagnon, Hong Liu, André Vincent: Throughput Analysis of IP Data Transmission over Terrestrial ATSC DTV Channels. Communication Systems and Applications 2005: 164-169 | |
224 | Lily D. Li, Wei Li, Russel J. Stonier, Xinghuo Yu: Breaking the Constraints to a High Performance Metacomputing System: A System Approach. Computers and Their Applications 2005: 379-384 | |
223 | Wei Li, Edward B. Allen: An Access Control Model for Secure Cluster-Computing Environments. HICSS 2005 | |
222 | Yunchun Li, Wei Li, Mingfeng Zhang, Chunyan Hou: An Active Method to Building Dynamic Dependency Model for Distributed Components. ICAC 2005: 337-338 | |
221 | Yan-fei Zhu, Lian-fang Tian, Zong-yuan Mao, Wei Li: Mixtures of Kernels for SVM Modeling. ICNC (1) 2005: 601-607 | |
220 | Wei Li, Xue-feng Zhu: A New Algorithm of Multi-modality Medical Image Fusion Based on Pulse-Coupled Neural Networks. ICNC (1) 2005: 995-1001 | |
219 | Yili Gong, Wei Li, Yuzhong Sun, Zhiwei Xu: A C/S and P2P Hybrid Resource Discovery Framework in Grid Environments. ICPP 2005: 261-268 | |
218 | Xiaoning Wang, Lijuan Xiao, Wei Li, Zhiwei Xu: Abacus: A Service-Oriented Programming Language for Grid Applications. IEEE SCC 2005: 225-232 | |
217 | Wei Li, Maosong Sun: Automatic Image Annotation Using Maximum Entropy Model. IJCNLP 2005: 34-45 | |
216 | Wei Li, Wenjie Li, Qin Lu, Kam-Fai Wong: A Preliminary Work on Classifying Time Granularities of Temporal Questions. IJCNLP 2005: 414-425 | |
215 | Wei Li, Jiang He, Qingkai Ma, I-Ling Yen |