2013
271Detecting Community Structures in Microblogs from Behavioral Interactions. Ping Zhang, Kun Yue, Jin Li, Xiaodong Fu, Weiyi Liu. APWeb 2013, 734-745. Web SearchBibTeXDownload
270Research on micro-feature extraction algorithm of target based on terahertz radar. Zhengwu Xu, Jian Tu, Jin Li, Yiming Pi. EURASIP J. Wireless Comm. and Networking (2013): 77 (2013). Web SearchBibTeXDownload
269Research on the 3D imaging algorithm of spin target based on the Hough transform. Jin Li, Yiming Pi. EURASIP J. Wireless Comm. and Networking (2013): 90 (2013). Web SearchBibTeXDownload
268New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen. ICT-EurAsia 2013, 373-382. Web SearchBibTeXDownload
267Modeling, Analysis, and Mitigation of Load Neutral Point Voltage for Three-Phase Four-Leg Inverter. Zeng Liu, Jinjun Liu, Jin Li. IEEE Transactions on Industrial Electronics (60): 2010-2021 (2013). Web SearchBibTeXDownload
266Complexity Reduction and Performance Improvement for Geometry Partitioning in Video Coding. Qifei Wang, Xiangyang Ji, Ming-Ting Sun, Gary J. Sullivan, Jin Li, Qionghai Dai. IEEE Trans. Circuits Syst. Video Techn. (23): 338-352 (2013). Web SearchBibTeXDownload
265Model and Simulation for Collaborative VRPSPD. Jin Li. JNW (8): 331-338 (2013). Web SearchBibTeXDownload
264The contribution of the left mid-fusiform cortical thickness to Chinese and English reading in a large Chinese sample. Mingxia Zhang, Jin Li, Chuansheng Chen, Leilei Mei, Gui Xue, Zhong-Lin Lu, Chunhui Chen, Qinghua He, Miao Wei, Qi Dong. NeuroImage (65): 250-256 (2013). Web SearchBibTeXDownload
263Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems. Cheng Huang, Minghua Chen, Jin Li. TOS (9): 3 (2013). Web SearchBibTeXDownload
2012
262A Short Non-delegatable Strong Designated Verifier Signature. Haibo Tian, Xiaofeng Chen, Jin Li. ACISP 2012, 261-279. Web SearchBibTeXDownload
261Leveraging social network concepts for efficient peer-to-peer live streaming systems. Haiying Shen, Ze Li, Hailang Wang, Jin Li. ACM Multimedia 2012, 249-258. Web SearchBibTeXDownload
260The trapezoidal rule for computing supersingular integral on interval. Jizhong Wang, Jin Li, Yue-Ting Zhou. Applied Mathematics and Computation (219): 1616-1624 (2012). Web SearchBibTeXDownload
259A practical solution to the client-LDNS mismatch problem. Cheng Huang, Ivan Batanov, Jin Li. Computer Communication Review (42): 35-41 (2012). Web SearchBibTeXDownload
258New Algorithms for Secure Outsourcing of Modular Exponentiations. Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. ESORICS 2012, 541-556. Web SearchBibTeXDownload
257Multiple-resource and multiple-depot emergency response problem considering secondary disasters. Jiang-Hua Zhang, Jin Li, Zhi-Ping Liu. Expert Syst. Appl. (39): 11066-11071 (2012). Web SearchBibTeXDownload
256A parallel scheduling algorithm for reinforcement learning in large state space. Quan Liu, Xudong Yang, Ling Jing, Jin Li, Jiao Li. Frontiers of Computer Science (6): 631-646 (2012). Web SearchBibTeXDownload
255Bandwidth management for mobile media delivery. Sanjeev Mehrotra, Hua Chen, Sourabh Jain, Jin Li, Baochun Li, Minghua Chen. GLOBECOM 2012, 1901-1907. Web SearchBibTeXDownload
254Secure Outsourced Attribute-Based Signatures. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo. IACR Cryptology ePrint Archive (2012): 605 (2012). Web SearchBibTeXDownload
253Secure Outsourced Attribute-based Encryption. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Duncan S. Wong. IACR Cryptology ePrint Archive (2012): 635 (2012). Web SearchBibTeXDownload
252Outsourcing Encryption of Attribute-Based Encryption with MapReduce. Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen. ICICS 2012, 191-201. Web SearchBibTeXDownload
251Opportunistic Networks Architecture with Fixed Infrastructure Nodes. Yong Zhang, Zhen Wang, Jin Li, Mei Song, Yinglei Teng, Baolin Liu. ICPCA/SWS 2012, 862-868. Web SearchBibTeXDownload
250Utility maximization in peer-to-peer systems with applications to video conferencing. Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou. IEEE/ACM Trans. Netw. (20): 1681-1694 (2012). Web SearchBibTeXDownload
249Efficient Fair Conditional Payments for Outsourcing Computations. Xiaofeng Chen, Jin Li, Willy Susilo. IEEE Transactions on Information Forensics and Security (7): 1687-1694 (2012). Web SearchBibTeXDownload
248Introduction to the ICME 2011 Special Issue. Jin Li, Dinei A. F. Florêncio, Sethuraman Panchanathan, Philippe Salembier, Mohamed Hefeeda, Alexander Loui, Mrinal K. Mandal. IEEE Transactions on Multimedia (14): 497-499 (2012). Web SearchBibTeXDownload
247Zero-Quantized Inter DCT Coefficient Prediction for Real-Time Video Coding. Jin Li, Moncef Gabbouj, Jarmo Takala. IEEE Trans. Circuits Syst. Video Techn. (22): 249-259 (2012). Web SearchBibTeXDownload
246Toward P2P-Based Multimedia Sharing in User Generated Contents. Harrison Chandler, Haiying Shen, Lianyu Zhao, Jared Stokes, Jin Li. IEEE Trans. Parallel Distrib. Syst. (23): 966-975 (2012). Web SearchBibTeXDownload
245A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud. Jingwei Li, Chunfu Jia, Jin Li, Zheli Liu. INCoS 2012, 1-7. Web SearchBibTeXDownload
244Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing. Xu Ma, Jin Li, Fangguo Zhang. INCoS 2012, 600-605. Web SearchBibTeXDownload
243Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian. INCoS 2012, 377-384. Web SearchBibTeXDownload
242SocialTube: P2P-assisted video sharing in online social networks. Ze Li, Haiying Shen, Hailang Wang, Guoxin Liu, Jin Li. INFOCOM 2012, 2886-2890. Web SearchBibTeXDownload
241Simple regenerating codes: Network coding for cloud storage. Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li. INFOCOM 2012, 2801-2805. Web SearchBibTeXDownload
240Generic security-amplifying methods of ordinary digital signatures. Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong. Inf. Sci. (201): 128-139 (2012). Web SearchBibTeXDownload
239Complexity-reduced geometry partition search and high efficiency prediction for video coding. Qifei Wang, Ming-Ting Sun, Gary J. Sullivan, Jin Li. ISCAS 2012, 133-136. Web SearchBibTeXDownload
238An Approach for Validating Semantic Consistency of Model Transformation Based on Pattern. Jin Li, De-chen Zhan, Lanshun Nie, Xiaofei Xu. IWEI 2012, 161-171. Web SearchBibTeXDownload
237Vehicle Routing Problem with Time Windows for Reducing Fuel Consumption. Jin Li. JCP (7): 3020-3027 (2012). Web SearchBibTeXDownload
236Integrated in silico approaches for the prediction of Ames test mutagenicity. Sandeep Modi, Jin Li, Sophie Malcomber, Claire Moore, Andrew Scott, Andrew White, Paul Carmichael. Journal of Computer-Aided Molecular Design (26): 1017-1033 (2012). Web SearchBibTeXDownload
235A Label Correcting Algorithm for Dynamic Tourist Trip Planning. Jin Li, Peihua Fu. JSW (7): 2899-2905 (2012). Web SearchBibTeXDownload
234Research on Team Orienteering Problem with Dynamic Travel Times. Jin Li. JSW (7): 249-255 (2012). Web SearchBibTeXDownload
233Using cooperative game theory to optimize the feature selection problem. Xin Sun, Yanheng Liu, Jin Li, Jianqi Zhu, Xuejie Liu, Hui-Ling Chen. Neurocomputing (97): 86-93 (2012). Web SearchBibTeXDownload
232Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu. NSS 2012, 490-502. Web SearchBibTeXDownload
231Feature evaluation and selection with cooperative game theory. Xin Sun, Yanheng Liu, Jin Li, Jianqi Zhu, Huiling Chen, Xuejie Liu. Pattern Recognition (45): 2992-3002 (2012). Web SearchBibTeXDownload
230Asymmetric coding scheme for 3D frame-compatible formats. Jin Li, Jan De Cock, Peter Lambert, Rik Van de Walle. QoMEX 2012, 154-155. Web SearchBibTeXDownload
229A Game-Theoretic Approach for Balancing the Tradeoffs between Data Availability and Query Delay in Multi-hop Cellular Networks. Jin Li, Weiyi Liu, Kun Yue. TAMC 2012, 487-497. Web SearchBibTeXDownload
2011
228Celerity: a low-delay multi-party conferencing solution. Xiangwen Chen, Minghua Chen, Baochun Li, Yao Zhao, Yunnan Wu, Jin Li. ACM Multimedia 2011, 493-502. Web SearchBibTeXDownload
227Multi-authority ciphertext-policy attribute-based encryption with accountability. Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie. ASIACCS 2011, 386-390. Web SearchBibTeXDownload
226A sub-pathway-based approach for identifying drug response principal network. Xiujie Chen, Jiankai Xu, Bangqing Huang, Jin Li, Xin Wu, Ling Ma, Xiaodong Jia, Xiusen Bian, Fujian Tan, Lei Liu, Sheng Chen, Xia Li. Bioinformatics (27): 649-654 (2011). Web SearchBibTeXDownload
225Pangolin: speeding up concurrent messaging for cloud-based social gaming. Chao Zhang, Cheng Huang, Philip A. Chou, Jin Li, Sanjeev Mehrotra, Keith W. Ross, Hao Chen, Felix Livni, Jay Thaler. CoNEXT 2011, 23. Web SearchBibTeXDownload
224Optimal Repair of MDS Codes in Distributed Storage via Subspace Interference Alignment. Viveck R. Cadambe, Cheng Huang, Syed Ali Jafar, Jin Li. CoRR (abs/1106.1250) (2011). Web SearchBibTeXDownload
223Simple Regenerating Codes: Network Coding for Cloud Storage. Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li. CoRR (abs/1109.0264) (2011). Web SearchBibTeXDownload
222A review of comparative studies of spatial interpolation methods in environmental sciences: Performance and impact factors. Jin Li, Andrew D. Heap. Ecological Informatics (6): 228-241 (2011). Web SearchBibTeXDownload
221Performance of predictive models in marine benthic environments based on predictions of sponge distribution on the Australian continental shelf. Zhi Huang, Brendan Brooke, Jin Li. Ecological Informatics (6): 205-216 (2011). Web SearchBibTeXDownload
220Prediction of discrete cosine transformed coefficients in resized pixel blocks. Jin Li, Weiwei Chen, Moncef Gabbouj, Jarmo Takala, Hexin Chen. ICASSP 2011, 1045-1048. Web SearchBibTeXDownload
219Lossless audio hiding method for synchronous audio-video coding. Weiwei Chen, Jin Li, Moncef Gabbouj, Jarmo Takala. ICASSP 2011, 2432-2435. Web SearchBibTeXDownload
218Linear, adaptive and nonlinear trading models for Singapore stock market with random forests. Qing-Guo Wang, Jin Li, Qin Qin, Shuzhi Sam Ge. ICCA 2011, 726-731. Web SearchBibTeXDownload
217BloomFlash: Bloom Filter on Flash-Based Storage. Biplob K. Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, David Hung-Chang Du. ICDCS 2011, 635-644. Web SearchBibTeXDownload
216Forming of Surface Quality when Cutting Parts Using Ultrasound Liquid Flow. Jin Li, Xiaoqing Liu, Yunhua Wang. ICDMA 2011, 549-551. Web SearchBibTeXDownload
215No Regret Learning for Sensor Relocation in Mobile Sensor Networks. Jin Li, Chi Zhang, Weiyi Liu, Kun Yue. ICICA (LNCS) 2011, 216-223. Web SearchBibTeXDownload
214Ant colony optimization with self-adaptive parameter adjustment. Xiaoying Li, Jin Li, Daohua Liu. ICNC 2011, 1156-1160. Web SearchBibTeXDownload
213A game theoretic approach to sensor relocation in mobile sensor networks. Chi Zhang, Jin Li, Meng Zhu, Zongkun Yang. ICNC 2011, 1294-1298. Web SearchBibTeXDownload
212Design optimization and experimental study of acoustic transducer in Near Field Acoustic Levitation. Jin Li, Pinkuan Liu, Han Ding, Wenwu Cao. ICRA 2011, 4353-4358. Web SearchBibTeXDownload
211Peer-to-Peer Streaming Capacity. Sudipta Sengupta, Shao Liu, Minghua Chen, Mung Chiang, Jin Li, Philip A. Chou. IEEE Transactions on Information Theory (57): 5072-5087 (2011). Web SearchBibTeXDownload
210Optimizing FEC Transmission Strategy for Minimizing Delay in Lossless Sequential Streaming. Sanjeev Mehrotra, Jin Li, Ying-zong Huang. IEEE Transactions on Multimedia (13): 1066-1076 (2011). Web SearchBibTeXDownload
209Optimizing Multi-Rate Peer-to-Peer Video Conferencing Applications. Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Jin Li, Philip A. Chou. IEEE Transactions on Multimedia (13): 856-868 (2011). Web SearchBibTeXDownload
208Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li. IEEE Trans. Parallel Distrib. Syst. (22): 847-859 (2011). Web SearchBibTeXDownload
207A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment. Xuewei Feng, Dongxia Wang, Shanwen Ke, Guoqing Ma, Jin Li. IMIS 2011, 376-380. Web SearchBibTeXDownload
206Public DNS system and Global Traffic Management. Cheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg. INFOCOM 2011, 2615-2623. Web SearchBibTeXDownload
205Estimating the performance of hypothetical cloud service deployments: A measurement-based approach. Angela Wang, Cheng Huang, Jin Li, Keith W. Ross. INFOCOM 2011, 2372-2380. Web SearchBibTeXDownload
204Toward P2P-based multimedia sharing in user generated contents. Haiying Shen, Lianyu Zhao, Harrison Chandler, Jared Stokes, Jin Li. INFOCOM 2011, 667-675. Web SearchBibTeXDownload
203Permutation code: Optimal exact-repair of a single failed node in MDS code based distributed storage systems. Viveck R. Cadambe, Cheng Huang, Jin Li. ISIT 2011, 1225-1229. Web SearchBibTeXDownload
202A Construction Approach of Model Transformation Rules Based on Rough Set Theory. Jin Li, De-chen Zhan, Lanshun Nie, Xiaofei Xu. IWEI 2011, 19-35. Web SearchBibTeXDownload
201Drug discovery using very large numbers of patents. General strategy with extensive use of match and edit operations. Barry Robson, Jin Li, Richard Dettinger, Amanda Peters, Stephen K. Boyer. Journal of Computer-Aided Molecular Design (25): 427-441 (2011). Web SearchBibTeXDownload
200Enhancing Attribute-Based Encryption with Attribute Hierarchy. Jin Li, Qian Wang, Cong Wang, Kui Ren. MONET (16): 553-561 (2011). Web SearchBibTeXDownload
199Celerity: towards low-delay multi-party conferencing over arbitrary network topologies. Xiangwen Chen, Minghua Chen, Baochun Li, Yao Zhao, Yunnan Wu, Jin Li. NOSSDAV 2011, 123-128. Web SearchBibTeXDownload
198Ice-COLD-PCR enables rapid amplification and robust enrichment for low-abundance unknown DNA mutations. Coren A. Milbury, Jin Li, G. Mike Makrigiorgos. Nucleic Acids Research (39): 2 (2011). Web SearchBibTeXDownload
197SkimpyStash: RAM space skimpy key-value store on flash-based storage. Biplob K. Debnath, Sudipta Sengupta, Jin Li. SIGMOD Conference 2011, 25-36. Web SearchBibTeXDownload
196Identity-based trapdoor mercurial commitments and applications. Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li. Theor. Comput. Sci. (412): 5498-5512 (2011). Web SearchBibTeXDownload
195Reduced-complexity search for video coding geometry partitions using texture and depth data. Qifei Wang, Jin Li, Gary J. Sullivan, Ming-Ting Sun. VCIP 2011, 1-4. Web SearchBibTeXDownload
2010
194Identity-Based Chameleon Hash Scheme without Key Exposure. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim. ACISP 2010, 200-215. Web SearchBibTeXDownload
193RAPID: a reliable protocol for improving delay. Sanjeev Mehrotra, Jin Li, Cheng Huang. ACM Multimedia 2010, 1499-1500. Web SearchBibTeXDownload
192Numerical solution of hypersingular equation using recursive wavelet on invariant set. Yue-Ting Zhou, Jin Li, De-Hao Yu, Kang Yong Lee. Applied Mathematics and Computation (217): 861-868 (2010). Web SearchBibTeXDownload
191Qualitative probabilistic networks with reduced ambiguities. Kun Yue, Yu Yao, Jin Li, Wei-Yi Liu. Appl. Intell. (33): 159-178 (2010). Web SearchBibTeXDownload
190Attribute-based signature and its applications. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren. ASIACCS 2010, 60-69. Web SearchBibTeXDownload
189An Improved Dynamic XML Encoding Scheme Applied in Map Information. Guo Guang-Xing, Yin Gui-Mei, Jin Li. CASoN 2010, 655-657. Web SearchBibTeXDownload
188Application of Maintaining the Shortest Path Method in the Game Map Path-Finding. Zheng-hong Hu, Jin Li. CASoN 2010, 737-740. Web SearchBibTeXDownload
187Study on the Demands for Agricultural and Rural Informationization in China and Its Strategic Options. Jin Li, Chunjiang Zhao, Xiangyang Qin, Gang Liu. CCTA (3) 2010, 580-591. Web SearchBibTeXDownload
186Analyzing and Correlating Security Events Using State Machine. Xuewei Feng, Dongxia Wang, Jiemei Zeng, Guoqing Ma, Jin Li. CIT 2010, 2849-2854. Web SearchBibTeXDownload
185Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang. CloudCom 2010, 89-96. Web SearchBibTeXDownload
184Trusted Data Sharing over Untrusted Cloud Storage Providers. Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang. CloudCom 2010, 97-103. Web SearchBibTeXDownload
183Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications. Sanjeev Mehrotra, Jin Li, Sudipta Sengupta, Manish Jain, Sayandeep Sen. GLOBECOM 2010, 1-5. Web SearchBibTeXDownload
182A Case for WiFi Relay: Improving VoIP Quality for WiFi Users. Amit Mondal, Cheng Huang, Jin Li, Manish Jain, Aleksandar Kuzmanovic. ICC 2010, 1-5. Web SearchBibTeXDownload
181P2P Streaming Capacity under Node Degree Bound. Shao Liu, Minghua Chen, Sudipta Sengupta, Mung Chiang, Jin Li, Philip A. Chou. ICDCS 2010, 587-598. Web SearchBibTeXDownload
180Secure Ranked Keyword Search over Encrypted Cloud Data. Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou. ICDCS 2010, 253-262. Web SearchBibTeXDownload
179Improving E-government Performance in China. Jin Li. ICEE 2010, 489-492. Web SearchBibTeXDownload
178Minimizing delay in lossless sequential data streaming. Sanjeev Mehrotra, Jin Li, Ying-zong Huang. ICME 2010, 1-6. Web SearchBibTeXDownload
177An integration text extraction approach in video frame. Li-Jie Li, Jin Li, Lei Wang. ICMLC 2010, 2115-2120. Web SearchBibTeXDownload
176Improved Dynamic Time Warping algorithm the research and application of query by humming. Jin Li, Limin Zheng, Lu Yang, Li-jun Tian, Ping Wu, Hong Zhu. ICNC 2010, 3349-3353. Web SearchBibTeXDownload
175No-regret learning for cost constrained resource selection game. Jin Li, Zhou Shi, Wei-Yi Liu, Kun Yue, Rui-Jie Chen. ICNC 2010, 2921-2925. Web SearchBibTeXDownload
174An open CNC system based on switched ethernet. Haibo Yang, Hu Lin, Yaodong Tao, Jin Li. ICNSC 2010, 684-688. Web SearchBibTeXDownload
173A DHT-Aided Chunk-Driven Overlay for Scalable and Efficient Peer-to-Peer Live Streaming. Haiying Shen, Lianyu Zhao, Ze Li, Jin Li. ICPP 2010, 248-257. Web SearchBibTeXDownload
172Toward publicly auditable secure cloud data storage services. Cong Wang, Kui Ren, Wenjing Lou, Jin Li. IEEE Network (24): 19-24 (2010). Web SearchBibTeXDownload
171Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou. INFOCOM 2010, 441-445. Web SearchBibTeXDownload
170Hidden attribute-based signatures without anonymity revocation. Jin Li, Kwangjo Kim. Inf. Sci. (180): 1681-1689 (2010). Web SearchBibTeXDownload
169SureCall: Towards glitch-free real-time audio/video conferencing. Amit Mondal, Ross Cutler, Cheng Huang, Jin Li, Aleksandar Kuzmanovic. IWQoS 2010, 1-9. Web SearchBibTeXDownload
168Superconvergence and ultraconvergence of Newton-Cotes rules for supersingular integrals. Jin Li, Xiaoping Zhang, Dehao Yu. J. Computational Applied Mathematics (233): 2841-2854 (2010). Web SearchBibTeXDownload
167An Approach for Reducing the Graphical Model and Genetic Algorithm for Computing Approximate Nash Equilibrium in Static Games. Wei-Yi Liu, Kun Yue, Jin Li, Ning Song, Li Ding. Journal of Intelligent and Robotic Systems (60): 241-261 (2010). Web SearchBibTeXDownload
166A comparative study of self-heating effect of nMOSFETs fabricated on SGOI and SGSOAN substrates. Hongxia Liu, Bin Li, Jin Li, Bo Yuan. Microelectronics Reliability 2010, 1942-1950. Web SearchBibTeXDownload
165Measuring and Evaluating TCP Splitting for Cloud Services. Abhinav Pathak, Angela Wang, Cheng Huang, Albert G. Greenberg, Y. Charlie Hu, Randy Kern, Jin Li, Keith W. Ross. PAM 2010, 41-50. Web SearchBibTeXDownload
164FlashStore: High Throughput Persistent Key-Value Store. Biplob Debnath, Sudipta Sengupta, Jin Li. PVLDB (3): 1414-1425 (2010). Web SearchBibTeXDownload
163Designing Effective Notifications for Collaborative Development Environments. Joanna McGrenere, Jin Li, Jimmy Lo, Elena Litani. The Smart Internet 2010, 65-87. Web SearchBibTeXDownload
2009
162A constraint-guided method with evolutionary algorithms for economic problems. Nanlin Jin, Edward P. K. Tsang, Jin Li. Appl. Soft Comput. (9): 924-935 (2009). Web SearchBibTeXDownload
161Notification design in collaborative and social networking environments. Joanna McGrenere, Jin Li, Jimmy Lo. CASCON 2009, 319-320. Web SearchBibTeXDownload
160Inter-Operator Feedback in Data Stream Management Systems via Punctuation. Rafael Fernández-Moctezuma, Kristin Tufte, Jin Li. CIDR 2009. Web SearchBibTeXDownload
159TSGen: A UML Activity Diagram-Based Test Scenario Generation Tool. Chang-ai Sun, Baobao Zhang, Jin Li. CSE (2) 2009, 853-858. Web SearchBibTeXDownload
158Multi-stage Dynamic Coordination Model for Large-Scale Crowd's Activities Based on Multi-agent. Jin Li, Qinmin Wu, Daoli Zhu, Yihong Hu. CSIE (1) 2009, 487-491. Web SearchBibTeXDownload
157Application of Kalman Filter Method Based "+" Function in the Landslide Deformation Forecast. Fumin Lu, Shangqing Wang, Jin Li. ESIAT (1) 2009, 575-578. Web SearchBibTeXDownload
156Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou. ESORICS 2009, 355-370. Web SearchBibTeXDownload
155Discovering semantic associations among Web services based on the qualitative probabilistic network. Kun Yue, Weiyi Liu, Xiaoling Wang, Aoying Zhou, Jin Li. Expert Syst. Appl. (36): 9082-9094 (2009). Web SearchBibTeXDownload
154The Design and Implementation of an Enhanced SIP ALG to Support MSRP Sessions. Haibo Yang, Hu Lin, Jin Li, Weimin Lei. HIS (2) 2009, 289-292. Web SearchBibTeXDownload
153Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li. IACR Cryptology ePrint Archive (2009): 295 (2009). Web SearchBibTeXDownload
152Privacy-aware Attribute-based Encryption with User Accountability. Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan. IACR Cryptology ePrint Archive (2009): 284 (2009). Web SearchBibTeXDownload
151Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou. IACR Cryptology ePrint Archive (2009): 593 (2009). Web SearchBibTeXDownload
150A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Jin Li, Kui Ren, Kwangjo Kim. IACR Cryptology ePrint Archive (2009): 118 (2009). Web SearchBibTeXDownload
149Enhancing Attribute-based Encryption with Attribute Hierarchy. Jin Li, Qian Wang, Cong Wang, Kui Ren. IACR Cryptology ePrint Archive (2009): 293 (2009). Web SearchBibTeXDownload
148Enabling Public Verifiability and Data Dynamics for Storage Security. Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou. IACR Cryptology ePrint Archive (2009): 281 (2009). Web SearchBibTeXDownload
147Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding. Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Jin Li, Philip A. Chou. ICME 2009, 1406-1413. Web SearchBibTeXDownload
146A hybrid FEC-ARQ protocol for low-delay lossless sequential data streaming. Ying-zong Huang, Sanjeev Mehrotra, Jin Li. ICME 2009, 718-725. Web SearchBibTeXDownload
145A Collaborative Operation Framework for Ship-Building Supply Chain. Lanshun Nie, Xiaofei Xu, De-chen Zhan, Jin Li, Jindan Feng. IESA 2009, 41-46. Web SearchBibTeXDownload
144Design and Implementation of a MOF Based Enterprise Modeling Tool. Jin Li, De-chen Zhan, Lanshun Nie, Xiaofei Xu. IESA 2009, 76-81. Web SearchBibTeXDownload
143Privacy-Aware Attribute-Based Encryption with User Accountability. Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan. ISC 2009, 347-362. Web SearchBibTeXDownload
142The delay region for P2P file transfer. Yunnan Wu, Y. Charlie Hu, Jin Li, Philip A. Chou. ISIT 2009, 834-838. Web SearchBibTeXDownload
141Congestion location detection: Methodology, algorithm, and performance. Shao Liu, Mung Chiang, Mathias Jourdain, Jin Li. IWQoS 2009, 1-9. Web SearchBibTeXDownload
140Route Guidance Mechanism with Centralized Information Control in Large-scale Crowd's Activities. Jin Li, Qinmin Wu, Daoli Zhu. JCAI 2009, 7-11. Web SearchBibTeXDownload
139A First Look at Media Conferencing Traffic in the Global Enterprise. Vijay Vasudevan, Sudipta Sengupta, Jin Li. PAM 2009, 133-142. Web SearchBibTeXDownload
138Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts. Angela Wang, Cheng Huang, Jin Li, Keith W. Ross. PAM 2009, 57-66. Web SearchBibTeXDownload
137Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li. SecureComm 2009, 311-329. Web SearchBibTeXDownload
2008
136On ISP-friendly rate allocation for peer-assisted VoD. Jiajun Wang, Cheng Huang, Jin Li. ACM Multimedia 2008, 279-288. Web SearchBibTeXDownload
135Generic Security-Amplifying Methods of Ordinary Digital Signatures. Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong. ACNS 2008, 224-241. Web SearchBibTeXDownload
134Research on Location Service Integration Strategy. Yongyi Zhao, Jin Li. AINA Workshops 2008, 201-204. Web SearchBibTeXDownload
133Peer-to-Peer utility maximization. Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Philip A. Chou, Jin Li. CISS 2008, 298-303. Web SearchBibTeXDownload
132Hybrid Modeling of Intra-DCT Coefficients for Real-Time Video Encoding. Jin Li, Moncef Gabbouj, Jarmo Takala. EURASIP J. Image and Video Processing (2008) (2008). Web SearchBibTeXDownload
131Attribute-Based Ring Signatures. Jin Li, Kwangjo Kim. IACR Cryptology ePrint Archive (2008): 394 (2008). Web SearchBibTeXDownload
130A detection algorithm for zero-quantized DCT coefficients in JPEG. Jin Li, Jarmo Takala, Moncef Gabbouj, Hexin Chen. ICASSP 2008, 1189-1192. Web SearchBibTeXDownload
129Laplacian modeling of DCT coefficients for real-time encoding. Jin Li, Moncef Gabbouj, Jarmo Takala, Hexin Chen. ICME 2008, 797-800. Web SearchBibTeXDownload
128AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation. Jin Li, Kristin Tufte, David Maier, Vassilis Papadimos. IEEE Internet Computing (12): 22-29 (2008). Web SearchBibTeXDownload
127Image Recognition Based on a Novel Data Fusion Method. Qingdong Du, Jin Li, Xiao Chen. IIH-MSP 2008, 891-894. Web SearchBibTeXDownload
126A Hybrid Estimation of Distribution Algorithm for CDMA Cellular System Design. Jianyong Sun, Qingfu Zhang, Jin Li, Xin Yao. International Journal of Computational Intelligence and Applications (7): 187-200 (2008). Web SearchBibTeXDownload
125Fault Diagnosis of Generator Based on D-S Evidence Theory. Qingdong Du, Jin Li, Xiao Chen. ISDA (1) 2008, 660-663. Web SearchBibTeXDownload
124On optimality of routing for multi-source multicast communication scenarios with node uplink constraints. Sudipta Sengupta, Minghua Chen, Philip A. Chou, Jin Li. ISIT 2008, 330-334. Web SearchBibTeXDownload
123Generic Transformation from Weakly to Strongly Unforgeable Signatures. Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao. J. Comput. Sci. Technol. (23): 240-252 (2008). Web SearchBibTeXDownload
122Understanding hybrid CDN-P2P: why limelight needs its own Red Swoosh. Cheng Huang, Angela Wang, Jin Li, Keith W. Ross. NOSSDAV 2008, 75-80. Web SearchBibTeXDownload
121On peer-to-peer (P2P) content delivery. Jin Li. Peer-to-Peer Networking and Applications (1): 45-63 (2008). Web SearchBibTeXDownload
120Out-of-order processing: a new architecture for high-performance stream systems. Jin Li, Kristin Tufte, Vladislav Shkapenyuk, Vassilis Papadimos, Theodore Johnson, David Maier. PVLDB (1): 274-288 (2008). Cited by 7Web SearchBibTeXDownload
119Utility maximization in peer-to-peer systems. Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou. SIGMETRICS 2008, 169-180. Web SearchBibTeXDownload
118Fault prediction of the nonlinear systems with uncertainty. Zhijie Zhou, Changhua Hu, Hongdong Fan, Jin Li. Simulation Modelling Practice and Theory (16): 690-703 (2008). Web SearchBibTeXDownload
2007
117Model Checking for BPEL4WS with Time. Chunming Gao, Jin Li, Zhoujun Li, Huowang Chen. APWeb/WAIM Workshops 2007, 528-533. Web SearchBibTeXDownload
116A wavelet-based data pre-processing analysis approach in mass spectrometry. Xiaoli Li, Jin Li, Xin Yao. Comp. in Bio. and Med. (37): 509-516 (2007). Web SearchBibTeXDownload
115Research on Methods of Processing Transit IC Card Information and Constructing Transit OD Matrix. Xiuhua Han, Jin Li, Han Peng. I3E (2) 2007, 556-564. Web SearchBibTeXDownload
114Advances in Peer-to-Peer Streaming Systems [Guest Editorial]. Danny H. K. Tsang, Keith W. Ross, Pablo Rodriguez, Jin Li, G. Karlsson. IEEE Journal on Selected Areas in Communications (25): 1609-1611 (2007). Web SearchBibTeXDownload
113A Map Matching Algorithm in GPS-based Car Navigation System. Yongyi Zhao, Bo Song, Jin Li. IIH-MSP 2007, 77-80. Web SearchBibTeXDownload
112Extracting Emotional Semantics from Color Image using Analytical Hierarchy Process. Haifang Li, Jin Li, Jiancheng Song, Junjie Chen. IIH-MSP 2007, 612-618. Web SearchBibTeXDownload
111The Study of Soft Sensor Modeling Method Based on Support Vector Machine for Sewage Treatment. Jingwen Tian, Meijuan Gao, Jin Li. IMECS 2007, 227-231. Web SearchBibTeX
110Peer-Assisted VoD: Making Internet Video Distribution Cheap. Cheng Huang, Jin Li, Keith W. Ross. IPTPS 2007. Web SearchBibTeXDownload
109A Fuzzy Mapping from Image Texture to Affective Thesaurus. Haifang Li, Jin Li, Jiancheng Song, Junjie Chen. LSMS (1) 2007, 357-367. Web SearchBibTeXDownload
108PeerStreaming: design and implementation of an on-demand distributed streaming system with digital rights management capabilities. Jin Li, Yi Cui, Bin Chang. Multimedia Syst. (13): 173-190 (2007). Web SearchBibTeXDownload
107Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems. Cheng Huang, Minghua Chen, Jin Li. NCA 2007, 79-86. Web SearchBibTeXDownload
106Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen. ProvSec 2007, 208-217. Web SearchBibTeXDownload
105Practical Threshold Signatures Without Random Oracles. Jin Li, Tsz Hon Yuen, Kwangjo Kim. ProvSec 2007, 198-207. Web SearchBibTeXDownload
104Can internet video-on-demand be profitable?. Cheng Huang, Jin Li, Keith W. Ross. SIGCOMM 2007, 133-144. Web SearchBibTeXDownload
103Travel time estimation using NiagaraST and latte. Kristin Tufte, Jin Li, David Maier, Vassilis Papadimos, Robert L. Bertini, James Rucker. SIGMOD Conference 2007, 1091-1093. Web SearchBibTeXDownload
102Intelligent Window Based on Embedded System. Jingwen Tian, Meijuan Gao, Jin Li. SNPD (2) 2007, 395-399. Web SearchBibTeXDownload
2006
101Peer-to-peer multimedia applications. Jin Li. ACM Multimedia 2006, 3-6. Web SearchBibTeXDownload
100CBR-Based Knowledge Discovery on Results of Evolutionary Design of Logic Circuits. Shuguang Zhao, Mingying Zhao, Jin Li, Change Wang. ADMA 2006, 881-888. Web SearchBibTeXDownload
99A Feature-Based Semantics Model of Reusable Component. Jin Li, De-chen Zhan, Zhongjie Wang. APWeb Workshops 2006, 955-964. Web SearchBibTeXDownload
98Generalization of the Selective-ID Security Model for HIBS Protocols. Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang. CIS 2006, 894-902. Web SearchBibTeXDownload
97Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang. CIS 2006, 545-555. Web SearchBibTeXDownload
96Current developments and future directions of bio-inspired computation and implications for ecoinformatics. Xin Yao, Yong Liu, Jin Li, Jun He, Colin Frayn. Ecological Informatics (1): 9-22 (2006). Web SearchBibTeXDownload
95A focused learning environment for Eclipse. Izzet Safer, Gail C. Murphy, Julie Waterhouse, Jin Li. ETX 2006, 75-79. Web SearchBibTeXDownload
94Universal Designated Verifier Ring Signature (Proof) Without Random Oracles. Jin Li, Yanming Wang. EUC Workshops 2006, 332-341. Web SearchBibTeXDownload
93A Strong Identity Based Key-Insulated Cryptosystem. Jin Li, Fangguo Zhang, Yanming Wang. EUC Workshops 2006, 352-361. Web SearchBibTeXDownload
92A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Jin Li, Fangguo Zhang, Yanming Wang. EUC Workshops 2006, 362-371. Web SearchBibTeXDownload
91A Generic Construction of Secure Signatures Without Random Oracles. Jin Li, Yuen-Yan Chan, Yanming Wang. ICCSA (3) 2006, 309-317. Web SearchBibTeXDownload
90BGN Authentication and Its Extension to Convey Message Commitments. Yuen-Yan Chan, Jin Li. ICCSA (3) 2006, 365-374. Web SearchBibTeXDownload
89Single Sign-On and Key Establishment for Ubiquitous Smart Environments. Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li. ICCSA (4) 2006, 406-415. Web SearchBibTeXDownload
88An Effective Array for 2-D Direction-of-Arrival Estimation. Maohui Xia, Cai Liu, Ruiyan Du, Jin Li. ICICIC (2) 2006, 370-373. Web SearchBibTeXDownload
87Ocean Red Tide Recognizing Method Based Neural Network Ensembles. Wencang Zhao, Wei Wang, Jin Li. ICICIC (2) 2006, 88-91. Web SearchBibTeXDownload
86Adaptive Erasure Resilient Coding in Distributed Storage. Jin Li. ICME 2006, 561-564. Web SearchBibTeXDownload
85DISCOVR: Distributed Collaborative Video Recorder. Jin Li, Cheng Huang. ICME 2006, 1413-1416. Web SearchBibTeXDownload
84Early stopping for LDPC decoding: convergence of mean magnitude (CMM). Jin Li, Xiao-Hu You, Tiffany Jing Li. IEEE Communications Letters (10): 667-669 (2006). Web SearchBibTeXDownload
83A Business Modeling Tools for Complex Enterprise Application Systems. Jin Li, De-chen Zhan, Zhongjie Wang. IMSCCS (1) 2006, 648-653. Web SearchBibTeXDownload
82An Approach for Solving Fuzzy Games. Wei-Yi Liu, Jin Li, Kun Yue, Ning Song, Hong Yao. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (14): 277-292 (2006). Web SearchBibTeXDownload
81Analysis of spectral changes and filter design in tagged cardiac MRI. Craig A. Davis, Jin Li, Thomas S. Denney Jr.. ISBI 2006, 137-140. Web SearchBibTeXDownload
80Tag point classification in tagged cardiac MR images. Jin Li, Craig A. Davis, Thomas S. Denney Jr., Himanshu Gupta, Steven Lloyd, Louis J. Dell'Italia. ISBI 2006, 618-621. Web SearchBibTeXDownload
79The Intelligent Control System of Flocculation Process of Sewage Treatment Based on Wavelet Neural Networks. Jingwen Tian, Meijuan Gao, Hao Zhou, Jin Li. ISDA (2) 2006, 219-224. Web SearchBibTeXDownload
78On Evaluating Molecular-Docking Methods for Pose Prediction and Enrichment Factors. Hongming Chen, Paul D. Lyne, Fabrizio Giordanetto, Timothy Lovell, Jin Li. Journal of Chemical Information and Modeling (46): 401-415 (2006). Web SearchBibTeXDownload
77A Hybrid Estimation of Distribution Algorithm for CDMA Cellular System Design. Jianyong Sun, Qingfu Zhang, Jin Li, Xin Yao. SEAL 2006, 905-912. Web SearchBibTeXDownload
76Voice transmission over IEEE 802.11 networks: main issues and restrictions. Arlindo F. da Conceição, Jin Li, Dinei A. F. Florêncio. WebMedia 2006, 233-242. Web SearchBibTeXDownload
2005
75Cost-sensitive classification with genetic programming. Jin Li, Xiaoli Li, Xin Yao. Congress on Evolutionary Computation 2005, 2114-2121. Web SearchBibTeXDownload
74The application of evolutionary computation to the analysis of the profiles of elliptical galaxies: a maximum likelihood approach. Ben Washbrook, Jin Li. Congress on Evolutionary Computation 2005, 2607-2612. Web SearchBibTeXDownload
73Towards Security Two-part Authenticated Key Agreement Protocols. Songping Li, Quan Yuan, Jin Li. IACR Cryptology ePrint Archive (2005): 300 (2005). Web SearchBibTeXDownload
72ID-based signature and Key-insulated threshold signature. Jin Li, Fangguo Zhang. IACR Cryptology ePrint Archive (2005): 423 (2005). Web SearchBibTeXDownload
71Semantics of Data Streams and Operators. David Maier, Jin Li, Peter A. Tucker, Kristin Tufte, Vassilis Papadimos. ICDT 2005, 37-52. Cited by 17Web SearchBibTeXDownload
70MutualCast: A Serverless Peer-to-Peer Multiparty Real-Time Audio Conferencing System. Jin Li. ICME 2005, 602-605. Web SearchBibTeXDownload
69On the compression and streaming of concentric mosaic data for free wandering in a realistic environment over the Internet. Cha Zhang, Jin Li. IEEE Transactions on Multimedia (7): 1170-1182 (2005). Web SearchBibTeXDownload
68Low noise reversible MDCT (RMDCT) and its application in progressive-to-lossless embedded audio coding. Jin Li. IEEE Transactions on Signal Processing (53): 1870-1880 (2005). Web SearchBibTeXDownload
67A comparative study of three evolutionary algorithms incorporating different amounts of domain knowledge for node covering problem. Jun He, Xin Yao, Jin Li. IEEE Transactions on Systems, Man, and Cybernetics, Part C (35): 266-271 (2005). Web SearchBibTeXDownload
66Technique for automatic forest fire surveillance using visible light image. Jin Li, Qingwen Qi, Xiuping Zou, Hu Peng, Lili Jiang, Yajuan Liang. IGARSS 2005, 3135-3138. Web SearchBibTeXDownload
65Research on land cover change and its ecological effect on lower reaches of Lancang River - a case of Xishuangbanna , Yunnan Province, China. Xiuping Zou, Qingwen Qi, Zengrang Xu, Lili Jiang, Daming He, Hu Peng, Jin Li, Yajuan Liang. IGARSS 2005, 2410-2413. Web SearchBibTeXDownload
64Monitoring land cover changes with remote sensing in transboundary area of Southwest China. Meiling Liu, Qingwen Qi, Jingfeng Liu, Shangguo Su, Chang Jun, Xiuping Zou, Hu Peng, Jin Li. IGARSS 2005, 1534-1537. Web SearchBibTeXDownload
63Research on direction relationships in automated simplification of points cluster. Hu Peng, Qingwen Qi, Xiuping Zou, Yajuan Liang, Jin Li, Meiling Liu. IGARSS 2005, 5376-5378. Web SearchBibTeXDownload
62Semantics and Evaluation Techniques for Window Aggregates in Data Streams. Jin Li, David Maier, Kristin Tufte, Vassilis Papadimos, Peter A. Tucker. SIGMOD Conference 2005, 311-322. Cited by 58Web SearchBibTeXDownload
61No pane, no gain: efficient evaluation of sliding-window aggregates over data streams. Jin Li, David Maier, Kristin Tufte, Vassilis Papadimos, Peter A. Tucker. SIGMOD Record (34): 39-44 (2005). Cited by 45Web SearchBibTeXDownload
2004
60EDDIE-Automation, a decision support tool for financial forecasting. Edward P. K. Tsang, Paul Yung, Jin Li. Decision Support Systems (37): 559-565 (2004). Web SearchBibTeXDownload
59WebSphere Studio overview. Frank J. Budinsky, George DeCandio, Ralph Earle, Tim Francis, Julian Jones, Jin Li, Martin Nally, Connie Nelin, Valentina Popescu, Scott Rich, Arthur G. Ryman, Timothy Wilson. IBM Systems Journal (43): 384-419 (2004). Web SearchBibTeXDownload
58The seamlessly multiplexed embedded codec (SMEC) and its application in image coding. Jin Li. ICIP 2004, 1285-1288. Web SearchBibTeXDownload
57Distributed hosting of Web content with erasure coding and unequal weight assignment. Jin Li, Cha Zhang. ICME 2004, 2087-2090. Web SearchBibTeX
56Low bit-rate video streaming for face-to-face teleconference. Zhen Wen, Zicheng Liu, Michael F. Cohen, Jin Li, Ke Colin Zheng, Thomas S. Huang. ICME 2004, 1631-1634. Web SearchBibTeX
55An Evolutionary Approach to Modeling Radial Brightness Distributions in Elliptical Galaxies. Jin Li, Xin Yao, Colin Frayn, Habib G. Khosroshahi, Somak Raychaudhury. PPSN 2004, 591-601. Web SearchBibTeXDownload
2003
54A progressive to lossless embedded audio coder (PLEAC) with reversible modulated lapped transform. Jin Li. ICME 2003, 221-224. Web SearchBibTeXDownload
53Compression of the layered depth image. Jiangang Duan, Jin Li. IEEE Transactions on Image Processing (12): 365-372 (2003). Web SearchBibTeXDownload
52On interactive browsing of large images. Jin Li, Hong-Hui Sun. IEEE Transactions on Multimedia (5): 581-590 (2003). Web SearchBibTeXDownload
51A Motion Compensated Lifting Wavelet Codec for 3D Video Coding. Lin Luo, Jin Li, Shipeng Li, Zhenquan Zhuang. J. Comput. Sci. Technol. (18): 214-222 (2003). Web SearchBibTeXDownload
2002
50Embedded audio coding (EAC) with implicit auditory masking. Jin Li. ACM Multimedia 2002, 592-601. Web SearchBibTeXDownload
493-D wavelet compression and progressive inverse wavelet synthesis rendering of concentric mosaic. Lin Luo, Yunnan Wu, Jin Li, Ya-Qin Zhang. IEEE Transactions on Image Processing (11): 802-816 (2002). Web SearchBibTeXDownload
48Smart rebinning for the compression of concentric mosaic. Yunnan Wu, Cha Zhang, Jin Li. IEEE Transactions on Multimedia (4): 332-342 (2002). Web SearchBibTeXDownload
2001
47Compression of the Layered Depth Image. Jiangang Duan, Jin Li. Data Compression Conference 2001, 331-340. Web SearchBibTeXDownload
46Large-scale virtual screening for discovering leads in the postgenomic era. Bohdan Waszkowycz, Tim D. J. Perkins, Richard A. Sykes, Jin Li. IBM Systems Journal (40): 360-378 (2001). Web SearchBibTeXDownload
45Motion Compensated Lifting Wavelet And Its Application In Video Coding. Lin Luo, Jin Li, Shipeng Li, Zhenquan Zhuang, Ya-Qin Zhang. ICME 2001. Web SearchBibTeXDownload
44Scalable Audio Streaming over the Internet with Network-Aware Rate-Distortion Optimization. Jianping Zhou, Jin Li. ICME 2001. Web SearchBibTeXDownload
43Arbitrarily shaped video-object coding by wavelet. Guiwei Xing, Jin Li, Shipeng Li, Ya-Qin Zhang. IEEE Trans. Circuits Syst. Video Techn. (11): 1135-1139 (2001). Web SearchBibTeXDownload
42On the Compression of Image Based Rendering Scene: A Comparison among Block, Reference and Wavelet Coders. Jin Li, Heung-Yeung Shum, Ya-Qin Zhang. Int. J. Image Graphics (1): 45-61 (2001). Web SearchBibTeXDownload
41Interactive browsing of 3D environment over the Internet. Cha Zhang, Jin Li. VCIP 2001, 509-520. Web SearchBibTeX
2000
40Smart rebinning for compression of concentric mosaics. Yunnan Wu, Cha Zhang, Jin Li, Jizheng Xu. ACM Multimedia 2000, 201-209. Web SearchBibTeXDownload
39A virtual media (Vmedia) JPEG 2000 interactive image browser. Jin Li, Hong-Hui Sun. ACM Multimedia 2000, 501-502. Web SearchBibTeXDownload
38Compression of Lumigraph with Multiple Reference Frame (MRF) Prediction and Just-in-Time Rendering. Cha Zhang, Jin Li. Data Compression Conference 2000, 253-262. Web SearchBibTeXDownload
37An Efficient Color Re-Indexing Scheme for Palette-Based Compression. Wenjun Zeng, Jin Li, Shawmin Lei. ICIP 2000, 476-479. Web SearchBibTeXDownload
36On the Compression of Image Based Rendering Scene. Jin Li, Harry Shum, Ya-Qin Zhang. ICIP 2000, 21-24. Web SearchBibTeXDownload
35Combining Ordinal Financial Predictions with Genetic Programming. Edward P. K. Tsang, Jin Li. IDEAL 2000, 532-537. Web SearchBibTeXDownload
34OctMesh - Interactive Mesh Browsing over the Internet. Hongwu Wang, Jin Li. ITCC 2000, 104-105. Web SearchBibTeXDownload
33New Approach to Molecular Docking and Its Application to Virtual Screening of Chemical Databases. Carol A. Baxter, Christopher W. Murray, Bohdan Waszkowycz, Jin Li, Richard A. Sykes, Richard G. A. Bone, Tim D. J. Perkins, William Wylie. Journal of Chemical Information and Computer Sciences (40): 254-262 (2000). Web SearchBibTeXDownload
32Rendering of 3D-wavelet-compressed concentric mosaic scenery with progressive inverse wavelet synthesis (PIWS). Yunnan Wu, Lin Luo, Jin Li, Ya-Qin Zhang. VCIP 2000, 31-42. Web SearchBibTeX
31Compression and rendering of concentric mosaics with reference block codec (RBC). Cha Zhang, Jin Li. VCIP 2000, 43-55. Web SearchBibTeX
1999
30Improving Technical Analysis Predictions: An Application of Genetic Programming. Jin Li, Edward P. K. Tsang. FLAIRS Conference 1999, 108-112. Web SearchBibTeXDownload
29Image compression with a hybrid wavelet-fractal coder. Jin Li, C. C. Jay Kuo. IEEE Transactions on Image Processing (8): 868-874 (1999). Web SearchBibTeXDownload
28An embedded still image coder with rate-distortion optimization. Jin Li, Shawmin Lei. IEEE Transactions on Image Processing (8): 913-924 (1999). Web SearchBibTeXDownload
27Tree-Structured Linear Cellular Automata and Their Applications in BIST. Jin Li, Xiaoling Sun. J. Electronic Testing (15): 297-300 (1999). Web SearchBibTeXDownload
1998
26Adaptive Wavelet Transforms with Spatially Varying Filters for Scalable Image Coding. Wenjun Zeng, Jin Li, Shawmin Lei. ICIP (1) 1998, 112-116. Web SearchBibTeXDownload
25Arbitrary Shape Wavelet Transform with Phase Alignment. Jin Li, Shawmin Lei. ICIP (3) 1998, 683-687. Web SearchBibTeX
24The Optimal Effectiveness Metric for Parallel Application Analysis. Edward A. Luke, Ioana Banicescu, Jin Li. Inf. Process. Lett. (66): 223-229 (1998). Web SearchBibTeXDownload
23EDDIE Beats the Bookies. Edward P. K. Tsang, Jin Li, James M. Butler. Softw., Pract. Exper. (28): 1033-1043 (1998). Web SearchBibTeXDownload
1997
22A poly-algorithm for parallel dense matrix multiplication on two-dimensional process grid topologies. Jin Li, Anthony Skjellum, Robert D. Falgout. Concurrency - Practice and Experience (9): 345-389 (1997). Web SearchBibTeXDownload
21Coding Artifact Removal with Multiscale Postprocessing. Jin Li, C. C. Jay Kuo. ICIP (1) 1997, 45-48. Web SearchBibTeXDownload
20Progressive Compression of 3D Graphic Models. Jiankun Li, Jin Li, C. C. Jay Kuo. ICMCS 1997, 135-142. Web SearchBibTeX
19Rate control for an embedded wavelet video coder. Po-Yuen Cheng, Jin Li, C.-C. Jay Kuo. IEEE Trans. Circuits Syst. Video Techn. (7): 696-702 (1997). Web SearchBibTeXDownload
18Layered DCT still image compression. Jiankun Li, Jin Li, C.-C. Jay Kuo. IEEE Trans. Circuits Syst. Video Techn. (7): 440-443 (1997). Web SearchBibTeXDownload
17Embedded wavelet coder with multistage vector quantization. Kai-Chieh Liang, Jin Li, C.-C. Jay Kuo. Int. J. Imaging Systems and Technology (8): 444-449 (1997). Web SearchBibTeXDownload
16PRO_SELECT: Combining structure-based drug design and combinatorial chemistry for rapid lead discovery. 1. Technology. Christopher W. Murray, David E. Clark, Timothy R. Auton, Michael A. Firth, Jin Li, Richard A. Sykes, Bohdan Waszkowycz, David R. Westhead, Stephen C. Young. Journal of Computer-Aided Molecular Design (11): 193-207 (1997). Web SearchBibTeXDownload
15MPI/RT: Design and Implementation of a Real-Time Message Passing Interface. Zhenqian Cui, Arkady Kanevsky, Jin Li, Anthony Skjellum. PDPTA 1997, 334. Web SearchBibTeX
1996
14An output-shared buffer ATM switch. Jin Li. ICCD 1996, 147-148. Web SearchBibTeXDownload
13An embedded DCT approach to progressive image compression. Jiankun Li, Jin Li, C.-C. Jay Kuo. ICIP (1) 1996, 201-204. Web SearchBibTeXDownload
12Fractal wavelet coding using a rate-distortion constraint. Jin Li, C.-C. Jay Kuo. ICIP (2) 1996, 81-84. Web SearchBibTeXDownload
1995
11A modular growth architecture for an ATM switch. Jin Li, Chuan-lin Wu. ICCCN 1995, 420. Web SearchBibTeXDownload
10A novel architecture for an ATM switch. Jin Li, Chuan-lin Wu. ICCD 1995, 340-345. Web SearchBibTeXDownload
9Multiscale video compression using wavelet transform and motion compensation. Po-Yuen Cheng, Jin Li, C. C. Jay Kuo. ICIP 1995, 606-609. Web SearchBibTeXDownload
8Focus of attention (FOA) identification from compressed video for automatic target recognition (ATR). Jin Li, Sungook Kim, C.-C. Jay Kuo. ICIP (3) 1995, 508-511. Web SearchBibTeXDownload
7Design and implementation of a multicast-buffer ATM switch. Jin Li, Chuan-lin Wu. ICNP 1995, 84-91. Web SearchBibTeXDownload
6PRO_LIGAND: An approach to de novo molecular design. 1. Application to the design of organic molecules. David E. Clark, David Frenkel, Stephen A. Levy, Jin Li, Christopher W. Murray, Barry Robson, Bohdan Waszkowycz, David R. Westhead. Journal of Computer-Aided Molecular Design (9): 13-32 (1995). Web SearchBibTeXDownload
5PRO_LIGAND: An approach to de novo molecular design. 3. A genetic algorithm for structure refinement. David R. Westhead, David E. Clark, David Frenkel, Jin Li, Christopher W. Murray, Barry Robson, Bohdan Waszkowycz. Journal of Computer-Aided Molecular Design (9): 139-148 (1995). Web SearchBibTeXDownload
4PRO_LIGAND: An approach to de novo molecular design. 4. Application to the design of peptides. David Frenkel, David E. Clark, Jin Li, Christopher W. Murray, Barry Robson, Bohdan Waszkowycz, David R. Westhead. Journal of Computer-Aided Molecular Design (9): 213-225 (1995). Web SearchBibTeXDownload
1994
3The Evolution Of Machine-Tractable Dictionaries. Cheng-ming Guo, Changning Huang, Jun-ping Gong, Jin Li. COLING 1994, 1231-1234. Web SearchBibTeXDownload
2Novel algorithms for searching conformational space. D. Byrne, Jin Li, E. Platt, Barry Robson, Paul Weiner. Journal of Computer-Aided Molecular Design (8): 67-82 (1994). Web SearchBibTeXDownload
1990
1A study of parallel molecular dynamics algorithms for N-body simulations on a transputer system. Jin Li, Andy Brass, D. J. Ward, Barry Robson. Parallel Computing (14): 211-222 (1990). Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research