default search action
Zhishu Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j4]Tao Liu, Zhishu Li:
Energy Consumption Analysis on Gradient Sinking Model in Wireless Sensor Networks. IEICE Trans. Commun. 95-B(2): 607-610 (2012) - 2011
- [j3]Zhen Luo, Zhishu Li, Biao Cai:
A Self-organized Public-Key Certificate System in P2P network. J. Networks 6(10): 1437-1443 (2011) - [c31]Peng Ou, Zhishu Li, Xun Lin:
A Novel Method for Origin-Destination Flow Computation Based on Distributed Network Monitoring. ICFCE 2011: 529-536 - [c30]Peng Ou, Zhishu Li:
A Variant betweenness Centrality Approach towards Distributed Network Monitoring. PAAP 2011: 340-344 - 2010
- [c29]Cai Biao, Zhishu Li, Zhen Luo:
Threshold Secret Sharing Based Trust Security in Structured P2P Network. IITSI 2010: 320-323
2000 – 2009
- 2009
- [j2]Cai Biao, Zhishu Li:
Computing and Routing for Trust in Structured P2P Network. J. Networks 4(7): 667-674 (2009) - [c28]Yafei Sun, Zhishu Li, Changjie Tang, Wangping Zhou, Rong Jiang:
An Evolving Neural Network for Authentic Emotion Classification. ICNC (2) 2009: 109-113 - [c27]Lei Zhang, Zhishu Li, Bing Guo, Yang Cheng, Hongjun Wang:
Merged Request: A New Design Pattern for Enhancing the Performance of Concurrent Access. ScalCom-EmbeddedCom 2009: 69-74 - [c26]Li Chen, Zhishu Li, Zhonghua Yu, Guo-hui Han:
Classifier-Guided Topical Crawler: A Novel Method of Automatically Labeling the Positive URLs. SKG 2009: 270-273 - [c25]Cai Biao, Zhishu Li, Fu Die, Cheng Liangyin, Luo Sida:
Structured Topology for Trust in P2P Network. WKDD 2009: 652-655 - 2008
- [j1]Bing Guo, Dianhui Wang, Yan Shen, Zhishu Li:
A Hopfield neural network approach for power optimization of real-time operating systems. Neural Comput. Appl. 17(1): 11-17 (2008) - [c24]Jirong Sun, Zhishu Li, Jiancheng Ni:
Dichotomy Method toward Interactive Testing-Based Fault Localization. ADMA 2008: 182-193 - [c23]Yang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou:
Design of Network Interface in Distributed Data Acquisition System for E-Commerce. ISECS 2008: 133-136 - [c22]Yang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou:
Study on Data Enriching Algorithm Based on Rough Set in E-commerce. ISECS 2008: 199-202 - [c21]Jun Ye, Zhishu Li, Yanyan Ma:
JSON Based Decentralized SSO Security Architecture in E-Commerce. ISECS 2008: 471-475 - [c20]Hongjun Wang, Zhishu Li, Yang Cheng:
Distributed Latent Dirichlet allocation for objects-distributed cluster ensemble. NLPKE 2008: 1-7 - [c19]Hongjun Wang, Zhishu Li, Yang Cheng:
Distributed and Parallelled EM Algorithm for Distributed Cluster Ensemble. PACIIA (2) 2008: 3-8 - 2007
- [c18]Li Chen, Zhishu Li, Shenggen Ju:
Based on Forward Reference Object Transaction Identification Algorithm on Web Mining. ALPIT 2007: 469-473 - [c17]Jun Ye, Zhishu Li, Qing Li:
A Resource Search Model Based on Semantically Enabled P2P Grid. FGCN (2) 2007: 297-302 - [c16]Qing Li, Zhishu Li, Gang Liang, Jingyu Zhang, Liangyin Chen, Baolin Li:
IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification. FSKD (2) 2007: 160-165 - [c15]Jun Ye, Zhishu Li, Feng Yin, Jiancheng Ni, Qing Li:
FSCP: A Resource Space Model Based on Semantically Enabled P2P Grid. IMECS 2007: 1008-1013 - [c14]Li Zhu, Zhishu Li, Bin Sun:
A Steepest Descent Evolution Immune Algorithm for Multimodal Function Optimization. ISICA 2007: 401-410 - [c13]Jirong Sun, Zhishu Li, Jiancheng Ni, Feng Yin:
Software Fault Localization Based on Testing Requirement and Program Slice. IEEE NAS 2007: 168-176 - [c12]Jiancheng Ni, Zhishu Li, Zhonghe Gao, Jirong Sun:
Threats Analysis and Prevention for Grid and Web Service Security. SNPD (3) 2007: 526-531 - [c11]Jiancheng Ni, Zhishu Li, Jirong Sun, Jianchuan Xing:
Self-adaptive Intrusion Detection System for Computational Grid. TASE 2007: 97-106 - 2006
- [c10]Jianchuan Xing, Zhishu Li, Jingyu Zhang:
Flexible Process Control - A Neuro-Fuzzy Approach in Intelligent Workflow Model Based on Extended Petri Nets. CIMCA/IAWTIC 2006: 5 - [c9]Bing Guo, Yan Shen, Yue Huang, Zhishu Li:
A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC. EUC Workshops 2006: 888-897 - [c8]Bing Guo, Dianhui Wang, Yan Shen, Zhishu Li:
Neurocomputing for Minimizing Energy Consumption of Real-Time Operating System in the System-on-a-Chip. ICONIP (3) 2006: 1189-1198 - [c7]Jianchuan Xing, Zhishu Li, Liangyin Chen:
Using Simulation to Improve the Flexibility of Adaptive Workflow Models Based on Temporal Logic. SEAL 2006: 625-631 - 2005
- [c6]Yunbo Wu, Zhishu Li, Yunhai Wu, Zhihua Chen, Tun Lu, Li Wang, Jianjun Hu:
Analysis of Real-Time Communication System with Queuing Priority. Asia-Pacific Computer Systems Architecture Conference 2005: 707-713 - [c5]Guangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi:
A Model of Multi-Agent System Based on Immune Evolution. AINA 2005: 53-58 - [c4]Tun Lu, Zhishu Li, Chunlin Xu, Xuemei Huang:
A Formal Model for Grid Service Deployment in Grid Service Mining Based on Installation Strategies. GCC 2005: 90-95 - [c3]Guangzhu Chen, Zhishu Li, Zhihong Cheng, Zijiang Zhao, Haifeng Yan:
A Fuzzy Trust Model for Multi-agent System. ICNC (3) 2005: 444-448 - [c2]Yunbo Wu, Zhishu Li, Zhihua Chen, Yunhai Wu, Li Wang, Tun Lu:
A QoS-Based Scheduling Mechanism for Overlay Aggregate Traffics. NPC 2005: 449-452 - 2003
- [c1]Daohua Yuan, Zhishu Li:
An Optimized Topology Control Algorithm for Mobile Ad Hoc Networks. WAIM 2003: 360-368
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint