Zhishu Li

According to our database1, Zhishu Li authored at least 35 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Energy Consumption Analysis on Gradient Sinking Model in Wireless Sensor Networks.
IEICE Trans. Commun., 2012

2011
A Self-organized Public-Key Certificate System in P2P network.
J. Networks, 2011

A Variant betweenness Centrality Approach towards Distributed Network Monitoring.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

A Novel Method for Origin-Destination Flow Computation Based on Distributed Network Monitoring.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2010
Threshold Secret Sharing Based Trust Security in Structured P2P Network.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

2009
Computing and Routing for Trust in Structured P2P Network.
J. Networks, 2009

Structured Topology for Trust in P2P Network.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Classifier-Guided Topical Crawler: A Novel Method of Automatically Labeling the Positive URLs.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

Merged Request: A New Design Pattern for Enhancing the Performance of Concurrent Access.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

An Evolving Neural Network for Authentic Emotion Classification.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
A Hopfield neural network approach for power optimization of real-time operating systems.
Neural Comput. Appl., 2008

Distributed and Parallelled EM Algorithm for Distributed Cluster Ensemble.
Proceedings of the PACIIA 2008, 2008

Distributed Latent Dirichlet allocation for objects-distributed cluster ensemble.
Proceedings of the 4th International Conference on Natural Language Processing and Knowledge Engineering, 2008

JSON Based Decentralized SSO Security Architecture in E-Commerce.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Study on Data Enriching Algorithm Based on Rough Set in E-commerce.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Design of Network Interface in Distributed Data Acquisition System for E-Commerce.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Dichotomy Method toward Interactive Testing-Based Fault Localization.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

2007
Self-adaptive Intrusion Detection System for Computational Grid.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Threats Analysis and Prevention for Grid and Web Service Security.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Software Fault Localization Based on Testing Requirement and Program Slice.
Proceedings of the International Conference on Networking, 2007

A Steepest Descent Evolution Immune Algorithm for Multimodal Function Optimization.
Proceedings of the Advances in Computation and Intelligence, 2007

FSCP: A Resource Space Model Based on Semantically Enabled P2P Grid.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Resource Search Model Based on Semantically Enabled P2P Grid.
Proceedings of the Future Generation Communication and Networking, 2007

Based on Forward Reference Object Transaction Identification Algorithm on Web Mining.
Proceedings of The Sixth International Conference on Advanced Language Processing and Web Information Technology, 2007

2006
Using Simulation to Improve the Flexibility of Adaptive Workflow Models Based on Temporal Logic.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Neurocomputing for Minimizing Energy Consumption of Real-Time Operating System in the System-on-a-Chip.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Flexible Process Control - A Neuro-Fuzzy Approach in Intelligent Workflow Model Based on Extended Petri Nets.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

2005
A QoS-Based Scheduling Mechanism for Overlay Aggregate Traffics.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

A Fuzzy Trust Model for Multi-agent System.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A Formal Model for Grid Service Deployment in Grid Service Mining Based on Installation Strategies.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A Model of Multi-Agent System Based on Immune Evolution.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Analysis of Real-Time Communication System with Queuing Priority.
Proceedings of the Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, 2005

2003
An Optimized Topology Control Algorithm for Mobile Ad Hoc Networks.
Proceedings of the Advances in Web-Age Information Management, 2003


  Loading...