Jianxin Li
Jianxin Li
School of Computer Science & Engineering, Beihang University
Verifierad e-postadress på act.buaa.edu.cn - Startsida
Citeras av
Citeras av
Enacloud: An energy-saving application live placement approach for cloud computing environments
B Li, J Li, J Huai, T Wo, Q Li, L Zhong
2009 IEEE International Conference on Cloud Computing, 17-24, 2009
CyberGuarder: A virtualization security assurance architecture for green cloud computing
J Li, B Li, T Wo, C Hu, J Huai, L Liu, KP Lam
Future Generation Computer Systems 28 (2), 379-390, 2012
Large-scale hierarchical text classification with recursively regularized deep graph-cnn
H Peng, J Li, Y He, Y Liu, M Bao, L Wang, Y Song, Q Yang
Proceedings of the 2018 World Wide Web Conference, 1063-1072, 2018
Improvements of Juang's password-authenticated key agreement scheme using smart cards
DZ Sun, JP Huai, JZ Sun, JX Li, JW Zhang, ZY Feng
IEEE Transactions on Industrial Electronics 56 (6), 2284-2291, 2009
Resilient virtual network service provision in network virtualization environments
Y Chen, J Li, T Wo, C Hu, W Liu
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
An efficient resource management system for on-line virtual cluster provision
Y Chen, T Wo, J Li
2009 IEEE International Conference on Cloud Computing, 72-79, 2009
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
DZ Sun, JX Li, ZY Feng, ZF Cao, GQ Xu
Personal and Ubiquitous Computing 17 (5), 895-905, 2013
HyperMIP: Hypervisor controlled mobile ip for virtual machine live migration across networks
Q Li, J Huai, J Li, T Wo, M Wen
2008 11th IEEE High Assurance Systems Engineering Symposium, 80-88, 2008
Research on automated trust negotiation.
JX Li, JP Huai, XX Li
Ruan Jian Xue Bao(Journal of Software) 17 (1), 124-133, 2006
Cloudvo: Building a secure virtual organization for multiple clouds collaboration
J Li, B Li, Z Du, L Meng
2010 11th ACIS International Conference on Software Engineering, Artificial …, 2010
CyberLiveApp: A secure sharing and migration approach for live virtual desktop applications in a cloud environment
J Li, Y Jia, L Liu, T Wo
Future Generation Computer Systems 29 (1), 330-340, 2013
Road traffic speed prediction: a probabilistic model fusing multi-source data
L Lin, J Li, F Chen, J Ye, J Huai
IEEE Transactions on Knowledge and Data Engineering 30 (7), 1310-1323, 2017
Incrementally Learning the Hierarchical Softmax Function for Neural Language Models.
H Peng, J Li, Y Song, Y Liu
AAAI, 3267-3273, 2017
Online bursty event detection from microblog
J Li, Z Tai, R Zhang, W Yu, L Liu
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
VMScatter: Migrate virtual machines to many hosts
L Cui, J Li, B Li, J Huai, C Hu, T Wo, H Al-Aqrabi, L Liu
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
DZ Sun, JP Huai, JZ Sun, JX Li
Computer Communications 32 (6), 1015-1017, 2009
A secure collaboration service for dynamic virtual organizations
J Li, J Huai, C Hu, Y Zhu
Information Sciences 180 (17), 3086-3107, 2010
Sentiment analysis and spam detection in short informal text using learning classifier systems
MH Arif, J Li, M Iqbal, K Liu
Soft Computing 22 (21), 7281-7291, 2018
Adaptive service discovery on service-oriented and spontaneous sensor systems
L Liu, J Xu, N Antonopoulos, J Li, K Wu
Old City Publishing, 2012
Bursty event detection from microblog: a distributed and incremental approach
J Li, J Wen, Z Tai, R Zhang, W Yu
Concurrency and Computation: Practice and Experience 28 (11), 3115-3130, 2016
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20