重要论文
- Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive Replication for Rare Objects in Uns.... Journal of Network and Computer Applications, Elsevier, 2012, 35(1):85-96
- Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive Replication for Rare Objects in Uns.... Journal of Network and Computer Applications, Elsevier, 2012, 35(1):85-96
- Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li. Type-2 Fuzzy Description Logic. Frontiers of Computer Science in China, Springer, 2011, 5(2): 205-215
- Bing Li, Buqing Cao, Kunmei Wen, Ruixuan Li. Trustworthy Assurance of Service Interoperati.... International Journal of Automation and Computing, 2011, 8(3):297-308
- Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu. Inconsistency Resolving of Safety and Utility.... EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, 2011:101
- Jinwei Hu,Ruixuan Li,Zhengding Lu,Jianfeng Lu,Xiaopu Ma. RAR: A role-and-risk based flexible framework.... Future Generation Computer Systems, 2011, 27(5):574-586
- Xiaopu Ma,Ruixuan Li,Zhengding ,Jianfeng Lu,Meng Dong. Specifying and enforcing the principle of lea.... Concurrency and Computation: Practice and Experience, John Wiley & Sons, Ltd, 2011, 23(12):1313-1331
- Xiaopu Ma,Ruixuan Li,zhengding Lu,Wei Wang. Mining Constraints in Role-Based Access Contr.... Mathematical and Computer Modelling, 2011
- Yanan Jin,Ruixuan Li,Kunmei Wen,Xiwu Gu,Fei Xiao. Topic-based ranking in Folksonomy via probabi.... Artificial Intelligence Review, 2011, 36(2):139-151
- Ruixuan Li, Wei Song, Haiying Shen, Weijun Xiao, Zhengding Lu. A Flabellate Overlay Network for Multi-attrib.... Journal of Parallel and Distributed Computing, Elsevier, 2011, 71(3):407-423
- Ruixuan Li, Jianfeng Lu,Zhengding Lu,Xiaopu Ma.. Consistency Checking of Safety and Availabili.... Journal of Parallel and Distributed Computing, Elsevier, 2011, 71(3):407-423
- Ruixuan Li, Cuihua Zuo,Haiying Shen,Kunmei Wen,Xiwu Gu.. PercolationNET: a Multi-tree P2P Overlay Netw.... International Journal of Parallel, Emergent and Distributed Systems, 2010, 25(1):73-89
- Zhang Maoyuan, Lu Zhengding, Zou Chunyan. A Chinese Word Segmentation Based on Language.... Information Sciences, Elsevier, 2004, 162 (3--4):275-285
- Ruixuan Li,Meng Dong,Bin Liu,Jianfeng Lu, Xiaopu Ma,kai Li. SecTag: A Multi-Policy Supported Secure Web T.... The 17th ACM Conference on Computer and Communications Security (CCS 2010) (Demo), Chicago, IL, USA, October 4-8, 2010, pp.633-635
- Jinwei , Yan Zhang,Ruixuan Li. Towards Automatic Update of Access Control Po.... The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12,2010, pp.59-74
- Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. Managing Authorization Provenance: A Modal Lo.... The 21st International Conference on Tools with Artificial Intelligence (ICTAI 2009), Newark, New Jersey, USA, November 2-5, 2009, pp.621 - 624
- Xiaopu Ma,Ruixuan Li,Zhengding Lu. Role Mining Based on Weights. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.65-74
- Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. Role Updating for Assignments. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.89-98
- Ding Liu, Ruixuan Li, Xiwu Gu, Kunmei Wen, Heng He, Guoqiang Gao. Fast Snippet Generation Based On CPU-GPU Hybr.... The 17th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2011), Tainan, Taiwan, Dec 7-9, 2011, pp.252-259
- Yan. Topic-sensitive Tag Ranking. The 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, August 2010, pp.629-632
- Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. A Logic for Authorization Provenance. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010, pp.238-249
|