default search action
B. Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Wei-Wen Cheng, B. Li:
Nonequilibrium effects on quantum temporal steering. Quantum Inf. Process. 22(8): 294 (2023) - 2022
- [c13]Jorge E. Caviedes, B. K. Patel, Robert S. Gutzwiller, B. Li, R. Bhat, S. Chhabra:
A Cognitive Perspective on Subjective and Objective Diagnostic Image Quality Models. ICIP 2022: 246-250
2010 – 2019
- 2019
- [j15]H. Zhou, T. C. Wu, A. M. Li, X. Q. Ji, S. H. Jing, X. X. Zhu, Z. T. Shen, B. Li:
Cyberknife Radiotherapy on Dose Distribution Of Targets: Effect of Different Treatment Paths On Medical Image Diagnostics. J. Medical Imaging Health Informatics 9(5): 973-979 (2019) - [c12]L. Zhang, Lei Huang, B. Zhao, B. Li:
Adaptive Sensing Matrix Design for Greedy Algorithms in Mmv Compressive Sensing. ICASSP 2019: 5571-5575 - 2018
- [c11]Xiaoliang Chen, B. Li, Mohammadsadegh Shamsabardeh, Roberto Proietti, Zuqing Zhu, S. J. Ben Yoo:
On Real-Time and Self-Taught Anomaly Detection in Optical Networks Using Hybrid Unsupervised/Supervised Learning. ECOC 2018: 1-3 - 2017
- [j14]B. Li, Jianfei Wu, J. Gao, Y. Kuang, Jiancheng Li, X. Zhao, K. Zhao, Z. Han, J. Luo:
The total ionizing dose response of a DSOI 4Kb SRAM. Microelectron. Reliab. 76-77: 714-718 (2017) - [c10]Lei Wang, Q. H. Wu, Wenhu Tang, B. Li, Z. X. Xu:
Energy balance analysis and control for boost converters. IECON 2017: 8194-8200 - 2016
- [j13]M. Zhou, Y. Pan, Z. Chen, B. Li:
Enterprise behaviour under Cap-and-Trade conditions: an experimental study with system dynamic models. J. Simulation 10(1): 12-23 (2016) - [c9]Q. N. Natsheh, B. Li, Alastair G. Gale:
Security of Multi-frame DICOM Images Using XOR Encryption Approach. MIUA 2016: 175-181 - 2014
- [j12]Zdzislaw Jackiewicz, H. Liu, B. Li, Y. Kuang:
Numerical simulations of traveling wave solutions in a drift paradox inspired diffusive delay population model. Math. Comput. Simul. 96: 95-103 (2014) - 2013
- [j11]Lin Yang, A-Xing Zhu, Feng Qi, Cheng-Zhi Qin, B. Li, T. Pei:
An integrative hierarchical stepwise sampling strategy for spatial sampling and its application in digital soil mapping. Int. J. Geogr. Inf. Sci. 27(1): 1-23 (2013) - [j10]H. Xuan, B. Li:
Scheduling dynamic hybrid flowshop with serial batching machines. J. Oper. Res. Soc. 64(6): 825-832 (2013) - [j9]B. Li, X. P. Zhang, Y. Yang, L. M. Yin, Michael G. Pecht:
Size and constraint effects on interfacial fracture behavior of microscale solder interconnects. Microelectron. Reliab. 53(1): 154-163 (2013) - [i2]Weibing Deng, Armen E. Allahverdyan, B. Li, Qiuping A. Wang:
Rank-frequency relation for Chinese characters. CoRR abs/1309.1536 (2013) - 2011
- [i1]X. Chen, M. Chen, B. Li, Y. Zhao, Y. Wu, J. Li:
Celerity: A Low-Delay Multi-Party Conferencing Solution. CoRR abs/1107.1138 (2011) - 2010
- [j8]M. H. Xu, J. L. Jiang, B. Li, B. Xu:
An improved prediction-correction method for monotone variational inequalities with separable operators. Comput. Math. Appl. 59(6): 2074-2086 (2010) - [j7]H. Yu, B. Li, X. Yang, Y. Hu:
Structural Synthesis and Variation Analysis of a Family of 6-DOF Parallel Mechanisms with Three Limbs. Int. J. Robotics Autom. 25(2) (2010) - [j6]Ulrich Derigs, B. Li, Ulrich Vogel:
Local search-based metaheuristics for the split delivery vehicle routing problem. J. Oper. Res. Soc. 61(9): 1356-1364 (2010)
2000 – 2009
- 2009
- [j5]B. Li, J. Zhao, X. Yang, Y. Hu:
Kinematic Analysis of a Novel Three Degree-of-Freedom Planar Parallel Manipulator. Int. J. Robotics Autom. 24(2) (2009) - [j4]F. Peng, Y. Zhou, B. Li:
Parameterized Modelling and Dynamic Analyzing for the Drive at Centre of Gravity (DCG) Feed Drives. Int. J. Robotics Autom. 24(3) (2009) - [c8]Huiliang Zhang, Zhiqi Shen, Xuehong Tao, Chunyan Miao, B. Li, Ailiya, Yundong Cai:
Emotional agent in serious game (DINO). AAMAS (2) 2009: 1385-1386 - 2008
- [c7]W. Zhang, B. Li, W. Zhou:
A LLE-based approach to sensor fault detection. IJCNN 2008: 2425-2429 - 2006
- [j3]Y. Rao, P. Li, X. Shao, B. Wu, B. Li:
A CORBA- and MAS-based architecture for agile collaborative manufacturing systems. Int. J. Comput. Integr. Manuf. 19(8): 815-832 (2006) - [j2]Fen Chen, J. Gill, Dave Harmon, T. Sullivan, A. Strong, B. Li, H. Rathore, Daniel C. Edelstein:
Determination of the thermal conductivity of composite low-k dielectrics for advanced interconnect structures. Microelectron. Reliab. 46(2-4): 232-243 (2006) - [c6]Gang Liu, M. J. Rajanik, X. Shan, W. Low, C. K. Lee, B. Li:
System architecture for C band mobile Satcom application. VTC Spring 2006: 2621-2624 - 2005
- [c5]W. Wang, B. Li:
Market-driven bandwidth allocation in selfish overlay networks. INFOCOM 2005: 2578-2589 - 2003
- [c4]J. Yang, J. Cheng, B. Li:
A Wavelet Based Watermarking Scheme for Information Security. WAA 2003: 233-238 - 2000
- [c3]Henry Selvaraj, B. Li:
A Parameter to Measure the Efficiency of FPGA Based Logic Synthesis Tools. EUROMICRO 2000: 1212-
1990 – 1999
- 1999
- [c2]Graham A. Jullien, Vassil S. Dimitrov, B. Li, William C. Miller, A. Lee, Majid Ahmadi:
A hybrid DBNS processor for DSP computation. ISCAS (1) 1999: 5-8 - 1998
- [j1]Roberto Horowitz, B. Li, J. W. McCormick:
Wiener-filter-based Minimum Variance Self-tuning Regulation. Autom. 34(5): 531-545 (1998) - 1995
- [c1]Dongming Zhao, Yubao Chen, B. Li, Changsheng Zhao, X. Wang, X. Zhang, J. Chen, C. Tu:
A 3-D robust range feature extraction tool for industrial automation applications. ICIP (3) 1995: 45-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint