重要论文

  1. Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive Replication for Rare Objects in Unstructured Peer-to-Peer Networks. Journal of Network and Computer Applications, Elsevier, 2012, 35(1):85-96
  2. Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive Replication for Rare Objects in Unstructured Peer-to-Peer Networks. Journal of Network and Computer Applications, Elsevier, 2012, 35(1):85-96
  3. Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li. Type-2 Fuzzy Description Logic. Frontiers of Computer Science in China, Springer, 2011, 5(2): 205-215
  4. Bing Li, Buqing Cao, Kunmei Wen, Ruixuan Li. Trustworthy Assurance of Service Interoperation in Cloud Environment. International Journal of Automation and Computing, 2011, 8(3):297-308
  5. Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu. Inconsistency Resolving of Safety and Utility in Access Control. EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, 2011:101
  6. Jinwei Hu,Ruixuan Li,Zhengding Lu,Jianfeng Lu,Xiaopu Ma. RAR: A role-and-risk based flexible framework for secure collaboration. Future Generation Computer Systems, 2011, 27(5):574-586
  7. Xiaopu Ma,Ruixuan Li,Zhengding ,Jianfeng Lu,Meng Dong. Specifying and enforcing the principle of least privilege in role-based access control. Concurrency and Computation: Practice and Experience, John Wiley & Sons, Ltd, 2011, 23(12):1313-1331
  8. Xiaopu Ma,Ruixuan Li,zhengding Lu,Wei Wang. Mining Constraints in Role-Based Access Control. Mathematical and Computer Modelling, 2011
  9. Yanan Jin,Ruixuan Li,Kunmei Wen,Xiwu Gu,Fei Xiao. Topic-based ranking in Folksonomy via probabilistic model. Artificial Intelligence Review, 2011, 36(2):139-151
  10. Ruixuan Li, Wei Song, Haiying Shen, Weijun Xiao, Zhengding Lu. A Flabellate Overlay Network for Multi-attribute Search. Journal of Parallel and Distributed Computing, Elsevier, 2011, 71(3):407-423
  11. Ruixuan Li, Jianfeng Lu,Zhengding Lu,Xiaopu Ma.. Consistency Checking of Safety and Availability in Access Control. IEICE Transactions on Information and Systems, 2010, E93-D(3):491-502
  12. Ruixuan Li, Cuihua Zuo,Haiying Shen,Kunmei Wen,Xiwu Gu.. PercolationNET: a Multi-tree P2P Overlay Network Supporting High Coverage Search. International Journal of Parallel, Emergent and Distributed Systems, 2010, 25(1):73-89
  13. Zhang Maoyuan, Lu Zhengding, Zou Chunyan. A Chinese Word Segmentation Based on Language Situation in Processing Ambiguous Words. Information Sciences, Elsevier, 2004, 162 (3--4):275-285
  14. Ruixuan Li,Meng Dong,Bin Liu,Jianfeng Lu, Xiaopu Ma,kai Li. SecTag: A Multi-Policy Supported Secure Web Tag Framework. The 17th ACM Conference on Computer and Communications Security (CCS 2010) (Demo), Chicago, IL, USA, October 4-8, 2010, pp.633-635
  15. Jinwei , Yan Zhang,Ruixuan Li. Towards Automatic Update of Access Control Policy. The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12,2010, pp.59-74
  16. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. Managing Authorization Provenance: A Modal Logic based Approach. The 21st International Conference on Tools with Artificial Intelligence (ICTAI 2009), Newark, New Jersey, USA, November 2-5, 2009, pp.621 - 624
  17. Xiaopu Ma,Ruixuan Li,Zhengding Lu. Role Mining Based on Weights. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.65-74
  18. Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. Role Updating for Assignments. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.89-98
  19. Ding Liu, Ruixuan Li, Xiwu Gu, Kunmei Wen, Heng He, Guoqiang Gao. Fast Snippet Generation Based On CPU-GPU Hybrid System. The 17th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2011), Tainan, Taiwan, Dec 7-9, 2011, pp.252-259
  20. Yan'an Jin,Ruixuan Li,Zhengding Lu,Kunmei Wen,Xiwu Gu.. Topic-sensitive Tag Ranking. The 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, August 2010, pp.629-632
  21. Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. A Logic for Authorization Provenance. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010, pp.238-249