default search action
Chengzhi Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Miaomiao Chen, Weizhi Zhang, Yujie Gou, Danyang Xu, Yuxiang Wei, Dan Liu, Cheng Han, Xinhe Huang, Chengzhi Li, Wanshan Ning
, Di Peng
, Yu Xue
:
GPS 6.0: an updated server for prediction of kinase-specific phosphorylation sites in proteins. Nucleic Acids Res. 51(W1): 243-250 (2023) - 2021
- [c28]Jianfeng Shi, Chengzhi Li, Heng Wu, Heran Gao, Songchang Jin, Tao Huang, Wenbo Zhang:
Evaluating the Parallel Execution Schemes of Smart Contract Transactions in Different Blockchains: An Empirical Study. ICA3PP (3) 2021: 35-51 - 2020
- [j20]Jinming Yang, Chengzhi Li
, Lanhai Li
, Jianli Ding, Run Zhang, Tao Han, Yang Liu:
Automatic Detection of Regional Snow Avalanches with Scattering and Interference of C-band SAR Data. Remote. Sens. 12(17): 2781 (2020)
2010 – 2019
- 2019
- [j19]Chengzhi Li
, Xingyi Liu
, Huimin You
, Hong Zhang
, Yuqi Liu
, Yan Zhang
:
Perfusion imaging with 320-slice spiral computed tomography and color-coded digital subtraction angiography for assessing acute skeletal muscle ischemia-reperfusion injury in a rabbit model. BMC Medical Imaging 19(1): 75:1-75:8 (2019) - 2018
- [j18]Fengjun Xiao, Mingming Lu
, Ying Zhao, Soumia Menasria, Dan Meng, Shangsheng Xie, Juncai Li, Chengzhi Li:
An information-aware visualization for privacy-preserving accelerometer data sharing. Hum. centric Comput. Inf. Sci. 8: 13 (2018) - 2016
- [c27]Yang Liu, Chengzhi Li, Changchuan Yin, Huaiyu Dai:
Connectivity for overlaid wireless networks with outage constraints. ICASSP 2016: 3771-3775 - 2015
- [j17]Chengzhi Li, Huaiyu Dai:
Single-Hop Transport Throughput of Secondary Networks in Spectrum Sharing Systems. IEEE Trans. Mob. Comput. 14(8): 1726-1736 (2015) - [c26]Yang Liu, Chengzhi Li, Changchuan Yin, Huaiyu Dai:
A unified framework for wireless connectivity study subject to general interference attack. ICC 2015: 7174-7179 - 2014
- [j16]Chengzhi Li, Huaiyu Dai:
Throughput Scaling of Primary and Secondary Ad Hoc Networks With Same-Order Dimensions. IEEE Trans. Veh. Technol. 63(8): 3957-3966 (2014) - 2013
- [j15]Chengzhi Li, Huaiyu Dai:
Efficient In-Network Computing with Noisy Wireless Channels. IEEE Trans. Mob. Comput. 12(11): 2167-2177 (2013) - [c25]Chengzhi Li, Huaiyu Dai:
Connectivity of multi-channel wireless networks under jamming attacks. GLOBECOM 2013: 706-711 - 2012
- [j14]Chengzhi Li, Huaiyu Dai, Liang Xiao
, Peng Ning:
Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. IEEE Trans. Signal Process. 60(10): 5281-5292 (2012) - 2011
- [c24]Chengzhi Li, Huaiyu Dai:
Transmission Throughput of Decentralized Overlaid Networks with Outage Constraints. ICC 2011: 1-5 - [c23]Chengzhi Li, Huaiyu Dai:
On the throughput scaling of Cognitive Radio ad hoc networks. INFOCOM 2011: 241-245 - [c22]Chengzhi Li, Huaiyu Dai:
Transport throughput of secondary networks in spectrum sharing systems. INFOCOM 2011: 2732-2740 - 2010
- [j13]Rong Zheng, Chengzhi Li:
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels. Ad Hoc Sens. Wirel. Networks 10(1): 5-26 (2010) - [j12]Maoan Han, Jibin Li, Chengzhi Li:
Limit cycles of planar polynomial vector fields. Scholarpedia 5(8): 9648 (2010) - [j11]Chengzhi Li, Wei Zhao
:
Stochastic performance analysis of non-feedforward networks. Telecommun. Syst. 43(3-4): 237-252 (2010) - [j10]Husheng Li, Huaiyu Dai, Chengzhi Li:
Collaborative Quickest Spectrum Sensing via Random Broadcast in Cognitive Radio Systems. IEEE Trans. Wirel. Commun. 9(7): 2338-2348 (2010) - [c21]Chengzhi Li, Huaiyu Dai:
Towards Efficient Designs for In-network Computing with Noisy Wireless Channels. INFOCOM 2010: 2008-2015 - [c20]Chengzhi Li, Huaiyu Dai:
Transport capacity and connectivity of Cognitive Radio networks with outage constraint. ISIT 2010: 1743-1747
2000 – 2009
- 2009
- [c19]Husheng Li, Huaiyu Dai, Chengzhi Li:
Collaborative Quickest Spectrum Sensing via Random Broadcast in Cognitive Radio Systems. GLOBECOM 2009: 1-6 - [c18]Chengzhi Li, Huaiyu Dai, Husheng Li:
Adaptive quickest change detection with unknown parameter. ICASSP 2009: 3241-3244 - 2008
- [c17]Chengzhi Li, Huaiyu Dai, Husheng Li:
Finding the K largest metrics in a noisy broadcast network. Allerton 2008: 1184-1190 - [c16]Husheng Li, Chengzhi Li, Huaiyu Dai:
Quickest spectrum sensing in cognitive radio. CISS 2008: 203-208 - [c15]Husheng Li, Chengzhi Li, Huaiyu Dai:
Collaborative quickest detection in adhoc networks with delay constraint - part I: Two-node network. CISS 2008: 594-599 - [c14]Chengzhi Li, Husheng Li, Huaiyu Dai:
Collaborative quickest detection in adhoc networks with delay constraint -part II: Multi-node network. CISS 2008: 600-605 - [c13]Rong Zheng, Chengzhi Li:
How good is opportunistic routing?: a reality check under Rayleigh fading channels. MSWiM 2008: 260-267 - 2007
- [j9]Chengzhi Li, Almut Burchard, Jörg Liebeherr:
A network calculus with effective bandwidth. IEEE/ACM Trans. Netw. 15(6): 1442-1453 (2007) - [j8]Chengzhi Li, Hao Che, San-qi Li:
A wireless channel capacity model for quality of service. IEEE Trans. Wirel. Commun. 6(1): 356-366 (2007) - [j7]Chengzhi Li, Hao Che, San-qi Li:
Fade Statistics of Wireless Multi-User Systems. IEEE Trans. Wirel. Commun. 6(7): 2390-2395 (2007) - [c12]Lu Liu, Rui Miao, Chengzhi Li:
The Impacts of Enterprise Resource Planning Systems on Firm Performance: An Empirical Analysis of Chinese Chemical Firms. CONFENIS (1) 2007: 579-587 - 2006
- [j6]Chengzhi Li, Zhihua Ren, Jiazhong Yang:
Moduli-Free Normal Forms and Linearization of Vector Fields. Int. J. Bifurc. Chaos 16(12): 3759-3764 (2006) - [c11]Huirong Fu, Satoshi Kawamura, Chengzhi Li:
Blom-based Q-composite: A Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks. IROS 2006: 2022-2028 - [c10]Chengzhi Li, Hao Che, San-qi Li, Dapeng Wu
:
A New Wireless Channel Fade Duration Model for Exploiting Multi-User Diversity Gain and Its Applications. WOWMOM 2006: 377-383 - 2005
- [j5]Chengzhi Li, Edward W. Knightly:
Schedulability criterion and performance analysis of coordinated schedulers. IEEE/ACM Trans. Netw. 13(2): 276-287 (2005) - 2004
- [c9]Weisheng Si, Chengzhi Li:
RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks. ICPP 2004: 494-501 - 2003
- [j4]Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication. Real Time Syst. 24(2): 171-202 (2003) - 2002
- [j3]Chengzhi Li, Edward W. Knightly:
Coordinated multihop scheduling: a framework for end-to-end services. IEEE/ACM Trans. Netw. 10(6): 776-789 (2002) - [j2]Vikram Kanodia, Chengzhi Li, Ashutosh Sabharwal, Bahareh Sadeghi, Edward W. Knightly:
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks. Wirel. Networks 8(5): 455-466 (2002) - 2001
- [c8]Vikram Kanodia, Chengzhi Li, Ashutosh Sabharwal, Bahareh Sadeghi, Edward W. Knightly:
Distributed multi-hop scheduling and medium access with delay and throughput constraints. MobiCom 2001: 200-209 - 2000
- [c7]Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
:
Scalable QoS Guaranteed Communication Services for Real-Time Applications. ICDCS 2000: 180-187 - [c6]Chengzhi Li, Edward W. Knightly:
Coordinated Network Scheduling: A Framework for End-to-End Services. ICNP 2000: 69-82 - [c5]Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
:
Utilization-Based Admission Control for Real-Time Applications. ICPP 2000: 251-262
1990 – 1999
- 1999
- [j1]Joseph Kee-Yin Ng, Shibin Song, Chengzhi Li, Wei Zhao
:
A new method for integrated end-to-end delay analysis in ATM networks. J. Commun. Networks 1(3): 189-200 (1999) - [c4]Chengzhi Li, Riccardo Bettati, Wei Zhao
:
New Delay Analysis in High Speed Networks. ICPP 1999: 454-461 - 1998
- [c3]Chengzhi Li, Riccardo Bettati, Wei Zhao
:
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. ICPP 1998: 432-440 - 1997
- [c2]Chengzhi Li, Amitava Raha, Wei Zhao
:
Stability in ATM Networks. INFOCOM 1997: 160-167 - [c1]Chengzhi Li, Riccardo Bettati, Wei Zhao
:
Static priority scheduling for ATM networks. RTSS 1997: 264-273
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 18:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint