BibTeX records: Feng-Yu Liu

download as .bib file

@article{DBLP:journals/corr/abs-2103-01584,
  author       = {Feng{-}Yu Liu and
                  Chih{-}Chi Chen and
                  Shann{-}Ching Chen and
                  Chien{-}Hung Liao},
  title        = {A Practical Framework for {ROI} Detection in Medical Images - a case
                  study for hip detection in anteroposterior pelvic radiographs},
  journal      = {CoRR},
  volume       = {abs/2103.01584},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.01584},
  eprinttype    = {arXiv},
  eprint       = {2103.01584},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-01584.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XuLLL08,
  author       = {Jia Xu and
                  Zhi Li and
                  Qian{-}Mu Li and
                  Feng{-}Yu Liu},
  title        = {An adaptive clustering routing transition protocol in ad hoc networks},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {10},
  pages        = {1952--1960},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.12.036},
  doi          = {10.1016/J.COMCOM.2007.12.036},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/XuLLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/LiXL06,
  author       = {Qian{-}Mu Li and
                  Man{-}Wu Xu and
                  Feng{-}Yu Liu},
  title        = {A Grid Troubleshooting Method Based on Fuzzy Event},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2006, 5th International Conference,
                  Changsha, Hunan, China, 21-23 October 2006, Proceedings},
  pages        = {374--379},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/GCC.2006.8},
  doi          = {10.1109/GCC.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/LiXL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Qian-MuMHF06,
  author       = {Qian{-}Mu Li and
                  Man{-}Wu Xu and
                  Hong Zhang and
                  Feng{-}Yu Liu},
  editor       = {Irwin King and
                  Jun Wang and
                  Laiwan Chan and
                  DeLiang L. Wang},
  title        = {The Design of Data-Link Equipment Redundant Strategy},
  booktitle    = {Neural Information Processing, 13th International Conference, {ICONIP}
                  2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4234},
  pages        = {545--552},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11893295\_60},
  doi          = {10.1007/11893295\_60},
  timestamp    = {Mon, 19 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/Qian-MuMHF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhaoL05,
  author       = {Ze{-}Mao Zhao and
                  Feng{-}Yu Liu},
  title        = {Method of constructing elliptic curve authenticated encryption scheme},
  journal      = {Appl. Math. Comput.},
  volume       = {168},
  number       = {1},
  pages        = {146--151},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.08.017},
  doi          = {10.1016/J.AMC.2004.08.017},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhaoL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KunHF05,
  author       = {Kun Zhang and
                  Heng Wang and
                  Feng{-}Yu Liu},
  title        = {Distributed multicast routing for delay and delay variation-bounded
                  Steiner tree using simulated annealing},
  journal      = {Comput. Commun.},
  volume       = {28},
  number       = {11},
  pages        = {1356--1370},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comcom.2004.12.003},
  doi          = {10.1016/J.COMCOM.2004.12.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KunHF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhangWL05,
  author       = {Kun Zhang and
                  Heng Wang and
                  Feng{-}Yu Liu},
  title        = {An Efficient Algorithm Based on Simulated Annealing for Multicast
                  Routing with Delay and Delay Variation Constraints},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {261--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.96},
  doi          = {10.1109/AINA.2005.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ZhangWL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/YouXZL05,
  author       = {Jing You and
                  Jian Xu and
                  Xue{-}long Zhao and
                  Feng{-}Yu Liu},
  editor       = {Lipo Wang and
                  Ke Chen and
                  Yew{-}Soon Ong},
  title        = {Modeling and Cost Analysis of Nested Software Rejuvenation Policy},
  booktitle    = {Advances in Natural Computation, First International Conference, {ICNC}
                  2005, Changsha, China, August 27-29, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3612},
  pages        = {1280--1289},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539902\_163},
  doi          = {10.1007/11539902\_163},
  timestamp    = {Sun, 02 Jun 2019 21:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/YouXZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiQXL05,
  author       = {Qian{-}Mu Li and
                  Yong Qi and
                  Man{-}Wu Xu and
                  Feng{-}Yu Liu},
  editor       = {Yi Pan and
                  Daoxu Chen and
                  Minyi Guo and
                  Jiannong Cao and
                  Jack J. Dongarra},
  title        = {A New Method of Network Data Link Troubleshooting},
  booktitle    = {Parallel and Distributed Processing and Applications, Third International
                  Symposium, {ISPA} 2005, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3758},
  pages        = {890--900},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576235\_89},
  doi          = {10.1007/11576235\_89},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiQXL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/YouXZL05,
  author       = {Jing You and
                  Jian Xu and
                  Xue{-}long Zhao and
                  Feng{-}Yu Liu},
  title        = {Modeling and availability analysis of nested software rejuvenation
                  policy},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {34--38},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571118},
  doi          = {10.1109/ICSMC.2005.1571118},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/YouXZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/LiZXL05,
  author       = {Qian{-}Mu Li and
                  Xue{-}long Zhao and
                  Man{-}Wu Xu and
                  Feng{-}Yu Liu},
  title        = {Network congestion prediction based on {RFNN}},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {2212--2217},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571477},
  doi          = {10.1109/ICSMC.2005.1571477},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/LiZXL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/HaoZLL05,
  author       = {Xiao{-}Wei Hao and
                  Tao Zhang and
                  Lei Li and
                  Feng{-}Yu Liu},
  title        = {Optimized consistence maintenance strategy in semantic caching},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {3392--3397},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571671},
  doi          = {10.1109/ICSMC.2005.1571671},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/HaoZLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/YanXZL00,
  author       = {Han Yan and
                  Chun{-}Gen Xu and
                  Gong{-}Xuan Zhang and
                  Feng{-}Yu Liu},
  title        = {Constraint specification for object model of access control based
                  on role},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {25},
  number       = {2},
  pages        = {60--63},
  year         = {2000},
  url          = {https://doi.org/10.1145/346057.346074},
  doi          = {10.1145/346057.346074},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/YanXZL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics