-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathpub.html
More file actions
204 lines (204 loc) · 32.2 KB
/
pub.html
File metadata and controls
204 lines (204 loc) · 32.2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
<!DOCTYPE html>
<html>
<head>
<title></title>
</head>
<body>
<div class="Section1">
<div>
<h4>
<span style="font-size:13.5pt;">Publication List</span>
</h4>
<div>
<h5>
<span style="font-size:13.5pt;">Book Chapter </span>
</h5>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>1.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, H.Jonathon Chao and Bin Liu, “Basics of Packet Switching” &“Shared-Memory Switches” & “Input-Buffered Switches”, <i>High Performance Switches and Routers</i>, ISBN-13: 978-0-470-05367-6; ISBN-10: 0-470-05367-4, John Wiley & Sons, Inc., USA, 2007. </span>
</p>
</div>
<div>
<h5>
<span style="font-size:13.5pt;">Journal</span><span style="font-size:13.5pt;">/</span><span style="font-size:13.5pt;">Conference </span><span style="font-size:13.5pt;">Regular </span><span style="font-size:13.5pt;">Papers </span>
</h5>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;font-family:SimSun;"><span>1.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Chen Wang, Zhen Wen, Huamin Qu, Chuang Lin and Qi Liao, “1.5D Egocentric Dynamic Network Visualization”, <i>IEEE Transactions on Visualization and Computer Graphics</i>, 21(5): 624-637, 2015.[<a href=" http://vis.ios.ac.cn/paper/TVCG_2014.pdf">pdf</a>]</span><span style="font-size:13.5pt;font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;font-family:SimSun;"><span>2.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Hanghang Tong, Jie Tang and Chuang Lin,“Flow-based Influence Graph Visual Summarization”, in <i>IEEE International Conference on Data Mining (ICDM)</i>, 2014.[<a href=" http://vis.ios.ac.cn/paper/ICDM_2014.pdf">pdf</a>]</span><span style="font-size:13.5pt;font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;font-family:SimSun;"><span>3.<span> </span></span></span><span style="font-size:13.5pt;">Yifan Hu and <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, “A Coloring Algorithm for Disambiguating Graph and Map Drawings”, in<i> International Symposium on Graph Drawing (GD)</i>, 2014. [<a href=" http://vis.ios.ac.cn/paper/GD_2014.pdf">pdf</a>]</span><span style="font-size:13.5pt;font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;font-family:SimSun;"><span>4.<span> </span></span></span><span style="font-size:13.5pt;">Weishan Dong, Renjie Yao, Chunyang Ma, Changsheng Li, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Lu Wang, Yu Wang, Peng Gao, Junchi Yan, “Maximizing Multi-scale Spatial Statistical Discrepancy”, in <i>ACM CIKM</i>, 2014. [<a href="http://vis.ios.ac.cn/paper/CIKM_2014.pdf">pdf</a>]</span><span style="font-size:13.5pt;font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;font-family:SimSun;"><span>1.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Qi Liao, Hanghang Tong, Yifan Hu, Yue Zhao and Chuang Lin, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Hierarchical Focus+Context Heterogeneous Network
Visualization</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, in <i>IEEE
Pacific Visualization Symposium</i>, 2014. [<a href="http://vis.ios.ac.cn/paper/OnionGraph_2014.pdf">pdf</a>]</span><span style="font-size:13.5pt;font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>2.<span> </span></span></span><span style="font-size:13.5pt;">Tao Zhang, Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Weishan Dong. “Analyze Spatiotemporal Anomalies through Interactive Visualization”, accepted by <i>Informatics, special issue on Interactive Visualizations: Design, Technologies, and Applications</i>, 2014.</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>3.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Qi Liao, Xiaohua Sun, Yarui Chen and Chuang Lin, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Scalable Network Traffic Visualization Using Compressed Graphs</span><span style="font-family:SimSun;">”</span><span>, </span><i><span style="font-size:13.5pt;">IEEE International Conference on Big Data</span></i><span style="font-size:13.5pt;">, 2013.[<a href="http://vis.ios.ac.cn/paper/BigData_2013.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>4.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, </span><span style="font-size:13.5pt;">Qi Liao and Chuang Lin, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Survey on Transformation-based Large Graph Visualization</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">(in Chinese),</span><i><span style="font-size:13.5pt;"> Journal of Computer-Aided Design & Computer Graphics</span></i><span style="font-size:13.5pt;">, 25(3):304-311, 2013. [<a href="http://vis.ios.ac.cn/paper/JCADCG_2013.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>5.<span> </span></span></span><span style="font-size:13.5pt;">Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Chen Wang, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Visual Analysis of Large-Scale Network Anomalies</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">,<i> IBM Journal of Research and Development</i>, 57(3/4): 13:1-13:12, 2013. (Corresponding Author) [<a href="http://vis.ios.ac.cn/paper/IBMJRD_2013.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>6.<span> </span></span></span><span style="font-size:13.5pt;">Qinying Liao and <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">She Gets a Sports Car from Our Donation: Rumor Transmission in a Chinese Microblogging Community</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>ACM CSCW 2013.</i> (Corresponding Author)<i> </i>[<a href="http://vis.ios.ac.cn/paper/Weibo_CSCW.pdf">pdf</a>] [<a href="http://crowdresearch.org/blog/?p=3842">blog</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>7.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Qi Liao and Chunxin Yang, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Investigating Network Traffic Through Compressed Graph Visualization</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE VAST Challenge 2012 Award Entry</i>, 2012. [<a href="http://vis.ios.ac.cn/paper/VAST_Challenge_2012.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/VAST2012-MC2-Lei.wmv">video</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>8.<span> </span></span></span><span style="font-size:13.5pt;">Weishan Dong, Wei Fan, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Changjin Zhou and Xifeng Yan, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">A General Framework to Encode Heterogeneous Information Sources for Contextual Pattern Mining</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>ACM CIKM 2012</i>. [<a href="http://vis.ios.ac.cn/paper/CPM_CIKM.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>9.<span> </span></span></span><span style="font-size:13.5pt;">Ching-yung Lin, Hanghang Tong, Zhen Wen, Lynn Wu, Vicky Griffiths-Fisher, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, and David Lubensky, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Social Network Analytics in Enterprise,</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;"> <i><span>Proceedings of the IEEE</span></i><span>, 100(9):2759-2776, 2012. [<a href="http://vis.ios.ac.cn/paper/Smallblue_PIEEE.pdf">pdf</a>]</span></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>10.</span></span><span style="font-size:13.5pt;">Dongxu Duan, Weihong Qian, Shimei Pan, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Chuang Lin, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">VISA: VIsual Sentiment Analysis System,</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;"> <i><span>VINCI 2012. </span></i><span>(Corresponding Author) [<a href="http://vis.ios.ac.cn/paper/VISA_VINCI.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/talk/VISA_VINCI.ppt">ppt</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/VISA_VINCI.swf">video</a>]</span></span><span style="font-size:13.5pt;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-family:SimSun;"><span>11.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Qi Liao, Yuan He, Rui Li, Aaron Striegel and Zhong Su, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">SAVE: Sensor Anomaly Visualization Engine</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Conference on Visual Analytics Science and Technology (VAST)</i>, October 2011. [<a href="http://vis.ios.ac.cn/paper/SAVE_VAST.pdf">pdf</a>][<a href="http://lcs.ios.ac.cn/%7Eshil/talk/SAVE_VAST.ppt">ppt</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/SAVE_VAST.wmv">video</a>] </span><span style="font-family:SimSun;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>12.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Furu Wei, Shixia Liu, Li Tan, Xiaoxiao Lian and Michelle Zhou, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Understanding Text Corpora with Multiple Facets</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Conference on Visual Analytics Science and Technology (VAST)</i>, October 2010. [<a href="http://vis.ios.ac.cn/paper/TIARA_VAST.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/talk/TIARA_VAST.ppt">ppt</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/TIARA_VAST.wmv">video</a>] </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>13.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Weihong Qian and Furu Wei, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">VisWorks Network and Text Visual Analytics</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE VAST Challenge 2010 Award Entry</i>, October 2010. [<a href="http://vis.ios.ac.cn/paper/VisWorks_VAST.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/talk/VisWorks_VAST.ppt">ppt</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/VisWorks_VAST.swf">video</a>] </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>14.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Chen Wang, Zhen Wen, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Dynamic Network Visualization in 1.5D</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Pacific Visualization Symposium</i>, March 2011. [<a href="http://vis.ios.ac.cn/paper/1.5D_PacificVis.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/talk/1.5D_PacificVis.ppt">ppt</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>15.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Nan Cao, Shixia Liu, Weihong Qian, Li Tan, Guodong Wang, Jimeng Sun and Ching-Yung Lin, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">HiMap: Adaptive Visualization of Large-Scale Online Social Networks</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Pacific Visualization Symposium</i>, March 2009. [<a href="http://vis.ios.ac.cn/paper/HiMap_PacificVis.pdf">pdf</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/talk/HiMap_PacificVis.ppt">ppt</a>] [<a href="http://lcs.ios.ac.cn/%7Eshil/video/HiMap_PacificVis.avi">video</a>] </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>16.</span></span><span style="font-size:13.5pt;">Weishan Dong, Xin Zhang, Li Li, Changhua Sun, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Wei Sun, “Detecting Irregularly Shaped Significant Spatial and Spatio-Temporal Clusters”, <i>SIAM Intl. Conf. on Data Mining (SDM)</i>, 2012. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>17.</span></span><span style="font-size:13.5pt;">Furu Wei, Shixia Liu, Yangqiu Song, Shimie Pan, Michelle X. Zhou, Weihong Qian, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Li Tan, Qiang Zhang, “TIARA: A Visual Exploratory Text Analytic System”, <i>ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining</i>, Industry Track, July 2010. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>18.</span></span><span style="font-size:13.5pt;">Furu Wei, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Li Tan, Xiaohua Sun, Xiaoxiao Lian, Shixia Liu and Michelle Zhou,“Visual Content Correlation Analysis”, <i>IUI Workshop on Interactive Text Analytics</i>, 2010. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>19.</span></span><span style="font-size:13.5pt;">Chen Wang, Yibo Zhang, Xiaohan Chen, Ziyu Zhu, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Guang Chen, Chun Ying and Wei Lu, “SpamWatcher: A Behavior based SMS Anti-spam System”,<i> IBM Journal of Research and Development</i>, 2010. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>20.<span> </span></span></span><span style="font-size:13.5pt;">Chuanxiong Guo, Haitao Wu, Kun Tan, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Yongguang Zhang and Songwu Lu, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>ACM SIGCOMM</i>, August 2008. [<a href="http://vis.ios.ac.cn/paper/DCell_SIGCOMM.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>21.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Bin Liu, Changhua Sun, Zhengyu Yin, Laxmi Bhuyan and H. Jonathan Chao, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Load-Balancing Multi-Path Switching System
with Flow-Slice</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Transactions on Computers</i>,
61(3):350-365, 2012. [<a href="http://vis.ios.ac.cn/paper/FS_TC.pdf">pdf</a>] </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>22.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Yue Zhang, Jianming Yu, Bo Xu, Bin Liu and Jun Li, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">On the Extreme Parallelism inside Next-Generation Network Processors</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Annual Conference on Computer Communication (INFOCOM)</i>, Anchorage, USA, May 2007. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span><span>23.<span> </span></span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Bin Liu, Wenjie Li, Beibei Wu and Yunhao Liu, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">DS-PPS: A Practical Framework to Guarantee Differentiated QoS in Terabit Routers with Parallel Packet Switch</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>IEEE Annual Conference on Computer Communication (INFOCOM)</i>, Barcelona, Spain, April 2006. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>24.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Changbin Liu and Bin Liu, </span><span style="font-size:13.5pt;font-family:SimSun;">“</span><span style="font-size:13.5pt;">Network Utility Maximization for Triple-Play Services</span><span style="font-size:13.5pt;font-family:SimSun;">”</span><span style="font-size:13.5pt;">, <i>Elsevier Computer Communications</i>, 31(10):2257-2269, 2008. [<a href="http://vis.ios.ac.cn/paper/Utility_COMCOM.pdf">pdf</a>]</span><span style="font-size:13.5pt;"></span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>25.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, </span><span style="font-size:13.5pt;">Wenjie</span><span style="font-size:13.5pt;"> Li and Bin Liu, “Flow-based Packet-mode Load-balancing for Parallel Packet Switches”, <i>Journal of High Speed Networks</i>, 2010. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>26.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, </span><span style="font-size:13.5pt;">Mohammad</span><span style="font-size:13.5pt;"> Banikazemi, and Qingbo Wang, “Iceberg: An Image Streamer for Provisioning Virtual Machines”, <i>ICPP workshop on Scheduling and Resource Management for Parallel and Distributed Systems</i>, 2008. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>27.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Gao Xia and Bin Liu, “Performance Guarantees for Flow-Mapping Parallel Packet Switch”, <i>IEEE International Performance Computing and Communication Conference (IPCCC)</i>, New Orleans, USA, April 2007. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>28.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Wenjie Li, Bin Liu and Xiaojun Wang, “Flow mapping in the load balancing parallel packet switches”, <i>IEEE Workshop on High Performance Switching and Routing (HPSR)</i>, Hong Kong, China, May 2005. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>29.</span></span><span style="font-size:13.5pt;">Yue Zhang, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Jiani Guo, Bin Liu and Laxmi Bhuyan, “Quantum-Adaptive Scheduling in Multi-Core Network Processors”, <i>IEEE Intl. Conf. on Distributed Computing Systems (ICDCS)</i>, 2008. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>30.</span></span><span style="font-size:13.5pt;">Changhua Sun, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Bin Liu, “Efficient and Low-Cost Hardware Defense Against DNS Amplification Attacks”, <i>IEEE GLOBECOM</i>, New Orleans, LA, USA, December 2008. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>31.</span></span><span style="font-size:13.5pt;">Wenjie Li, Bin Liu, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Xu Yang and Dapeng Wu, “Preemptive packet-mode scheduling to improve TCP performance”, <i>IEEE Workshop on Quality of Service (IWQoS)</i>, Passau, Germany, June 2005. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>32.</span></span><span style="font-size:13.5pt;">Changbin Liu, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Bin Liu, “Utility-based Bandwidth Allocation for Triple-Play Services”, <i>European Conference on Universal and Multiservice Networks (ECUMN)</i>, Toulouse, France, Feb. 2007. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>33.</span></span><span style="font-size:13.5pt;">Changhua Sun, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Chengchen Hu and Bin Liu, “DRR-SFF: A Practical Scheduling Approach to Improve the Performance of Short Flows”, <i>International Conference on Networking and Services (ICNS)</i>, Athens, Greece, June 2007. </span>
</p>
<p class="MsoNormal" style="margin-left:35.7pt;text-indent:-17.85pt;">
<span style="font-size:13.5pt;"><span>34.</span></span><span style="font-size:13.5pt;">Wenjie Li, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Yang Xu and Bin Liu, "Efficient Approach to Merge and Segment IP Packets," <i>ICCNMC</i>, August 2005. </span>
</p>
</div>
<div>
<h5>
<span style="font-size:13.5pt;">Conference </span><span style="font-size:13.5pt;">Notes, </span><span style="font-size:13.5pt;">Demos, Posters, Challenge Entries</span><span style="font-size:13.5pt;"></span>
</h5>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>35.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;"> and Hanghang Tong, “Visual Network Analysis in Big Data Era”, in <i>Communications of CCF</i>, Sept. 2014. [<a href="http://vis.ios.ac.cn/paper/CCCF_2014.pdf">pdf</a>]</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-align:justify;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>36.</span></span><span style="font-size:13.5pt;">Tao Zhang, Qi Liao and <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>. Bridging the gap of network management and anomaly detection through interactive visualization. in <i>IEEE Pacific Visualization Symposium</i>, 2014 (Visualization Notes).</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>37.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Qi Liao, Xiaohua Sun, Yarui Chen, and Chuang Lin. "Visualize large-scale networks with structural equivalence", in <i>4th Visualization Workshop</i>, poster paper, Beijing, China, July 2013.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>38.</span></span><span style="font-size:13.5pt;">Tao Zhang, Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, and Weishan Dong. “Spatiotemporal anomaly
visualization for large-scale dynamic networks,”<span> </span>in <i>4th
Visualization Workshop</i>, poster paper, Beijing, China, July 2013.</span><span style="font-size:13.5pt;"></span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>39.</span></span><span style="font-size:13.5pt;">Tao Zhang, Qi Liao</span><span style="font-size:13.5pt;color:windowtext;"> and <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>.</span><span style="font-size:13.5pt;"> “Generic Anomaly Visualization for Daily Network Security Administration,”</span><span style="font-size:13.5pt;color:windowtext;"> </span><i><span style="font-size:13.5pt;">IEEE VAST Challenge Entry</span></i><span style="font-size:13.5pt;">, 2013.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>40.</span></span><span style="font-size:13.5pt;">Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Xiaohua Sun, “Anomaly Analysis and Visualization through Compressed Graphs,” in<i> VisWeek LDAV '12</i>, Poster Paper.</span><span style="font-size:13.5pt;"></span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>41.</span></span><span style="font-size:13.5pt;">Tao Zhang, Qi Liao</span><span style="font-size:13.5pt;color:windowtext;"> and <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>.</span><span style="font-size:13.5pt;"> “</span><span style="font-size:13.5pt;color:windowtext;">3D anomaly bar visualization for large-scale network</span><span style="font-size:13.5pt;">,”</span><span style="font-size:13.5pt;color:windowtext;"> </span><i><span style="font-size:13.5pt;">IEEE VAST Challenge Entry</span></i><span style="font-size:13.5pt;">, 2012.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>42.</span></span><span style="font-size:13.5pt;">Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Yuan He, Rui Li, Zhong Su, Aaron Striegel and Yunhao Liu, “Visualizing Anomalies in Sensor Networks,” <i>ACM SIGCOMM</i>, Demo Abstract, 2011.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>43.</span></span><span style="font-size:13.5pt;">Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Wei Hong Qian and Zhong Su,“Network Security and Anomaly Visualization,” <i>IEEE VAST Challenge Entry</i>, 2011.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>44.</span></span><span style="font-size:13.5pt;">Changhua Sun, Weidong Shan, Peter Bak, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Harriet Cao and Zhong Su, “IBM STEM: Geo-Spatial Temporal Visual Analytics,” <i>IEEE VAST Challenge Entry</i>, 2011.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>45.</span></span><span style="font-size:13.5pt;">Qi Liao, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Yuan He, Zhong Su and Aaron Striegel. “Spatiotemporal Visual Analysis of Sensor Networks in the Wild,” poster in <i>IEEE Pacific Visualization Symposium</i>, Hong Kong, March 2011.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>46.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Chen Wang and Zhen Wen, “Dynamic Network Visualization in 1.5D,” poster in <i>IEEE Conference on Information Visualization (InfoVis)</i>, 2010.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>47.</span></span><span style="font-size:13.5pt;">Shixia Liu, Yangqiu Song, Furu Wei, Shimie Pan, Michelle X. Zhou, Weihong Qian, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Li Tan, Qiang Zhang,“TIARA: Visually Analyzing Topic Evolution in Large Text Collections,” <i>ACM SIGKDD</i>, Demo Abstract, 2010.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>48.</span></span><span style="font-size:13.5pt;">Sreeram Balakrishnan, Vivian Chu, Mauricio Hernandez, Howard Ho, Rajasekar Krishnamurthy, Shixia Liu, Jan Pieper, Jeffrey Pierce, Lucian Popa, Christine Robson, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Shivakumar Vaithyanathan, Huahai Yang, “Midas: Integrating Public Financial Data,” <i>ACM SIGMOD</i>, Demo Paper, 2010.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>49.</span></span><span style="font-size:13.5pt;"><a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a></span><span style="font-size:13.5pt;">, Bin Liu, Changhua Sun, Zhengyu Yin, Laxmi Bhuyan and H-J. Chao, “Flow-Slice: A Novel Load-Balancing Scheme for Multi-Path Switching Systems,” poster in <i>ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)</i>, Orlando, USA, December 2007. </span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>50.</span></span><span style="font-size:13.5pt;">Guodong Wang, Yang Chen, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a>, Eng Keong Lua, Beixing Deng, Xing Li, “Proxima: Towards Lightweight and Flexible Anycast Service,”<span> </span>poster in <i>IEEE Annual Conference on Computer Communication (INFOCOM)</i>, Rio de Janeiro, Brazil, April 2009.</span>
</p>
<p class="MsoNormal" style="margin-left:36.0pt;text-indent:-18.0pt;">
<span style="font-size:13.5pt;"><span>51.</span></span><span style="font-size:13.5pt;">Changhua Sun, Jindou Fan, <a href="http://lcs.ios.ac.cn/~shil/">Lei Shi</a> and Bin Liu,“A novel router-based scheme to mitigate SYN flooding DDoS Attacks,” poster in <i>IEEE Annual Conference on Computer Communication (INFOCOM)</i>, Anchorage, USA, May 2007.</span>
</p>
</div>
</div>
</div>
</body>
</html>