![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
主要任职:Director of Academic Committee at Kaifa District
其他任职:开发区校区学术分委员会主任(Director of Academic Committee at Kaifa Campus)
性别:男
毕业院校:多伦多大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:软件工程. 运筹学与控制论
办公地点:开发区(Kaifa District Campus)
联系方式:mingchul@dlut.edu.cn
电子邮箱:mingchul@dlut.edu.cn
扫描关注
- [221]石慧, 李明楚, 孙晰锐, 林闯, Lin, C.(linchuang_78@dlut.edu.cn).基于Contourlet变换的抗几何攻击数字水印算法[J],光电子·激光,2011,22(10):1575-1581
- [222]Wang Z.-H., Chang C.-C., Li M.-C., Lu T.-C., Wang, Z.-H., Dalian University of Technology, School of Software, Liaoning, China, email: wangzhihui1017@gmail.com.A simple image encoding method with data lossless information hiding[J],Journal of Networks,2011,6(3):400-407
- [223]Wang Z.-H., Chang C.-C., Tu H.N., Li M.-C., Wang, Z.-H., School of Software, Dalian University of Technology, Dalian, Liaoning, China, email: wangzhihui1017@yahoo.com.Sharing a secret image in binary images with verification[J],Journal of Information Hiding and Multimedia Signal Processing,2011,2(1):78-90
- [224]Hua J., Li M., Ren Y., Sakurai K..Efficient context-sensitive intrusion detection based on state transition table[A],2011,E94-A(1):255-264
- [225]Xia Q., Sun W., Xu Z., Li M..A novel grid resource scheduling model based on Extended Second Price Sealed Auction[A],2010,305-310
- [226]Sun W., Zhu Y., Su Z., Jiao D., Li M..A priority-based task scheduling algorithm in grid[A],2010,311-315
- [227]Chen, Yuanfang, Li, Mingchu, Shu, Lei, Wang, Duong, Trung Q..The Scheme of Mitigating the Asymmetric Links Problem in Wireless Sensor Networks[A],2010,272-276
- [228]宗瑜, 李明楚, 徐贯东, 张彦春, Zong, Y.(nick.zongy@gmail.com).局部显著单元高维聚类算法[J],电子与信息学报,2010,32(11):2707-2712
- [229]Wang, Zhi-Hui, Chang, Chin-Chen, Chen, Kuo-Nan, Li, Ming-Chu, CC (reprint author), Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan..An encoding method for both image compression and data lossless information hiding[J],JOURNAL OF SYSTEMS AND SOFTWARE,2010,83(11,SI):2073-2082
- [230]金萍, 宗瑜, 李明楚.共有信息引导的启发式聚类算法[J],计算机工程与应用,2010,46(31):50-53,71
- [231]Fan X., Ma J., Ren Y., Li M..Dual-EigenRep: A reputation-based trust model for P2P file-sharing networks[A],2010,358-363
- [232]覃振权, 李凯斌, 李明楚.基于PageRank和系统调用的网页安全检测模型[J],小型微型计算机系统,2010,31(10):2068-2072
- [233]Xiong, Liming, Li, Mingchu, LM (reprint author), Beijing Inst Technol, Dept Math, Beijing 100081, Peoples R China..Supereulerian index is stable under contractions and closures[J],ARS COMBINATORIA,2010,97:129-142
- [234]李凯斌, 田琳琳, 覃振权, 李明楚.Snort入侵检测系统中的规则泛化模型[J],计算机工程与应用,2010,46(27):88-92
- [235]荣翠芳, 李明楚, 孙伟峰, 姚红岩.数据网格中一种均衡性能的副本一致性算法[J],计算机工程与应用,2010,46(22):83-87
- [236]崔永瑞, 李明楚, 江贺, Cui, Y.-R.(cyr811127@yahoo.com.cn).一种网格节点信誉评价算法及其在服务网格虚拟组织构建中的应用[J],电子学报,2010,38(7):1557-1562
- [237]Zong, Yu, Xu, Guandong, Zhang, Yanchun, Jiang, He, Li, Mingchu, Y (reprint author), Victoria Univ, Ctr Appl Informat, Sch Sci & Engn, Melbourne, Vic 8001, Australia..A robust iterative refinement clustering algorithm with smoothing search space[J],KNOWLEDGE-BASED SYSTEMS,2010,23(5):389-396
- [238]Zhao Hui, 李明楚, Sakurai Kouichi, Yizhi Ren, Zhao, H., School of Software, Dalian University of Technology, Dalian, 116621, China, email: hui.zhao@gmail.com.Mechanized Analysis of Verifiable Multi-secret Sharing in the Pi-calculus[J],ICIC Express Letters,2010,4(3):1053-1058
- [239]Zhao L., Ren Y., Li M., Sakurai K..SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid[A],2010
- [240]姚红岩, 李明楚, 崔永瑞, 郭成, 任一之.一种隐私的角色认证方法[J],小型微型计算机系统,2010,31(3):503-509