The following publications are possibly variants of this publication:
- Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions from a Regional Ocean ModelRyan N. Smith, Yi Chao, Peggy Li, David A. Caron, Burton H. Jones, Gaurav S. Sukhatme. ijrr, 29(12):1475-1497, 2010. [doi]
- Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. hpcc 2013: 175-182 [doi]
- Autonomous Underwater Vehicle trajectory design coupled with predictive ocean models: A case studyRyan N. Smith, Arvind Pereira, Yi Chao, Peggy Li, David A. Caron, Burton H. Jones, Gaurav S. Sukhatme. icra 2010: 4770-4777 [doi]
- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. ifiptm 2014: 61-76 [doi]
- Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive ControlWeiwei Xu, Yuchen Xiao, Hongran Li, Jian Zhang, Heng Zhang. hpsr 2019: 1-6 [doi]
- Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detectionWeizhi Meng, Wenjuan Li, Lam-for Kwok. scn, 8(18):3883-3895, 2015. [doi]