Chung-Horng Lung

Orcid: 0000-0002-5662-490X

Affiliations:
  • Carleton University, Ottawa, Canada


According to our database1, Chung-Horng Lung authored at least 211 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Big Data Synthesis and Class Imbalance Rectification for Enhanced Forest Fire Classification Modeling.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
In-Network Caching for ICN-Based IoT (ICN-IoT): A Comprehensive Survey.
IEEE Internet Things J., August, 2023

iCache: An Intelligent Caching Scheme for Dynamic Network Environments in ICN-Based IoT Networks.
IEEE Internet Things J., January, 2023

Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System With SCADA.
IEEE Access, 2023

Deep Q-Networks Assisted Pre-connect Handover Management for 5G Networks.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

A Framework Using Federated Learning for IoT-Based Forest Fire Prediction.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Knowledge Graph Generation for Unstructured Data Using Data Processing Pipeline.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Performance Evaluation of Transformer-based NLP Models on Fake News Detection Datasets.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Unstructured Transportation Safety Board Findings Categorization Using the Knowledge Graph Pipeline.
Proceedings of the IEEE International Conference on Big Data, 2023

A Data Integration Framework with Multi-Source Big Data for Enhanced Forest Fire Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

Forest Fire Prediction Using Multi-Source Deep Learning.
Proceedings of the Big Data Technologies and Applications, 2023

2022
Controller Placement in Software-Defined Multihop Wireless Networks: Optimal Solution and GA-based Approximation.
Mob. Networks Appl., 2022

Securing RPL Using Network Coding: The Chained Secure Mode (CSM).
IEEE Internet Things J., 2022

Analysis of error-based machine learning algorithms in network anomaly detection and categorization.
Ann. des Télécommunications, 2022

A Web-based Orchestrator for Dynamic Service Function Chaining Development with Kubernetes.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Exploiting Segment Routing and SDN Features for Green Traffic Engineering.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Dynamic Packet Filtering Using Machine Learning.
Proceedings of the 23rd IEEE International Conference on Information Reuse and Integration for Data Science, 2022

Dynamic On-Demand Virtual Extensible LAN Tunnels via Software-Defined Wide Area Networks.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Analysis of Airfare during Pandemic: A Multi-Agent Based Modeling Approach.
Proceedings of the IEEE International Conference on Big Data, 2022

Pre-connect Handover Management for 5G Networks.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
Providing Internet Access for Post-Disaster Communications using Balloon Networks.
Proceedings of the PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Alicante, Spain, November 22, 2021

Deep Reinforcement Learning for Cost-Effective Controller Placement in Software-Defined Multihop Wireless Networking.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse.
Proceedings of the ICC 2021, 2021

2020
Smart Proactive Caching: Empower the Video Delivery for Autonomous Vehicles in ICN-Based Networks.
IEEE Trans. Veh. Technol., 2020

An SDN-Based Caching Decision Policy for Video Caching in Information-Centric Networking.
IEEE Trans. Multim., 2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks.
IEEE Internet Things J., 2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks.
CoRR, 2020

Software-Based Video-Audio Production Mixer via an IP Network.
IEEE Access, 2020

Effective Handover Process for Reliable Video Streaming Over Software-Defined Wireless Networking.
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020

Investigation of Containerized-IoT Implementation Based on Microservices.
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020

Introducing Network Coding to RPL: The Chained Secure Mode (CSM).
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Cost-Effective Controller Placement Problem for Software Defined Multihop Wireless Networks.
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020

2019
Support mechanisms for cloud configuration using XML filtering techniques: A case study in SaaS.
Future Gener. Comput. Syst., 2019

Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks.
CoRR, 2019

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things.
IEEE Commun. Surv. Tutorials, 2019

Experimental evaluation of LXC container migration for cloudlets using multipath TCP.
Comput. Networks, 2019

DDoS Attacks Detection and Mitigation in SDN Using Machine Learning.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Investigation of Moving Target Defense Technique to Prevent Poisoning Attacks in SDN.
Proceedings of the 2019 IEEE World Congress on Services, 2019

A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection.
Proceedings of the Machine Learning for Networking, 2019

Smart Caching: Empower the Video Delivery for 5G-ICN Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Using genetic algorithms to find optimal solution in a search space for a cloud predictive cost-driven decision maker.
J. Cloud Comput., 2018

When 5G meets ICN: An ICN-based caching approach for mobile video in 5G networks.
Comput. Commun., 2018

Evaluation of machine learning techniques for network intrusion detection.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Improvement of security and scalability for IoT network using SD-VPN.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Considerations for a Successful Network Service Chain Deployment.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Hybrid Relabeled Model for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Design and Performance Evaluation of Containerized Microservices on Edge Gateway in Mobile IoT.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

IoT Gateway Middleware for SDN Managed IoT.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

IoT Data Lifetime-Based Cooperative Caching Scheme for ICN-IoT Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Network Security for IoT Using SDN: Timely DDoS Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Segment Routing Green Spine Switch Management Systems for Data Center Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Closed-Loop DDoS Mitigation System in Software Defined Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Load Balancing Using ECMP in Multi-Stage Clos Topology in a Datacenter.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
An autonomic prediction suite for cloud resource provisioning.
J. Cloud Comput., 2017

Detection and prevention of DoS attacks in Software-Defined Cloud networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

IoT-equipped UAV communications with seamless vertical handover.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Router Position-Based Cooperative Caching for Video-on-Demand in Information-Centric Networking.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

LXC Container Migration in Cloudlets under Multipath TCP.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

The Impact of Database Layer on Auto-Scaling Decisions in a 3-Tier Web Services Cloud Resource Provisioning.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

An Adaptive Diversity-Based Ensemble Method for Binary Classification.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Automated Constraint-Based Multi-tenant SaaS Configuration Support Using XML Filtering Techniques.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Cloud Customer's Historical Record Based Resource Pricing.
IEEE Trans. Parallel Distributed Syst., 2016

A subtree-based approach to failure detection and protection for multicast in SDN.
Frontiers Inf. Technol. Electron. Eng., 2016

Using Source Code and Process Metrics for Defect Prediction - A Case Study of Three Algorithms and Dimensionality Reduction.
J. Softw., 2016

BFilter: Efficient XML Message Filtering and Matching in Publish/Subscribe Systems.
J. Softw., 2016

Improving software performance and reliability in a distributed and concurrent environment with an architecture-based self-adaptive framework.
J. Syst. Softw., 2016

Nearby live virtual machine migration using cloudlets and multipath TCP.
J. Cloud Comput., 2016

Green spine switch management for datacenter networks.
J. Cloud Comput., 2016

Investigation of data forwarding schemes for network resiliency in POX software defined networking controller.
IET Wirel. Sens. Syst., 2016

Efficient message delivery models for XML-based publish/subscribe systems.
Comput. Commun., 2016

Near-field communication sensors and cloud-based smart restaurant management system.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

MeFoRE: QoE based resource estimation at Fog to enhance QoS in IoT.
Proceedings of the 23rd International Conference on Telecommunications, 2016

PRE-Fog: IoT trace based probabilistic resource estimation at Fog.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Cloud-based smart waste management for smart cities.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

Empirical Investigation of Code and Process Metrics for Defect Prediction.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

An Empirical Investigation of Mobile Network Traffic Data for Resource Management.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Mobile Network Traffic Prediction Using MLP, MLPWD, and SVM.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Intelligent Wireless Ad Hoc Routing Protocol and Controller for UAV Networks.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
On building architecture-centric product line architecture.
Requir. Eng., 2015

Investigation on software-defined networks' reactive routing against BitTorrent.
IET Networks, 2015

A reservation-based call admission control scheme and system modeling in 4G vehicular networks.
EURASIP J. Wirel. Commun. Netw., 2015

A hybrid clustering technique using quantitative and qualitative data for wireless sensor networks.
Ad Hoc Networks, 2015

An Openflow-Based Approach to Failure Detection and Protection for a Multicasting Tree.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

Secure and Optimal Content-centric Networking Caching Design.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Content Distribution Networks Using Software Defined Networks.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

The assessment of BitTorrent's performance using SDN in a Mesh topology.
Proceedings of the 6th International Conference on the Network of the Future, 2015

Towards an Autonomic Auto-scaling Prediction System for Cloud Resource Provisioning.
Proceedings of the 10th IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015

Energy aware green spine switch management for Spine-Leaf datacenter networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Seamless Live Virtual Machine Migration with Cloudlets and Multipath TCP.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Evaluating Sensitivity of Auto-Scaling Decisions in an Environment with Different Workload Patterns.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Adaptive Clustering Techniques for Software Components and Architecture.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Constraint-Based Multi-Tenant SaaS Deployment Using Feature Modeling and XML Filtering Techniques.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Performance optimization of big data in mobile networks.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2014

Explicit Characterization of Stability Region for Stationary Multi-Queue Multi-Server Systems.
IEEE Trans. Autom. Control., 2014

Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures.
Inf. Syst. Frontiers, 2014

Aspectualization of code clones - an algorithmic approach.
Inf. Syst. Frontiers, 2014

A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection.
Int. J. Mob. Comput. Multim. Commun., 2014

Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Cloud Resource Auto-scaling System Based on Hidden Markov Model (HMM).
Proceedings of the 2014 IEEE International Conference on Semantic Computing, 2014

A green analysis of mobile cloud computing applications.
Proceedings of the Symposium on Applied Computing, 2014

A Comparative Evaluation of Computation Offloading for Mobile Applications.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Internet of Things: Remote Patient Monitoring Using Web Services and Cloud Computing.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Building a Framework for Internet of Things and Cloud Computing.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Entropy-based robust PCA for communication network anomaly detection.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Evaluating the Impact of Software-defined Networks' Reactive Routing on BitTorrent Performance.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

A Comparison of Data Forwarding Schemes for Network Resiliency in Software Defined Networking.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Measuring Prediction Sensitivity of a Cloud Auto-scaling System.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Design and Performance Evaluation of Cloud-Based XML Publish/Subscribe Services.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
On the Stability Region of Maximum Weighted Matching Server Allocation Policy.
INFOR Inf. Syst. Oper. Res., 2013

An Efficient Address Resolution Technique for Large Layer 2 Networks.
Int. J. Next Gener. Comput., 2013

An efficient hybrid approach to per-flow state tracking for high-speed networks.
Comput. Commun., 2013

H-DHAC: A hybrid clustering protocol for Wireless Sensor Networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

QoS and protection of relay nodes in 4G wireless networks using network coding.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Network Coding and Quality of Service metrics for Mobile Ad-hoc Networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Studies in applying PCA and wavelet algorithms for network traffic anomaly detection.
Proceedings of the IEEE 14th International Conference on High Performance Switching and Routing, 2013

Software Architecture Decomposition Using Clustering Techniques.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Smart Home: Integrating Internet of Things with Web Services and Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Towards Efficient Software Deployment in the Cloud Using Requirements Decomposition.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Network traffic anomaly detection using clustering techniques and performance comparison.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

A light weight SLA management infrastructure for cloud computing.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

Software architecture decomposition using adaptive K-nearest neighbor algorithm.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

2012
On QoE monitoring and E2E service assurance in 4G wireless networks.
IEEE Wirel. Commun., 2012

Tracking Per-Flow State - Binned Duration Flow Tracking.
J. Networks, 2012

Stability of bilateral teleoperators with generalized projection-based force reflection algorithms.
Autom., 2012

A lightweight defence against the Packet in Packet attack in ZigBee networks.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

A Study of Trojan Propagation in Online Social Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Adaptive admission control and packet scheduling schemes for QoS provisioning in multihop WiMAX networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Communication requirements and analysis of distribution networks using WiMAX technology for smart grids.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Reusing and converting code clones to aspects - An algorithmic approach.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Optimal server assignment in multi-server parallel queueing systems with random connectivities and random service failures.
Proceedings of IEEE International Conference on Communications, 2012

Network coding based wideband compressed spectrum sensing.
Proceedings of IEEE International Conference on Communications, 2012

Address Resolution in large layer 2 networks for data centers.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Experience on Building an Architecture Level Adaptable System.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

2011
Optimal Server Assignment in Multi-Server Queueing Systems with Random Connectivities
CoRR, 2011

Audio streaming for ad hoc wireless mesh networks using network coding.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

An XPath Query Aggregation Algorithm Using a Region Encoding.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

On the stability region of multi-queue multi-server queueing systems with stationary channel distribution.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Measuring and Analyzing WiMAX Security and QoS in Testbed Experiments.
Proceedings of IEEE International Conference on Communications, 2011

P2P traffic identification and optimization using fuzzy c-means clustering.
Proceedings of the FUZZ-IEEE 2011, 2011

Impact of Aspect-Oriented Programming on Software Performance: A Case Study of Leader/Followers and Half-Sync/Half-Async Architectures.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Peer-to-Peer Model for XML Publish/Subscribe Services.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

Delay optimal server assignment to symmetric parallel queues with random connectivities.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
Experience of building an architecture-based generator using GenVoca for distributed systems.
Sci. Comput. Program., 2010

Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach.
Ad Hoc Networks, 2010

QoS Assured Uplink Scheduler for WiMAX Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Design of distributed security architecture for multihop WiMAX networks.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Co-located Physical-Layer Network Coding to mitigate passive eavesdropping.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Network capacity region of multi-queue multi-server queueing system with time varying connectivities.
Proceedings of the IEEE International Symposium on Information Theory, 2010

A Green Computing Based Architecture Comparison and Analysis.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

An Efficient Approach to Per-Flow State Tracking for High-Speed Networks.
Proceedings of the Global Communications Conference, 2010

Dynamic Channel and Interface Management in Multi-Channel Multi-Interface Wireless Access Networks.
Proceedings of the Global Communications Conference, 2010

BFilter - A XML Message Filtering and Matching Approach in Publish/Subscribe Systems.
Proceedings of the Global Communications Conference, 2010

Towards Architecture-Centric Software Generation.
Proceedings of the Software Architecture, 4th European Conference, 2010

Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive Framework.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Towards Architecture-based Autonomic Software Performance Engineering.
Proceedings of the 4e Conférence francophone sur les Architectures Logicielles, 2010

A Tree-Based Multiple-Hop Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

Performance of Packet-Based Frequency-Hopping Spread Spectrum Radio Control Systems.
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.
IEEE Trans. Wirel. Commun., 2009

Treating software design as a service to manage complexity.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

A Subscription Coverage Technique for XML Message Dissemination.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

A Hybrid Location Identification Method in Wireless Ad Hoc/Sensor Networks.
Proceedings of the MDM 2009, 2009

Experimental studies of a teleoperator system with projection-based force reflection algorithms.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

Caching techniques for XML message filtering.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Virtual reality enhanced bilateral teleoperation with communication constraints.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2008
Projection-Based Force Reflection Algorithm for Stable Bilateral Teleoperation Over Networks.
IEEE Trans. Instrum. Meas., 2008

Biometric-based user authentication in mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

On the model-based approach to nonlinear networked control systems.
Autom., 2008

Experiments of Large File Caching and Comparisons of Caching Algorithms.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Stability of bilateral teleoperators with projection-based force reflection algorithms.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Analogy-based domain analysis approach to software reuse.
Requir. Eng., 2007

Software Architecture Decomposition Using Attributes.
Int. J. Softw. Eng. Knowl. Eng., 2007

Optimal Biometric-Based Continuous Authentication in Mobile Ad Hoc Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Towards A Performance-Oriented Self-Adaptive System.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

A TCP Connection Establishment Filter: Symmetric Connection Detection.
Proceedings of IEEE International Conference on Communications, 2007

Network Layer Negotiation-Based Channel Assignment in Multi-Channel Wireless Networks.
Proceedings of the Global Communications Conference, 2007

Performance Analysis of Web Service Replica Selection in an Extranet.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
A control scheme for stable force-reflecting teleoperation over IP networks.
IEEE Trans. Syst. Man Cybern. Part B, 2006

Program restructuring using clustering techniques.
J. Syst. Softw., 2006

Architecture-Centric Program Transformation for Distributed Systems.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Force Reflection Algorithm for Improved Transparency in Bilateral Teleoperation with Communication Delay.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006

MPLS-based Multicast Shared Trees.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

A QoS-Aware Web Service Replica Selection Framework for an Extranet.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Securing RSVP and RSVP-TE signaling protocols and their performance study.
Proceedings of the ITRE 2005, 2005

SMDP: A Simple Multimedia Service Description Protocol on the Internet.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

The role of traffic forecasting in QoS routing - a case study of time-dependent routing.
Proceedings of IEEE International Conference on Communications, 2005

2004
Applications of clustering techniques to software partitioning, recovery and restructuring.
J. Syst. Softw., 2004

Using Clustering Technique to Restructure Programs.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Program Restructuring Through Clustering Techniques.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

A Bandwidth-Efficient Scheduler for MPLS DiffServ Networks.
Proceedings of the 12th International Workshop on Modeling, 2004

Compositional layered performance modeling of peer-to-peer routing software.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Experience of communications software evolution and performance improvement with patterns.
Proceedings of the IASTED International Conference on Software Engineering, 2004

2002
Analogy Supports for Software Reuse and Knowledge Management.
Proceedings of the Intelligent Information Processing, 2002

2000
An Approach to Quantitative Software Architecture Sensitivity Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2000

1998
Performance-oriented software architecture engineering: an experience report.
Proceedings of the First International Workshop on Software and Performance, 1998

Software architecture recovery and restructuring through clustering techniques.
Proceedings of the Third International Workshop on Software Architecture, 1998

1997
Empirical experiences in analyzing software architecture sensitivity.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

An approach to software architecture analysis for evolution and reusability.
Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative Research, 1997

1996
A stakeholder-centric software architecture analysis approach.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

1995
An Approach to the Classification of Domain Models in Support of Analogical Reuse.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability, 1995

An Expanded View of Domain Modeling for Software Analogy.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
Computer Simulation Software Reuse by Generic/Specific Domain Modeling Approach.
Int. J. Softw. Eng. Knowl. Eng., 1994

1993
Integration of Domain Analysis and Analogical Approach for Software Reuse.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993


  Loading...