Haining Wang
Orcid: 0000-0002-4174-3009
According to our database1,
Haining Wang
authored at least 289 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2020, "for contributions to network and cloud security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., April, 2024
Sensors, March, 2024
Expert Syst. Appl., March, 2024
J. Comput. Secur., 2024
3.4 A 14b 98Hz-to-5.9kHz 1.7-to-50.8 μ W BW/Power Scalable Sensor Interface with a Dynamic Bandgap Reference and an Untrimmed Gain Error of ± 0.26 % from -40°C to 125°C.
Proceedings of the IEEE International Solid-State Circuits Conference, 2024
Proceedings of the Wisdom, Well-Being, Win-Win, 2024
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023
MOPISDE: A collaborative multi-objective information-sharing DE algorithm for software clustering.
Expert Syst. Appl., September, 2023
iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023
Cross-modality image translation: CT image synthesis of MR brain images using multi generative network with perceptual supervision.
Comput. Methods Programs Biomed., July, 2023
IEEE J. Biomed. Health Informatics, June, 2023
Correction to: TMHSCA: a novel hybrid two-stage mutation with a sine cosine algorithm for discounted {0-1} knapsack problems.
Neural Comput. Appl., June, 2023
TMHSCA: a novel hybrid two-stage mutation with a sine cosine algorithm for discounted {0-1} knapsack problems.
Neural Comput. Appl., June, 2023
Learning geometric Jensen-Shannon divergence for tiny object detection in remote sensing images.
Frontiers Neurorobotics, June, 2023
IEEE Trans. Veh. Technol., May, 2023
STGHTN: Spatial-temporal gated hybrid transformer network for traffic flow forecasting.
Appl. Intell., May, 2023
IEEE Internet Things J., April, 2023
BDR-Net: Bhattacharyya Distance-Based Distribution Metric Modeling for Rotating Object Detection in Remote Sensing.
IEEE Trans. Instrum. Meas., 2023
A Hybrid Two-Stage Teaching-Learning-Based Optimization Algorithm for Feature Selection in Bioinformatics.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023
The Many Voices of Duying: Revisiting the Disputed Essays Between Lu Xun and Zhou Zuoren.
CoRR, 2023
Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the Design, User Experience, and Usability, 2023
The Effects of Primary Output Design of True Wireless Earbuds on the Wearing Comfort.
Proceedings of the Design, User Experience, and Usability, 2023
Proceedings of the Design, User Experience, and Usability, 2023
Proceedings of the HCI International 2023 - Late Breaking Papers, 2023
Proceedings of the Design, User Experience, and Usability, 2023
2022
HWOA: an intelligent hybrid whale optimization algorithm for multi-objective task selection strategy in edge cloud computing system.
World Wide Web, 2022
Adaptive Harmonic Impedance Reshaping Control Strategy Based on a Consensus Algorithm for Harmonic Sharing and Power Quality Improvement in Microgrids With Complex Feeder Networks.
IEEE Trans. Smart Grid, 2022
Impedance-Based Adaptively Reshaping Method for Enhancing Nonlinear Load Sharing and Voltage Quality in Islanded Microgrids With Virtual Synchronous Generator.
IEEE Trans. Smart Grid, 2022
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Water Goes Where? A Water Resource Allocation Method Based on Multi-Objective Decision-Making.
CoRR, 2022
Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution.
Connect. Sci., 2022
Comput. Networks, 2022
Comput. Methods Programs Biomed., 2022
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022
TG-Net: Combining transformer and GAN for nasopharyngeal carcinoma tumor segmentation based on total-body uEXPLORER PET/CT scanner.
Comput. Biol. Medicine, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
Proceedings of the Interspeech 2022, 2022
Comparison of Usability and Immersion Between Touch-Based and Mouse-Based Interaction: A Study of Online Exhibitions.
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022
Proceedings of the Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies, 2022
Pressure Sensitivity Mapping of the Head Region for Chinese Adults for AR Glasses Design.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022
Fit Improvement of Facial Interface for Steam Massage Glasses Based on Principal Component Analysis Panel.
Proceedings of the Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies, 2022
Anthropometric Hand Dimensions of Chinese Adults Using Three-Dimensional Scanning Technique.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022
Combining Virtual Reality and Eye Tracking to Recognize Users' Aesthetic Preference for Product Modeling.
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022
2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Cloud Comput., 2021
Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Stereo disparity optimization with depth change constraint based on a continuous video.
Displays, 2021
Progressive Guided Fusion Network With Multi-Modal and Multi-Scale Attention for RGB-D Salient Object Detection.
IEEE Access, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), 2021
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
The Challenge of Vernacular and Classical Chinese Cross-Register Authorship Attribution.
Proceedings of the Conference on Computational Humanities Research, 2021
Proceedings of the Advances in Ergonomics in Design, 2021
Proceedings of the Advances in Ergonomics in Design, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
An Enhancing Grid Stiffness Control Strategy of STATCOM/BESS for Damping Sub-Synchronous Resonance in Wind Farm Connected to Weak Grid.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
From Design to Practice: ETSI ENI Reference Architecture and Instantiation for Network Management and Orchestration Using Artificial Intelligence.
IEEE Commun. Stand. Mag., 2020
Modeling and Control Parameters Design for Grid-Connected Inverter System Considering the Effect of PLL and Grid Impedance.
IEEE Access, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
EAI Endorsed Trans. Security Safety, 2019
Towards passive analysis of anycast in global routing: unintended impact of remote peering.
Comput. Commun. Rev., 2019
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Internet Things J., 2018
Network Management and Orchestration Using Artificial Intelligence: Overview of ETSI ENI.
IEEE Commun. Stand. Mag., 2018
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Cross-Cultural Design. Methods, Tools, and Users, 2018
Proceedings of the Cross-Cultural Design. Methods, Tools, and Users, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
ACM Trans. Web, 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
EAI Endorsed Trans. Security Safety, 2017
Comput. Commun. Rev., 2017
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Low Complexity Node Clustering in Cloud-RAN for Service Provisioning and Resource Allocation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Parallel Distributed Syst., 2016
ACM Trans. Inf. Syst. Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 7th International Conference on Multimedia Systems, 2016
A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Wirel. Commun., 2015
IEEE Trans. Wirel. Commun., 2015
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
IEEE/ACM Trans. Netw., 2015
IEEE Trans. Computers, 2015
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Internet Things J., 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
Proceedings of the 10th International Conference on Network and Service Management, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
ACM Trans. Web, 2013
IEEE Trans. Wirel. Commun., 2013
IEEE J. Sel. Areas Commun., 2013
Comput. Networks, 2013
A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Time domain bi-level downlink power control for cross-tier interference mitigation in HetNet.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the Middleware 2012, 2012
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency.
Proceedings of the 9th International Conference on Autonomic Computing, 2012
Understanding performance implications of nested file systems in a virtualized environment.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
IEEE/ACM Trans. Netw., 2011
Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Concurr. Comput. Pract. Exp., 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
ACM Trans. Internet Techn., 2010
PowerTracer: Tracing requests in multi-tier services to save cluster power consumption
CoRR, 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Application and Practice of System Integration Approach in Intelligent Human Motion Recognition.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007
IEEE/ACM Trans. Netw., 2007
IEEE Trans. Knowl. Data Eng., 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006
2005
IEEE/ACM Trans. Netw., 2005
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005
IEEE Multim., 2005
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
2003
IEEE Trans. Parallel Distributed Syst., 2003
Proceedings of the Quality of Service, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
Proceedings of the IEEE International Conference on Communications, 2001
2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
1998
Proceedings of the MASCOTS 1998, 1998