Jinshu Su

According to our database1, Jinshu Su
  • authored at least 179 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw., Pract. Exper., 2017

PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures.
IEEE Systems Journal, 2017

A systematic review of structured sparse learning.
Frontiers of IT & EE, 2017

Boosting The Benefits of Hybrid SDN.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Enhancing the effectiveness of traffic engineering in hybrid SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Automatic privacy leakage detection for massive android apps via a novel hybrid approach.
Proceedings of the IEEE International Conference on Communications, 2017

CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

EffiEye: Application-aware Large Flow Detection in Data Center.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Industrial Electronics, 2016

Optimizing link rate assignment and transmission scheduling in WMN through compatible set generation.
Telecommunication Systems, 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Security and Communication Networks, 2016

An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.
J. Medical Systems, 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
IJDWM, 2016

Assessing Resilience of Inter-Domain Routing System under Regional Failures.
TIIS, 2016

A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor.
IEICE Transactions, 2016

Comparing Performance of Hierarchical Identity-Based Signature Schemes.
IEICE Transactions, 2016

A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Communications Surveys and Tutorials, 2016

BufferBank storage: an economic, scalable and universally usable in-network storage model for streaming data applications.
SCIENCE CHINA Information Sciences, 2016

A Real-Time Processing System for Anonymization of Mobile Core Network Traffic.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Achieving Consistent SDN Control With Declarative Applications.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A 60Gbps DPI Prototype based on Memory-Centric FPGA.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Rigidly Self-Expressive Sparse Subspace Clustering.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2016

Cupid: Congestion-free consistent data plane update in software defined networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Redactor: Reconcile network control with declarative control programs In SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

An Event Grouping Approach for Infinite Stream with Differential Privacy.
Proceedings of the Advances in Services Computing, 2016

Linearized Alternating Direction Method of Multipliers for Constrained Nonconvex Regularized Optimization.
Proceedings of The 8th Asian Conference on Machine Learning, 2016

Fast Resource Co-provisioning for Time Critical Applications Based on Networked Infrastructures.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs.
IEEE Trans. Parallel Distrib. Syst., 2015

Latency-aware DVFS for efficient power state transitions on many-core architectures.
The Journal of Supercomputing, 2015

Truncated differential cryptanalysis of PRINCE.
Security and Communication Networks, 2015

Security, trust, and resilience of distributed networks and systems.
Security and Communication Networks, 2015

Mix-zones optimal deployment for protecting location privacy in VANET.
Peer-to-Peer Networking and Applications, 2015

Trust Description and Propagation System: Semantics and axiomatization.
Knowl.-Based Syst., 2015

Improving application layer multicast forwarding performance by offloading multisend operations.
Comput. Syst. Sci. Eng., 2015

A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm Optimization in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

A Novel Location Privacy Mining Threat in Vehicular Internet Access Service.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Design, Implementation and Evaluation of an Application-Layer Virtualized Network.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

RScam: Cloud-Based Anti-Malware via Reversible Sketch.
Proceedings of the Security and Privacy in Communication Networks, 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

M2SDN: Achieving multipath and multihoming in data centers with software defined networking.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Network intrusion detection and prevention middlebox management in SDN.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Towards efficient radio resource scheduling in LTE-based satellite mobile communication system.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Pre-filter to Accelerate Regular Expression Matching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Keyword Search over Shared Cloud Data without Secure Channel or Authority.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wireless Personal Communications, 2014

A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2014

A study of IP prefix hijacking in cloud computing networks.
Security and Communication Networks, 2014

Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet.
New Generation Comput., 2014

A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
JNW, 2014

A novel steganography approach for voice over IP.
J. Ambient Intelligence and Humanized Computing, 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Generation Comp. Syst., 2014

Optimizing compatible sets in wireless networks through integer programming.
EURO J. Computational Optimization, 2014

SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Power Modelling Approach for Many-Core Architectures.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures.
Proceedings of the Information and Communication Technology, 2014

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Mathematical and Computer Modelling, 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Mathematical and Computer Modelling, 2013

Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE Journal on Selected Areas in Communications, 2013

PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System.
IJDSN, 2013

Benefiting from the community structure in opportunistic forwarding.
Comput. Sci. Inf. Syst., 2013

Security evaluation of MISTY structure with SPN round function.
Computers & Mathematics with Applications, 2013

Optimal relay node placement for multi-pair cooperative communication in wireless networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Distributed Routing Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Qphone: a quantum security VoIP phone.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

iPanda: A comprehensive malware analysis tool.
Proceedings of the International Conference on Information Networking 2013, 2013

Mining Network Behavior Specifications of Malware Based on Binary Analysis.
Proceedings of the Frontiers in Internet Technologies, 2013

Assessing Survivability of Inter-domain Routing System under Cascading Failures.
Proceedings of the Frontiers in Internet Technologies, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
RLM: A General Model for Trust Representation and Aggregation.
IEEE Trans. Services Computing, 2012

An efficient distributed key management scheme for group-signature based anonymous authentication in VANET.
Security and Communication Networks, 2012

A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks.
Proceedings of the International Conference on Computational Science, 2012

Flexible multi-authority attribute-based signature schemes for expressive policy.
Mobile Information Systems, 2012

A new multistage approach to detect subtle DDoS attacks.
Mathematical and Computer Modelling, 2012

A complete first-order temporal BDI logic for forest multi-agent systems.
Knowl.-Based Syst., 2012

Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks.
IEEE Journal on Selected Areas in Communications, 2012

Assessing the vulnerability of network topologies under large-scale regional failures.
Journal of Communications and Networks, 2012

Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing.
IEICE Transactions, 2012

Privacy aware publishing of successive location information in sensor networks.
Future Generation Comp. Syst., 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds.
Comput. Syst. Sci. Eng., 2012

Towards efficient and practical network coding in delay tolerant networks.
Computers & Mathematics with Applications, 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Characterizing Inter-domain Rerouting after Japan Earthquake.
Proceedings of the NETWORKING 2012, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

STDN Introduction.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

LDC: Detecting BGP Prefix Hijacking by Load Distribution Change.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analytic Goodput Model for TCP Incast.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
The TianHe-1A Supercomputer: Its Hardware and Software.
J. Comput. Sci. Technol., 2011

Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Generation Comp. Syst., 2011

DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree.
Comput. Syst. Sci. Eng., 2011

Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Analysis of prefix hijacking based on AS hierarchical model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Adaptive VoIP Steganography for Information Hiding within Network Audio Streams.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

VISOR: A Pratical VoIP Steganography Platform.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Protecting Router Forwarding Table in Space.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Shrew Attack in Cloud Data Center Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

One Leader at One Time: OLOT Routing in Delay Tolerant Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Self-supported congestion-aware networking for emergency services in WANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

NTC: Towards Efficient Network Coding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Gregex: GPU Based High Speed Regular Expression Matching Engine.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Snail Crawling: An Enhanced Method for DTNs Routing.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

How Can Multipath Dissemination Help to Detect Prefix Hijacking?
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

SDBGP: A scalable, distributed BGP routing protocol implementation.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

Thwarting audio steganography attacks in cloud storage systems.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

Evaluation of Topological Vulnerability of the Internet under Regional Failures.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems.
Knowl.-Based Syst., 2010

A Scalable Approach to Analyzing Network Security using Compact Attack Graphs.
JNW, 2010

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System.
JNIT, 2010

An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming.
IEICE Transactions, 2010

TH-1: China's first petaflop supercomputer.
Frontiers of Computer Science in China, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split.
IJCNS, 2009

An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems.
Intelligent Automation & Soft Computing, 2009

Network Access Control Mechanism Based on Locator/Identifier Split.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

MORT: A Technique to Improve Routing Efficiency in Fault-Tolerant Multipath Routing.
Proceedings of the MSN 2009, 2009

A new Group Key Management Scheme based on DMST for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

A Scalable Approach to Full Attack Graphs Generation.
Proceedings of the Engineering Secure Software and Systems, 2009

HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems.
Proceedings of the Advances in Artificial Intelligence, 2009

2008
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch.
IJESDF, 2008

Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems.
Proceedings of the Fourteenth IEEE Internationl Conference on Embedded and Real-Time Computing Systems and Applications, 2008

Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

A Flexible Approach to Measuring Network Security Using Attack Graphs.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems.
Proceedings of the Distributed Embedded Systems: Design, 2008

An Entropy Based Algorithm to Find Critical Traffic Matrices.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Analysis and Enhancement of Delay-Based Congestion Control.
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008

Analysis of Reverse Traffic in Delay-Based Congestion Control.
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008

Towards Successive Privacy Protection in Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

A Loop-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Efficient Congestion Control Based on Awareness of Multistage Resources (CC-AMR).
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

A New Precomputation Scheme for MPLS Traffic Engineering Routing.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

A Routing Optimization Algorithm for BGP Egress Selection.
Proceedings of the Distributed Computing and Internet Technology, 2006

The Impact of Parallel and Multithread Mechanism on Network Processor Performance.
Proceedings of the Grid and Cooperative Computing, 2006

A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic.
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006

Personalized Fair Reputation Based Resource Allocation in Grid.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

Spreading Activation Model for Connectivity Based Clustering.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

2005
OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks.
Proceedings of the Computational Science, 2004

2003
Using Split Queues to Improve the Performance of Parallel Switch.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...