Limin Sun

According to our database1, Limin Sun authored at least 181 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Understanding the Usage of Industrial Control System Devices on the Internet.
IEEE Internet of Things Journal, 2018

Context-aware personalized path inference from large-scale GPS snippets.
Expert Syst. Appl., 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018

Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 27th USENIX Security Symposium, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Discovery of Internet of Thing devices based on rules.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence.
Wireless Communications and Mobile Computing, 2017

Game Theoretic Study on Channel-Based Authentication in MIMO Systems.
IEEE Trans. Vehicular Technology, 2017

ViMediaNet: an emulation system for interactive multimedia based telepresence services.
The Journal of Supercomputing, 2017

Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Information Forensics and Security, 2017

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.
Sensors, 2017

A Framework for Searching Internet-Wide Devices.
IEEE Network, 2017

Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks.
J. Sensors, 2017

Mobility Intention-Based Relationship Inference from Spatiotemporal Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

MOSTPC: Performance of a Massive Oblique Space-Time-Polarization Precoding System over Ricean-K Fading Channel.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Automatically Discovering Surveillance Devices in the Cyberspace.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

MIAC: A Mobility Intention Auto-Completion Model for Location Prediction.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Game theoretic study on blockchain based secure edge networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Collaborative UFH-based anti-jamming broadcast with learning.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

Mobility Pattern Based Relationship Inference from Spatiotemporal Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Collaborative Recognition of Queuing Behavior on Mobile Phones.
IEEE Trans. Mob. Comput., 2016

An energy efficient privacy-preserving content sharing scheme in mobile social networks.
Personal and Ubiquitous Computing, 2016

An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Networking and Applications, 2016

A survey of privacy protection techniques for mobile devices.
J. Comm. Inform. Networks, 2016

Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet of Things Journal, 2016

Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs.
IEEE Communications Letters, 2016

Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wireless Comm. and Networking, 2016

Influential spatial facility prediction over large scale cyber-physical vehicles in smart city.
EURASIP J. Wireless Comm. and Networking, 2016

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wireless Comm. and Networking, 2016

Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

ASCEND: A search engine for online industrial control devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Characterizing industrial control system devices on the Internet.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Active Profiling of Physical Devices at Internet Scale.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Identification of visible industrial control devices at Internet scale.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Channel-Based Authentication Game in MIMO Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Generalized Project Gradient Algorithm for Solving Constrained Minimax Problems.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks.
IEEE Trans. Vehicular Technology, 2015

Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Vehicular Technology, 2015

ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks.
IEEE Trans. Mob. Comput., 2015

Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks.
IJISP, 2015

Security and privacy in localization for underwater sensor networks.
IEEE Communications Magazine, 2015

On the Stable Throughput in Wireless LANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Influential Spatial Facility Prediction over Dynamic Objects.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Abnormal event detection via adaptive cascade dictionary learning.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Disseminating real-time messages in opportunistic mobile social networks: A ranking perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Vehicle Anomaly Detection Based on Trajectory Data of ANPR System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

2014
A Quality-Aware Voice Streaming System for Wireless Sensor Networks.
TOSN, 2014

ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery.
IEEE Trans. Mob. Comput., 2014

Performance monitoring and evaluation in dance teaching with mobile sensing technology.
Personal and Ubiquitous Computing, 2014

Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution.
Personal and Ubiquitous Computing, 2014

Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks.
Personal and Ubiquitous Computing, 2014

Identity privacy-based reliable routing method in VANETs.
Peer-to-Peer Networking and Applications, 2014

Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects.
IEEE Internet of Things Journal, 2014

TDMA-Based Control Channel Access for IEEE 802.11p in VANETs.
IJDSN, 2014

Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
IJDSN, 2014

Optimization of Sampling Cell Size for Fingerprint Positioning.
IJDSN, 2014

A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks.
IJDSN, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
IJAHUC, 2014

UserIntent: Detection of user intent for triggering smartphone sensing applications.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

QueueSense: Collaborative recognition of queuing on mobile phones.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Poster: Crowdsourcing for video traffic surveillance.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Eye localization based on correlation filter bank.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Vehicle Activity Analysis Based on ANPR System.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Message Forwarding Scheme for Multi-area Opportunistic Network Based on Message Significance.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Quantifying individual communication capability in opportunistic mobile social networks.
Proceedings of the IEEE Computers, 2014

2013
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wireless Commun., 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
IJDSN, 2013

Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective.
IJDSN, 2013

Amortized Fairness for Drive-Thru Internet.
IJDSN, 2013

Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs.
IJDSN, 2013

Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
IJDSN, 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurrency and Computation: Practice and Experience, 2013

Multi-sensor data fusion based on consistency test and sliding window variance weighted algorithm in sensor networks.
Comput. Sci. Inf. Syst., 2013

False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

Context-Aware Handoff on Smartphones.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A cooperation incentive scheme based on coalitional game theory for sparse and dense VANETs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

MERPL: A more memory-efficient storing mode in RPL.
Proceedings of the 19th IEEE International Conference on Networks, 2013

A new method of post-evaluation researches on land consolidation project based on rough sets.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

2012
ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

The XM Satellite Radio Software Module of an Embedded Car Audio System.
JSW, 2012

Routing Algorithm Based on Multi-Community Evolutionary Game for VANET.
JNW, 2012

An Open Conformance Test System towards the Standardization of Wireless Sensor Networks.
IJDSN, 2012

Nonlinear Behaviors of Gear Shifting Digital Phase Locked Loops.
I. J. Bifurcation and Chaos, 2012

GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Exploiting ephemeral link correlation for mobile wireless networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

NSSN: A network monitoring and packet sniffing tool for wireless sensor networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

The Converged Service Oriented Architecture in Smart Home Service.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Application of Internet of Things in Power-Line Monitoring.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A case study on REST-style architecture for cyber-physical systems: Restful smart gateway.
Comput. Sci. Inf. Syst., 2011

A game based routing algorithm for congestion control of multimedia transmission in VANETs.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

A Research of Reduction Algorithm for Support Vector Machine.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Design and Implementation of Network Management System for Large-Scale Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Demo: a sensor network time synchronization protocol based on fm radio data system.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Exploiting FM radio data system for adaptive clock calibration in sensor networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

The Trajectory Exposure Problem in Location-Aware Mobile Networking.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Bi-Parameters Method For Structural Vulnerability Analysis.
Intelligent Automation & Soft Computing, 2010

Structural Condition Assessment Based On Canonical Correlation Analysis And Outlier Analysis.
Intelligent Automation & Soft Computing, 2010

Ambient Data Collection with Wireless Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2010

A High-Accuracy Nonintrusive Networking Testbed for Wireless Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Adaptive Voice Stream Multicast Over Low-Power Wireless Networks.
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010

ZiFi: wireless LAN discovery via ZigBee interference signatures.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Frequency-hopping/M-ary frequency-shift keying for wireless sensor networks: Noncoherent detection and performance.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Optimal infostation deployment for spatio-temporal information dissemination.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2010

Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010

A Prediction Based Long-Cycle Time Synchronization Algorithm for Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Maximum noise fraction (MNF) transformation to remove ballistocardiographic artifacts in EEG signals recorded during fMRI scanning.
NeuroImage, 2009

Editorial.
JSW, 2009

Editorial.
JNW, 2009

BoSS: a moving strategy for mobile sinks in wireless sensor networks.
IJSNet, 2009

NISAT: a zero-side-effect testbed for wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Recognition the Spatio-temporal Patterns of Low-flow Changes in the Yellow River over the Last Half Century.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Using L-moments Approach to Conduct Regional Flood Frequency and Associated Spatial Patterns Analysis in the Pearl River Delta Region.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN.
Signal Processing Systems, 2008

THTA: Triangle-Shaped Hierarchy Aggregation Time Allocation Algorithm for Wireless Sensor Network.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

An Improved Perceptron based Illative Network for the Fault Signal Diagnosis.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2007

DAR: An energy-balanced data-gathering scheme for wireless sensor networks.
Computer Communications, 2007

A Two-Stage Genetic Algorithm for the Multi-multicast Routing.
Proceedings of the Advances in Computation and Intelligence, 2007

Moving Schemes for Mobile Sinks in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A Content-based Robust Mode Decision Scheme for Internet Videophone Applications.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

P2P-Leveraged Mobile Live Streaming.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Channel-State Aware Scheduling Mechanism for Wireless Local Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

ESTS: An Error Statistic Based Time Synchronization Protocol for Wireless Sensor Networks.
Proceedings of the Computational Intelligence, 2006

Performance Analysis and Enhancement for Priority Based IEEE 802.11 Network.
Proceedings of IEEE International Conference on Communications, 2006

MotePlat: A Monitoring and Control Platform for Wireless Sensor Networks.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

HCCR by contour-based elastic mesh fuzzy feature.
Proceedings of the Document Recognition and Retrieval XIII, 2006

2005
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Adaptive robust TCP/IP header compression algorithm for 3G wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

An efficient multicast protocol in mobile IPv6 networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Channel state dependent robust TCP/IP header compression for 3G wireless networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Improved joint carrier and sampling frequency offset estimation scheme for OFDM systems.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...