Shigang Chen

According to our database1, Shigang Chen authored at least 180 papers between 1995 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to quality of service provisioning and policy-based security management in computer networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs.
IEEE/ACM Trans. Netw., 2018

Achieving High Scalability Through Hybrid Switching in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2018

Session-Based Cooperation in Cognitive Radio Networks: A Network-Level Approach.
IEEE/ACM Trans. Netw., 2018

A UHF RFID-Based System for Children Tracking.
IEEE Internet of Things Journal, 2018

HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Missing-Tag Detection with Presence of Unknown Tags.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Using Wireless Tags to Monitor Bodily Oscillation.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

You Can Drop but You Can't Hide: K-persistent Spread Estimation in High-speed Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Highly Compact Virtual Active Counters for Per-flow Traffic Measurement.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Large-Scale VM Placement with Disk Anti-Colocation Constraints Using Hierarchical Decomposition and Mixed Integer Programming.
IEEE Trans. Parallel Distrib. Syst., 2017

Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems.
IEEE/ACM Trans. Netw., 2017

Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing.
IEEE/ACM Trans. Netw., 2017

Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2017

Identifying State-Free Networked Tags.
IEEE/ACM Trans. Netw., 2017

Lightweight Anonymous Authentication Protocols for RFID Systems.
IEEE/ACM Trans. Netw., 2017

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
IEEE/ACM Trans. Netw., 2017

Pyramid Sketch: a Sketch Framework for Frequency Estimation of Data Streams.
PVLDB, 2017

Persistent Spread Measurement for Big Network Data Based on Register Intersection.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

Per-flow counting for big network data stream over sliding windows.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Scalable software-defined networking through hybrid switching.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Better with fewer bits: Improving the performance of cardinality estimation of large data streams.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Tag-compass: Determining the spatial direction of an object with small dimensions.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

DBF: A general framework for anomaly detection in RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Deploying default paths by joint optimization of flow table and group table in SDNs.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Achieving Strong Privacy in Online Survey.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Category Information Collection in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ABC: A practicable sketch framework for non-uniform multisets.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Using Integer Programming for Workflow Scheduling in the Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Efficient Hierarchical Traffic Measurement in Software-Defined Datacenter Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
RFID Technologies for Internet of Things
Wireless Networks, Springer, ISBN: 978-3-319-47355-0, 2016

Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems.
IEEE Trans. Vehicular Technology, 2016

When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications.
IEEE/ACM Trans. Netw., 2016

Tag-Ordering Polling Protocols in RFID Systems.
IEEE/ACM Trans. Netw., 2016

An Efficient Protocol for RFID Multigroup Threshold-Based Classification Based on Sampling and Logical Bitmap.
IEEE/ACM Trans. Netw., 2016

Efficient RFID Grouping Protocols.
IEEE/ACM Trans. Netw., 2016

An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel.
IEEE/ACM Trans. Netw., 2016

An Energy-Efficient Strategy for Secondary Users in Cooperative Cognitive Radio Networks for Green Communications.
IEEE Journal on Selected Areas in Communications, 2016

Survey on key security technologies for space information networks.
J. Comm. Inform. Networks, 2016

Joint property estimation for multiple RFID tag sets using snapshots of variable lengths.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Anonymous category-level joint tag estimation: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

A communication model for stateless networked tags.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Efficient anonymous category-level joint Tag estimation.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Highly Compact Virtual Counters for Per-Flow Traffic Measurement through Register Sharing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

MVP: An Efficient Anonymous E-Voting Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Demonstrating Scalability and Efficiency of Pack-centric Resource Management for Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications.
IEEE Trans. Vehicular Technology, 2015

Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets.
IEEE Trans. Mob. Comput., 2015

Pack Up Cloud: Recursive Datacenter Resource Management and Experimental Studies.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Fast RFID grouping protocols.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Identifying State-Free Networked Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

ETAP: Enable Lightweight Anonymous RFID Authentication with O(1) Overhead.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Toward Hierarchical Mixed Integer Programming for Pack-to-Swad Placement in Datacenters.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
Fast Bloom Filters and Their Generalization.
IEEE Trans. Parallel Distrib. Syst., 2014

Unknown-Target Information Collection in Sensor-Enabled RFID Systems.
IEEE/ACM Trans. Netw., 2014

Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels.
IEEE/ACM Trans. Netw., 2014

Pandaka: A lightweight cipher for RFID systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Estimating the Persistent Spreads in High-Speed Networks.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Highly compact virtual maximum likelihood sketches for counting big network data.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

On Deletion of Outsourced Data in Cloud Computing.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
RFID as an Infrastructure.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5230-0, 2013

Traffic Measurement on the Internet.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-4851-8, 2013

Maximizing Lifetime Vector in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Spreader Classification Based on Optimal Dynamic Bit Sharing.
IEEE/ACM Trans. Netw., 2013

Efficient Protocols for Identifying the Missing Tags in a Large RFID System.
IEEE/ACM Trans. Netw., 2013

Estimating the Cardinality of a Mobile Peer-to-Peer Network.
IEEE Journal on Selected Areas in Communications, 2013

Differential estimation in dynamic RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient protocol for RFID multigroup threshold-based classification.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient tag search protocol in large-scale RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Guided multiple hashing: Achieving near perfect balance for fast routing lookup.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems.
Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2012

Generalized energy-efficient algorithms for the RFID estimation problem.
IEEE/ACM Trans. Netw., 2012

Per-Flow Traffic Measurement Through Randomized Counter Sharing.
IEEE/ACM Trans. Netw., 2012

End-to-end maxmin fairness in multihop wireless networks: Theory and protocol.
J. Parallel Distrib. Comput., 2012

An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks.
J. Parallel Distrib. Comput., 2012

An incrementally deployable path address scheme.
J. Parallel Distrib. Comput., 2012

Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

A time-efficient information collection protocol for large-scale RFID systems.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Privacy-preserving RFID authentication based on cryptographical encoding.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Origin-destination flow measurement in high-speed networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity.
Proceedings of IEEE International Conference on Communications, 2012

2011
Fit a Compact Spread Estimator in Small High-Speed Memory.
IEEE/ACM Trans. Netw., 2011

Achieving MAC-Layer Fairness in CSMA/CA Networks.
IEEE/ACM Trans. Netw., 2011

PSON: A scalable P2P file sharing system with efficient complex query support.
Peer-to-Peer Networking and Applications, 2011

Detecting Stealthy Spreaders by Random Aging Streaming Filters.
IEICE Transactions, 2011

Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Energy-efficient polling protocols in RFID systems.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

One memory access bloom filters and their generalization.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient missing tag detection in RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Scan detection in high-speed networks based on optimal dynamic bit sharing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Fast and compact per-flow traffic measurement through randomized counter sharing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient information collection protocols for sensor-augmented RFID networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Analysis of power-aware buffering schemes in wireless sensor networks.
TOSN, 2010

Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis.
IEEE/ACM Trans. Netw., 2010

Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls.
IEEE Trans. Computers, 2010

Identifying the missing tags in a large RFID system.
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010

MAC-layer Time Fairness across Multiple Wireless LANs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Energy Efficient Algorithms for the RFID Estimation Problem.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fast routing table lookup based on deterministic multi-hashing.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Using Analog Network Coding to Improve the RFID Reading Throughput.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Fair End-to-End Bandwidth Distribution in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs.
Proceedings of the Global Communications Conference, 2010

2009
Algorithms and performance of load-balancing with multiple hash functions in massive content distribution.
Computer Networks, 2009

Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Fit a Spread Estimator in Small Memory.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
SoMR: A scalable distributed QoS multicast routing protocol.
J. Parallel Distrib. Comput., 2008

Efficient file search in non-DHT P2P networks.
Computer Communications, 2008

Can CSMA/CA networks be made fair?
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

DAWN: A Novel Strategy for Detecting ASCII Worms in Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Exact Modeling of Propagation for Permutation-Scanning Worms.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

New adaptive protocols for fine-level end-to-end rate control in wireless networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Achieving Global End-to-End Maxmin in Multihop Wireless Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Analysis of Maximum Executable Length for Detecting Text-Based Malware.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Novel Solution for End-to-End Fairness Problem in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Real-Time Detection of Invisible Spreaders.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Building a Scalable P2P Network with Small Routing Delay.
Proceedings of the Progress in WWW Research and Development, 2008

2007
An Automated Signature-Based Approach against Polymorphic Internet Worms.
IEEE Trans. Parallel Distrib. Syst., 2007

A Scalable Overlay Multicast Architecture for Large-Scale Applications.
IEEE Trans. Parallel Distrib. Syst., 2007

DAW: A Distributed Antiworm System.
IEEE Trans. Parallel Distrib. Syst., 2007

ACOM: Any-source Capacity-constrained Overlay Multicast in Non-DHT P2P Networks.
IEEE Trans. Parallel Distrib. Syst., 2007

Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Stateful DDoS attacks and targeted filtering.
J. Network and Computer Applications, 2007

Spiral-based data dissemination in sensor networks.
IJAHUC, 2007

State aggregation of large network domains.
Computer Communications, 2007

AID: A global anti-DoS service.
Computer Networks, 2007

A Hybrid Query Scheme to Speed Up Queries in Unstructured Peer-to-Peer Networks.
Adv. in MM, 2007

Toward the Next-Generation Peer-to-Peer Services.
Adv. in MM, 2007

MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Protecting Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Speed Up Queries in Unstructured Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2007

Reducing the Size of Rule Set in a Firewall.
Proceedings of IEEE International Conference on Communications, 2007

2006
Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks.
IEEE Trans. Parallel Distrib. Syst., 2006

Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2006

On Optimal Deadlock Detection Scheduling.
IEEE Trans. Computers, 2006

Avoid 'void' in geographic routing for data aggregation in sensor networks.
IJAHUC, 2006

Localized algorithm for aggregate fairness in wireless sensor networks.
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, 2006

Scalable and energy efficient data dissemination in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

A Distributed Hybrid Scheme for Unstructured Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Perimeter-Based Defense against High Bandwidth DDoS Attacks.
IEEE Trans. Parallel Distrib. Syst., 2005

Detecting Internet worms at early stage.
IEEE Journal on Selected Areas in Communications, 2005

Stochastic analysis of distributed deadlock scheduling.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Defending against Internet worms: a signature-based approach.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Resilient Capacity-Aware Multicast Based on Overlay Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Online identification of multi-attribute high-volume traffic aggregates through sampling.
Proceedings of IEEE International Conference on Communications, 2005

2004
On the Performance Regularity of Web Servers.
World Wide Web, 2004

Routing with topology aggregation in delay-bandwidth sensitive networks.
IEEE/ACM Trans. Netw., 2004

Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.
Proceedings of the Information Security, 7th International Conference, 2004

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A peer-to-peer network positioning architecture.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Slowing Down Internet Worms.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

QoS information approximation for aggregated networks.
Proceedings of IEEE International Conference on Communications, 2004

A scalable distributed QoS multicast routing protocol.
Proceedings of IEEE International Conference on Communications, 2004

Two techniques for fast computation of constrained shortest paths.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

An Internet-worm early warning system.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

A New Perspective in Defending against DDoS.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

2000
Hierarchical QoS Routing in Delay-Bandwidth Sensitive Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

A QoS-Aware Multicast Routing Protocol.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Distributed quality-of-service routing in ad hoc networks.
IEEE Journal on Selected Areas in Communications, 1999

Routing by distributed recursive computation and information reuse.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Hierarchical Scheduling for Multiple Classes of Applications in Connection-Oriented Integrated-Service Networks.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
Distributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing.
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998

Distributed QoS Routing with Imprecise State Information.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1996
Optimal Deadlock Detection in Distributed Systems Based on Locally Constructed Wait-for Graphs.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Efficient algorithms for detection and resolution of distributed deadlocks.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995


  Loading...