Wei Zhao

Orcid: 0000-0002-6268-2559

Affiliations:
  • Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, China
  • American University of Sharjah, United Arab Emirates (former)
  • University of Macau, China (former)
  • Texas A&M University, College Station, Texas, USA (former)


According to our database1, Wei Zhao authored at least 253 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ViObject: Harness Passive Vibrations for Daily Object Recognition with Commodity Smartwatches.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

Startup-Aware Dependent Task Scheduling With Bandwidth Constraints in Edge Computing.
IEEE Trans. Mob. Comput., February, 2024

2023
Cost-Effective Scheduling for Dependent Tasks With Tight Deadline Constraints in Mobile Edge Computing.
IEEE Trans. Mob. Comput., October, 2023

Privacy Data Diffusion Modeling and Preserving in Online Social Network.
IEEE Trans. Knowl. Data Eng., June, 2023

Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study.
IEEE Trans. Knowl. Data Eng., April, 2023

Efficient Container Assignment and Layer Sequencing in Edge Computing.
IEEE Trans. Serv. Comput., 2023

Pricing Model for Dynamic Resource Overbooking in Edge Computing.
IEEE Trans. Cloud Comput., 2023

Autonomous and Cost-effective Defect Detection System for Molded Pulp Products.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

2022
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids.
IEEE Trans. Dependable Secur. Comput., 2022

Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices.
IEEE Trans. Cloud Comput., 2022

Where Am I Parking: Incentive Online Parking-Space Sharing Mechanism With Privacy Protection.
IEEE Trans Autom. Sci. Eng., 2022

Efficient instance reuse approach for service function chain placement in mobile edge computing.
Comput. Networks, 2022

2021
Dynamic Control of Fraud Information Spreading in Mobile Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Intervening Coupling Diffusion of Competitive Information in Online Social Networks.
IEEE Trans. Knowl. Data Eng., 2021

Guest Editorial: Special Issue on AI-Enabled Internet of Dependable and Controllable Things.
IEEE Internet Things J., 2021

On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems.
IEEE Internet Things J., 2021

2020
An Edge Computing Based Public Vehicle System for Smart Transportation.
IEEE Trans. Veh. Technol., 2020

Towards Differential Privacy-Based Online Double Auction for Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2020

WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features.
IEEE Trans. Big Data, 2020

Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark.
IEEE J. Sel. Areas Commun., 2020

LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging.
Future Gener. Comput. Syst., 2020

Active Testing: An Unbiased Evaluation Method for Distantly Supervised Relation Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Regularized Attentive Capsule Network for Overlapped Relation Extraction.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
Migration Modeling and Learning Algorithms for Containers in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Enabling Heterogeneous Network Function Chaining.
IEEE Trans. Parallel Distributed Syst., 2019

Time-Sync Video Tag Extraction Using Semantic Association Graph.
ACM Trans. Knowl. Discov. Data, 2019

An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging.
IEEE Internet Things J., 2019

A practicable guide to the quantum computation architectures.
CoRR, 2019

An Optimal Dynamic Admission Control Policy and Upper Bound Analysis in Wireless Sensor Networks.
IEEE Access, 2019

Modeling and Forecasting of Timescale Network Traffic Dynamics in M2M Communications.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Optimal Task Allocation and Coding Design for Secure Coded Edge Computing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems (Part II).
ACM Trans. Cyber Phys. Syst., 2018

Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2018

IoT Security: An End-to-End View and Case Study.
CoRR, 2018

Moderate Deviations for Stochastic Fractional Heat Equation Driven by Fractional Noise.
Complex., 2018

A Survey on Big Data Market: Pricing, Trading and Protection.
IEEE Access, 2018

Error Analysis on RSS Range-Based Localization Based on General Log-Distance Path Loss Model.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

SecT: A Lightweight Secure Thing-Centered IoT Communication System.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Peeping Eye in the Sky.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wirel. Commun. Mob. Comput., 2017

Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Veh. Technol., 2017

A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems.
IEEE Trans. Veh. Technol., 2017

Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data.
IEEE Trans. Parallel Distributed Syst., 2017

PLAN: Joint Policy- and Network-Aware VM Management for Cloud Data Centers.
IEEE Trans. Parallel Distributed Syst., 2017

On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2017

Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems.
IEEE Internet Things J., 2017

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017

Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids.
IEEE Internet Things J., 2017

A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

BridgeLoc: Bridging Vision-Based Localization for Robots.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Towards truthful auction for big data trading.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

On human mobility predictability via WLAN logs.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units.
IEEE Trans. Ind. Informatics, 2016

Design and Realization of WInternet: From Net of Things to Internet of Things.
ACM Trans. Cyber Phys. Syst., 2016

S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Data integrity attacks against the distributed real-time pricing in the smart grid.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

2015
On Malware Leveraging the Android Accessibility Framework.
EAI Endorsed Trans. Ubiquitous Environ., 2015

A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems.
IEEE Trans. Computers, 2015

TrustRank: a Cold-Start tolerant recommender system.
Enterp. Inf. Syst., 2015

Beacon Node Placement for Minimal Localization Error.
CoRR, 2015

A novel thermal-aware structure of TSV cluster.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

VM-tracking: Visual-motion sensing integration for real-time human tracking.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Policy-Aware Virtual Machine Management in Data Center Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A cost-efficiency method on beacon nodes placement for wireless localization.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A thermal-aware distribution method of TSV in 3D IC.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distributed Syst., 2014

Blind Recognition of Touched Keys: Attack and Countermeasures.
CoRR, 2014

Keynote: WInternet: From Net of Things to Internet of Things.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A User-Customizable Urban Traffic Information Collection Method Based on Wireless Sensor Networks.
IEEE Trans. Intell. Transp. Syst., 2013

Protocol-level attacks against Tor.
Comput. Networks, 2013

Effective RSS Sampling for Forensic Wireless Localization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

EV-Human: Human localization via visual estimation of body electronic interference.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Theory underlying measurement of AOA with a rotating directional antenna.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Pattern mutation in wireless sensor deployment.
IEEE/ACM Trans. Netw., 2012

The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012

A Real-Time Vehicle Navigation Algorithm in Sensor Network Environments.
IEEE Trans. Intell. Transp. Syst., 2012

A context-aware scheme for privacy-preserving location-based services.
Comput. Networks, 2012

Heavy-Tailed Prediction Error: A Difficulty in Predicting Biomedical Signals of Noise Type.
Comput. Math. Methods Medicine, 2012

Asymptotic Identity in Min-Plus Algebra: A Report on CPNS.
Comput. Math. Methods Medicine, 2012

Real-time decision making for urban vehicle navigation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Performance Comparison of Positioning Algorithms for Complex GPS Systems.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

An efficient hybrid localization scheme for Heterogeneous Wireless Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Privacy-Preserving OLAP: An Information-Theoretic Approach.
IEEE Trans. Knowl. Data Eng., 2011

Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Secur. Comput., 2011

Protection of query privacy for continuous location based services.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Identifying mobiles hiding behind wireless routers.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Monte Carlo Method for Mobile Target Counting.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

On a Hierarchical False Data Injection Attack on Power System State Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2010

Representation of a Stochastic Traffic Bound.
IEEE Trans. Parallel Distributed Syst., 2010

Toward statistical QoS guarantees in a differentiated services network.
Telecommun. Syst., 2010

Stochastic performance analysis of non-feedforward networks.
Telecommun. Syst., 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems.
IEEE Trans. Computers, 2010

Design and Analysis of a New GPS Algorithm.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distributed Syst., 2009

Two-Terminal Video Coding.
IEEE Trans. Image Process., 2009

Wyner-Ziv coding based on TCQ and LDPC codes.
IEEE Trans. Commun., 2009

CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems.
IEEE Trans. Knowl. Data Eng., 2008

On Multiterminal Source Code Design.
IEEE Trans. Inf. Theory, 2008

Connectivity in finite ad-hoc networks.
Sci. China Ser. F Inf. Sci., 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A New Replay Attack Against Anonymous Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Optimized high-order finite difference wave equations modeling on reconfigurable computing platform.
Microprocess. Microsystems, 2007

Analysis of flow-correlation attacks in anonymity network.
Int. J. Secur. Networks, 2007

Privacy-Preserving Data Mining Systems.
Computer, 2007

DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers.
Proceedings of the 28th IEEE Real-Time Systems Symposium (RTSS 2007), 2007

Multiterminal Video Coding.
Proceedings of the International Conference on Image Processing, 2007

High-Precision BLAS on FPGA-enhanced Computers.
Proceedings of the 2007 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2007

2006
Design and Implementation of QoS-Provisioning System for Voice over IP.
IEEE Trans. Parallel Distributed Syst., 2006

A New delay control method for real-time flows.
J. Comb. Optim., 2006

Distributed policy processing in active-service based infrastructures.
Int. J. Commun. Syst., 2006

Self-adaptive Worms and Countermeasures.
Proceedings of the Stabilization, 2006

A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Challenges and Opportunities of Computer and Communication Systems Research.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

An Optimized Finite Difference Computing Engine on FPGAs.
Proceedings of the 14th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2006), 2006

Group-Alignment based Accurate Floating-Point Summation on FPGAs.
Proceedings of the 2006 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2006

A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

An Efficient Implementation of High-Accuracy Finite Difference Computing Engine on FPGAs.
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
An Energy-Efficient Slack Distribution Technique for Multimode Distributed Real-Time Embedded Systems.
IEEE Trans. Parallel Distributed Syst., 2005

Multi-shared-trees based multicast routing control protocol using anycast selection.
Parallel Algorithms Appl., 2005

Analyzing and enhancing the resilience of structured peer-to-peer systems.
J. Parallel Distributed Comput., 2005

Distributed Privacy Preserving Information Sharing.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

On Schedulability Bounds of Static Priority Schedulers.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Real-Time Component-Based Systems.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Performance Measurements for Privacy Preserving Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Effectiveness of Traffic Camouflaging over Computer Networks.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

A new scheme on privacy-preserving data classification.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

On Flow Marking Attacks in Wireless Anonymous Communication Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Towards a Dynamic Data Driven Application System for Wildfire Simulation.
Proceedings of the Computational Science, 2005

Anonymity analysis of mix networks against flow-correlation attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Time Domain Numerical Simulation for Transient Waves on Reconfigurable Coprocessor Platform.
Proceedings of the 13th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005), 2005

FPGA-Based High-Order Finite Difference Algorithm for 2D Acoustic Wave Propagation Problems.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004

Distributed Admission Control for Anycast Flows.
IEEE Trans. Parallel Distributed Syst., 2004

Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw., 2004

A New Scheme on Privacy Preserving Association Rule Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

On Flow Correlation Attacks and Countermeasures in Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Query aggregation for providing efficient data services in sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

On the Modeling and Optimization of Discontinuous Network Congestion Control Systems.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Providing Statistical Delay Guarantees in Wireless Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

On the Confidential Auditing of Distributed Computing Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

A Note on Dynamic Data Driven Wildfire Modeling.
Proceedings of the Computational Science, 2004

Cardinality-based inference control in OLAP systems: an information theoretic approach.
Proceedings of the DOLAP 2004, 2004

Asymmetric Code Design for Remote Multiterminal Source Coding.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Detecting Grid-Abuse Attacks by Source-based Monitoring.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Guest Editorial: Special Section on Security in Distributed Computing Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Integrated End-to-End Delay Analysis for Regulated ATM Networks.
Real Time Syst., 2003

Utilization-Based Admission Control for Scalable Real-Time Communication.
Real Time Syst., 2003

Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
Int. J. Inf. Technol. Decis. Mak., 2003

A Study of Providing Statistical QoS in a Differentiated Sevices Network.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Group aggregation for scalable anycast routing.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

Effective Delay Control for High Rate Heterogeneous Real-time Flows.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003

On Countermeasures to Traffic Analysis Attacks.
Proceedings of the IEEE Systems, 2003

On resilience of structured peer-to-peer systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
Efficient Internet Multicast Routing Using Anycast Path Selection.
J. Netw. Syst. Manag., 2002

SmartClick: An Enabler for Human-Centered Wireless Web Service.
Proceedings of the Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), 2002

Implementation of QoS-Provisioning System for Voice over IP.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

Scalable Multicast Routing Protocol Using Anycast and Hierarchical-Trees.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001

An integrated routing and admission control mechanism for real-time multicast connections in ATM networks.
IEEE Trans. Commun., 2001

Energy Consumption of Traffic Padding Schemes in Wireless Ad Hoc Networks.
Scalable Comput. Pract. Exp., 2001

Challenges in Design and Implementation of Middlewares for Real-Time Systems: Guest Editor's Introduction.
Real Time Syst., 2001

Simulation of Long-Range Dependent Traffic and a Simulator of TCP Arrival Traffic.
J. Interconnect. Networks, 2001

Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Integrated Routing for Multicast and Anycast Messages.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

2000
A Routing Protocol for Anycast Messages.
IEEE Trans. Parallel Distributed Syst., 2000

Statistical delay analysis on an ATM switch with self-similar input traffic.
Inf. Process. Lett., 2000

Integrated routing algorithms for anycast messages.
IEEE Commun. Mag., 2000

A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks.
Proceedings of the WISE 2000, 2000

Utilization-Based Admission Control for Real-Time Applications.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

Scalable QoS Guaranteed Communication Services for Real-Time Applications.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
IEEE Trans. Parallel Distributed Syst., 1999

Using Traffic Regulation to Meet End-to-End Deadlines in ATM Networks.
IEEE Trans. Computers, 1999

A new method for integrated end-to-end delay analysis in ATM networks.
J. Commun. Networks, 1999

Efficient Connection Admission Control Algorithms for Adaptive QoS Real-Time Connections over ATM Networks.
Eur. Trans. Telecommun., 1999

Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks .
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

Real-time Intrusion Detection and Suppression in ATM Networks.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

New Delay Analysis in High Speed Networks.
Proceedings of the International Conference on Parallel Processing 1999, 1999

1998
Routing Algorithms for Anycast Messages.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
Fault-Tolerant, Real-Time Communication in FDDI-Based Networks.
Computer, 1997

Integrated delay analysis of regulated ATM switch.
Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), 1997

Static priority scheduling for ATM networks.
Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), 1997

Stability in ATM Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Connection-Oriented Communications for Real-Time Applications in FDDI-ATM-FDDI Heterogeneous Networks.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

1996
An Efficient Optimal Reconfiguration Algorithm for FDDI-Based Networks.
IEEE Trans. Parallel Distributed Syst., 1996

Real-Time Communication in FDDI Networks.
Real Time Syst., 1996

Modeling and Regulation of Host Traffic in ATM Networks.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996

Admission Control for Hard Real-Time Connections in ATM LANs.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

Meeting Delay Requirements in Computer Networks with Wormhole Routing.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Hard Real-Time Communication in Multiple-Access Networks.
Real Time Syst., 1995

Guaranteeing application-to-application deadlines in distributed real-time systems.
Proceedings of the Proceedings 20th Conference on Local Computer Networks (LCN'95), 1995

Using traffic regulation to meet end-to-end deadlines in ATM LANs.
Proceedings of the 1995 International Conference on Network Protocols, 1995

Hard real-time communications with weighted round robin service in ATM local area networks.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Guaranteeing End-to-End Deadlines in ATM Networks.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

1994
Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol.
IEEE Trans. Computers, 1994

The Timed-Token Protocol for Real-Time Communications.
Computer, 1994

Performance Evaluation of Admission Policies in ATM Based Embedded Real-Time Systems.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

On Available Bandwidth in FDDI-Based Reconfigurable Networks.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Performance Evaluation of a Bandwidth Allocation Scheme for Guaranteeing Synchronous Messages with Arbitrary Deadlines in an FDDI Network.
Proceedings of the Real-Time Systems Symposium. Raleigh-Durham, NC, USA, December 1993, 1993

Guaranteeing synchronous messages with arbitrary deadline constraints in an FDDI network.
Proceedings of the 18th Conference on Local Computer Networks, 1993

Local Synchronous Capacity Allocation Schemes for Guaranteeing Message Deadlines with the Timed Token Protocol.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

Real-Time Schedulability of Two Token Ring Protocols.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

Predictability and Scalability of Real-Time Scheduling.
Proceedings of the Fifth Euromicro Workshop on Real-Time Systems, 1993

1992
Issues in Building Dynamic Real-Time Systems.
IEEE Softw., 1992

User-controlled optimization of task scheduling for imprecise computer systems.
Inf. Softw. Technol., 1992

Optimal synchronous capacity allocation for hard real-time communications with the timed token protocol.
Proceedings of the Real-Time Systems Symposium, 1992

Advances in hard real-time communication with local area networks.
Proceedings of the 17th Conference on Local Computer Networks, 1992

Guaranteeing Synchronous Message Deadlines with the Timed Token Protocol.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Performance evaluation of scheduling algorithms for imprecise computer systems.
J. Syst. Softw., 1991

Algorithms for Scheduling Imprecise Computations.
Computer, 1991

Version selection schemes for hard real-time communications.
Proceedings of the Real-Time Systems Symposium, 1991

Performance of an Extended IEEE 802.5 Protocol in Hard Real-Time Systems.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

A comparative study of three token ring protocols for real-time communications.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
A Window Protocol for Transmission of Time-Constrained Messages.
IEEE Trans. Computers, 1990

Guarantee Protocols for Communication in Distributed Hard Real-Time Systems.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990

GARTL: A Real-time Programming Language Based on Multi-version Computation.
Proceedings of the 1990 Internation Conference on Computer Languages, 1990

1989
Distributed Scheduling of Tasks with Deadlines and Resource Requirements.
IEEE Trans. Computers, 1989

Guest Editor's Introduction - Special Issue on Real-Time Computing Systems.
ACM SIGOPS Oper. Syst. Rev., 1989

Performance Analysis of FCFS and Improved FCFS Scheduling Algorithms for Dynamic Real-Time Computer Systems.
Proceedings of the Real-Time Systems Symposium, 1989

1988
On Real-Time Transactions.
SIGMOD Rec., 1988

A Multi-Access Window Protocol for Transmission of Time Constrained Messages.
Proceedings of the 8th International Conference on Distributed Computing Systems, 1988

1987
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems.
IEEE Trans. Software Eng., 1987

Virtual Time CSMA Protocols for Hard Real-Time Communication.
IEEE Trans. Software Eng., 1987

Preemptive Scheduling Under Time and Resource Constraints.
IEEE Trans. Computers, 1987

Simple and integrated heuristic algorithms for scheduling tasks with time and resource constraints.
J. Syst. Softw., 1987

Meta-Level Control in Distributed Real-Time Systems.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
A Virtual Time CSMA Protocol for Hard Real Time Communication.
Proceedings of the 7th IEEE Real-Time Systems Symposium (RTSS '86), 1986

1985
Distributed Scheduling Using Bidding and Focused Addressing.
Proceedings of the 6th IEEE Real-Time Systems Symposium (RTSS '85), 1985


  Loading...