Xiaolin Chang

Orcid: 0000-0002-2975-8857

According to our database1, Xiaolin Chang authored at least 187 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur., December, 2024

Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
IEEE Trans. Netw. Serv. Manag., April, 2024

Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC.
IEEE Trans. Computers, April, 2024

An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus.
IEEE Trans. Netw. Serv. Manag., February, 2024

PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
IEEE Internet Things J., January, 2024

Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption.
CoRR, 2024

2023
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View.
Int. J. Comput. Intell. Syst., December, 2023

Exploring best-matched embedding model and classifier for charging-pile fault diagnosis.
Cybersecur., December, 2023

Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm.
IEEE Trans. Intell. Transp. Syst., November, 2023

Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
Comput. J., October, 2023

A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism.
IEEE Internet Things J., July, 2023

Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading.
IEEE Trans. Netw. Serv. Manag., June, 2023

Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach.
IEEE Trans. Veh. Technol., April, 2023

Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
IEEE Trans. Veh. Technol., February, 2023

Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
IEEE Trans. Veh. Technol., February, 2023

Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT.
IEEE Trans. Serv. Comput., 2023

Impact of Service Function Aging on the Dependability for MEC Service Function Chain.
IEEE Trans. Dependable Secur. Comput., 2023

Understanding NFV-Enabled Vehicle Platooning Application: A Dependability View.
IEEE Trans. Cloud Comput., 2023

Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
IEEE Internet Things J., 2023

RSMS: Towards Reliable and Secure Metaverse Service Provision.
CoRR, 2023

On Metaverse Application Dependability Analysis.
CoRR, 2023

PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
CoRR, 2023

Understanding Container-based Services under Software Aging: Dependability and Performance Views.
CoRR, 2023

Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain.
CoRR, 2023

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC.
CoRR, 2023

CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
CoRR, 2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
CoRR, 2023

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis.
CoRR, 2023

Trust and Rewards in a Two-Tier Consensus Architecture.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
Proceedings of the IEEE International Conference on Communications, 2023

DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
Proceedings of the IEEE International Conference on Communications, 2023

PBFT with Gated Prioritized Block Cycles.
Proceedings of the IEEE International Conference on Communications, 2023

Fast Cycle Multiple Entry PBFT Consensus.
Proceedings of the IEEE International Conference on Communications, 2023

Analytical evaluation of three attacks on Ethereum.
Proceedings of the IEEE Global Communications Conference, 2023

SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT.
IEEE Trans. Veh. Technol., 2022

Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization.
IEEE Trans. Veh. Technol., 2022

Job Completion Time Under Migration-Based Dynamic Platform Technique.
IEEE Trans. Serv. Comput., 2022

Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
IEEE Trans. Netw. Serv. Manag., 2022

Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment.
IEEE Trans. Green Commun. Netw., 2022

Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach.
IEEE Trans. Cloud Comput., 2022

Revisiting FAW attack in an imperfect PoW blockchain system.
Peer-to-Peer Netw. Appl., 2022

A high performance two-layer consensus architecture for blockchain-based IoT systems.
Peer-to-Peer Netw. Appl., 2022

Reducing the number of transaction messages in bitcoin.
Peer-to-Peer Netw. Appl., 2022

Understanding MEC empowered vehicle task offloading performance in 6G networks.
Peer-to-Peer Netw. Appl., 2022

DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
Peer-to-Peer Netw. Appl., 2022

Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022

Scalable Self-Sovereign Identity Architecture.
IEEE Netw., 2022

AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples.
J. Inf. Secur. Appl., 2022

DI-AA: An interpretable white-box attack for fooling deep neural networks.
Inf. Sci., 2022

IWA: Integrated gradient-based white-box attacks for fooling deep neural networks.
Int. J. Intell. Syst., 2022

LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X.
IACR Cryptol. ePrint Arch., 2022

An adaptive phase-field model based on bilinear elements for tensile-compressive-shear fracture.
Comput. Math. Appl., 2022

Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks.
IEEE Access, 2022

Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment.
IEEE Access, 2022

Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
Proceedings of the IEEE Smartworld, 2022

Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Dual-UAV Aided Secure Dynamic G2U Communication.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

TISM-CAE: A Fast Unsupervised Learning Method for Trajectory Similarity Measure via Convolutional Auto-Encoder.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
Proceedings of the IEEE International Conference on Communications, 2022

Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Proof of Stake Voting in Multiple Entry PBFT System.
Proceedings of the IEEE International Conference on Communications, 2022

Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
Proceedings of the IEEE Global Communications Conference, 2022

Evaluating fork after withholding (FAW) attack in Bitcoin.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

2021
Adapting PBFT for Use With Blockchain-Enabled IoT Systems.
IEEE Trans. Veh. Technol., 2021

Resilience-Driven Quantitative Analysis of Vehicle Platooning Service.
IEEE Trans. Veh. Technol., 2021

Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks.
IEEE Trans. Netw. Serv. Manag., 2021

On Selfholding Attack Impact on Imperfect PoW Blockchain Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Cost-effective migration-based dynamic platform defense technique: a CTMDP approach.
Peer-to-Peer Netw. Appl., 2021

Performance analysis of heterogeneous cloud-edge services: A modeling approach.
Peer-to-Peer Netw. Appl., 2021

LSGAN-AT: enhancing malware detector robustness against adversarial examples.
Cybersecur., 2021

Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum.
CoRR, 2021

Generalizing Adversarial Examples by AdaBelief Optimizer.
CoRR, 2021

A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion.
CoRR, 2021

Towards interpreting ML-based automated malware detection models: a survey.
CoRR, 2021

Towards Interpretable Ensemble Learning for Image-based Malware Detection.
CoRR, 2021

LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X.
Ad Hoc Networks, 2021

BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System.
IEEE Access, 2021

Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System.
Proceedings of the ICC 2021, 2021

A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording.
Proceedings of the ICC 2021, 2021

Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
Proceedings of the IEEE Global Communications Conference, 2021

Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
Proceedings of the IEEE Global Communications Conference, 2021

Trade-offs in large blockchain-based IoT system design.
Proceedings of the IEEE Global Communications Conference, 2021

Voting control in multiple entry PBFT blockchain systems for IoT.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Mec<sup>2</sup>: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., 2020

Modeling of Bitcoin's Blockchain Delivery Network.
IEEE Trans. Netw. Sci. Eng., 2020

Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks.
IEEE Trans. Netw. Sci. Eng., 2020

Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Performance Modeling of Linux Network System with Open vSwitch.
Peer-to-Peer Netw. Appl., 2020

Performance analysis of Hyperledger Fabric platform: A hierarchical model approach.
Peer-to-Peer Netw. Appl., 2020

Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach.
Inf. Sci., 2020

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
Cybersecur., 2020

Stochastic Modeling Approaches for Analyzing Blockchain: A Survey.
CoRR, 2020

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.
Comput. Secur., 2020

Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies.
Comput. J., 2020

Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification.
IEEE Access, 2020

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives.
IEEE Access, 2020

Numerical Evaluation of Job Finish Time Under MTD Environment.
IEEE Access, 2020

Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views.
IEEE Access, 2020

PBFT-based ordering service for IoT domains.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Comparison of single- and multiple entry point PBFT for IoT blockchain systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

On the Benefits of Compact Blocks in Bitcoin.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Multiple entry point PBFT for IoT systems.
Proceedings of the IEEE Global Communications Conference, 2020

Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin.
Proceedings of the IEEE Global Communications Conference, 2020

Model-based Performance Evaluation of a Moving Target Defense System.
Proceedings of the IEEE Global Communications Conference, 2020

2019
An adaptive orthogonal improved interpolating moving least-square method and a new boundary element-free method.
Appl. Math. Comput., July, 2019

Quantitative security analysis of a dynamic network system under lateral movement-based attacks.
Reliab. Eng. Syst. Saf., 2019

Data Lifetime Estimation in a Multicast-Based CoAP Proxy.
Open J. Internet Things, 2019

基于拟态防御的管理信息系统 (Management Information System Based on Mimic Defense).
计算机科学, 2019

BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.
IEEE Internet Things J., 2019

Reliable and Secure Vehicular Fog Service Provision.
IEEE Internet Things J., 2019

NURBS-enhanced line integration boundary element method for 2D elasticity problems with body forces.
Comput. Math. Appl., 2019

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples.
IEEE Access, 2019

Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Towards a Blockchain-Based Healthcare Information System : Invited Paper.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Block Delivery Time in Bitcoin Distribution Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Assessing transferability of adversarial examples against malware detection classifiers.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload.
IEEE Trans. Cloud Comput., 2018

Transient performance analysis of smart grid with dynamic power distribution.
Inf. Sci., 2018

Model-based sensitivity analysis of IaaS cloud availability.
Future Gener. Comput. Syst., 2018

Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers.
Comput. J., 2018

Modeling and Analysis of High Availability Techniques in a Virtualized System.
Comput. J., 2018

Regularized moving least-square method and regularized improved interpolating moving least-square method with nonsingular moment matrices.
Appl. Math. Comput., 2018

NE-IIBEFM for problems with body forces: A seamless integration of the boundary type meshfree method and the NURBS boundary in CAD.
Adv. Eng. Softw., 2018

Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Interest Relevance-Based Caching Design in Content-Centric Networking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Kernel Based Estimation of Domain Parameters at IoT Proxy.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Towards Robust Green Virtual Cloud Data Center Provisioning.
IEEE Trans. Cloud Comput., 2017

The Boundary Element Method with a Fast Multipole Accelerated Integration Technique for 3D Elastostatic Problems with Arbitrary Body Forces.
J. Sci. Comput., 2017

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking.
IEEE Access, 2017

Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric).
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Performance Analysis Model for Fog Services under Multiple Resource Types.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017

Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017

2016
Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue.
IEEE Trans. Serv. Comput., 2016

InSAR Observation and Numerical Modeling of the Earth-Dam Displacement of Shuibuya Dam (China).
Remote. Sens., 2016

Remote Sensing of Deformation of a High Concrete-Faced Rockfill Dam Using InSAR: A Study of the Shuibuya Dam, China.
Remote. Sens., 2016

Resource-Aware Virtual Network Parallel Embedding Based on Genetic Algorithm.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Performability Analysis for IaaS Cloud Data Center.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Model-Based Survivability Analysis of a Virtualized System.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

2015
Modeling Heterogeneous Virtual Machines on IaaS Data Centers.
IEEE Commun. Lett., 2015

OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
Concurr. Comput. Pract. Exp., 2015

2014
Performance of AI algorithms for mining meaningful roles.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Performance evaluation of artificial intelligence algorithms for virtual network embedding.
Eng. Appl. Artif. Intell., 2013

Effective and efficient AI-based approaches to cloud resource provisioning.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Simulated annealing based resource allocation for cloud data centers.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Green cloud virtual network provisioning based ant colony optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

2012
A novel particle swarm optimization algorithm based on particle migration.
Appl. Math. Comput., 2012

Embedding Virtual Infrastructure Based on Genetic Algorithm.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Robust and Efficient Response to TCG TOCTOU Attacks in TPVM.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Network state aware virtual network parallel embedding.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Migration cost aware virtual network re-embedding in presence of resource failures.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Reducing power consumption in embedding virtual infrastructures.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2009
LWRM: A lightweight response mechanism for TCG TOCTOU attack.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
A contact model based on the SQP algorithm and engineering application.
Appl. Math. Comput., 2008

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008

2007
A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

2006
The effects of AQM on the performance of Assured Forwarding Service.
Comput. Commun., 2006

A stable queue-based adaptive controller for improving AQM performance.
Comput. Networks, 2006

A control-theoretic approach to improving fairness in DCF based WLANs.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
On improving bandwidth assurance in AF-based DiffServ networks using a control theoretic approach.
Comput. Networks, 2005

An adaptive queue management mechanism for improving TCP fairness in the infrastructure WLAN.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

The effects of AQM on the performance of assured forwarding services.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Applying adaptive virtual queue to improve the performance of the assured forwarding service.
Proceedings of IEEE International Conference on Communications, 2005

2004
A robust PI controller for improving performance in the AF-based differentiated services network.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

A robust nonlinear PI controller for improving AQM performance.
Proceedings of IEEE International Conference on Communications, 2004

An integral sliding mode based AQM mechanism for stable queue length.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Adaptive marking threshold for assured forwarding services.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

Adaptive marking threshold for improving bandwidth assurance in a differentiated services network.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...