Yang Xiao

According to our database1, Yang Xiao authored at least 312 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Open-Source License Violations of Binary Software at Large Scale.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

TPLP: Two-Phase Selection Link Prediction for Vertex in Graph Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Mitigation Process for DNS Flood Attacks.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
A Delayed-Excitation Data Acquisition Method for High-Frequency Ultrasound Imaging.
IEEE Trans. Biomed. Engineering, 2018

A Deferrable Energy Scheduling Algorithm in Smart Grid Distribution.
MONET, 2018

Dynamic Fault Tolerant Topology Control for Wireless Sensor Network Based on Node Cascading Failure.
Int. J. Online Eng., 2018

A Novel GPS Based Real Time Orbit Determination Using Adaptive Extended Kalman Filter.
IEICE Transactions, 2018

Improving performance of transactional memory through machine learning.
Concurrency and Computation: Practice and Experience, 2018

Breast lesion classification based on supersonic shear-wave elastography and automated lesion segmentation from B-mode ultrasound images.
Comp. in Bio. and Med., 2018

Retailer credit guarantee in a supply chain with capital constraint under push & pull contract.
Computers & Industrial Engineering, 2018

A Novel Trust Evaluation Mechanism for Collaborative Filtering Recommender Systems.
IEEE Access, 2018

Topic-Specific Retweet Count Ranking for Weibo.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Deep Multi-scale Learning on Point Sets for 3D Object Recognition.
Proceedings of the Image and Graphics Technologies and Applications, 2018

Hand: Header-Assisted Network Decoding.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

ANE: Network Embedding via Adversarial Autoencoders.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

DCFEE: A Document-level Chinese Financial Event Extraction System based on Automatically Labeled Training Data.
Proceedings of ACL 2018, Melbourne, Australia, July 15-20, 2018, System Demonstrations, 2018

2017
Bio-inspired Patrolling Scheme Design in Wireless and Mobile Sensor and Robot Networks.
Wireless Personal Communications, 2017

P-Accountability: A Quantitative Study of Accountability in Networked Systems.
Wireless Personal Communications, 2017

Performance Analysis of a RTS/CTS-Based Channel Accessing Mechanism for MU-MIMO WLANs.
Wireless Personal Communications, 2017

Extensible time synchronisation protocol for wireless sensor networks.
IJSNet, 2017

Malicious device inspection home area network in smart grids.
IJSNet, 2017

Studying the capture of stochastic events using radar and a mobile robot.
IJSNet, 2017

A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
IJDSN, 2017

An Adaptive Vehicle Detection Algorithm Based on Magnetic Sensors in Intelligent Transportation Systems.
Ad Hoc & Sensor Wireless Networks, 2017

Time Synchronization for Wireless Sensor Networks with a Mobile Node.
Ad Hoc & Sensor Wireless Networks, 2017

A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Body Movement Analysis and Recognition.
Proceedings of the Context Aware Human-Robot and Human-Agent Interaction, 2016

Assessing the Feasibility of Passive and BAP RFID Communications on Construction Site Scenarios.
IEEE Systems Journal, 2016

Effects of Non-Elevation-Focalized Linear Array Transducer on Ultrasound Plane-Wave Imaging.
Sensors, 2016

A survey of accountability in computer networks and distributed systems.
Security and Communication Networks, 2016

Home area network accountability with varying consumption devices in smart grid.
Security and Communication Networks, 2016

Efficient Airport Detection Using Line Segment Detector and Fisher Vector Representation.
IEEE Geosci. Remote Sensing Lett., 2016

Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model.
Inf. Sci., 2016

Non-intrusive Traffic Data Collection with Wireless Sensor Networks for Intelligent Transportation Systems.
Ad Hoc & Sensor Wireless Networks, 2016

Reduction of Hospital Readmissions through Clustering Based Actionable Knowledge Mining.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Improving Performance of Transactional Applications through Adaptive Transactional Memory.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Improving Users' Demographic Prediction via the Videos They Talk about.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Multi-scale RANSAC algorithm for needle localization in 3D ultrasound guided puncture surgery.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Predicting Restaurant Consumption Level through Social Media Footprints.
Proceedings of the COLING 2016, 2016

Reduction of Readmissions to Hospitals Based on Actionable Knowledge Discovery and Personalization.
Proceedings of the Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery, 2016

2015
PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks.
Wireless Communications and Mobile Computing, 2015

Monitoring power transmission lines using a wireless sensor network.
Wireless Communications and Mobile Computing, 2015

Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks.
IEEE Trans. Cybernetics, 2015

Smart Grid Attacks and Countermeasures.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2015

Network forensics analysis using Wireshark.
IJSN, 2015

Security tests and attack experimentations of ProtoGENI.
IJSN, 2015

Robust Localization Algorithm Based on the RSSI Ranging Scope.
IJDSN, 2015

A multi-resolution accountable logging and its applications.
Computer Networks, 2015

Shape feature encoding via Fisher Vector for efficient fall detection in depth-videos.
Appl. Soft Comput., 2015

Ranking algorithm based on relational topic model.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Topic optimization method based on Laplace score.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

BCGI: A fast approach to detect malicious meters in neighborhood area smart grid.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Automatic Optimization of Software Transactional Memory Through Linear Regression and Decision Tree.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An easily-achieved time-domain beamformer for ultrafast ultrasound imaging based on compressive sensing.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

A new shear wave imaging system for ultrasound elastography.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Optimal design of a compound hybrid system consisting of torque coupling and energy regeneration for hydraulic hybrid excavator.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
Accountability and Q-Accountable Logging in Wireless Networks.
Wireless Personal Communications, 2014

Deterministic deployment based on information coverage in wireless sensor networks.
Wireless Communications and Mobile Computing, 2014

The effects of wireless communication failures on group behavior of mobile sensors.
Wireless Communications and Mobile Computing, 2014

mCENTRIST: A Multi-Channel Feature Generation Mechanism for Scene Categorization.
IEEE Trans. Image Processing, 2014

Complex Function Approximation Using Two-Dimensional Interpolation.
IEEE Trans. Computers, 2014

Achieving Accountability in Smart Grid.
IEEE Systems Journal, 2014

A Digital Multigate Doppler Method for High Frequency Ultrasound.
Sensors, 2014

GlobalView: building global view with log files in a distributed/networked system for accountability.
Security and Communication Networks, 2014

Virtual flow-net for accountability and forensics of computer and network systems.
Security and Communication Networks, 2014

Human-Robot Interaction by Understanding Upper Body Gestures.
Presence, 2014

A survey of biological collaboration models.
J. Ambient Intelligence and Humanized Computing, 2014

Range-based localisation algorithms integrated with the probability of ranging error in wireless sensor networks.
IJSNet, 2014

Asynchronous multi-channel neighbour discovery for energy optimisation in wireless sensor networks.
IJSNet, 2014

Collision-free multichannel superframe scheduling for IEEE 802.15.4 cluster-tree networks.
IJSNet, 2014

Ubiquitous Context-Awareness and Wireless Sensor Networks.
IJDSN, 2014

Reduced-error constant correction truncated multiplier.
IEICE Electronic Express, 2014

A parallel arithmetic array for accelerating compute-intensive applications.
IEICE Electronic Express, 2014

Achieving Accountable MapReduce in cloud computing.
Future Generation Comp. Syst., 2014

High performance mobile opportunistic systems.
Trans. Emerging Telecommunications Technologies, 2014

A Survey of Cross-Layer Designs in Wireless Networks.
IEEE Communications Surveys and Tutorials, 2014

Activity recognition in unconstrained RGB-D video using 3D trajectories.
Proceedings of the SIGGRAPH Asia 2014 Autonomous Virtual Humans and Social Robot for Telepresence, 2014

The diffserv cognitive network node with Controlled-UDP.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

A novel secure MIMO cognitive network.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks.
Proceedings of the IEEE International Conference on Communications, 2014

Knowledge Sharing via Social Login: Exploiting Microblogging Service for Warming up Social Question Answering Websites.
Proceedings of the COLING 2014, 2014

2013
Random time source protocol in wireless sensor networks and synchronization in industrial environments.
Wireless Communications and Mobile Computing, 2013

Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids.
IEEE Trans. Smart Grid, 2013

A critical line based boundary surveillance strategy in wireless sensor networks.
Telecommunication Systems, 2013

Stochastic event capturing with a single mobile robot in rectangular perimeters.
Telecommunication Systems, 2013

FTDA: outlier detection-based fault-tolerant data aggregation for wireless sensor networks.
Security and Communication Networks, 2013

Cipher feedback mode under go-back-N and selective-reject protocols in error channels.
Security and Communication Networks, 2013

Disturbance attenuation for nonlinear switched descriptor systems based on neural network.
Neural Computing and Applications, 2013

Mobile sensor intrusion detection under any shape of curve.
Mathematical and Computer Modelling, 2013

Security Spectrum Auction Framework for Cognitive Radio Networks.
JCP, 2013

Security and Privacy in Cloud Computing.
IEEE Communications Surveys and Tutorials, 2013

Game Theory for Network Security.
IEEE Communications Surveys and Tutorials, 2013

Non-repudiation in neighborhood area networks for smart grid.
IEEE Communications Magazine, 2013

Human-virtual human interaction by upper body gesture understanding.
Proceedings of the 19th ACM Symposium on Virtual Reality Software and Technology, 2013

The Evolution of Poyang Lake Wetland Hydroecology.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2013

Quantitative analysis of peri-tumor tissue elasticity based on shear-wave elastography for breast tumor classification.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Ultrasound contrast image segmentation using a modified level set method.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks.
IEEE Trans. Mob. Comput., 2012

A survey of security visualization for computer network logs.
Security and Communication Networks, 2012

Accountability using flow-net: design, implementation, and performance evaluation.
Security and Communication Networks, 2012

Multi-users Cooperative Transmitting Algorithm in Cognitive WLAN.
JNW, 2012

Error analysis of range-based localisation algorithms in wireless sensor networks.
IJSNet, 2012

The effect of leaders on the consistency of group behaviour.
IJSNet, 2012

PeerReview re-evaluation for accountability in distributed systems or networks.
IJSN, 2012

Internet of things' authentication and access control.
IJSN, 2012

A Survey of Reference Structure for Sensor Systems.
IEEE Communications Surveys and Tutorials, 2012

Studying the stochastic capturing of moving intruders by mobile sensors.
Computers & Mathematics with Applications, 2012

Adaptive Backstepping Neural Control for Switched Nonlinear Stochastic System with Time-Delay Based on Extreme Learning Machine.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Authentication and Access Control in the Internet of Things.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Q-Accountable: A overhead-based quantifiable accountability in wireless networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Low power memristor-based ReRAM design with Error Correcting Code.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

2011
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags.
Wireless Communications and Mobile Computing, 2011

Wireless monitoring and control.
Wireless Communications and Mobile Computing, 2011

Architecture and protocol design for a pervasive robot swarm communication networks.
Wireless Communications and Mobile Computing, 2011

Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags.
TAAS, 2011

A Cross-Layer Approach for Prioritized Frame Transmissions of MPEG-4 Over the IEEE 802.11 and IEEE 802.11e Wireless Local Area Networks.
IEEE Systems Journal, 2011

Temporal Accountability and Anonymity in Medical Sensor Networks.
MONET, 2011

Wireless telemedicine and m-health: technologies, applications and research issues.
IJSNet, 2011

Error compensation algorithm in wireless sensor networks synchronisation.
IJSNet, 2011

Hidden information in Microsoft Word.
IJSN, 2011

Advances in multimedia communications.
Int. J. Communication Systems, 2011

Performance Analysis of the Improved Droptail Router.
IEICE Transactions, 2011

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks.
Computer Networks, 2011

Home M2M networks: Architectures, standards, and QoS improvement.
IEEE Communications Magazine, 2011

Passive Data Storage Based Housewares Store Management System.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Building Accountable Smart Grids in Neighborhood Area Networks.
Proceedings of the Global Communications Conference, 2011

Polynomial Regression Based Secure Data Aggregation for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2010

Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks.
IEEE Trans. Industrial Electronics, 2010

Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed.
IEEE Trans. Industrial Electronics, 2010

Special issue on "security for multimedia and ubiquitous applications".
Telecommunication Systems, 2010

Performance Analysis of Contention Based Bandwidth Request Mechanisms in WiMAX Networks.
IEEE Systems Journal, 2010

MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks.
IJSNet, 2010

Dynamic bandwidth partition schemes for integrated voice, video, and data traffic in the IEEE 802.11e distributed wireless LANs.
Int. J. Communication Systems, 2010

Parameter Conditions for TCP/AQM Routers Based on 2-D s-z Domain Stability Analysis.
IEEE Communications Letters, 2010

IEEE 802.11 user fingerprinting and its applications for intrusion detection.
Computers & Mathematics with Applications, 2010

Modeling IEEE 802.11 DCF System Dynamics.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Power Management Scheduling for Low Rate Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

A Quantitative Study of Accountability in Wireless Multi-hop Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Differentiate Backoff Mechanisms for Transmission Directions in IEEE 802.11 Multihop WLANs.
Proceedings of IEEE International Conference on Communications, 2010

Hybrid traffics congestion control based on 2-D Hurwitz-Schur stability.
Proceedings of the 11th International Conference on Control, 2010

Building Global View with Log Files in a Distributed/Network System.
Proceedings of the Global Communications Conference, 2010

Signature Maximization in Designing Wireless Binary Pyroelectric Sensors.
Proceedings of the Global Communications Conference, 2010

An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs.
Wireless Networks, 2009

E2SRT: enhanced event-to-sink reliable transport for wireless sensor networks.
Wireless Communications and Mobile Computing, 2009

Stream-based cipher feedback mode in wireless error channel.
IEEE Trans. Wireless Communications, 2009

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks.
IEEE Trans. Wireless Communications, 2009

Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN.
IEEE Trans. Vehicular Technology, 2009

Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2009

Hybrid Geographic Routing for Flexible Energy - Delay Tradeoff.
IEEE Trans. Vehicular Technology, 2009

Aggregation with fragment retransmission for very high-speed WLANs.
IEEE/ACM Trans. Netw., 2009

Multiple Human Tracking and Identification With Wireless Distributed Pyroelectric Sensor Systems.
IEEE Systems Journal, 2009

NTRU-based sensor network security: a low-power hardware implementation perspective.
Security and Communication Networks, 2009

Flow-net methodology for accountability in wireless networks.
IEEE Network, 2009

Delay-Constrained Optimal Data Aggregation in Hierarchical Wireless Sensor Networks.
MONET, 2009

Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications.
IEEE Journal on Selected Areas in Communications, 2009

Primate social systems, scent-marking and their applications in mobile and static sensor networks.
IJSNet, 2009

IPSA: a novel architecture design for integrating IP and sensor networks.
IJSNet, 2009

The Necessary and Sufficient Condition of a Class of Quasi-Cyclic LDPC Codes without Girth Four.
IEICE Transactions, 2009

Secure data aggregation in wireless sensor networks: A comprehensive overview.
Computer Networks, 2009

Energy Consumption of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies.
Proceedings of the Wireless Algorithms, 2009

A novel cooperative communication protocol for QoS provisioning in wireless sensor networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Stochastic Event Capture Using Single Robot Moving along a Certain Track.
Proceedings of the MSN 2009, 2009

Performance Limits of Fair-Access in Underwater Sensor Networks.
Proceedings of the ICPP 2009, 2009

Performance Analysis of p-Persistent Aloha for Multi-hop Underwater Acoustic Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Error Analysis of Scheduling Sleeping Nodes in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

A Linear Time Synchronization Algorithm for Underwater Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Parameter Setting and 2-D Stability Conditions for TCP/RED Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Experiments on an Election Algorithm for Decision Element Failures in 4D Future Internet Architecture.
Proceedings of the Communication and Networking, 2009

Modeling collaborative robots for detecting intrusions.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

Bio-inspired true coalition formation on intrusion detection by mobile robots.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

A Formal Method Based Case Study for Access Control.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Target tracking based on a distributed particle filter in underwater sensor networks.
Wireless Communications and Mobile Computing, 2008

Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks.
Wireless Communications and Mobile Computing, 2008

Increasing network lifetime by balancing node energy consumption in heterogeneous sensor networks.
Wireless Communications and Mobile Computing, 2008

Variable bit rate VOiP in IEEE 802.11e wireless LANs.
IEEE Wireless Commun., 2008

Queueing analysis for OFDM subcarrier allocation in broadband wireless multiservice networks.
IEEE Trans. Wireless Communications, 2008

An Enhanced Fast Handover with Low Latency for Mobile IPv6.
IEEE Trans. Wireless Communications, 2008

Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks.
IEEE Trans. Vehicular Technology, 2008

Retrieving knowledge from auditing log-files for computer and network forensics and accountability.
Security and Communication Networks, 2008

Design LDPC Codes without Cycles of Length 4 and 6.
J. Electrical and Computer Engineering, 2008

An energy-aware and intelligent cluster-based event detection scheme in wireless sensor networks.
IJSNet, 2008

Continuous Drug Infusion for Diabetes Therapy: A Closed-Loop Control System Design.
EURASIP J. Wireless Comm. and Networking, 2008

Accountability for wireless LANs, ad hoc networks, and wireless mesh networks.
IEEE Communications Magazine, 2008

Dynamic Bandwidth Partition with Finer-Tune (DP-FT) Scheme for Multimedia IEEE 802.11e WLANs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Correlation-Based Security in Time Synchronization of Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A simple algorithm for fault-tolerant topology control in wireless sensor network.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks.
Proceedings of the MSN 2008, 2008

Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Dynamic Budget Partition Scheme for Integrated Voice/Video/Data Traffic in the IEEE 802.11e WLANs.
Proceedings of IEEE International Conference on Communications, 2008

Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability.
Proceedings of IEEE International Conference on Communications, 2008

QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2008

Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Control Systems Designed for Wireless Sensor and Actuator Networks.
Proceedings of IEEE International Conference on Communications, 2008

Optimal Rate Routing in Wireless Sensor Networks with Guaranteed Lifetime.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Distributed Collaborative Control Using Wireless Sensor and Actuator Networks.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Web Based Distributed Marine Education System.
Proceedings of the Fifth International Conference on Computer Graphics, 2008

2007
Radio frequency identification: technologies, applications, and research issues.
Wireless Communications and Mobile Computing, 2007

Radio resource management and protocol engineering for IEEE 802.16 [Guest Editorial].
IEEE Wireless Commun., 2007

IEEE 802.20: mobile broadband wireless access.
IEEE Wireless Commun., 2007

Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.
IEEE Trans. Wireless Communications, 2007

Pulse Waveform Dependent BER Analysis of a DS-CDMA UWB Radio Under Multiple Access and Multipath Interferences.
IEEE Trans. Wireless Communications, 2007

Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-Based WLANs.
IEEE Trans. Mob. Comput., 2007

Wireless Broadband Access: WiMAX and Beyond - Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Networks.
IEEE Communications Magazine, 2007

An effective key management scheme for heterogeneous sensor networks.
Ad Hoc Networks, 2007

WTCP: Improved Performance of TCP for High Speed Wired/Wireless Internet.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Telemedicine Usage and Potentials.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Simulating MPEG-4 over the IEEE 802.11 WLANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Real-Time Virtual Videophone for Low-bandwidth Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Coarse-Grained Scheduling for Gateway Nodes in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Analysis of Energy Consumption for Multiple Object Identification System with Active RFID Tags.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Fusion of Region and Image-Based Techniques for Automatic Image Annotation.
Proceedings of the Advances in Multimedia Modeling, 2007

Use of Generalized Pattern Model for Video Annotation.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Effect of Channel Errors on Time Synchronization in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies.
Proceedings of the Global Communications Conference, 2007

A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Security in distributed, grid, mobile, and pervasive computing.
CRC Press, ISBN: 978-0-8493-7921-5, 2007

2006
Efficient MAC strategies for the IEEE 802.11n wireless LANs.
Wireless Communications and Mobile Computing, 2006

Investigation of the block ACK scheme in wireless ad hoc networks.
Wireless Communications and Mobile Computing, 2006

Secure cell relay routing protocol for sensor networks.
Wireless Communications and Mobile Computing, 2006

QoS guarantee and provisioning at the contention-based wireless MAC layer in the IEEE 802.11e wireless LANs.
IEEE Wireless Commun., 2006

Optimal paging load balance with total delay constraint in macrocell-microcell hierarchical cellular networks.
IEEE Trans. Wireless Communications, 2006

On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs.
IEEE Trans. Parallel Distrib. Syst., 2006

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks.
MONET, 2006

Generalized pairwise complementary codes with set-wise uniform interference-free windows.
IEEE Journal on Selected Areas in Communications, 2006

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs.
IJWMC, 2006

Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks.
IJWMC, 2006

A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks.
IJMC, 2006

Using Talking Heads for Real-Time Virtual Videophone in Wireless Networks.
IEEE MultiMedia, 2006

Wireless Network Security.
EURASIP J. Wireless Comm. and Networking, 2006

Energy-efficient scheduling and MAC for sensor networks, WPANs, WLANs, and WMANs.
Computer Communications, 2006

An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks.
Computer Communications, 2006

A New MAC Scheme for Very High-Speed WLANs.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

GPU Based Real-time Shadow Research in Large Ship-handling Simulator.
Proceedings of the 10th International Conference on Information Visualisation, 2006

Channel Allocation Algorithms for Three-tier Wireless Local Loops.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Efficient Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Secure Routing Protocol for Heterogeneous Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

GPU Based Real-time Shadow Research.
Proceedings of the Third International Conference on Computer Graphics, 2006

2005
Special Issue: Mobility, Paging, and Quality of Service Management for Future Wireless Networks.
Wireless Communications and Mobile Computing, 2005

Architecture, mobility management, and quality of service for integrated 3G and WLAN networks.
Wireless Communications and Mobile Computing, 2005

Proportional degradation services in wireless/mobile adaptive multimedia networks.
Wireless Communications and Mobile Computing, 2005

Saturation throughput analysis of error-prone 802.11 wireless networks.
Wireless Communications and Mobile Computing, 2005

IEEE 802.11n: enhancements for higher throughput in wireless LANs.
IEEE Wireless Commun., 2005

IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms.
IEEE Trans. Wireless Communications, 2005

Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs.
IEEE Trans. Wireless Communications, 2005

Differentiation, QoS Guarantee, and Optimization for Real-Time Traffic over One-Hop Ad Hoc Networks.
IEEE Trans. Parallel Distrib. Syst., 2005

Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks.
MONET, 2005

Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks.
J. Parallel Distrib. Comput., 2005

Energy saving mechanism in the IEEE 802.16e wireless MAN.
IEEE Communications Letters, 2005

Reservation and Grouping Stations for the IEEE 802.11 DCF.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

A design of orthogonal interleavers for multimodes turbo en-decoders.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Paging load balance in hierarchical cellular networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Optimal stream-based cipher feedback mode in error channel.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Vulnerabilities and security enhancements for the IEEE 802.11 WLANs.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Energy saving mechanisms in sensor networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Performance analysis of the ieee 802.11e block ACK scheme in a noisy channel.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
IEEE 802.11e: QoS provisioning at the MAC layer.
IEEE Wireless Commun., 2004

On optimizing energy consumption for mobile handsets.
IEEE Trans. Vehicular Technology, 2004

Local data control and admission control for QoS support in wireless ad hoc networks.
IEEE Trans. Vehicular Technology, 2004

Hierarchical implicit deregistration with forced registrations in 3G wireless networks.
IEEE Trans. Vehicular Technology, 2004

Design and Analysis of Location Management for 3G Cellular Networks.
IEEE Trans. Parallel Distrib. Syst., 2004

Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access.
IEEE Trans. Parallel Distrib. Syst., 2004

A simulation study of overflow replacement policies for location management in mobile networks.
IJMC, 2004

Backoff strategies for demand re-registration in PCS database failure recover.
Computer Communications, 2004

Evaluation of distributed admission control for the IEEE 802.11e EDCA.
IEEE Communications Magazine, 2004

Concatenation and piggyback mechanisms for the IEEE 802.11 MAC.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Protection and Guarantee for Voice and Video Traffic in IEEE 802.11e Wireless LANs.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A Dynamic HLR Location Management Scheme for PCS Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

An Analysis for Differentiated Services in IEEE 802.11 and IEEE 802.11e Wireless LANs.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Performance analysis of IEEE 802.11e EDCF under saturation condition.
Proceedings of IEEE International Conference on Communications, 2004

2D algebraic test for robust stability of interval time-delay systems.
Proceedings of the 8th International Conference on Control, 2004

Packing mechanisms for the IEEE 802.11n wireless LANs.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Hierarchical mobility database overflow control.
Wireless Communications and Mobile Computing, 2003

Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols.
Mobile Computing and Communications Review, 2003

A parallel shuffled paging strategy under delay bounds in wireless systems.
IEEE Communications Letters, 2003

A dynamic anchor-cell assisted paging with an optimal timer for PCS networks.
IEEE Communications Letters, 2003

A simple and effective priority scheme for IEEE 802.11.
IEEE Communications Letters, 2003

Optimal fractional movement-based scheme for PCS location management.
IEEE Communications Letters, 2003

Optimal location management for two-tier PCS networks.
Computer Communications, 2003

Enhanced DCF of IEEE 802.11e to support QoS.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Stability, controllability and observability of 2-D continuous-discrete systems.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Location Update for PCS Networks with a Fractional Movement Threshold.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Implicit deregistration in 3G cellular networks.
Proceedings of IEEE International Conference on Communications, 2003

Backoff-based priority schemes for IEEE 802.11.
Proceedings of IEEE International Conference on Communications, 2003

Movement-based location management for 3G cellular networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Throughput and delay limits of IEEE 802.11.
IEEE Communications Letters, 2002

Bandwidth degradation QoS provisioning for adaptive multimedia in wireless/mobile networks.
Computer Communications, 2002

Derivation algorithm of transfer functions of 2-D continuous-discrete systems.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

Performance of active codes detection algorithms for the downlink of TD-SCDMA system.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

Mobility database overflow control in 3G cellular networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
QoS for Adaptive Multimedia in Wireless/Mobile Networks.
Proceedings of the 9th International Workshop on Modeling, 2001

An Optimal Power Saving Scheme for Mobile Handsets.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Hurwitz-Schur stability test of interval bivariate polynomials.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

Improving degradation and fairness for mobile adaptive multimedia wireless networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
An Optimal Distributed Call Admission Control for Adaptive Multimedia in Wireless/Mobile Networks.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

Schur stability of interval bivariate polynomials.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000

Quality of service provisioning framework for multimedia traffic in wireless/mobile networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
A necessary condition for Schur stability of 2D polynomials [digital filters].
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

A finite test algorithm for 2D Schur polynomials based on complex Lyapunov equation.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999


  Loading...