Yueming Lu

Orcid: 0000-0003-3196-0349

According to our database1, Yueming Lu authored at least 169 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A collaborative ledger storing model for lightweight blockchains based on Chord Ring.
J. Supercomput., March, 2024

Physical-Layer Attack Detection and Countermeasures for RIS-Assisted MIMO Systems.
IEEE Wirel. Commun. Lett., January, 2024

2023
A Security Resilience Metric Framework Based on the Evolution of Attack and Defense Scenarios.
IEEE Internet Things J., October, 2023

A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT.
IEEE Internet Things J., August, 2023

High-Performance Intermediate-Frequency Balanced Homodyne Detector for Local Local Oscillator Continuous-Variable Quantum Key Distribution.
Symmetry, July, 2023

Channel Estimation for Massive MIMO Uplink Under Active Jamming Attack.
IEEE Syst. J., June, 2023

Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference.
Cryptogr., March, 2023

A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing.
Clust. Comput., February, 2023

DoSDefender: A Kernel-Mode TCP DoS Prevention in Software-Defined Networking.
Sensors, 2023

Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Blockchain Storage Method Based on Erasure Code.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Cluster Analysis of Target Events Based on Multidimensional Network Traffic Characteristics.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Machine Learning-Empowered Beam Management for mmWave-NOMA in Multi-UAVs Networks.
IEEE Trans. Veh. Technol., 2022

Joint Optimization for Mobile Edge Computing-Enabled Blockchain Systems: A Deep Reinforcement Learning Approach.
Sensors, 2022

CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things.
Pervasive Mob. Comput., 2022

CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network.
IEEE Internet Things J., 2022

A controllable privacy data transmission mechanism for Internet of things system based on blockchain.
Int. J. Distributed Sens. Networks, 2022

Experimental Demonstration of 2D-Trellis Coded Modulation PAM8 for 50G PON Based on 10G-class O-Band DML.
Proceedings of the 2022 27th OptoElectronics and Communications Conference (OECC) and 2022 International Conference on Photonics in Switching and Computing (PSC), 2022

Progressive Evolution Scheme with Socialization Swarm for Privacy Blockchain.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

Heterogeneity-Aware Federated Learning for Device Anomaly Detection in Industrial loT.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Latency-Efficient Parallelized Carrier Phase Recovery Algorithm Based on Extended Kalman Filter for Short-Reach Coherent Optical Transmission Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Privacy-preserving Trajectory Generation Algorithm Considering Utility based on Semantic Similarity Awareness.
Proceedings of the IEEE International Conference on Communications, 2022

Research on Lightweight Blockchain Technology Based on Edge Computing.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Privacy Protection Management Model for Internet of Things Data.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey Clustering.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Design and Implementation of Network Traffic Analysis System for Power Grid Metering System.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Access Control Mechanism for Edge Nodes.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks.
IEEE Trans. Ind. Informatics, 2021

Attack Detection for Massive MIMO Relay System.
IEEE Syst. J., 2021

Controlled Sharing Mechanism of Data Based on the Consortium Blockchain.
Secur. Commun. Networks, 2021

A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks.
Secur. Commun. Networks, 2021

Threshold Dynamics of a Diffusive Herpes Model Incorporating Fixed Relapse Period in a Spatial Heterogeneous Environment.
Complex., 2021

Anti-Collision Voting Based on Bluetooth Low Energy Improvement for the Ultra-Dense Edge.
IEEE Access, 2021

Wireless Traffic Prediction with Series Fluctuation Pattern Clustering.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Enhancing Continuous Service of Information Systems Based on Cyber Resilience.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

The Survey on the development of Secure Multi-Party Computing in the blockchain.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

The Controlled Sharing Mechanism for Private Data Based on Blockchain.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Research on Strategy Selection of Dynamic Defense Based on Game Theory.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Research on Progress of Blockchain Access Control.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Rooted Subtrees Recursive Neural Networks on Graphs.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against i.i.d. Attacks.
IEEE Trans. Veh. Technol., 2020

Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access.
Sensors, 2020

Intelligent Cooperative Edge Computing in Internet of Things.
IEEE Internet Things J., 2020

Sphere decoder with box optimisation for faster-than-Nyquist non-orthogonal frequency division multiplexing.
IET Commun., 2020

Simplified Soft-Output Direct Detection FTN Algorithm for 56-Gb/S Optical PAM-4 System Using 10G-Class Optics.
IEEE Access, 2020

A Trusted Resource-Based Routing Algorithm With Entropy Estimation in Integrated Space-Terrestrial Network.
IEEE Access, 2020

Dynamic Antenna Configuration for 3D Massive MIMO System via Deep Reinforcement Learning.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

An Information Security Evaluation Model Supporting Measurement Model Adaptation.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Blockchain-Based Power Metering Data Abnormal Monitoring Model Electric Energy Data Abnormal Monitoring Model.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Logical Combination Based Application Layer Intrusion Detection Model.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Distributed File System Multilevel Fault-Tolerant High Availability Mechanism.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Multi-source and multi-dimensional network security situational awareness model.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Blockchain-based trusted sharing of electric energy privacy data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Blockchain-based privacy protection scheme for electric energy metering data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Research and Application of Blockchain Technology in Smart Grid.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Low-Complexity Linear Equalizers for OTFS Exploiting Two-Dimensional Fast Fourier Transform.
CoRR, 2019

Blind Channel Separation in Massive MIMO System under Pilot Spoofing and Jamming Attack.
CoRR, 2019

Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System.
IEEE Access, 2019

Spectral-Efficient L/E-ACO-SCFDM-Based Dimmable Visible Light Communication System.
IEEE Access, 2019

Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices.
IEEE Access, 2019

A Learning and RSRP-Based Interference Topology Management Scheme for Ultra-Dense Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Energy-Efficient Power Control for Ultra-Dense Networks with Distributed Antenna Arrays.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

A Method of Conflict Detection for Security Policy Based on B+ Tree.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Weakness Relevance Evaluation Method Based on PageRank.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

On the Large-Scale Traffic DDoS Threat of Space Backbone Network.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Improved Convolutional Neural Network for Chinese Sentiment Analysis in Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Artificial Intelligence-Based Semantic Internet of Things in a User-Centric Smart City.
Sensors, 2018

An improved diversity combining receiver for layered ACO-FOFDM in IM/DD systems.
Photonic Netw. Commun., 2018

Physical Detection of Misbehavior in Relay Systems With Unreliable Channel State Information.
IEEE J. Sel. Areas Commun., 2018

Towards Scalable Subscription Aggregation and Real Time Event Matching in a Large-Scale Content-Based Network.
CoRR, 2018

Sphere Decoder with Box Optimization for FTN Non-orthogonal FDM System.
CoRR, 2018

Faster-Than-Nyquist Non-Orthogonal Frequency-Division Multiplexing for Visible Light Communications.
IEEE Access, 2018

Thresholding Scheme Based on Boundary Pixels of Stripes for Visible Light Communication With Mobile-Phone Camera.
IEEE Access, 2018

Analytical Analysis of Residual Chromatic Dispersion and Self-Phase Modulation Optimal Compensation in the Fractional Domain.
IEEE Access, 2018

Deep reinforcement learning based computation offloading and resource allocation for MEC.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

An Efficient Nonlinear Equalizer for 40-Gb/s PAM4-PON Systems.
Proceedings of the Optical Fiber Communications Conference and Exposition, 2018

Diversity Combining for ACO-SCFDM in Intensity-Modulated and Direct-Detection Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Deep Q-Learning Based Dynamic Resource Allocation for Self-Powered Ultra-Dense Networks.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Blind Channel Direction Separation Against Pilot Spoofing Attack in Massive MIMO System.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
An Improved Receiving Scheme for Layered ACO-FOFDM in IM/DD Systems.
CoRR, 2017

Novel user clustering schemes for downlink NOMA system.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

On the performance of mode selection for hybrid-duplex D2D communications.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Analysis of Caching and Transmitting Scalable Videos in Cache-Enabled Small Cell Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Physical Malicious Attacks Detection in AF Relaying Systems with Unreliable CSI.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Energy-Efficient Resource Allocation in Ultra-Dense Networks with Massive MIMO.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

Enhanced Physical Layer Security for Ultra-Dense D2D Communications Underlaying Cellular Networks with Full-Duplex Users.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

Energy Efficient Resource Allocation in Multi-User Downlink Non-Orthogonal Multiple Access Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components Analysis.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

On Study of Physical-Layer Attack Detection for Large Volumes of Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Environment-Related Information Security Evaluation for Intrusion Detection Systems.
Proceedings of the Communications and Networking, 2017

2016
An Activity Recognition-Assistance Algorithm Based on Hybrid Semantic Model in Smart Home.
Int. J. Distributed Sens. Networks, 2016

Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays.
IEEE Access, 2016

Power user classification strategy of multi-view clustering.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Data integrity research of power metering automation system.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

2015
Detect Rumors Using Time Series of Social Context Information on Microblogging Websites.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Generalized likelihood ratio test multiple-symbol detection for MIMO-UWB: A semidefinite relaxation approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Intra-cell performance aware uplink opportunistic interference alignment.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

An optimized first path detector for UWB ranging using error characteristics.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Outage Analysis of Cognitive Incremental DF Relay Network in Nakagami-m Fading Channels.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Cache Replacement Improving Based on User Group Interest Degree.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Extracting News Information Based on Webpage Segmentation and Parsing DOM Tree Reversely.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Beamforming for secure two-way relay networks with physical layer network coding.
Proceedings of the IEEE Global Communications Conference, 2014

Propagation controlled cooperative positioning in wireless networks using bootstrap percolation.
Proceedings of the IEEE Global Communications Conference, 2014

2013
BER Analysis of Decision-Feedback Multiple-Symbol Detection in Noncoherent MIMO Ultrawideband Systems.
IEEE Trans. Veh. Technol., 2013

BER Analysis of Decision-Feedback Multiple Symbol Detection in Noncoherent MIMO Ultra-Wideband Systems.
CoRR, 2013

Optimization for multi-relay selection with rateless code in cooperative communication system.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Robust base-station cooperation scheme with intelligent information processing.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Efficient power control in heterogeneous Femto-Macro cell networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Cognitive Radio Relay Selection Scheme with Fairness Analyses in Two-Tier Femtocell Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

BEM-Based Reconstruction of Time-Varying Sparse Channel in OFDM Systems.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Subspace-Based Semi-Blind Channel Estimation for Large-Scale Multi-Cell Multiuser MIMO Systems.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

A Zones-Based Metadata Management Method for Distributed File System.
Proceedings of the Trustworthy Computing and Services, 2013

A Prefetching Mechanism Based on MooseFS.
Proceedings of the Trustworthy Computing and Services, 2013

Survey on Data Recovery for Cloud Storage.
Proceedings of the Trustworthy Computing and Services, 2013

Effective Rate Control Algorithm for H.264 Based on Scene Change Detection.
Proceedings of the Trustworthy Computing and Services, 2013

On using cooperative game theory to solve the wireless scalable video multicasting problem.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

An improved method for reconstruction of channel taps in OFDM systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

An improved reconstruction method for compressive sensing based OFDM channel estimation.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Limited feedback schemes based on inter-cell interference alignment in two-cell interfering MIMO-MAC.
Proceedings of IEEE International Conference on Communications, 2013

Asymmetric signal space alignment for Y channel with single-antenna users.
Proceedings of IEEE International Conference on Communications, 2013

Pilot design for large-scale multi-cell multiuser MIMO systems.
Proceedings of IEEE International Conference on Communications, 2013

Combining SURF with MSER for image matching.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

P2P traffic identification based on transfer learning.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
IFI and ISI Premitigation for Block-Code-Modulated Noncoherent UWB Impulse Radio: A Code Optimization Approach.
IEEE Trans. Veh. Technol., 2012

Self-adaptive clock frequency recovery based on buffer control.
Int. J. Commun. Syst., 2012

A Specific Physical-Layer Network Coding for MPSK Modulation in Multi-Antenna Relay Networks.
IEICE Trans. Commun., 2012

Joint uplink power and subchannel allocation in cognitive radio network.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Interference Alignment for Multi-User Multi-Way Relaying X Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

A new limited feedback scheme for interference alignment in two-cell interfering MIMO-MAC.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Cognitive interference mitigation in heterogeneous femto-macro cell networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Search Results Evaluation Based on User Behavior.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton Interpolation.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Distance Adaptive Embedding Method in Dimension Reduction.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Multi-modal Clustering Method for Web Videos.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Incorporate Spatial Information into pLSA for Scene Classification.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

C-SURF: Colored Speeded Up Robust Features.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO Systems.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

DSmT based scheduling algorithm in OFDMA systems.
Proceedings of the 19th International Conference on Telecommunications, 2012

An efficient decoding algorithm based on orthogonal projection method for asynchronous physical-layer network coding.
Proceedings of the 19th International Conference on Telecommunications, 2012

A practical approach to topic detection based on credible association rule mining.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

A tweets recommendation algorithm based on user relationship and text emotional tendentiousness.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

Query by Humming by Using Locality Sensitive Hashing Based on Combination of Pitch and Note.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

An Improved Pruning Method Based on the Number of States Possessed by Hypotheses.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

A Music Retrieval System Using Melody and Lyric.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

A Time Synchronization Method for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Zero-forcing based MIMO two-way relay with relay antenna selection: Transmission scheme and diversity analysis.
Proceedings of IEEE International Conference on Communications, 2012

Load-based controlling scheme of virtual machine migration.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A metric for measuring web search results satisfaction incorporating user behavior.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
An Enhanced End-to-End Transparent Clock Mechanism with a Fixed Delay Ratio.
IEEE Commun. Lett., 2011

2010
An Enhanced IEEE 1588 Time Synchronization for Asymmetric Communication Link in Packet Transport Network.
IEEE Commun. Lett., 2010

2009
Short-delay clock recovery for CBR services in PTN.
IEEE Commun. Lett., 2009

2008
Sensor-based performance monitoring mechanism in GMPLS-controlled networks.
IEEE Commun. Lett., 2008

A Source-oriented Failure Notification Mechanism with Adaptable Delay in ASON.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

Traffic Engineering-based Load Balancing Algorithm in GMPLS Networks.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

User-Classified Dynamic Resource Allocation for Real-Time VBR Video Transmission Based on Time-Domain Traffic Prediction.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Least Interference Optimization Based Dynamic Multi-path Routing Algorithm in ASON.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

QoS-Aware Scheduling in Emerging Novel Optical Wireless Integrated Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2005
Design and Implementation of a Middleware for Hybrid Switching Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
Towards a Distributed Modeling and Simulation Environment for Networks.
Proceedings of the Grid and Cooperative Computing, 2004

2001
Active Network Supports for Mobile IP.
J. Comput. Sci. Technol., 2001


  Loading...