The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dahai Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dahai Xu, Chunming Qiao, Yizhi Xiong
    An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:344-353 [Conf]
  2. Jikai Li, Chunming Qiao, Jinhui Xu, Dahai Xu
    Maximizing Throughput for Optical Burst Switching Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  3. Chunming Qiao, Dahai Xu
    Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part I. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  4. Dahai Xu, Yang Chen, Yizhi Xiong, Chunming Qiao, Xin He
    On finding disjoint paths in single and dual link cost networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  5. Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu
    Performance Analysis and Enhancement of the Next Generation Cellular Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:358-367 [Conf]
  6. Dahai Xu, Yang Chen, Yizhi Xiong, Chunming Qiao, Xin He
    On the complexity of and algorithms for finding the shortest path with a disjoint counterpart. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:14, n:1, pp:147-158 [Journal]
  7. Dahai Xu, Mung Chiang, Jennifer Rexford
    DEFT: Distributed Exponentially-Weighted Flow Splitting. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:71-79 [Conf]
  8. Dahai Xu, Ying Li, Mung Chiang, A. Robert Calderbank
    Optimal Provisioning of Elastic Service Availability. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1505-1513 [Conf]

  9. On Survivable Access Network Design: Complexity and Algorithms. [Citation Graph (, )][DBLP]


  10. Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering. [Citation Graph (, )][DBLP]


  11. Hardness and Approximation of the Survivable Multi-Level Fat Tree Problem. [Citation Graph (, )][DBLP]


  12. Optimal traffic engineering via Newtons method. [Citation Graph (, )][DBLP]


  13. Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002