Search the dblp DataBase
Kui Wu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dennis Dreef , Sanaz Ahari , Kui Wu , Valerie King Utilizing the Uncertainty of Intrusion Detection to Strengthen Security for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2004, pp:82-95 [Conf ] Yang Xiao , Kui Wu Location Update for PCS Networks with a Fractional Movement Threshold. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:825-829 [Conf ] Fulu Li , Kui Wu Reliable, Distributed and Energy-Efficient Broadcasting in Multi-Hop Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:761-469 [Conf ] Kui Wu , Janelle J. Harms , Ehab S. Elmallah Profile-Based Protocols in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:568-575 [Conf ] Kui Wu , Janelle J. Harms Performance Study of a Multipath Routing Method for Wireless Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2001, pp:99-107 [Conf ] Chong Liu , Kui Wu , Valerie King Randomized Coverage-Preserving Scheduling Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:956-967 [Conf ] Yang Xiao , Haizhon Li , Kui Wu , Kin K. Leung , Qiang Ni Reservation and Grouping Stations for the IEEE 802.11 DCF. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:395-405 [Conf ] Bo Sun , Kui Wu , Udo W. Pooch Alert aggregation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:69-78 [Conf ] Bo Sun , Fei Yu , Kui Wu , Victor C. M. Leung Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2004, pp:61-69 [Conf ] Kui Wu , Dennis Dreef , Bo Sun , Yang Xiao Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:1, pp:100-111 [Journal ] Bo Sun , Chung-Chih Li , Kui Wu , Yang Xiao A lightweight secure protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:13-14, pp:2556-2568 [Journal ] Kui Wu , Yong Gao , Fulu Li , Yang Xiao Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:6, pp:837-852 [Journal ] Kui Wu , Kim-Hui Yap Content-based image retrieval using fuzzy perceptual feedback. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2007, v:32, n:3, pp:235-251 [Journal ] Kim-Hui Yap , Kui Wu A soft relevance framework in content-based image retrieval systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:12, pp:1557-1568 [Journal ] Chong Liu , Kui Wu , Yang Xiao , Bo Sun Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:6, pp:562-575 [Journal ] Yang Xiao , Frank Haizhon Li , Kui Wu , Kin K. Leung , Qiang Ni On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:713-722 [Journal ] Chong Liu , Kui Wu , Jian Pei An Energy-Efficient Data Collection Framework for Wireless Sensor Networks by Exploiting Spatiotemporal Correlation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:1010-1023 [Journal ] Kui Wu , Janelle J. Harms Performance Study of Proactive Flow Handoff for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2006, v:12, n:1, pp:119-135 [Journal ] Tereus Scott , Kui Wu , Daniel Hoffman Radio propagation patterns in wireless sensor networks: new experimental results. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:857-862 [Conf ] Yang Xiao , Hui Chen , Kui Wu , Chong Liu , Bo Sun Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Kui Wu , Hong-Chuan Yang , Fulu Li Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters. [Citation Graph (, )][DBLP ] Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] An Optimal Sensor Network for Intrusion Detection. [Citation Graph (, )][DBLP ] Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP ] Region-Based Image Retrieval using Radial Basis Function Network. [Citation Graph (, )][DBLP ] Fuzzy relevance feedback in content-based image retrieval systems using radial basis function network. [Citation Graph (, )][DBLP ] Run to Potential: Sweep Coverage in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks. [Citation Graph (, )][DBLP ] A Survey on Mobile Landmark Recognition for Information Retrieval. [Citation Graph (, )][DBLP ] Fast and quality-guaranteed data streaming in resource-constrained sensor networks. [Citation Graph (, )][DBLP ] Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP ] A Collaborative Bayesian Image Annotation Framework. [Citation Graph (, )][DBLP ] Scalable Ubiquitous Data Access in Clustered Sensor Networks. [Citation Graph (, )][DBLP ] Minimum Energy Cooperative Path Routing in Wireless Networks: An Integer Programming Formulation. [Citation Graph (, )][DBLP ] Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (, )][DBLP ] Minimum-energy route configuration for wireless ad hoc networks. [Citation Graph (, )][DBLP ] Energy-efficient cooperative routing in multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP ] A new approach to counting broadcast trees. [Citation Graph (, )][DBLP ] Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Weaving a Proper Net to Catch Large Objects. [Citation Graph (, )][DBLP ] An Aggregative Approach for Scalable Detection of DoS Attacks. [Citation Graph (, )][DBLP ] Analysis on the redundancy of wireless sensor networks. [Citation Graph (, )][DBLP ] Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. [Citation Graph (, )][DBLP ] Performance Modeling and Evaluation for Information-Driven Networks [Citation Graph (, )][DBLP ] Fast and Quality-Guaranteed Data Streaming in Resource-Constrained Sensor Networks [Citation Graph (, )][DBLP ] On the Model Transform in Stochastic Network Calculus [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs