The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kui Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dennis Dreef, Sanaz Ahari, Kui Wu, Valerie King
    Utilizing the Uncertainty of Intrusion Detection to Strengthen Security for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2004, pp:82-95 [Conf]
  2. Yang Xiao, Kui Wu
    Location Update for PCS Networks with a Fractional Movement Threshold. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:825-829 [Conf]
  3. Fulu Li, Kui Wu
    Reliable, Distributed and Energy-Efficient Broadcasting in Multi-Hop Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:761-469 [Conf]
  4. Kui Wu, Janelle J. Harms, Ehab S. Elmallah
    Profile-Based Protocols in Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2001, pp:568-575 [Conf]
  5. Kui Wu, Janelle J. Harms
    Performance Study of a Multipath Routing Method for Wireless Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2001, pp:99-107 [Conf]
  6. Chong Liu, Kui Wu, Valerie King
    Randomized Coverage-Preserving Scheduling Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:956-967 [Conf]
  7. Yang Xiao, Haizhon Li, Kui Wu, Kin K. Leung, Qiang Ni
    Reservation and Grouping Stations for the IEEE 802.11 DCF. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:395-405 [Conf]
  8. Bo Sun, Kui Wu, Udo W. Pooch
    Alert aggregation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:69-78 [Conf]
  9. Bo Sun, Fei Yu, Kui Wu, Victor C. M. Leung
    Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:61-69 [Conf]
  10. Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao
    Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:100-111 [Journal]
  11. Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao
    A lightweight secure protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:13-14, pp:2556-2568 [Journal]
  12. Kui Wu, Yong Gao, Fulu Li, Yang Xiao
    Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:6, pp:837-852 [Journal]
  13. Kui Wu, Kim-Hui Yap
    Content-based image retrieval using fuzzy perceptual feedback. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2007, v:32, n:3, pp:235-251 [Journal]
  14. Kim-Hui Yap, Kui Wu
    A soft relevance framework in content-based image retrieval systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2005, v:15, n:12, pp:1557-1568 [Journal]
  15. Chong Liu, Kui Wu, Yang Xiao, Bo Sun
    Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:6, pp:562-575 [Journal]
  16. Yang Xiao, Frank Haizhon Li, Kui Wu, Kin K. Leung, Qiang Ni
    On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:713-722 [Journal]
  17. Chong Liu, Kui Wu, Jian Pei
    An Energy-Efficient Data Collection Framework for Wireless Sensor Networks by Exploiting Spatiotemporal Correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:1010-1023 [Journal]
  18. Kui Wu, Janelle J. Harms
    Performance Study of Proactive Flow Handoff for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2006, v:12, n:1, pp:119-135 [Journal]
  19. Tereus Scott, Kui Wu, Daniel Hoffman
    Radio propagation patterns in wireless sensor networks: new experimental results. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:857-862 [Conf]
  20. Yang Xiao, Hui Chen, Kui Wu, Chong Liu, Bo Sun
    Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  21. Kui Wu, Hong-Chuan Yang, Fulu Li
    Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  22. A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters. [Citation Graph (, )][DBLP]


  23. Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  24. An Optimal Sensor Network for Intrusion Detection. [Citation Graph (, )][DBLP]


  25. Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  26. Region-Based Image Retrieval using Radial Basis Function Network. [Citation Graph (, )][DBLP]


  27. Fuzzy relevance feedback in content-based image retrieval systems using radial basis function network. [Citation Graph (, )][DBLP]


  28. Run to Potential: Sweep Coverage in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  29. Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks. [Citation Graph (, )][DBLP]


  30. A Survey on Mobile Landmark Recognition for Information Retrieval. [Citation Graph (, )][DBLP]


  31. Fast and quality-guaranteed data streaming in resource-constrained sensor networks. [Citation Graph (, )][DBLP]


  32. Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  33. A Collaborative Bayesian Image Annotation Framework. [Citation Graph (, )][DBLP]


  34. Scalable Ubiquitous Data Access in Clustered Sensor Networks. [Citation Graph (, )][DBLP]


  35. Minimum Energy Cooperative Path Routing in Wireless Networks: An Integer Programming Formulation. [Citation Graph (, )][DBLP]


  36. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (, )][DBLP]


  37. Minimum-energy route configuration for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  38. Energy-efficient cooperative routing in multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP]


  39. A new approach to counting broadcast trees. [Citation Graph (, )][DBLP]


  40. Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  41. Weaving a Proper Net to Catch Large Objects. [Citation Graph (, )][DBLP]


  42. An Aggregative Approach for Scalable Detection of DoS Attacks. [Citation Graph (, )][DBLP]


  43. Analysis on the redundancy of wireless sensor networks. [Citation Graph (, )][DBLP]


  44. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. [Citation Graph (, )][DBLP]


  45. Performance Modeling and Evaluation for Information-Driven Networks [Citation Graph (, )][DBLP]


  46. Fast and Quality-Guaranteed Data Streaming in Resource-Constrained Sensor Networks [Citation Graph (, )][DBLP]


  47. On the Model Transform in Stochastic Network Calculus [Citation Graph (, )][DBLP]


Search in 0.046secs, Finished in 0.049secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002