The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

JinShu Su: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. QingYuan Huang, JinShu Su, YingZhi Zeng, Yong-Jun Wang
    Spreading Activation Model for Connectivity Based Clustering. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2006, pp:398-407 [Conf]
  2. QingYuan Huang, Yong-Jun Wang, JinShu Su, YingZhi Zeng
    Personalized Fair Reputation Based Resource Allocation in Grid. [Citation Graph (0, 0)][DBLP]
    ADVIS, 2006, pp:408-417 [Conf]
  3. Zhaowei Meng, JinShu Su, Stefano Avallone
    A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2006, pp:159-171 [Conf]
  4. Xiaofeng Hu, Zhigang Sun, Xicheng Lu, JinShu Su
    Using Split Queues to Improve the Performance of Parallel Switch. [Citation Graph (0, 0)][DBLP]
    APPT, 2003, pp:3-11 [Conf]
  5. Chunqing Wu, Xiangquan Shi, Xuejun Yang, JinShu Su
    The Impact of Parallel and Multithread Mechanism on Network Processor Performance. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:236-240 [Conf]
  6. Jing Zheng, JinShu Su, Kan Yang, Yijie Wang
    Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:373-380 [Conf]
  7. Feng Zhao, JinShu Su, Xiaomei Cheng
    OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1032-1041 [Conf]
  8. Yaping Liu, Zhenghu Gong, Baosheng Wang, Jinshu Shu
    A Routing Optimization Algorithm for BGP Egress Selection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2006, pp:192-199 [Conf]
  9. Dongsheng Li, Xicheng Lu, Baosheng Wang, JinShu Su, Jiannong Cao, Keith C. C. Chan, Hong Va Leong
    Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:64- [Conf]
  10. Jing Zheng, JinShu Su, Xicheng Lu
    A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:399-409 [Conf]
  11. Dongsheng Li, Xicheng Lu, JinShu Su
    Graph-Theoretic Analysis of Kautz Topology and DHT Schemes. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:308-315 [Conf]
  12. Zhaowei Meng, JinShu Su, Vittorio Manetti
    A New Precomputation Scheme for MPLS Traffic Engineering Routing. [Citation Graph (0, 0)][DBLP]
    ICDCN, 2006, pp:391-396 [Conf]
  13. Jijun Cao, Xiangquan Shi, Chunqing Wu, JinShu Su, Zhaowei Meng
    Efficient Congestion Control Based on Awareness of Multistage Resources (CC-AMR). [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:608-611 [Conf]
  14. Lijun Wu, JinShu Su
    Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:510-522 [Conf]

  15. Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications. [Citation Graph (, )][DBLP]


  16. A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  17. A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems. [Citation Graph (, )][DBLP]


  18. Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. [Citation Graph (, )][DBLP]


  19. Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy. [Citation Graph (, )][DBLP]


  20. A Loop-Based Key Management Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Towards Successive Privacy Protection in Sensor Networks. [Citation Graph (, )][DBLP]


  22. An Entropy Based Algorithm to Find Critical Traffic Matrices. [Citation Graph (, )][DBLP]


  23. Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems. [Citation Graph (, )][DBLP]


  24. Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. [Citation Graph (, )][DBLP]


  25. LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  26. MORT: A Technique to Improve Routing Efficiency in Fault-Tolerant Multipath Routing. [Citation Graph (, )][DBLP]


  27. Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems. [Citation Graph (, )][DBLP]


  28. Analysis and Enhancement of Delay-Based Congestion Control. [Citation Graph (, )][DBLP]


  29. Analysis of Reverse Traffic in Delay-Based Congestion Control. [Citation Graph (, )][DBLP]


  30. An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. [Citation Graph (, )][DBLP]


  31. A Flexible Approach to Measuring Network Security Using Attack Graphs. [Citation Graph (, )][DBLP]


  32. A Scalable Approach to Full Attack Graphs Generation. [Citation Graph (, )][DBLP]


  33. Network Access Control Mechanism Based on Locator/Identifier Split. [Citation Graph (, )][DBLP]


  34. Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast. [Citation Graph (, )][DBLP]


  35. A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches. [Citation Graph (, )][DBLP]


  36. Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast. [Citation Graph (, )][DBLP]


  37. HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002