The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pin-Han Ho: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. János Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi
    Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:655-660 [Conf]
  2. James She, Fen Hou, Pin-Han Ho
    An Application-Driven MAC-layer Buffer Management with Active Dropping for Real-time Video Streaming in 802.16 Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:451-458 [Conf]
  3. Stanley Liu, Humphrey Rutagemwa, Sherman X. Shen, Jon W. Mark, Pin-Han Ho
    Efficiency and throughput analysis of Dly-ACK in WPANs. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:565-572 [Conf]
  4. Rick W. Ha, Pin-Han Ho, Sherman X. Shen
    SS-Trees: A cross-layer organizational approach for mesh-based wide-area wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:885-894 [Conf]
  5. János Tapolcai, Pin-Han Ho, Dominique Verchère, Tibor Cinkler
    A novel shared segment protection method for guaranteed recovery time. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:127-136 [Conf]
  6. Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi
    A New Hybrid Architecture for Optical Burst Switching Networks. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:196-202 [Conf]
  7. Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
    Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:136-154 [Conf]
  8. Pin-Han Ho, Hussein T. Mouftah
    Allocation of Protection Domains in Dynamic WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:188-189 [Conf]
  9. Pin-Han Ho, Hussein T. Mouftah
    Toward Optimal Routing of Lightpaths in Dynamic WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:332-337 [Conf]
  10. Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi
    A New Scheme for Lightpath Restoration in WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:381-386 [Conf]
  11. Hussein T. Mouftah, Pin-Han Ho, Chi-Hsiang Yeh
    Message from the Chairs: International Workshop on Optical Networks Control and Management. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:380- [Conf]
  12. Pin-Han Ho, Hussein T. Mouftah
    Capacity-balanced alternate routing for MPLS traffic engineering. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:927-932 [Conf]
  13. Pin-Han Ho, Hussein T. Mouftah
    Toward Optimal Routing of Lightpaths in Dynamic WDM Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:672-677 [Conf]
  14. János Tapolcai, Pin-Han Ho
    A Deeper Study on Segment Shared Protection. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:319-325 [Conf]
  15. Pin-Han Ho, Hussein T. Mouftah
    A Framework for Service-Guaranteed Path Protection of the Optical Internet. [Citation Graph (0, 0)][DBLP]
    ONDM, 2001, pp:119-132 [Conf]
  16. Md. Mamun-ur-Rashid Khandker, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Hussein T. Mouftah
    Performance of Fast Routing Algorithms in Large Optical Switches Built on the Vertical Stacking of Banyan Structures. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2004, v:7, n:3, pp:219-224 [Journal]
  17. Anwar Haque, Pin-Han Ho, Raouf Boutaba
    Group shared protection for spare capacity reconfiguration in optical networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:2, pp:168-180 [Journal]
  18. Pin-Han Ho, Hussein T. Mouftah
    Framework of spare capacity re-allocation with S-SLSP for mesh WDM networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:40, n:1, pp:167-179 [Journal]
  19. Rick W. Ha, Pin-Han Ho, Sherman X. Shen, Junshan Zhang
    Sleep scheduling for wireless sensor networks via network flow model. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:13-14, pp:2469-2481 [Journal]
  20. Rick W. Ha, Pin-Han Ho, Sherman X. Shen
    Cross-layer application-specific wireless sensor network design with single-channel CSMA MAC over sense-sleep trees. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:17, pp:3425-3444 [Journal]
  21. Hsiang-Fu Yu, Hung-Chang Yang, Pin-Han Ho, Yi-Ming Chen, Li-Ming Tseng
    A smooth broadcasting scheme for VBR-encoded hot videos. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2904-2916 [Journal]
  22. Pin-Han Ho, János Tapolcai, Tibor Cinkler
    Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:6, pp:1105-1118 [Journal]
  23. Pin-Han Ho, Hussein T. Mouftah
    Reconfiguration of spare capacity for MPLS-based recovery in the internet backbone networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:73-84 [Journal]
  24. Han Ma, Dalia Fayek, Pin-Han Ho
    Availability-Aware Multiple Working-Paths Capacity Provisioning in GMPLS Networks. [Citation Graph (0, 0)][DBLP]
    IPOM, 2007, pp:85-94 [Conf]
  25. Bin Lin, Pin-Han Ho, Liang-Liang Xie, Xuemin Shen
    Optimal relay station placement in IEEE 802.16j networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:25-30 [Conf]
  26. Fen Hou, Pin-Han Ho, Xuemin Shen
    Performance evaluation for unsolicited grant service flows in 802.16 networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:991-996 [Conf]
  27. Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen
    A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  28. Anwar Haque, Pin-Han Ho
    Inter-Group Shared Protection (I-GSP): A Scalable Solution for Survivable WDM Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  29. Fen Hou, Pin-Han Ho, Xuemin Shen
    Performance Analysis of a Reservation Based Connection Admission Scheme in 802.16 Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  30. Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Minyi Guo
    Restoration Probability Modelling for Active Restoration-Based Optical Networks with Correlation Among Backup Routes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:11, pp:1592-1606 [Journal]
  31. Fang-Ming Shao, Xuemin Shen, Pin-Han Ho
    Reliability optimization of distributed access networks with constrained total cost. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2005, v:54, n:3, pp:421-430 [Journal]
  32. Pin-Han Ho, János Tapolcai, H. T. Mouftah
    On achieving optimal survivable routing for shared protection in survivable next-generation Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:2, pp:216-225 [Journal]

  33. Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. [Citation Graph (, )][DBLP]


  34. Performance Evaluation of TCP Vegas over Optical Burst Switched Networks. [Citation Graph (, )][DBLP]


  35. A Study on Dynamic Survivable Routing with Availability Constraint for GMPLS-Based Recovery. [Citation Graph (, )][DBLP]


  36. A Study on Vertical Handoff for Integrated WLAN and WWAN with Micro-Mobility Prediction. [Citation Graph (, )][DBLP]


  37. Availability-Constrained Multipath Protection in Backbone Networks with Double-Link Failure. [Citation Graph (, )][DBLP]


  38. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  39. Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  40. AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  41. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. [Citation Graph (, )][DBLP]


  42. Cooperative Multicast Scheduling Scheme for IPTV Service over IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  43. Relay Station Placement in IEEE 802.16j Dual-Relay MMR Networks. [Citation Graph (, )][DBLP]


  44. Performance Analysis of Weighted Proportional Fairness Scheduling in IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  45. A Comparative Study of Fast Protection Schemes in WDM Mesh Networks. [Citation Graph (, )][DBLP]


  46. Availability-Constrained Shared Backup Path Protection (SBPP) for GMPLS-Based Spare Capacity Reprovisioning. [Citation Graph (, )][DBLP]


  47. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  48. Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. [Citation Graph (, )][DBLP]


  49. Two-Factor Localized Authentication Scheme for WLAN Roaming. [Citation Graph (, )][DBLP]


  50. On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  51. TCP-ENG: Dynamic Explicit Congestion Notification for TCP over OBS Networks. [Citation Graph (, )][DBLP]


  52. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]


  53. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  54. CFP: Cooperative Fast Protection. [Citation Graph (, )][DBLP]


  55. On Monitoring and Failure Localization in Mesh All-Optical Networks. [Citation Graph (, )][DBLP]


  56. Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks. [Citation Graph (, )][DBLP]


  57. A novel distributed connection admission control scheme for ieee 802.16 networks. [Citation Graph (, )][DBLP]


  58. Performance analysis of differentiated ARQ scheme for video transmission over wireless networks. [Citation Graph (, )][DBLP]


  59. Dimensioning and Location Planning for Wireless Networks under Multi-level Cooperative Relaying. [Citation Graph (, )][DBLP]


  60. A model-based semi-quantitative approach for evaluating security of enterprise networks. [Citation Graph (, )][DBLP]


  61. Performance Enhancement for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  62. A Novel False Congestion Detection Scheme for TCP over OBS Networks. [Citation Graph (, )][DBLP]


  63. Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  64. Performance Analysis of ARQ with Opportunistic Scheduling in IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  65. Network Planning for Next-Generation Metropolitan-Area Broadband Access under EPON-WiMAX Integration. [Citation Graph (, )][DBLP]


  66. Monitoring Trail: A New Paradigm for Fast Link Failure Localization in WDM Mesh Networks. [Citation Graph (, )][DBLP]


  67. BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  68. A Novel Framework for Message Authentication in Vehicular Communication Networks. [Citation Graph (, )][DBLP]


  69. SARP - A Novel Multi-Copy Routing Protocol for Intermittently Connected Mobile Networks. [Citation Graph (, )][DBLP]


  70. A Framework of Cross-Layer Superposition Coded Multicast for Robust IPTV Services over WiMAX. [Citation Graph (, )][DBLP]


  71. A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]


  72. A Location Privacy Preserving Authentication Scheme in Vehicular Networks. [Citation Graph (, )][DBLP]


  73. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. [Citation Graph (, )][DBLP]


  74. A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  75. Prioritized spectrum sensing in cognitive radio based on spatiotemporal statistical fusion. [Citation Graph (, )][DBLP]


  76. Capacity enhancement with relay station placement in wireless cooperative networks. [Citation Graph (, )][DBLP]


  77. Adaptive BU Association and Resource Allocation in Integrated PON-WiMAX Networks. [Citation Graph (, )][DBLP]


  78. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast. [Citation Graph (, )][DBLP]


  79. Availability-constrained Dedicated Segment Protection in circuit switched mesh networks. [Citation Graph (, )][DBLP]


  80. A novel TCP with dynamic Burst-Contention Loss notification over OBS networks. [Citation Graph (, )][DBLP]


  81. ILP formulations for non-simple p-cycle and p-trail design in WDM mesh networks. [Citation Graph (, )][DBLP]


  82. Switching/merging node placement in survivable optical networks with SSP. [Citation Graph (, )][DBLP]


  83. Spare capacity reprovisioning for high availability shared backup path protection connections. [Citation Graph (, )][DBLP]


  84. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. [Citation Graph (, )][DBLP]


  85. State-of-the-art progress in developing survivable routing schemes in mesh WDM networks. [Citation Graph (, )][DBLP]


  86. Transport control protocol in optical burst switched networks: Issues, solutions, and challenges. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002