The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yang Richard Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Aspnes, David Kiyoshi Goldenberg, Yang Richard Yang
    On the Computational Complexity of Sensor Network Localization. [Citation Graph (0, 0)][DBLP]
    ALGOSENSORS, 2004, pp:32-44 [Conf]
  2. Sheng Zhong, Yang Richard Yang
    Verifiable distributed oblivious transfer and mobile agent security. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2003, pp:12-21 [Conf]
  3. Ronny R. Dakdouk, Semih Salihoglu, Hao Wang, Haiyong Xie, Yang Richard Yang
    Interdomain Routing as Social Choice. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2006, pp:38- [Conf]
  4. Lili Qiu, Yang Richard Yang, Yin Zhang, Haiyong Xie II
    On Self Adaptive Routing in Dynamic Environments - An Evaluation and Design Using a Simple, Probabilistic Scheme. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:12-23 [Conf]
  5. Hao Wang, Haiyong Xie II, Yang Richard Yang, Avi Silberschatz, Erran L. Li, Yanbin Liu
    Stable Egress Route Selection for Interdomain Traffic Engineering: Model and Analysis. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:16-29 [Conf]
  6. Hao Wang, Haiyong Xie II, Yang Richard Yang, Avi Silberschatz, Erran L. Li, Yanbin Liu
    On the Stability of Rational, Heterogeneous Interdomain Route Selection. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:40-52 [Conf]
  7. Yang Richard Yang, Min Sik Kim, Simon S. Lam
    Optimal Partitioning of Multicast Receivers. [Citation Graph (0, 0)][DBLP]
    ICNP, 2000, pp:129-140 [Conf]
  8. Yang Richard Yang, Simon S. Lam
    General AIMD Congestion Control. [Citation Graph (0, 0)][DBLP]
    ICNP, 2000, pp:187-198 [Conf]
  9. Tolga Eren, David Kiyoshi Goldenberg, Walter Whiteley, Yang Richard Yang, A. Stephen Morse, Brian D. O. Anderson, Peter N. Belhumeur
    Rigidity, Computation, and Randomization in Network Localization. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  10. David Kiyoshi Goldenberg, A. Krishnamurthy, W. C. Maness, Yang Richard Yang, A. Young, A. Stephen Morse, A. Savvides
    Network localization in partially localizable networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:313-326 [Conf]
  11. Hao Wang, Haiyong Xie, Lili Qiu, Abraham Silberschatz, Yang Richard Yang
    Optimal ISP subscription for Internet multihoming: algorithm design and implication analysis. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2360-2371 [Conf]
  12. Yang Richard Yang, Min Sik Kim, Simon S. Lam
    Transient Behaviors of TCP-friendly Congestion Control Protocols. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1716-1725 [Conf]
  13. Sheng Zhong, Jiang Chen, Yang Richard Yang
    Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  14. Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang (Richard) Yang
    On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2005, pp:117-131 [Conf]
  15. David Kiyoshi Goldenberg, Pascal Bihler, Yang Richard Yang, Ming Cao, Jia Fang, A. Stephen Morse, Brian D. O. Anderson
    Localization in sparse networks using sweeps. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2006, pp:110-121 [Conf]
  16. David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie II, Yang Richard Yang, Yin Zhang
    Optimizing cost and performance for multihoming. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:79-92 [Conf]
  17. Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
    On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:151-162 [Conf]
  18. Hao Wang, Haiyong Xie, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg
    COPE: traffic engineering in dynamic networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:99-110 [Conf]
  19. Yang Richard Yang, Xiaozhou (Steve) Li, X. Brian Zhang, Simon S. Lam
    Reliable group rekeying: a performance analysis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2001, pp:27-38 [Conf]
  20. Yang Richard Yang, Xiaozhou (Steve) Li, Simon S. Lam, Xincheng Zhang
    Towards scalable and reliable group key management. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2001, pp:314-315 [Conf]
  21. Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam
    Batch rekeying for secure group communications. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:525-534 [Conf]
  22. Yang Richard Yang, Min Sik Kim, Simon S. Lam
    Transient behaviors of TCP-friendly congestion control protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:2, pp:193-210 [Journal]
  23. Sheng Zhong, Yang Richard Yang
    Verifiable Distributed Oblivious Transfer and Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    MONET, 2006, v:11, n:2, pp:201-210 [Journal]
  24. Yang Richard Yang, Haiyong Xie, Hao Wang, Abraham Silberschatz, A. Krishnamurthy, Yanbin Liu, Erran L. Li
    On route selection for interdomain traffic engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2005, v:19, n:6, pp:20-27 [Journal]
  25. James Aspnes, Tolga Eren, David Kiyoshi Goldenberg, A. Stephen Morse, Walter Whiteley, Yang Richard Yang, Brian D. O. Anderson, Peter N. Belhumeur
    A Theory of Network Localization. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:12, pp:1663-1678 [Journal]
  26. X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang
    Protocol design for scalable and reliable group rekeying. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:6, pp:908-922 [Journal]
  27. Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
    On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:14, n:4, pp:725-738 [Journal]
  28. Hao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert G. Greenberg
    Reliability as an interdomain service. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:229-240 [Conf]
  29. James Aspnes, Yang Richard Yang, Yitong Yin
    Path-independent load balancing with unreliable machines. [Citation Graph (0, 0)][DBLP]
    SODA, 2007, pp:814-823 [Conf]
  30. James Aspnes, Yang Richard Yang, Yitong Yin
    Path-independent load balancing with unreliable machines [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  31. Sheng Zhong, Erran L. Li, Yanbin Grace Liu, Yang Richard Yang
    On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:6, pp:799-816 [Journal]

  32. Network Routing Topology Inference from End-to-End Measurements. [Citation Graph (, )][DBLP]


  33. Proportional Fairness in Multi-Rate Wireless LANs. [Citation Graph (, )][DBLP]


  34. Wide-Area IP Network Mobility. [Citation Graph (, )][DBLP]


  35. iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  36. muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  37. A General Algorithm for Interference Alignment and Cancellation in Wireless Networks. [Citation Graph (, )][DBLP]


  38. Optimal Capacity Sharing of Networks with Multiple Overlays. [Citation Graph (, )][DBLP]


  39. Superposition coding for wireless mesh networks. [Citation Graph (, )][DBLP]


  40. Incentive-compatible opportunistic routing for wireless networks. [Citation Graph (, )][DBLP]


  41. Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  42. Contracts: Practical Contribution Incentives for P2P Live Streaming. [Citation Graph (, )][DBLP]


  43. P4p: provider portal for applications. [Citation Graph (, )][DBLP]


  44. Shadow configuration as a network management primitive. [Citation Graph (, )][DBLP]


  45. R3: resilient routing reconfiguration. [Citation Graph (, )][DBLP]


  46. Packet doppler: network monitoring using packet shift detection. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002