The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaojiang Du: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaojiang Du
    A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2004, pp:125-131 [Conf]
  2. Xiaojiang Du, Dapeng Oliver Wu
    Efficient multi-class routing protocol for heterogeneous mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:698-708 [Conf]
  3. Xiaojiang Du, Mark A. Shayman, Ronald Skoog
    Using Neural Networks to Identify Control and Management Plane Poison Messages. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:621-634 [Conf]
  4. Xiaojiang Du
    QoS routing based on multi-class nodes for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2004, v:2, n:3, pp:241-254 [Journal]
  5. Xiaojiang Du, Yang Xiao, Mohsen Guizani, Hsiao-Hwa Chen
    An effective key management scheme for heterogeneous sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:24-34 [Journal]
  6. Xiaojiang Du
    Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2006, v:14, n:2, pp:243-259 [Journal]
  7. Xiaojiang Du, Dapeng Wu
    Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2007, v:12, n:1, pp:57-68 [Journal]
  8. Xiaojiang Du, Yang Xiao, Hsiao-Hwa Chen, Qishi Wu
    Secure cell relay routing protocol for sensor networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:375-391 [Journal]
  9. Yang Xiao, Kin K. Leung, Yi Pan, Xiaojiang Du
    Architecture, mobility management, and quality of service for integrated 3G and WLAN networks. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:805-823 [Journal]
  10. Xiaojiang Du, Yang Xiao, Sghaier Guizani, Hsiao-Hwa Chen
    An Efficient Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  11. Xiaojiang Du, Sghaier Guizani, Yang Xiao, Hsiao-Hwa Chen
    A Secure Routing Protocol for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  12. Yang Xiao, Xihui Zhang, Xiaojiang Du, Jingyuan Zhang
    Channel Allocation Algorithms for Three-tier Wireless Local Loops. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  13. Qishi Wu, Nageswara S. V. Rao, Xiaojiang Du, S. Sitharama Iyengar, Vijay K. Vaishnavi
    On efficient deployment of sensors on planar grid. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:14-15, pp:2721-2734 [Journal]
  14. Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
    A survey of key management schemes in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2314-2341 [Journal]

  15. Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  16. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  17. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  18. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  19. Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. An Optimal Sensor Network for Intrusion Detection. [Citation Graph (, )][DBLP]


  21. Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint. [Citation Graph (, )][DBLP]


  22. Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  23. Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  24. An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme. [Citation Graph (, )][DBLP]


  25. Paging Schemes Performance for Wireless Systems. [Citation Graph (, )][DBLP]


  26. A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  27. A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  28. Weaving a Proper Net to Catch Large Objects. [Citation Graph (, )][DBLP]


  29. An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  30. A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks. [Citation Graph (, )][DBLP]


  31. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. [Citation Graph (, )][DBLP]


Search in 0.207secs, Finished in 0.208secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002