The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yang Xiao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yang Xiao, Jin Yicheng, Yin Yong, Wu Zhuoyu
    GPU Based Real-time Shadow Research. [Citation Graph (0, 0)][DBLP]
    CGIV, 2006, pp:372-377 [Conf]
  2. Yang Xiao, Susan Darling Urban
    Process Dependencies and Process Interference Rules for Analyzing the Impact of Failure in a Service Composition Environment. [Citation Graph (0, 0)][DBLP]
    BIS, 2007, pp:67-81 [Conf]
  3. Tianji Li, Qiang Ni, Thierry Turletti, Yang Xiao
    Performance analysis of the ieee 802.11e block ACK scheme in a noisy channel. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:551-557 [Conf]
  4. Hui Chen, Yang Xiao, Xuemin Shen
    Update-based cache replacement policies in wireless data access. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:857-864 [Conf]
  5. Lan Wang, Yang Xiao
    Energy saving mechanisms in sensor networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:777-788 [Conf]
  6. Yang Xiao, Susan Darling Urban, Suzanne W. Dietrich
    A Process History Capture System for Analysis of Data Dependencies in Concurrent Process Execution. [Citation Graph (0, 0)][DBLP]
    DEECS, 2006, pp:152-166 [Conf]
  7. Yang Xiao, Susan Darling Urban, Ning Liao
    The DeltaGrid Abstract Execution Model: Service Composition and Process Interference Handling. [Citation Graph (0, 0)][DBLP]
    ER, 2006, pp:40-53 [Conf]
  8. Yang Xiao
    An Analysis for Differentiated Services in IEEE 802.11 and IEEE 802.11e Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:32-39 [Conf]
  9. Ying Luo, Yi Pan, Jie Li, Yang Xiao, Xiaola Lin
    A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:830-0 [Conf]
  10. Yang Xiao, Kui Wu
    Location Update for PCS Networks with a Fractional Movement Threshold. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:825-829 [Conf]
  11. Hua Ma, Susan Darling Urban, Yang Xiao, Suzanne W. Dietrich
    GridPML: A Process Modeling Language and History Capture System for Grid Service Composition. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:433-440 [Conf]
  12. Jie Li, Yi Pan, Yang Xiao
    A Dynamic HLR Location Management Scheme for PCS Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  13. Yang Xiao, Haizhon Li, Sunghyun Choi
    Protection and Guarantee for Voice and Video Traffic in IEEE 802.11e Wireless LANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  14. Shuang Gao, Yang Xiao, Shao-Hai Hu
    A comparison of two similarity measures in intensity-based ultrasound image registration. [Citation Graph (0, 0)][DBLP]
    ISCAS (4), 2004, pp:61-64 [Conf]
  15. Yang Xiao
    Stability, controllability and observability of 2-D continuous-discrete systems. [Citation Graph (0, 0)][DBLP]
    ISCAS (4), 2003, pp:468-471 [Conf]
  16. Yang Xiao
    Hurwitz-Schur stability test of interval bivariate polynomials. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2001, pp:829-832 [Conf]
  17. Yang Xiao, Rolf Unbehauen, Xiyu Du
    A finite test algorithm for 2D Schur polynomials based on complex Lyapunov equation. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 1999, pp:339-342 [Conf]
  18. Yang Xiao, Rolf Unbehauen, Xiyu Du
    A necessary condition for Schur stability of 2D polynomials [digital filters]. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 1999, pp:439-442 [Conf]
  19. Yang Xiao
    Derivation algorithm of transfer functions of 2-D continuous-discrete systems. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2002, pp:511-514 [Conf]
  20. Yang Xiao, C. L. Philip Chen, Kimberly K. J. Kinateder
    An Optimal Power Saving Scheme for Mobile Handsets. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:192-197 [Conf]
  21. Yang Xiao, Jin Yicheng
    GPU Based Real-time Shadow Research in Large Ship-handling Simulator. [Citation Graph (0, 0)][DBLP]
    IV, 2006, pp:585-590 [Conf]
  22. Yang Xiao, C. L. Philip Chen
    QoS for Adaptive Multimedia in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2001, pp:81-88 [Conf]
  23. Yang Xiao, C. L. Philip Chen, Yan Wang
    An Optimal Distributed Call Admission Control for Adaptive Multimedia in Wireless/Mobile Networks. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2000, pp:477-482 [Conf]
  24. Yang Xiao, Haizhon Li, Kui Wu, Kin K. Leung, Qiang Ni
    Reservation and Grouping Stations for the IEEE 802.11 DCF. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:395-405 [Conf]
  25. Lin Cai, Xuemin Shen, Jon W. Mark, Yang Xiao
    Voice Capacity Analysis of WLAN with Unbalanced Traffic. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:9- [Conf]
  26. Suzanne W. Dietrich, Susan Darling Urban, Hua Ma, Yang Xiao, Shama Patel
    Exploring XML for data exchange in the context of an undergraduate database curriculum. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2005, pp:53-57 [Conf]
  27. Tianji Li, Qiang Ni, David Malone, Douglas J. Leith, Yang Xiao, Thierry Turletti
    A New MAC Scheme for Very High-Speed WLANs. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:171-180 [Conf]
  28. Xiaojiang Du, Yang Xiao, Mohsen Guizani, Hsiao-Hwa Chen
    An effective key management scheme for heterogeneous sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:24-34 [Journal]
  29. Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao
    Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:100-111 [Journal]
  30. Yang Xiao
    Optimal location management for two-tier PCS networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:10, pp:1047-1055 [Journal]
  31. Yang Xiao
    Backoff strategies for demand re-registration in PCS database failure recover. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:5, pp:400-411 [Journal]
  32. Yang Xiao, C. L. Philip Chen, Bin Wang
    Bandwidth degradation QoS provisioning for adaptive multimedia in wireless/mobile networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:13, pp:1153-1161 [Journal]
  33. Yang Xiao
    Energy-efficient scheduling and MAC for sensor networks, WPANs, WLANs, and WMANs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:17, pp:3341-3342 [Journal]
  34. Xi Chen, Yang Xiao, Yu Cai, Jianhua Lu, Zucheng Zhou
    An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:17, pp:3516-3526 [Journal]
  35. Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao
    A lightweight secure protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:13-14, pp:2556-2568 [Journal]
  36. Jie Li, Yi Pan, Yang Xiao
    Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:2, pp:169-177 [Journal]
  37. Lan Wang, Yang Xiao
    A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2006, v:11, n:5, pp:723-740 [Journal]
  38. Kui Wu, Yong Gao, Fulu Li, Yang Xiao
    Lightweight Deployment-Aware Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:6, pp:837-852 [Journal]
  39. Yang Xiao, Jon Rosdahl
    Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2003, v:7, n:2, pp:6-19 [Journal]
  40. Hui Chen, Yang Xiao, Xuemin Shen
    Update-Based Cache Access and Replacement in Wireless Data Access. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:12, pp:1734-1748 [Journal]
  41. Yang Xiao, Hui Chen
    Optimal Callback with Two-Level Adaptation for Wireless Data Access. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:8, pp:1087-1102 [Journal]
  42. Yang Xiao, Hui Chen, Mohsen Guizani
    Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:64-76 [Journal]
  43. Chong Liu, Kui Wu, Yang Xiao, Bo Sun
    Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:6, pp:562-575 [Journal]
  44. Yang Xiao, Haizhon Li
    Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:11, pp:1041-1053 [Journal]
  45. Yang Xiao, Frank Haizhon Li, Kui Wu, Kin K. Leung, Qiang Ni
    On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:713-722 [Journal]
  46. Yang Xiao, Yi Pan
    Differentiation, QoS Guarantee, and Optimization for Real-Time Traffic over One-Hop Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:6, pp:538-549 [Journal]
  47. Yang Xiao, Yi Pan, Jie Li
    Design and Analysis of Location Management for 3G Cellular Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:4, pp:339-349 [Journal]
  48. Xiaojiang Du, Yang Xiao, Hsiao-Hwa Chen, Qishi Wu
    Secure cell relay routing protocol for sensor networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:375-391 [Journal]
  49. Qiang Ni, Tianji Li, Thierry Turletti, Yang Xiao
    Saturation throughput analysis of error-prone 802.11 wireless networks. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:945-956 [Journal]
  50. Tianji Li, Qiang Ni, Yang Xiao
    Investigation of the block ACK scheme in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:877-888 [Journal]
  51. Yang Xiao
    Hierarchical mobility database overflow control. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2003, v:3, n:3, pp:329-343 [Journal]
  52. Yang Xiao
    Efficient MAC strategies for the IEEE 802.11n wireless LANs. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:453-466 [Journal]
  53. Yang Xiao, Haizhon Li, C. L. Philip Chen, Bin Wang, Yi Pan
    Proportional degradation services in wireless/mobile adaptive multimedia networks. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2005, v:5, n:2, pp:219-243 [Journal]
  54. Yang Xiao, Kin K. Leung, Yi Pan, Xiaojiang Du
    Architecture, mobility management, and quality of service for integrated 3G and WLAN networks. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:805-823 [Journal]
  55. Yang Xiao, Yi Pan, Kin K. Leung
    Special Issue: Mobility, Paging, and Quality of Service Management for Future Wireless Networks. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:709-711 [Journal]
  56. Yang Xiao, Xuemin Shen, Lin Cai, Jon W. Mark
    VoIP over WLAN: voice capacity, admission control, QoS, and MAC. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:4, pp:491-508 [Journal]
  57. Zhen-qing Guo, Yang Xiao, Moon Ho Lee
    Multiuser Detection Based on Particle Swarm Optimation Algorithm. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:2582-2585 [Conf]
  58. Yang Xiao, Ling-yun Lu, Moon Ho Lee
    FIR-RAKE receiver for TD-SCDMA mobile terminals. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  59. Yang Xiao, Tat-Seng Chua, Chin-Hui Lee
    Fusion of Region and Image-Based Techniques for Automatic Image Annotation. [Citation Graph (0, 0)][DBLP]
    MMM (1), 2007, pp:247-258 [Conf]
  60. Hui Chen, Yang Xiao, Xuemin Shen
    Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  61. Bo Sun, Chung-Chih Li, Yang Xiao
    A Lightweight Secure Solution for RFID. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  62. Xiaojiang Du, Yang Xiao, Sghaier Guizani, Hsiao-Hwa Chen
    An Efficient Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  63. Xiaojiang Du, Sghaier Guizani, Yang Xiao, Hsiao-Hwa Chen
    A Secure Routing Protocol for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  64. Bo Sun, Yang Xiao, Ruhai Wang, Sghaier Guizani
    Enhancing Security using Calling Activity for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  65. Bo Sun, Xing Jin, Yang Xiao, Ruhai Wang
    Enhancing Security using Mobility Profile for Cellular Mobile Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  66. Yang Xiao, Bo Sun, Hsiao-Hwa Chen, Sghaier Guizani, Ruhai Wang
    Performance Analysis of Advanced Encryption Standard (AES). [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  67. William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen, Sghaier Guizani
    Security Issues in the IEEE 802.15.3 WPANs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  68. Ruhai Wang, B. Tian, Bo Sun, Sghaier Guizani, Yang Xiao
    Configurable Acknowledgment Delay (CAD) Mechanism for Asymmetric Space-Internet Links. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  69. Yang Xiao, Xihui Zhang, Xiaojiang Du, Jingyuan Zhang
    Channel Allocation Algorithms for Three-tier Wireless Local Loops. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  70. Yang Xiao, Hui Chen, Kui Wu, Chong Liu, Bo Sun
    Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  71. Yang Xiao, Hui Chen, Mohsen Guizani
    On Evaluating and Optimizing Pipeline Probability Paging under QoS constraints in Wireless Systems. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  72. Yang Xiao, Mohsen Guizani, Hui Chen
    Hierarchical Pipeline Paging in Hierarchical Wireless Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  73. Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
    A survey of key management schemes in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2314-2341 [Journal]
  74. Hui Chen, Yang Xiao
    On-Bound Selection Cache Replacement Policy for Wireless Data Access. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:12, pp:1597-1611 [Journal]
  75. Yang Xiao, Frank Haizhon Li, Bo Li
    Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-Based WLANs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:7, pp:815-831 [Journal]

  76. Web Based Distributed Marine Education System. [Citation Graph (, )][DBLP]


  77. A Formal Method Based Case Study for Access Control. [Citation Graph (, )][DBLP]


  78. Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability. [Citation Graph (, )][DBLP]


  79. Secret Little Functions and Codebook for Protecting Users from Password Theft. [Citation Graph (, )][DBLP]


  80. A Virtual Password Scheme to Protect Passwords. [Citation Graph (, )][DBLP]


  81. Worm Propagation Dynamics in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  82. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  83. QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs. [Citation Graph (, )][DBLP]


  84. A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters. [Citation Graph (, )][DBLP]


  85. Finite Load Analysis of IEEE 802.11 Distributed Coordination Function. [Citation Graph (, )][DBLP]


  86. Dynamic Budget Partition Scheme for Integrated Voice/Video/Data Traffic in the IEEE 802.11e WLANs. [Citation Graph (, )][DBLP]


  87. Control Systems Designed for Wireless Sensor and Actuator Networks. [Citation Graph (, )][DBLP]


  88. Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  89. Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  90. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  91. Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs. [Citation Graph (, )][DBLP]


  92. A Linear Time Synchronization Algorithm for Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  93. Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  94. An Optimal Sensor Network for Intrusion Detection. [Citation Graph (, )][DBLP]


  95. Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  96. Use of Generalized Pattern Model for Video Annotation. [Citation Graph (, )][DBLP]


  97. Performance Limits of Fair-Access in Underwater Sensor Networks. [Citation Graph (, )][DBLP]


  98. Entropic thresholding based on gray-level spatial correlation histogram. [Citation Graph (, )][DBLP]


  99. Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  100. A design of orthogonal interleavers for multimodes turbo en-decoders. [Citation Graph (, )][DBLP]


  101. On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks. [Citation Graph (, )][DBLP]


  102. Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. [Citation Graph (, )][DBLP]


  103. Active Protection in Wireless Networking. [Citation Graph (, )][DBLP]


  104. Upper Bound on Network Utilization under Fair-Access in Multi-hop Wireless Grid Sensor Networks with 3-4 Rows. [Citation Graph (, )][DBLP]


  105. Stochastic Event Capture Using Single Robot Moving along a Certain Track. [Citation Graph (, )][DBLP]


  106. Recovery of Concurrent Processes in a Service Composition Environment Using Data Dependencies. [Citation Graph (, )][DBLP]


  107. Energy Consumption of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies. [Citation Graph (, )][DBLP]


  108. Bio-inspired true coalition formation on intrusion detection by mobile robots. [Citation Graph (, )][DBLP]


  109. The Application of Run-Length Features in Remote Sensing Classification Combined with Neural Network and Rough Set. [Citation Graph (, )][DBLP]


  110. A New Approach on Analysis of IEEE 802.11 DCF in Non-Saturated Wireless Networks. [Citation Graph (, )][DBLP]


  111. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. [Citation Graph (, )][DBLP]


  112. LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks. [Citation Graph (, )][DBLP]


  113. Effect of Channel Errors on Time Synchronization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  114. Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet. [Citation Graph (, )][DBLP]


  115. Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  116. Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies. [Citation Graph (, )][DBLP]


  117. Paging Schemes Performance for Wireless Systems. [Citation Graph (, )][DBLP]


  118. A Pseudo-Random Function Based Key Management Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  119. A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  120. A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. [Citation Graph (, )][DBLP]


  121. Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications. [Citation Graph (, )][DBLP]


  122. Weaving a Proper Net to Catch Large Objects. [Citation Graph (, )][DBLP]


  123. Optimal Rate Routing in Wireless Sensor Networks with Guaranteed Lifetime. [Citation Graph (, )][DBLP]


  124. A Lightweight Block Cipher Based on a Multiple Recursive Generator. [Citation Graph (, )][DBLP]


  125. User Behavior Modeling and Traffic Analysis of IMS Presence Servers. [Citation Graph (, )][DBLP]


  126. Parameter Setting and 2-D Stability Conditions for TCP/RED Networks. [Citation Graph (, )][DBLP]


  127. Modeling IEEE 802.11 DCF Using Parallel Space-Time Markov Chain: Multi-Hop Ad Hoc Networks. [Citation Graph (, )][DBLP]


  128. Distributed Collaborative Control Using Wireless Sensor and Actuator Networks. [Citation Graph (, )][DBLP]


  129. 2D algebraic test for robust stability of interval time-delay systems. [Citation Graph (, )][DBLP]


  130. Dynamic Bandwidth Partition with Finer-Tune (DP-FT) Scheme for Multimedia IEEE 802.11e WLANs. [Citation Graph (, )][DBLP]


  131. Correlation-Based Security in Time Synchronization of Sensor Networks. [Citation Graph (, )][DBLP]


  132. A Cross-Layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks. [Citation Graph (, )][DBLP]


  133. Modeling IEEE 802.11 DCF System Dynamics. [Citation Graph (, )][DBLP]


  134. IEEE 802.11 Distributed Coordination Function service time and queuing delay analysis using Parallel Space - Time Markov Chain. [Citation Graph (, )][DBLP]


  135. A simple algorithm for fault-tolerant topology control in wireless sensor network. [Citation Graph (, )][DBLP]


  136. A Dynamic Tracing Algorithm Based High Speed Camera. [Citation Graph (, )][DBLP]


  137. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. [Citation Graph (, )][DBLP]


  138. Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. [Citation Graph (, )][DBLP]


  139. Scalability study of cache access mechanisms in multiple-cell wireless networks. [Citation Graph (, )][DBLP]


  140. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. [Citation Graph (, )][DBLP]


  141. Secure data aggregation in wireless sensor networks: A comprehensive overview. [Citation Graph (, )][DBLP]


  142. Scheduling on-demand data broadcast in mixed-type request environments. [Citation Graph (, )][DBLP]


  143. Security co-existence of wireless sensor networks and RFID for pervasive computing. [Citation Graph (, )][DBLP]


  144. Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. [Citation Graph (, )][DBLP]


Search in 0.030secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002