The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guojun Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gaocai Wang, Jianer Chen, Guojun Wang, Songqiao Chen
    Probability Model for Faults in Large-Scale Multicomputer Systems. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2003, pp:452-457 [Conf]
  2. Guojun Wang, Lin Liao, Jiannong Cao, Keith C. C. Chan
    Key Management for Secure Multicast Using the RingNet Hierarchy. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:77-84 [Conf]
  3. Guojun Wang, Yingjun Lin, Minyi Guo
    A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC, 2005, pp:550-559 [Conf]
  4. Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao
    A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:560-569 [Conf]
  5. Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang
    Modeling and Performance Evaluation of Handover Service in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:229-238 [Conf]
  6. Guojun Wang, Lifan Zhang, Jiannong Cao
    A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:364-374 [Conf]
  7. Fang Qi, Jin Zheng, Weijia Jia, Guojun Wang
    Available Bandwidth Measurement Schemes over Networks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:931-940 [Conf]
  8. Jianer Chen, Iyad A. Kanj, Guojun Wang
    Hypercube Network Fault Tolerance: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    ICPP, 2002, pp:65-72 [Conf]
  9. Guojun Wang, Jiannong Cao, Keith C. C. Chan
    RGB: A Scalable and Reliable Group Membership Protocol in Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ICPP, 2004, pp:326-333 [Conf]
  10. Guojun Wang, Jiannong Cao, Keith C. C. Chan
    A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:108-115 [Conf]
  11. Gaocai Wang, Jianer Chen, Guojun Wang
    A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:216- [Conf]
  12. Guojun Wang, Jiannong Cao, Lifan Zhang, Keith C. C. Chan, Jie Wu
    A Novel QoS Multicast Model in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  13. Guojun Wang, Zhongshan Gao, Lifan Zhang, Jiannong Cao
    Prediction-Based Multicast Mobility Management in Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:1024-1035 [Conf]
  14. Guojun Wang, Jun Luo, Jiannong Cao, Keith C. C. Chan
    QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:568-577 [Conf]
  15. Xiaolin Xiao, Guojun Wang, Jianer Chen
    Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:698-704 [Conf]
  16. Gaocai Wang, Jianer Chen, Guojun Wang
    On Fault Tolerance of 3-Dimensional Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:149-154 [Conf]
  17. Gaocai Wang, Jianer Chen, Guojun Wang
    Probabilistic Analysis of Connectivity on Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:362-366 [Conf]
  18. Guojun Wang, Dingzhu Lu, Weijia Jia, Jiannong Cao
    Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:207-218 [Conf]
  19. Guojun Wang, Jiannong Cao, Keith C. C. Chan
    A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:10, pp:1730-1743 [Journal]
  20. Guojun Wang, Yee Leung
    Integrated semantics and logic metric spaces. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:136, n:1, pp:71-91 [Journal]
  21. San-min Wang, Bao-Shu Wang, Guojun Wang
    A triangular-norm-based propositional fuzzy logic. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:136, n:1, pp:55-70 [Journal]
  22. San-min Wang, Bao-Shu Wang, Guojun Wang
    A triangular norm-based fuzzy predicate logic. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2003, v:138, n:1, pp:177-186 [Journal]
  23. Hongjun Zhou, Guojun Wang
    Generalized consistency degrees of theories w.r.t. formulas in several standard complete logic systems. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2006, v:157, n:15, pp:2058-2073 [Journal]
  24. Hongjun Zhou, Guojun Wang, Wei Zhou
    Consistency degrees of theories and methods of graded reasoning in n-valued R0-logic (NM-logic). [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 2006, v:43, n:2, pp:117-132 [Journal]
  25. Taihe Fan, Guojun Wang
    Endographic approach on supremum and infimum of fuzzy numbers. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:159, n:2, pp:221-231 [Journal]
  26. Daowu Pei, Guojun Wang
    The extensions Ln* of the formal system L*and their completeness. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2003, v:152, n:, pp:155-166 [Journal]
  27. Guojun Wang
    On the Logic Foundation of Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:117, n:1-2, pp:47-88 [Journal]
  28. Guojun Wang, Hao Wang
    Non-fuzzy versions of fuzzy reasoning in classical logics. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2001, v:138, n:1-4, pp:211-236 [Journal]
  29. Jianer Chen, Iyad A. Kanj, Guojun Wang
    Hypercube Network Fault Tolerance: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2005, v:6, n:1, pp:17-34 [Journal]
  30. Jianer Chen, Guojun Wang, Songqiao Chen
    Routing in Hypercube Networks with a Constant Fraction of Faulty Nodes. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2001, v:2, n:3, pp:283-294 [Journal]
  31. Jianer Chen, Gaocai Wang, Chuang Lin, Tao Wang, Guojun Wang
    Probabilistic analysis on mesh network fault tolerance. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2007, v:67, n:1, pp:100-110 [Journal]
  32. Guojun Wang, Jiannong Cao, Keith C. C. Chan
    A novel group communication protocol using the RingNet hierarchy in mobile Internet. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms Appl., 2005, v:20, n:3-4, pp:253-280 [Journal]
  33. Cheng Han, Guojun Wang, Wenyan Xu
    A 16-classification partition of formula set F(S) in revised Kleene system W. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2006, v:10, n:2, pp:115-118 [Journal]
  34. Jianer Chen, Guojun Wang, Songqiao Chen
    Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:5, pp:530-540 [Journal]
  35. Jiannong Cao, Guojun Wang, Keith C. C. Chan
    A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:1, pp:80-94 [Journal]
  36. Guojun Wang, Jiannong Cao, Keith C. C. Chan
    A protocol for partitionable group membership service in mobile Internet. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:773-792 [Journal]
  37. Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo
    Efficient group key management for multi-privileged groups. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2497-2509 [Journal]
  38. Hongjun Zhou, Guojun Wang
    Characterizations of maximal consistent theories in the formal deductive system L* (NM-logic) and Cantor space. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2007, v:158, n:23, pp:2591-2604 [Journal]

  39. An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  40. Efficient Sharing of Secure Cloud Storage Services. [Citation Graph (, )][DBLP]


  41. Fuzzy Location Service for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  42. Graded Reasoning in n -Valued Lukasiewicz Propositional Logic. [Citation Graph (, )][DBLP]


  43. Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  44. A Fuzzy Mechanism to Avoid Packet Accumulation in Fair Flow Control. [Citation Graph (, )][DBLP]


  45. Designing fair flow fuzzy controller using genetic algorithm for computer networks. [Citation Graph (, )][DBLP]


  46. Node-Disjoint Multipath Routing with Zoning Method in MANETs. [Citation Graph (, )][DBLP]


  47. Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks. [Citation Graph (, )][DBLP]


  48. Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks. [Citation Graph (, )][DBLP]


  49. Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  50. A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment. [Citation Graph (, )][DBLP]


  51. RARE: An Energy-Efficient Target Tracking Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  52. Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs. [Citation Graph (, )][DBLP]


  53. Herd-Based Target Tracking Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  54. Square region-based coverage and connectivity probability model in wireless sensor networks. [Citation Graph (, )][DBLP]


  55. Polynomial Regression for Data Gathering in Environmental Monitoring Applications. [Citation Graph (, )][DBLP]


  56. ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications. [Citation Graph (, )][DBLP]


  57. Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  58. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. [Citation Graph (, )][DBLP]


  59. Attacks vs. Countermeasures of SSL Protected Trust Model. [Citation Graph (, )][DBLP]


  60. A Time-Related Trust Model Based on Subjective Logic Theory. [Citation Graph (, )][DBLP]


  61. A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  62. Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. [Citation Graph (, )][DBLP]


  63. Multipath-Based Segment-by-Segment Routing Protocol in MANETs. [Citation Graph (, )][DBLP]


  64. Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality. [Citation Graph (, )][DBLP]


  65. Node-Disjoint Multipath Routing with Group Mobility in MANETs. [Citation Graph (, )][DBLP]


  66. Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks. [Citation Graph (, )][DBLP]


  67. A special class of tensor categories initiated by inverse braid monoids. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002