The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peidong Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenping Deng, Peidong Zhu, Xicheng Lu, Kaiyu Cai
    A Systematic Compression Approach for Route Tables in a BGP Monitor. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:105- [Conf]
  2. Yantao Pan, Xicheng Lu, Peidong Zhu, Shen Ma
    A Diversity-Controllable Genetic Algorithm for Optimal Fused Traffic Planning on Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:430-436 [Conf]
  3. Shanshan Li, Peidong Zhu, Xiangke Liao, Wei-Fang Cheng, Shaoliang Peng
    Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:114-127 [Conf]
  4. Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu
    Rule-Based Anomaly Detection of Inter-domain Routing System. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:417-426 [Conf]
  5. Pan Dong, Peidong Zhu
    Research on Self-Organized Evolution of P2P Network Structure. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:142-148 [Conf]
  6. Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao
    BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:406-415 [Conf]
  7. Xiaozhe Zhang, Wei Peng, Peidong Zhu
    ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:752-761 [Conf]
  8. Xicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng
    LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:793-799 [Conf]
  9. Xiaozhe Zhang, Peidong Zhu, Xicheng Lu
    Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:433-441 [Conf]
  10. Ke Zhu, Peidong Zhu, Xicheng Lu
    A New Price Mechanism Inducing Peers to Achieve Optimal Welfare. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:554-560 [Conf]
  11. Lechun Wang, Peidong Zhu, Zhenghu Gong
    Systematic Robustness-Testing RI-Pro of BGP. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:463-468 [Conf]
  12. Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao
    A practical pricing model of inter-domain multicasting based on game theory. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2006, pp:40- [Conf]
  13. Shanshan Li, Peidong Zhu, Xiangke Liao, Qiang Fu
    Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach. [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2006, pp:384-395 [Conf]
  14. Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao
    The Hierarchy of BGP Convergence on the Self-Organized Internet. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:391-392 [Conf]
  15. Yantao Pan, Wei Peng, Xicheng Lu, Shen Ma, Peidong Zhu
    A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:457-467 [Conf]
  16. Xiangke Liao, Shanshan Li, Peidong Zhu, Shaoliang Peng, Wei-Fang Cheng, Dezhun Dong
    Path Selection of Reliable Data Delivery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:163-174 [Conf]
  17. Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao
    BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility. [Citation Graph (0, 0)][DBLP]
    ICDCN, 2006, pp:379-384 [Conf]
  18. Zhengjian Zhu, QingPing Tan, Peidong Zhu
    An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    APNOMS, 2007, pp:457-465 [Conf]
  19. Jibo Liu, Chunhua Hu, Peidong Zhu
    Research Algorithm Based on Ant-Cooperation for Grid Service. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:49-58 [Conf]
  20. Peidong Zhu, Jinjing Zhao, Yan Wen, Kaiyu Cai
    On the Power-Law of the Internet and the Hierarchy of BGP Convergence. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:470-481 [Conf]
  21. Peng Shao-Liang, Li Shan-Shan, Peng Yu-Xing, Zhu Pei-Dong, Xiao Nong
    A Delay Sensitive Feedback Control Data Aggregation Approach in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:393-400 [Conf]
  22. Jianrong Chen, Peidong Zhu, Zhichang Qi
    PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICESS, 2007, pp:530-539 [Conf]
  23. Shanshan Li, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng
    A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:793-796 [Conf]
  24. Pan Dong, Peidong Zhu, Xicheng Lu
    Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:570-571 [Conf]

  25. Reputation Mechanism for Inter-domain Routing Security Management. [Citation Graph (, )][DBLP]


  26. AS Alliance in Inter-Domain Routing. [Citation Graph (, )][DBLP]


  27. Cooperative Management Framework for Inter-domain Routing System. [Citation Graph (, )][DBLP]


  28. ROUSSEAU: A Monitoring System for Inter-domain Routing Security. [Citation Graph (, )][DBLP]


  29. An Enhanced Router Topology Discovery Model. [Citation Graph (, )][DBLP]


  30. Does the Average Path Length Grow in the Internet?. [Citation Graph (, )][DBLP]


  31. SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. [Citation Graph (, )][DBLP]


  32. A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  33. TTM Based Security Enhancement for Inter-domain Routing Protocol. [Citation Graph (, )][DBLP]


  34. Evaluating Internal BGP Networks from the Data Plane. [Citation Graph (, )][DBLP]


  35. Optimizing Network Configurations Based on Potential Profit Loss. [Citation Graph (, )][DBLP]


  36. Credit based Fairness Control in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  37. Translator Trust for the Internet Inter-domain Routing. [Citation Graph (, )][DBLP]


  38. Routing Policy Conflict Detection without Violating ISP's Privacy. [Citation Graph (, )][DBLP]


  39. Security Broadcast Based on Linear Network Coding in WSN. [Citation Graph (, )][DBLP]


  40. A Packet-Based Anomaly Detection Model for Inter-domain Routing. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002