|
Search the dblp DataBase
Peidong Zhu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wenping Deng, Peidong Zhu, Xicheng Lu, Kaiyu Cai
A Systematic Compression Approach for Route Tables in a BGP Monitor. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:105- [Conf]
- Yantao Pan, Xicheng Lu, Peidong Zhu, Shen Ma
A Diversity-Controllable Genetic Algorithm for Optimal Fused Traffic Planning on Sensor Networks. [Citation Graph (0, 0)][DBLP] Asia-Pacific Computer Systems Architecture Conference, 2006, pp:430-436 [Conf]
- Shanshan Li, Peidong Zhu, Xiangke Liao, Wei-Fang Cheng, Shaoliang Peng
Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2006, pp:114-127 [Conf]
- Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu
Rule-Based Anomaly Detection of Inter-domain Routing System. [Citation Graph (0, 0)][DBLP] APPT, 2005, pp:417-426 [Conf]
- Pan Dong, Peidong Zhu
Research on Self-Organized Evolution of P2P Network Structure. [Citation Graph (0, 0)][DBLP] GCC, 2006, pp:142-148 [Conf]
- Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao
BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree. [Citation Graph (0, 0)][DBLP] HPCC, 2006, pp:406-415 [Conf]
- Xiaozhe Zhang, Wei Peng, Peidong Zhu
ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:752-761 [Conf]
- Xicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng
LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:793-799 [Conf]
- Xiaozhe Zhang, Peidong Zhu, Xicheng Lu
Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:433-441 [Conf]
- Ke Zhu, Peidong Zhu, Xicheng Lu
A New Price Mechanism Inducing Peers to Achieve Optimal Welfare. [Citation Graph (0, 0)][DBLP] ICN (1), 2005, pp:554-560 [Conf]
- Lechun Wang, Peidong Zhu, Zhenghu Gong
Systematic Robustness-Testing RI-Pro of BGP. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:463-468 [Conf]
- Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao
A practical pricing model of inter-domain multicasting based on game theory. [Citation Graph (0, 0)][DBLP] NETGAMES, 2006, pp:40- [Conf]
- Shanshan Li, Peidong Zhu, Xiangke Liao, Qiang Fu
Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach. [Citation Graph (0, 0)][DBLP] NEW2AN, 2006, pp:384-395 [Conf]
- Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao
The Hierarchy of BGP Convergence on the Self-Organized Internet. [Citation Graph (0, 0)][DBLP] PRDC, 2006, pp:391-392 [Conf]
- Yantao Pan, Wei Peng, Xicheng Lu, Shen Ma, Peidong Zhu
A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:457-467 [Conf]
- Xiangke Liao, Shanshan Li, Peidong Zhu, Shaoliang Peng, Wei-Fang Cheng, Dezhun Dong
Path Selection of Reliable Data Delivery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] WASA, 2006, pp:163-174 [Conf]
- Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao
BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility. [Citation Graph (0, 0)][DBLP] ICDCN, 2006, pp:379-384 [Conf]
- Zhengjian Zhu, QingPing Tan, Peidong Zhu
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] APNOMS, 2007, pp:457-465 [Conf]
- Jibo Liu, Chunhua Hu, Peidong Zhu
Research Algorithm Based on Ant-Cooperation for Grid Service. [Citation Graph (0, 0)][DBLP] GCC, 2007, pp:49-58 [Conf]
- Peidong Zhu, Jinjing Zhao, Yan Wen, Kaiyu Cai
On the Power-Law of the Internet and the Hierarchy of BGP Convergence. [Citation Graph (0, 0)][DBLP] ICA3PP, 2007, pp:470-481 [Conf]
- Peng Shao-Liang, Li Shan-Shan, Peng Yu-Xing, Zhu Pei-Dong, Xiao Nong
A Delay Sensitive Feedback Control Data Aggregation Approach in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2007, pp:393-400 [Conf]
- Jianrong Chen, Peidong Zhu, Zhichang Qi
PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] ICESS, 2007, pp:530-539 [Conf]
- Shanshan Li, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng
A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:793-796 [Conf]
- Pan Dong, Peidong Zhu, Xicheng Lu
Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET. [Citation Graph (0, 0)][DBLP] SSS, 2006, pp:570-571 [Conf]
Reputation Mechanism for Inter-domain Routing Security Management. [Citation Graph (, )][DBLP]
AS Alliance in Inter-Domain Routing. [Citation Graph (, )][DBLP]
Cooperative Management Framework for Inter-domain Routing System. [Citation Graph (, )][DBLP]
ROUSSEAU: A Monitoring System for Inter-domain Routing Security. [Citation Graph (, )][DBLP]
An Enhanced Router Topology Discovery Model. [Citation Graph (, )][DBLP]
Does the Average Path Length Grow in the Internet?. [Citation Graph (, )][DBLP]
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. [Citation Graph (, )][DBLP]
A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
TTM Based Security Enhancement for Inter-domain Routing Protocol. [Citation Graph (, )][DBLP]
Evaluating Internal BGP Networks from the Data Plane. [Citation Graph (, )][DBLP]
Optimizing Network Configurations Based on Potential Profit Loss. [Citation Graph (, )][DBLP]
Credit based Fairness Control in Wireless Sensor Network. [Citation Graph (, )][DBLP]
Translator Trust for the Internet Inter-domain Routing. [Citation Graph (, )][DBLP]
Routing Policy Conflict Detection without Violating ISP's Privacy. [Citation Graph (, )][DBLP]
Security Broadcast Based on Linear Network Coding in WSN. [Citation Graph (, )][DBLP]
A Packet-Based Anomaly Detection Model for Inter-domain Routing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|