The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xuemin Shen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hui Chen, Yang Xiao, Xuemin Shen
    Update-based cache replacement policies in wireless data access. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:857-864 [Conf]
  2. Jianping Pan, Jon W. Mark, Xuemin Shen
    End-to-end TCP Performance with Local Retransmissions. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing (1), 2001, pp:332-338 [Conf]
  3. Janaki Bandara, Xuemin Shen, Zafrin Nurmohamed
    A Fuzzy Resource Controller for Non-Real-Time Traffic in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICC (1), 2000, pp:75-79 [Conf]
  4. Wei Cui, Xuemin Shen
    User Movement Tendency Prediction and Call Admission Control for Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:670-674 [Conf]
  5. Dongmei Zhao, Xuemin Shen, Jon W. Mark
    Call Admission Control for Heterogeneous Services in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:964-968 [Conf]
  6. Lin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan
    A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2008-2019 [Conf]
  7. Mohammad Mursalin Akon, Ajit Singh, Xuemin Shen, Dhrubajyoti Goswami, Hon Fung Li
    Developing High-Performance Parallel Applications Using EPAS. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:431-441 [Conf]
  8. Dongmei Zhao, Xuemin Shen, Jon W. Mark
    Effect of Soft Handoff on Packet Transmissions in Cellular CDMA Downlinks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:42-47 [Conf]
  9. Lin Cai, Jianping Pan, Xuemin Shen, Jon W. Mark
    Peer Collaboration in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:840-852 [Conf]
  10. Mehrdad Dianati, Xinhua Ling, Sagar Naik, Xuemin Shen
    A Node Cooperative ARQ Scheme for Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1418-1421 [Conf]
  11. Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi
    Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:114-125 [Conf]
  12. Yu Zeng, Jon W. Mark, Xuemin Shen
    Indirect RSVP for Virtual Cluster Cellular Mobile IP Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:338-349 [Conf]
  13. Jun Cai, Kuang-Hao Liu, Xuemin Shen, Jon W. Mark, Terence D. Todd
    Power Allocation and Scheduling for MAC Layer Design in UWB Networks. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:2- [Conf]
  14. Lin Cai, Xuemin Shen, Jon W. Mark, Yang Xiao
    Voice Capacity Analysis of WLAN with Unbalanced Traffic. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:9- [Conf]
  15. Weiwei Wang, Zihua Guo, Xuemin Shen, Changjia Chen, Jun Cai
    Dynamic Bandwidth Allocation in IEEE 802.16. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:104-114 [Conf]
  16. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
    Self-healing group key distribution with time-limited node revocation for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:14-23 [Journal]
  17. Xuemin Shen, Jon W. Mark
    Mobility information for resource management in wireless ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:9-10, pp:1049-1062 [Journal]
  18. Jinfang Zhang, Jon W. Mark, Xuemin Shen
    An adaptive handoff priority scheme for wireless MC-CDMA cellular networks supporting realtime multimedia applications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:10, pp:1240-1250 [Journal]
  19. Lin Cai, Jun Ye, Jianping Pan, Xuemin Shen, Jon W. Mark
    Dynamic server selection using fuzzy inference in content distribution networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:8, pp:1026-1038 [Journal]
  20. Xuemin Shen, Phone Lin, Yi-Bing Lin, Y. Thomas Hou
    Special Issue on Next Generation Wireless Technologies. [Citation Graph (0, 0)][DBLP]
    MONET, 2007, v:12, n:1, pp:1-3 [Journal]
  21. Wei Song, Hai Jiang, Weihua Zhuang, Xuemin Shen
    Resource management for QoS support in cellular/WLAN interworking. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2005, v:19, n:5, pp:12-18 [Journal]
  22. Hui Chen, Yang Xiao, Xuemin Shen
    Update-Based Cache Access and Replacement in Wireless Data Access. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:12, pp:1734-1748 [Journal]
  23. Humphrey Rutagemwa, Xuemin Shen
    Modeling and Analysis of WAP Performance over Wireless Links. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2003, v:2, n:3, pp:221-232 [Journal]
  24. Liang Xu, Xuemin Shen, Jon W. Mark
    Fair Resource Allocation with Guaranteed Statistical QoS for Multimedia Traffic in Wideband CDMA Cellular Network. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2005, v:4, n:2, pp:166-177 [Journal]
  25. Jun Ye, Xuemin Shen, Jon W. Mark
    Call Admission Control in Wideband CDMA Cellular Networks by Using Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2005, v:4, n:2, pp:129-141 [Journal]
  26. Dongmei Zhao, Xuemin Shen, Jon W. Mark
    Radio Resource Management for Cellular CDMA Systems Supporting Heterogeneous Services. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2003, v:2, n:2, pp:147-160 [Journal]
  27. Lin Cai, Xuemin Shen, Jianping Pan, Jon W. Mark
    Performance analysis of TCP-friendly AIMD algorithms for multimedia applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:2, pp:339-355 [Journal]
  28. Xuemin Shen, Hisashi Kobayashi, Xiaohu You, Jianping Pan
    Special issue: medium access control protocols for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:741-743 [Journal]
  29. Xuemin Shen, Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao
    Wireless network security. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:269-271 [Journal]
  30. Weihua Zhuang, Xuemin Shen, Qi Bi
    Ultra-wideband wireless communications. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2003, v:3, n:6, pp:663-685 [Journal]
  31. Xuemin Shen, Jon W. Mark, Jun Ye
    User mobility profile prediction: An adaptive fuzzy inference approach. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2000, v:6, n:5, pp:363-374 [Journal]
  32. Dongmei Zhao, Xuemin Shen, Jon W. Mark
    QoS Performance Bounds and Efficient Connection Admission Control for Heterogeneous Services in Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:1, pp:85-95 [Journal]
  33. Yang Xiao, Xuemin Shen, Lin Cai, Jon W. Mark
    VoIP over WLAN: voice capacity, admission control, QoS, and MAC. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:4, pp:491-508 [Journal]
  34. Bin Lin, Pin-Han Ho, Liang-Liang Xie, Xuemin Shen
    Optimal relay station placement in IEEE 802.16j networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:25-30 [Conf]
  35. Fen Hou, Pin-Han Ho, Xuemin Shen
    Performance evaluation for unsolicited grant service flows in 802.16 networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:991-996 [Conf]
  36. Wenjie Guan, Xinhua Ling, Xuemin Shen, Dongmei Zhao
    Handoff trigger table for integrated 3G/WLAN networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:575-580 [Conf]
  37. Yuning He, Yongbing Zhang, Yusheng Ji, Xuemin Shen
    A new energy efficient approach by separating data collection and data report in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:1165-1170 [Conf]
  38. Hui Chen, Yang Xiao, Xuemin Shen
    Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  39. Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen
    A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  40. Weiwei Wang, Zihua Guo, Xuemin Shen, Changjia Chen
    Performance Analysis of ARQ Scheme in IEEE 802.16. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  41. Fen Hou, Pin-Han Ho, Xuemin Shen
    Performance Analysis of a Reservation Based Connection Admission Scheme in 802.16 Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  42. Kuang-Hao Liu, Lin Cai, Xuemin Shen
    Performance Enhancement of Medium Access Control for UWB WPAN. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  43. Veluppillai Mahinthan, Jon W. Mark, Xuemin Shen
    Adaptive Regenerate and Forward Cooperative Diversity System based on Quadrature Signaling. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  44. Yu Cheng, Lin Cai, Xinhua Ling, Wei Song, Weihua Zhuang, Xuemin Shen, Alberto Leon-Garcia
    Improvement of WLAN QoS Capability via Statistical Multiplexing. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  45. Humphrey Rutagemwa, Veluppillai Mahinthan, Jon W. Mark, Xuemin Shen
    Second Order Statistics of Non-identical Nakagami Fading Channels with Maximal-Ratio Combining. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  46. Sangheon Pack, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Lin Cai
    An Analytical Framework for Studying the Performance of Mobile Hotspots. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  47. Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, Xuemin Shen
    Distributed Medium Access Control in Pulse-Based Time-Hopping UWB Wireless Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  48. Jun Cai, Xuemin Shen, Jon W. Mark, Attahiru Sule Alfa
    Resource Allocation in Wireless Relay Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  49. Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
    Capacity analysis and MAC enhancement for UWB broadband wireless access networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:11, pp:3265-3277 [Journal]
  50. Lijun Wang, Lin Cai, Xinzhi Liu, Xuemin Shen
    Stability and TCP-friendliness of AIMD/RED systems with feedback delays. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:15, pp:4475-4491 [Journal]
  51. Jianping Pan, Lin Cai, Xuemin Shen, Jon W. Mark
    Identity-based secure collaboration in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:853-865 [Journal]
  52. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu
    A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal]
  53. Sangheon Pack, Xuemin Shen, Jon W. Mark, Jianping Pan
    Adaptive Route Optimization in Hierarchical Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:8, pp:903-914 [Journal]
  54. Fang-Ming Shao, Xuemin Shen, Pin-Han Ho
    Reliability optimization of distributed access networks with constrained total cost. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2005, v:54, n:3, pp:421-430 [Journal]
  55. Yuguang Fang, Xuemin Shen
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:3, pp:281-283 [Journal]

  56. A New Modeling Approach for Utility-Based Resource Allocation in OFDM Networks. [Citation Graph (, )][DBLP]


  57. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  58. Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  59. PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  60. AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  61. Delay Analysis of Distributed Reservation Protocol with UWB Shadowing Channel for WPAN. [Citation Graph (, )][DBLP]


  62. Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  63. Differentiated Reliable Routing in Hybrid Vehicular Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  64. Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks. [Citation Graph (, )][DBLP]


  65. Cooperative Multicast Scheduling Scheme for IPTV Service over IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  66. Relay Station Placement in IEEE 802.16j Dual-Relay MMR Networks. [Citation Graph (, )][DBLP]


  67. Performance Analysis of Weighted Proportional Fairness Scheduling in IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  68. A Novel Overlay Token Ring Protocol for Inter-Vehicle Communication. [Citation Graph (, )][DBLP]


  69. OFDMA Based Two-Hop Cooperative Relay Network Resources Allocation. [Citation Graph (, )][DBLP]


  70. Practical Stability and Bounds of Heterogeneous AIMD/RED System with Time Delay. [Citation Graph (, )][DBLP]


  71. Fairness Improvement and Efficient Rerouting in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  72. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  73. Efficient Data Access Algorithms for ITS-based Networks with Multi-Hop Wireless Links. [Citation Graph (, )][DBLP]


  74. Two-Factor Localized Authentication Scheme for WLAN Roaming. [Citation Graph (, )][DBLP]


  75. An Agent Based Authentication Architecture for WLAN/Cellular Integrated Service. [Citation Graph (, )][DBLP]


  76. Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover. [Citation Graph (, )][DBLP]


  77. Optimizing Power Allocation and Matching of Cooperative Diversity Systems. [Citation Graph (, )][DBLP]


  78. A Cross-Layered Peer-to-Peer Architecture for Wireless Mobile Networks. [Citation Graph (, )][DBLP]


  79. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]


  80. Optimizing Distributed MAC Protocol for Multi-Hop Ultra-Wideband Wireless Networks. [Citation Graph (, )][DBLP]


  81. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  82. SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. [Citation Graph (, )][DBLP]


  83. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. [Citation Graph (, )][DBLP]


  84. Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach. [Citation Graph (, )][DBLP]


  85. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]


  86. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  87. Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System. [Citation Graph (, )][DBLP]


  88. P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP]


  89. A novel distributed connection admission control scheme for ieee 802.16 networks. [Citation Graph (, )][DBLP]


  90. A Markov model for per-user service of opportunistic scheduling. [Citation Graph (, )][DBLP]


  91. Performance Enhancement for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  92. Spatial Multiplexing Capacity Analysis of mmWave WPANs with Directional Antennae. [Citation Graph (, )][DBLP]


  93. A Novel Performance Model for Distributed Prioritized MAC Protocols. [Citation Graph (, )][DBLP]


  94. Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  95. Flow-Satisfaction-Degree Based Scheduling Algorithm in Static Reuse Partitioning System. [Citation Graph (, )][DBLP]


  96. Performance Analysis of ARQ with Opportunistic Scheduling in IEEE 802.16 Networks. [Citation Graph (, )][DBLP]


  97. Stability and Fairness Analysis of AIMD/RED System with Heterogeneous Delays. [Citation Graph (, )][DBLP]


  98. Performance of Adaptive Relaying Schemes in Cooperative Diversity Systems with ARQ. [Citation Graph (, )][DBLP]


  99. Network Planning for Next-Generation Metropolitan-Area Broadband Access under EPON-WiMAX Integration. [Citation Graph (, )][DBLP]


  100. An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security. [Citation Graph (, )][DBLP]


  101. A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks. [Citation Graph (, )][DBLP]


  102. A Tree-Based Signature Scheme for VANETs. [Citation Graph (, )][DBLP]


  103. ECMV: Efficient Certificate Management Scheme for Vehicular Networks. [Citation Graph (, )][DBLP]


  104. A Multi-Channel Token Ring Protocol for Inter-Vehicle Communications. [Citation Graph (, )][DBLP]


  105. Uplink Ergodic Mutual Information of OFDMA-Based Two-Hop Cooperative Relay Networks with Imperfect CSI. [Citation Graph (, )][DBLP]


  106. BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  107. Delay-Dependent Stability Analysis for Large-Scale Multiple-Bottleneck Systems Using Singular Perturbation Approach. [Citation Graph (, )][DBLP]


  108. Adaptive Asynchronous Clock Based Power Saving Protocols for Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  109. A Graph Embedding Method for Wireless Sensor Networks Localization. [Citation Graph (, )][DBLP]


  110. An Adaptive Forwarding Scheme for Message Delivery over Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  111. SPID: A Novel P2P-Based Information Diffusion Scheme for Mobile Networks. [Citation Graph (, )][DBLP]


  112. MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  113. Maintaining Utility Fairness Using Weighting Factors in Wireless Networks. [Citation Graph (, )][DBLP]


  114. Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding. [Citation Graph (, )][DBLP]


  115. ASIC: Aggregate Signatures and Certificates Verification Scheme for Vehicular Networks. [Citation Graph (, )][DBLP]


  116. Power Allocation for Cooperative Diversity Networks with Inaccurate CSI: A Robust and Constrained Kalman Filter Approach. [Citation Graph (, )][DBLP]


  117. Optimal Flow Control for Utility-Lifetime Tradeoff in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  118. Networked Ultrasonic Sensors for Target Tracking: An Experimental Study. [Citation Graph (, )][DBLP]


  119. On hybrid impulsive and switching control with application to chaotic systems. [Citation Graph (, )][DBLP]


  120. Efficient Re-Keying Scheme for Group Key Distribution. [Citation Graph (, )][DBLP]


  121. Mobility-Aware Multi-Path Forwarding Scheme for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  122. A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]


  123. A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  124. MAC Performance Analysis for Vehicle-to-Infrastructure Communication. [Citation Graph (, )][DBLP]


  125. Boundedness of Heterogeneous TCP Flows with Multiple Bottlenecks. [Citation Graph (, )][DBLP]


  126. A Classification-Based Path Selection Scheme for Video Streaming over Multi-Hop Networks. [Citation Graph (, )][DBLP]


  127. Disjoint Multipath Routing and QoS Provisioning Under Physical Interference Constraints. [Citation Graph (, )][DBLP]


  128. Capacity enhancement with relay station placement in wireless cooperative networks. [Citation Graph (, )][DBLP]


  129. User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks. [Citation Graph (, )][DBLP]


  130. Stability analysis of multiple-bottleneck networks. [Citation Graph (, )][DBLP]


  131. Multiple frequency reuse schemes in the two-hop IEEE 802.16j wireless relay networks with asymmetrical topology. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.029secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002