Hejiao Huang

Orcid: 0000-0001-8728-3012

According to our database1, Hejiao Huang authored at least 188 papers between 2000 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Verifiable attribute-based multi-keyword search scheme with sensitive information hiding for cloud-assisted e-healthcare sharing systems.
Theor. Comput. Sci., 2025

Dynamic path finding for multi-load agent pickup and delivery problem.
Theor. Comput. Sci., 2025

2024
A continuous-time diffusion model for inferring multi-layer diffusion networks.
Appl. Intell., September, 2024

Efficient Task Planning for Heterogeneous AGVs in Warehouses.
IEEE Trans. Intell. Transp. Syst., August, 2024

Gria: an efficient deterministic concurrency control protocol.
Frontiers Comput. Sci., August, 2024

Causal Related Rumors Controlling in Social Networks of Multiple Information.
IEEE/ACM Trans. Netw., June, 2024

Multi-Valued Model for Generating Complex Chaos and Fractals.
IEEE Trans. Circuits Syst. I Regul. Pap., June, 2024

VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024

A Dual Cluster Head Hierarchical Routing Protocol for Wireless Sensor Networks Based on Hybrid Swarm Intelligence Optimization.
IEEE Internet Things J., May, 2024

Virtual Machine Placement for Minimizing Image Retrieval Cost and Communication Cost in Cloud Data Center.
IEEE Trans. Netw. Serv. Manag., April, 2024

LSDedup: Layered Secure Deduplication for Cloud Storage.
IEEE Trans. Computers, February, 2024

An effective variational auto-encoder-based model for traffic flow imputation.
Neural Comput. Appl., February, 2024

Energy-Efficient Wireless Power Transfer for Sustainable Federated Learning.
Wirel. Pers. Commun., January, 2024

Multi-Tree Genetic Programming Hyper-Heuristic for Dynamic Flexible Workflow Scheduling in Multi-Clouds.
IEEE Trans. Serv. Comput., 2024

Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024

IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024

Learning traffic as videos: A spatio-temporal VAE approach to periodic traffic raster data imputation.
Intell. Data Anal., 2024

Dodo: A scalable optimistic deterministic concurrency control protocol.
Future Gener. Comput. Syst., 2024

MSTAN: A Multi-view Spatio-Temporal Aggregation Network Learning Irregular Interval User Activities for Fraud Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

Mask Adaptive Spatial-Temporal Recurrent Neural Network for Traffic Forecasting.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

Evolving Scheduling Heuristics for Energy-Efficient Dynamic Workflow Scheduling in Cloud via Genetic Programming Hyper-Heuristics.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Task Planning for The Multi-center Heterogeneous Vehicle Pickup and Delivery Problem.
Proceedings of the Algorithmic Aspects in Information and Management, 2024

2023
Generation of n-Dimensional Hyperchaotic Maps Using Gershgorin-Type Theorem and its Application.
IEEE Trans. Syst. Man Cybern. Syst., October, 2023

PrigSim: Towards Privacy-Preserving Graph Similarity Search as a Cloud Service.
IEEE Trans. Knowl. Data Eng., October, 2023

Enhance Rumor Controlling Algorithms Based on Boosting and Blocking Users in Social Networks.
IEEE Trans. Comput. Soc. Syst., October, 2023

Efficient, economical and energy-saving multi-workflow scheduling in hybrid cloud.
Expert Syst. Appl., October, 2023

SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases.
IEEE Trans. Knowl. Data Eng., September, 2023

Two-Dimensional Exponential Chaotic System With Hardware Implementation.
IEEE Trans. Ind. Electron., September, 2023

Toward Robust Hierarchical Federated Learning in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., May, 2023

Data imputation in IoT using Spatio-Temporal Variational Auto-Encoder.
Neurocomputing, April, 2023

PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing.
Comput. Networks, April, 2023

BatchedGreedy: A batch processing approach for influence maximization with candidate constraint.
Appl. Intell., March, 2023

MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain.
IEEE Trans. Serv. Comput., 2023

ET2FA: A Hybrid Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud.
IEEE Trans. Serv. Comput., 2023

AESM<sup>2</sup> Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2023

Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023

Resource allocation and device pairing for energy-efficient NOMA-enabled federated edge learning.
Comput. Commun., 2023

CCFD-GAN: Credit Card Fraud Detection Based on Generative Adversarial Networks Enhanced by Penalty Mechanism.
Proceedings of the International Joint Conference on Neural Networks, 2023

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Multi-Load Agent Path Finding for Online Pickup and Delivery Problem.
Proceedings of the Computing and Combinatorics - 29th International Conference, 2023

Practical Attribute-Based Multi-keyword Search Scheme with Sensitive Information Hiding for Cloud Storage Systems.
Proceedings of the Combinatorial Optimization and Applications, 2023

An Energy-Efficient Scheduling Method for Real-Time Multi-workflow in Container Cloud.
Proceedings of the Combinatorial Optimization and Applications, 2023

Enabling Efficient Multidimensional Encrypted Data Aggregation for Fog-Cloud-Based Smart Grid.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Efficient Lane-Level Map Building via Vehicle-Based Crowdsourcing.
IEEE Trans. Intell. Transp. Syst., 2022

An $n$-Dimensional Chaotic System Generation Method Using Parametric Pascal Matrix.
IEEE Trans. Ind. Informatics, 2022

OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2022

Influence Spread in Location-Based Social Network: An Efficient Algorithm of Epidemic Controlling.
IEEE Trans. Comput. Soc. Syst., 2022

n-Dimensional Polynomial Chaotic System With Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme With Reward Mechanism.
IEEE Syst. J., 2022

SGPM: A coroutine framework for transaction processing.
Parallel Comput., 2022

Resource Optimization and Device Scheduling for Flexible Federated Edge Learning with Tradeoff Between Energy Consumption and Model Performance.
Mob. Networks Appl., 2022

Multi-Batches Revenue Maximization for competitive products over online social network.
J. Netw. Comput. Appl., 2022

TLHSA and SACA: two heuristic algorithms for two variant VRP models.
J. Comb. Optim., 2022

Fast controlling of rumors with limited cost in social networks.
Comput. Commun., 2022

Device scheduling and channel allocation for energy-efficient Federated Edge Learning.
Comput. Commun., 2022

Spatio-Temporal Data Anomaly Detection Using 3G-Net in IoT.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Cross-plane colour image encryption using a two-dimensional logistic tent modular map.
Inf. Sci., 2021

Rumors clarification with minimum credibility in social networks.
Comput. Networks, 2021

Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Adaptive Dila-DenseNet for Image based Time Series Classification in IoT.
Proceedings of the International Joint Conference on Neural Networks, 2021

Clustered Federated Multi-Task Learning with Non-IID Data.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Analysis for Threat Models and Improvement Scheme of 5G AKA Protocol Based on Petri-net.
Proceedings of the 21st International Conference on Communication Technology, 2021

Security Verification and Improvement of 5G AKA Protocol Based on Petri-net.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

Attribute-based Encrypted Search for Multi-owner and Multi-user Model.
Proceedings of the ICC 2021, 2021

Learning Traffic as Videos: A Spatio-Temporal VAE Approach for Traffic Data Imputation.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

IoT-GAN: Anomaly Detection for Time Series in IoT Based on Generative Adversarial Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

T2FA: A Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud with Multicore Resource.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center.
IEEE Trans. Cloud Comput., 2020

Connected positive influence dominating set in k-regular graph.
Discret. Appl. Math., 2020

Device Scheduling for Energy-Efficient Federated Learning over Wireless Network Based on TDMA Mode.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Multi-echelon Vehicle Routing Problem in Sensor-Cloud Architecture with Mobile Sinks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Anomaly Detection of Periodic Multivariate Time Series under High Acquisition Frequency Scene in IoT.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

An Efficient Algorithm for Clarification of Rumors with Limited Costs in Social Networks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

A Two-Layers Heuristic Search Algorithm for Milk Run with a New PDPTW Model.
Proceedings of the Combinatorial Optimization and Applications, 2020

Multi-AGVs Pathfinding Based on Improved Jump Point Search in Logistic Center.
Proceedings of the Algorithmic Aspects in Information and Management, 2020

Distance-Based Adaptive Large Neighborhood Search Algorithm for Green-PDPTW.
Proceedings of the Algorithmic Aspects in Information and Management, 2020

2019
Minimum Connected Dominating Set Under Routing Cost Constraint in Wireless Sensor Networks With Different Transmission Ranges.
IEEE/ACM Trans. Netw., 2019

Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks.
IEEE Trans. Cloud Comput., 2019

Cosine-transform-based chaotic system for image encryption.
Inf. Sci., 2019

Virtual backbone construction for large-scale ad hoc UAV networks.
Int. J. Sens. Networks, 2019

Image Encryption Using Josephus Problem and Filtering Diffusion.
IEEE Access, 2019

Optimal Satellite Data Downloading to Multiple ESs by ISL Offloading in LEO Satellite Networks.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Optimal Download of Dynamically Generated Data by Using ISL Offloading in LEO Networks.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Dynamic Server Switching for Energy Efficient Mobile Edge Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Network-flow Based Optimal Scheduling for Data Downloading from Satellites to ES in LEO Satellite Networks.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Context-aware Embedding for Targeted Aspect-based Sentiment Analysis.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
Minimal Energy Broadcast for Delay-Bounded Applications in Satellite Networks.
IEEE Trans. Green Commun. Netw., 2018

2D Logistic-Sine-coupling map for image encryption.
Signal Process., 2018

Optimal gateway placement for hybrid BANETs-sensor networks in urban areas.
Int. J. Sens. Networks, 2018

Greening cloud data centers in an economical way by energy trading with power grid.
Future Gener. Comput. Syst., 2018

A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Multi-user Forward Secure Dynamic Searchable Symmetric Encryption.
Proceedings of the Network and System Security - 12th International Conference, 2018

Clustering-based Communication Backbone for Large Scale UAV Networks.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Path Planning for Sensor Data Collection by Using UAVs.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Dynamic Service Caching in Mobile Edge Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

CROTPN Based Collision-Free and Deadlock-Free Path Planning of AGVs in Logistic Center.
Proceedings of the 15th International Conference on Control, 2018

Lifelong Multi-Agent Path Finding in A Dynamic Environment.
Proceedings of the 15th International Conference on Control, 2018

Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases.
Proceedings of the IEEE Global Communications Conference, 2018

Collaborative Service Placement for Mobile Edge Computing Applications.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Collaborative Data Downloading by Using Inter-Satellite Links in LEO Satellite Networks.
IEEE Trans. Wirel. Commun., 2017

A lower bound for the adaptive two-echelon capacitated vehicle routing problem.
J. Comb. Optim., 2017

Optimal RSUs placement with delay bounded message dissemination in vehicular networks.
J. Comb. Optim., 2017

Optimal RSUs deployment with delay bound along highways in VANET.
J. Comb. Optim., 2017

Detecting spammers using review graph.
Int. J. High Perform. Comput. Netw., 2017

Clustering based virtual machines placement in distributed cloud computing.
Future Gener. Comput. Syst., 2017

Reservation schemes for IaaS cloud broker: a time-multiplexing way for different rental time.
Concurr. Comput. Pract. Exp., 2017

A lightweight privacy-preserving scheme for metering data collection in smart grid.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Routing Optimization in Distribution of Cold Chain Logistics.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Time Window Based Path Planning of Multi-AGVs in Logistics Center.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Multi-resource allocation in cloud radio access networks.
Proceedings of the IEEE International Conference on Communications, 2017

Delay-bounded and minimal energy broadcast in satellite networks with multi-power levels.
Proceedings of the IEEE International Conference on Communications, 2017

A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

The Euclidean Vehicle Routing Problem with Multiple Depots and Time Windows.
Proceedings of the Combinatorial Optimization and Applications, 2017

GreenSleep: A Multi-sleep Modes Based Scheduling of Servers for Cloud Data Center.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Scalable and Parallel Processing of Influence Maximization for Large-Scale Social Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Minimizing Energy Cost by Dynamic Switching ON/OFF Base Stations in Cellular Networks.
IEEE Trans. Wirel. Commun., 2016

Resource provision algorithms in cloud computing: A survey.
J. Netw. Comput. Appl., 2016

Approximation schemes for Euclidean vehicle routing problems with time windows.
J. Comb. Optim., 2016

Key based data analytics across data centers considering bi-level resource provision in cloud computing.
Future Gener. Comput. Syst., 2016

Lowering Down the Cost for Green Cloud Data Centers by Using ESDs and Energy Trading.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Planning for green cloud data centers using sustainable energy.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Distributed Real-Time Pricing Scheme for Local Power Supplier in Smart Community.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Delay-bounded and minimal transmission broadcast in LEO satellite networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Green scheduling for cloud data centers using ESDs to store renewable energy.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Optimal Data Downloading by Using Inter-Satellite Offloading in LEO Satellite Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Solving Dynamic Vehicle Routing Problem with Soft Time Window by iLNS and hPSO.
Proceedings of the Combinatorial Optimization and Applications, 2016

Minimizing Energy Cost of Base Stations with Consideration of Switching on/off Cost.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Set covering in fuel-considered vehicle routing problems.
Theor. Comput. Sci., 2015

Handling least privilege problem and role mining in RBAC.
J. Comb. Optim., 2015

A Tree Regression-Based Approach for VM Power Metering.
IEEE Access, 2015

Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Distributed load scheduling in smart community with capacity constrained local power supplier.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Minimizing energy cost for green cloud data centers by using ESDs.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Green scheduling for cloud data centers using renewable resources.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Dynamic Resource Provision for Cloud Broker with Multiple Reserved Instance Terms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Towards VM Power Metering: A Decision Tree Method and Evaluations.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Green Scheduler for Cloud Data Centers Using Renewable Energy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Hybrid Large Neighborhood Search for Dynamic Vehicle Routing Problem with Time Deadline.
Proceedings of the Combinatorial Optimization and Applications, 2015

Indoor Localization via Candidate Fingerprints and Genetic Algorithm.
Proceedings of the Combinatorial Optimization and Applications, 2015

2014
Delay minimization and priority scheduling in wireless mesh networks.
Wirel. Networks, 2014

Power Metering for Virtual Machine in Cloud Computing-Challenges and Opportunities.
IEEE Access, 2014

Optimal RSUs Deployment in Vehicular Networks.
Proceedings of the Web-Age Information Management, 2014

SLA aware cost efficient virtual machines placement in cloud computing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Influence maximization in social networks with user attitude modification.
Proceedings of the IEEE International Conference on Communications, 2014

Barrier Coverage with Discrete Levels of Sensing and Transmission Power in Wireless Sensor Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

A Quasi-polynomial Time Approximation Scheme for Euclidean CVRPTW.
Proceedings of the Combinatorial Optimization and Applications, 2014

A Bicriteria Approximation Algorithm for DVRP with Time Windows.
Proceedings of the Combinatorial Optimization and Applications, 2014

2013
A support vector machine based MSM model for financial short-term volatility forecasting.
Neural Comput. Appl., 2013

Secure interoperation design in multi-domains environments based on colored Petri nets.
Inf. Sci., 2013

Rumor restriction in Online Social Networks.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Keynote: Specification and Conflict Detection for GTRBAC in Multi-domain Environment.
Proceedings of the Business Process Management Workshops, 2013

2012
A novel text mining approach to financial time series forecasting.
Neurocomputing, 2012

Petri-Net-Based Modeling and Resolving of Black Hole Attack in WMN.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Approximation Algorithms for Minimizing the Number of Roles and Administrative Assignments in RBAC.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets.
IEEE Trans. Dependable Secur. Comput., 2011

Analysis of the Petri net model of parallel manufacturing processes with shared resources.
Inf. Sci., 2011

Greedy Algorithm for Least Privilege in RBAC Model.
Proceedings of the Combinatorial Optimization and Applications, 2011

2010
Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources.
J. Syst. Softw., 2010

Solving a Multi-Objective Flexible Job shop Scheduling Problem with Timed Petri Nets and Genetic Algorithm.
Discret. Math. Algorithms Appl., 2010

Vision-Based Hand Gesture Recognition Using Combinational Features.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks.
Wirel. Pers. Commun., 2009

Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Handling inheritance violation for secure interoperation of heterogeneous systems.
Int. J. Secur. Networks, 2009

Channel assignment using block design in wireless mesh networks.
Comput. Commun., 2009

A QoS Framework with Traffic Request in Wireless Mesh Network.
Proceedings of the Wireless Algorithms, 2009

Policy Composition Based on Petri Nets.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Role-Based Access Control for Distributed Cooperation Environment.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Component-Based Security Policy Design with Colored Petri Nets.
Proceedings of the Semantics and Algebraic Specification, 2009

2008
Handling Resource Sharing Problem Using Property-Preserving Place Fusions of Petri Nets.
J. Circuits Syst. Comput., 2008

Topology simplification and channel assignment in multi-radio Wireless Mesh Networks.
Proceedings of the IEEE International Conference on Systems, 2008

A technique for generating the reduced reachability graph of petri net models.
Proceedings of the IEEE International Conference on Systems, 2008

Joint Routing and Channel Assignment in WMN Using Extended Petri Net.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Throughput Maximization with Traffic Profile in Wireless Mesh Network.
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008

2007
Applications of Property-Preserving Algebras to Component-Based Manufacturing System Design.
J. Inf. Sci. Eng., 2007

2005
Property-preserving Composition by Place Merging.
J. Circuits Syst. Comput., 2005

2004
Structure and behavior preservation by Petri-net-based refinements in system design.
Theor. Comput. Sci., 2004

Optimal Data Replica Placements in Linear Bus Networks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

2003
On the optimal placement of wavelength converters in WDM networks.
Comput. Commun., 2003

2002
Placement of Wavelength Converters for Minimal Wavelength Usage in WDM Networks.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
Placement of Data Replicas for Optimal Data Availability in Ring Networks.
J. Parallel Distributed Comput., 2001

2000
Optimal Placement of Proxies of Replicated Web Servers in the Internet.
Proceedings of the WISE 2000, 2000

A new wavelength assignment method for minimal wavelength conversions in WDM networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...