Jinshu Su
Orcid: 0000-0001-9273-616X
According to our database1,
Jinshu Su
authored at least 256 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A multi-agent collaboration scheme for energy-efficient task scheduling in a 3D UAV-MEC space.
Frontiers Inf. Technol. Electron. Eng., June, 2024
IEEE Netw., March, 2024
J. Comput. Sci. Technol., March, 2024
Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services.
Future Gener. Comput. Syst., 2024
Relation-CNN: Enhancing website fingerprinting attack with relation features and NFS-CNN.
Expert Syst. Appl., 2024
Aquilas: Adaptive QoS-Oriented Multipath Packet Scheduler with Hierarchical Intelligence for QUIC.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024
2023
IEEE/ACM Trans. Netw., December, 2023
In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection in Crowdsensing.
IEEE Trans. Knowl. Data Eng., September, 2023
A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training.
IEEE Trans. Netw. Serv. Manag., June, 2023
Automatic discovery of stateful variables in network protocol software based on replay analysis.
Frontiers Inf. Technol. Electron. Eng., March, 2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023
Comput. Networks, 2023
2022
IEEE Trans. Wirel. Commun., 2022
Frontiers Inf. Technol. Electron. Eng., 2022
An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance.
Comput. Networks, 2022
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022
The Extreme Counts: Modeling the Performance Uncertainty of Cloud Resources with Extreme Value Theory.
Proceedings of the Service-Oriented Computing - 20th International Conference, 2022
Proceedings of the 6th Asia-Pacific Workshop on Networking, 2022
2021
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations.
IEEE Trans. Netw. Sci. Eng., 2021
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021
Secur. Commun. Networks, 2021
Connect. Sci., 2021
Enforcing trustworthy cloud SLA with witnesses: A game theory-based model using smart contracts.
Concurr. Comput. Pract. Exp., 2021
Comput. Secur., 2021
A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based Anomaly Detection Framework for KPI.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
ModelCoder: A Fault Model based Automatic Root Cause Localization Framework for Microservice Systems.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting.
IEEE/ACM Trans. Netw., 2020
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things.
Symmetry, 2020
iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Int. J. Found. Comput. Sci., 2020
IEICE Trans. Inf. Syst., 2020
Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks.
IEEE Access, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
A Software-Hardware Co-exploration Framework for Optimizing Communication in Neuromorphic Processor.
Proceedings of the Advanced Computer Architecture - 13th Conference, 2020
2019
A Cost-Efficient Router Architecture for HPC Inter-Connection Networks: Design and Implementation.
IEEE Trans. Parallel Distributed Syst., 2019
CloudsStorm: A framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications.
Softw. Pract. Exp., 2019
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier.
Secur. Commun. Networks, 2019
Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method.
IEEE Internet Things J., 2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019
Concurr. Comput. Pract. Exp., 2019
CCF Trans. Netw., 2019
iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
IEEE Trans. Cloud Comput., 2018
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN.
Secur. Commun. Networks, 2018
A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE International Conference on Sensing, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
CloudsStorm: An Application-Driven Framework to Enhance the Programmability and Controllability of Cloud Virtual Infrastructures.
Proceedings of the Cloud Computing - CLOUD 2018, 2018
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Empowering Dynamic Task-Based Applications with Agile Virtual Infrastructure Programmability.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw. Pract. Exp., 2017
PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures.
IEEE Syst. J., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
Fast backup and recovery for web protectiuon using trigger and block hash approach.
Comput. Syst. Sci. Eng., 2017
Offset-FA: Detach the Closures and Countings for Efficient Regular Expression Matching.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Automatic privacy leakage detection for massive android apps via a novel hybrid approach.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IEEE Trans. Ind. Electron., 2016
Optimizing link rate assignment and transmission scheduling in WMN through compatible set generation.
Telecommun. Syst., 2016
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016
An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.
J. Medical Syst., 2016
Int. J. Data Warehous. Min., 2016
KSII Trans. Internet Inf. Syst., 2016
A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor.
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Inf. Syst., 2016
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Commun. Surv. Tutorials, 2016
BufferBank storage: an economic, scalable and universally usable in-network storage model for streaming data applications.
Sci. China Inf. Sci., 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2016
Proceedings of the Mobile Internet Security - First International Symposium, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
Proceedings of the Advances in Services Computing, 2016
Linearized Alternating Direction Method of Multipliers for Constrained Nonconvex Regularized Optimization.
Proceedings of The 8th Asian Conference on Machine Learning, 2016
Fast Resource Co-provisioning for Time Critical Applications Based on Networked Infrastructures.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
J. Supercomput., 2015
Secur. Commun. Networks, 2015
Peer-to-Peer Netw. Appl., 2015
Knowl. Based Syst., 2015
Improving application layer multicast forwarding performance by offloading multisend operations.
Comput. Syst. Sci. Eng., 2015
A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm Optimization in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
M2SDN: Achieving multipath and multihoming in data centers with software defined networking.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Towards efficient radio resource scheduling in LTE-based satellite mobile communication system.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wirel. Pers. Commun., 2014
A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2014
Secur. Commun. Networks, 2014
Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet.
New Gener. Comput., 2014
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
J. Networks, 2014
J. Ambient Intell. Humaniz. Comput., 2014
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014
EURO J. Comput. Optim., 2014
SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Proceedings of the 2014 10th International Conference on Semantics, 2014
Proceedings of the Information and Communication Technology, 2014
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Math. Comput. Model., 2013
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Math. Comput. Model., 2013
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013
PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System.
Int. J. Distributed Sens. Networks, 2013
Comput. Sci. Inf. Syst., 2013
Comput. Math. Appl., 2013
Optimal relay node placement for multi-pair cooperative communication in wireless networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of IEEE International Conference on Communications, 2013
Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks.
Proceedings of IEEE International Conference on Communications, 2013
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
IEEE Trans. Serv. Comput., 2012
An efficient distributed key management scheme for group-signature based anonymous authentication in VANET.
Secur. Commun. Networks, 2012
Proceedings of the International Conference on Computational Science, 2012
Mob. Inf. Syst., 2012
Knowl. Based Syst., 2012
Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks.
IEEE J. Sel. Areas Commun., 2012
Assessing the vulnerability of network topologies under large-scale regional failures.
J. Commun. Networks, 2012
Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing.
IEICE Trans. Inf. Syst., 2012
Future Gener. Comput. Syst., 2012
Editorial.
Comput. Syst. Sci. Eng., 2012
ICTree: discovering the underlying connections of your rental virtual machines in the public clouds.
Comput. Syst. Sci. Eng., 2012
Comput. Math. Appl., 2012
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the NETWORKING 2012, 2012
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
J. Comput. Sci. Technol., 2011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Gener. Comput. Syst., 2011
DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree.
Comput. Syst. Sci. Eng., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems.
Knowl. Based Syst., 2010
J. Networks, 2010
Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System.
J. Next Gener. Inf. Technol., 2010
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming.
IEICE Trans. Inf. Syst., 2010
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the ACM CoNEXT Student Workshop, 2010
A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split.
Int. J. Commun. Netw. Syst. Sci., 2009
An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems.
Intell. Autom. Soft Comput., 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Proceedings of the MSN 2009, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the Engineering Secure Software and Systems, 2009
HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems.
Proceedings of the Advances in Artificial Intelligence, 2009
2008
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch.
Int. J. Electron. Secur. Digit. Forensics, 2008
Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems.
Proceedings of the Fourteenth IEEE Internationl Conference on Embedded and Real-Time Computing Systems and Applications, 2008
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems.
Proceedings of the Distributed Embedded Systems: Design, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
Proceedings of the Distributed Computing and Internet Technology, 2006
Proceedings of the Grid and Cooperative Computing, 2006
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006
Proceedings of the Advances in Information Systems, 4th International Conference, 2006
Proceedings of the Advances in Information Systems, 4th International Conference, 2006
2005
OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
2004
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability.
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the Computational Science, 2004
2003
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003