Sammy Chan

Orcid: 0000-0002-8524-229X

Affiliations:
  • City University of Hong Kong


According to our database1, Sammy Chan authored at least 207 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems.
Clust. Comput., November, 2024

A hierarchical hybrid intrusion detection model for industrial internet of things.
Peer Peer Netw. Appl., September, 2024

UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks.
IEEE Internet Things J., September, 2024

GSASG: Global Sparsification With Adaptive Aggregated Stochastic Gradients for Communication-Efficient Federated Learning.
IEEE Internet Things J., September, 2024

Improving byzantine fault tolerance based on stake evaluation and consistent hashing.
Peer Peer Netw. Appl., July, 2024

FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows.
IEEE Netw., July, 2024

Special Characters Usage and Its Effect on Password Security.
IEEE Internet Things J., June, 2024

On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies.
IEEE Trans. Consumer Electron., February, 2024

Unknown Threats Detection Methods of Smart Contracts.
IEEE Internet Things J., February, 2024

A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking.
IEEE Internet Things J., January, 2024

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization.
Ad Hoc Networks, January, 2024

Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2024

You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted.
IEEE Trans. Dependable Secur. Comput., 2024

A Lightweight and Secure Communication Protocol for the IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2024

A comprehensive survey of smart contract security: State of the art and research directions.
J. Netw. Comput. Appl., 2024

A Comprehensive Detection Method for the Lateral Movement Stage of APT Attacks.
IEEE Internet Things J., 2024

Virtual-Mobile-Agent-Assisted Boundary Tracking for Continuous Objects in Underwater Acoustic Sensor Networks.
IEEE Internet Things J., 2024

2023
A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT.
IEEE Trans. Wirel. Commun., November, 2023

A Malicious Domains Detection Method Based on File Sandbox Traffic.
IEEE Netw., November, 2023

Detection of Vulnerabilities of Blockchain Smart Contracts.
IEEE Internet Things J., July, 2023

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-based authentication and secure communication in IoT networks.
Secur. Priv., 2023

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly.
IEEE Internet Things J., 2023

A Novel Authentication Protocol for IoT-Enabled Devices.
IEEE Internet Things J., 2023

Fuzzy Hashing on Firmwares Images: A Comparative Analysis.
IEEE Internet Comput., 2023

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection.
Int. J. Intell. Syst., 2023

Effectiveness of Authentication Schemes in the Internet of Things Networks with Different Structural Topologies.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
An Effective Double-Layer Detection System Against Social Engineering Attacks.
IEEE Netw., 2022

Adversarial Attacks for Intrusion Detection Based on Bus Traffic.
IEEE Netw., 2022

Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices.
IEEE Internet Things J., 2022

Design and Formal Analysis of a Lightweight MIPv6 Authentication Scheme.
IEEE Internet Things J., 2022

Secure Logistic Regression for Vertical Federated Learning.
IEEE Internet Comput., 2022

A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning.
Expert Syst. Appl., 2022

2021
Deep logarithmic neural network for Internet intrusion detection.
Soft Comput., 2021

Group-based Password Characteristics Analysis.
IEEE Netw., 2021

How Does Social Behavior Affect Your Password?
IEEE Netw., 2021

An Effective Countermeasure Against UAV Swarm Attack.
IEEE Netw., 2021

Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021

Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing.
IEEE Internet Things J., 2021

Intrusion detection methods based on integrated deep learning model.
Comput. Secur., 2021

Fraudulent News Headline Detection with Attention Mechanism.
Comput. Intell. Neurosci., 2021

IEEE Access Special Section Editorial: Emerging Trends, Issues, and Challenges in Underwater Acoustic Sensor Networks.
IEEE Access, 2021

A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Feature Engineering Framework based on Secure Multi-Party Computation in Federated Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Review of Firmware Homology Detection: a System Aspect.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Group Password Strength Meter Based on Attention Mechanism.
IEEE Netw., 2020

Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020

Simulation Design for Security Testing of Integrated Electronic Systems.
IEEE Netw., 2020

Fake Review Detection Based on PU Learning and Behavior Density.
IEEE Netw., 2020

A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems.
IEEE Netw., 2020

Security Analysis of Cryptocurrency Wallets in Android-Based Applications.
IEEE Netw., 2020

Smart Contract Vulnerability Analysis and Security Audit.
IEEE Netw., 2020

CTRA: A complex terrain region-avoidance charging algorithm in Smart World.
J. Netw. Comput. Appl., 2020

Delay-aware and cost-efficient probabilistic transmission for opportunistic networks.
IET Networks, 2020

Computation offloading time optimisation via Q-learning in opportunistic edge computing.
IET Commun., 2020

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities.
Future Gener. Comput. Syst., 2020

STC: an intelligent trash can system based on both NB-IoT and edge computing for smart cities.
Enterp. Inf. Syst., 2020

Deterministic Algorithms for Solving Boolean Polynomial Equations Based on Channel Coding Theory.
IEEE Access, 2020

TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Hybrid Intrusion Detection Mechanisms for Integrated Electronic Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2019

An Uneven Cluster-Based Mobile Charging Algorithm for Wireless Rechargeable Sensor Networks.
IEEE Syst. J., 2019

PMS: Intelligent Pollution Monitoring System Based on the Industrial Internet of Things for a Healthier City.
IEEE Netw., 2019

Intrusion Detection Based on Stacked Autoencoder for Connected Healthcare Systems.
IEEE Netw., 2019

How to Govern the Non-Cooperative Amateur Drones?
IEEE Netw., 2019

A Coverage-Aware Hierarchical Charging Algorithm in Wireless Rechargeable Sensor Networks.
IEEE Netw., 2019

Performance Modeling of Representative Load Sharing Schemes for Clustered Servers in Multiaccess Edge Computing.
IEEE Internet Things J., 2019

A Maximum Cache Value Policy in Hybrid Memory-Based Edge Computing for Mobile Devices.
IEEE Internet Things J., 2019

Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019

2018
KCLP: A k-Means Cluster-Based Location Privacy Protection Scheme in WSNs for IoT.
IEEE Wirel. Commun., 2018

Dynamic cloud resource management for efficient media applications in mobile computing environments.
Pers. Ubiquitous Comput., 2018

Security Analysis of a Space-Based Wireless Network.
IEEE Netw., 2018

Privacy-friendly and efficient secure communication framework for V2G networks.
IET Commun., 2018

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things.
Future Gener. Comput. Syst., 2018

An SNR-Assured Anti-Jamming Routing Protocol for Reliable Communication in Industrial Wireless Sensor Networks.
IEEE Commun. Mag., 2018

Privacy in the Internet of Things for Smart Healthcare.
IEEE Commun. Mag., 2018

Flight Security and Safety of Drones in Airborne Fog Computing Systems.
IEEE Commun. Mag., 2018

Imminent Communication Security for Smart Communities.
IEEE Commun. Mag., 2018

Security in the Internet of Things Supported by Mobile Edge Computing.
IEEE Commun. Mag., 2018

CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT.
IEEE Commun. Mag., 2018

A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities.
IEEE Commun. Mag., 2018

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 3.
IEEE Commun. Mag., 2018

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities: Part 2.
IEEE Commun. Mag., 2018

2017
Channel Hopping Protocols for Dynamic Spectrum Management in 5G Technology.
IEEE Wirel. Commun., 2017

Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring.
IEEE Wirel. Commun., 2017

Communication Security of Unmanned Aerial Vehicles.
IEEE Wirel. Commun., 2017

A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

Win-Win Security Approaches for Smart Grid Communications Networks.
IEEE Netw., 2017

Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation.
IEEE Internet Things J., 2017

On blocking time in multi-class optical burst switching nodes.
Int. J. Commun. Syst., 2017

A Trust Cloud Model for Underwater Wireless Sensor Networks.
IEEE Commun. Mag., 2017

Drone-Assisted Public Safety Networks: The Security Aspect.
IEEE Commun. Mag., 2017

HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint.
IEEE Commun. Mag., 2017

Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities.
IEEE Commun. Mag., 2017

A MAC Protocol for Full Duplex Cellular Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Throughput Improvement of 802.11 Networks Via Randomization of Transmission Power Levels.
IEEE Trans. Veh. Technol., 2016

An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks.
IEEE Trans. Veh. Technol., 2016

The Application of DOA Estimation Approach in Patient Tracking Systems with High Patient Density.
IEEE Trans. Ind. Informatics, 2016

PD Source Diagnosis and Localization in Industrial High-Voltage Insulation System via Multimodal Joint Sparse Representation.
IEEE Trans. Ind. Electron., 2016

Security and privacy in Internet of things: methods, architectures, and solutions.
Secur. Commun. Networks, 2016

Securing software defined wireless networks.
IEEE Commun. Mag., 2016

Recent advances in green industrial networking [Guest Editorial].
IEEE Commun. Mag., 2016

PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Mobile application security: malware threats and defenses.
IEEE Wirel. Commun., 2015

User privacy and data trustworthiness in mobile crowd sensing.
IEEE Wirel. Commun., 2015

Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2015

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Handover authentication for mobile networks: security and efficiency aspects.
IEEE Netw., 2015

Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model.
Int. J. Commun. Syst., 2015

Privacy and incentive mechanisms in people-centric sensing networks.
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part II [Guest Editorial].
IEEE Commun. Mag., 2015

Security and privacy in emerging networks: Part 1 [Guest Editorial].
IEEE Commun. Mag., 2015

Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Performance analysis and optimization of best-effort service in IEEE 802.16 networks.
Wirel. Commun. Mob. Comput., 2014

Small data dissemination for wireless sensor networks: The security aspect.
IEEE Wirel. Commun., 2014

Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2014

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks.
IEEE J. Biomed. Health Informatics, 2014

An enhanced public key infrastructure to secure smart grid wireless communication networks.
IEEE Netw., 2014

A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes.
J. Netw. Comput. Appl., 2014

An efficient reputation-based system for wireless ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2014

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
IEEE Intell. Syst., 2014

Performance Analysis of Contention Based Services with Bulk Transmission in IEEE 802.16 OFDMA Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks.
IEEE J. Biomed. Health Informatics, 2013

Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2013

Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks.
IEEE Trans. Computers, 2013

Decentralized Power Control for Random Access with Successive Interference Cancellation.
IEEE J. Sel. Areas Commun., 2013

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2013

Strong roaming authentication technique for wireless and mobile networks.
Int. J. Commun. Syst., 2013

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects.
IEEE Commun. Mag., 2013

2012
Performance Modeling of Broadcast Polling in IEEE 802.16 Networks with Finite-Buffered Subscriber Stations.
IEEE Trans. Wirel. Commun., 2012

DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2012

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions.
IEEE Trans. Wirel. Commun., 2012

A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2012

SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2012

Secure and efficient dynamic program update in wireless sensor networks.
Secur. Commun. Networks, 2012

Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks.
IEEE Commun. Lett., 2012

IAPI: An intelligent adaptive PI active queue management scheme.
Comput. Commun., 2012

Secure service provision in smart grid communications.
IEEE Commun. Mag., 2012

Decentralized power control for random access with iterative multi-user detection.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

2011
A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks.
Wirel. Pers. Commun., 2011

Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2011

Distributed Access Control with Privacy Support in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2011

Privacy-Preserving Universal Authentication Protocol for Wireless Communications.
IEEE Trans. Wirel. Commun., 2011

Lightweight and provably secure user authentication with anonymity for the global mobility network.
Int. J. Commun. Syst., 2011

Performance effects of two-way FAST TCP.
Comput. Networks, 2011

Optimal throughput for 802.11 DCF with multiple packet reception.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Performance modelling of broadcast polling protocol in unsaturated IEEE 802.16 networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

High-Throughput Routing with Superposition Coding and Successive Interference Cancellation.
Proceedings of IEEE International Conference on Communications, 2011

FORBID: Cope with Byzantine Behaviors in Wireless Multi-Path Routing and Forwarding.
Proceedings of the Global Communications Conference, 2011

2010
Performance Analysis of Best-Effort Service in Saturated IEEE 802.16 Networks.
IEEE Trans. Veh. Technol., 2010

A priority-based processor sharing model for TDM passive optical networks.
IEEE J. Sel. Areas Commun., 2010

Bandwidth allocation in wireless ad hoc networks: Challenges and prospects.
IEEE Commun. Mag., 2010

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

A Secure and Lightweight User Authentication Scheme with Anonymity for the Global Mobility Network.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2009
Error-aware and energy-efficient routing approach in MANETs.
Int. J. Commun. Syst., 2009

Auction in multi-path multi-hop routing.
IEEE Commun. Lett., 2009

Generalized Second Price Auction in Multi-Path Routing with Selfish Nodes.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Performance Analysis of Resource Selection Schemes for a Large Scale Video-on-Demand System.
IEEE Trans. Multim., 2008

Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System.
IEEE Trans. Knowl. Data Eng., 2008

Combination Load Balancing for Video-on-Demand Systems.
IEEE Trans. Circuits Syst. Video Technol., 2008

Performance Evaluation for Saturated 802.16 Networks with Binary Backoff Mechanism.
Proceedings of the NTMS 2008, 2008

Delay Model for Saturated IEEE 802.16 Networks.
Proceedings of the NTMS 2008, 2008

Loss performance evaluation in heterogeneous hierarchical networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Priority-Based fair Scheduling for Multimedia WiMAX Uplink Traffic.
Proceedings of IEEE International Conference on Communications, 2008

2007
Improving Wireless TCP Throughput by a Novel TCM-Based Hybrid ARQ.
IEEE Trans. Wirel. Commun., 2007

Performance of Hybrid ARQ Using Trellis-Coded Modulation Over Rayleigh Fading Channel.
IEEE Trans. Veh. Technol., 2007

Instability effects of two-way traffic in a TCP/AQM system.
Comput. Commun., 2007

An Error-aware and Energy Efficient Routing Protocol in MANETs.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

A QoS Architecture for IDMA-Based Multi-Service Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
A data link control protocol for broadband wireless networks with adaptive coding rate.
Int. J. Commun. Syst., 2006

Price-based max-min fair rate allocation in wireless multi-hop networks.
IEEE Commun. Lett., 2006

Adaptive Deterministic Packet Marking.
IEEE Commun. Lett., 2006

Max-min Fair Rate Allocation in Multi-hop Wireless Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

2005
A hybrid ARQ scheme based on CT-TCM codes.
IEEE Commun. Lett., 2005

Buffer sizing for nonhomogeneous TCP sources.
IEEE Commun. Lett., 2005

A novel method for modeling and analysis of distributed video on demand systems.
Proceedings of IEEE International Conference on Communications, 2005

2004
Optimal video placement scheme for batching VOD services.
IEEE Trans. Broadcast., 2004

An enhanced handoff control scheme for multimedia traffic in cellular networks.
IEEE Commun. Lett., 2004

Effect of Large Buffers on TCP Queueing Behavior.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Performance benchmarks for an interactive video-on-demand system.
Proceedings of IEEE International Conference on Communications, 2004

Designing a stable and effective PD-control AQM.
Proceedings of the 8th International Conference on Control, 2004

2003
PD-RED: to improve the performance of RED.
IEEE Commun. Lett., 2003

On the efficient use of video-on-demand storage facility.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

PD-controller: a new active queue management scheme.
Proceedings of the Global Telecommunications Conference, 2003

2002
A congestion control framework for available bit rate service in ATM networks.
Int. J. Commun. Syst., 2002

Fault tolerance in Clos-Knockout multicast ATM switch.
Int. J. Commun. Syst., 2002

Is max-min fairness achievable in the presence of insubordinate users?
IEEE Commun. Lett., 2002

Call Admission Control for 3G CDMA Networks with Differentiated QoS.
Proceedings of the NETWORKING 2002, 2002

2001
Optimal file placement in VOD system using genetic algorithm.
IEEE Trans. Ind. Electron., 2001

2000
An efficient handoff management scheme for mobile wireless ATM networks.
IEEE Trans. Veh. Technol., 2000

A refined model for performance analysis of output-buffered Banyan networks.
Telecommun. Syst., 2000

A New Max-Min Fairness Definition to Neutralize Malicious Users.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1998
Design of wide-sense nonblocking multicast ATM switches.
IEEE Commun. Lett., 1998

Iterative decoding of multi-dimensional concatenated single parity check codes.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

Iterative decoding of concatenated Hadamard codes.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

Achieving fair and high packet-level throughput in ABR service.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

1997
Fair packet discarding for controlling ABR traffic in ATM networks.
IEEE Trans. Commun., 1997

Max-Log-MAP Filtering Algorithm for Decoding Product F24 Code.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1993
Fairness in ATM Networks.
Comput. Networks ISDN Syst., 1993

1992
Fairness in Broadband ISDN.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992


  Loading...