Yuan Xue
Citata da
Citata da
Optimal resource allocation in wireless ad hoc networks: A price-based approach
Y Xue, B Li, K Nahrstedt
IEEE transactions on mobile computing 5 (4), 347-364, 2006
On setting TCP's congestion window limit in mobile ad hoc networks
K Chen, Y Xue, K Nahrstedt
IEEE International Conference on Communications, 2003. ICC'03. 2, 1080-1084, 2003
A scalable location management scheme in mobile ad-hoc networks
Y Xue, B Li, K Nahrstedt
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks …, 2001
Understanding bandwidth-delay product in mobile ad hoc networks
K Chen, Y Xue, SH Shah, K Nahrstedt
Computer Communications 27 (10), 923-934, 2004
Maximizing lifetime for data aggregation in wireless sensor networks
Y Xue, Y Cui, K Nahrstedt
Mobile Networks and Applications 10 (6), 853-864, 2005
Price-based resource allocation in wireless ad hoc networks
Y Xue, B Li, K Nahrstedt
International Workshop on Quality of Service, 79-96, 2003
Providing fault-tolerant ad hoc routing service in adversarial environments
Y Xue, K Nahrstedt
Wireless Personal Communications 29 (3-4), 367-388, 2004
A location-aided power-aware routing protocol in mobile ad hoc networks
Y Xue, B Li
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
CareNet: an integrated wireless sensor networking environment for remote healthcare.
S Jiang, Y Cao, S Iyengar, P Kuryloski, R Jafari, Y Xue, R Bajcsy, ...
BODYNETS, 9, 2008
Optimal resource allocation in overlay multicast
Y Cui, Y Xue, K Nahrstedt
IEEE Transactions on Parallel and Distributed Systems 17 (8), 808-823, 2006
A utility-based distributed maximum lifetime routing algorithm for wireless networks
Y Xue, Y Cui, K Nahrstedt
Second International Conference on Quality of Service in Heterogeneous Wired …, 2005
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
E Durham, Y Xue, M Kantarcioglu, B Malin
Information Fusion 13 (4), 245-259, 2012
Locality-awareness in BitTorrent-like P2P applications
B Liu, Y Cui, Y Lu, Y Xue
IEEE transactions on multimedia 11 (3), 361-371, 2009
A survey on server-side approaches to securing web applications
X Li, Y Xue
ACM Computing Surveys (CSUR) 46 (4), 1-29, 2014
Taxonomy for description of cross-domain attacks on CPS
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
Proceedings of the 2nd ACM international conference on High confidence …, 2013
Fault tolerant routing in mobile ad hoc networks
Y Xue, K Nahrstedt
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 2, 1174-1179, 2003
Composite bloom filters for secure record linkage
EA Durham, M Kantarcioglu, Y Xue, C Toth, M Kuzu, B Malin
IEEE transactions on knowledge and data engineering 26 (12), 2956-2968, 2013
A language for describing attacks on cyber-physical systems
M Yampolskiy, P Horváth, XD Koutsoukos, Y Xue, J Sztipanovits
International Journal of Critical Infrastructure Protection 8, 40-52, 2015
BLOCK: a black-box approach for detection of state violation attacks towards web applications
X Li, Y Xue
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
A platform for evaluating autonomous intersection management policies
CL Fok, M Hanna, S Gee, TC Au, P Stone, C Julien, S Vishwanath
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 87-96, 2012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20