-
1
-
-
85027683302
-
Dependable structural health monitoring using wireless sensor networks
-
M. Z. A. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang, "Dependable structural health monitoring using wireless sensor networks," IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 4, pp. 363-376, 2017.
-
(2017)
IEEE Transactions on Dependable and Secure Computing
, vol.14
, Issue.4
, pp. 363-376
-
-
Bhuiyan, M.Z.A.1
Wang, G.2
Wu, J.3
Cao, J.4
Liu, X.5
Wang, T.6
-
2
-
-
85008884266
-
Achieving reliable and secure services in cloud computing environments
-
Q. Liu, G. Wang, X. Liu, T. Peng, and J. Wu, "Achieving reliable and secure services in cloud computing environments," Computers & Electrical Engineering, vol. 59, pp. 153-164, 2017.
-
(2017)
Computers & Electrical Engineering
, vol.59
, pp. 153-164
-
-
Liu, Q.1
Wang, G.2
Liu, X.3
Peng, T.4
Wu, J.5
-
3
-
-
85034243079
-
One more tag enables fine-grained RFID localization and tracking
-
F. Xiao, Z. Wang, N. Ye, R. Wang, and X. Y. Li, "One more tag enables fine-grained RFID localization and tracking," IEEE/ACM Transactions on Networking, vol. 26, no. 1, pp. 161-174, 2018.
-
(2018)
IEEE/ACM Transactions on Networking
, vol.26
, Issue.1
, pp. 161-174
-
-
Xiao, F.1
Wang, Z.2
Ye, N.3
Wang, R.4
Li, X.Y.5
-
4
-
-
85041847011
-
A Covert Channel over VoLTE via adjusting silence periods
-
X. Zhang, Y. A. Tan, C. Liang, Y. Li, and J. Li, "A Covert Channel over VoLTE via adjusting silence periods," IEEE Access, vol. 6, pp. 9292-9302, 2018.
-
(2018)
IEEE Access
, vol.6
, pp. 9292-9302
-
-
Zhang, X.1
Tan, Y.A.2
Liang, C.3
Li, Y.4
Li, J.5
-
5
-
-
85025096231
-
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks
-
Z. Wang, Q. Cao, H. Qi, H. Chen, and Q. Wang, "Cost-effective barrier coverage formation in heterogeneous wireless sensor networks," Ad Hoc Networks, vol. 64, pp. 65-79, 2017.
-
(2017)
Ad Hoc Networks
, vol.64
, pp. 65-79
-
-
Wang, Z.1
Cao, Q.2
Qi, H.3
Chen, H.4
Wang, Q.5
-
6
-
-
85037372036
-
Effective query grouping strategy in clouds
-
Q. Liu, Y. Guo, J. Wu, and G. Wang, "Effective query grouping strategy in clouds," Journal of Computer Science and Technology, vol. 32, no. 6, pp. 1231-1249, 2017.
-
(2017)
Journal of Computer Science and Technology
, vol.32
, Issue.6
, pp. 1231-1249
-
-
Liu, Q.1
Guo, Y.2
Wu, J.3
Wang, G.4
-
7
-
-
85048222001
-
Secure content delivery with edge nodes to save caching resources for mobile users in green cities
-
Q. Xu, Z. Su, Q. Zheng, M. Luo, and B. Dong, "Secure content delivery with edge nodes to save caching resources for mobile users in green cities," IEEE Transactions on Industrial Informatics, p. 1, 2017.
-
(2017)
IEEE Transactions on Industrial Informatics
, pp. 1
-
-
Xu, Q.1
Su, Z.2
Zheng, Q.3
Luo, M.4
Dong, B.5
-
8
-
-
84924787025
-
Cooperative routing with relay assignment in multiradio multihop wireless networks
-
K. Xie, X. Wang, J. Wen, and J. Cao, "Cooperative routing with relay assignment in multiradio multihop wireless networks," IEEE/ACM Transactions on Networking, vol. 24, no. 2, pp. 859-872, 2016.
-
(2016)
IEEE/ACM Transactions on Networking
, vol.24
, Issue.2
, pp. 859-872
-
-
Xie, K.1
Wang, X.2
Wen, J.3
Cao, J.4
-
9
-
-
85001075478
-
Analysis of event-driven warning message propagation in vehicular ad hoc networks
-
H. Zhou, S. Xu, D. Ren, C. Huang, and H. Zhang, "Analysis of event-driven warning message propagation in vehicular ad hoc networks," Ad Hoc Networks, vol. 55, pp. 87-96, 2017.
-
(2017)
Ad Hoc Networks
, vol.55
, pp. 87-96
-
-
Zhou, H.1
Xu, S.2
Ren, D.3
Huang, C.4
Zhang, H.5
-
10
-
-
85082099024
-
Data analytics of urban fabric metrics for smart cities
-
In press
-
X. Li, S. Cheng, Z. Lv, H. Song, T. Jia, and N. Lu, "Data analytics of urban fabric metrics for smart cities," Future Generation Computer Systems, 2018, In press.
-
(2018)
Future Generation Computer Systems
-
-
Li, X.1
Cheng, S.2
Lv, Z.3
Song, H.4
Jia, T.5
Lu, N.6
-
11
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," IEEE Transactions on Computers, vol. 65, no. 10, pp. 3184-3195, 2016.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
12
-
-
85032275347
-
A cooperative quality-aware service access system for social internet of vehicles
-
Z. Ning, X. Hu, Z. Chen et al., "A cooperative quality-aware service access system for social internet of vehicles," IEEE Internet of Things Journal, 2017.
-
(2017)
IEEE Internet of Things Journal
-
-
Ning, Z.1
Hu, X.2
Chen, Z.3
-
13
-
-
67349153313
-
Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems
-
N. Xiong, A. Vasilakos, L. Yang et al., "Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 495-509, 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 495-509
-
-
Xiong, N.1
Vasilakos, A.2
Yang, L.3
-
14
-
-
85016498736
-
E-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems
-
M. Z. A. Bhuiyan, J. Wu, G. Wang, T. Wang, and M. M. Hassan, "e-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems," ACM Transactions on Autonomous and Adaptive Systems, vol. 12, no. 1, pp. 1-29, 2017.
-
(2017)
ACM Transactions on Autonomous and Adaptive Systems
, vol.12
, Issue.1
, pp. 1-29
-
-
Bhuiyan, M.Z.A.1
Wu, J.2
Wang, G.3
Wang, T.4
Hassan, M.M.5
-
15
-
-
85042715495
-
A smart high-speed backbone path construction approach for energy and delay optimization in WSNs
-
A. Liu, M. Huang, M. Zhao, and T. Wang, "A smart high-speed backbone path construction approach for energy and delay optimization in WSNs," IEEE Access, vol. 6, pp. 13836-13854, 2018.
-
(2018)
IEEE Access
, vol.6
, pp. 13836-13854
-
-
Liu, A.1
Huang, M.2
Zhao, M.3
Wang, T.4
-
16
-
-
84965170488
-
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
-
Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, "Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing," Information Sciences, vol. 379, pp. 42-61, 2017.
-
(2017)
Information Sciences
, vol.379
, pp. 42-61
-
-
Zhang, Y.1
Chen, X.2
Li, J.3
Wong, D.S.4
Li, H.5
You, I.6
-
17
-
-
85042701249
-
QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks
-
Y. Liu, K. Ota, K. Zhang et al., "QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks," IEEE Access, vol. 6, pp. 8273-8291, 2018.
-
(2018)
IEEE Access
, vol.6
, pp. 8273-8291
-
-
Liu, Y.1
Ota, K.2
Zhang, K.3
-
18
-
-
85042787741
-
A trust-based secure routing scheme using the Traceback approach for energy-harvesting wireless sensor networks
-
J. Tang, A. Liu, J. Zhang, N. Xiong, Z. Zeng, and T. Wang, "A trust-based secure routing scheme using the Traceback approach for energy-harvesting wireless sensor networks," Sensors, vol. 18, no. 3, p. 751, 2018.
-
(2018)
Sensors
, vol.18
, Issue.3
, pp. 751
-
-
Tang, J.1
Liu, A.2
Zhang, J.3
Xiong, N.4
Zeng, Z.5
Wang, T.6
-
19
-
-
85030973270
-
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing
-
P. L. Nguyen, Y. Ji, Z. Liu, H. Vu, and K. V. Nguyen, "Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing," Computer Networks, vol. 129, pp. 232-250, 2017.
-
(2017)
Computer Networks
, vol.129
, pp. 232-250
-
-
Nguyen, P.L.1
Ji, Y.2
Liu, Z.3
Vu, H.4
Nguyen, K.V.5
-
20
-
-
85022328612
-
Deep learning for mobile multimedia: A survey
-
K. Ota, M. S. Dao, V. Mezaris, and F. G. B. De Natale, "Deep learning for mobile multimedia: A survey," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 13, no. 3s, pp. 1-22, 2017.
-
(2017)
ACM Transactions on Multimedia Computing, Communications, and Applications
, vol.13
, Issue.3
, pp. 1-22
-
-
Ota, K.1
Dao, M.S.2
Mezaris, V.3
De Natale, F.G.B.4
-
21
-
-
85045510977
-
Edge-based efficient search over encrypted data mobile cloud storage
-
Y. Guo, F. Liu, Z. Cai, N. Xiao, and Z. Zhao, "Edge-based efficient search over encrypted data mobile cloud storage," Sensors, vol. 18, no. 4, p. 1189, 2018.
-
(2018)
Sensors
, vol.18
, Issue.4
, pp. 1189
-
-
Guo, Y.1
Liu, F.2
Cai, Z.3
Xiao, N.4
Zhao, Z.5
-
22
-
-
85041406587
-
A trust with abstract information verified routing scheme for cyber-physical network
-
X. Liu, N. Xiong, N. Zhang, A. Liu, H. Shen, and C. Huang, "A trust with abstract information verified routing scheme for cyber-physical network," IEEE Access, vol. 6, no. 1, pp. 3882-3898, 2018.
-
(2018)
IEEE Access
, vol.6
, Issue.1
, pp. 3882-3898
-
-
Liu, X.1
Xiong, N.2
Zhang, N.3
Liu, A.4
Shen, H.5
Huang, C.6
-
23
-
-
85034242834
-
Noise-tolerant wireless sensor networks localization via multinorms regularized matrix completion
-
F. Xiao, W. Liu, Z. Li, L. Chen, and R. Wang, "Noise-tolerant wireless sensor networks localization via multinorms regularized matrix completion," IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2409-2419, 2018.
-
(2018)
IEEE Transactions on Vehicular Technology
, vol.67
, Issue.3
, pp. 2409-2419
-
-
Xiao, F.1
Liu, W.2
Li, Z.3
Chen, L.4
Wang, R.5
-
24
-
-
85008457336
-
An efficient privacypreserving compressive data gathering scheme in WSNs
-
K. Xie, X. Ning, X. Wang et al., "An efficient privacypreserving compressive data gathering scheme in WSNs," Information Sciences, vol. 390, pp. 82-94, 2017.
-
(2017)
Information Sciences
, vol.390
, pp. 82-94
-
-
Xie, K.1
Ning, X.2
Wang, X.3
-
25
-
-
85028470865
-
Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks
-
H. Zhou, V. C. M. Leung, C. Zhu, S. Xu, and J. Fan, "Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10372-10383, 2017.
-
(2017)
IEEE Transactions on Vehicular Technology
, vol.66
, Issue.11
, pp. 10372-10383
-
-
Zhou, H.1
Leung, V.C.M.2
Zhu, C.3
Xu, S.4
Fan, J.5
-
26
-
-
85042634815
-
A social-aware group formation framework for information diffusion in narrowband internet of things
-
Z. Ning, X. Wang, X. Kong, and W. Hou, "A social-aware group formation framework for information diffusion in narrowband internet of things," IEEE Internet of Things Journal, 2017.
-
(2017)
IEEE Internet of Things Journal
-
-
Ning, Z.1
Wang, X.2
Kong, X.3
Hou, W.4
-
27
-
-
85039919350
-
Integrated collaborative filtering recommendation in social cyberphysical systems
-
J. Xu, A. Liu, N. Xiong, T. Wang, and Z. Zuo, "Integrated collaborative filtering recommendation in social cyberphysical systems," International Journal of Distributed Sensor Networks, vol. 13, no. 12, 2017.
-
(2017)
International Journal of Distributed Sensor Networks
, vol.13
, Issue.12
-
-
Xu, J.1
Liu, A.2
Xiong, N.3
Wang, T.4
Zuo, Z.5
-
28
-
-
85022081234
-
Optimal control theory-based epidemic information spreading scheme for mobile social users with energy constraint
-
Q. Xu, Z. Su, and K. Yang, "Optimal control theory-based epidemic information spreading scheme for mobile social users with energy constraint," IEEE Access, vol. 5, pp. 14107-14118, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 14107-14118
-
-
Xu, Q.1
Su, Z.2
Yang, K.3
-
29
-
-
85043474272
-
A services routing based caching scheme for cloud assisted CRNs
-
M. Huang, Y. Liu, N. Zhang et al., "A services routing based caching scheme for cloud assisted CRNs," IEEE Access, vol. 6, no. 1, pp. 15787-15805, 2018.
-
(2018)
IEEE Access
, vol.6
, Issue.1
, pp. 15787-15805
-
-
Huang, M.1
Liu, Y.2
Zhang, N.3
-
30
-
-
84940452998
-
Secure deduplication storage systems supporting keyword search
-
J. Li, X. Chen, F. Xhafa, and L. Barolli, "Secure deduplication storage systems supporting keyword search," Journal of Computer and System Sciences, vol. 81, no. 8, pp. 1532-1541, 2015.
-
(2015)
Journal of Computer and System Sciences
, vol.81
, Issue.8
, pp. 1532-1541
-
-
Li, J.1
Chen, X.2
Xhafa, F.3
Barolli, L.4
-
31
-
-
85050914933
-
Data processing and text mining technologies on electronic medical records: A review
-
Article ID 4302425
-
W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, "Data processing and text mining technologies on electronic medical records: A review," Journal of Healthcare Engineering, vol. 2018, Article ID 4302425, 9 pages, 2018.
-
(2018)
Journal of Healthcare Engineering
, vol.2018
, pp. 9
-
-
Sun, W.1
Cai, Z.2
Li, Y.3
Liu, F.4
Fang, S.5
Wang, G.6
-
32
-
-
85042742313
-
Data driven cyber-physical system for landslide detection
-
Z. Liu, T. Tsuda, H. Watanabe, S. Ryuo, and N. Iwasawa, "Data driven cyber-physical system for landslide detection," Mobile Networks and Applications, 2018.
-
(2018)
Mobile Networks and Applications
-
-
Liu, Z.1
Tsuda, T.2
Watanabe, H.3
Ryuo, S.4
Iwasawa, N.5
-
33
-
-
84942627361
-
LT codes based distributed coding for efficient distributed storage in wireless sensor networks
-
Toulouse, France, May
-
X. Ye, J. Li, W. Chen, and F. Tang, "LT codes based distributed coding for efficient distributed storage in wireless sensor networks," in 2015 IFIP Networking Conference (IFIP Networking), pp. 1-9, Toulouse, France, May 2015.
-
(2015)
2015 IFIP Networking Conference (IFIP Networking)
, pp. 1-9
-
-
Ye, X.1
Li, J.2
Chen, W.3
Tang, F.4
-
34
-
-
84930542540
-
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
-
J. Li, Z. Liu, X. Chen, F. Xhafa, X. Tan, and D. S. Wong, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing," Knowledge-Based Systems, vol. 79, pp. 18-26, 2015.
-
(2015)
Knowledge-Based Systems
, vol.79
, pp. 18-26
-
-
Li, J.1
Liu, Z.2
Chen, X.3
Xhafa, F.4
Tan, X.5
Wong, D.S.6
-
35
-
-
85017339897
-
Recover corrupted data in sensor networks: A matrix completion solution
-
K. Xie, X. Ning, X. Wang et al., "Recover corrupted data in sensor networks: A matrix completion solution," IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1434-1448, 2017.
-
(2017)
IEEE Transactions on Mobile Computing
, vol.16
, Issue.5
, pp. 1434-1448
-
-
Xie, K.1
Ning, X.2
Wang, X.3
-
36
-
-
85041538499
-
Real-time awareness scheduling for multimedia big data oriented in-memory computing
-
J. Xu, K. Ota, and M. Dong, "Real-time awareness scheduling for multimedia big data oriented in-memory computing," IEEE Internet of Things Journal, 2018.
-
(2018)
IEEE Internet of Things Journal
-
-
Xu, J.1
Ota, K.2
Dong, M.3
-
37
-
-
85029185320
-
Serving at the edge: A scalable IoT architecture based on transparent computing
-
J. Ren, H. Guo, C. Xu, and Y. Zhang, "Serving at the edge: A scalable IoT architecture based on transparent computing," IEEE Network, vol. 31, no. 5, pp. 96-105, 2017.
-
(2017)
IEEE Network
, vol.31
, Issue.5
, pp. 96-105
-
-
Ren, J.1
Guo, H.2
Xu, C.3
Zhang, Y.4
-
38
-
-
84973896642
-
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
-
W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, "Understanding graph-based trust evaluation in online social networks: Methodologies and challenges," ACM Computing Surveys, vol. 49, no. 1, pp. 1-35, 2016.
-
(2016)
ACM Computing Surveys
, vol.49
, Issue.1
, pp. 1-35
-
-
Jiang, W.1
Wang, G.2
Bhuiyan, M.Z.A.3
Wu, J.4
-
39
-
-
85042521522
-
Energy cooperation in batteryfree wireless communications with radio frequency energy harvesting
-
H. Li, K. Ota, and M. Dong, "Energy cooperation in batteryfree wireless communications with radio frequency energy harvesting," ACM Transactions on Embedded Computing Systems, vol. 17, no. 2, pp. 1-17, 2018.
-
(2018)
ACM Transactions on Embedded Computing Systems
, vol.17
, Issue.2
, pp. 1-17
-
-
Li, H.1
Ota, K.2
Dong, M.3
-
40
-
-
84890051370
-
Optimal resource allocation for reliable and energy efficient cooperative communications
-
K. Xie, J. Cao, X. Wang, and J. Wen, "Optimal resource allocation for reliable and energy efficient cooperative communications," IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 4994-5007, 2013.
-
(2013)
IEEE Transactions on Wireless Communications
, vol.12
, Issue.10
, pp. 4994-5007
-
-
Xie, K.1
Cao, J.2
Wang, X.3
Wen, J.4
-
41
-
-
85041541302
-
QUOIN: Incentive mechanisms for crowd sensing networks
-
K. Ota, M. Dong, J. Gui, and A. Liu, "QUOIN: Incentive mechanisms for crowd sensing networks," IEEE Network, vol. 32, no. 2, pp. 114-119, 2018.
-
(2018)
IEEE Network
, vol.32
, Issue.2
, pp. 114-119
-
-
Ota, K.1
Dong, M.2
Gui, J.3
Liu, A.4
-
42
-
-
85019872573
-
Distributed construction of minimum connected dominating set in wireless sensor network using two-hop information
-
J. P. Mohanty, C. Mandal, and C. Reade, "Distributed construction of minimum connected dominating set in wireless sensor network using two-hop information," Computer Networks, vol. 123, pp. 137-152, 2017.
-
(2017)
Computer Networks
, vol.123
, pp. 137-152
-
-
Mohanty, J.P.1
Mandal, C.2
Reade, C.3
-
43
-
-
0033894011
-
On the construction of energy-efficient broadcast and multicast trees in wireless networks
-
Tel Aviv, Israel, IEEE
-
J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy-efficient broadcast and multicast trees in wireless networks," in Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp. 72-75, Tel Aviv, Israel, 2000, IEEE.
-
(2000)
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064)
, pp. 72-75
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
44
-
-
84907210037
-
Distributed separate coding for continuous data collection in wireless sensor networks
-
X. Ye, J. Li, and L. Xu, "Distributed separate coding for continuous data collection in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 11, no. 1, pp. 1-26, 2014.
-
(2014)
ACM Transactions on Sensor Networks
, vol.11
, Issue.1
, pp. 1-26
-
-
Ye, X.1
Li, J.2
Xu, L.3
-
45
-
-
85044437790
-
LLMP: Exploiting LLDP for latency measurement in software-defined data center networks
-
Y. Li, Z. P. Cai, and H. Xu, "LLMP: Exploiting LLDP for latency measurement in software-defined data center networks," Journal of Computer Science and Technology, vol. 33, no. 2, pp. 277-285, 2018.
-
(2018)
Journal of Computer Science and Technology
, vol.33
, Issue.2
, pp. 277-285
-
-
Li, Y.1
Cai, Z.P.2
Xu, H.3
-
46
-
-
0842267707
-
R-shrink: A heuristic for improving minimum power broadcast trees in wireless networks
-
San Francisco, CA, USA, IEEE Press
-
A. K. Das, R. J. Marks, M. El-Sharkawi, P. Arabshahi, and A. Gray, "r-shrink: A heuristic for improving minimum power broadcast trees in wireless networks," in GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), pp. 523-527, San Francisco, CA, USA, 2003, IEEE Press.
-
(2003)
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)
, pp. 523-527
-
-
Das, A.K.1
Marks, R.J.2
El-Sharkawi, M.3
Arabshahi, P.4
Gray, A.5
-
47
-
-
84949009291
-
Level-based approach for minimum-transmission broadcast in duty-cycled wireless sensor networks
-
T. Le Duc, D. T. Le, V. V. Zalyubovskiy, D. S. Kim, and H. Choo, "Level-based approach for minimum-transmission broadcast in duty-cycled wireless sensor networks," Pervasive and Mobile Computing, vol. 27, pp. 116-132, 2016.
-
(2016)
Pervasive and Mobile Computing
, vol.27
, pp. 116-132
-
-
Le Duc, T.1
Le, D.T.2
Zalyubovskiy, V.V.3
Kim, D.S.4
Choo, H.5
-
48
-
-
84910147203
-
Approximation algorithms for broadcasting in duty cycled wireless sensor networks
-
D. Zhao, K. W. Chin, and R. Raad, "Approximation algorithms for broadcasting in duty cycled wireless sensor networks," Wireless Networks, vol. 20, no. 8, pp. 2219-2236, 2014.
-
(2014)
Wireless Networks
, vol.20
, Issue.8
, pp. 2219-2236
-
-
Zhao, D.1
Chin, K.W.2
Raad, R.3
-
49
-
-
84923215589
-
BOD-LEACH: Broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks
-
M. Khiati and D. Djenouri, "BOD-LEACH: Broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks," International Journal of Communication Systems, vol. 28, no. 2, pp. 296-308, 2015.
-
(2015)
International Journal of Communication Systems
, vol.28
, Issue.2
, pp. 296-308
-
-
Khiati, M.1
Djenouri, D.2
-
50
-
-
84969784603
-
Energyefficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks
-
Z. Zhou, M. Dong, K. Ota, G. Wang, and L. T. Yang, "Energyefficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks," IEEE Internet of Things Journal, vol. 3, no. 3, pp. 428-438, 2016.
-
(2016)
IEEE Internet of Things Journal
, vol.3
, Issue.3
, pp. 428-438
-
-
Zhou, Z.1
Dong, M.2
Ota, K.3
Wang, G.4
Yang, L.T.5
-
51
-
-
84900653663
-
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
-
H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, "A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22-32, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 22-32
-
-
Zhu, H.1
Du, S.2
Gao, Z.3
Dong, M.4
Cao, Z.5
|