| Publication | Date of Publication | Type |
|---|
Monotonicity and one-dimensional symmetry of solutions for the weighted fractional parabolic equations on the whole space International Journal of Mathematics | 2024-05-08 | Paper |
Monotonicity of solutions for weighted fractional parabolic equations on the upper half space Communications on Pure and Applied Analysis | 2023-07-06 | Paper |
An optimized machine learning technology scheme and its application in fault detection in wireless sensor networks Journal of Applied Statistics | 2023-06-19 | Paper |
Minimum number of queries for an adaptive liar search game with small sets Discrete Optimization | 2018-10-18 | Paper |
Graph regularized nonnegative matrix factorization with sparse coding Mathematical Problems in Engineering | 2018-08-27 | Paper |
Fast algorithms for multidimensional DCT-to-DCT computation between a block and its associated subblocks IEEE Transactions on Signal Processing | 2017-09-20 | Paper |
A sufficient condition for instability of buffer priority policies in re-entrant lines IEEE Transactions on Automatic Control | 2017-06-20 | Paper |
Analysis of Backward Congestion Notification with Delay for Enhanced Ethernet Networks IEEE Transactions on Computers | 2017-06-20 | Paper |
Sliding Mode Congestion Control for Data Center Ethernet Networks IEEE Transactions on Computers | 2017-05-16 | Paper |
Stochastic Petri nets for wireless networks SpringerBriefs in Electrical and Computer Engineering | 2015-05-11 | Paper |
Minimum average-case queries of \(q+1\)-ary search game with small sets Discrete Applied Mathematics | 2012-05-04 | Paper |
\(Q\)-ary Rényi-Ulam pathological liar game with one lie Discrete Applied Mathematics | 2011-03-10 | Paper |
A relative proportional fair scheduling scheme based on multi-user diversity | 2010-11-05 | Paper |
Single-pattern jumping algorithms | 2010-11-05 | Paper |
An efficient dynamic-identity based signature scheme for secure network coding Computer Networks | 2010-03-16 | Paper |
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding Computer Networks | 2010-01-15 | Paper |
A simplified framework for stochastic workflow networks Computers & Mathematics with Applications | 2009-07-17 | Paper |
scientific article; zbMATH DE number 5548814 (Why is no real title available?) | 2009-04-28 | Paper |
Key management schemes and protocols for wireless sensor networks | 2009-03-06 | Paper |
The \(M/G/1\) processor-sharing queue with disasters Computers & Mathematics with Applications | 2008-03-11 | Paper |
Continuous-time QBD processes with continuous phase variable Computers & Mathematics with Applications | 2008-02-11 | Paper |
A queueing analysis for the denial of service (DoS) attacks in computer networks Computer Networks | 2007-07-23 | Paper |
Probabilistic analysis on connectivity for sensor grids with unreliable nodes Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
A novel high speed transport protocol based on explicit virtual load feedback Computer Networks | 2007-03-27 | Paper |
Probabilistic analysis on mesh network fault tolerance Journal of Parallel and Distributed Computing | 2007-02-19 | Paper |
BulkTree: an overlay network architecture for live media streaming Journal of Zhejiang University. Science A | 2007-01-15 | Paper |
A novel key-embedded scheme for secure video multicast systems Computers and Electrical Engineering | 2006-10-10 | Paper |
scientific article; zbMATH DE number 2247693 (Why is no real title available?) | 2006-01-16 | Paper |
scientific article; zbMATH DE number 2166691 (Why is no real title available?) | 2005-05-09 | Paper |
Temporal inference of workflow systems based on time petri nets: Quantitative and qualitative analysis International Journal of Intelligent Systems | 2005-01-12 | Paper |
scientific article; zbMATH DE number 2114135 (Why is no real title available?) | 2004-11-05 | Paper |
scientific article; zbMATH DE number 2075874 (Why is no real title available?) | 2004-06-18 | Paper |
scientific article; zbMATH DE number 2042797 (Why is no real title available?) | 2004-02-15 | Paper |
Stability analysis of buffer priority scheduling policies using Petri nets Journal of Computer Science and Technology | 2003-12-09 | Paper |
scientific article; zbMATH DE number 1948942 (Why is no real title available?) | 2003-07-14 | Paper |
scientific article; zbMATH DE number 1948940 (Why is no real title available?) | 2003-07-14 | Paper |
scientific article; zbMATH DE number 1919449 (Why is no real title available?) | 2003-05-27 | Paper |
scientific article; zbMATH DE number 409557 (Why is no real title available?) | 1994-10-31 | Paper |