Year |
Citation |
Score |
2020 |
Li J, Siddula M, Cheng X, Cheng W, Tian Z, Li Y. Approximate data aggregation in sensor equipped IoT networks Tsinghua Science and Technology. 25: 44-55. DOI: 10.26599/Tst.2019.9010023 |
0.645 |
|
2020 |
Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users Wireless Communications and Mobile Computing. 2020: 1-13. DOI: 10.1155/2020/8892321 |
0.549 |
|
2020 |
Zhu T, Li J, Gao H, Li Y. Latency-efficient Data Collection Scheduling in Battery-free Wireless Sensor Networks Acm Transactions On Sensor Networks. 16: 1-21. DOI: 10.1145/3390956 |
0.453 |
|
2020 |
Chen Q, Gao H, Cheng L, Li Y. Label Coloring Based Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Ieee Transactions On Mobile Computing. 19: 1123-1137. DOI: 10.1109/Tmc.2019.2907956 |
0.48 |
|
2020 |
Liu T, Wang Y, Li Y, Tong X, Qi L, Jiang N. Privacy Protection based on Stream Cipher for Spatio-temporal Data in IoT Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.2990428 |
0.445 |
|
2020 |
Sai AMVV, Li Y. A Survey on Privacy Issues in Mobile Social Networks Ieee Access. 8: 130906-130921. DOI: 10.1109/Access.2020.3009691 |
0.412 |
|
2020 |
Wang Y, Gao Y, Li Y, Tong X. A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems Computer Networks. 171: 107144. DOI: 10.1016/J.Comnet.2020.107144 |
0.364 |
|
2019 |
Zhao B, Wang Y, Li Y, Gao Y, Tong X. Task Allocation Model Based on Worker Friend Relationship for Mobile Crowdsourcing. Sensors (Basel, Switzerland). 19. PMID 30813250 DOI: 10.3390/S19040921 |
0.377 |
|
2019 |
Zhu T, Wang J, Cheng S, Li Y, Li J. Retrieving the relative kernel dataset from big sensory data for continuous queries in IoT systems Eurasip Journal On Wireless Communications and Networking. 2019. DOI: 10.1186/S13638-019-1467-4 |
0.375 |
|
2019 |
Zhu T, Li J, Gao H, Li Y. Broadcast Scheduling in Battery-Free Wireless Sensor Networks Acm Transactions On Sensor Networks. 15: 1-34. DOI: 10.1145/3356472 |
0.441 |
|
2019 |
Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering Ieee Transactions On Computational Social Systems. 6: 809-820. DOI: 10.1109/Tcss.2019.2928324 |
0.589 |
|
2019 |
Miao D, Cai Z, Yu J, Li Y. Triangle edge deletion on planar glasses-free RGB-digraphs Theoretical Computer Science. 788: 2-11. DOI: 10.1016/J.Tcs.2018.10.034 |
0.315 |
|
2019 |
Miao D, Liu X, Li Y, Li J. Vertex cover in conflict graphs Theoretical Computer Science. 774: 103-112. DOI: 10.1016/J.Tcs.2016.07.009 |
0.32 |
|
2019 |
Cheng S, Li Y, Tian Z, Cheng W, Cheng X. A model for integrating heterogeneous sensory data in IoT systems Computer Networks. 150: 1-14. DOI: 10.1016/J.Comnet.2018.11.032 |
0.505 |
|
2018 |
Hu Y, Wang Y, Li Y, Tong X. An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions. Sensors (Basel, Switzerland). 18. PMID 30322207 DOI: 10.3390/S18103453 |
0.367 |
|
2018 |
Liu B, Wang W, Kim D, Li Y, Kwon S, Jiang Y. On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks Ieee/Acm Transactions On Networking. 26: 412-421. DOI: 10.1109/Tnet.2017.2780262 |
0.443 |
|
2018 |
Cai Z, He Z, Guan X, Li Y. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks Ieee Transactions On Dependable and Secure Computing. 15: 577-590. DOI: 10.1109/Tdsc.2016.2613521 |
0.376 |
|
2018 |
Li J, Cai Z, Wang J, Han M, Li Y. Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems Ieee Transactions On Computational Social Systems. 5: 324-334. DOI: 10.1109/Tcss.2018.2797225 |
0.381 |
|
2018 |
Liang Y, Cai Z, Yu J, Han Q, Li Y. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices Ieee Network. 32: 8-14. DOI: 10.1109/Mnet.2018.1700349 |
0.306 |
|
2018 |
Wang Y, Li Y, Chi Z, Tong X. The Truthful Evolution and Incentive for Large-Scale Mobile Crowd Sensing Networks Ieee Access. 6: 51187-51199. DOI: 10.1109/Access.2018.2869665 |
0.348 |
|
2018 |
Siddula M, Li L, Li Y. An Empirical Study on the Privacy Preservation of Online Social Networks Ieee Access. 6: 19912-19922. DOI: 10.1109/Access.2018.2822693 |
0.445 |
|
2018 |
Miao D, Cai Z, Li Y. SEF view deletion under bounded condition Theoretical Computer Science. 749: 17-25. DOI: 10.1016/J.Tcs.2017.07.033 |
0.302 |
|
2018 |
Liu X, Li Y, Li J, Feng Y. On the complexity and approximability of repair position selection problem Journal of Combinatorial Optimization. 1-19. DOI: 10.1007/S10878-018-0362-Y |
0.313 |
|
2017 |
Fang X, Luo J, Gao H, Wu W, Li Y. Scheduling multi-task jobs with extra utility in data centers. Eurasip Journal On Wireless Communications and Networking. 2017: 200. PMID 29213279 DOI: 10.1186/S13638-017-0986-0 |
0.326 |
|
2017 |
Duan Z, Yan M, Han Q, Li L, Li Y. IoT-based cost saving offloading system for cellular networks Tsinghua Science and Technology. 22: 379-388. DOI: 10.23919/Tst.2017.7986941 |
0.368 |
|
2017 |
Han M, Li Y, Li J, Li L, Han Q. Maximizing Influence in Sensed Heterogenous Social Network with Privacy Preservation International Journal of Sensor Networks. 1: 1. DOI: 10.1504/Ijsnet.2017.10007412 |
0.425 |
|
2017 |
Li Y, Bourgeois AG, Lybarger FW, Han M, Duan Z, Ai C. Time constraint influence maximization algorithm in the age of big data International Journal of Computational Science and Engineering. 15: 165. DOI: 10.1504/Ijcse.2017.10008085 |
0.472 |
|
2017 |
Liang Y, Cai Z, Han Q, Li Y. Location Privacy Leakage through Sensory Data Security and Communication Networks. 2017: 1-12. DOI: 10.1155/2017/7576307 |
0.37 |
|
2017 |
Zhang L, Li Y, Wang L, Lu J, Li P, Wang X. An Efficient Context-Aware Privacy Preserving Approach for Smartphones Security and Communication Networks. 2017: 1-11. DOI: 10.1155/2017/4842694 |
0.341 |
|
2017 |
Li J, Cheng S, Cai Z, Yu J, Wang C, Li Y. Approximate Holistic Aggregation in Wireless Sensor Networks Acm Transactions On Sensor Networks. 13: 1-24. DOI: 10.1145/3027488 |
0.412 |
|
2017 |
He Z, Cai Z, Yu J, Wang X, Sun Y, Li Y. Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks Ieee Transactions On Vehicular Technology. 66: 2789-2800. DOI: 10.1109/Tvt.2016.2585591 |
0.37 |
|
2017 |
Shi T, Cheng S, Cai Z, Li Y, Li J. Exploring Connected Dominating Sets in Energy Harvest Networks Ieee/Acm Transactions On Networking. 25: 1803-1817. DOI: 10.1109/Tnet.2017.2657688 |
0.545 |
|
2017 |
Chang RN, Cheng X, Cheng W, Lee W, Li Y, Yu J. Guest Editorial Special Issue on Fog Computing in the Internet of Things Ieee Internet of Things Journal. 4: 1113-1116. DOI: 10.1109/Jiot.2017.2750438 |
0.487 |
|
2017 |
Zheng X, Cai Z, Yu J, Wang C, Li Y. Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems Ieee Internet of Things Journal. 4: 1868-1878. DOI: 10.1109/Jiot.2017.2679483 |
0.314 |
|
2017 |
Wang J, Li Y, Yang D, Gao H, Luo G, Li J. Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services Ieee Access. 5: 24580-24592. DOI: 10.1109/Access.2017.2766669 |
0.373 |
|
2016 |
Bi R, Li Y, Tan G, Sun L. Optimizing Retransmission Threshold in Wireless Sensor Networks. Sensors (Basel, Switzerland). 16. PMID 27171092 DOI: 10.3390/S16050665 |
0.495 |
|
2016 |
Kim D, Zhong J, Lee M, Li D, Li Y, Tokuta AO. Efficient respondents selection for biased survey using homophily-high social relation graph Discrete Mathematics, Algorithms and Applications. 8: 1650071. DOI: 10.1142/S1793830916500713 |
0.37 |
|
2016 |
Bi R, Li Y, Zheng X. An optimal content caching framework for utility maximization Tsinghua Science and Technology. 21: 374-384. DOI: 10.1109/Tst.2016.7536715 |
0.428 |
|
2016 |
Shi T, Wan J, Cheng S, Cai Z, Li Y, Li J. Time-Bounded Positive Influence in Social Networks Proceedings - 2015 International Conference On Identification, Information, and Knowledge in the Internet of Things, Iiki 2015. 134-139. DOI: 10.1109/IIKI.2015.37 |
0.366 |
|
2016 |
Liu G, Li Y. Social-aware data dissemination service in mobile social network with controlled overhead Pervasive and Mobile Computing. 33: 127-139. DOI: 10.1016/J.Pmcj.2016.04.010 |
0.439 |
|
2016 |
Han M, Yan M, Cai Z, Li Y. An exploration of broader influence maximization in timeliness networks with opportunistic selection Journal of Network and Computer Applications. 63: 39-49. DOI: 10.1016/J.Jnca.2016.01.004 |
0.42 |
|
2016 |
Guo L, Li Y, Cai Z. Minimum-latency aggregation scheduling in wireless sensor network Journal of Combinatorial Optimization. 31: 279-310. DOI: 10.1007/S10878-014-9748-7 |
0.421 |
|
2016 |
Shi T, Cheng S, Cai Z, Li Y, Li J. Retrieving the maximal time-bounded positive influence set from social networks Personal and Ubiquitous Computing. 20: 717-730. DOI: 10.1007/s00779-016-0943-7 |
0.367 |
|
2015 |
Gao H, Fang X, Li J, Li Y. Data Collection in Multi-Application Sharing Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 26: 403-412. DOI: 10.1109/Tpds.2013.289 |
0.449 |
|
2015 |
Gao J, Li J, Li Y. Approximate event detection over multi-modal sensing data Journal of Combinatorial Optimization. DOI: 10.1007/S10878-015-9847-0 |
0.435 |
|
2014 |
He J, Ji S, Pan Y, Li Y. Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 25: 1681-1690. DOI: 10.1109/Tpds.2013.160 |
0.491 |
|
2014 |
He JS, Ji S, Beyah R, Xie Y, Li Y. Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm Transactions On Emerging Telecommunications Technologies. 26: 147-163. DOI: 10.1002/ett.2797 |
0.328 |
|
2013 |
Ji S, He J(, Uluagac AS, Beyah R, Li Y. Cell-based snapshot and continuous data collection in wireless sensor networks Acm Transactions On Sensor Networks. 9: 1-29. DOI: 10.1145/2489253.2489264 |
0.522 |
|
2013 |
Liu G, Krishnamani J, Sunderraman R, Li Y. Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks 2013 Ieee 32nd International Performance Computing and Communications Conference, Ipccc 2013. DOI: 10.1109/PCCC.2013.6742793 |
0.348 |
|
2013 |
Ji S, He J(, Pan Y, Li Y. Continuous data aggregation and capacity in probabilistic wireless sensor networks Journal of Parallel and Distributed Computing. 73: 729-745. DOI: 10.1016/J.Jpdc.2013.02.005 |
0.469 |
|
2013 |
Kim D, Li D, Asgari O, Li Y, Tokuta AO, Oh H. Computing an effective decision making group of a society using social network analysis Journal of Combinatorial Optimization. 28: 577-587. DOI: 10.1007/S10878-013-9687-8 |
0.309 |
|
2013 |
Han M, Yan M, Li J, Ji S, Li Y. Neighborhood-based uncertainty generation in social networks Journal of Combinatorial Optimization. 28: 561-576. DOI: 10.1007/S10878-013-9684-Y |
0.501 |
|
2012 |
He J, Ji S, Yan M, Pan Y, Li Y. Load-balanced CDS construction in wireless sensor networks via genetic algorithm International Journal of Sensor Networks. 11: 166. DOI: 10.1504/Ijsnet.2012.046331 |
0.43 |
|
2012 |
Li Y, Cao X, Beyah R, Thai MT. Guest editorial: Special issue on wireless computing and networking Tsinghua Science and Technology. 17: 485-486. DOI: 10.1109/Tst.2012.6314525 |
0.649 |
|
2012 |
Ji S, Cai Z, Li Y, Jia X. Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 23: 1844-1855. DOI: 10.1109/Tpds.2011.286 |
0.479 |
|
2012 |
Yan M, He JS, Ji S, Li Y. Multi-regional query scheduling in wireless sensor networks with minimum latency Wireless Communications and Mobile Computing. 14: 849-864. DOI: 10.1002/wcm.2238 |
0.345 |
|
2012 |
He JS, Ji S, Pan Y, Li Y. Greedy construction of load-balanced virtual backbones in wireless sensor networks Wireless Communications and Mobile Computing. 14: 673-688. DOI: 10.1002/wcm.2218 |
0.311 |
|
2011 |
Wang X, Jiang X, Yang T, Li Q, Li Y. Node Aggregation Degree-Aware Random Routing for Non-uniform Wireless Sensor Networks Ieice Transactions On Communications. 94: 97-108. DOI: 10.1587/Transcom.E94.B.97 |
0.457 |
|
2011 |
Li Y, Vu C, Ai C, Chen G, Zhao Y. Transforming Complete Coverage Algorithms to Partial Coverage Algorithms for Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 22: 695-703. DOI: 10.1109/Tpds.2010.124 |
0.511 |
|
2011 |
He J, Ji S, Pan Y, Li Y. Reliable and energy efficient target coverage for wireless sensor networks Tsinghua Science and Technology. 16: 464-474. DOI: 10.1016/S1007-0214(11)70066-9 |
0.421 |
|
2011 |
Xiong N, Park JH, Yang LT, Koh BS, Li Y. A security management scheme for failure detector distributed systems based on self-tuning control theory Journal of Intelligent Manufacturing. 22: 333-342. DOI: 10.1007/S10845-009-0315-5 |
0.347 |
|
2010 |
Du R, Ai C, Guo L, Chen J, Liu J, He J, Li Y. A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks Journal of Communications. 5. DOI: 10.4304/Jcm.5.9.654-664 |
0.436 |
|
2010 |
Xiong N, Jia X, Yang LT, Vasilakos AV, Li Y, Pan Y. A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks Ieee Transactions On Parallel and Distributed Systems. 21: 1254-1266. DOI: 10.1109/Tpds.2010.29 |
0.35 |
|
2010 |
Li Y, Ai C, Vu C, Pan Y, Beyah R. Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 21: 1373-1385. DOI: 10.1109/Tpds.2009.129 |
0.434 |
|
2010 |
Uluagac AS, Beyah RA, Li Y, Copeland JA. VEBEK: Virtual energy-based encryption and keying for wireless sensor networks Ieee Transactions On Mobile Computing. 9: 994-1007. DOI: 10.1109/Tmc.2010.51 |
0.47 |
|
2010 |
Saxena H, Ai C, Valero M, Li Y, Beyah R. DSF - A distributed security framework for heterogeneous wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. 1836-1843. DOI: 10.1109/MILCOM.2010.5679559 |
0.378 |
|
2010 |
Li Y, Wu Y, Ai C, Beyah R. On the construction of k-connected m-dominating sets in wireless networks Journal of Combinatorial Optimization. 23: 118-139. DOI: 10.1007/S10878-010-9346-2 |
0.443 |
|
2009 |
Xiong N, He J, Park JH, Cooley DH, Li Y. A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security Journal of Universal Computer Science. 15: 1119-1142. DOI: 10.3217/Jucs-015-05-1119 |
0.308 |
|
2009 |
WILLSON JK, GAO X, QU Z, ZHU Y, LI Y, WU W. EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS Discrete Mathematics, Algorithms and Applications. 1: 437-461. DOI: 10.1142/S1793830909000348 |
0.507 |
|
2009 |
VU C, CAI Z, LI Y. DISTRIBUTED ENERGY-EFFICIENT ALGORITHMS FOR COVERAGE PROBLEM IN ADJUSTABLE SENSING RANGES WIRELESS SENSOR NETWORKS Discrete Mathematics, Algorithms and Applications. 1: 299-317. DOI: 10.1142/S1793830909000245 |
0.525 |
|
2009 |
Kim D, Wu Y, Li Y, Zou F, Du D. Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 20: 147-157. DOI: 10.1109/Tpds.2008.74 |
0.613 |
|
2009 |
Xiong N, Vasilakos AV, Yang LT, Song L, Pan Y, Kannan R, Li Y. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems Ieee Journal On Selected Areas in Communications. 27: 495-509. DOI: 10.1109/Jsac.2009.090512 |
0.355 |
|
2009 |
Xiong N, Pan Y, Jia X, Park JH, Li Y. Design and analysis of a self-tuning feedback controller for the Internet Computer Networks. 53: 1784-1797. DOI: 10.1016/J.Comnet.2009.02.005 |
0.324 |
|
2009 |
Xiong N, Yang LT, Li Y. ODMCA: An adaptive data mining control algorithm in multicarrier networks Computer Communications. 32: 560-567. DOI: 10.1016/J.Comcom.2008.08.026 |
0.407 |
|
2009 |
Ai C, Hou H, Li Y, Beyah R. Authentic delay bounded event detection in heterogeneous wireless sensor networks Ad Hoc Networks. 7: 599-613. DOI: 10.1016/j.adhoc.2008.07.004 |
0.316 |
|
2009 |
Wu Y, Gao X, Li Y. A framework of distributed indexing and data dissemination in large scale wireless sensor networks Optimization Letters. 4: 335-345. DOI: 10.1007/S11590-009-0149-2 |
0.438 |
|
2009 |
Wang C, Thai MT, Li Y, Wang F, Wu W. Optimization scheme for sensor coverage scheduling with bandwidth constraints Optimization Letters. 3: 63-75. DOI: 10.1007/S11590-008-0091-8 |
0.665 |
|
2009 |
Xiong N, Vasilakos AV, Yang LT, Pedrycz W, Zhang Y, Li Y. A Resilient and Scalable Flocking Scheme in Autonomous Vehicular Networks Mobile Networks and Applications. 15: 126-136. DOI: 10.1007/S11036-009-0168-3 |
0.391 |
|
2009 |
Li Y, Ai C, Cai Z, Beyah R. Sensor scheduling for p-percent coverage in wireless sensor networks Cluster Computing. 14: 27-40. DOI: 10.1007/S10586-009-0088-9 |
0.5 |
|
2008 |
Wang F, Thai MT, Li Y, Cheng X, Du DZ. Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks Ieee Transactions On Mobile Computing. 7: 322-331. DOI: 10.1109/Tmc.2007.70743 |
0.726 |
|
2008 |
Wang X, Li Q, Li Y. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks Journal of Combinatorial Optimization. 20: 47-62. DOI: 10.1007/S10878-008-9190-9 |
0.42 |
|
2007 |
Vu CT, Beyah RA, Li Y. Composite event detection in wireless sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 264-271. DOI: 10.1109/PCCC.2007.358903 |
0.365 |
|
2007 |
Thai MT, Li Y, Du DZ, Wang F. O (log n) -localized algorithms on the coverage problem in heterogeneous sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 85-92. DOI: 10.1109/PCCC.2007.358882 |
0.604 |
|
2007 |
Wu Y, Wang F, Thai MT, Li Y. Constructing k-connected M-dominating sets in wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2007.4454774 |
0.613 |
|
2007 |
Wang C, Thai MT, Li Y, Wang F, Wu W. Minimum coverage breach and maximum network lifetime in wireless sensor networks Globecom - Ieee Global Telecommunications Conference. 1118-1123. DOI: 10.1109/GLOCOM.2007.215 |
0.619 |
|
2007 |
Li Y, Gao S. Designing k-coverage schedules in wireless sensor networks Journal of Combinatorial Optimization. 15: 127-146. DOI: 10.1007/S10878-007-9072-6 |
0.483 |
|
2006 |
Li Y, Thai MT, Wang F, Du DZ. On the construction of a strongly connected broadcast arborescence with bounded transmission delay Ieee Transactions On Mobile Computing. 5: 1460-1470. DOI: 10.1109/Tmc.2006.154 |
0.722 |
|
2006 |
Dhawan A, Vu CT, Zelikovsky A, Li Y, Prasad SK. Maximum lifetime of sensor networks with adjustable sensing range Proc. - Seventh Acis Int. Conf. On Software Eng., Artific. Intelligence, Netw., and Parallel/Distributed Comput., Snpd 2006, Including Second Acis Int. Worshop On Sawn 2006. 2006: 285-289. DOI: 10.1109/SNPD-SAWN.2006.46 |
0.32 |
|
2006 |
Wu W, Du H, Jia X, Li Y, Huang SC. Minimum connected dominating sets and maximal independent sets in unit disk graphs Theoretical Computer Science. 352: 1-7. DOI: 10.1016/J.Tcs.2005.08.037 |
0.331 |
|
2006 |
Du DZ, Thai MT, Li Y, Liu D, Zhu S. Strongly connected dominating sets in wireless sensor networks with unidirectional links Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3841: 13-24. DOI: 10.1007/11610113_2 |
0.716 |
|
2006 |
Cheng MX, Sun J, Min M, Li Y, Wu W. Energy-efficient broadcast and multicast routing in multihop ad hoc wireless networks Wireless Communications and Mobile Computing. 6: 213-223. DOI: 10.1002/Wcm.381 |
0.76 |
|
2005 |
Li Y, Thai MT, Liu Z, Wu W. Protein-protein interaction and group testing in bipartite graphs. International Journal of Bioinformatics Research and Applications. 1: 414-9. PMID 18048145 DOI: 10.1504/Ijbra.2005.008444 |
0.552 |
|
2005 |
Thai MT, Li Y, Du DZ. A combination of wireless multicast advantage and Hitch-hiking Ieee Communications Letters. 9: 1037-1039. DOI: 10.1109/Lcomm.2005.1576580 |
0.704 |
|
2005 |
Li J, Li Y, Thai MT. Data caching and query processing in MANETs International Journal of Pervasive Computing and Communications. 1: 169-178. DOI: 10.1108/17427370580000122 |
0.597 |
|
2005 |
Li Y, Cheng X, Wu W. Optimal topology control for balanced energy consumption in wireless networks Journal of Parallel and Distributed Computing. 65: 124-131. DOI: 10.1016/J.Jpdc.2004.09.014 |
0.457 |
|
2005 |
Du H, Jia X, Wang F, Thai M, Li Y. A note on optical network with nonsplitting nodes Journal of Combinatorial Optimization. 10: 199-202. DOI: 10.1007/S10878-005-2273-Y |
0.624 |
|
2005 |
Li Y, Thai MT, Wang F, Yi CW, Wan PJ, Du DZ. On greedy construction of connected dominating sets in wireless networks Wireless Communications and Mobile Computing. 5: 927-932. DOI: 10.1002/Wcm.356 |
0.711 |
|
2004 |
Ruan L, Du H, Jia X, Wu W, Li Y, Ko KI. A greedy approximation for minimum connected dominating sets Theoretical Computer Science. 329: 325-330. DOI: 10.1016/J.Tcs.2004.08.013 |
0.595 |
|
Show low-probability matches. |