default search action
Xiaoyan Hong
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Songhui Yue, Xiaoyan Hong, Randy K. Smith:
CSM-H-R: A Context Modeling Framework in Supporting Reasoning Automation for Interoperable Intelligent Systems and Privacy Protection. IEEE Access 12: 115672-115686 (2024) - [j34]Tianxu Lv, Xiaoyan Hong, Yuan Liu, Kai Miao, Heng Sun, Lihua Li, Chuxia Deng, Chunjuan Jiang, Xiang Pan:
AI-powered interpretable imaging phenotypes noninvasively characterize tumor microenvironment associated with diverse molecular signatures and survival in breast cancer. Comput. Methods Programs Biomed. 243: 107857 (2024) - [c90]Shuai Dong, Xiaoyan Hong, Bineet Ghosh:
An Enhancing VBF Protocol for AUVs: Integrating Uncertainty Management and Energy Efficiency. ICDCS 2024: 1476-1477 - [c89]Beichen Yang, Xiaoyan Hong:
An Ad-Hoc Communication Based Distributed Particle Swarm Optimization Scheme for Cooperative AUVs Underwater Search Task. ICDCS 2024: 1478-1479 - 2023
- [c88]Pawan Subedi, Beichen Yang, Xiaoyan Hong:
Efficient Vehicle-Centric Networking for Ultra Dense Vehicle Communication in 5G Access. PerCom Workshops 2023: 104-109 - [c87]Xiaoming Guo, Xiaoyan Hong:
DQN for Smart Transportation Supporting V2V Mobile Edge Computing. SMARTCOMP 2023: 204-206 - [i3]Songhui Yue, Xiaoyan Hong, Randy K. Smith:
CSM-H-R: An Automatic Context Reasoning Framework for Interoperable Intelligent Systems and Privacy Protection. CoRR abs/2308.11066 (2023) - 2022
- [j33]Pawan Subedi, Beichen Yang, Xiaoyan Hong:
Synchronizing tasks for distributed learning in connected and autonomous vehicles. J. Commun. Networks 24(4): 393-407 (2022) - 2021
- [c86]Pawan Subedi, Beichen Yang, Xiaoyan Hong:
A Fog-Based IOV for Distributed Learning in Autonomous Vehicles. MONAMI 2021: 227-242 - [c85]Scott Mayberry, Junkai Wang, Qiuyang Tao, Fumin Zhang, Aijun Song, Xiaoyan Hong, Shuai Dong, Connor Webb, Dmitrii Dugaev, Zheng Peng:
First Step Towards μNet: Open-Access Aquatic Testbeds and Robotic Ecosystem. WUWNet 2021: 10:1-10:8 - 2020
- [c84]Beichen Yang, Min Sun, Xiaoyan Hong, Xiaoming Guo:
A Deadline-Aware Offloading Scheme for Vehicular Fog Computing at Signalized Intersection. PerCom Workshops 2020: 1-6
2010 – 2019
- 2019
- [j32]Dong Zhang, Xiang Chen, Qun Huang, Xiaoyan Hong, Chunming Wu, Haifeng Zhou, Yi Yang, Hongyan Liu, Yuxin Chen:
P4SC: A High Performance and Flexible Framework for Service Function Chain. IEEE Access 7: 160982-160997 (2019) - [j31]Meng Kuai, Xiaoyan Hong:
Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking. Future Internet 11(6): 139 (2019) - [j30]Meng Kuai, Xiaoyan Hong, Qiangyuan Yu:
Delay-tolerant forwarding strategy for named data networking in vehicular environment. Int. J. Ad Hoc Ubiquitous Comput. 31(1): 1-12 (2019) - [j29]Mohammad Asadul Hoque, Xiaoyan Hong, Md. Salman Ahmed:
Parallel Closed-Loop Connected Vehicle Simulator for Large-Scale Transportation Network Management: Challenges, Issues, and Solution Approaches. IEEE Intell. Transp. Syst. Mag. 11(4): 62-77 (2019) - [c83]Zhengyan Zhou, Dong Zhang, Xiaoyan Hong:
RL-Sketch: Scaling Reinforcement Learning for Adaptive and Automate Anomaly Detection in Network Data Streams. LCN 2019: 340-347 - [c82]Pawan Subedi, Xiaoyan Hong:
Transit Prediction in a College Setting. VTC Fall 2019: 1-5 - [c81]Qi Zhao, Zheng Peng, Xiaoyan Hong:
A Named Data Networking Architecture Implementation to Internet of Underwater Things. WUWNet 2019: 23:1-23:8 - 2018
- [j28]Jeffrey A. Robinson, Susan V. Vrbsky, Xiaoyan Hong, Brian P. Eddy:
Analysis of a High-Performance TSP Solver on the GPU. ACM J. Exp. Algorithmics 23 (2018) - [j27]Fei Chen, Chunming Wu, Xiaoyan Hong, Bin Wang:
Easy Path Programming: Elevate Abstraction Level for Network Functions. IEEE/ACM Trans. Netw. 26(1): 189-202 (2018) - [c80]Meng Kuai, Pawan Subedi, Xiaoyan Hong, Alexander M. Hainen:
Sustain Vehicle-Crowds via Traffic Signal Adjustments. VTC Fall 2018: 1-5 - [i2]Mohammad Asadul Hoque, Xiaoyan Hong, Md. Salman Ahmed:
Parallel Closed-Loop Connected Vehicle Simulator for Large-Scale Transportation Network Management: Challenges, Issues, and Solution Approaches. CoRR abs/1805.02007 (2018) - 2017
- [c79]William E. Alexander, Xiaoyan Hong, Alexander M. Hainen:
V2I Communication-Enabled Real-Time Intersection Traffic Signal Scheduling. ACM Southeast Regional Conference 2017: 26-33 - [c78]Ting Fang, Xiaoyan Hong:
Discovering Meaningful Mobility Behaviors of Campus Life from User-Centric WiFi Traces. ACM Southeast Regional Conference 2017: 76-80 - [c77]Pawan Subedi, Xiaoyan Hong:
Streaming Video Identification for Caching and Sharing. ACM Southeast Regional Conference 2017: 239-242 - 2016
- [c76]Fei Chen, Chunming Wu, Xiaoyan Hong, Zhouhao Lu, Zhouhao Wang, Chang-Ting Lin:
Engineering traffic uncertainty in the OpenFlow data plane. INFOCOM 2016: 1-9 - [c75]Meng Kuai, Xiaoyan Hong, Qiangyuan Yu:
Density-Aware Delay-Tolerant Interest Forwarding in Vehicular Named Data Networking. VTC Fall 2016: 1-5 - [c74]Zhihua Lin, Meng Kuai, Xiaoyan Hong:
Reliable Forwarding Strategy in Vehicular Networks Using NDN. VTC Fall 2016: 1-5 - 2015
- [j26]Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew:
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks. Int. J. Commun. Syst. 28(1): 167-186 (2015) - [c73]Shengquan Liao, Xiaoyan Hong, Chunming Wu, Ming Jiang:
Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate. GLOBECOM 2015: 1-6 - [c72]Xiaoyan Hong, Yingyan Lou, Meng Kuai, Shuoping Wang:
Quantify Self-Organized Storage Capacity in Supporting Infrastructure-less Transportation Operation. MSCC@MobiHoc 2015: 13-18 - [c71]Meng Kuai, Tarif Haque, Xiaoyan Hong, Qiangyuan Yu:
A Named-Data Networking Approach to Underwater Monitoring Systems. WUWNet 2015: 45:1-45:2 - 2014
- [j25]Mohammad Asadul Hoque, Xiaoyan Hong, Brandon Dixon:
Efficient multi-hop connectivity analysis in urban vehicular networks. Veh. Commun. 1(2): 78-90 (2014) - [c70]Meng Kuai, Xiaoyan Hong, Roberto Raguze Flores:
Evaluating Interest Broadcast in Vehicular Named Data Networking. GREE 2014: 77-78 - [c69]Boyang Zhou, Chunming Wu, Xiaoyan Hong, Ming Jiang:
Programming network via Distributed Control in Software-Defined Networks. ICC 2014: 3051-3057 - [c68]Boyang Zhou, Haifeng Zhou, Wen Gao, Xiaoyan Hong, Bin Wang, Chunming Wu:
Lossless reconfiguration protocol for multi-domain data plane in software-defined networks. INFOCOM Workshops 2014: 193-194 - [c67]Shengquan Liao, Xiaoyan Hong, Chunming Wu, Bin Wang, Ming Jiang:
Prototype for customized multicast services in software defined networks. SoftCOM 2014: 315-320 - 2013
- [j24]Gabriel Loewen, Jeffrey M. Galloway, Jeffrey A. Robinson, Xiaoyan Hong, Susan V. Vrbsky:
THUNDER: helping underfunded NPO's distribute electronic resources. J. Cloud Comput. 2: 24 (2013) - [j23]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qiang Yang, Qinming He:
EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks. J. Zhejiang Univ. Sci. C 14(5): 356-373 (2013) - [j22]Dawei Li, Xiaoyan Hong, Darwin Witt:
ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study. IEEE Syst. J. 7(3): 478-488 (2013) - [j21]Bo Gu, Xiaoyan Hong, Pu Wang:
Analysis for bio-inspired thrown-box assisted message dissemination in delay tolerant networks. Telecommun. Syst. 52(1): 217-227 (2013) - [c66]Lei Zhao, Xiaoyan Hong, Jingyuan Zhang, Yanping Zhang, Qi Hao:
Feasibility analysis of multi-radio in DSRC vehicular networks. WPMC 2013: 1-6 - 2012
- [j20]Bo Gu, Xiaoyan Hong:
Transition phase of connectivity for wireless networks with growing process. Int. J. Ad Hoc Ubiquitous Comput. 11(2/3): 169-177 (2012) - [c65]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qinming He:
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks. MobiGIS 2012: 49-56 - [c64]Xiaoyan Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang:
Constructing time-varying contact graphs for heterogeneous delay tolerant networks. GLOBECOM 2012: 5302-5307 - [c63]Mohammad Asadul Hoque, Xiaoyan Hong:
BioStaR: A Bio-inspired Stable Routing for Cognitive Radio Networks. ICNC 2012: 402-406 - [c62]Mohammad Asadul Hoque, Xiaoyan Hong, Brandon Dixon:
Analysis of mobility patterns for urban taxi cabs. ICNC 2012: 756-760 - [c61]Yanzhe Che, Qiang Yang, Xiaoyan Hong:
A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks. WCNC 2012: 2098-2102 - [c60]Xiaoyan Hong, Meng Kuai, Wenhua Hu:
Routing with bridging nodes for drifting mobility. WUWNet 2012: 47 - 2011
- [c59]Dawei Li, Xiaoyan Hong:
Practical exploitation on system vulnerability of ProtoGENI. ACM Southeast Regional Conference 2011: 109-114 - [c58]Bo Gu, Xiaoyan Hong:
Optimal routing strategy in throw-box based delay tolerant network. CHINACOM 2011: 501-506 - [c57]Yuguang Zeng, Xiaoyan Hong:
A caching strategy in mobile ad hoc named data network. CHINACOM 2011: 805-809 - [c56]Nicholas A. Kraft, Xiaoyan Hong, John C. Lusth, Debra McCallum:
Experiences with CS2 and data structures in the 100 problems format. FIE 2011: 4 - [c55]Bo Gu, Xiaoyan Hong:
Capacity-Aware Routing Using Throw-Boxes. GLOBECOM 2011: 1-5 - [c54]Dawei Li, Xiaoyan Hong, Jason Bowman:
Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad. GLOBECOM 2011: 1-6 - [i1]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. IACR Cryptol. ePrint Arch. 2011: 639 (2011) - 2010
- [j19]Dijiang Huang, Xiaoyan Hong, Mario Gerla:
Situation-aware trust architecture for vehicular networks. IEEE Commun. Mag. 48(11): 128-135 (2010) - [j18]Qunwei Zheng, Xiaoyan Hong, Jun Liu, David Cordes, Wan Huang:
Agenda driven mobility modelling. Int. J. Ad Hoc Ubiquitous Comput. 5(1): 22-36 (2010) - [j17]Xiaoyan Hong, Bo Gu, Mohammad Hoque, Lei Tang:
Exploring multiple radios and multiple channels in wireless mesh networks. IEEE Wirel. Commun. 17(3): 76-85 (2010) - [c53]Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla:
Establishing Email-Based Social Network Trust for Vehicular Networks. CCNC 2010: 1-5 - [c52]Bo Gu, Xiaoyan Hong:
Critical Phase of Connectivity in Wireless Network Expansion. GLOBECOM 2010: 1-5 - [c51]Bo Gu, Xiaoyan Hong, Pu Wang, Richard Borie:
Latency Analysis for Thrown Box Based Message Dissemination. GLOBECOM 2010: 1-5 - [c50]Lei Zhao, Xiaoyan Hong, Bo Gu:
Handshake time and transmission rate of 802.11g measurement in vehicular networks. LCN 2010: 730-736 - [c49]Mohammad Asadul Hoque, Xiaoyan Hong, Md. Ashfakul Islam, Kazi Zunnurhain:
Delay analysis of Wireless Ad Hoc networks: Single vs. multiple radio. LCN 2010: 814-820 - [c48]Nanxi Chen, Mario Gerla, Dijiang Huang, Xiaoyan Hong:
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. Med-Hoc-Net 2010: 1-8
2000 – 2009
- 2009
- [j16]Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang:
Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks. Int. J. Interdiscip. Telecommun. Netw. 1(1): 80-94 (2009) - [j15]Jun Liu, Xiaoyan Hong:
An online energy-efficient routing protocol with traffic load prospects in wireless sensor networks. Int. J. Sens. Networks 5(3): 185-197 (2009) - [j14]Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong:
Selective Message Forwarding in Delay Tolerant Networks. Mob. Networks Appl. 14(4): 387-400 (2009) - [j13]Hui Chen, Yang Xiao, Xiaoyan Hong, Fei Hu, Jiang (Linda) Xie:
A survey of anonymity in wireless communication systems. Secur. Commun. Networks 2(5): 427-444 (2009) - [j12]Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Using camouflaging mobility to protect privacy in mobile ad hoc networks. Secur. Commun. Networks 2(6): 580-594 (2009) - [j11]Jiejun Kong, Xiaoyan Hong, Dapeng Oliver Wu:
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes. IEEE Trans. Veh. Technol. 58(5): 2406-2416 (2009) - [c47]Li Liu, Xiaoyan Hong, Jingyuan Zhang:
Effects of multiple collaborated data streams in wireless sensor networks. ACM Southeast Regional Conference 2009 - [c46]Dana Steil, Xiaoyan Hong, Li Ding:
A mobility camouflaging evaluation tool. ACM Southeast Regional Conference 2009 - [c45]Bo Gu, Xiaoyan Hong, Pu Wang:
Modeling Worm Propagation through Hidden Wireless Connections. GLOBECOM 2009: 1-7 - [c44]Mohammad Asadul Hoque, Xiaoyan Hong, Farhana Afroz:
Multiple Radio Channel Assignement Utilizing Partially Overlapped Channels. GLOBECOM 2009: 1-7 - [c43]Li Ding, Xiaoyan Hong, Brandon Dixon:
An Efficient Support of Range Queries over DHTs. PDPTA 2009: 67-73 - [c42]Li Ding, Bo Gu, Xiaoyan Hong, Brandon Dixon:
Articulation Node Based Routing in Delay Tolerant Networks. PerCom Workshops 2009: 1-6 - 2008
- [j10]Ming Lei, Susan V. Vrbsky, Xiaoyan Hong:
An on-line replication strategy to increase availability in Data Grids. Future Gener. Comput. Syst. 24(2): 85-98 (2008) - [j9]Qunwei Zheng, Xiaoyan Hong, Pu Wang, Lei Tang, Jun Liu:
Delay management in delay-tolerant networks. Int. J. Netw. Manag. 18(6): 521-537 (2008) - [j8]Lei Tang, Xiaoyan Hong, Phillip G. Bradford:
Privacy-preserving secure relative localization in vehicular networks. Secur. Commun. Networks 1(3): 195-204 (2008) - [j7]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino:
Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Trans. Parallel Distributed Syst. 19(10): 1297-1309 (2008) - [c41]Lei Tang, Susan V. Vrbsky, Xiaoyan Hong:
Collaborated Camouflaging Mobility for Mobile Privacy. GLOBECOM 2008: 2154-2158 - [c40]Dana Steil, Xiaoyan Hong:
A Trooper Selection Strategy on a Milepost Network. ICWN 2008: 241-247 - [c39]Lei Tang, Xiaoyan Hong, Bo Gu:
A locally-optimizing approach for multichannel assignment and routing. IPDPS 2008: 1-8 - [c38]Daisuke Takahashi, Xiaoyan Hong, Yang Xiao:
On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks. MSN 2008: 145-151 - [c37]Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks. WOWMOM 2008: 1-7 - 2007
- [j6]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(8): 888-902 (2007) - [c36]Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong, Lei Tang, Li Gao:
Integrity and its applications. ACM Southeast Regional Conference 2007: 350-354 - [c35]Jiejun Kong, Xiaoyan Hong, Dapeng Wu, Mario Gerla:
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks. BIBE 2007: 914-921 - [c34]Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong:
SMART: A selective controlled-flooding routing for delay tolerant networks. BROADNETS 2007: 356-365 - [c33]Ming Lei, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. GLOBECOM 2007: 49-53 - [c32]Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang:
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks. GLOBECOM 2007: 1006-1010 - [c31]Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24 - [c30]Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. ISI 2007: 377 - 2006
- [j5]Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong:
Resource allocation for restoration of compromised systems. J. Comb. Optim. 12(1-2): 35-56 (2006) - [j4]Xiaoyan Hong, Jiejun Kong, Mario Gerla:
Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 281-293 (2006) - [c29]Qunwei Zheng, Xiaoyan Hong, Jun Liu:
An Agenda Based Mobility Model21. Annual Simulation Symposium 2006: 188-195 - [c28]Ming Lei, Susan V. Vrbsky, Xiaoyan Hong:
A Dynamic Data Grid Replication Strategy to Minimize the Data Missed. BROADNETS 2006 - [c27]Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray:
Nonlinear Resource Allocation in Restoration of Compromised Systems. ICC 2006: 429-434 - [c26]Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang:
Privacy-Preserving Quick Authentication in Fast Roaming Networks. LCN 2006: 975-982 - [c25]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino:
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. MSN 2006: 461-472 - [c24]Lei Tang, Xiaoyan Hong, Phillip G. Bradford:
Secure Relative Location Determination in Vehicular Network. MSN 2006: 543-554 - [c23]Jun Liu, Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Performance evaluation of anonymous routing protocols in MANETs. WCNC 2006: 646-651 - [c22]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Modeling Ad-hoc rushing attack in a negligibility-based security framework. Workshop on Wireless Security 2006: 55-64 - 2005
- [c21]Xiaoyan Hong, Jun Liu, Randy Smith, Yeng-Zhong Lee:
Distributed Naming System for Mobile Ad Hoc Network. ICWN 2005: 509-515 - [c20]Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla:
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. ISCC 2005: 57-62 - [c19]Yeng-Zhong Lee, Kaixin Xu, Xiaoyan Hong, Mario Gerla:
Hybrid landmark routing in ad hoc networks with heterogeneous group mobility. ISWCS 2005: 125-129 - [c18]Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, Mario Gerla:
A secure ad-hoc routing approach using localized self-healing communities. MobiHoc 2005: 254-265 - [c17]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. SASN 2005: 97-106 - [c16]Yeng-Zhong Lee, Jason Chen, Xiaoyan Hong, Kaixin Xu, Teresa Maria Breyer, Mario Gerla:
Experimental evaluation of LANMAR, a scalable ad-hoc routing protocol. WCNC 2005: 2032-2037 - 2004
- [c15]Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray:
Recent advances in mobility modeling for mobile ad hoc network research. ACM Southeast Regional Conference 2004: 70-75 - 2003
- [j3]Kaixin Xu, Xiaoyan Hong, Mario Gerla:
Landmark routing in ad hoc networks with mobile backbones. J. Parallel Distributed Comput. 63(2): 110-122 (2003) - [c14]Jiejun Kong, Xiaoyan Hong:
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. MobiHoc 2003: 291-302 - 2002
- [j2]Xiaoyan Hong, Kaixin Xu, Mario Gerla:
Scalable routing protocols for mobile ad hoc networks. IEEE Netw. 16(4): 11-21 (2002) - [c13]Kaixin Xu, Xiaoyan Hong, Mario Gerla:
An ad hoc network with mobile backbones. ICC 2002: 3138-3143 - [c12]Xiaoyan Hong, Mario Gerla, Yunjung Yi, Kaixin Xu, Taek Jin Kwon:
Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks. ICC 2002: 3179-3185 - [c11]Xiaoyan Hong, N. Nguyen, Shaorong Liu, Ying Teng:
Dynamic group support in LANMAR routing ad hoc networks. MWCN 2002: 304-308 - [c10]Yunjung Yi, Xiaoyan Hong, Mario Gerla:
Scalable Team Multicast in Wireless Ad hoc Networks Exploiting Coordinated Motion. Networked Group Communication 2002: 97-104 - 2001
- [j1]Ronn Ritke, Xiaoyan Hong, Mario Gerla:
Contradictory relationship between Hurst parameter and queueing performance (extended version). Telecommun. Syst. 16(1-2): 159-175 (2001) - [c9]Xiaoyan Hong, Taek Jin Kwon, Mario Gerla, Daniel Lihui Gu, Guangyu Pei:
A Mobility Framework for Ad Hoc Wireless Networks. Mobile Data Management 2001: 185-196 - 2000
- [c8]Mario Gerla, Xiaoyan Hong, Guangyu Pei:
Landmark routing for large ad hoc wireless networks. GLOBECOM 2000: 1702-1706 - [c7]Guangyu Pei, Mario Gerla, Xiaoyan Hong:
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. MobiHoc 2000: 11-18 - [c6]Daniel Lihui Gu, Henry Ly, Xiaoyan Hong, Mario Gerla, Guangyu Pei, Yeng-Zhong Lee:
C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs. WCNC 2000: 879-884 - [c5]Daniel Lihui Gu, Guangyu Pei, Henry Ly, Mario Gerla, Beichuan Zhang, Xiaoyan Hong:
UAV aided intelligent routing for ad-hoc wireless network in single-area theater. WCNC 2000: 1220-1225
1990 – 1999
- 1999
- [c4]Xiaoyan Hong, Mario Gerla, Guangyu Pei, Ching-Chuan Chiang:
A group mobility model for ad hoc wireless networks. MSWiM 1999: 53-60 - [c3]Guangyu Pei, Mario Gerla, Xiaoyan Hong, Ching-Chuan Chiang:
A wireless hierarchical routing protocol with group mobility. WCNC 1999: 1538-1542 - 1992
- [c2]Huiming Tang, Shengrong Xu, Xiaoyan Hong:
An approach for analyzing the traces of moving objects. ICPR (3) 1992: 526-529 - 1990
- [c1]M. Y. Yu, Xiaoyan Hong, Y. E. Lien, Z. Z. Ma, J. G. Bo, W. J. Zhuang:
A new clustering approach and its application to BBL placement. EURO-DAC 1990: 665-669
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint