111 Publications (Page 4 of 5)
2007
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet
Xiao, YangDu, XiaojiangZhang, JingyuanHu, Fei and Guizani, S.
IEEE Communications Magazine, vol. 45, (no. 11), pp. 126-134, 2007. | Journal Article
 
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
Sun, BoOsborne, L.Xiao, Yang and Guizani, S.
IEEE Wireless Communications Magazine, vol. 14, (no. 5), 2007. | Journal Article
 
Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless Systems
Xiao, YangXiao, YangChen, HuiChen, HuiGuizani, M. and Guizani, Mohsen
IEEE Transactions on Wireless Communications, vol. 6, (no. 10), 2007. | Journal Article
 
On-Bound Selection Cache Replacement Policy for Wireless Data Access
Chen, HuiChen, HuiXiao, Yang and Xiao, Yang
IEEE Transactions on Computers, vol. 56, (no. 12), pp. 1597-1611, 2007. | Journal Article
 
Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems
Xiao, YangXiao, YangChen, HuiChen, HuiDu, XiaojiangDu, XiaojiangGuizani, M. and Guizani, Mohsen
IEEE Transactions on Vehicular Technology, vol. 56, (no. 5), 2007. | Journal Article
 
Pulse Waveform Dependent BER Analysis of a DS-CDMA UWB Radio Under Multiple Access and Multipath Interferences
Chen, Hsiao HwaGuizani, MohsenTsai, Cheng-HsiunXiao, YangFantacci, R. and Sharif, HR
IEEE Transactions on Wireless Communications, vol. 6, (no. 6), 2007. | Journal Article
 
Radio frequency identification: technologies, applications, and research issues
Xiao, YangYu, SenhuaWu, KuiNi, QiangJanecek, Christopher and Nordstad, Julia
Wireless Communications and Mobile Computing, vol. 7, (no. 4), pp. 457-472, 2007. | Journal Article
 
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
Wu, KuiDreef, DennisSun, Bo and Xiao, Yang
Ad Hoc Networks, vol. 5, (no. 1), pp. 100-111, 2007. | Journal Article
 
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
Stewart, WilliamXiao, YangSun, Bo and Chen, Hsiao-Hwa
International Journal of Wireless and Mobile Computing, vol. 2, (no. 1), pp. 14-27, 2007. | Journal Article
 
Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
Du, XiaojiangGuizani, MohsenXiao, Yang and Chen, Hsiao Hwa
IEEE Transactions on Wireless Communications, vol. 6, (no. 9), pp. 3395-3401, 2007. | Journal Article
2006
A lightweight secure protocol for wireless sensor networks.
Sun, BoLi, Ghung-ChihWu, Kui and Xiao, Yang
Computer Communications, vol. 29, (no. 13-14), pp. 2556-2568, 2006. | Journal Article
 
Efficient MAC strategies for the IEEE 802.11n wireless LANs
Xiao, Yang
Wireless Communications and Mobile Computing, vol. 6, (no. 4), pp. 453-466, 2006. | Journal Article
 
Enhancing security using mobility-based anomaly detection in cellular mobile networks
Sun, BoYu, FeiWu, KuiXiao, Yang and Leung, VCM
IEEE Transactions on Vehicular Technology, vol. 55, (no. 4), 2006. | Journal Article
 
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems
Xiao, YangShen, Sherman and Jiang, Hai
IEEE Journal on Selected Areas in Communications, vol. 24, (no. 4), pp. 836-842, 2006. | Journal Article
 
Optimal callback with two-level adaptation for wireless data access
Xiao, Yang and Chen, Hui
IEEE Transactions on Mobile Computing, vol. 5, (no. 8), 2006. | Journal Article
 
Optimal paging load balance with total delay constraint in macrocell-microcell hierarchical cellular networks
Xiao, Yang and Guizani, M.
IEEE Transactions on Wireless Communications, vol. 5, (no. 8), 2006. | Journal Article
 
Optimal periodic location area update for mobile telecommunications networks
Xiao, Yang and Chen, Hui
IEEE Transactions on Wireless Communications, vol. 5, (no. 4), pp. 930-937, 2006. | Journal Article
 
Performance evaluation of pipeline paging under paging delay constraint for wireless systems
Xiao, YangChen, Hui and Guizani, Mohsen
IEEE Transactions on Mobile Computing, vol. 5, (no. 1), pp. 64-76, 2006. | Journal Article
 
Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks
Wu, KuiXiao, Yang and Sun, Bo
IEEE Transactions on Parallel and Distributed Systems, vol. 17, (no. 6), pp. 562-575, 2006. | Journal Article
 
Security and privacy in RFID and applications in telemedicine
Xiao, YangShen, ShermanSun, Bo and Cai, Lin
IEEE Communications Magazine, vol. 44, (no. 4), pp. 64-72, 2006. | Journal Article
 
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
Xiao, YangBandela, ChaitanyaDu, XiaojiangPan, Yi and Dass, Edilbert K
International Journal of Wireless and Mobile Computing, vol. 1, (no. 3-4), pp. 276-288, 2006. | Journal Article
 
Update-Based Cache Access and Replacement in Wireless Data Access
Chen, HuiXiao, Yang and Shen, Sherman
IEEE Transactions on Mobile Computing, vol. 5, (no. 12), 2006. | Journal Article
 
Voice Capacity Analysis of WLAN With Unbalanced Traffic
Cai, L.Shen, ShermanMark, J. W and Xiao, Yang
IEEE Transactions on Vehicular Technology, vol. 55, (no. 3), pp. 752-761, 2006. | Journal Article
 
VoIP over WLAN: voice capacity, admission control, QoS, and MAC
Cai, LinXiao, YangShen, Sherman and Mark, Jon W
International Journal of Communication Systems, vol. 19, (no. 4), pp. 491-508, 2006. | Journal Article
2005
Differentiation, QoS guarantee, and optimization for real-time traffic over one-hop ad hoc networks
Xiao, Yang and Pan, Yi
IEEE Transactions on Parallel and Distributed Systems, vol. 16, (no. 6), pp. 538-549, 2005. | Journal Article