111 Publications (Page 4 of 5)
2007
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation InternetXiao, Yang⋅Du, Xiaojiang⋅Zhang, Jingyuan⋅Hu, Fei and Guizani, S.IEEE Communications Magazine, vol. 45, (no. 11), pp. 126-134, 2007.
| Journal Article
Intrusion detection techniques in mobile ad hoc and wireless sensor networksSun, Bo⋅Osborne, L.⋅Xiao, Yang and Guizani, S.IEEE Wireless Communications Magazine, vol. 14, (no. 5), 2007.
| Journal Article
Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless SystemsXiao, Yang⋅Xiao, Yang⋅Chen, Hui⋅Chen, Hui⋅Guizani, M. and Guizani, MohsenIEEE Transactions on Wireless Communications, vol. 6, (no. 10), 2007.
| Journal Article
On-Bound Selection Cache Replacement Policy for Wireless Data AccessChen, Hui⋅Chen, Hui⋅Xiao, Yang and Xiao, YangIEEE Transactions on Computers, vol. 56, (no. 12), pp. 1597-1611, 2007.
| Journal Article
Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless SystemsXiao, Yang⋅Xiao, Yang⋅Chen, Hui⋅Chen, Hui⋅Du, Xiaojiang⋅Du, Xiaojiang⋅Guizani, M. and Guizani, MohsenIEEE Transactions on Vehicular Technology, vol. 56, (no. 5), 2007.
| Journal Article
Pulse Waveform Dependent BER Analysis of a DS-CDMA UWB Radio Under Multiple Access and Multipath InterferencesChen, Hsiao Hwa⋅Guizani, Mohsen⋅Tsai, Cheng-Hsiun⋅Xiao, Yang⋅Fantacci, R. and Sharif, HRIEEE Transactions on Wireless Communications, vol. 6, (no. 6), 2007.
| Journal Article
Radio frequency identification: technologies, applications, and research issuesXiao, Yang⋅Yu, Senhua⋅Wu, Kui⋅Ni, Qiang⋅Janecek, Christopher and Nordstad, JuliaWireless Communications and Mobile Computing, vol. 7, (no. 4), pp. 457-472, 2007.
| Journal Article
Secure data aggregation without persistent cryptographic operations in wireless sensor networksWu, Kui⋅Dreef, Dennis⋅Sun, Bo and Xiao, YangAd Hoc Networks, vol. 5, (no. 1), pp. 100-111, 2007.
| Journal Article
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networksStewart, William⋅Xiao, Yang⋅Sun, Bo and Chen, Hsiao-HwaInternational Journal of Wireless and Mobile Computing, vol. 2, (no. 1), pp. 14-27, 2007.
| Journal Article
2006
A lightweight secure protocol for wireless sensor networks.Sun, Bo⋅Li, Ghung-Chih⋅Wu, Kui and Xiao, YangComputer Communications, vol. 29, (no. 13-14), pp. 2556-2568, 2006.
| Journal Article
Efficient MAC strategies for the IEEE 802.11n wireless LANsXiao, YangWireless Communications and Mobile Computing, vol. 6, (no. 4), pp. 453-466, 2006.
| Journal Article
Enhancing security using mobility-based anomaly detection in cellular mobile networksSun, Bo⋅Yu, Fei⋅Wu, Kui⋅Xiao, Yang and Leung, VCMIEEE Transactions on Vehicular Technology, vol. 55, (no. 4), 2006.
| Journal Article
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systemsXiao, Yang⋅Shen, Sherman and Jiang, HaiIEEE Journal on Selected Areas in Communications, vol. 24, (no. 4), pp. 836-842, 2006.
| Journal Article
Optimal callback with two-level adaptation for wireless data accessXiao, Yang and Chen, HuiIEEE Transactions on Mobile Computing, vol. 5, (no. 8), 2006.
| Journal Article
Optimal paging load balance with total delay constraint in macrocell-microcell hierarchical cellular networksXiao, Yang and Guizani, M.IEEE Transactions on Wireless Communications, vol. 5, (no. 8), 2006.
| Journal Article
Optimal periodic location area update for mobile telecommunications networksXiao, Yang and Chen, HuiIEEE Transactions on Wireless Communications, vol. 5, (no. 4), pp. 930-937, 2006.
| Journal Article
Performance evaluation of pipeline paging under paging delay constraint for wireless systemsXiao, Yang⋅Chen, Hui and Guizani, MohsenIEEE Transactions on Mobile Computing, vol. 5, (no. 1), pp. 64-76, 2006.
| Journal Article
Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor NetworksWu, Kui⋅Xiao, Yang and Sun, BoIEEE Transactions on Parallel and Distributed Systems, vol. 17, (no. 6), pp. 562-575, 2006.
| Journal Article
Security and privacy in RFID and applications in telemedicineXiao, Yang⋅Shen, Sherman⋅Sun, Bo and Cai, LinIEEE Communications Magazine, vol. 44, (no. 4), pp. 64-72, 2006.
| Journal Article
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANsXiao, Yang⋅Bandela, Chaitanya⋅Du, Xiaojiang⋅Pan, Yi and Dass, Edilbert KInternational Journal of Wireless and Mobile Computing, vol. 1, (no. 3-4), pp. 276-288, 2006.
| Journal Article
Update-Based Cache Access and Replacement in Wireless Data AccessChen, Hui⋅Xiao, Yang and Shen, ShermanIEEE Transactions on Mobile Computing, vol. 5, (no. 12), 2006.
| Journal Article
Voice Capacity Analysis of WLAN With Unbalanced TrafficCai, L.⋅Shen, Sherman⋅Mark, J. W and Xiao, YangIEEE Transactions on Vehicular Technology, vol. 55, (no. 3), pp. 752-761, 2006.
| Journal Article
VoIP over WLAN: voice capacity, admission control, QoS, and MACCai, Lin⋅Xiao, Yang⋅Shen, Sherman and Mark, Jon WInternational Journal of Communication Systems, vol. 19, (no. 4), pp. 491-508, 2006.
| Journal Article
2005
Differentiation, QoS guarantee, and optimization for real-time traffic over one-hop ad hoc networksXiao, Yang and Pan, YiIEEE Transactions on Parallel and Distributed Systems, vol. 16, (no. 6), pp. 538-549, 2005.
| Journal Article