关注
Jie Wu
Jie Wu
Laura H. Carnell Professor, Department of Computer and Information Sciences, Temple
在 temple.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On calculating connected dominating set for efficient routing in ad hoc wireless networks
J Wu, H Li
Proceedings of the 3rd international workshop on Discrete algorithms and …, 1999
15861999
EECS: an energy efficient clustering scheme in wireless sensor networks
M Ye, C Li, G Chen, J Wu
PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005
15542005
An energy-efficient unequal clustering mechanism for wireless sensor networks
C Li, M Ye, G Chen, J Wu
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005
10452005
A survey of attacks and countermeasures in mobile ad hoc networks
B Wu, J Chen, J Wu, M Cardei
Wireless network security, 103-135, 2007
9362007
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
G Wang, Q Liu, J Wu
Proceedings of the 17th ACM conference on Computer and communications …, 2010
9272010
Energy-efficient coverage problems in wireless ad-hoc sensor networks
M Cardei, J Wu
Computer communications 29 (4), 413-420, 2006
8892006
An extended localized algorithm for connected dominating set formation in ad hoc wireless networks
F Dai, J Wu
IEEE transactions on parallel and distributed systems 15 (10), 908-920, 2004
7362004
An unequal cluster-based routing protocol in wireless sensor networks
G Chen, C Li, M Ye, J Wu
Wireless Networks 15, 193-207, 2009
7062009
The handbook of ad hoc wireless networks
M Ilyas, BC Seet, X Hannan, YC Tseng, A Mishra, S Giordano, YJ Suh, ...
CRC press, 2017
6692017
On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks
J Wu, F Dai, M Gao, I Stojmenovic
Journal of communications and networks 4 (1), 59-70, 2002
6442002
On reducing broadcast redundancy in ad hoc wireless networks
W Lou, J Wu
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
5832003
A survey on intrusion detection in mobile ad hoc networks
T Anantvalee, J Wu
Wireless network security, 159-180, 2007
4592007
Coverage in wireless sensor networks
M Cardei, J Wu
Handbook of sensor networks 21, 201-202, 2004
4502004
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4442014
Broadcasting in ad hoc networks based on self-pruning
J Wu, F Dai
International Journal of Foundations of Computer Science 14 (02), 201-221, 2003
4172003
A dominating-set-based routing scheme in ad hoc wireless networks
J Wu, H Li
Telecommunication Systems 18, 13-36, 2001
3912001
Maximum network lifetime in wireless sensor networks with adjustable sensing ranges
M Cardei, J Wu, M Lu, MO Pervaiz
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005
3712005
Secure and efficient key management in mobile ad hoc networks
B Wu, J Wu, EB Fernandez, S Magliveras
19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005
3472005
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
G Wang, Q Liu, J Wu, M Guo
computers & security 30 (5), 320-331, 2011
3352011
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Q Liu, G Wang, J Wu
Information sciences 258, 355-370, 2014
3282014
系统目前无法执行此操作,请稍后再试。
文章 1–20