default search action
Xuetao Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Adnan Zeb, Shiyao Zhang, Xuetao Wei, James Jian Qiao Yu:
A generalized feature projection scheme for multi-step traffic forecasting. Expert Syst. Appl. 244: 122962 (2024) - [j54]Alia Asheralieva, Dusit Niyato, Xuetao Wei:
Ultrareliable Low-Latency Slicing in Space-Air-Ground Multiaccess Edge Computing Networks for Next-Generation Internet of Things and Mobile Applications. IEEE Internet Things J. 11(3): 3956-3978 (2024) - [j53]Dibo Xian, Xuetao Wei:
ICOE: A Lightweight Group-Consensus-Based Off-Chain Execution Model for Smart Contract-Based Industrial Applications. IEEE Trans. Ind. Informatics 20(2): 1895-1906 (2024) - [j52]Bo Yin, Jiaqi Li, Yiyuan She, Xuetao Wei:
Reducing Storage Requirement in Blockchain via Node-Oriented Block Placement. IEEE Trans. Netw. Sci. Eng. 11(1): 64-76 (2024) - [j51]Yulong Chen, Alia Asheralieva, Xuetao Wei:
AtomCI: A New System for the Atomic Cross-Chain Smart Contract Invocation Spanning Heterogeneous Blockchains. IEEE Trans. Netw. Sci. Eng. 11(3): 2782-2796 (2024) - [j50]Jiashi Gao, Ziwei Wang, Xuetao Wei:
An Adaptive Pricing Framework for Real-Time AI Model Service Exchange. IEEE Trans. Netw. Sci. Eng. 11(5): 5114-5129 (2024) - [j49]Dibo Xian, Xuetao Wei:
SC-Chef: Turboboosting Smart Contract Concurrent Execution for High Contention Workloads via Chopping Transactions. IEEE Trans. Reliab. 73(1): 216-229 (2024) - [j48]Weiquan Ni, Alia Asheralieva, Jiawen Kang, Zehui Xiong, Carsten Maple, Xuetao Wei:
An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains. IEEE Trans. Serv. Comput. 17(2): 420-436 (2024) - [c33]Xingyu Zhu, Guanhui Ye, Xiapu Luo, Xuetao Wei:
Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking. AAAI 2024: 7784-7792 - [c32]Langming Liu, Wanyu Wang, Xiangyu Zhao, Zijian Zhang, Chunxu Zhang, Shanru Lin, Yiqi Wang, Lixin Zou, Zitao Liu, Xuetao Wei, Hongzhi Yin, Qing Li:
Efficient and Robust Regularized Federated Recommendation. CIKM 2024: 1452-1461 - [c31]Jiashi Gao, Xin Yao, Xuetao Wei:
Anti-Matthew FL: Bridging the Performance Gap in Federated Learning to Counteract the Matthew Effect. ECAI 2024: 1967-1974 - [c30]Yuanshao Zhu, James Jian Qiao Yu, Xiangyu Zhao, Qidong Liu, Yongchao Ye, Wei Chen, Zijian Zhang, Xuetao Wei, Yuxuan Liang:
ControlTraj: Controllable Trajectory Generation with Topology-Constrained Diffusion Model. KDD 2024: 4676-4687 - [c29]Yuchen Wang, Xingyu Zhu, Guanhui Ye, Shiyao Zhang, Xuetao Wei:
Achieving Resolution-Agnostic DNN-based Image Watermarking: A Novel Perspective of Implicit Neural Representation. ACM Multimedia 2024: 10354-10362 - [c28]Ke Mu, Bo Yin, Alia Asheralieva, Xuetao Wei:
Separation is Good: A Faster Order-Fairness Byzantine Consensus. NDSS 2024 - [i17]Xinwei Guo, Yujun Li, Yafeng Peng, Xuetao Wei:
Copyleft for Alleviating AIGC Copyright Dilemma: What-if Analysis, Public Perception and Implications. CoRR abs/2402.12216 (2024) - [i16]Yuanshao Zhu, James Jian Qiao Yu, Xiangyu Zhao, Qidong Liu, Yongchao Ye, Wei Chen, Zijian Zhang, Xuetao Wei, Yuxuan Liang:
ControlTraj: Controllable Trajectory Generation with Topology-Constrained Diffusion Model. CoRR abs/2404.15380 (2024) - [i15]Yuchen Wang, Xingyu Zhu, Guanhui Ye, Shiyao Zhang, Xuetao Wei:
Achieving Resolution-Agnostic DNN-based Image Watermarking:A Novel Perspective of Implicit Neural Representation. CoRR abs/2405.08340 (2024) - [i14]Pengyue Jia, Yiding Liu, Xiaopeng Li, Xiangyu Zhao, Yuhao Wang, Yantong Du, Xiao Han, Xuetao Wei, Shuaiqiang Wang, Dawei Yin:
G3: An Effective and Adaptive Framework for Worldwide Geolocalization Using Large Multi-Modality Models. CoRR abs/2405.14702 (2024) - [i13]Lei Xu, Yulong Chen, Yuntian Chen, Longfeng Nie, Xuetao Wei, Liang Xue, Dongxiao Zhang:
When Swarm Learning meets energy series data: A decentralized collaborative learning design based on blockchain. CoRR abs/2406.04743 (2024) - [i12]Zhipeng Zheng, Yuchen Jiang, Shiyao Zhang, Xuetao Wei:
Siamese Multiple Attention Temporal Convolution Networks for Human Mobility Signature Identification. CoRR abs/2408.09230 (2024) - [i11]Xiao Han, Zijian Zhang, Xiangyu Zhao, Guojiang Shen, Xiangjie Kong, Xuetao Wei, Liqiang Nie, Jieping Ye:
GPT-Augmented Reinforcement Learning with Intelligent Control for Vehicle Dispatching. CoRR abs/2408.10286 (2024) - [i10]Jiashi Gao, Ziwei Wang, Xiangyu Zhao, Xin Yao, Xuetao Wei:
PFAttack: Stealthy Attack Bypassing Group Fairness in Federated Learning. CoRR abs/2410.06509 (2024) - 2023
- [j47]Bo Yin, Weilong Zeng, Xuetao Wei:
Efficient crowdsourced best objects finding via superiority probability based ordering for decision support systems. Expert Syst. Appl. 223: 119893 (2023) - [j46]Baozhu Yu, Xiangyu Liu, Lei Guo, Xuetao Wei, Song Song:
Fasys: Visible-Light-Based Communication and Positioning Services towards Smart Cities. Sensors 23(14): 6340 (2023) - [j45]Xiangyu Liu, Xuetao Wei, Lei Guo:
Indoor Passive Visible Light Localization: A Case of the Novel Rake RGB-LED Series Detector. IEEE Trans. Instrum. Meas. 72: 1-13 (2023) - [j44]Ke Mu, Xuetao Wei:
EfShard: Toward Efficient State Sharding Blockchain via Flexible and Timely State Allocation. IEEE Trans. Netw. Serv. Manag. 20(3): 2817-2829 (2023) - [j43]Bo Yin, Weilong Zeng, Peng Zhang, Xuetao Wei:
EAQ: Enabling Authenticated Complex Query Services in Sustainable-Storage Blockchain. IEEE Trans. Sustain. Comput. 8(3): 435-447 (2023) - [c27]Ziwei Wang, Haotian Lu, Xuetao Wei:
Ethereum DeFi Apps in the Wild: Profiling and Implications. MetaCom 2023: 388-392 - [c26]Ziwei Wang, Jiashi Gao, Xuetao Wei:
Do NFTs' Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility. WWW 2023: 2099-2109 - [i9]Guanhui Ye, Jiashi Gao, Yuchen Wang, Liyan Song, Xuetao Wei:
ItoV: Efficiently Adapting Deep Learning-based Image Watermarking to Video Watermarking. CoRR abs/2305.02781 (2023) - [i8]Xingyu Zhu, Guanhui Ye, Xuetao Wei, Xiapu Luo:
WM-NET: Robust Deep 3D Watermarking with Limited Data. CoRR abs/2307.11628 (2023) - [i7]Jiashi Gao, Changwu Huang, Ming Tang, Shin Hwei Tan, Xin Yao, Xuetao Wei:
EFFL: Egalitarian Fairness in Federated Learning for Mitigating Matthew Effect. CoRR abs/2309.16338 (2023) - [i6]Xingyu Zhu, Guanhui Ye, Chengdong Dong, Xiapu Luo, Xuetao Wei:
Towards Function Space Mesh Watermarking: Protecting the Copyright of Signed Distance Fields. CoRR abs/2311.12059 (2023) - [i5]Junlei Zhou, Jiashi Gao, Ziwei Wang, Xuetao Wei:
CopyScope: Model-level Copyright Infringement Quantification in the Diffusion Workflow. CoRR abs/2311.12847 (2023) - 2022
- [j42]Bo Yin, Weilong Zeng, Xuetao Wei:
Cost-effective crowdsourced join queries for entity resolution without prior knowledge. Future Gener. Comput. Syst. 127: 240-251 (2022) - [j41]Xiangyu Liu, Xuetao Wei, Lei Guo, Song Song:
DarkVLP: "Lights-Off" Visible-Light Positioning. IEEE Internet Things J. 9(13): 11071-11084 (2022) - [j40]Xiangyu Liu, Lei Guo, Helin Yang, Xuetao Wei:
Visible Light Positioning Based on Collaborative LEDs and Edge Computing. IEEE Trans. Comput. Soc. Syst. 9(1): 324-335 (2022) - [j39]Bo Yin, Jiaqi Li, Xuetao Wei:
Rational Task Assignment and Path Planning Based on Location and Task Characteristics in Mobile Crowdsensing. IEEE Trans. Comput. Soc. Syst. 9(3): 781-793 (2022) - [j38]Xiangyu Liu, Yujing Gao, Xiaojie Wang, Lei Guo, Xuetao Wei:
Cognitive Indoor Positioning Using Sparse Visible Light Source. IEEE Trans. Comput. Soc. Syst. 9(6): 1682-1692 (2022) - [j37]Bo Yin, Xuetao Wei:
Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee. IEEE Trans. Emerg. Top. Comput. 10(1): 297-311 (2022) - [j36]Bo Yin, Jiaqi Li, Xuetao Wei:
EBSF: Node Characteristics-Based Block Allocation Plans for Efficient Blockchain Storage. IEEE Trans. Netw. Serv. Manag. 19(4): 4858-4871 (2022) - [i4]Wenhui Wang, Ke Mu, Xuetao Wei:
DPCN: Towards Deadline-aware Payment Channel Networks. CoRR abs/2209.10299 (2022) - [i3]Guanhui Ye, Jiashi Gao, Wei Xie, Bo Yin, Xuetao Wei:
Deep Boosting Robustness of DNN-based Image Watermarking via DBMark. CoRR abs/2210.13801 (2022) - [i2]Ziwei Wang, Jiashi Gao, Xuetao Wei:
Do NFTs' Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility. CoRR abs/2212.11181 (2022) - 2021
- [j35]Bo Yin, Jun Lu, Xuetao Wei:
Correlation-Based Task Processing Plans in Crowdsensing Platforms. IEEE Trans. Netw. Sci. Eng. 8(2): 1542-1556 (2021) - [j34]Di Wu, He Xu, Zhongkai Jiang, Weiren Yu, Xuetao Wei, Jiwu Lu:
EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications. IEEE/ACM Trans. Netw. 29(4): 1895-1908 (2021) - [j33]Xiangyu Liu, Lei Guo, Xuetao Wei:
Indoor Visible Light Applications for Communication, Positioning, and Security. Wirel. Commun. Mob. Comput. 2021: 1730655:1-1730655:10 (2021) - 2020
- [j32]Xiaoqiong Xu, Jin Li, Hongfang Yu, Long Luo, Xuetao Wei, Gang Sun:
Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism. Digit. Commun. Networks 6(3): 369-376 (2020) - [j31]Bo Yin, Xuetao Wei, Jin Wang, Naixue Xiong, Ke Gu:
An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications. IEEE Trans. Ind. Informatics 16(4): 2520-2532 (2020) - [j30]Di Wu, Zhongkai Jiang, Xiaofeng Xie, Xuetao Wei, Weiren Yu, Renfa Li:
LSTM Learning With Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT. IEEE Trans. Ind. Informatics 16(8): 5244-5253 (2020) - [c25]Nikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems. ICDCS 2020: 1090-1100 - [c24]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting encrypted voice traffic on smart speakers with deep learning. WISEC 2020: 254-265 - [i1]Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning. CoRR abs/2005.09800 (2020)
2010 – 2019
- 2019
- [j29]Xiangyu Liu, Xuetao Wei, Lei Guo, Yejun Liu:
SecLight: A New and Practical VLC Eavesdropping-Resilient Framework for IoT Devices. IEEE Access 7: 19109-19124 (2019) - [j28]Xiangyu Liu, Xuetao Wei, Lei Guo, Yejun Liu, Qingyang Song, Abbas Jamalipour:
Turning the Signal Interference Into Benefits: Towards Indoor Self-Powered Visible Light Communication for IoT Devices in Industrial Radio-Hostile Environments. IEEE Access 7: 24978-24989 (2019) - [j27]Bo Yin, Xuetao Wei, Yonghe Liu:
Finding the most influential product under distribution constraints through dominance tests. Appl. Intell. 49(2): 723-740 (2019) - [j26]Xiangyu Liu, Xuetao Wei, Lei Guo, Yejun Liu:
Exploring multiamplitude voltage modulation to improve spectrum efficiency in low-complexity visible-light communication. Sci. China Inf. Sci. 62(8): 80305:1-80305:19 (2019) - [j25]Bo Yin, Xuetao Wei, Yonghe Liu:
Finding the informative and concise set through approximate skyline queries. Expert Syst. Appl. 119: 289-310 (2019) - [j24]Bo Yin, Xuetao Wei:
Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications. IEEE Internet Things J. 6(2): 3352-3363 (2019) - [j23]Xiangyu Liu, Xuetao Wei, Lei Guo:
DIMLOC: Enabling High-Precision Visible Light Localization Under Dimmable LEDs in Smart Buildings. IEEE Internet Things J. 6(2): 3912-3924 (2019) - [c23]Hao Liu, Boyang Wang, Nan Niu, Shomir Wilson, Xuetao Wei:
Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks. CNS 2019: 109-117 - [c22]Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang:
A Behavior-Aware Profiling of Smart Contracts. SecureComm (2) 2019: 245-258 - 2018
- [j22]Bo Yin, Ke Gu, Xuetao Wei, Siwang Zhou, Yonghe Liu:
A cost-efficient framework for finding prospective customers based on reverse skyline queries. Knowl. Based Syst. 152: 117-135 (2018) - [c21]Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham, Aokun Chen, Michalis Faloutsos, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall:
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. DSN 2018: 231-242 - 2017
- [j21]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
Characterizing the behavior of handheld devices and its implications. Comput. Networks 114: 1-12 (2017) - [j20]Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan:
Improving Smartphone Security and Reliability. J. Interconnect. Networks 17(1): 1740002:1-1740002:67 (2017) - [j19]Xuetao Wei, Theodore Stoner, Joseph Knight, Lei Guo:
Measuring and Understanding RRC State Machine Optimization in Light of Recent Advancements. IEEE Trans. Mob. Comput. 16(5): 1330-1342 (2017) - [c20]Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee:
DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging. AsiaCCS 2017: 666-677 - 2016
- [j18]Xiaoxue Gong, Zhaolong Ning, Lei Guo, Xuetao Wei, Qingyang Song:
Location-Recommendation-Aware Virtual Network Embedding in Energy-Efficient Optical-Wireless Hybrid Networks Supporting 5G Models. IEEE Access 4: 3065-3075 (2016) - [j17]Weigang Hou, Cunqian Yu, Lei Guo, Xuetao Wei:
Virtual network embedding for power savings of servers and switches in elastic data center networks. Sci. China Inf. Sci. 59(12): 122307:1-122307:14 (2016) - [j16]Lei Guo, Kumudu S. Munasinghe, Xuetao Wei:
Special issue on "cloud optical network". Photonic Netw. Commun. 31(3): 514-515 (2016) - [c19]Xiangyu Liu, Xuetao Wei, Lei Guo, Yejun Liu, Yufang Zhou:
A New Eavesdropping-Resilient Framework for Indoor Visible Light Communication. GLOBECOM 2016: 1-6 - [c18]Xuetao Wei, Michael Wolf, Lei Guo, Kyu Hyung Lee, Ming-Chun Huang, Nan Niu:
emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps. GLOBECOM 2016: 1-6 - [c17]Pengchao Han, Lei Guo, Yejun Liu, Xuetao Wei, Jian Hou, Xu Han:
A new virtual network embedding framework based on QoS satisfaction and network reconfiguration for fiber-wireless access network. ICC 2016: 1-7 - [c16]Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie C. Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela Oliveira:
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. NSPW 2016: 23-35 - [c15]Nesrin Hussein, Wentao Wang, Joseph L. Nedelec, Xuetao Wei, Nan Niu:
Unified Profiling of Attackers via Domain Modeling. RE Workshops 2016: 98-101 - 2015
- [c14]Xuetao Wei, Iulian Neamtiu, Michalis Faloutsos:
Whom Does Your Android App Talk To? GLOBECOM 2015: 1-6 - [c13]Liu Liu, Jie Xu, Hongfang Yu, Xuetao Wei:
Joint admission control and provisioning for virtual machines. ICC 2015: 332-337 - [c12]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
A behavior-aware profiling of handheld devices. INFOCOM 2015: 846-854 - [c11]Theodore Stoner, Xuetao Wei, Joseph Knight, Lei Guo:
Experience: Rethinking RRC State Machine Optimization in Light of Recent Advancements. MobiCom 2015: 477-485 - 2013
- [b1]Xuetao Wei:
Understanding and Improving the Smartphone Ecosystem: Measurements, Security and Tools. University of California, Riverside, USA, 2013 - [j15]Xiao-Ying Zhang, Lei Guo, Xuetao Wei:
An energy-balanced cooperative MAC protocol based on opportunistic relaying in MANETs. Comput. Electr. Eng. 39(6): 1894-1904 (2013) - [j14]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, Christos Faloutsos:
Competing Memes Propagation on Networks: A Network Science Perspective. IEEE J. Sel. Areas Commun. 31(6): 1049-1060 (2013) - [j13]Weigang Hou, Lei Guo, Yejun Liu, Qingyang Song, Xuetao Wei:
Virtual network planning for converged optical and data centers: ideas and challenges. IEEE Netw. 27(6): 52-58 (2013) - [c10]Huy Hang, Xuetao Wei, Michalis Faloutsos, Tina Eliassi-Rad:
Entelecheia: Detecting P2P botnets in their waiting stage. Networking 2013: 1-9 - [c9]Xuetao Wei, Nicholas Valler, Michalis Faloutsos, Iulian Neamtiu, B. Aditya Prakash, Christos Faloutsos:
Smartphone viruses propagation on heterogeneous composite networks. NSW 2013: 106-109 - 2012
- [j12]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, Christos Faloutsos:
Competing memes propagation on networks: a case study of composite networks. Comput. Commun. Rev. 42(5): 5-12 (2012) - [j11]Weigang Hou, Lei Guo, Xuetao Wei, Xiaoxue Gong:
Multi-granularity and robust grooming in power- and port-cost-efficient IP over WDM networks. Comput. Networks 56(10): 2383-2399 (2012) - [j10]Hongfang Yu, Vishal Anand, Chunming Qiao, Hao Di, Xuetao Wei:
A Cost Efficient Design of Virtual Infrastructures with Joint Node and Link Mapping. J. Netw. Syst. Manag. 20(1): 97-115 (2012) - [c8]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
Permission evolution in the Android ecosystem. ACSAC 2012: 31-40 - [c7]Yejun Liu, Lei Guo, Xuetao Wei:
OBOF: A protection scheme for survivable Fiber-Wireless broadband access network. ICC 2012: 6225-6229 - [c6]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? ICDE Workshops 2012: 251-254 - [c5]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos:
ProfileDroid: multi-layer profiling of android applications. MobiCom 2012: 137-148 - 2011
- [j9]Weigang Hou, Lei Guo, Xingwei Wang, Xuetao Wei:
Joint port-cost and power-consumption savings in hybrid hierarchical optical networks. Opt. Switch. Netw. 8(3): 214-224 (2011) - [c4]Xuetao Wei, Nicholas Valler, Michalis Faloutsos, Harsha V. Madhyastha, Ting-Kai Huang:
XLR: Tackling the Inefficiency of Landmark-Based Routing in Large Wireless Sensor Networks. GLOBECOM 2011: 1-6 - 2010
- [j8]Lei Guo, Jiannong Cao, Xingwei Wang, Xuetao Wei, Qiming Gai, Zhaolong Ning, Cunqian Yu:
Communication Networks Survivable routing algorithm with mixed shared protection in fault-tolerant GMPLS multi-layered optical networks. Eur. Trans. Telecommun. 21(4): 312-323 (2010)
2000 – 2009
- 2009
- [j7]Lei Guo, Xuetao Wei, Xingwei Wang:
Erratum to "New routing algorithms in trustworthy Internet" [Computer Communications 31 (2008) 3533-3536]. Comput. Commun. 32(6): 1129 (2009) - [j6]Xingwei Wang, Lei Guo, Xuetao Wei, Lan Pang, Tengfei Wu, Juan Du, Xuekui Wang:
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks. J. Syst. Softw. 82(3): 377-381 (2009) - 2008
- [j5]Xuetao Wei, Lemin Li, Hongfang Yu:
An improved lightpath allocation for grade of services in survivable WDM mesh networks. Comput. Commun. 31(10): 2391-2397 (2008) - [j4]Xingwei Wang, Lei Guo, Xuetao Wei, Weigang Hou, Fei Yang, Lan Pang:
Survivability in waveband switching optical networks: Challenges and new ideas. Comput. Commun. 31(10): 2435-2442 (2008) - [j3]Xuetao Wei, Lei Guo, Xingwei Wang, Qingyang Song, Lemin Li:
Availability guarantee in survivable WDM mesh networks: A time perspective. Inf. Sci. 178(11): 2406-2415 (2008) - [j2]Lei Guo, Xingwei Wang, Qingyang Song, Xuetao Wei, Weigang Hou, Ting Yang, Fei Yang:
New insights on survivability in multi-domain optical networks. Inf. Sci. 178(18): 3635-3644 (2008) - [j1]Xingwei Wang, Lei Guo, Lemin Li, Xuetao Wei:
An improved shared-path protection algorithm for double-link failures in meshed WDM optical networks. J. Commun. Networks 10(3): 331-337 (2008) - [c3]Lei Guo, Xingwei Wang, Xuetao Wei, Ting Yang, Weigang Hou, Tengfei Wu:
A New Link-Based Hamiltonian Cycle Protection in Survivable WDM Optical Networks. AICT 2008: 227-231 - 2007
- [c2]Xuetao Wei, Lemin Li, Hongfang Yu, Du Xu:
Dynamic Preemptive Multi-class Routing Scheme Under Dynamic Traffic in Survivable WDM Mesh Networks. HPCC 2007: 744-754 - 2006
- [c1]Lei Guo, Lemin Li, Jin Cao, Hongfang Yu, Xuetao Wei:
Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks. ICDCN 2006: 479-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint