default search action
Wei Shi 0001
Person information
- affiliation: Carleton University, School of Infermation Technology, Faculty of Engineering and Design, Ottawa, ON, Canada
- affiliation (2008 - 2016): University of Ontario Institute of Technology, Oshawa, ON, Canada
- affiliation (2007 - 2008): Algonquin College of Applied Arts and Technology, Ottawa, ON, Canada
- affiliation (PhD 2007): Carleton University, School of Computer Science, Ottawa, ON, Canada
Other persons with the same name
- Wei Shi — disambiguation page
- Wei Shi 0002 — National Oceanic and Atmospheric Administration, College Park, MD, USA (and 1 more)
- Wei Shi 0003 — Chinese University of Hong Kong, Hong Kong
- Wei Shi 0004 — Central South University, School of Aeronautics and Astronautics, Changsha, China
- Wei Shi 0005 — Bundeswehr University Munich, Germany
- Wei Shi 0006 — Qingdao University of Science and Technology, School of Information Science and Technology, China (and 1 more)
- Wei Shi 0007 — Université Laval, Centre for Optics, Photonics and Lasers, Québec, Canada (and 1 more)
- Wei Shi 0008 — Kyushu University, ICER, Innovation Center for Educational Resources, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Dajun Zhang, Wei Shi, Marc St-Hilaire, Ruizhe Yang:
Blockchain-Based Intelligence Networking for Cooperative Positioning Towards Future Internet of Vehicles. IEEE Trans. Veh. Technol. 73(3): 3262-3276 (2024) - [c46]Xiangyu Ma, Wei Shi, Junfeng Wen:
An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated Learning. EICC 2024: 171-178 - 2023
- [j47]Ahmet M. Elbir, Wei Shi, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas:
Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation. IEEE Access 11: 36409-36420 (2023) - [j46]Yangzixing Lv, Wei Shi, Weiyong Zhang, Hui Lu, Zhihong Tian:
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage. IEEE Internet Things J. 10(12): 10462-10470 (2023) - [j45]Ahmet M. Elbir, Wei Shi, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas:
Terahertz-Band Channel and Beam Split Estimation via Array Perturbation Model. IEEE Open J. Commun. Soc. 4: 892-907 (2023) - [c45]Ahmet M. Elbir, Wei Shi, Kumar Vijay Mishra, Symeon Chatzinotas:
Federated Multi-Task Learning For THZ Wideband Channel And DOA Estimation. ICASSP Workshops 2023: 1-5 - [c44]Ahmet M. Elbir, Wei Shi, Kumar Vijay Mishra, Anastasios K. Papazafeiropoulos, Symeon Chatzinotas:
Implicit Channel Learning For Machine Learning Applications In 6G Wireless Networks. ICASSP Workshops 2023: 1-5 - [i10]Ahmet M. Elbir, Wei Shi, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas:
Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation. CoRR abs/2302.04802 (2023) - 2022
- [j44]Ahmed Abada, Marc St-Hilaire, Wei Shi:
Auction-Based Scheduling of Excess Energy Consumption to Enhance Grid Upward Flexibility. IEEE Access 10: 5944-5956 (2022) - [j43]Ahmed Abada, Marc St-Hilaire, Wei Shi:
Rebate Auction Mechanisms for Bidirectional Grid Balancing Using Cloud Workload Migrations. IEEE Access 10: 78910-78927 (2022) - [j42]William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Differentially private facial obfuscation via generative adversarial networks. Future Gener. Comput. Syst. 129: 358-379 (2022) - [j41]Rahbar Ahsan, Wei Shi, Jean-Pierre Corriveau:
Network intrusion detection using machine learning approaches: Addressing data imbalance. IET Cyper-Phys. Syst.: Theory & Appl. 7(1): 30-39 (2022) - [j40]Rahbar Ahsan, Wei Shi, Xiangyu Ma, William Lee Croft:
A comparative analysis of CGAN-based oversampling for anomaly detection. IET Cyper-Phys. Syst.: Theory & Appl. 7(1): 40-50 (2022) - [j39]William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Differential Privacy via a Truncated and Normalized Laplace Mechanism. J. Comput. Sci. Technol. 37(2): 369-388 (2022) - [j38]Mianjie Li, Wei Shi, Fusheng Zhu, Zhihong Tian, Muhammad Shafiq, Zhiyong Luo, Chun Shan:
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks. IEEE Netw. 36(4): 160-165 (2022) - [j37]Dajun Zhang, Wei Shi, Marc St-Hilaire, Ruizhe Yang:
Multiaccess Edge Integrated Networking for Internet of Vehicles: A Blockchain-Based Deep Compressed Cooperative Learning Approach. IEEE Trans. Intell. Transp. Syst. 23(11): 21593-21607 (2022) - [j36]Dongbao Yang, Yu Zhou, Wei Shi, Dayan Wu, Weiping Wang:
RD-IOD: Two-Level Residual-Distillation-Based Triple-Network for Incremental Object Detection. ACM Trans. Multim. Comput. Commun. Appl. 18(1): 18:1-18:23 (2022) - [j35]Qingfeng Tan, Xuebin Wang, Wei Shi, Jian Tang, Zhihong Tian:
An Anonymity Vulnerability in Tor. IEEE/ACM Trans. Netw. 30(6): 2574-2587 (2022) - [c43]Dajun Zhang, Wei Shi, Ruizhe Yang:
A Blockchain-Based Distributed Machine Learning (BDML) Approach for Resource Allocation in Vehicular Ad-Hoc Networks. GPC 2022: 110-121 - [c42]Khoa Nguyen, Wei Shi, Marc St-Hilaire:
A Dynamic Vehicle-Ranking Approach for Online Virtual Network Embedding in Internet of Vehicles. ITNAC 2022: 287-292 - [c41]Dajun Zhang, Wei Shi, Marc St-Hilaire, Ruizhe Yang:
A Blockchain-Based Distributed Pruning Deep Compression Approach for Cooperative Positioning in Internet of Vehicles. IWCMC 2022: 443-448 - [i9]Ahmet M. Elbir, Wei Shi, Kumar Vijay Mishra, Anastasios K. Papazafeiropoulos, Symeon Chatzinotas:
Implicit Channel Learning for Machine Learning Applications in 6G Wireless Networks. CoRR abs/2206.12127 (2022) - [i8]Ahmet M. Elbir, Wei Shi, Kumar Vijay Mishra, Symeon Chatzinotas:
Federated Learning for THz Channel Estimation. CoRR abs/2207.06017 (2022) - [i7]Ahmet M. Elbir, Wei Shi, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas:
Terahertz-Band Channel and Beam Split Estimation via Array Perturbation Model. CoRR abs/2208.03683 (2022) - 2021
- [j34]Zhaoquan Gu, Keke Tang, Zhen Wang, Yanhua Li, Wei Shi, Zhihong Tian:
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications. Frontiers Neurorobotics 15 (2021) - [j33]Dongliang Xu, Wei Shi, Wensheng Zhai, Zhihong Tian:
Multi-Candidate Voting Model Based on Blockchain. IEEE CAA J. Autom. Sinica 8(12): 1891-1900 (2021) - [j32]Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian, Wei Shi, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mob. Networks Appl. 26(2): 940-948 (2021) - [j31]William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Obfuscation of images via differential privacy: From facial images to general images. Peer-to-Peer Netw. Appl. 14(3): 1705-1733 (2021) - [j30]Chaochao Luo, Zhiyuan Tan, Geyong Min, Jie Gan, Wei Shi, Zhihong Tian:
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Trans. Ind. Informatics 17(8): 5810-5818 (2021) - [j29]Xiangyu Ma, Wei Shi:
AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection. IEEE Trans. Netw. Sci. Eng. 8(2): 943-956 (2021) - [j28]Di Wu, Wei Shi, Xiangyu Ma:
A Novel Real-time Anti-spam Framework. ACM Trans. Internet Techn. 21(4): 88:1-88:27 (2021) - [c40]Nahal Iliaee, Shichao Liu, Wei Shi:
Non-Intrusive Load Monitoring based Demand Prediction for Smart Meter Attack Detection. ICCAIS 2021: 370-374 - [i6]William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Obfuscation of Images via Differential Privacy: From Facial Images to General Images. CoRR abs/2102.11072 (2021) - 2020
- [j27]Xiang Yu, Hui Lu, Xianfei Yang, Ying Chen, Haifeng Song, Jianhua Li, Wei Shi:
An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks. Int. J. Distributed Sens. Networks 16(5) (2020) - [j26]Dongliang Xu, Zhihong Tian, Rufeng Lai, Xiangtao Kong, Zhiyuan Tan, Wei Shi:
Deep learning based emotion analysis of microblog texts. Inf. Fusion 64: 1-11 (2020) - [j25]Tiantian Ji, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j24]Kangqing Yu, Wei Shi, Nicola Santoro:
Designing a Streaming Algorithm for Outlier Detection in Data Mining - An Incrementa Approach. Sensors 20(5): 1261 (2020) - [j23]William Lee Croft, Jörg-Rüdiger Sack, Wei Shi:
The Impact of Range Constraints on Utility in the Design of Differentially Private Mechanisms. Trans. Data Priv. 13(3): 171-200 (2020) - [c39]Vinay Venkataramanachary, Enrique Reveron, Wei Shi:
Storage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as Files. COMSNETS 2020: 535-538
2010 – 2019
- 2019
- [j22]Decheng Zhang, Wei Shi, Riham S. Elhabyan, Marc St-Hilaire:
A coverage and obstacle-aware clustering protocol for wireless sensor networks in 3D terrain. Comput. Commun. 146: 48-54 (2019) - [j21]Zhihong Tian, Shen Su, Wei Shi, Xiaojiang Du, Mohsen Guizani, Xiang Yu:
A data-driven method for future Internet route decision modeling. Future Gener. Comput. Syst. 95: 212-220 (2019) - [j20]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
Coverage protocols for wireless sensor networks: Review and future directions. J. Commun. Networks 21(1): 45-60 (2019) - [j19]Zhaoquan Gu, Yuexuan Wang, Wei Shi, Zhihong Tian, Kui Ren, Francis C. M. Lau:
A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 19(8): 1887 (2019) - [j18]Weihong Han, Zhihong Tian, Wei Shi, Zizhong Huang, Shudong Li:
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. Sensors 19(12): 2804 (2019) - [j17]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019) - [j16]Zhongru Wang, Yuntao Zhang, Zhihong Tian, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j15]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Informatics 15(7): 4285-4294 (2019) - [c38]William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Differentially Private Obfuscation of Facial Images. CD-MAKE 2019: 229-249 - [c37]Kun Tang, Shaowei Liao, Md. Zakirul Alam Bhuiyan, Wei Shi:
Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks. DependSys 2019: 3-17 - [c36]Wei Ou, Mingwei Deng, Entao Luo, Wei Shi, Zhiyuan Tan, Md. Zakirul Alam Bhuiyan:
Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. iThings/GreenCom/CPSCom/SmartData 2019: 687-693 - [c35]Kangqing Yu, Wei Shi, Nicola Santoro, Xiangyu Ma:
Real-time Outlier Detection Over Streaming Data. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 125-132 - [p1]Euripides Markou, Wei Shi:
Dangerous Graphs. Distributed Computing by Mobile Entities 2019: 455-515 - [i5]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions. CoRR abs/1901.00511 (2019) - [i4]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. CoRR abs/1902.04387 (2019) - [i3]William Lee Croft, Jörg-Rüdiger Sack, Wei Shi:
Differential Privacy Via a Truncated and Normalized Laplace Mechanism. CoRR abs/1911.00602 (2019) - 2018
- [j14]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks. J. Netw. Comput. Appl. 114: 57-69 (2018) - [j13]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018) - [c34]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
A Full Area Coverage Guaranteed, Energy Efficient Network Configuration Strategy for 3D Wireless Sensor Networks. CCECE 2018: 1-6 - [c33]Mengfei Peng, Wei Shi, Jean-Pierre Corriveau:
Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens. CNS 2018: 1-9 - [c32]Lingfang Zeng, Wei Shi, Fan Ni, Song Jiang, Xiaopeng Fan, Cheng-Zhong Xu, Yang Wang:
SHAstor: A Scalable HDFS-Based Storage Framework for Small-Write Efficiency in Pervasive Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1140-1145 - [c31]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
An Obstacle-Aware Clustering Protocol for Wireless Sensor Networks with Irregular Terrain. WWIC 2018: 54-66 - [c30]Riham S. Elhabyan, Wei Shi, Marc St-Hilaire:
Evolutionary-Based Coverage Control Mechanism for Clustered Wireless Sensor Networks. WWIC 2018: 67-80 - 2017
- [j12]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Comparison of approaches of geographic partitioning for data anonymization. J. Geogr. Syst. 19(3): 221-248 (2017) - [j11]Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquín García-Alfaro, Meng Yao:
Secure Localization in the Presence of Colluders in WSNs. Sensors 17(8): 1892 (2017) - [c29]Jean-Pierre Corriveau, Leo Lyu, Riham S. Elhabyan, Wei Shi:
MCSA: A multi-criteria shuffling algorithm for the MapReduce framework. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j10]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Location-based anonymization: comparison and evaluation of the Voronoi-based aggregation system. Int. J. Geogr. Inf. Sci. 30(11): 2253-2275 (2016) - [j9]Mengfei Peng, Wei Shi, Jean-Pierre Corriveau, Richard W. Pazzi, Yang Wang:
Black hole search in computer networks: State-of-the-art, challenges and future directions. J. Parallel Distributed Comput. 88: 1-15 (2016) - [j8]Yang Wang, Wei Shi, Kenneth B. Kent:
On Optimal Scheduling Algorithms for Well-Structured Workows in the Cloud with Budget and Deadline Constraints. Parallel Process. Lett. 26(2): 1650009:1-1650009:15 (2016) - [c28]Andrew Wylie, Wei Shi, Jean-Pierre Corriveau, Yang Wang:
A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud. IPDPS Workshops 2016: 1433-1442 - [c27]Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft:
Faulty Node Repair and Dynamically Spawned Black Hole Search. SecureComm 2016: 144-162 - 2015
- [j7]Yang Wang, Wei Shi:
Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints. Comput. J. 58(7): 1628-1644 (2015) - [j6]Yang Wang, Wei Shi, Menglan Hu:
Virtual Servers Co-Migration for Mobile Accesses: Online versus Off-Line. IEEE Trans. Mob. Comput. 14(12): 2576-2589 (2015) - [c26]Yang Wang, Wei Shi, Eduardo Berrocal:
On Performance Resilient Scheduling for Scientific Workflows in HPC Systems with Constrained Storage Resources. ScienceCloud@HPDC 2015: 17-24 - [c25]Wei Shi, Yang Wang, Jean-Pierre Corriveau, Boqiang Niu, William Lee Croft, Mengfei Peng:
Smart Shuffling in MapReduce: A Solution to Balance Network Traffic and Workloads. UCC 2015: 35-44 - [i2]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Geographic Partitioning Techniques for the Anonymization of Health Care Data. CoRR abs/1505.06786 (2015) - [i1]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
A Novel Geographic Partitioning System for Anonymizing Health Care Data. CoRR abs/1505.06939 (2015) - 2014
- [j5]Wei Shi, Jean-Pierre Corriveau, Jacob Agar:
Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game. Int. J. Comput. Games Technol. 2014: 138596:1-138596:18 (2014) - [j4]Wei Shi, Joaquín García-Alfaro, Jean-Pierre Corriveau:
Searching for a black hole in interconnected networks using mobile agents and tokens. J. Parallel Distributed Comput. 74(1): 1945-1958 (2014) - [j3]Yang Wang, Wei Shi:
Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds. IEEE Trans. Cloud Comput. 2(3): 306-319 (2014) - [c24]Eduardo Mesa Barrameda, Nicola Santoro, Wei Shi, Najmeh Taleb:
Sensor deployment by a robot in an unknown orthogonal region: Achieving full coverage. ICPADS 2014: 951-960 - [c23]Wei Shi, Dongsheng Wang, Zhanye Wang, Dapeng Ju:
Möbius: A high performance transactional SSD with rich primitives. MSST 2014: 1-11 - 2013
- [c22]Yang Wang, Wei Shi:
On service migration in the cloud to facilitate mobile accesses. CLUSTER 2013: 1-5 - [c21]Menglan Hu, Yang Wang, Wei Shi:
Scheduling soft aperiodic messages on FlexRay in-vehicle networks. ICON 2013: 1-6 - [c20]Dachuan Huang, Xuechen Zhang, Wei Shi, Mai Zheng, Song Jiang, Feng Qin:
LiU: Hiding Disk Access Latency for HPC Applications with a New SSD-Enabled Data Layout. MASCOTS 2013: 111-120 - [c19]Matthew Shelley, Wei Shi, Jean-Pierre Corriveau:
On Preventing Sequence Breaking in Video Games. NetGames 2013: 10:1-10:2 - [c18]Yang Wang, Wei Shi:
On Scheduling Algorithms for MapReduce Jobs in Heterogeneous Clouds with Budget Constraints. OPODIS 2013: 251-265 - [c17]Yang Wang, Wei Shi, Lingfang Zeng:
Adaptive Search-Based Service Migration with Virtual Moves in Clouds for Mobile Accesses. UCC 2013: 195-202 - 2012
- [j2]Wei Shi, Michel Barbeau, Joaquín García-Alfaro, Jean-Pierre Corriveau:
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 17(1-2): 87-102 (2012) - [c16]Wei Shi, Meng Yao, Jean-Pierre Corriveau:
Resilient Secure Localization and Detection of Colluding Attackers in WSNs. ADHOC-NOW 2012: 181-192 - [c15]Jacob Agar, Jean-Pierre Corriveau, Wei Shi:
Play patterns for path prediction in multiplayer online games. CHINACOM 2012: 12-17 - 2011
- [c14]Wei Shi, Dapeng Ju, Dongsheng Wang:
Saga: A Cost Efficient File System Based on Cloud Storage Service. GECON 2011: 173-184 - 2010
- [c13]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Scenario-Based Validation: Beyond the User Requirements Notation. Australian Software Engineering Conference 2010: 75-84 - [c12]Jean-Pierre Corriveau, Wei Shi:
Teaching strategies to millenial students. Future Play 2010: 143-150 - [c11]Wei Shi, Jean-Pierre Corriveau:
A Comprehensive Review of Sensor Relocation. GreenCom/CPSCom 2010: 780-785 - [c10]David Arnold, Jean-Pierre Corriveau, Wei Shi:
Reconciling Offshore Outsourcing with Model Based Testing. SEAFOOD 2010: 6-22 - [c9]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Modeling and Validating Requirements Using Executable Cotnracts and Scenarios. SERA 2010: 311-320 - [c8]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Validation Against Actual Behavior: Still a Challenge for Testing Tools. Software Engineering Research and Practice 2010: 212-218 - [c7]Wei Shi, Michel Barbeau, Jean-Pierre Corriveau:
Detection of the Evil ring attack in wireless sensor networks using cross verification. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [c6]Wei Shi:
Black Hole Search with Tokens in Interconnected Networks. SSS 2009: 670-682 - 2008
- [j1]Stefan Dobrev, Nicola Santoro, Wei Shi:
Using Scattered Mobile Agents to Locate a Black Hole in an un-Oriented Ring with Tokens. Int. J. Found. Comput. Sci. 19(6): 1355-1372 (2008) - 2007
- [c5]Stefan Dobrev, Nicola Santoro, Wei Shi:
Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents. Euro-Par 2007: 608-617 - [c4]Stefan Dobrev, Nicola Santoro, Wei Shi:
Scattered Black Hole Search in an Oriented Ring using Tokens. IPDPS 2007: 1-8 - 2006
- [c3]Stefan Dobrev, Rastislav Kralovic, Nicola Santoro, Wei Shi:
Black Hole Search in Asynchronous Rings Using Tokens. CIAC 2006: 139-150 - 2004
- [c2]Wei Shi, Jean-Pierre Corriveau:
An Executable Model for a Family of Election Algorithms. IPDPS 2004 - [c1]Wei Shi, Jean-Pierre Corriveau:
System family engineering for leader election in ring topology. Parallel and Distributed Computing and Networks 2004: 398-403
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint