default search action
Shin-Ming Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Shin-Ming Cheng, Yi-Ching Lui, Nien-Jen Tsai, Bing-Kai Hong:
Toward Intelligent IoT Endpoint Detection and Response Using Digital Twins via Firmware Emulation. IEEE Internet Things Mag. 7(6): 20-26 (2024) - [j38]Cheng-Feng Hung, You-Run Chen, Chi-heng Tseng, Shin-Ming Cheng:
Security Threats to xApps Access Control and E2 Interface in O-RAN. IEEE Open J. Commun. Soc. 5: 1197-1203 (2024) - [c50]Shin-Ming Cheng, Bo-Han Chang Chien, Wei-Hung Lin, Chin-Chi Fan, Chia-Yi Chen, Chen-Chien Liao:
A Highly Scalable Automated Universal Binary Malware Analysis Framework for Healthcare and Medical SaaS. ICMHI 2024: 102-107 - [i12]Felicia Lo, Shin-Ming Cheng, Rafael Kaliski:
Optimization of Lightweight Malware Detection Models For AIoT Devices. CoRR abs/2404.04567 (2024) - 2023
- [j37]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi, Daisuke Inoue:
IoT malware classification based on reinterpreted function-call graphs. Comput. Secur. 125: 103060 (2023) - [j36]Rafael Kaliski, Shin-Ming Cheng, Cheng-Feng Hung:
Supporting 6G Mission-Critical Services on O-RAN. IEEE Internet Things Mag. 6(3): 32-37 (2023) - [c49]Yung-Tai Cheng, Shin-Ming Cheng:
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI. CPSIOTSEC@CCS 2023: 1-9 - [c48]Gao-Yu Lin, Shin-Ming Cheng, Hahn-Ming Lee:
A Framework for Robustness Evaluation in AI-Based Malware Detectors. ICCE-Taiwan 2023: 287-288 - [c47]Jun-Hong Huang, Shin-Ming Cheng, Rafael Kaliski, Cheng-Feng Hung:
Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN. INFOCOM Workshops 2023: 1-6 - [c46]Felicia Lo, Shin-Ming Cheng, Rafael Kaliski:
Optimization of Lightweight Malware Detection Models for AIoT Devices. WF-IoT 2023: 1-6 - [c45]Gao-Yu Lin, Ming-Huang Lin, Bing-Kai Hong, Shin-Ming Cheng:
Hash-Based Function Call Graph Fusion Method for IoT Malware Detection. WPMC 2023: 159-164 - [c44]Chi-heng Tseng, Cheng-Feng Hung, Bing-Kai Hong, Shin-Ming Cheng:
On Manipulating Routing Table to Realize Redirect Attacks in O-RAN by Malicious xApp. WPMC 2023: 288-292 - 2022
- [j35]Bo-Rui Chen, Shin-Ming Cheng, Maina Bernard Mwangi:
A Mobility-Based Epidemic Model for IoT Malware Spread. IEEE Access 10: 107929-107941 (2022) - [j34]Chi-Han Lee, Ronald Y. Chang, Shin-Ming Cheng, Chia-Hsiang Lin, Chiu-Han Hsiao:
Joint Beamforming and Power Allocation for M2M/H2H Co-Existence in Green Dynamic TDD Networks: Low-Complexity Optimal Designs. IEEE Internet Things J. 9(6): 4799-4815 (2022) - [j33]Shin-Ming Cheng, Bing-Kai Hong, Cheng-Feng Hung:
Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT. IEEE Internet Things Mag. 5(3): 76-81 (2022) - [c43]Yu-Xiang Lin, Bing-Kai Hong, Shin-Ming Cheng:
Conformance Testing for 5G O-RAN Entities through MEC. CANDARW 2022: 330-336 - 2021
- [c42]Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi:
IoT Malware Detection Using Function-Call-Graph Embedding. PST 2021: 1-9 - 2020
- [j32]Shao-Yu Lien, Der-Jiunn Deng, Chun-Cheng Lin, Hua-Lung Tsai, Tao Chen, Chao Guo, Shin-Ming Cheng:
3GPP NR Sidelink Transmissions Toward 5G V2X. IEEE Access 8: 35368-35382 (2020) - [j31]Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. IEEE Open J. Comput. Soc. 1: 262-275 (2020) - [c41]Jan Feng, Bing-Kai Hong, Shin-Ming Cheng:
DDoS Attacks in Experimental LTE Networks. AINA Workshops 2020: 545-553 - [c40]Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
IoT-Malware Detection Based on Byte Sequences of Executable Files. AsiaJCIS 2020: 143-150 - [c39]Chi-Han Lee, Ronald Y. Chang, Chun-Tao Lin, Shin-Ming Cheng:
Beamforming and Power Allocation in Dynamic TDD Networks Supporting Machine-Type Communication. ICC 2020: 1-6 - [c38]Chi-Han Lee, Ronald Y. Chang, Shin-Ming Cheng:
Beamforming and Power Allocation in Dynamic TDD Based H2H/M2M Networks with Energy Harvesting. PIMRC 2020: 1-6 - [c37]Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue:
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. SP (Workshops) 2020: 126 - [c36]Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. TrustCom 2020: 775-784 - [i11]Hsu-Chun Hsiao, Chun-Ying Huang, Bing-Kai Hong, Shin-Ming Cheng, Hsin-Yuan Hu, Chia-Chien Wu, Jian-Sin Lee, Shih-Hong Wang, Wei Jeng:
An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds. CoRR abs/2011.04322 (2020)
2010 – 2019
- 2019
- [c35]Chun-Chen Tu, Pai-Shun Ting, Pin-Yu Chen, Sijia Liu, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Shin-Ming Cheng:
AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks. AAAI 2019: 742-749 - [c34]Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao:
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. AsiaJCIS 2019: 9-15 - [c33]Shin-Ming Cheng, Sheng-Hao Ma:
Demo: An Emulator-Based Active Protection System Against IoT Malware. IEEE Symposium on Security and Privacy Workshops 2019: 162 - [c32]Wan-Lin Heish, Bing-Kai Hong, Shin-Ming Cheng:
Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization. VTC Fall 2019: 1-6 - 2018
- [j30]Ya-Cheng Li, Shin-Ming Cheng:
Privacy Preserved Mobile Sensing Using Region-Based Group Signature. IEEE Access 6: 61556-61568 (2018) - [j29]Pin-Yu Chen, Shin-Ming Cheng, Hui-Yu Hsu:
Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models. IEEE Internet Things J. 5(4): 2333-2342 (2018) - [j28]Pin-Yu Chen, Shin-Ming Cheng, Meng-Hsuan Sung:
Analysis of Data Dissemination and Control in Social Internet of Vehicles. IEEE Internet Things J. 5(4): 2467-2477 (2018) - [j27]Shao-Chou Hung, Hsiang Hsu, Shin-Ming Cheng, Qimei Cui, Kwang-Cheng Chen:
Delay Guaranteed Network Association for Mobile Machines in Heterogeneous Cloud Radio Access Network. IEEE Trans. Mob. Comput. 17(12): 2744-2760 (2018) - [j26]Qin Wu, Jiashuo Cao, Chuang Zhou, Ji Huang, Zhuo Li, Shin-Ming Cheng, Jun Cheng, Guanghui Pan:
Intelligent Smoke Alarm System with Wireless Sensor Network Using ZigBee. Wirel. Commun. Mob. Comput. 2018 (2018) - [c31]Chi-Han Lee, Ronald Y. Chang, Chun-Tao Lin, Shin-Ming Cheng:
Energy-Efficient D2D Underlaid MIMO Cellular Networks with Energy Harvesting. GLOBECOM 2018: 1-7 - [i10]Chun-Chen Tu, Pai-Shun Ting, Pin-Yu Chen, Sijia Liu, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Shin-Ming Cheng:
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks. CoRR abs/1805.11770 (2018) - 2017
- [j25]Shin-Ming Cheng, Pin-Yu Chen, Ching-Chao Lin, Hsu-Chun Hsiao:
Traffic-Aware Patching for Cyber Security in Mobile IoT. IEEE Commun. Mag. 55(7): 29-35 (2017) - [j24]Yu-Jui Liu, Shin-Ming Cheng, Yu-Lin Hsueh:
eNB Selection for Machine Type Communications Using Reinforcement Learning Based Markov Decision Process. IEEE Trans. Veh. Technol. 66(12): 11330-11338 (2017) - [c30]Pai-Shun Ting, Chun-Chen Tu, Pin-Yu Chen, Ya-Yun Lo, Shin-Ming Cheng:
FEAST: An Automated Feature Selection Framework for Compilation Tasks. AINA 2017: 1138-1145 - [c29]Shin-Ming Cheng, Yu-Jyun Wang, Ying-Cheng Chen:
Secure location tracking of femtocells in heterogeneous cellular networks. DSC 2017: 267-272 - [c28]Jia-Jhun Lin, Kai-Ching Wang, Shin-Ming Cheng, Yen-Chun Liu:
On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition. DSC 2017: 473-474 - [c27]Bo-Ren Chen, Shin-Ming Cheng, Jia-Jhun Lin:
Energy-Efficient BLE Device Discovery for Internet of Things. CANDAR 2017: 75-79 - [c26]Jian-Wei Ciou, Shin-Ming Cheng, Yin-Hong Hsu:
Retransmission-Based Access Class Barring for Machine Type Communications. IoTaaS 2017: 145-154 - [c25]Chi-Han Lee, Ronald Y. Chang, Chun-Tao Lin, Shin-Ming Cheng:
Sum-rate maximization for energy harvesting-aided D2D communications underlaid cellular networks. PIMRC 2017: 1-6 - [c24]Chih-Chiang Liao, Shin-Ming Cheng, Menachem Domb:
On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things. VTC Spring 2017: 1-5 - [i9]Shin-Ming Cheng, Pin-Yu Chen, Ching-Chao Lin, Hsu-Chun Hsiao:
Traffic-aware Patching for Cyber Security in Mobile IoT. CoRR abs/1703.05400 (2017) - [i8]Pin-Yu Chen, Shin-Ming Cheng, Hui-Yu Hsu:
Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models. CoRR abs/1709.00526 (2017) - 2016
- [j23]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via digital epidemics: a bio-inspired transmissive attack. IEEE Commun. Mag. 54(6): 75-81 (2016) - [j22]Shao-Yu Lien, Shin-Ming Cheng, Kwang-Cheng Chen, Dong In Kim:
Resource-Optimal Licensed-Assisted Access in Heterogeneous Cloud Radio Access Networks With Heterogeneous Carrier Communications. IEEE Trans. Veh. Technol. 65(12): 9915-9930 (2016) - [c23]Han-Chao Lee, Shin-Ming Cheng, Kuo-Ping Wu, Hahn-Ming Lee:
A responsive probing approach to detect dynamic intrusion in a MANET. IISA 2016: 1-6 - [c22]Shin-Ming Cheng, Pin-Yu Chen:
Ecology-Based DoS Attack in Cognitive Radio Networks. IEEE Symposium on Security and Privacy Workshops 2016: 104-110 - [c21]Edwin Lupito Loe, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Shao-Chuan Lee, Shin-Ming Cheng:
SandUSB: An installation-free sandbox for USB peripherals. WF-IoT 2016: 621-626 - [i7]Pin-Yu Chen, Meng-Hsuan Sung, Shin-Ming Cheng:
Buffer Occupancy and Delivery Reliability Tradeoffs for Epidemic Routing. CoRR abs/1601.06345 (2016) - [i6]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack. CoRR abs/1603.00588 (2016) - [i5]Shin-Ming Cheng, Pin-Yu Chen:
Ecology-Based DoS Attack in Cognitive Radio Networks. CoRR abs/1603.01315 (2016) - [i4]Pai-Shun Ting, Chun-Chen Tu, Pin-Yu Chen, Ya-Yun Lo, Shin-Ming Cheng:
FEAST: An Automated Feature Selection Framework for Compilation Tasks. CoRR abs/1610.09543 (2016) - 2015
- [j21]Pin-Yu Chen, Shin-Ming Cheng, Pai-Shun Ting, Chia-Wei Lien, Fu-Jen Chu:
When crowdsourcing meets mobile sensing: a social network perspective. IEEE Commun. Mag. 53(10): 157-163 (2015) - [c20]Pin-Yu Chen, Chia-Wei Lien, Fu-Jen Chu, Pai-Shun Ting, Shin-Ming Cheng:
Supervised Collective Classification for Crowdsourcing. GLOBECOM Workshops 2015: 1-6 - [c19]Pin-Yu Chen, Zhengling Qi, Yanxin Pan, Shin-Ming Cheng:
Multivariate and Categorical Analysis of Gaming Statistics. NBiS 2015: 286-293 - [c18]Shin-Ming Cheng, Wei-Ru Huang, Ray-Guang Cheng, Chai-Hien Gan:
Experimental emergency communication systems using USRP and GNU radio platform. QSHINE 2015: 75-79 - [c17]Yu-Jui Liu, Shin-Ming Cheng, Po-Yao Huang:
Cognitive vertical handover in heterogeneous networks. QSHINE 2015: 392-397 - [i3]Pin-Yu Chen, Shin-Ming Cheng:
Sequential Defense Against Random and Intentional Attacks in Complex Networks. CoRR abs/1502.00065 (2015) - [i2]Pin-Yu Chen, Chia-Wei Lien, Fu-Jen Chu, Pai-Shun Ting, Shin-Ming Cheng:
Supervised Collective Classification for Crowdsourcing. CoRR abs/1507.06682 (2015) - [i1]Pin-Yu Chen, Shin-Ming Cheng, Pai-Shun Ting, Chia-Wei Lien, Fu-Jen Chu:
When Crowdsourcing Meets Mobile Sensing: A Social Network Perspective. CoRR abs/1508.00299 (2015) - 2014
- [j20]Pin-Yu Chen, Shin-Ming Cheng, Kwang-Cheng Chen:
Information Fusion to Defend Intentional Attack in Internet of Things. IEEE Internet Things J. 1(4): 337-348 (2014) - [j19]Pin-Yu Chen, Shin-Ming Cheng, Kwang-Cheng Chen:
Optimal Control of Epidemic Information Dissemination Over Networks. IEEE Trans. Cybern. 44(12): 2316-2328 (2014) - [c16]Shih-Hao Chang, Kuo-Kun Tseng, Shin-Ming Cheng:
The Sybil Attack in Participatory Sensing: Detection and Analysis. ECC (1) 2014: 287-298 - [c15]Han-Feng Lin, Shin-Ming Cheng, Po-Yao Huang:
Cognitive access in multichannel wireless networks using two-dimension Markov chain. IWCMC 2014: 169-173 - [c14]Shin-Ming Cheng, Cheng-Han Ho, Shannon Chen, Shih-Hao Chang:
Distributed anonymous authentication in heterogeneous networks. IWCMC 2014: 505-510 - [c13]Shao-Yu Lien, Shin-Ming Cheng, Yu-Yu Lin:
Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks. VITAE 2014: 1-5 - [c12]Pin-Yu Chen, Han-Feng Lin, Ko-Hsuan Hsu, Shin-Ming Cheng:
Modeling Dynamics of Malware with Incubation Period from the View of Individual. VTC Spring 2014: 1-5 - [e1]Shin-Ming Cheng, Min-Yuh Day:
Technologies and Applications of Artificial Intelligence, 19th International Conference, TAAI 2014, Taipei, Taiwan, November 21-23, 2014. Proceedings. Lecture Notes in Computer Science 8916, Springer 2014, ISBN 978-3-319-13986-9 [contents] - 2013
- [j18]David Liau, Kwang-Cheng Chen, Shin-Ming Cheng:
A Predator-Prey Model for Dynamics of Cognitive Radios. IEEE Commun. Lett. 17(3): 467-470 (2013) - [j17]Shao-Yu Lien, Shin-Ming Cheng, Kwang-Cheng Chen:
Interference Mitigation in CR-Enabled Heterogeneous Networks. IEICE Trans. Commun. 96-B(6): 1230-1242 (2013) - [c11]Shih-Hao Chang, Yeong-Sheng Chen, Shin-Ming Cheng:
Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System. ISWPC 2013: 1-6 - [c10]Shao-Yu Lien, Shin-Ming Cheng:
Resource-optimal network resilience for real-time data exchanges in Cyber-Physical Systems. PIMRC 2013: 1603-1608 - [c9]Weng-Chon Ao, Shin-Ming Cheng:
A lower bound on multi-hop transmission delay in cognitive radio ad hoc networks. PIMRC 2013: 3323-3327 - [c8]Nien-Tsu Chou, Shih-Hao Lin, Shin-Ming Cheng, Shih-Hao Chang:
Performance Evaluation of Self-Configured Two-Tier Heterogeneous Cellular Networks. SMC 2013: 2968-2972 - [c7]Shao-Yu Lien, Shin-Ming Cheng:
Performance guaranteed statistical traffic control in cognitive cellular networks. WPMC 2013: 1-5 - 2012
- [j16]Pin-Yu Chen, Shin-Ming Cheng, Kwang-Cheng Chen:
Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8): 24-29 (2012) - [j15]Weng-Chon Ao, Shin-Ming Cheng, Kwang-Cheng Chen:
Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks. IEEE J. Sel. Areas Commun. 30(2): 263-270 (2012) - [j14]Shao-Yu Lien, Shin-Ming Cheng, Sung-Yin Shih, Kwang-Cheng Chen:
Radio Resource Management for QoS Guarantees in Cyber-Physical Systems. IEEE Trans. Parallel Distributed Syst. 23(9): 1752-1761 (2012) - [j13]Shin-Ming Cheng, Weng-Chon Ao, Fan-Min Tseng, Kwang-Cheng Chen:
Design and Analysis of Downlink Spectrum Sharing in Two-Tier Cognitive Femto Networks. IEEE Trans. Veh. Technol. 61(5): 2194-2207 (2012) - 2011
- [j12]Shin-Ming Cheng, Weng-Chon Ao, Pin-Yu Chen, Kwang-Cheng Chen:
On Modeling Malware Propagation in Generalized Social Networks. IEEE Commun. Lett. 15(1): 25-27 (2011) - [j11]Shin-Ming Cheng, Pin-Yu Chen, Kwang-Cheng Chen:
Ecology of Cognitive Radio Ad Hoc Networks. IEEE Commun. Lett. 15(7): 764-766 (2011) - [j10]Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen:
Efficiency of a Cognitive Radio Link with Opportunistic Interference Mitigation. IEEE Trans. Wirel. Commun. 10(6): 1715-1720 (2011) - [j9]Shin-Ming Cheng, Shou-Yu Lien, Feng Seng Chu, Kwang-Cheng Chen:
On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks. IEEE Wirel. Commun. 18(3): 40-47 (2011) - 2010
- [j8]Chung-Kai Yu, Kwang-Cheng Chen, Shin-Ming Cheng:
Cognitive Radio Network Tomography. IEEE Trans. Veh. Technol. 59(4): 1980-1997 (2010) - [c6]Weng-Chon Ao, Shin-Ming Cheng, Kwang-Cheng Chen:
Phase Transition Diagram for Underlay Heterogeneous Cognitive Radio Networks. GLOBECOM 2010: 1-6 - [c5]Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen:
Downlink capacity of two-tier cognitive femto networks. PIMRC 2010: 1303-1308 - [c4]Hung-Bin Chang, Shin-Ming Cheng, Shao-Yu Lien, Kwang-Cheng Chen:
Statistical delay control of opportunistic links in cognitive radio networks. PIMRC 2010: 2250-2254
2000 – 2009
- 2009
- [j7]Yen-Cheng Lai, Phone Lin, Shin-Ming Cheng:
Performance Modeling for Application-Level Integration of Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 58(5): 2426-2434 (2009) - [j6]Phone Lin, Shin-Ming Cheng, Wanjiun Liao:
Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services. IEEE Trans. Veh. Technol. 58(7): 3596-3608 (2009) - 2008
- [j5]Mohsen Guizani, Phone Lin, Shin-Ming Cheng, Di-Wei Huang, Huai-Lei Fu:
Performance Evaluation for Minislot Allocation for Wireless Mesh Networks. IEEE Trans. Veh. Technol. 57(6): 3732-3745 (2008) - [j4]Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Cheng Chen:
Key Management for UMTS MBMS. IEEE Trans. Wirel. Commun. 7(9): 3619-3628 (2008) - [j3]Phone Lin, Huan-Ming Chang, Yuguang Fang, Shin-Ming Cheng:
HISNs: Distributed gateways for application-level integration of heterogeneous wireless networks. Wirel. Networks 14(1): 71-85 (2008) - [c3]Shin-Ming Cheng, Kwang-Cheng Chen, Phone Lin:
Performance modeling on handover latency in Mobile IP Regional Registration. PIMRC 2008: 1-5 - 2007
- [c2]Shin-Ming Cheng, Wei-Ru Lai, Phone Lin:
A Hash Function Scheme for Key Management in UMTS MBMS. GLOBECOM 2007: 5148-5152 - 2006
- [j2]Ray-Guang Cheng, Shin-Ming Cheng, Phone Lin:
Power-efficient routing mechanism for ODMA systems. IEEE Trans. Veh. Technol. 55(4): 1311-1319 (2006) - [c1]Shin-Ming Cheng, Phone Lin, Di-Wei Huang, Shun-Ren Yang:
A study on distributed/centralized scheduling for wireless mesh network. IWCMC 2006: 599-604 - 2005
- [j1]Shin-Ming Cheng, Phone Lin, Guan-Hua Tu, Li-Chen Fu, Ching-Feng Liang:
An intelligent GGSN dispatching mechanism for UMTS. Comput. Commun. 28(8): 947-955 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint