关注
Shensheng Tang
Shensheng Tang
Professor of Engineering, Bethel University
在 bethel.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Modeling and analysis of opportunistic spectrum sharing with unreliable spectrum sensing
S Tang, BL Mark
IEEE Transactions on Wireless Communications 8 (4), 1934-1943, 2009
1512009
Scalable fog computing with service offloading in bus networks
D Ye, M Wu, S Tang, R Yu
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016
972016
Analysis of virus spread in wireless sensor networks: An epidemic model
S Tang, BL Mark
2009 7th international workshop on design of reliable communication networks …, 2009
872009
QoS supporting and optimal energy allocation for a cluster based wireless sensor network
S Tang, W Li
Computer Communications 29 (13-14), 2569-2577, 2006
842006
Analysis of opportunistic spectrum sharing with Markovian arrivals and phase-type service
S Tang, BL Mark
IEEE Transactions on Wireless Communications 8 (6), 3142-3150, 2009
542009
Performance analysis of a wireless network with opportunistic spectrum sharing
S Tang, BL Mark
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 4636-4640, 2007
542007
A modified SI epidemic model for combating virus spread in wireless sensor networks
S Tang
International Journal of Wireless Information Networks 18, 319-326, 2011
532011
An adaptive bandwidth allocation scheme with preemptive priority for integrated voice/data mobile networks
S Tang, W Li
IEEE Transactions on Wireless Communications 5 (10), 2874-2886, 2006
492006
An analytical traffic flow model for cluster-based wireless sensor networks
S Tang
2006 1st International Symposium on Wireless Pervasive Computing (ISWPC’06), 1-5, 2006
422006
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration
Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2013
382013
An epidemic model with adaptive virus spread control for wireless sensor networks
S Tang, W Li
International Journal of Security and Networks 6 (4), 201-210, 2011
372011
Resisting web proxy-based http attacks by temporal and spatial locality behavior
Y Xie, S Tang, Y Xiang, J Hu
IEEE transactions on parallel and distributed systems 24 (7), 1401-1410, 2013
362013
Modified SIS epidemic model for analysis of virus spread in wireless sensor networks
S Tang, D Myers, J Yuan
International Journal of Wireless and Mobile Computing 6 (2), 99-108, 2013
362013
Reliability modeling of power transformers with maintenance outage
S Tang, C Hale, H Thaker
Systems Science & Control Engineering: An Open Access Journal 2 (1), 316-324, 2014
302014
Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection
C Tang, P Liu, S Tang, Y Xie
Journal of Computer Research and Development 52 (3), 718-728, 2015
292015
An analytical performance model of opportunistic spectrum access in a military environment
S Tang, BL Mark
2008 IEEE Wireless Communications and Networking Conference, 2681-2686, 2008
292008
Performance analysis of the 3G network with complementary WLANs
S Tang, W Li
GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 5, 2637-2641, 2005
282005
Detecting latent attack behavior from aggregated Web traffic
Y Xie, S Tang, X Huang, C Tang, X Liu
Computer Communications 36 (8), 895-907, 2013
252013
Online anomaly detection based on web usage mining
Y Xie, S Tang
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
232012
A channel allocation model with preemptive priority for integrated voice/data mobile networks
S Tang, W Li
First International Conference on Quality of Service in Heterogeneous Wired …, 2004
232004
系统目前无法执行此操作,请稍后再试。
文章 1–20