On calculating connected dominating set for efficient routing in ad hoc wireless networks J Wu, H Li Proceedings of the 3rd international workshop on Discrete algorithms and …, 1999 | 1550 | 1999 |
EECS: an energy efficient clustering scheme in wireless sensor networks M Ye, C Li, G Chen, J Wu PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005 | 1507 | 2005 |
An energy-efficient unequal clustering mechanism for wireless sensor networks C Li, M Ye, G Chen, J Wu IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005 | 988 | 2005 |
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 894 | 2010 |
A survey of attacks and countermeasures in mobile ad hoc networks B Wu, J Chen, J Wu, M Cardei Wireless network security, 103-135, 2007 | 884 | 2007 |
Energy-efficient coverage problems in wireless ad-hoc sensor networks M Cardei, J Wu Computer communications 29 (4), 413-420, 2006 | 859 | 2006 |
An extended localized algorithm for connected dominating set formation in ad hoc wireless networks F Dai, J Wu IEEE transactions on parallel and distributed systems 15 (10), 908-920, 2004 | 717 | 2004 |
An unequal cluster-based routing protocol in wireless sensor networks G Chen, C Li, M Ye, J Wu Wireless Networks 15, 193-207, 2009 | 660 | 2009 |
On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks J Wu, F Dai, M Gao, I Stojmenovic Journal of communications and networks 4 (1), 59-70, 2002 | 632 | 2002 |
On reducing broadcast redundancy in ad hoc wireless networks W Lou, J Wu 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 572 | 2003 |
A survey on intrusion detection in mobile ad hoc networks T Anantvalee, J Wu Wireless network security, 159-180, 2007 | 433 | 2007 |
Broadcasting in ad hoc networks based on self-pruning J Wu, F Dai International Journal of Foundations of Computer Science 14 (02), 201-221, 2003 | 407 | 2003 |
A dominating-set-based routing scheme in ad hoc wireless networks J Wu, H Li Telecommunication Systems 18, 13-36, 2001 | 379 | 2001 |
Robust network traffic classification J Zhang, X Chen, Y Xiang, W Zhou, J Wu IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014 | 364 | 2014 |
Maximum network lifetime in wireless sensor networks with adjustable sensing ranges M Cardei, J Wu, M Lu, MO Pervaiz WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005 | 351 | 2005 |
Secure and efficient key management in mobile ad hoc networks B Wu, J Wu, EB Fernandez, S Magliveras 19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005 | 337 | 2005 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 309 | 2011 |
Extended dominating-set-based routing in ad hoc wireless networks with unidirectional links J Wu IEEE transactions on parallel and distributed systems 13 (9), 866-881, 2002 | 305 | 2002 |
一种基于非均匀分簇的无线传感器网络路由协议 李成法, 陈贵海, 叶懋, 吴杰 计算机学报 30 (001), 27-36, 2007 | 300 | 2007 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 299 | 2014 |