Search

Your search keyword '"Chien-Chung Shen"' showing total 120 results

Search Constraints

Start Over You searched for: Author "Chien-Chung Shen" Remove constraint Author: "Chien-Chung Shen" Topic business Remove constraint Topic: business
120 results on '"Chien-Chung Shen"'

Search Results

1. TDD Massive MISO Piloting Strategy With User Information: A Reinforcement Learning Approach

2. Extending Proportional Fair Scheduling to Buffer-Aided Relay Access Networks

3. Work-in-Progress-Design and Evaluation of Mixed Reality Programs for Cybersecurity Education

4. Data User-Based Attribute Based Encryption

5. Attribute-based Multi-Signature and Encryption for EHR Management: A Blockchain-based Solution

6. Coexistence of Wi-Fi and LAA Networks With Adaptive Energy Detection

7. Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture

8. Multi-Authority Attribute-Based Access Control with Smart Contract

9. Congestion-Aware MAC Layer Adaptation to Improve Video Telephony over Wi-Fi

10. Range-Free Mobile Actor Relocation in a Two-Tiered Wireless Sensor and Actor Network

11. Traffic Differentiation in Dense WLANs with CSMA/ECA-DR MAC Protocol

12. An Incentivized Cooperative Architecture for Dynamic Spectrum Access Networks

13. Fuzzy sets based team decision-making for Cyber Situation Awareness

14. Location-enhanced authenticated key exchange

15. Evaluating TCP-friendliness in light of Concurrent Multipath Transfer

16. Performance Analysis of a Control-Free Dynamic Spectrum Access Scheme

17. A lightweight, self-adaptive lock gate designation scheme for data collection in long-thin wireless sensor networks

18. Networking with cooperative communications: Holistic design and realistic evaluation

19. Guest Editorial: Cross-Layer Design for Future Generation Wireless Networks

20. A Path-Centric Channel Assignment Framework for Cognitive Radio Wireless Networks

21. Ant-based distributed constrained steiner tree algorithm for jointly conserving energy and bounding delay in ad hoc multicast routing

22. Querying time indexed information in mobile Ad hoc networks

23. Protocol-independent multicast packet delivery improvement service for mobile Ad hoc networks

24. Interference cancellation in in-band full-duplex underwater acoustic systems

25. Software-defined Radio Based Measurement Platform for Wireless Networks

26. Secure Zones: An Attribute-Based Encryption advisory system for safe firearms

27. Congestion-aware MAC layer adaptation to improve video teleconferencing over wi-fi

28. User-aware DASH over Wi-Fi

29. Evaluation of an entropy-based k-anonymity model for location based services

30. Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons

31. Cognitive Task Analysis Based Training for Cyber Situation Awareness

32. ANSI: A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks

33. Multibeam antenna-based topology control with directional power intensity for ad hoc networks

34. Directional broadcast for mobile ad hoc networks with percolation theory

35. MobiCacher: Mobility-aware content caching in small-cell networks

36. Ant-Based Distributed Topology Control Algorithms for Mobile Ad hoc Networks

37. Ad Hoc Multicast Routing Algorithm with Swarm Intelligence

38. A flexible routing architecture for ad hoc space networks

39. CLTC: a cluster-based topology control framework for ad hoc networks

40. Power efficient peer-to-peer streaming to co-located mobile users

41. Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption

42. Sensor information networking architecture and applications

43. Discrete-event simulation on the Internet and the Web

44. Improved Unicast Capacity Bounds for General Multi-Channel Multi-Radio Wireless Networks

45. Connection management for multiwavelength optical networking

46. Power Efficient User Pairing for Multicasting in Heterogeneous Wireless Networks

47. Tracking Time-Dependent Scalar Fields with Swarms of Mobile Sensors

48. Modeling and Analyzing Large Swarms with Covert Leaders

49. Network management research in ATDNet

50. The Role of Memory in Stabilizing Swarms

Catalog

Books, media, physical & digital resources