107 results on '"Yibei Ling"'
Search Results
2. Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing.
3. On quantification of anchor placement.
4. Fast and compact per-flow traffic measurement through randomized counter sharing.
5. Fair End-to-End Bandwidth Distribution in Wireless Sensor Networks.
6. Identifying the missing tags in a large RFID system.
7. Non-interactive malicious behavior detection in vehicular networks.
8. Energy Saving via Power-Aware Buffering in Wireless Sensor Networks.
9. Cognitive Adaptive Radio Teams.
10. Stochastic analysis of distributed deadlock scheduling.
11. Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments.
12. Resilient Capacity-Aware Multicast Based on Overlay Networks.
13. An Extended Variational Calculus Approach to Optimal Checkpoint Placement.
14. Application-layer throughput control for mobile users in heterogeneous networks.
15. A Sampling-Based Estimator for Top-k Query.
16. Broadcast on Clusters of SMPs with Optimal Concurrency.
17. Efficient Protocols for Identifying the Missing Tags in a Large RFID System.
18. Per-Flow Traffic Measurement Through Randomized Counter Sharing.
19. Analysis of power-aware buffering schemes in wireless sensor networks.
20. State aggregation of large network domains.
21. Preserving HTTP Sessions in Vehicular Environments.
22. AID: A global anti-DoS service.
23. Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks.
24. On Optimal Deadlock Detection Scheduling.
25. An Evaluation of Sampling-Based Size Estimation Methods for Selections in Database Systems.
26. Measuring cache freshness by additive age.
27. On the Performance Regularity of Web Servers.
28. An Instant and Accurate Estimation Method for Joins and Selection in a Retrieval-Intensive Environment.
29. A Variational Calculus Approach to Optimal Checkpoint Placement.
30. Analysis of Optimal Thread Pool Size.
31. A Hybrid Estimator for Selectivity Estimation.
32. Supporting Inheriance Using Subclass Assertions.
33. Non-Interactive Detection of Malicious Vehicular Network Data.
34. Analysis of Power-aware Buffering Schemes in Wireless Sensor Networks
35. Entropic analysis of biological growth models.
36. An Optimal Trade-off between Content Freshness and Refresh Cost
37. On Optimal Deadlock Detection Scheduling
38. Preserving HTTP Sessions in Vehicular Environments
39. A Suppletment to Sampling-Based Methods for Query Size Estimation in a Database System.
40. On optimal deadlock detection scheduling
41. Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing
42. Per-Flow Traffic Measurement Through Randomized Counter Sharing
43. Capacity-aware multicast algorithms on heterogeneous overlay networks
44. On the Performance Regularity of Web Servers
45. Non-Interactive Detection of Malicious Vehicular Network Data
46. On Quantification of Anchor Placement
47. Analysis of Power-aware Buffering Schemes in Wireless Sensor Networks
48. Non-interactive malicious behavior detection in vehicular networks
49. Preserving HTTP Sessions in Vehicular Environments
50. An Optimal Trade-off between Content Freshness and Refresh Cost
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.