Följ
Weijia Jia
Weijia Jia
FIEEE, Chair Professor, Beijing Normal University and UIC
Verifierad e-postadress på uic.edu.cn - Startsida
Titel
Citeras av
Citeras av
År
Vertex cover: further observations and further improvements
J Chen, IA Kanj, W Jia
Journal of Algorithms 41 (2), 280-301, 2001
5702001
Novel p–n heterojunction photocatalyst constructed by porous graphite-like C 3 N 4 and nanostructured BiOI: facile synthesis and enhanced photocatalytic activity
D Jiang, L Chen, J Zhu, M Chen, W Shi, J Xie
Dalton Transactions 42 (44), 15726-15734, 2013
410*2013
Rendezvous design algorithms for wireless sensor networks with a mobile base station
G Xing, T Wang, W Jia, M Li
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
3972008
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
2982011
Influence analysis in social networks: A survey
S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia
Journal of Network and Computer Applications 106, 17-32, 2018
2962018
Rendezvous planning in wireless sensor networks with mobile elements
G Xing, T Wang, Z Xie, W Jia
IEEE Transactions on Mobile Computing 7 (12), 1430-1443, 2008
2762008
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2662010
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
B Han, W Jia, L Lin
Computer Communications 30 (4), 782-792, 2007
2142007
Migration modeling and learning algorithms for containers in fog computing
Z Tang, X Zhou, F Zhang, W Jia, W Zhao
IEEE Transactions on Services Computing 12 (5), 712-725, 2018
2102018
Complete optimal deployment patterns for full-coverage and k-connectivity (k≤ 6) wireless sensor networks
X Bai, D Xuan, Z Yun, TH Lai, W Jia
Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008
2022008
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1862014
MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things
T Wang, H Luo, W Jia, A Liu, M Xie
IEEE Transactions on Industrial Informatics 16 (3), 2054-2062, 2019
1842019
Optimal Deployment Patterns for Full Coverage and-ConnectivityWireless Sensor Networks
Z Yun, X Bai, D Xuan, TH Lai, W Jia
IEEE/ACM transactions on networking 18 (3), 934-947, 2010
1812010
Fog-based computing and storage offloading for data synchronization in IoT
T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia
IEEE Internet of Things Journal 6 (3), 4272-4282, 2018
1752018
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
1602014
A novel trust mechanism based on fog computing in sensor–cloud system
T Wang, G Zhang, MZA Bhuiyan, A Liu, W Jia, M Xie
Future Generation Computer Systems 109, 573-582, 2020
1592020
Deploying four-connectivity and full-coverage wireless sensor networks
X Bai, Z Yun, D Xuan, T Lai, W Jia
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 296-300, 2008
1582008
A routing protocol for anycast messages
D Xuan, W Jia, W Zhao, H Zhu
IEEE Transactions on Parallel and Distributed Systems 11 (6), 571-588, 2000
1582000
VC-MAC: A cooperative MAC protocol in vehicular networks
J Zhang, Q Zhang, W Jia
IEEE Transactions on Vehicular Technology 58 (3), 1561-1571, 2008
1562008
Adaptive location updates for mobile sinks in wireless sensor networks
G Wang, T Wang, W Jia, M Guo, J Li
The Journal of Supercomputing 47, 127-145, 2009
1402009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20