Follow
Helix IPTV
Helix IPTV
Helix IPTV (helixiptv.info) is an excellent IPTV service provider with over 6500+ Live TV channels
No verified email - Homepage
Title
Cited by
Cited by
Year
Operator controlled device-to-device communications in LTE-advanced networks
L Lei, Z Zhong, C Lin, X Shen
IEEE Wireless Communications 19 (3), 96-104, 2012
8502012
Inside the new coolstreaming: Principles, measurements and performance implications
B Li, S Xie, Y Qu, GY Keung, C Lin, J Liu, X Zhang
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1031-1039, 2008
3982008
Design and deployment of a hybrid CDN-P2P system for live video streaming: experiences with LiveSky
H Yin, X Liu, T Zhan, V Sekar, F Qiu, C Lin, H Zhang, B Li
Proceedings of the 17th ACM international conference on Multimedia, 25-34, 2009
3942009
EBRP: energy-balanced routing protocol for data gathering in wireless sensor networks
F Ren, J Zhang, T He, C Lin, SKD Ren
IEEE transactions on parallel and distributed systems 22 (12), 2108-2125, 2011
3312011
Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks
B Li, C Lin, ST Chanson
wireless networks 4, 279-290, 1998
1951998
Stochastic high-level Petri nets and applications
C Lin, DC Marinescu
High-level Petri Nets: Theory and Application, 459-469, 1991
1821991
Traffic-aware dynamic routing to alleviate congestion in wireless sensor networks
F Ren, T He, SK Das, C Lin
IEEE Transactions on Parallel and Distributed Systems 22 (9), 1585-1599, 2011
1802011
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
Y Jiang, C Lin, X Shen, M Shi
IEEE Transactions on wireless communications 5 (9), 2569-2577, 2006
1522006
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction
X Kong, C Lin, Y Jiang, W Yan, X Chu
Journal of network and Computer Applications 34 (4), 1068-1077, 2011
1472011
Evaluation of user behavior trust in cloud computing
L Tian, C Lin, Y Ni
2010 international conference on computer application and system modeling …, 2010
1462010
BAT: A robust signature scheme for vehicular networks using binary authentication tree
Y Jiang, M Shi, X Shen, C Lin
IEEE Transactions on Wireless Communications 8 (4), 1974-1983, 2008
1432008
Stochastic performance analysis of a wireless finite-state Markov channel
K Zheng, F Liu, L Lei, C Lin, Y Jiang
IEEE transactions on wireless communications 12 (2), 782-793, 2013
1402013
Catch the whole lot in an action: Rapid precise packet loss notification in data center
P Cheng, F Ren, R Shu, C Lin
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
1292014
Cost-efficient resource provisioning for dynamic requests in cloud assisted mobile edge computing
X Ma, S Wang, S Zhang, P Yang, C Lin, X Shen
IEEE Transactions on Cloud Computing 9 (3), 968-980, 2019
1252019
An LSTM-based method with attention mechanism for travel time prediction
X Ran, Z Shan, Y Fang, C Lin
Sensors 19 (4), 861, 2019
1222019
P-coding: secure network coding against eavesdropping attacks
P Zhang, Y Jiang, C Lin, Y Fan, X Shen
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1192010
An analytical model for evaluating IEEE 802.15. 4 CSMA/CA protocol in low-rate wireless application
Z Chen, C Lin, H Wen, H Yin
21st International Conference on Advanced Information Networking and …, 2007
1192007
Scalability of control planes for software defined networks: Modeling and evaluation
J Hu, C Lin, X Li, J Huang
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 147-152, 2014
1162014
On denial of service attacks in software defined networks
P Zhang, H Wang, C Hu, C Lin
IEEE Network 30 (6), 28-33, 2016
1142016
An energy internet and energy routers
J Cao, K Meng, J Wang, M Yang, Z Chen, W Li, C Lin
Scientia Sinica Informationis 44 (6), 714-727, 2014
1132014
The system can't perform the operation now. Try again later.
Articles 1–20