Operator controlled device-to-device communications in LTE-advanced networks L Lei, Z Zhong, C Lin, X Shen IEEE Wireless Communications 19 (3), 96-104, 2012 | 850 | 2012 |
Inside the new coolstreaming: Principles, measurements and performance implications B Li, S Xie, Y Qu, GY Keung, C Lin, J Liu, X Zhang IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1031-1039, 2008 | 398 | 2008 |
Design and deployment of a hybrid CDN-P2P system for live video streaming: experiences with LiveSky H Yin, X Liu, T Zhan, V Sekar, F Qiu, C Lin, H Zhang, B Li Proceedings of the 17th ACM international conference on Multimedia, 25-34, 2009 | 394 | 2009 |
EBRP: energy-balanced routing protocol for data gathering in wireless sensor networks F Ren, J Zhang, T He, C Lin, SKD Ren IEEE transactions on parallel and distributed systems 22 (12), 2108-2125, 2011 | 331 | 2011 |
Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks B Li, C Lin, ST Chanson wireless networks 4, 279-290, 1998 | 195 | 1998 |
Stochastic high-level Petri nets and applications C Lin, DC Marinescu High-level Petri Nets: Theory and Application, 459-469, 1991 | 182 | 1991 |
Traffic-aware dynamic routing to alleviate congestion in wireless sensor networks F Ren, T He, SK Das, C Lin IEEE Transactions on Parallel and Distributed Systems 22 (9), 1585-1599, 2011 | 180 | 2011 |
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks Y Jiang, C Lin, X Shen, M Shi IEEE Transactions on wireless communications 5 (9), 2569-2577, 2006 | 152 | 2006 |
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction X Kong, C Lin, Y Jiang, W Yan, X Chu Journal of network and Computer Applications 34 (4), 1068-1077, 2011 | 147 | 2011 |
Evaluation of user behavior trust in cloud computing L Tian, C Lin, Y Ni 2010 international conference on computer application and system modeling …, 2010 | 146 | 2010 |
BAT: A robust signature scheme for vehicular networks using binary authentication tree Y Jiang, M Shi, X Shen, C Lin IEEE Transactions on Wireless Communications 8 (4), 1974-1983, 2008 | 143 | 2008 |
Stochastic performance analysis of a wireless finite-state Markov channel K Zheng, F Liu, L Lei, C Lin, Y Jiang IEEE transactions on wireless communications 12 (2), 782-793, 2013 | 140 | 2013 |
Catch the whole lot in an action: Rapid precise packet loss notification in data center P Cheng, F Ren, R Shu, C Lin 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 129 | 2014 |
Cost-efficient resource provisioning for dynamic requests in cloud assisted mobile edge computing X Ma, S Wang, S Zhang, P Yang, C Lin, X Shen IEEE Transactions on Cloud Computing 9 (3), 968-980, 2019 | 125 | 2019 |
An LSTM-based method with attention mechanism for travel time prediction X Ran, Z Shan, Y Fang, C Lin Sensors 19 (4), 861, 2019 | 122 | 2019 |
P-coding: secure network coding against eavesdropping attacks P Zhang, Y Jiang, C Lin, Y Fan, X Shen 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 119 | 2010 |
An analytical model for evaluating IEEE 802.15. 4 CSMA/CA protocol in low-rate wireless application Z Chen, C Lin, H Wen, H Yin 21st International Conference on Advanced Information Networking and …, 2007 | 119 | 2007 |
Scalability of control planes for software defined networks: Modeling and evaluation J Hu, C Lin, X Li, J Huang 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 147-152, 2014 | 116 | 2014 |
On denial of service attacks in software defined networks P Zhang, H Wang, C Hu, C Lin IEEE Network 30 (6), 28-33, 2016 | 114 | 2016 |
An energy internet and energy routers J Cao, K Meng, J Wang, M Yang, Z Chen, W Li, C Lin Scientia Sinica Informationis 44 (6), 714-727, 2014 | 113 | 2014 |