skip to main content
Skip header Section
Introduction to Probability Models, Ninth EditionNovember 2006
Publisher:
  • Academic Press, Inc.
  • 6277 Sea Harbor Drive Orlando, FL
  • United States
ISBN:978-0-12-598062-3
Published:01 November 2006
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Bai T, Wang X, Zhang Z, Song W, Wu B and Nie J (2024). GPR-OPT, Information Processing and Management: an International Journal, 61:1, Online publication date: 1-Jan-2024.
  2. Selim M and Tomasin S (2024). Performance analysis of RIS-assisted downlink NOMA wireless systems under D2D interference, Digital Signal Processing, 144:C, Online publication date: 1-Jan-2024.
  3. Rath S and Chow J (2024). A deep real options policy for sequential service region design and timing, Computers and Operations Research, 161:C, Online publication date: 1-Jan-2024.
  4. Reid T, Ipsen I, Cockayne J and Oates C (2023). Statistical properties of BayesCG under the Krylov prior, Numerische Mathematik, 155:3-4, (239-288), Online publication date: 1-Dec-2023.
  5. Fianu S and Davis L (2023). Heuristic algorithm for nested Markov decision process, Computers and Operations Research, 159:C, Online publication date: 1-Nov-2023.
  6. ACM
    He Y, Liu J, Li M, Yu G, Han J and Ren K SenCom: Integrated Sensing and Communication with Practical WiFi Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, (1-16)
  7. Zhu J, Huang N, Wang J and Qin X (2023). Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows, IEEE Transactions on Network and Service Management, 20:3, (2975-2989), Online publication date: 1-Sep-2023.
  8. Duong T, Hyun S and Kwon S (2023). Channel modeling and achievable data rate for 1-D molecular communication in bounded environments, Computer Networks: The International Journal of Computer and Telecommunications Networking, 232:C, Online publication date: 1-Aug-2023.
  9. Hassan M, Rehmani M, Du J and Chen J (2023). Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid1

    A preliminary version has been published by 2020 IEEE International Conference on Communications (ICC 2020), June, 2020, Dublin, Ireland entitled Differentially Private Dynamic Pricing for Efficient Demand Response in Smart Grid.

    , IEEE Transactions on Knowledge and Data Engineering, 35:6, (5724-5737), Online publication date: 1-Jun-2023.
  10. Tahir A, Alt B, Rizk A and Koeppl H (2023). Load Balancing in Compute Clusters With Delayed Feedback, IEEE Transactions on Computers, 72:6, (1610-1622), Online publication date: 1-Jun-2023.
  11. Chen C, Brinton C and Aggarwal V (2023). Latency Minimization for Mobile Edge Computing Networks, IEEE Transactions on Mobile Computing, 22:4, (2233-2247), Online publication date: 1-Apr-2023.
  12. Li Q, Chang Y and Zhang C (2023). Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum With Multiple Mining Pools, IEEE Transactions on Network and Service Management, 20:1, (182-200), Online publication date: 1-Mar-2023.
  13. Zhou H and Li Y (2023). Optimal replacement in a proportional hazards model with cumulative and dependent risks, Computers and Industrial Engineering, 176:C, Online publication date: 1-Feb-2023.
  14. Tian X, Miao P, Zhang L and Sharma V (2023). Deep Reinforcement Learning for Scheduling and Offloading in UAV-Assisted Mobile Edge Networks, Wireless Communications & Mobile Computing, 2023, Online publication date: 1-Jan-2023.
  15. Musaev A, Makshanov A, Grigoriev D and Eisencraft M (2023). The Genesis of Uncertainty, Complexity, 2023, Online publication date: 1-Jan-2023.
  16. Ta A, Tarakci H, Kulkarni S, Prybutok V and Pavur R (2023). The effects of cyber threats on maintenance outsourcing and age replacement policy, Computers in Industry, 144:C, Online publication date: 1-Jan-2023.
  17. Alvarenga C, Basilico N and Carpin S Time-Varying Graph Patrolling Against Attackers with Locally Limited and Imperfect Observation Models 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (4869-4876)
  18. ACM
    Shin J, Arroyo D, Tantawi A, Wang C, Youssef A and Nagi R Cloud-native workflow scheduling using a hybrid priority rule and dynamic task parallelism Proceedings of the 13th Symposium on Cloud Computing, (72-77)
  19. Chai H, Leng S, Wu F and He J (2022). Secure and Efficient Blockchain-Based Knowledge Sharing for Intelligent Connected Vehicles, IEEE Transactions on Intelligent Transportation Systems, 23:9, (14620-14631), Online publication date: 1-Sep-2022.
  20. ACM
    Wang J, Zhu W, Song G and Wang L Streaming Graph Neural Networks with Generative Replay Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (1878-1888)
  21. Kim J, Kim T, Hashemi M, Love D and Brinton C (2021). Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks, IEEE/ACM Transactions on Networking, 30:4, (1454-1468), Online publication date: 1-Aug-2022.
  22. Andersen A and Plesner A (2022). Optimization of the organizational structure in hospitals to account for patients with multiple diseases, Artificial Intelligence in Medicine, 130:C, Online publication date: 1-Aug-2022.
  23. Pirmagomedov R, Moltchanov D, Samuylov A, Orsino A, Torsner J, Andreev S and Koucheryavy Y (2022). Characterizing throughput and convergence time in dynamic multi-connectivity 5G deployments, Computer Communications, 187:C, (45-58), Online publication date: 1-Apr-2022.
  24. Kong S and Bresch-Pietri D (2022). Prediction-based controller for linear systems with stochastic input delay, Automatica (Journal of IFAC), 138:C, Online publication date: 1-Apr-2022.
  25. Yun L, Ma S, Li L and Liu Y (2022). CPS-enabled and knowledge-aided demand response strategy for sustainable manufacturing, Advanced Engineering Informatics, 52:C, Online publication date: 1-Apr-2022.
  26. Fida A, Iftikhar A, Azfar Yaqub M and Kim D (2022). Coordinated throughput optimization for mobile sensor networks under heterogeneous fading conditions, Transactions on Emerging Telecommunications Technologies, 33:2, Online publication date: 14-Feb-2022.
  27. Peters S, Kerner Y, Dijkman R, Adan I and Grefen P (2022). Fast and accurate quantitative business process analysis using feature complete queueing models, Information Systems, 104:C, Online publication date: 1-Feb-2022.
  28. Hasani Goodarzi A, Diabat E, Jabbarzadeh A and Paquet M (2022). An M/M/c queue model for vehicle routing problem in multi-door cross-docking environments, Computers and Operations Research, 138:C, Online publication date: 1-Feb-2022.
  29. Wang H and Soni M (2022). Research on Human Resource Management Performance Evaluation Method Based on Chaos Optimization Algorithm, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  30. Chen J, Pu C, Wang P, Huang X, Zhang Y, Liu Y and Podda S (2022). Multitask Offloading Strategy for Edge Computing in Time-Sensitive Networking, Mobile Information Systems, 2022, Online publication date: 1-Jan-2022.
  31. Moltchanov D, Samuylov A, Lisovskaya E, Kovalchukov R, Begishev V, Sopin E, Gaidamaka Y and Koucheryavy Y (2022). Performance Characterization and Traffic Protection in Street Multi-Band Millimeter-Wave and Microwave Deployments, IEEE Transactions on Wireless Communications, 21:1, (163-178), Online publication date: 1-Jan-2022.
  32. Kartik D and Mitra U (2022). Fixed-Horizon Active Hypothesis Testing and Anomaly Detection, IEEE Transactions on Signal Processing, 70, (4170-4185), Online publication date: 1-Jan-2022.
  33. Hayati H, Murguia C and van de Wouw N Finite Horizon Privacy of Stochastic Dynamical Systems: A Synthesis Framework for Gaussian Mechanisms 2021 60th IEEE Conference on Decision and Control (CDC), (5607-5613)
  34. ACM
    Ringham L, Owens A, Cieslak M, Harder L and Prusinkiewicz P (2021). Modeling flower pigmentation patterns, ACM Transactions on Graphics, 40:6, (1-14), Online publication date: 1-Dec-2021.
  35. Aghsami A, Samimi Y and Aghaei A (2022). A novel Markovian queueing-inventory model with imperfect production and inspection processes, Computers and Industrial Engineering, 162:C, Online publication date: 1-Dec-2021.
  36. Granville K and Drekic S (2021). The unobserved waiting customer approximation, Queueing Systems: Theory and Applications, 99:3-4, (345-396), Online publication date: 1-Dec-2021.
  37. Arana O, Benítez-Pérez H, Gomez J and Lopez-Guerrero M (2021). Never Query Alone, Computer Networks: The International Journal of Computer and Telecommunications Networking, 199:C, Online publication date: 9-Nov-2021.
  38. ACM
    Souza R, Coimbra G, Figueiredo L, Silva F and Silva T Mobile Application Recommendation based on Demographic and Device Information Proceedings of the Brazilian Symposium on Multimedia and the Web, (105-112)
  39. ACM
    Wang T, Meng Z, Xu M, Han R and Liu H Enabling high frame-rate UHD real-time communication with frame-skipping Proceedings of the 3rd ACM Workshop on Hot Topics in Video Analytics and Intelligent Edges, (19-24)
  40. Bhooanusas N and Sou S (2022). Performance modeling of multipath mobile data offloading in cellular/WiFi networks with bandwidth uncertainty, Computer Networks: The International Journal of Computer and Telecommunications Networking, 197:C, Online publication date: 9-Oct-2021.
  41. Abhishek , Legros B and Fransoo J (2021). Performance Evaluation of Stochastic Systems with Dedicated Delivery Bays and General On-Street Parking, Transportation Science, 55:5, (1070-1087), Online publication date: 1-Sep-2021.
  42. Wu B and Cui L (2021). Reliability analysis of periodically inspected systems with competing risks under Markovian environments, Computers and Industrial Engineering, 158:C, Online publication date: 1-Aug-2021.
  43. Liao H, Mu Y, Zhou Z, Sun M, Wang Z and Pan C (2021). Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing, IEEE Transactions on Intelligent Transportation Systems, 22:7, (4051-4063), Online publication date: 1-Jul-2021.
  44. ACM
    Pal R, Huang Z, Lototsky S, Yin X, Liu M, Crowcroft J, Sastry N, De S and Nag B (2021). Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes, ACM Transactions on Management Information Systems, 12:2, (1-36), Online publication date: 30-Jun-2021.
  45. Obzherin Y, Sidorov S, Nikitin M and Glech S (2021). A Hidden Markov Model Based on Superposition of Two Restoration Processes, Automation and Remote Control, 82:6, (995-1012), Online publication date: 1-Jun-2021.
  46. Wang X, Gu L, Lee H and Zhang G (2021). Quantum context-aware recommendation systems based on tensor singular value decomposition, Quantum Information Processing, 20:5, Online publication date: 1-May-2021.
  47. ACM
    Zhou D, Zhang S, Yildirim M, Alcorn S, Tong H, Davulcu H and He J (2021). High-Order Structure Exploration on Massive Graphs, ACM Transactions on Knowledge Discovery from Data, 15:2, (1-26), Online publication date: 30-Apr-2021.
  48. Chen S, Tao Y, Yu D, Li F and Gong B (2022). Distributed learning dynamics of Multi-Armed Bandits for edge intelligence, Journal of Systems Architecture: the EUROMICRO Journal, 114:C, Online publication date: 1-Mar-2021.
  49. Huang H, Ye T, Lee T and Sun W (2021). Delay and Stability Analysis of Connection-Based Slotted-Aloha, IEEE/ACM Transactions on Networking, 29:1, (203-219), Online publication date: 1-Feb-2021.
  50. Murguia C, Shames I, Farokhi F, Nešić D and Poor H (2021). On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach, IEEE Transactions on Information Forensics and Security, 16, (2608-2620), Online publication date: 1-Jan-2021.
  51. Pal R, Huang Z, Yin X, Liu M, Lototsky S and Crowcroft J Sustainable catastrophic cyber-risk management in IoT societies Proceedings of the Winter Simulation Conference, (3105-3116)
  52. ACM
    Verma R, Pattanaik K, Bharti S, Saxena D and Cao J (2020). A Query Processing Framework for Efficient Network Resource Utilization in Shared Sensor Networks, ACM Transactions on Sensor Networks, 16:4, (1-28), Online publication date: 30-Nov-2020.
  53. Dang F, Nasreen S and Zhang F A Novel FFT-Assisted Background Flow Sensing Framework for Autonomous Underwater Vehicles In Dynamic Environment with Changing Flow Patterns 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (336-341)
  54. Wang J and Hu M (2020). Efficient Inaccuracy, Management Science, 66:10, (4648-4666), Online publication date: 1-Oct-2020.
  55. Çelik C, Bokes P and Singh A Stationary Distributions and Metastable Behaviour for Self-regulating Proteins with General Lifetime Distributions Computational Methods in Systems Biology, (27-43)
  56. Dang F, Nasreen S and Zhang F Background Flow Sensing for Autonomous Underwater Vehicles Using Model Reduction with Dynamic Mode Decomposition 2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), (125-131)
  57. Wang J, Bai G and Zhang L (2021). Modeling the interdependency between natural degradation process and random shocks, Computers and Industrial Engineering, 145:C, Online publication date: 1-Jul-2020.
  58. Kartik D, Nayyar A and Mitra U Testing for Anomalies: Active Strategies and Non-asymptotic Analysis 2020 IEEE International Symposium on Information Theory (ISIT), (1277-1282)
  59. ACM
    Brucato M, Yadav N, Abouzied A, Haas P and Meliou A Stochastic Package Queries in Probabilistic Databases Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, (269-283)
  60. Ahmadi T, Atan Z, de Kok T and Adan I (2020). Time-based service constraints for inventory systems with commitment lead time, OR Spectrum, 42:2, (355-395), Online publication date: 1-Jun-2020.
  61. Ao W and Psounis K (2020). Resource-Constrained Replication Strategies for Hierarchical and Heterogeneous Tasks, IEEE Transactions on Parallel and Distributed Systems, 31:4, (793-804), Online publication date: 1-Apr-2020.
  62. Huang P, Wen C, Fu L, Peng Q and Tang Y (2020). A deep learning approach for multi-attribute data, Information Sciences: an International Journal, 516:C, (234-253), Online publication date: 1-Apr-2020.
  63. Jafari-Nodoushan M and Ejlali A (2020). An optimal analytical solution for maximizing expected battery lifetime using the calculus of variations, Integration, the VLSI Journal, 71:C, (86-94), Online publication date: 1-Mar-2020.
  64. Aliasgari M, Simeone O and Kliewer J (2020). Private and Secure Distributed Matrix Multiplication With Flexible Communication Load, IEEE Transactions on Information Forensics and Security, 15, (2722-2734), Online publication date: 1-Jan-2020.
  65. ACM
    Qiu C, Squicciarini A and Rajtmajer S Rating Mechanisms for Sustainability of Crowdsourcing Platforms Proceedings of the 28th ACM International Conference on Information and Knowledge Management, (2003-2012)
  66. Baetens J, Steyaert B, Claeys D and Bruneel H (2019). Analysis of a batch-service queue with variable service capacity, correlated customer types and generally distributed class-dependent service times, Performance Evaluation, 135:C, Online publication date: 1-Nov-2019.
  67. Moltchanov D, Ometov A and Koucheryavy Y (2022). Analytical characterization of the blockage process in 3GPP New Radio systems with trilateral mobility and multi-connectivity, Computer Communications, 146:C, (110-120), Online publication date: 15-Oct-2019.
  68. Khan T and Islam A (2019). Enhancing throughput in multi-radio cognitive radio networks, Wireless Networks, 25:7, (4383-4402), Online publication date: 1-Oct-2019.
  69. Ghosh S, Acharya T and Maity S (2019). On outage minimization in RF energy harvesting relay assisted bidirectional communication, Wireless Networks, 25:7, (3867-3881), Online publication date: 1-Oct-2019.
  70. Obzherin Y, Sidorov S and Nikitin M Hidden Markov Model of Information System with Component-Wise Storage Devices Distributed Computer and Communication Networks, (354-364)
  71. Patel A and Khan M Optimal Channel Reservation for Primary Users in Spectrum Sharing 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (1-6)
  72. Huang J, Chang Q and Chakraborty N Machine Preventive Replacement Policy for Serial Production Lines Based on Reinforcement Learning 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), (523-528)
  73. Lempa J (2019). A Class of Solvable Multiple Entry Problems with Forced Exits, Applied Mathematics and Optimization, 79:3, (593-619), Online publication date: 1-Jun-2019.
  74. Diaz Alvarenga C, Basilico N and Carpin S Delayed and Time-Variant Patrolling Strategies against Attackers with Local Observation Capabilities Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (1928-1930)
  75. Qiu C, Squicciarini A and Hanrahan B Incentivizing Distributive Fairness for Crowdsourcing Workers Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (404-412)
  76. Zhang H and Zeng K Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (1432-1440)
  77. Liu Z, Gao L, Liu Y and Ma K (2017). Distributed power control in crowdsensing‐based femtocell networks with QoS provisioning, Transactions on Emerging Telecommunications Technologies, 30:4, Online publication date: 15-Apr-2019.
  78. Wei G, Zhao X, He S and He Z (2019). Reliability modeling with condition-based maintenance for binary-state deteriorating systems considering zoned shock effects, Computers and Industrial Engineering, 130:C, (282-297), Online publication date: 1-Apr-2019.
  79. Verma R, Pattanaik K, Bharti S and Saxena D (2019). In-network context inference in IoT sensory environment for efficient network resource utilization, Journal of Network and Computer Applications, 130:C, (89-103), Online publication date: 15-Mar-2019.
  80. Wu Y, Hu J and Zhang X (2019). Moment estimators for the parameters of Ornstein-Uhlenbeck processes driven by compound Poisson processes, Discrete Event Dynamic Systems, 29:1, (57-77), Online publication date: 1-Mar-2019.
  81. Dang F and Zhang F Distributed Flow Estimation for Autonomous Underwater Robots Using POD-Based Model Reduction 2018 IEEE Conference on Decision and Control (CDC), (4453-4458)
  82. Han D, Chen W, Liu J and Fang Y A Probabilistic Scheduling Policy for Energy Efficient UAV Communications with Delay Constraints 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  83. Zhang Q and Zhou M Nonparametric Bayesian Lomax delegate racing for survival analysis with competing risks Proceedings of the 32nd International Conference on Neural Information Processing Systems, (5007-5018)
  84. Cheng V, Chen L, Cheung W and Fok C (2018). A heterogeneous hidden Markov model for mobile app recommendation, Knowledge and Information Systems, 57:1, (207-228), Online publication date: 1-Oct-2018.
  85. ACM
    Gollapalli S and Li X Using PageRank for Characterizing Topic Quality in LDA Proceedings of the 2018 ACM SIGIR International Conference on Theory of Information Retrieval, (115-122)
  86. Shaviv D and Özgür A (2018). Online Power Control for Block i.i.d. Energy Harvesting Channels, IEEE Transactions on Information Theory, 64:8, (5920-5937), Online publication date: 1-Aug-2018.
  87. Jing Y and Miner A (2018). Computation tree measurement language (CTML), Formal Aspects of Computing, 30:3-4, (443-462), Online publication date: 1-Aug-2018.
  88. Qiu C, Squicciarini A, Khare D, Carminati B and Caverlee J CrowdEval Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1486-1494)
  89. Wang P, Petrova M and Mähönen P DMDL: A hierarchical approach to design, visualize, and implement MAC protocols 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  90. ACM
    Li B, Ramamoorthy A and Srikant R (2018). Mean-Field Analysis of Coding Versus Replication in Large Data Storage Systems, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 3:1, (1-28), Online publication date: 24-Feb-2018.
  91. Guo J, Zhang Y, Chen X, Yousefi S, Guo C and Wang Y (2018). Spatial Stochastic Vehicle Traffic Modeling for VANETs, IEEE Transactions on Intelligent Transportation Systems, 19:2, (416-425), Online publication date: 1-Feb-2018.
  92. Yang B, Li B, Yan Z and Yang M (2018). A channel reservation based cooperative multi-channel MAC protocol for the next generation WLAN, Wireless Networks, 24:2, (627-646), Online publication date: 1-Feb-2018.
  93. Sinha H (2018). Enhancement of TOPSIS for Evaluating the Web-Sources to Select as External Source for Web-Warehousing, International Journal of Rough Sets and Data Analysis, 5:1, (117-130), Online publication date: 1-Jan-2018.
  94. He X, Liu J, Jin R and Dai H Privacy-Aware Offloading in Mobile-Edge Computing GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
  95. Vázquez-Abad F, Bernabel S and Fu M Data-driven adaptive threshold control for bike share systems Proceedings of the 2017 Winter Simulation Conference, (1-12)
  96. Ghahramani S and Hemmatyar A (2017). A Hybrid Approach to Analyze the Impact of Vehicular Traffic on Performance of 802.11p Protocol for Safety Communications in Vehicular Ad Hoc Networks, Wireless Personal Communications: An International Journal, 97:3, (4493-4528), Online publication date: 1-Dec-2017.
  97. Yao Q, Chen Z, Yang H and Quek T Delay-aware massive random access: Adaptive framing and successive decoding 2017 IEEE Information Theory Workshop (ITW), (176-180)
  98. Alegoz M and Kaya O (2017). Coordinated dispatching and acquisition fee decisions for a collection center in a reverse supply chain, Computers and Industrial Engineering, 113:C, (475-486), Online publication date: 1-Nov-2017.
  99. Mao Y, Zhang J, Song S and Letaief K (2017). Stochastic Joint Radio and Computational Resource Management for Multi-User Mobile-Edge Computing Systems, IEEE Transactions on Wireless Communications, 16:9, (5994-6009), Online publication date: 1-Sep-2017.
  100. Deng X, Custer B, Busch M, Bakkour S and Lee T (2017). Simultaneous estimation of detection sensitivity and absolute copy number from digital PCR serial dilution, Computational Biology and Chemistry, 68:C, (1-5), Online publication date: 1-Jun-2017.
  101. ACM
    Xiao B, Guo J, Qian W, Hu H and Zhou A NIOSIT Proceedings of the ACM Turing 50th Celebration Conference - China, (1-10)
  102. Ghalme G, Jain S, Gujar S and Narahari Y Thompson Sampling Based Mechanisms for Stochastic Multi-Armed Bandit Problems Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (87-95)
  103. Rotabi R, Kamath K, Kleinberg J and Sharma A Cascades Proceedings of the 26th International Conference on World Wide Web, (587-596)
  104. ACM
    Ahmed C, Murguia C and Ruths J Model-based Attack Detection Scheme for Smart Water Distribution Networks Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (101-113)
  105. Denas S (2017). Estimating and Managing Enterprise Project Risk Using Certainty, International Journal of Risk and Contingency Management, 6:2, (47-59), Online publication date: 1-Apr-2017.
  106. Lin F, Chen C, He T, Ma K and Guan X (2017). A separation principle for resource allocation in industrial wireless sensor networks, Wireless Networks, 23:3, (805-818), Online publication date: 1-Apr-2017.
  107. Petrov V, Komarov M, Moltchanov D, Jornet J and Koucheryavy Y (2017). Interference and SINR in Millimeter Wave and Terahertz Communication Systems With Blocking and Directional Antennas, IEEE Transactions on Wireless Communications, 16:3, (1791-1808), Online publication date: 1-Mar-2017.
  108. Ding S, He X, Wang J, Qiao B and Gai K (2017). Static Node Center Opportunistic Coverage and Hexagonal Deployment in Hybrid Crowd Sensing, Journal of Signal Processing Systems, 86:2-3, (251-267), Online publication date: 1-Mar-2017.
  109. ACM
    Wang C and Bertino E (2017). Sensor Network Provenance Compression Using Dynamic Bayesian Networks, ACM Transactions on Sensor Networks, 13:1, (1-32), Online publication date: 28-Feb-2017.
  110. Sinha H (2017). Enhancement of "Technique for Order Preference by Similarity to Ideal Solution" Approach for Evaluating the Web Sources to Select as External Source for Web Warehousing, International Journal of Natural Computing Research, 6:1, (1-16), Online publication date: 1-Jan-2017.
  111. Gaafar M, Amin O, Abediseid W and Alouini M (2017). Underlay Spectrum Sharing Techniques With In-Band Full-Duplex Systems Using Improper Gaussian Signaling, IEEE Transactions on Wireless Communications, 16:1, (235-249), Online publication date: 1-Jan-2017.
  112. Mao Y, Zhang J, Song S and Letaief K Power-Delay Tradeoff in Multi-User Mobile-Edge Computing Systems 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  113. Bayer F, Lorenzen M, Müller M and Allgöwer F (2016). Robust economic Model Predictive Control using stochastic information, Automatica (Journal of IFAC), 74:C, (151-161), Online publication date: 1-Dec-2016.
  114. Wang C, Yuan Y and Huang L (2016). Base communication model of IP covert timing channels, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:6, (1130-1141), Online publication date: 1-Dec-2016.
  115. Fan R, An J, Jiang H and Bu X (2016). Adaptive channel selection and slot length configuration in cognitive radio, Wireless Communications & Mobile Computing, 16:16, (2636-2648), Online publication date: 1-Nov-2016.
  116. ACM
    Gulur N, Govindarajan R and Mehendale M MicroRefresh Proceedings of the Second International Symposium on Memory Systems, (350-361)
  117. Ding Y, Xu M, Tian Y, Li H and Liu B (2016). A BER and 2-Hop Routing Information-Based Stable Geographical Routing Protocol in MANETs for Multimedia Applications, Wireless Personal Communications: An International Journal, 90:1, (3-32), Online publication date: 1-Sep-2016.
  118. ACM
    Melnyk I, Banerjee A, Matthews B and Oza N Semi-Markov Switching Vector Autoregressive Model-Based Anomaly Detection in Aviation Systems Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1065-1074)
  119. Zhu J, Yu X, Zhang T, Cao Z, Yang Y and Fang Y (2016). Probability Analysis of Terminal Sliding Mode Control of Second-Order Markovian Jump Systems, Asian Journal of Control, 18:4, (1385-1394), Online publication date: 1-Jul-2016.
  120. Wei W, Zhang Y, Liu Y and Qin Z (2016). FRP, Concurrency and Computation: Practice & Experience, 28:5, (1399-1416), Online publication date: 10-Apr-2016.
  121. ACM
    Botev Z, L'Ecuyer P, Simard R and Tuffin B (2016). Static Network Reliability Estimation under the Marshall-Olkin Copula, ACM Transactions on Modeling and Computer Simulation, 26:2, (1-28), Online publication date: 28-Jan-2016.
  122. ACM
    Pham C, Tran N, Nguyen M, Son J and Hong C Hosting Virtual Machines on Distributed Datacenters Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, (1-5)
  123. Feng L, Kuang Y, Fu X and Wu B (2016). Energy-efficient power optimization with spectrum sensing errors in OFDMA cognitive opportunistic relay links, International Journal of Distributed Sensor Networks, 2016, (6-6), Online publication date: 1-Jan-2016.
  124. ACM
    Nirjon S, Gummeson J, Gelb D and Kim K TypingRing Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, (227-239)
  125. Tang D, Yu J, Chen X and Makis V (2015). An optimal condition-based maintenance policy for a degrading system subject to the competing risks of soft and hard failure, Computers and Industrial Engineering, 83:C, (100-110), Online publication date: 1-May-2015.
  126. Dhurandher S, Sharma D, Woungang I and Saini A (2015). Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks, The Journal of Supercomputing, 71:5, (1694-1711), Online publication date: 1-May-2015.
  127. Jeganathan K, Anbazhagan N and Vigneshwaran B (2015). Perishable Inventory System with Server Interruptions, Multiple Server Vacations, and N Policy, International Journal of Operations Research and Information Systems, 6:2, (32-52), Online publication date: 1-Apr-2015.
  128. Alam K, Kamruzzaman J, Karmakar G and Murshed M (2014). Dynamic adjustment of sensing range for event coverage in wireless sensor networks, Journal of Network and Computer Applications, 46:C, (139-153), Online publication date: 1-Nov-2014.
  129. Zhu Q, Yu X, Song A, Fei S, Cao Z and Yang Y (2014). On sliding mode control of single input Markovian jump systems, Automatica (Journal of IFAC), 50:11, (2897-2904), Online publication date: 1-Nov-2014.
  130. ACM
    Kumawat R, Sahula V and Gaur M (2014). Probabilistic modeling and analysis of molecular memory, ACM Journal on Emerging Technologies in Computing Systems, 11:1, (1-16), Online publication date: 6-Oct-2014.
  131. ACM
    Sermpezis P and Spyropoulos T Not all content is created equal Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (103-112)
  132. Hu S and Qi L (2014). Convergence of a second order Markov chain, Applied Mathematics and Computation, 241, (183-192), Online publication date: 1-Aug-2014.
  133. Mehdizadeh A, Hashim F, Abdullah R and Ali B (2014). Performance Evaluation of Cost-Effective Multicast---Unicast Key Management Method, Wireless Personal Communications: An International Journal, 77:3, (2195-2212), Online publication date: 1-Aug-2014.
  134. Abbott R, Lakkaraju K and Warrender C Semi-automated construction of adversarial agents for trainable automated forces. Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1699-1700)
  135. ACM
    Gupta V, Andradóttir S and Goldsman D (2014). Variance estimation and sequential stopping in steady-state simulations using linear regression, ACM Transactions on Modeling and Computer Simulation, 24:2, (1-25), Online publication date: 1-Feb-2014.
  136. ACM
    Fang L, Dobson S and Hudges D An error-free data collection method exploiting hierarchical physical models of wireless sensor networks Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks, (81-88)
  137. ACM
    Gollapalli S, Mitra P and Giles C Ranking experts using author-document-topic graphs Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries, (87-96)
  138. van Hee K and Sidorova N The right timing Proceedings of the 34th international conference on Application and Theory of Petri Nets and Concurrency, (1-20)
  139. Valera A, Soh W and Tan H (2013). Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks, Ad Hoc Networks, 11:3, (1202-1220), Online publication date: 1-May-2013.
  140. Suciu M, Pallez D, Cremene M and Dumitrescu D Adaptive MOEA/D for QoS-based web service composition Proceedings of the 13th European conference on Evolutionary Computation in Combinatorial Optimization, (73-84)
  141. Whitt W (2013). OM Forum, Manufacturing & Service Operations Management, 15:2, (166-169), Online publication date: 1-Apr-2013.
  142. Botev Z, L'Ecuyer P, Rubino G, Simard R and Tuffin B (2013). Static Network Reliability Estimation via Generalized Splitting, INFORMS Journal on Computing, 25:1, (56-71), Online publication date: 1-Jan-2013.
  143. ACM
    Srivatsa M and Hicks M Deanonymizing mobility traces Proceedings of the 2012 ACM conference on Computer and communications security, (628-637)
  144. Anderson E (2012). Ranking Games and Gambling, Operations Research, 60:5, (1229-1244), Online publication date: 1-Sep-2012.
  145. ACM
    Klein Wolterink W, Heijenk G and van den Berg H Analytically modelling the performance of piggybacking on beacons in VANETs Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications, (43-52)
  146. ACM
    Liu X, Zhang H, Xiang Q, Che X and Ju X Taming uncertainties in real-time routing for wireless networked sensing and control Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, (75-84)
  147. ACM
    Viswanathan M, Yi M, Yun S, Park S and Yang Y A novel local mobility anchor selection scheme for proxy mobile IPv6 networks Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-5)
  148. ACM
    Islam A and Raghunathan V Assessing the viability of cross-layer modeling for asynchronous, multi-hop, ad-hoc wireless mesh networks Proceedings of the 9th ACM international symposium on Mobility management and wireless access, (147-152)
  149. Kusaka T, Okuda T, Ideguchi T and Tian X Queuing theoretic approach to server allocation problem in time-delay cloud computing systems Proceedings of the 23rd International Teletraffic Congress, (310-311)
  150. ACM
    Ng M, Li X and Ye Y MultiRank Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (1217-1225)
  151. Halvorsen-Weare E and Fagerholt K Robust supply vessel planning Proceedings of the 5th international conference on Network optimization, (559-573)
  152. ACM
    Gollapalli S, Mitra P and Giles C Ranking authors in digital libraries Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries, (251-254)
  153. Gross J and Reyer M (2011). Performance prediction for OFDMA systems with dynamic power and subcarrier allocation, Computer Communications, 34:8, (973-984), Online publication date: 1-Jun-2011.
  154. Sherali H, Dalkiran E and Glickman T (2011). Selecting Optimal Alternatives and Risk Reduction Strategies in Decision Trees, Operations Research, 59:3, (631-647), Online publication date: 1-May-2011.
  155. Vidyarthi D and Khanbary L (2011). Multi-objective optimization for channel allocation in mobile computing using NSGA-II, International Journal of Network Management, 21:3, (247-266), Online publication date: 1-May-2011.
  156. Gosti G and Batchelder W Naming on a directed graph Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction, (358-365)
  157. ACM
    Viswanathan M, Yi M, Yun S, Park S and Yang Y Performance analysis of dynamic mobility management for proxy mobile IPv6 networks Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-6)
  158. Bredel M and Fidler M A measurement study regarding quality of service and its impact on multiplayer online games Proceedings of the 9th Annual Workshop on Network and Systems Support for Games, (1-6)
  159. Boldrini C, Conti M and Passarella A Modelling social-aware forwarding in opportunistic networks Proceedings of the 2010 IFIP WG 6.3/7.3 international conference on Performance Evaluation of Computer and Communication Systems: milestones and future challenges, (141-152)
  160. ACM
    DuBois C and Smyth P Modeling relational events via latent classes Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (803-812)
  161. ACM
    Dai N and Davison B Freshness matters Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, (114-121)
  162. ACM
    Chen H, Ku W, Wang H and Sun M Leveraging spatio-temporal redundancy for RFID data cleansing Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (51-62)
  163. Boldrini C and Passarella A (2010). HCMM, Computer Communications, 33:9, (1056-1074), Online publication date: 1-Jun-2010.
  164. Sauerwald T and Sudholt D (2010). A self-stabilizing algorithm for cut problems in synchronous networks, Theoretical Computer Science, 411:14-15, (1599-1612), Online publication date: 1-Mar-2010.
  165. Hasib A and Fapojuwo A (2010). Cross-layer radio resource management in integrated WWAN and WLAN networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:3, (341-356), Online publication date: 1-Feb-2010.
  166. ACM
    Cheun D, Lee J and Kim S A comprehensive architecture for autonomic service management Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, (1-9)
  167. Yi M, Choi J, Choi J, Park S and Yang Y A pointer forwarding scheme for minimizing signaling costs in proxy mobile IPv6 networks Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (914-918)
  168. Li P and Abbas M A Markov process based dilemma zone protection algorithm Winter Simulation Conference, (2436-2445)
  169. Ho S and Yeung R (2009). On the discontinuity of the Shannon information measures, IEEE Transactions on Information Theory, 55:12, (5362-5374), Online publication date: 1-Dec-2009.
  170. Brandenburg J and Liu J (2009). Optical signal detection in the turbulent atmosphere using p-i-n photodiodes, IEEE Journal on Selected Areas in Communications, 27:9, (1564-1571), Online publication date: 1-Dec-2009.
  171. Seol D, Lim H and Im G Cooperative spectrum sensing with dynamic threshold adaptation Proceedings of the 28th IEEE conference on Global telecommunications, (4368-4373)
  172. Wu J Connectivity analysis of mobile linear networks with delay constraint Proceedings of the 28th IEEE conference on Global telecommunications, (4119-4124)
  173. Song W and Zhuang W Performance analysis and enhancement of cooperative retransmission strategy for delay-sensitive real-time services Proceedings of the 28th IEEE conference on Global telecommunications, (3140-3145)
  174. Huang Y, Pang A and Hung H (2009). A comprehensive analysis of low-power operation for beacon-enabled IEEE 802.15.4 wireless networks, IEEE Transactions on Wireless Communications, 8:11, (5601-5611), Online publication date: 1-Nov-2009.
  175. ACM
    Wen H, Liu J, Lin C, Ren F, Li P and Fang Y RENA Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, (280-287)
  176. ACM
    Zhu L and Yum P The optimization of framed aloha based RFID algorithms Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, (221-228)
  177. Fapojuwo A and Cano-Tinoco A (2009). Energy consumption and message delay analysis of QoS enhanced base station controlled dynamic clustering protocol for wireless sensor networks, IEEE Transactions on Wireless Communications, 8:10, (5366-5374), Online publication date: 1-Oct-2009.
  178. Hsu W, Spyropoulos T, Psounis K and Helmy A (2009). Modeling spatial and temporal dependencies of user mobility in wireless mobile networks, IEEE/ACM Transactions on Networking, 17:5, (1564-1577), Online publication date: 1-Oct-2009.
  179. Wang Y, Xiong M, Yue D and He R Decision fusion rules over Rician fading channel for wireless sensor networks Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3197-3200)
  180. ACM
    Fiori M and Fitipaldo J A new user behaviour model and QoE determination on short-message-service Proceedings of the 5th International Latin American Networking Conference, (95-101)
  181. Kong L, Wong G and Tsang D (2009). Performance study and system optimization on sleep mode operation in IEEE 802.16e, IEEE Transactions on Wireless Communications, 8:9, (4518-4528), Online publication date: 1-Sep-2009.
  182. Wu J (2009). Connectivity of mobile linear networks with dynamic node population and delay constraint, IEEE Journal on Selected Areas in Communications, 27:7, (1218-1225), Online publication date: 1-Sep-2009.
  183. Shobowale Y and Hamdi K (2009). A unified model for interference analysis in unlicensed frequency bands, IEEE Transactions on Wireless Communications, 8:8, (4004-4013), Online publication date: 1-Aug-2009.
  184. Jung H, Hwang A and Pedram M (2009). Predictive-flow-queue-based energy optimization for gigabit ethernet controllers, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:8, (1113-1126), Online publication date: 1-Aug-2009.
  185. ACM
    Katayama T and Kobayashi K Performance analysis of an M/G/1 satellite node with urgent jobs of a central processing node Proceedings of the 4th International Conference on Queueing Theory and Network Applications, (1-5)
  186. Hacker T, Romero F and Carothers C (2009). An analysis of clustered failures on large supercomputing systems, Journal of Parallel and Distributed Computing, 69:7, (652-665), Online publication date: 1-Jul-2009.
  187. ACM
    Li T, Liu N, Yan J, Wang G, Bai F and Chen Z A Markov chain model for integrating behavioral targeting into contextual advertising Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising, (1-9)
  188. Chau C Finite random geometric graphs by circular and square coverage Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (520-527)
  189. Shin M, Tsang P, Kotz D and Cornelius C DEAMON Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (565-573)
  190. ACM
    Yilmaz F and Alouini M Sum of Weibull variates and performance of diversity systems Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (247-252)
  191. Liu W and Zhang H On state estimation of discrete-time Markov jump linear systems Proceedings of the 21st annual international conference on Chinese Control and Decision Conference, (1165-1170)
  192. Schonenberg H, Sidorova N, van der Aalst W and van Hee K History-Dependent stochastic petri nets Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics, (366-379)
  193. Tufail A, Khayam S, Ali A, Baig W, Anwar F, Kim K and Yoo S On the reliability of backbone-assisted end-to-end transmissions in WSNs Proceedings of the first international conference on Ubiquitous and future networks, (22-27)
  194. ACM
    Heidergott B and Vázquez-Abad F (2009). Gradient estimation for a class of systems with bulk services, ACM Transactions on Modeling and Computer Simulation, 19:3, (1-27), Online publication date: 1-Jun-2009.
  195. Soltani S, Misra K and Radha H (2009). Delay constraint error control protocol for real-time video communication, IEEE Transactions on Multimedia, 11:4, (742-751), Online publication date: 1-Jun-2009.
  196. Azad S and Murshed M (2009). An adaptive borrow-and-return model for broadcasting videos, IEEE Transactions on Multimedia, 11:4, (707-715), Online publication date: 1-Jun-2009.
  197. Wang T, Wang K and Pearn W (2009). Optimization of the T policy M/G/1 queue with server breakdowns and general startup times, Journal of Computational and Applied Mathematics, 228:1, (270-278), Online publication date: 1-Jun-2009.
  198. Minh T and Wolters L Modeling Job Arrival Process with Long Range Dependence and Burstiness Characteristics Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (324-330)
  199. ACM
    Cevher V and Kaplan L (2009). Acoustic sensor network design for position estimation, ACM Transactions on Sensor Networks, 5:3, (1-28), Online publication date: 1-May-2009.
  200. Nayebi A and Karlsson G Beaconing in wireless mobile networks Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (2260-2265)
  201. Sharifkhani A and Beaulieu N Packet transmission scheduling algorithm for wireless sensor networks with energy limited mobile sink Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (1474-1479)
  202. ACM
    Luo C, Jiang Z, Hou W, Yu F and Zhu Q A sampling approach for XML query selectivity estimation Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (335-344)
  203. ACM
    Manohar P, Ram S and Manjunath D (2009). Path coverage by a sensor field, ACM Transactions on Sensor Networks, 5:2, (1-26), Online publication date: 1-Mar-2009.
  204. Wang X, Xie S and Hu X (2009). Recursive analysis for soft handoff schemes in CDMA cellular systems, IEEE Transactions on Wireless Communications, 8:3, (1499-1507), Online publication date: 1-Mar-2009.
  205. Yi M, Choi J and Yang Y A comparative analysis on the signaling load of proxy mobile IPv6 and hierarchical mobile IPv6 Proceedings of the 4th international conference on Wireless pervasive computing, (11-15)
  206. Jin T and Liao H (2009). Spare parts inventory control considering stochastic growth of an installed base, Computers and Industrial Engineering, 56:1, (452-460), Online publication date: 1-Feb-2009.
  207. Shao X, Schiphorst R and Slump C (2009). An opportunistic error correction layer for OFDM systems, EURASIP Journal on Wireless Communications and Networking, 2009, (1-10), Online publication date: 1-Jan-2009.
  208. Gosavi A On step sizes, stochastic shortest paths, and survival probabilities in reinforcement learning Proceedings of the 40th Conference on Winter Simulation, (525-531)
  209. Honnappa H Customer event rate estimation using particle filters Proceedings of the 7th Australasian Data Mining Conference - Volume 87, (61-72)
  210. ACM
    Moe M, Helvik B and Knapskog S TSR Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (83-90)
  211. ACM
    Ali M, Consens M, Kazai G and Lalmas M Structural relevance Proceedings of the 17th ACM conference on Information and knowledge management, (1153-1162)
  212. Lin Z, Qu Y, Wang Q and Zhao B E-Scheme in Delay-Tolerant Networks Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management, (1-10)
  213. Menache I and Shimkin N Reservation-based distributed medium access in wireless collision channels Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-8)
  214. Liu Y, Hsu P, Sheen G, Ku S and Chang K (2008). Simultaneous determination of view selection and update policy with stochastic query and response time constraints, Information Sciences: an International Journal, 178:18, (3491-3509), Online publication date: 20-Sep-2008.
  215. Ren W, Ren K, Lou W and Zhang Y Efficient user revocation for privacy-aware PKI Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, (1-7)
  216. Tokuno K and Yamada S User-perceived software service availability modeling with reliability growth Proceedings of the 5th international conference on Service availability, (75-89)
  217. Cevher V and Kaplan L Pareto Frontiers of Sensor Networks for Localization Proceedings of the 7th international conference on Information processing in sensor networks, (27-38)
  218. ACM
    Mak T, Sedcole P, Cheung P and Luk W Interconnection lengths and delays estimation for communication links in FPGAs Proceedings of the 2008 international workshop on System level interconnect prediction, (1-10)
  219. ACM
    Huang J, Zhuang Z, Li J and Giles C Collaboration over time Proceedings of the 2008 International Conference on Web Search and Data Mining, (107-116)
  220. Li H, Zhao Q and Yang Z (2007). Reliability Modeling of Fault Tolerant Control Systems, International Journal of Applied Mathematics and Computer Science, 17:4, (491-504), Online publication date: 1-Dec-2007.
  221. Yang S, Yan S and Hung H (2007). Modeling UMTS Power Saving with Bursty Packet Data Traffic, IEEE Transactions on Mobile Computing, 6:12, (1398-1409), Online publication date: 1-Dec-2007.
  222. Inoue S and Yamada S (2007). Discrete Program-Size Dependent Software Reliability Assessment, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:12, (2891-2902), Online publication date: 1-Dec-2007.
  223. ACM
    Ipeirotis P, Agichtein E, Jain P and Gravano L (2007). Towards a query optimizer for text-centric tasks, ACM Transactions on Database Systems, 32:4, (21-es), Online publication date: 1-Nov-2007.
  224. Zhu F, Zhu W, Mutka M and Ni L (2007). Private and Secure Service Discovery via Progressive and Probabilistic Exposure, IEEE Transactions on Parallel and Distributed Systems, 18:11, (1565-1577), Online publication date: 1-Nov-2007.
  225. ACM
    Papadopoulos F and Psounis K (2007). Efficient identification of uncongested internet links for topology downscaling, ACM SIGCOMM Computer Communication Review, 37:5, (39-52), Online publication date: 20-Oct-2007.
  226. Mountrouidou X and Perros H On the traffic modeling of burst aggregation algorithms using video and data traces Proceedings of the first international conference on Networks for grid applications, (1-8)
  227. ACM
    Schroeder B and Gibson G (2007). Understanding disk failure rates, ACM Transactions on Storage, 3:3, (8-es), Online publication date: 1-Oct-2007.
  228. ACM
    Cheng Y, Zhuang W and Ling X FBM model based network-wide performance analysis with service differentiation The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, (1-7)
  229. Fapojuwo A and Huang Y (2007). Performance of a two-level call admission control scheme for DS-CDMA wireless networks, EURASIP Journal on Wireless Communications and Networking, 2007:3, (1-12), Online publication date: 1-Jul-2007.
  230. Rathinam M and El Samad H (2007). Reversible-equivalent-monomolecular tau, Journal of Computational Physics, 224:2, (897-923), Online publication date: 1-Jun-2007.
  231. ACM
    Song X, Chi Y, Hino K and Tseng B Information flow modeling based on diffusion rate for prediction and ranking Proceedings of the 16th international conference on World Wide Web, (191-200)
  232. Herath A, Herath S, Goonatilake R, Herath J and Stockton R (2007). Mathematical modeling of cyber attacks, Journal of Computing Sciences in Colleges, 22:4, (152-161), Online publication date: 1-Apr-2007.
  233. ACM
    Kang W, Shahabuddin P and Whitt W (2007). Exploiting regenerative structure to estimate finite time averages via simulation, ACM Transactions on Modeling and Computer Simulation, 17:2, (8-es), Online publication date: 1-Apr-2007.
  234. ACM
    Ramachandran I, Das A and Roy S (2007). Analysis of the contention access period of IEEE 802.15.4 MAC, ACM Transactions on Sensor Networks, 3:1, (4-es), Online publication date: 1-Mar-2007.
  235. Schroeder B and Gibson G Disk failures in the real world Proceedings of the 5th USENIX conference on File and Storage Technologies, (1-es)
  236. Kim J, Waterman M and Li L (2007). Accuracy Assessment of Diploid Consensus Sequences, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 4:1, (88-97), Online publication date: 1-Jan-2007.
  237. Voicu L, Bassi S and Labrador M (2007). Analytical and experimental evaluation of TCP with an Additive Increase Smooth Decrease (AISD) strategy, Computer Communications, 30:2, (479-495), Online publication date: 1-Jan-2007.
  238. Vommi V and Seetala M (2007). A new approach to robust economic design of control charts, Applied Soft Computing, 7:1, (211-228), Online publication date: 1-Jan-2007.
  239. Nazzal D and McGinnis L An analytical model of vehicle-based automated material handling systems in semiconductor fabs Proceedings of the 38th conference on Winter simulation, (1871-1879)
  240. ACM
    Kannan J, Jung J, Paxson V and Koksal C Semi-automated discovery of application session structure Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (119-132)
  241. ACM
    Iftikhar M, Landfeldt B and Caglar M An analytical model based on G/M/1 with self-similar input to provide end-to-end QoS in 3G networks Proceedings of the 4th ACM international workshop on Mobility management and wireless access, (180-189)
  242. Petzold J, Bagci F, Trumler W and Ungerer T Comparison of different methods for next location prediction Proceedings of the 12th international conference on Parallel Processing, (909-918)
  243. ACM
    Jindal A and Psounis K Performance analysis of epidemic routing under contention Proceedings of the 2006 international conference on Wireless communications and mobile computing, (539-544)
  244. ACM
    Ipeirotis P, Agichtein E, Jain P and Gravano L To search or to crawl? Proceedings of the 2006 ACM SIGMOD international conference on Management of data, (265-276)
  245. Gau R and Chen K (2006). Predictive Multicast Polling for Wireless Networks with Multipacket Reception and Queuing, IEEE Transactions on Mobile Computing, 5:6, (725-737), Online publication date: 1-Jun-2006.
  246. Gong J, Reed D, Shaw T, Vivanco D and Martin J VoD QAM resource allocation algorithms Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (268-280)
  247. Park W and Kim B Fast BU process method for real time multimedia traffic in MIPv6 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (330-339)
  248. Cao Y and Petzold L (2006). Accuracy limitations and the measurement of errors in the stochastic simulation of chemically reacting systems, Journal of Computational Physics, 212:1, (6-24), Online publication date: 10-Feb-2006.
  249. Kesdogan D and Palmer C (2006). Technical challenges of network anonymity, Computer Communications, 29:3, (306-324), Online publication date: 1-Feb-2006.
  250. Derbal Y (2006). A probabilistic scheduling heuristic for computational grids, Multiagent and Grid Systems, 2:1, (45-59), Online publication date: 1-Jan-2006.
  251. Liang X and He Y Optimal pricing for web search engines Proceedings of the First international conference on Internet and Network Economics, (670-679)
  252. Miranda A and Muñoz D DSS to manage ATM cash under periodic review with emergency orders Proceedings of the 37th conference on Winter simulation, (2595-2599)
  253. Giri B and Dohi T (2005). Computational aspects of an extended EMQ model with variable production rate, Computers and Operations Research, 32:12, (3143-3161), Online publication date: 1-Dec-2005.
  254. ACM
    Chen Z and Ji C A self-learning worm using importance scanning Proceedings of the 2005 ACM workshop on Rapid malcode, (22-29)
  255. ACM
    Qin M, Zimmermann R and Liu L Supporting multimedia streaming between mobile peers with link availability prediction Proceedings of the 13th annual ACM international conference on Multimedia, (956-965)
  256. Oommen B and Rueda L On utilizing stochastic learning weak estimators for training and classification of patterns with non-stationary distributions Proceedings of the 28th annual German conference on Advances in Artificial Intelligence, (107-120)
  257. ACM
    Kumar S, Lai T and Arora A Barrier coverage with wireless sensors Proceedings of the 11th annual international conference on Mobile computing and networking, (284-298)
  258. Geibel P and Wysotzki F (2005). Risk-sensitive reinforcement learning applied to control under constraints, Journal of Artificial Intelligence Research, 24:1, (81-108), Online publication date: 1-Jul-2005.
  259. ACM
    Wierman A and Harchol-Balter M (2005). Classifying scheduling policies with respect to higher moments of conditional response time, ACM SIGMETRICS Performance Evaluation Review, 33:1, (229-240), Online publication date: 6-Jun-2005.
  260. ACM
    Wierman A and Harchol-Balter M Classifying scheduling policies with respect to higher moments of conditional response time Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (229-240)
  261. Maleki M and Pedram M QoM and lifetime-constrained random deployment of sensor networks for minimum energy consumption Proceedings of the 4th international symposium on Information processing in sensor networks, (39-es)
  262. Beaubrun R, Pierre S and Conan J (2005). An approach for managing global mobility and roaming in the next-generation wireless systems, Computer Communications, 28:5, (571-581), Online publication date: 1-Mar-2005.
  263. Wieland J and Nelson B An odds-ratio indifference-zone selection procedure for Bernoulli populations Proceedings of the 36th conference on Winter simulation, (630-638)
  264. Konak A, Smith A and Kulturel-Konak S New event-driven sampling techniques for network reliability estimation Proceedings of the 36th conference on Winter simulation, (224-231)
  265. Leemis L Building credible input models Proceedings of the 36th conference on Winter simulation, (29-40)
  266. England D and Weissman J A Stochastic Control Model for Deployment of Dynamic Grid Services Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing, (192-199)
  267. ACM
    Liu X, Huang Q and Zhang Y Combs, needles, haystacks Proceedings of the 2nd international conference on Embedded networked sensor systems, (122-133)
  268. ACM
    Kumar S, Lai T and Balogh J On k-coverage in a mostly sleeping sensor network Proceedings of the 10th annual international conference on Mobile computing and networking, (144-158)
  269. Bai L, Fralix B, Liu L and Shang W (2004). Inter-Departure Times in Base-Stock Inventory-Queues, Queueing Systems: Theory and Applications, 47:4, (345-361), Online publication date: 1-Aug-2004.
  270. ACM
    Ghosh S and Ferguson F Estimating detection probability of interconnect opens using stuck-at tests Proceedings of the 14th ACM Great Lakes symposium on VLSI, (254-259)
  271. Xiao Y, Pan Y and Li J (2004). Design and Analysis of Location Management for 3G Cellular Networks, IEEE Transactions on Parallel and Distributed Systems, 15:4, (339-349), Online publication date: 1-Apr-2004.
  272. Wu C, Chiu Y and Cheng K (2004). Error-Tolerant Sign Retrieval Using Visual Features and Maximum A Posteriori Estimation, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26:4, (495-508), Online publication date: 1-Apr-2004.
  273. Chan W and Schruben L Special topics on simulation analysis Proceedings of the 35th conference on Winter simulation: driving innovation, (496-502)
  274. Leemis L Input modeling Proceedings of the 35th conference on Winter simulation: driving innovation, (14-24)
  275. ACM
    Yee W and Navathe S Efficient data access to multi-channel broadcast programs Proceedings of the twelfth international conference on Information and knowledge management, (153-160)
  276. Mišic´ J and Tam Y (2003). Non-uniform traffic issues in DCA wireless multimedia networks, Wireless Networks, 9:6, (605-622), Online publication date: 1-Nov-2003.
  277. Fong N, Xu C and Wang L (2003). Optimal periodic remapping of dynamic bulk synchronous computations, Journal of Parallel and Distributed Computing, 63:11, (1036-1049), Online publication date: 1-Nov-2003.
  278. ACM
    Cui J, Faloutsos M, Maggiorini D, Gerla M and Boussetta K Measuring and modelling the group mmbership in the internet Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (65-77)
  279. ACM
    Yuen W, Yates R and Sung C Effect of node mobility on highway mobile infostation networks Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, (82-91)
  280. Rutagemwa H and Shen X (2003). Modeling and Analysis of WAP Performance over Wireless Links, IEEE Transactions on Mobile Computing, 2:3, (221-232), Online publication date: 1-Jul-2003.
  281. ACM
    Tang W, Fu Y, Cherkasova L and Vahdat A MediSyn Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, (12-21)
  282. Dai J and Chang T The discussion and selection of critical parameters in the system performance of modified CSMA communication protocol without capture effect Proceedings of the 7th CDMA international conference on Mobile communications, (201-218)
  283. Calkin N, Edds J and Shier D (2002). Cancellation in cyclic consecutive systems, Journal of Computational and Applied Mathematics, 142:1, (13-26), Online publication date: 1-May-2002.
  284. Johnson A and Jacobson S (2002). A class of convergent generalized hill climbing algorithms, Applied Mathematics and Computation, 125:2-3, (359-373), Online publication date: 25-Jan-2002.
  285. Kaufman L, Johnson B and Dugan J (2002). Coverage estimation using statistic of the extremes for when testing reveals no failures, IEEE Transactions on Computers, 51:1, (12), Online publication date: 1-Jan-2002.
  286. Kaufman L, Johnson B and Dugan J (2002). Coverage Estimation Using Statistics of the Extremes for When Testing Reveals No Failures, IEEE Transactions on Computers, 51:1, (3-12), Online publication date: 1-Jan-2002.
  287. Leemis L Input modeling Proceedings of the 33nd conference on Winter simulation, (62-73)
  288. ACM
    Gal A and Eckstein J (2001). Managing periodically updated data in relational databases, Journal of the ACM, 48:6, (1141-1183), Online publication date: 1-Nov-2001.
  289. Kiniwa J, Hamada T and Mizoguchi D (2001). Lookahead Scheduling Requests for Multisize Page Caching, IEEE Transactions on Computers, 50:9, (972-983), Online publication date: 1-Sep-2001.
  290. Benini L, Bogliolo A and De Micheli G A survey of design techniques for system-level dynamic power management Readings in hardware/software co-design, (231-248)
  291. Peköz E and Lapré M (2001). Inequalities for Queues with a Learning Server, Queueing Systems: Theory and Applications, 37:4, (337-347), Online publication date: 1-Apr-2001.
  292. Leemis L Input modeling Proceedings of the 32nd conference on Winter simulation, (17-25)
  293. Du X, Zhang X and Zhu Z (2000). Memory Hierarchy Considerations for Cost-Effective Cluster Computing, IEEE Transactions on Computers, 49:9, (915-933), Online publication date: 1-Sep-2000.
  294. Thibeault C (2000). On the Adaptation of Viterbi Algorithm for Diagnosis of Multiple Bridging Faults, IEEE Transactions on Computers, 49:6, (575-587), Online publication date: 1-Jun-2000.
  295. ACM
    Ling Y, Mullen T and Lin X (2000). Analysis of optimal thread pool size, ACM SIGOPS Operating Systems Review, 34:2, (42-55), Online publication date: 1-Apr-2000.
  296. ACM
    Benini L and Micheli G (2000). System-level power optimization, ACM Transactions on Design Automation of Electronic Systems, 5:2, (115-192), Online publication date: 1-Apr-2000.
  297. ACM
    Leemis L Simulation input modeling Proceedings of the 31st conference on Winter simulation: Simulation---a bridge to the future - Volume 1, (14-23)
  298. Young C, Radhakrishnan R and Wilsey P Optimism Proceedings of the thirteenth workshop on Parallel and distributed simulation, (136-143)
  299. ACM
    Zhou T, Hu X and Sha E A probabilistic performance metric for real-time system design Proceedings of the seventh international workshop on Hardware/software codesign, (90-94)
  300. Leemis L Input modeling Proceedings of the 30th conference on Winter simulation, (15-22)
  301. Ahmed K, El-Makky N and Taha Y Effective data mining Proceedings of the 1998 conference of the Centre for Advanced Studies on Collaborative research
  302. ACM
    Kalavade A and Moghé P AsaP—a framework for evaluating run-time schedulers in embedded multimedia end-systems Proceedings of the sixth ACM international conference on Multimedia, (291-296)
  303. ACM
    Kalavade A and Moghé P A tool for performance estimation of networked embedded end-systems Proceedings of the 35th annual Design Automation Conference, (257-262)
  304. Lui J, Muntz R and Towsley D (1998). Computing Performance Bounds of Fork-Join Parallel Programs Under a Multiprocessing Environment, IEEE Transactions on Parallel and Distributed Systems, 9:3, (295-311), Online publication date: 1-Mar-1998.
  305. Dey D, Barron T and Saharia A (1998). A Decision Model for Choosing the Optimal Level of Storage in Temporal Databases, IEEE Transactions on Knowledge and Data Engineering, 10:2, (297-309), Online publication date: 1-Mar-1998.
  306. Kim G and Yoon H (1998). On Submesh Allocation for Mesh Multicomputers, IEEE Transactions on Parallel and Distributed Systems, 9:2, (175-185), Online publication date: 1-Feb-1998.
  307. Leemis L Seven habits of highly successful input modelers Proceedings of the 29th conference on Winter simulation, (39-46)
  308. ACM
    Das S and Sen S A new location update strategy for cellular networks and its implementation using a genetic algorithm Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (185-194)
  309. ACM
    Yuan L, Teng C and Kang S Statistical estimation of average power dissipation in sequential circuits Proceedings of the 34th annual Design Automation Conference, (377-382)
  310. Bertsimas D and Mourtzinou G (1997). Transient laws of non-stationary queueing systems and their applications, Queueing Systems: Theory and Applications, 25:1/4, (115-155), Online publication date: 14-Jan-1997.
  311. ACM
    Chen I, Coffey J and Mudge T (1996). Analysis of branch prediction via data compression, ACM SIGOPS Operating Systems Review, 30:5, (128-137), Online publication date: 1-Dec-1996.
  312. Leemis L Discrete-event simulation input process modeling Proceedings of the 28th conference on Winter simulation, (39-46)
  313. ACM
    Chen I, Coffey J and Mudge T Analysis of branch prediction via data compression Proceedings of the seventh international conference on Architectural support for programming languages and operating systems, (128-137)
  314. ACM
    Chen I, Coffey J and Mudge T (1996). Analysis of branch prediction via data compression, ACM SIGPLAN Notices, 31:9, (128-137), Online publication date: 1-Sep-1996.
  315. Beerel P, Yun K and Chou W Optimizing average-case delay in technology mapping of burst-mode circuits Proceedings of the 2nd International Symposium on Advanced Research in Asynchronous Circuits and Systems
  316. ACM
    Srikant R and Whitt W (1996). Simulation run lengths to estimate blocking probabilities, ACM Transactions on Modeling and Computer Simulation, 6:1, (7-52), Online publication date: 1-Jan-1996.
  317. Beerel P, Yun K, Nowick S and Yeh P Estimation and bounding of energy consumption in burst-mode control circuits Proceedings of the 1995 IEEE/ACM international conference on Computer-aided design, (26-33)
  318. Chen I, Bastani F and Tsao T (1995). On the Reliability of AI Planning Software in Real-Time Applications, IEEE Transactions on Knowledge and Data Engineering, 7:1, (4-13), Online publication date: 1-Feb-1995.
  319. Leemis L Input modeling Proceedings of the 26th conference on Winter simulation, (55-61)
  320. Chen I and Poole B (1994). Performance Evaluation of Rule Grouping on a Real-Time Expert System Architecture, IEEE Transactions on Knowledge and Data Engineering, 6:6, (883-891), Online publication date: 1-Dec-1994.
  321. Menascé D, Yesha Y and Kalpakis K (1994). On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols, IEEE Transactions on Software Engineering, 20:11, (868-884), Online publication date: 1-Nov-1994.
  322. Campodónico S and Singpurwalla N (1994). A Bayesian Analysis of the Logarithmic-Poisson Execution Time Model Based on Expert Opinion and Failure Data, IEEE Transactions on Software Engineering, 20:9, (677-683), Online publication date: 1-Sep-1994.
  323. ACM
    Mitzenmacher M Bounds on the greedy routing algorithm for array networks Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures, (346-353)
  324. Manivannan S and Guthrie S (1994). A Knowledge-Based Fatal Incident Decision Model, IEEE Transactions on Knowledge and Data Engineering, 6:4, (534-548), Online publication date: 1-Aug-1994.
  325. ACM
    Gupta S and Karaesmen F (1994). Solution to complex queueing systems, ACM SIGMETRICS Performance Evaluation Review, 21:3-4, (33-46), Online publication date: 1-Apr-1994.
  326. ACM
    Tang D and Iyer R (1993). MEASURE+, ACM SIGMETRICS Performance Evaluation Review, 21:1, (110-121), Online publication date: 1-Jun-1993.
  327. ACM
    Tang D and Iyer R MEASURE+ Proceedings of the 1993 ACM SIGMETRICS conference on Measurement and modeling of computer systems, (110-121)
  328. ACM
    Hou W and Ozsoyoglu G (1993). Processing time-constrained aggregate queries in CASE-DB, ACM Transactions on Database Systems, 18:2, (224-261), Online publication date: 1-Jun-1993.
  329. Pattipati K, Li Y and Blom H (1993). A Unified Framework for the Performability Evaluation of Fault-Tolerant Computer Systems, IEEE Transactions on Computers, 42:3, (312-326), Online publication date: 1-Mar-1993.
  330. Tang D and Iyer R (1993). Dependability Measurement and Modeling of a Multicomputer System, IEEE Transactions on Computers, 42:1, (62-75), Online publication date: 1-Jan-1993.
  331. Shanker A and Kelton W Empirical input distributions Proceedings of the 23rd conference on Winter simulation, (978-985)
  332. Seila A Output analysis for simulation Proceedings of the 23rd conference on Winter simulation, (28-36)
  333. Seila A Output analysis for simulation (tutorial session) Proceedings of the 22nd conference on Winter simulation, (49-54)
  334. Pramanik S and Kim M (1990). Parallel Processing of large node B-trees, IEEE Transactions on Computers, 39:9, (1208-1212), Online publication date: 1-Sep-1990.
  335. Pattipati K and Shah S (1990). On the Computational Aspects of Performability Models of Fault-Tolerant Computer Systems, IEEE Transactions on Computers, 39:6, (832-836), Online publication date: 1-Jun-1990.
  336. Daigle J, Kuehl R and Langford J (1990). Queueing Analysis of an Optical Disk Jukebox Based Office System, IEEE Transactions on Computers, 39:6, (819-828), Online publication date: 1-Jun-1990.
  337. Karmarkar V and Kuhl J (1989). An Integrated Approach to Distributed Demand Assignment in Multiple-Bus Local Networks, IEEE Transactions on Computers, 38:5, (679-695), Online publication date: 1-May-1989.
  338. ACM
    Naderi M (1988). Modelling and performance evaluation of multiprocessors, organizations with multi-memory units, ACM SIGARCH Computer Architecture News, 16:5, (35-51), Online publication date: 1-Dec-1988.
  339. ACM
    Cheng R Variance reduction methods Proceedings of the 18th conference on Winter simulation, (60-68)
  340. ACM
    Witkowski A (1986). Performance evaluation of multiversion with the Oracle synchronization, ACM SIGMETRICS Performance Evaluation Review, 14:1, (147-158), Online publication date: 1-May-1986.
  341. ACM
    Witkowski A Performance evaluation of multiversion with the Oracle synchronization Proceedings of the 1986 ACM SIGMETRICS joint international conference on Computer performance modelling, measurement and evaluation, (147-158)
  342. Kimbler D Generation of continuous random deviates using empirical event count data in digital simulation Proceedings of the 19th annual symposium on Simulation, (59-71)
  343. ACM
    Jefferson D and Witkowski A An approach to performance analysis of timestamp-driven synchronization mechanisms Proceedings of the third annual ACM symposium on Principles of distributed computing, (243-253)
  344. ACM
    Taylor R (1982). Simulation and the inspection paradox, ACM SIGSIM Simulation Digest, 13:1-4, (51-54), Online publication date: 1-Jan-1982.
  345. Yousif S The exponential Markov stochastic model Proceedings of the 7th conference on Winter simulation - Volume 2, (731-732)
  346. ACM
    Pal R, Sequeira R, Yin X, Zeijlemaker S and Kotala V How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk Exposure in their Industrial IoT Network?, ACM Transactions on Management Information Systems, 0:0
  347. Xu Y, Zhao X and Hu F Interference minimization based power allocation for cognitive radio networks with imperfect spectrum sensing 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  348. Liu J, Mao Y, Zhang J and Letaief K Delay-optimal computation task scheduling for mobile-edge computing systems 2016 IEEE International Symposium on Information Theory (ISIT), (1451-1455)
  349. Petrov V, Moltchanov D, Andreev S and Heath R Analysis of Intelligent Vehicular Relaying in Urban 5G+ Millimeter-Wave Cellular Deployments 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
  350. Kadhe S, Soljanin E and Sprintson A When do the availability codes make the stored data more available? 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (956-963)
Contributors
  • University of Southern California

Recommendations