Deploying wireless sensors to achieve both coverage and connectivity X Bai, S Kumar, D Xuan, Z Yun, TH Lai Proceedings of the 7th ACM international symposium on Mobile ad hoc …, 2006 | 761 | 2006 |
Mobile phone based drunk driving detection J Dai, J Teng, X Bai, Z Shen, D Xuan 2010 4th International Conference on Pervasive Computing Technologies for …, 2010 | 470 | 2010 |
PerFallD: A pervasive fall detection system using mobile phones J Dai, X Bai, Z Yang, Z Shen, D Xuan 2010 8th IEEE International Conference on Pervasive Computing and …, 2010 | 343 | 2010 |
DSSS-based flow marking technique for invisible traceback W Yu, X Fu, S Graham, D Xuan, W Zhao 2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007 | 265 | 2007 |
Mobile phone-based pervasive fall detection J Dai, X Bai, Z Yang, Z Shen, D Xuan Personal and ubiquitous computing 14 (7), 633-643, 2010 | 240 | 2010 |
Complete optimal deployment patterns for full-coverage and k-connectivity (k≤ 6) wireless sensor networks X Bai, D Xuan, Z Yun, TH Lai, W Jia Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 202 | 2008 |
E-smalltalker: A distributed mobile system for social networking in physical proximity AC Champion, Z Yang, B Zhang, J Dai, D Xuan, D Li IEEE Transactions on Parallel and Distributed Systems 24 (8), 1535-1545, 2012 | 192* | 2012 |
Optimal deployment patterns for full coverage and k-connectivity (k≤ 6) wireless sensor networks Z Yun, X Bai, D Xuan, TH Lai, W Jia IEEE/ACM Transactions on Networking (TON) 18 (3), 934-947, 2010 | 189 | 2010 |
Deploying four-connectivity and full-coverage wireless sensor networks X Bai, Z Yun, D Xuan, T Lai, W Jia INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 296-300, 2008 | 162 | 2008 |
A routing protocol for anycast messages D Xuan, W Jia, W Zhao, H Zhu Parallel and Distributed Systems, IEEE Transactions on 11 (6), 571-588, 2000 | 155 | 2000 |
Mobility limited flip-based sensor networks deployment S Chellappan, X Bai, B Ma, D Xuan, C Xu Parallel and Distributed Systems, IEEE Transactions on 18 (2), 199-211, 2007 | 153 | 2007 |
Providing absolute differentiated services for real-time applications in static-priority scheduling networks S Wang, D Xuan, R Bettati, W Zhao IEEE/ACM Transactions on networking 12 (2), 326-339, 2004 | 152 | 2004 |
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks A Chen, TH Lai, D Xuan Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 136 | 2008 |
Deploying wireless sensor networks under limited mobility constraints S Chellappan, W Gu, X Bai, D Xuan, B Ma, K Zhang IEEE Transactions on Mobile Computing 6 (10), 1142-1157, 2007 | 136 | 2007 |
Stealthy video capturer: a new video-based spyware in 3g smartphones N Xu, F Zhang, Y Luo, W Jia, D Xuan, J Teng Proceedings of the second ACM conference on Wireless network security, 69-78, 2009 | 133 | 2009 |
Netcamo: Camouflaging network traffic for qos-guaranteed mission critical applications Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions …, 2001 | 132 | 2001 |
A new cell counter based attack against tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 128 | 2009 |
Optimal patterns for four-connectivity and full coverage in wireless sensor networks X Bai, Z Yun, D Xuan, TH Lai, W Jia IEEE Transactions on Mobile Computing 9 (3), 435, 2010 | 115 | 2010 |
Integrated routing algorithms for anycast messages W Jia, D Xuan, W Zhao IEEE Communications Magazine 38 (1), 48-53, 2000 | 110 | 2000 |
Survey on QoS management of VoIP X Chen, C Wang, D Xuan, Z Li, Y Min, W Zhao 2003 International Conference on Computer Networks and Mobile Computing …, 2003 | 108 | 2003 |