Stojmenović, Ivan
201  Ergebnisse:
Personensuche X
?
1

Constructing Connected-Dominating-Set with Maximum Lifetime..:

Lin, Zhiyong ; Liu, Hai ; Chu, Xiaowen..
IEEE Transactions on Computers.  73 (2024)  4 - p. 1165-1179 , 2024
 
?
2

Joint Optimization of Bandwidth for Provider and Delay for ..:

Li, Wenxin ; Qi, Heng ; Li, Keqiu..
IEEE Transactions on Cloud Computing.  5 (2017)  2 - p. 331-343 , 2017
 
?
3

Cooperative Data Scheduling in Hybrid Vehicular Ad Hoc Netw..:

Liu, Kai ; Ng, Joseph K. Y. ; Lee, Victor C.S...
IEEE/ACM Transactions on Networking.  24 (2016)  3 - p. 1759-1773 , 2016
 
?
4

Security and reliability in big data:

Xiang, Yang ; Stojmenovic, Ivan ; Mueller, Peter.
Concurrency and Computation: Practice and Experience.  28 (2016)  3 - p. 581-582 , 2016
 
?
5

Network computing and applications for Big Data analytics:

Abawajy, Jemal H. ; Zomaya, Albert Y. ; Stojmenovic, Ivan
Journal of Network and Computer Applications.  59 (2016)  - p. 361 , 2016
 
?
7

Cooperative data scheduling in hybrid vehicular ad hoc netw..:

Liu, Kai ; Ng, Joseph K. Y. ; Lee, Victor C. S...
IEEE/ACM Transactions on Networking (TON).  24 (2016)  3 - p. 1759-1773 , 2016
 
?
8

Fast and scalable counterfeits estimation for large-scale R..:

Gong, Wei ; Stojmenovic, Ivan ; Nayak, Amiya..
IEEE/ACM Transactions on Networking (TON).  24 (2016)  2 - p. 1052-1064 , 2016
 
?
9

Fast and Scalable Counterfeits Estimation for Large-Scale R..:

Gong, Wei ; Stojmenovic, Ivan ; Nayak, Amiya..
IEEE/ACM Transactions on Networking.  24 (2016)  2 - p. 1052-1064 , 2016
 
?
10

An Improved Stochastic Modeling of Opportunistic Routing in..:

Zeng, Deze ; Guo, Song ; Barnawi, Ahmed..
IEEE Transactions on Computers.  64 (2015)  7 - p. 1819-1829 , 2015
 
?
11

Malware Propagation in Large-Scale Networks:

Yu, Shui ; Gu, Guofei ; Barnawi, Ahmed..
IEEE Transactions on Knowledge and Data Engineering.  27 (2015)  1 - p. 170-179 , 2015
 
?
12

Fool Me If You Can: Mimicking Attacks and Anti-Attacks in C..:

Yu, Shui ; Guo, Song ; Stojmenovic, Ivan
IEEE Transactions on Computers.  64 (2015)  1 - p. 139-151 , 2015
 
?
13

An overview of Fog computing and its security issues:

Stojmenovic, Ivan ; Wen, Sheng ; Huang, Xinyi.
Concurrency and Computation: Practice and Experience.  28 (2015)  10 - p. 2991-3005 , 2015
 
?
14

RSSI-based localization of a wireless sensor node with a fl..:

, In: Proceedings of the 30th Annual ACM Symposium on Applied Computing,
Bohdanowicz, Frank ; Frey, Hannes ; Funke, Rafael... - p. 708-715 , 2015
 
?
15

Algorithms and Architectures for Parallel Processing 

14th International Conference, ICA3PP 2014, Dalian, China, ...  Lecture Notes in Computer Science ; 8630;SpringerLink, Bücher
 
1-15