default search action
Whay Chiou Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [j8]Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 4(1): 140-150 (2009) - [c13]Whay Chiou Lee, John R. Barr, Steve Emeott, Ravi Ramamirtham, Dave Silk:
Policy-Based Service Provisioning in a Wireless Network with Variable Channel Data Rates. CCNC 2009: 1-2 - 2008
- [j7]Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
Alert propagation in mobile ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1): 23-25 (2008) - 2007
- [j6]Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
A scalable public key management scheme in wireless ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 69-70 (2007) - [c12]Liang Guo, Whay Chiou Lee, Ying-Ieh Lin:
On dynamic packet fragmentation for traffic integration over bandwidth-limited links. AccessNets 2007: 1-8 - [c11]Jeffrey Q. Bao, Whay Chiou Lee:
Rapid Deployment of Wireless Ad Hoc Backbone Networks for Public Safety Incident Management. GLOBECOM 2007: 1217-1221 - [c10]Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. PerCom 2007: 201-210 - 2006
- [c9]Liang Guo, Whay Chiou Lee, Anthony R. Metke, Deepak Bansal:
Intra-Domain Routing Topology Bandwidth Management Architecture. ICCCN 2006: 25-32 - 2004
- [c8]Jeffrey Q. Bao, Whay Chiou Lee:
Collision-aware channel monitoring at the link layer of a wireless network. WCNC 2004: 733-737 - 2003
- [j5]Deepak Bansal, Jeffrey Q. Bao, Whay Chiou Lee:
QoS-enabled residential gateway architecture. IEEE Commun. Mag. 41(4): 83-89 (2003) - [c7]King-Shan Lui, Whay Chiou Lee, Klara Nahrstedt:
Link layer multi-priority frame forwarding. ICC 2003: 1573-1577 - 2002
- [j4]King-Shan Lui, Whay Chiou Lee, Klara Nahrstedt:
STAR: a transparent spanning tree bridge protocol with alternate routing. Comput. Commun. Rev. 32(3): 33-46 (2002)
1990 – 1999
- 1999
- [c6]Firass Abi-Nassif, Whay Chiou Lee, Ioannis Stavrakakis:
Offered load estimation in a multimedia cable network system. ICC 1999: 140-146 - 1995
- [j3]Whay Chiou Lee:
Topology aggregation for hierarchical routing in ATM networks. Comput. Commun. Rev. 25(2): 82-92 (1995) - [j2]Whay Chiou Lee, Michael G. Hluchyi, Pierre A. Humblet:
Routing subject to quality of service constraints in integrated communication networks. IEEE Netw. 9(4): 46-55 (1995) - [j1]Whay Chiou Lee, Pierre A. Humblet:
Space-time characteristics of ALOHA protocols in high-speed bidirectional bus networks. IEEE/ACM Trans. Netw. 3(5): 613-622 (1995) - [c5]Whay Chiou Lee:
Spanning Tree Method for Link State Aggregation in Large Communication Networks. INFOCOM 1995: 297-302 - 1994
- [c4]Pierre A. Humblet, Whay Chiou Lee, Michael G. Hluchyj:
Buffer Allocation for Frame Reassembly and Queueing in ATM Networks. INFOCOM 1994: 510-515 - [c3]Whay Chiou Lee, Michael G. Hluchyj:
Dynamic Connection Management for Call-Level QOS Guarantee in Integrated Communication Networks. INFOCOM 1994: 1073-1082 - 1993
- [c2]Whay Chiou Lee, Michael G. Hluchyj, Pierre A. Humblet:
Rule-Based Call-by-Call Source Routing for Integrated Communication Networks. INFOCOM 1993: 987-993 - 1991
- [c1]Whay Chiou Lee, Pierre A. Humblet:
Slotted ALOHA in High Speed Bidirectional Bus Networks. INFOCOM 1991: 221-227
1980 – 1989
- 1989
- [b1]Whay Chiou Lee:
Channel reuse multiple access in bidirectional bus networks. Massachusetts Institute of Technology, Cambridge, MA, USA, 1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint