default search action
Lusheng Ji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j8]M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
Characterizing and Optimizing Cellular Network Performance During Crowded Events. IEEE/ACM Trans. Netw. 24(3): 1308-1321 (2016) - [c25]Bo Yan, Rittwik Jana, Shu Shi, Yang Xu, Bo Han, Vijay Gopalakrishnan, Lusheng Ji, H. Jonathan Chao:
Architecting Multimedia Conferencing Service using SDN. CAN@CoNEXT 2016: 13-18 - [c24]Bo Han, Feng Qian, Lusheng Ji, Vijay Gopalakrishnan:
MP-DASH: Adaptive Video Streaming Over Preference-Aware Multipath. CoNEXT 2016: 129-143 - [c23]Feng Qian, Lusheng Ji, Bo Han, Vijay Gopalakrishnan:
Optimizing 360 video delivery over cellular networks. ATC@MobiCom 2016: 1-6 - [c22]Bo Han, Feng Qian, Lusheng Ji:
When should we surf the mobile web using both wifi and cellular? ATC@MobiCom 2016: 7-12 - 2015
- [j7]Bo Han, Vijay Gopalakrishnan, Lusheng Ji, Seungjoon Lee:
Network function virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53(2): 90-97 (2015) - [j6]M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks. IEEE Trans. Mob. Comput. 14(7): 1369-1381 (2015) - [c21]Bo Han, Feng Qian, Shuai Hao, Lusheng Ji:
An anatomy of mobile web performance over multipath TCP. CoNEXT 2015: 5:1-5:7 - 2014
- [c20]Muhammad Zubair Shafiq, Jeffrey Erman, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Understanding the impact of network dynamics on mobile video user engagement. SIGMETRICS 2014: 367-379 - 2013
- [j5]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic. IEEE/ACM Trans. Netw. 21(6): 1960-1973 (2013) - [c19]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
A first look at cellular network performance during crowded events. SIGMETRICS 2013: 17-28 - 2012
- [j4]Bo Han, Lusheng Ji, Seungjoon Lee, Bobby Bhattacharjee, Robert R. Miller:
Are all bits equal?: experimental study of IEEE 802.11 communication bit errors. IEEE/ACM Trans. Netw. 20(6): 1695-1706 (2012) - [c18]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Characterizing geospatial dynamics of application usage in a 3G cellular data network. INFOCOM 2012: 1341-1349 - [c17]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
A first look at cellular machine-to-machine traffic: large scale measurement and characterization. SIGMETRICS 2012: 65-76 - 2011
- [c16]Chonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand:
Network selection for secondary users in cognitive radio systems. INFOCOM 2011: 2741-2749 - [c15]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jia Wang:
Characterizing and modeling internet traffic dynamics of cellular devices. SIGMETRICS 2011: 305-316 - 2010
- [c14]Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu:
TowerDefense: Deployment strategies for battling against IP prefix hijacking. ICNP 2010: 134-143 - [c13]Bo Han, Aaron Schulman, Francesco Gringoli, Neil Spring, Bobby Bhattacharjee, Lorenzo Nava, Lusheng Ji, Seungjoon Lee, Robert R. Miller:
Maranello: Practical Partial Packet Recovery for 802.11. NSDI 2010: 205-218
2000 – 2009
- 2009
- [c12]Chonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand:
Network Selection in Cognitive Radio Systems. GLOBECOM 2009: 1-6 - [c11]Bo Han, Lusheng Ji, Seungjoon Lee, Robert R. Miller, Bobby Bhattacharjee:
Channel Access Throttling for Overlapping BSS Management. ICC 2009: 1-6 - [c10]Bo Han, Lusheng Ji, Seungjoon Lee, Bobby Bhattacharjee, Robert R. Miller:
All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009: 1602-1610 - [c9]Bo Han, Lusheng Ji, Seungjoon Lee, Robert R. Miller, Bobby Bhattacharjee:
Channel Access Throttling for Improving WLAN QoS. SECON 2009: 1-9 - [c8]Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani:
Locating Prefix Hijackers using LOCK. USENIX Security Symposium 2009: 135-150 - 2008
- [j3]Chonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand:
Voice communications over zigbee networks. IEEE Commun. Mag. 46(1): 121-127 (2008) - 2007
- [j2]Tamer Nadeem, Lusheng Ji:
Location-Aware IEEE 802.11 for Spatial Reuse Enhancement. IEEE Trans. Mob. Comput. 6(10): 1171-1184 (2007) - [c7]Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis:
A light-weight distributed scheme for detecting ip prefix hijacks in real-time. SIGCOMM 2007: 277-288 - 2005
- [c6]Tamer Nadeem, Lusheng Ji, Ashok K. Agrawala, Jonathan R. Agre:
Location enhancement to IEEE 802.11 DCF. INFOCOM 2005: 651-663 - 2004
- [c5]Yannis Labrou, Jonathan R. Agre, Lusheng Ji, Jesus Molina, Wei-lun Chen:
Wireless Wallet. MobiQuitous 2004: 32-41 - 2003
- [j1]Lusheng Ji, M. Scott Corson:
Explicit Multicasting for Mobile Ad Hoc Networks. Mob. Networks Appl. 8(5): 535-549 (2003) - [c4]Tadashige Iwao, Satoshi Amamiya, Kenichi Takahashi, Guoqiang Zhong, Tatsuya Kainuma, Lusheng Ji, Makoto Amamiya:
An Information Notification Model with VPC on KODAMA in an Ubiquitous Computing Environment, and Its Experiment. CIA 2003: 30-45 - 2001
- [c3]Lusheng Ji, M. Scott Corson:
Differential Destination Multicast - A MANET Multicast Routing Protocol for Small Groups. INFOCOM 2001: 1192-1202
1990 – 1999
- 1999
- [c2]Lusheng Ji, Mary Ishibashi, M. Scott Corson:
An approach to mobile ad hoc network protocol kernel design. WCNC 1999: 1303-1307 - 1997
- [c1]Niki Pissinou, Kia Makki, Mei Hong, Lusheng Ji, Ashok Kumar:
An Agent-Based Mobile System. ER 1997: 361-374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint