default search action
Melody Moh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c106]Matthew Gerlits, Melody Moh, Teng-Sheng Moh:
Fast Software-Based Real Time Panoramic Image Processing. IMCOM 2024: 1-8 - [c105]Brandon Weaver, Melody Moh, Teng-Sheng Moh:
Controlling Popularity Bias in Sequential Recommendation Models. AIAI (4) 2024: 98-110 - 2023
- [c104]Ran Li, Melody Moh, Teng-Sheng Moh:
Siamese Neural Networks for Content-based Visual Art Recommendation. IMCOM 2023: 1-8 - [c103]Hima Thota, Melody Moh, Teng-Sheng Moh:
Towards Detecting and Quantifying Identity-Based Polarization in Online Content: A Deep-Learning Approach. WI/IAT 2023: 593-599 - 2022
- [c102]Jiabao Qiu, Melody Moh, Teng-Sheng Moh:
Multi-modal detection of cyberbullying on Twitter. ACM Southeast Regional Conference 2022: 9-16 - [c101]Amala Wilson, Mashhour Solh, Melody Moh:
Exploration of privacy preserving deep learning framework for computer vision tasks. ACM Southeast Regional Conference 2022: 130-137 - [c100]Xincheng Yuan, Melody Moh, Teng-Sheng Moh:
Whole-File Chunk-Based Deduplication Using Reinforcement Learning for Cloud Storage. ASONAM 2022: 269-276 - [c99]Jiabao Qiu, Nihar Hegde, Melody Moh, Teng-Sheng Moh:
Investigating User Information and Social Media Features in Cyberbullying Detection. IEEE Big Data 2022: 3063-3070 - [c98]Kendrick Trinh, Melody Moh, Teng-Sheng Moh:
Adversarial Attacks on Speech Separation Systems. ICMLA 2022: 703-708 - [c97]Paaras Chand, Melody Moh, Teng-Sheng Moh:
An Approach to Improving Anomaly Detection Using Multiple Detectors. IMCOM 2022: 1-8 - [c96]Rakesh Gururaj, Melody Moh, Teng-Sheng Moh, Philip Shilane, Bhimsen Bhanjois:
Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity. IMCOM 2022: 1-8 - [p6]Mariia Surmenok, Melody Moh, Teng-Sheng Moh:
Resource Management for Future Green Mobile Cloud Computing. Green Mobile Cloud Computing 2022: 283-295 - 2021
- [j22]Steven Yen, Melody Moh, Teng-Sheng Moh:
Detecting Compromised Social Network Accounts Using Deep Learning for Behavior and Text Analyses. Int. J. Cloud Appl. Comput. 11(2): 97-109 (2021) - [j21]Nag Mani, Melody Moh, Teng-Sheng Moh:
Defending Deep Learning Models Against Adversarial Attacks. Int. J. Softw. Sci. Comput. Intell. 13(1): 72-89 (2021) - [c95]Jiabao Qiu, Melody Moh, Teng-Sheng Moh:
Fast streaming translation using machine learning with transformer. ACM Southeast Conference 2021: 9-16 - [c94]Vu Le, Ramin Moazeni, Melody Moh:
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. ACeS 2021: 114-127 - [c93]Vinay Ponnaganti, Melody Moh, Teng-Sheng Moh:
Utilizing CNNs for Object Detection with LiDAR Data for Autonomous Driving. IMCOM 2021: 1-6 - [c92]Eric Tjon, Melody Moh, Teng-Sheng Moh:
Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation. IMCOM 2021: 1-8 - 2020
- [c91]Dylan Wang, Melody Moh, Teng-Sheng Moh:
Using Deep Learning and Steam User Data for Better Video Game Recommendations. ACM Southeast Regional Conference 2020: 154-159 - [c90]Melody Moh, Teng-Sheng Moh, Brian Khieu:
No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries. IMCOM 2020: 1-6 - [c89]Dylan Wang, Melody Moh, Teng-Sheng Moh:
Using Deep Learning to Solve Google reCAPTCHA v2's Image Challenges. IMCOM 2020: 1-5 - [c88]Dapeng Guo, Melody Moh, Teng-Sheng Moh:
Vision-Based Autonomous Driving for Smart City: A Case for End-to-End Learning Utilizing Temporal Information. SmartCom 2020: 19-29 - [p5]Melody Moh, David Nguyen, Teng-Sheng Moh, Brian Khieu:
Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus. Blockchain Cybersecurity, Trust and Privacy 2020: 69-97
2010 – 2019
- 2019
- [c87]Brian Khieu, Melody Moh:
CBPKI: Cloud Blockchain-based Public Key Infrastructure. ACM Southeast Regional Conference 2019: 58-63 - [c86]Zi Yan Zhang, Melody Moh:
Randomized Load Balancing for Cloud Computing using Bacterial Foraging Optimization. ACM Southeast Regional Conference 2019: 117-124 - [c85]Nag Mani, Melody Moh, Teng-Sheng Moh:
Towards Robust Ensemble Defense Against Adversarial Examples Attack. GLOBECOM 2019: 1-6 - [c84]Heemany Shekhar, Melody Moh, Teng-Sheng Moh:
Exploring Adversaries to Defend Audio CAPTCHA. ICMLA 2019: 1155-1161 - [c83]Steven Yen, Melody Moh, Teng-Sheng Moh:
CausalConvLSTM: Semi-Supervised Log Anomaly Detection Through Sequence Modeling. ICMLA 2019: 1334-1341 - [c82]Deepika Pathinga Rajendiran, Melody Moh:
Adaptive Hierarchical Cache Management for Cloud RAN and Multi-access Edge Computing in 5G Networks. IMCOM 2019: 234-253 - [c81]Shashank Shivaji Pawar, Melody Moh, Teng-Sheng Moh:
Micro-expression Recognition Using Motion Magnification and Spatiotemporal Texture Map. IMCOM 2019: 351-369 - [c80]Sui Kun Guan, Melody Moh, Teng-Sheng Moh:
Context-based Multi-stage Offline Handwritten Mathematical Symbol Recognition using Deep Learning. HPCS 2019: 185-192 - [c79]Yihang Tang, Deepika Pathinga Rajendiran, Melody Moh:
Cache Management for Cloud RAN and Multi-Access Edge Computing with Dynamic Input. HPCS 2019: 716-723 - [p4]Robinson Raju, Melody Moh, Teng-Sheng Moh:
Compression of Wearable Body Sensor Network Data. Smart Data 2019: 215-242 - [p3]Melody Moh, Robinson Raju:
Using Machine Learning for Protecting the Security and Privacy of Internet of Things (IoT) Systems. Fog and Edge Computing 2019: 223-257 - 2018
- [c78]Kevin Ross, Melody Moh, Teng-Sheng Moh, Jason Yao:
Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection. ACM Southeast Regional Conference 2018: 1:1-1:8 - [c77]Gurpreet Kaur, Melody Moh:
Cloud computing meets 5G networks: efficient cache management in cloud radio access networks. ACM Southeast Regional Conference 2018: 21:1-21:8 - [c76]Tejaswini Choudhari, Melody Moh, Teng-Sheng Moh:
Prioritized task scheduling in fog computing. ACM Southeast Regional Conference 2018: 22:1-22:8 - [c75]Swapnil Gaikwad, Melody Moh, David C. Anastasiu:
Data Structure for Efficient Line of Sight Queries. CIKM 2018: 1535-1538 - [c74]Anusha Sridharan, Melody Moh, Teng-Sheng Moh:
Similarity Estimation for Classical Indian Music. ICMLA 2018: 814-819 - [c73]Gary Su, Melody Moh:
Improving Energy Efficiency and Scalability for IoT Communications in 5G Networks. IMCOM 2018: 50:1-50:8 - [c72]Chin Tsai, Melody Moh:
Cache Management for 5G Cloud Radio Access Networks. IMCOM 2018: 83:1-83:8 - [c71]Melody Moh, Robinson Raju:
Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems. HPCS 2018: 709-715 - [c70]Robinson Raju, Melody Moh, Teng-Sheng Moh:
Compression of Wearable Body Sensor Network Data Using Improved Two-Threshold-Two-Divisor Data Chunking Algorithms. HPCS 2018: 949-956 - [c69]Lingfang Gao, Melody Moh:
Joint Computation Offloading and Prioritized Scheduling in Mobile Edge Computing. HPCS 2018: 1000-1007 - [p2]Behrooz Shahriari, Melody Moh:
Intelligent Mobile Messaging for Smart Cities Based on Reinforcement Learning. Handbook of Smart Cities, Software Services and Cyber Infrastructure 2018: 227-253 - 2017
- [j20]Melody Moh, Teng-Sheng Moh, Yang Peng, Liang Wu:
On adverse drug event extractions using twitter sentiment analysis. Netw. Model. Anal. Health Informatics Bioinform. 6(1): 18 (2017) - [c68]Dennis Hsu, Melody Moh, Teng-Sheng Moh:
Mining Frequency of Drug Side Effects over a Large Twitter Dataset Using Apache Spark. ASONAM 2017: 915-924 - [c67]Chin Tsai, Melody Moh:
Abstract: cache management and load balancing for 5G cloud radio access networks. SoCC 2017: 630 - [c66]Uladzimir Karneyenka, Khushbu Mohta, Melody Moh:
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Networks. HPCS 2017: 168-175 - [c65]Behrooz Shahriari, Melody Moh, Teng-Sheng Moh:
Generic Online Learning for Partial Visible Dynamic Environment with Delayed Feedback: Online Learning for 5G C-RAN Load-Balancer. HPCS 2017: 176-185 - [c64]Chin Tsai, Melody Moh:
Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities. ISSPIT 2017: 259-264 - 2016
- [c63]Yang Peng, Melody Moh, Teng-Sheng Moh:
Efficient adverse drug event extraction using Twitter sentiment analysis. ASONAM 2016: 1011-1018 - [c62]Yan Zhu, Melody Moh, Teng-Sheng Moh:
Multi-layer text classification with voting for consumer reviews. IEEE BigData 2016: 1991-1999 - [c61]Veena Reddy Reguri, Swetha Kogatam, Melody Moh:
Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers. BigDataSecurity/HPSC/IDS 2016: 268-273 - [c60]Fan Yu, Melody Moh, Teng-Sheng Moh:
Towards Extracting Drug-Effect Relation from Twitter: A Supervised Learning Approach. BigDataSecurity/HPSC/IDS 2016: 339-344 - [c59]Vicky Na Zhao, Melody Moh, Teng-Sheng Moh:
Contextual-Aware Hybrid Recommender System for Mixed Cold-Start Problems in Privacy Protection. BigDataSecurity/HPSC/IDS 2016: 400-405 - [c58]Prijila Nair, Melody Moh, Teng-Sheng Moh:
Using Social Media Presence for Alleviating Cold Start Problems in Privacy Protection. CTS 2016: 11-17 - [c57]Suraj Natarajan, Melody Moh:
Recommending News Based on Hybrid User Profile, Popularity, Trends, and Location. CTS 2016: 204-211 - [c56]Poonam Mehetrey, Behrooz Shahriari, Melody Moh:
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds. CTS 2016: 404-411 - [c55]Sushma Sathyanarayana, Melody Moh:
Joint route-server load balancing in software defined networks using ant colony optimization. HPCS 2016: 156-163 - [c54]Behrooz Shahriari, Melody Moh:
Intelligent mobile messaging for urban networks: Adaptive intelligent mobile messaging based on reinforcement learning. WiMob 2016: 1-8 - 2015
- [c53]Akshay Kapoor, Melody Moh:
Implementation and evaluation of the DFF protocol for advanced metering infrastructure (AMI) networks. DRCN 2015: 91-92 - [c52]Matt Talistu, Teng-Sheng Moh, Melody Moh:
Gossip-based spectral clustering of distributed data streams. HPCS 2015: 325-333 - [c51]Melody Moh, Abhiteja Gajjala, Siva Charan Reddy Gangireddy, Teng-Sheng Moh:
On Multi-tier Sentiment Analysis Using Supervised Machine Learning. WI-IAT (1) 2015: 341-344 - 2014
- [c50]Melesio Calderon Munoz, Melody Moh, Teng-Sheng Moh:
Improving smart grid security using Merkle Trees. CNS 2014: 522-523 - [c49]Jing Huang, Kai Wu, Melody Moh:
Dynamic Virtual Machine migration algorithms using enhanced energy consumption model for green cloud data centers. HPCS 2014: 902-910 - [c48]Melesio Calderon Munoz, Melody Moh, Teng-Sheng Moh:
Improving smart grid authentication using Merkle Trees. ICPADS 2014: 793-798 - 2013
- [c47]Zhi Yao Xie, Teng-Sheng Moh, Melody Moh:
ASAP: ad-hoc streaming adaptive protocol for supporting P2P streaming over vehicular ad-hoc networks. ACM Southeast Regional Conference 2013: 27:1-27:6 - [c46]Melody Moh, Rafael Alvarez-Horine:
A successful graduate cloud computing class with hands-on labs. FIE 2013: 1156-1162 - [c45]Surabhi Gaur, Melody Moh, Mahesh Balakrishnan:
Hiding behind the clouds: Efficient, privacy-preserving queries via cloud proxies. GLOBECOM Workshops 2013: 488-493 - 2012
- [c44]Rafael Alvarez-Horine, Melody Moh:
Experimental evaluation of Linux TCP for adaptive video streaming over the cloud. GLOBECOM Workshops 2012: 747-752 - [c43]Raymond Siulai Wong, Teng-Sheng Moh, Melody Moh:
Efficient Semi-supervised Learning BitTorrent Traffic Detection - An Extended Summary - (Poster Paper). ICDCN 2012: 540-543 - [c42]Raymond Siulai Wong, Teng-Sheng Moh, Melody Moh:
Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow Inspections. ICISTM 2012: 152-163 - 2011
- [c41]Li Yang, Melody Moh:
Dual Trust Secure protocol for cluster-based wireless sensor networks. ACSCC 2011: 1645-1649 - 2010
- [c40]Phuong-Quyen Huynh, Pat Jangyodsuk, Melody Moh:
Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover. ICISTM 2010: 176-186 - [c39]Teng-Sheng Moh, Barath Kuppuswamy, Melody Moh:
Prioritizing power management and reducing downtime for energy conservation in data centers. ISCC 2010: 802-804 - [c38]Melody Moh, Teng-Sheng Moh, Ken Chan:
Error-Sensitive Adaptive Frame Aggregation in 802.11n WLAN. WWIC 2010: 64-76 - [p1]Melody Moh, Ji Li:
Mobile Ad Hoc Network Routing. Handbook of Information and Communication Security 2010: 407-420
2000 – 2009
- 2009
- [j19]Melody Moh, Rashmi Kukanur, Xuquan Lin, Subhankar Dhar:
Energy-Efficient Self-Organizing Routing for Wireless Mobile Networks. Int. J. Bus. Data Commun. Netw. 5(4): 52-69 (2009) - [c37]Ji Li, Teng-Sheng Moh, Melody Moh:
Path-Based Reputation System for MANET Routing. WWIC 2009: 48-60 - 2008
- [j18]David Lin, Teng-Sheng Moh, Melody Moh:
RingMesh. IEEE Veh. Technol. Mag. 3(4): 48-55 (2008) - [c36]Xuquan Lin, Melody Moh, Teng-Sheng Moh:
On energy-efficient semi-asynchronous MAC protocols for multi-hop ad-hoc networks. ACSAC 2008: 1-8 - [c35]Melody Moh, Teng-Sheng Moh, Yucheng Shih:
On Enhancing WiMAX Hybrid ARQ: A Multiple-Copy Approach. CCNC 2008: 902-906 - 2007
- [c34]Zachary Walker, Melody Moh, Teng-Sheng Moh:
A Development Platform for Wireless Sensor Networks with Biomedical Applications. CCNC 2007: 768-772 - [c33]Shruthi B. Krishnan, Melody Moh, Teng-Sheng Moh:
Enhancing TCP Performance in Hybrid Networks with Fixed Senders and Mobile Receivers. GLOBECOM 2007: 5265-5270 - 2006
- [j17]W. Melody Moh, Eun Jik Kim, Teng-Sheng Moh:
Design and analysis of distributed power scheduling for data aggregation in wireless sensor networks. Int. J. Sens. Networks 1(3/4): 143-155 (2006) - [c32]David Lin, Teng-Sheng Moh, W. Melody Moh:
A Delay-bounded Multi-Channel Routing Protocol for Wireless Mesh Networks using Multiple Token Rings: Extended Summary. LCN 2006: 845-847 - 2005
- [c31]Oana Andreea Dini, W. Melody Moh, Alexander Clemm:
Web Services: Self-adaptable Trust Mechanisms. AICT/SAPIR/ELETE 2005: 83-89 - [c30]W. Melody Moh, Benjamin Jack Culpepper, Lan Dung, Teng-Sheng Moh, Takeo Hamada, Ching-Fong Su:
On data gathering protocols for in-body biomedical sensor networks. GLOBECOM 2005: 6 - [c29]W. Melody Moh, Marie Dumont, Teng-Sheng Moh, Takeo Hamada, Ching-Fong Su:
Brief announcement: evaluation of tree-based data gathering algorithms for wireless sensor networks. PODC 2005: 239 - [c28]David Lin, Teng-Sheng Moh, W. Melody Moh:
Brief announcement: improved asynchronous group mutual exclusion in token-passing networks. PODC 2005: 275 - [c27]Loc Ho, Melody Moh, Zachary Walker, Takeo Hamada, Ching-Fong Su:
A prototype on RFID and sensor networks for elder healthcare: progress report. E-WIND@SIGCOMM 2005: 70-75 - 2004
- [j16]Benjamin Jack Culpepper, Lan Dung, W. Melody Moh:
Design and analysis of Hybrid Indirect Transmissions (HIT) for data gathering in wireless micro sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(1): 61-83 (2004) - [c26]Tri Pham, Eun Jik Kim, W. Melody Moh:
On Data Aggregation Quality and Energy Efficiency of Wireless Sensor Network Protocols - Extended Summary. BROADNETS 2004: 730-732 - [c25]Chandana Nagaraj, Maggie Nguyen, Layla Pezeshkmehr, Melody Moh:
End-to-end layered multicast of streaming media in heterogeneous networks. IPCCC 2004: 287-292 - [c24]Meetali Goel, Melody Moh, Toru Hasegawa, Shigehiro Ano:
Differentiated-service enabled group communications using bandwidth brokers. IPCCC 2004: 299-304 - 2003
- [j15]W. Melody Moh, Bang Nguyen:
QoS-guaranteed one-to-many and many-to-many multicast routing. Comput. Commun. 26(7): 652-669 (2003) - [c23]Nitin Panjwani, W. Melody Moh:
A Study of DiffServ and Protection Switching in MPLS Using RSVP-TE. Communications in Computing 2003: 58-64 - [c22]Lin Wang, W. Melody Moh, Toru Hasegawa, Shigehiro Ano:
A Two Layer Differentiated Service-Based Protocol for Inter- and Intra-Domain Multicast Routing. Communications in Computing 2003: 65-71 - [c21]Albert Kwok, W. Melody Moh:
A TCP-Friendly Multicast Congestion Control over Wireless Mobile Internet. International Conference on Wireless Networks 2003: 513-519 - 2001
- [j14]David Lee, K. K. Ramakrishnan, W. Melody Moh:
Correctness and performance of the ATM ABR rate control scheme. Comput. Networks 35(2-3): 237-261 (2001) - [c20]Jianmin Mao, W. Melody Moh, Belle Wei:
PQWRR scheduling algorithm in supporting of DiffServ. ICC 2001: 679-684 - [c19]W. Melody Moh, Belle Wei, Jane Huijing Zhu:
Supporting differentiated services with per-class traffic engineering in MPLS. ICCCN 2001: 354-360 - 2000
- [j13]Melody Moh, Gregorie Berquin, Yanjun Chen:
On mobile Internet telephony: mobility support of Signal Initiation Protocol (SIP). ACIS Int. J. Comput. Inf. Sci. 1(4): 184-191 (2000) - [j12]W. Melody Moh, Dongming Yao, Kia Makki:
Analyzing the hidden-terminal effects and multimedia support for wireless LAN. Comput. Commun. 23(10): 998-1013 (2000) - [j11]W. Melody Moh, Madhavi Hegde, Niki Pissinou:
Evaluation of congestion control protocols for ABR traffic over ATM networks. Int. J. Commun. Syst. 13(1): 1-28 (2000) - [j10]W. Melody Moh, Yin Chen:
Multicasting flow control for hybrid wired/wireless ATM networks. Perform. Evaluation 40(1-3): 161-194 (2000) - [j9]Kia Makki, John Dell, Niki Pissinou, W. Melody Moh, Xiaohua Jia:
Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. J. Supercomput. 16(1-2): 117-132 (2000) - [j8]W. Melody Moh, Hua Mei:
Design and evaluation of multicast GFR for supporting TCP/IP over hybrid wired/wireless ATM. Wirel. Networks 6(5): 401-410 (2000) - [c18]W. Melody Moh, Liming Xiang, Xiang Zhao:
Extending BGMP for QoS-Based Inter-Domain Multicasting over the Internet. ICC (2) 2000: 728-734 - [c17]W. Melody Moh, Liming Xiang, Xiang Zhao, Eun Park:
Differentiated-service-based inter-domain multicast routing: enhancement of MBGP. ICCCN 2000: 290-297
1990 – 1999
- 1999
- [j7]Asha Dinesh, W. Melody Moh, Kia Makki:
Design and evaluation of an efficient traffic control scheme for integrated voice, video, and data over asynchronous transfer mode networks: Explicit allowed rate algorithm. Int. J. Commun. Syst. 12(4): 249-279 (1999) - [c16]W. Melody Moh, Bang Nguyen:
An optimal QoS-guaranteed multicast routing algorithm with dynamic membership support. ICC 1999: 727-732 - [c15]Melody Moh, Bang Nguyen:
Minimizing multiple-shared multicast trees for QoS-guaranteed multicast routing. ICCCN 1999: 132-138 - [c14]Melody Moh, Gregorie Berquin, Yanjun Chen:
Mobile IP telephony: mobility support of SIP. ICCCN 1999: 554-559 - 1998
- [j6]David Lee, K. K. Ramakrishnan, W. Melody Moh:
A Formal Specification of the ATM ABR Rate Control Scheme. Comput. Networks 30(19): 1735-1748 (1998) - [c13]W. Melody Moh, Dongming Yao, Kia Makki:
Wireless LAN: Study of Hidden-Terminal Effect and Multimedia Support. ICCCN 1998: 422-431 - 1997
- [j5]W. Melody Moh, Usha Rajgopal, Asha Dinesh:
Design, analysis, and evaluation of an improved scheme for ATM burst-level admission control. Comput. Commun. 20(12): 1107-1122 (1997) - [c12]W. Melody Moh, Sandeep Shenoy:
Evaluation of ABR traffic control schemes for ATM LAN and WAN: effects of congestion indication schemes and ER switch algorithms. Broadband Networking Technologies 1997: 200-211 - [c11]Asha Dinesh, W. Melody Moh:
An efficient traffic control scheme for integrated voice, video and data over ATM networks: explicit allowed rate algorithm (EARA). ICCCN 1997: 398-403 - [c10]W. Melody Moh:
On multicasting ABR protocols for wireless ATM networks. ICNP 1997: 24-31 - [c9]David Lee, K. K. Ramakrishnan, W. Melody Moh, A. Udaya Shankar:
Performance and Correctness of the ATM ABR Rate Control Scheme. INFOCOM 1997: 785-794 - 1996
- [j4]Charles U. Martel, W. Melody Moh, Teng-Sheng Moh:
Dynamic Prioritized Conflict Resolution on Multiple Access Broadcast Networks. IEEE Trans. Computers 45(9): 1074-1079 (1996) - [c8]W. Melody Moh, Yu-Feng Chung, Teng-Sheng Moh, Joanna Wang:
Evaluation of high speed LAN protocols as multimedia carriers . ICCD 1996: 93-98 - [c7]W. Melody Moh, Madhavi Hegde:
Evaluation of ABR Congestion Control Protocols for ATM LAN and WAN. ICNP 1996: 199- - [c6]David Lee, K. K. Ramakrishnan, W. Melody Moh, A. Udaya Shankar:
Protocol Specification Using Parameterized Communicating Extended Finite Stte Machines - A Case Study of The ATM ABR Rate Control Scheme. ICNP 1996: 208-217 - [c5]W. Melody Moh, Joanna Wang, Teng-Sheng Moh:
Modified 100 VG-AnyLAN Protocols for Multimedia Application. PDPTA 1996: 416-419 - [c4]W. Melody Moh, Cheng-Hsin Tan:
Policing of MPEG Video Over ATM Using Neural Networks. PDPTA 1996: 420-431 - 1995
- [j3]W. Melody Moh, Min-Jia Chen, Nui-Ming Chu, Cherng-Der Liao:
Traffic prediction and dynamic bandwidth allocation over ATM: a neural network approach. Comput. Commun. 18(8): 563-571 (1995) - [c3]W. Melody Moh, Yu-Jen Chien, Irene Zhang, Teng-Sheng Moh:
Delay performance evaluation of high speed protocols for multimedia communications. ICCCN 1995: 352 - [c2]W. Melody Moh, Charles U. Martel, Teng-Sheng Moh:
Using Multiple Access Broadcast Network Algorithms for CRCW PRAM Simulations. Parallel and Distributed Computing and Systems 1995: 411-415 - 1991
- [j2]Charles U. Martel, W. Melody Moh:
Optimal Prioritized Conflict Resolution on a Multiple Access Channel. IEEE Trans. Computers 40(10): 1102-1108 (1991) - 1990
- [j1]Biswanath Mukherjee, Conrad K. Kwok, Andrea C. Lantz, W. Melody Moh:
Comments on 'Exact analysis of asymmetric polling systems with single buffers'. IEEE Trans. Commun. 38(7): 944-946 (1990)
1980 – 1989
- 1989
- [c1]Biswanath Mukherjee, Andrea C. Lantz, Norman S. Matloff, W. Melody Moh:
Dynamic Control of the p1-Persistent Protocol Using Channel Feedback. INFOCOM 1989: 858-865
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint