dblp.uni-trier.dewww.uni-trier.de

Wei Yu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
86EEPeyman Razaghi, Wei Yu: Parity Forwarding for Multiple-Relay Networks. IEEE Transactions on Information Theory 55(1): 158-173 (2009)
85EEMarko Aleksic, Peyman Razaghi, Wei Yu: Capacity of a Class of Modulo-Sum Relay Channels. IEEE Transactions on Information Theory 55(3): 921-930 (2009)
2008
84EEBehrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian beamforming for MIMO amplify-and-forward relaying. CISS 2008: 161-166
83EEHayssam Dahrouj, Wei Yu: Coordinated beamforming for the multi-cell multi-antenna wireless system. CISS 2008: 429-434
82EEWei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao: On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365
81EERyan Pries, Wei Yu, Xinwen Fu, Wei Zhao: A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582
80EEXuhua Ding, Wei Yu, Ying Pan: A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. ICC 2008: 1605-1609
79EECésar A. Galindo-Legaria, Torsten Grabs, Sreenivas Gukal, Steve Herbert, Aleksandras Surna, Shirley Wang, Wei Yu, Peter Zabback, Shin Zhang: Optimizing Star Join Queries for Data Warehousing in Microsoft SQL Server. ICDE 2008: 1190-1199
78EENan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das: Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508
77EEWei Yu, Junpeng Chen, Guoying Yu: Discovering Entities Relationships on the Web. ICSC 2008: 490-491
76EELuobei Kuang, Ming Xu, Wei Yu: EMDF - A Broadcast Scheduling Policy for Wireless Multi-hop Networks with Interference Constraint. ICYCS 2008: 599-604
75EEXun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao: iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938
74EERyan Pries, Wei Yu, Steve Graham, Xinwen Fu: On performance bottleneck of anonymous communication networks. IPDPS 2008: 1-11
73EEWei Yu, Sriram Chellappan, Xun Wang, Dong Xuan: Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Computer Communications 31(17): 4005-4017 (2008)
72EEZhu Ji, Wei Yu, K. J. Ray Liu: A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs. IEEE Journal on Selected Areas in Communications 26(7): 1204-1217 (2008)
71EEBehrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian beamforming for MIMO amplify-and-forward relaying. IEEE Journal on Selected Areas in Communications 26(8): 1397-1407 (2008)
70EEJun Yuan, Wei Yu: Joint source coding, routing and power allocation in wireless sensor networks. IEEE Transactions on Communications 56(6): 886-896 (2008)
69EEWei Yu, K. J. Ray Liu: Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach. IEEE Transactions on Information Forensics and Security 3(2): 317-330 (2008)
68EEDawn N. Jutla, Wei Yu: Applying the Delta model to mobile marketing management in the US marketplace. IJEB 6(3): 216-231 (2008)
67EEJangwon Lee, Wei Yu, Xinwen Fu: Energy-efficient target detection in sensor networks using line proxies. Int. J. Communication Systems 21(3): 251-275 (2008)
2007
66 Sean H. J. Kim, Sunwoo Park, Wei Yu, Keith E. Mostov, Michael A. Matthay, C. Anthony Hunt: Systems Modeling of Alveolar Morphogenesis In Vitro. CAINE 2007: 141-144
65EEWei Yu, Qing Li, Junpeng Chen, Jiaheng Cao: OS_RANK: Structure Analysis for Ontology Ranking. ICDE Workshops 2007: 339-346
64EEWei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao: DSSS-Based Flow Marking Technique for Invisible Traceback. IEEE Symposium on Security and Privacy 2007: 18-32
63EEMarko Aleksic, Peyman Razaghi, Wei Yu: Capacity of a Class of Modulo-Sum Relay Channels CoRR abs/0704.3591: (2007)
62EEBehrouz Khoshnevis, Wei Yu, Raviraj Adve: Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying CoRR abs/0710.5758: (2007)
61EEPeyman Razaghi, Wei Yu: Parity Forwarding for Multiple-Relay Networks CoRR abs/0711.2712: (2007)
60EETruman Chiu-Yam Ng, Wei Yu: Joint optimization of relay strategies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications 25(2): 328-339 (2007)
59EEWei Yu, Yan Lindsay Sun, K. J. Ray Liu: Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Trans. Dependable Sec. Comput. 4(3): 228-242 (2007)
58EEWei Yu, K. J. Ray Liu: Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(5): 507-521 (2007)
57EEWei Yu, K. J. Ray Liu: Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. IEEE Transactions on Information Forensics and Security 2(2): 227-239 (2007)
56EEWei Yu, Zhu Ji, K. J. Ray Liu: Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. IEEE Transactions on Information Forensics and Security 2(2): 240-253 (2007)
55EELei Xiao, Thomas E. Fuja, Jörg Kliewer, D. Costello Razaghi, Wei Yu: Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels. IEEE Transactions on Information Theory 53(10): 3723-3739 (2007)
54EEV. M. K. Chan, Wei Yu: Multiuser Spectrum Optimization for Discrete Multitone Systems With Asynchronous Crosstalk. IEEE Transactions on Signal Processing 55(11): 5425-5435 (2007)
53EEWei Yu, Tian Lan: Transmitter Optimization for the Multi-Antenna Downlink With Per-Antenna Power Constraints. IEEE Transactions on Signal Processing 55(6-1): 2646-2660 (2007)
52EEWei Yu, Bo Zheng, Rob Watson, Gérard Lachapelle: Differential combining for acquiring weak GPS signals. Signal Processing 87(5): 824-840 (2007)
2006
51EEWei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao: On Detecting Camouflaging Worm. ACSAC 2006: 235-244
50EEXinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham: On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218
49EEJun Yuan, Wei Yu: Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach. GLOBECOM 2006
48EEMohamed Saad, Alberto Leon-Garcia, Wei Yu: Rate Allocation under Network End-to-End Quality-of-Service Requirements. GLOBECOM 2006
47EEYan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. INFOCOM 2006
46EEZhu Ji, Wei Yu, K. J. Ray Liu: An Optimal Dynamic Pricing Framework for Autonomous Mobile Ad Hoc Networks. INFOCOM 2006
45EEWei Yu, Nan Zhang, Wei Zhao: Self-adaptive Worms and Countermeasures. SSS 2006: 548-562
44EEPeyman Razaghi, Wei Yu: Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels CoRR abs/cs/0609018: (2006)
43EEWei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan: Effective query aggregation for data services in sensor networks. Computer Communications 29(18): 3733-3744 (2006)
42EEJun Yuan, Zongpeng Li, Wei Yu, Baochun Li: A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(11): 2092-2103 (2006)
41EEYan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2): 305-317 (2006)
40EEZhi-Quan Luo, Wei Yu: An Introduction to Convex Optimization for Communications and Signal Processing. IEEE Journal on Selected Areas in Communications 24(8): 1426-1438 (2006)
39EEWei Yu, Fangting Sun, Jason E. Fritts: Efficient rate control for JPEG-2000. IEEE Trans. Circuits Syst. Video Techn. 16(5): 577-589 (2006)
38EEWei Yu, John M. Cioffi: Constant-power waterfilling: performance bound and low-complexity implementation. IEEE Transactions on Communications 54(1): 23-28 (2006)
37EERaphael Cendrillon, Wei Yu, Marc Moonen, Jan Verlinden, Tom Bostoen: Optimal multiuser spectrum balancing for digital subscriber lines. IEEE Transactions on Communications 54(5): 922-933 (2006)
36EEWei Yu, Raymond Lui: Dual Methods for Nonconvex Spectrum Optimization of Multicarrier Systems. IEEE Transactions on Communications 54(7): 1310-1322 (2006)
35EEWei Yu: Uplink-downlink duality via minimax duality. IEEE Transactions on Information Theory 52(2): 361-374 (2006)
34EEWei Yu: Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition. IEEE Transactions on Information Theory 52(2): 754-759 (2006)
33EEWei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao: Distributed policy processing in active-service based infrastructures. Int. J. Communication Systems 19(7): 727-750 (2006)
2005
32EEKin F. Li, Yali Wang, Shojiro Nishio, Wei Yu: A Formal Approach to Evaluate and Compare Internet Search Engines: A Case Study on Searching the Chinese Web. APWeb 2005: 195-206
31EEWei Yu, Dawn N. Jutla, Shyamala C. Sivakumar: A Churn-Strategy Alignment Model for Managers in Mobile Telecom. CNSR 2005: 48-53
30EERubin Wang, Wei Yu: A Stochastic Nonlinear Evolution Model and Dynamic Neural Coding on Spontaneous Behavior of Large-Scale Neuronal Population. ICNC (1) 2005: 490-498
29EEWei Yu, Yan Sun, K. J. Ray Liu: HADOF: defense against routing disruptions in mobile ad hoc networks. INFOCOM 2005: 1252-1261
28EEShankar Pal, Istvan Cseri, Oliver Seeliger, Michael Rys, Gideon Schaller, Wei Yu, Dragan Tomic, Adrian Baras, Brandon Berg, Denis Churin, Eugene Kogan: XQuery Implementation in a Relational Database System. VLDB 2005: 1175-1186
27EEKin F. Li, Wei Yu, Shojiro Nishio, Yali Wang: Finding the search engine that works for you. WWW (Special interest tracks and posters) 2005: 920-921
26EEWei Yu, Sriram Chellappan, Dong Xuan: P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Generation Comp. Syst. 21(1): 209-219 (2005)
25EEWei Yu, K. J. Ray Liu: Attack-resistant cooperation stimulation in autonomous ad hoc networks. IEEE Journal on Selected Areas in Communications 23(12): 2260-2271 (2005)
24EEWei Yu, David P. Varodayan, John M. Cioffi: Trellis and convolutional precoding for transmitter-based interference presubtraction. IEEE Transactions on Communications 53(7): 1220-1230 (2005)
2004
23EEJian Xu, Wei Yu, Kexing Rui, Gregory Butler: Use Case Refactoring: A Tool and a Case Study. APSEC 2004: 484-491
22EEWei Yu, Jun Li, Greg Butler: Refactoring Use Case Models on Episodes. ASE 2004: 328-331
21EEWei Yu: Integrated Rate Control and Entropy Coding for JPEG 2000. Data Compression Conference 2004: 152-161
20EEFangting Sun, Wei Yu: Optimal Buffer-Constrained Bit Allocation using Marginal Analysis. Data Compression Conference 2004: 565
19EEWei Yu: Analyze the Worm-Based Attack in Large Scale P2P. HASE 2004: 308-309
18 Shengbing Ren, Gregory Butler, Kexing Rui, Jian Xu, Wei Yu, Renhang Luo: A Prototype Tool for Use Case Refactoring. ICEIS (3) 2004: 173-178
17EEWei Yu: P2P-based Infrastructure for Efficient Communication Service in Large Scale IP Networks. ISPAN 2004: 514-519
16 Wei Yu, Wonjong Rhee, Stephen P. Boyd, John M. Cioffi: Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 50(1): 145-152 (2004)
15 Wei Yu, John M. Cioffi: Sum Capacity of Gaussian Vector Broadcast Channels. IEEE Transactions on Information Theory 50(9): 1875-1892 (2004)
14EEWonjong Rhee, Wei Yu, John M. Cioffi: The optimality of beamforming in uplink multiuser wireless systems. IEEE Transactions on Wireless Communications 3(1): 86-96 (2004)
13EEFangting Sun, David Fernández-Baca, Wei Yu: Inverse parametric sequence alignment. J. Algorithms 53(1): 36-54 (2004)
12EEWei Yu, Jian Wang: Scalable network resource management for large scale Virtual Private Networks. Simulation Modelling Practice and Theory 12(3-4): 263-285 (2004)
2003
11EEWei Yu, Z. Meral Özsoyoglu, Gultekin Özsoyoglu: XML Restructuring and Integration for Tabular Data. DEXA 2003: 233-243
10 Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao: Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91
9 Wei Yu, Jian Wang: Distributed Bandwidth Allocation for the Virtual Private Network. International Conference on Internet Computing 2003: 486-488
2002
8EEFangting Sun, David Fernández-Baca, Wei Yu: Inverse Parametric Sequence Alignment. COCOON 2002: 97-106
7 Qi Zhang, Sally A. Goldman, Wei Yu, Jason E. Fritts: Content-Based Image Retrieval Using Multiple-Instance Learning. ICML 2002: 682-689
6 Wei Yu, Ruibiao Qiu, Jason E. Fritts: Advantages of motion-JPEG2000 in video processing. VCIP 2002: 635-645
2001
5EEWeiyu Wu, Peng Pan, Hua Li, Wei Yu, Dongmei Liang: A Framework and Implementation Techniques for Cooperative Architectural Engineering Design Systems. CSCWD 2001: 218-222
2000
4 Wei Yu, John M. Cioffi: FDMA Capacity of the Gaussian Multiple Access Channel With ISI. ICC (3) 2000: 1365-1369
1998
3EEKazuyuki Murase, Takaharu Wakida, Ryoichi Odagiri, Wei Yu, Hirotaka Akita, Tatsuya Asai: Back-Propagation Learning of Autonomous Behaviour: A Mobile Robot Khepera Took a Lesson from the Future Consequences. ICES 1998: 280-286
2EERyoichi Odagiri, Wei Yu, Tatsuya Asai, Kazuyuki Murase: Analysis of the Scenery Perceived by a Real Mobile Robot Khepera. ICES 1998: 295-302
1993
1 Shiyi Mao, Pinxing Lin, Wei Yu: A new insight to the ANN-based multitarget tracking data association. ISCAS 1993: 2423-2426

Coauthor Index

1Raviraj Adve [62] [71] [84]
2Hirotaka Akita [3]
3Marko Aleksic [63] [85]
4Tatsuya Asai [2] [3]
5Adrian Baras [28]
6Brandon Berg [28]
7Riccardo Bettati [10] [82]
8Tom Bostoen [37]
9Stephen P. Boyd [16]
10Gregory Butler (Greg Butler) [18] [22] [23]
11Prasad Calyam [51]
12Jiaheng Cao [65]
13Raphael Cendrillon [37]
14V. M. K. Chan [54]
15Sriram Chellappan [26] [33] [73]
16Junpeng Chen [65] [77]
17Dan Cheng [50]
18Denis Churin [28]
19John M. Cioffi [4] [14] [15] [16] [24] [38]
20Istvan Cseri [28]
21Hayssam Dahrouj [83]
22Sajal K. Das [78]
23Xuhua Ding [80]
24David Fernández-Baca [8] [13]
25Jason E. Fritts [6] [7] [39]
26Xinwen Fu [50] [64] [67] [74] [75] [78] [81] [82]
27Thomas E. Fuja [55]
28César A. Galindo-Legaria [79]
29Sally A. Goldman [7]
30Torsten Grabs [79]
31Steve Graham [50] [64] [74]
32Sreenivas Gukal [79]
33Zhu Han [41] [47]
34Steve Herbert [79]
35C. Anthony Hunt [66]
36Zhu Ji [46] [56] [72]
37Dawn N. Jutla [31] [68]
38Behrouz Khoshnevis [62] [71] [84]
39Sean H. J. Kim [66]
40Jörg Kliewer [55]
41Eugene Kogan [28]
42Luobei Kuang [76]
43Gérard Lachapelle [52]
44Tian Lan [53]
45Thang Nam Le [43]
46Jangwon Lee [43] [67]
47Alberto Leon-Garcia [48]
48Baochun Li [42]
49Hua Li [5]
50Jun Li [22]
51Kin F. Li [27] [32]
52Qing Li [65]
53Zongpeng Li [42]
54Dongmei Liang [5]
55Pinxing Lin [1]
56K. J. Ray Liu [25] [29] [41] [46] [47] [56] [57] [58] [59] [69] [72]
57Raymond Lui [36]
58Renhang Luo [18]
59Zhi-Quan Luo [40]
60Shiyi Mao [1]
61Michael A. Matthay [66]
62Marc Moonen [37]
63Keith E. Mostov [66]
64Kazuyuki Murase [2] [3]
65Truman Chiu-Yam Ng [60]
66Shojiro Nishio (Shojiro Muro) [27] [32]
67Ryoichi Odagiri [2] [3]
68Gultekin Özsoyoglu [11]
69Z. Meral Özsoyoglu [11]
70Shankar Pal [28]
71Peng Pan [5]
72Ying Pan [80]
73Sunwoo Park [66]
74Ryan Pries [74] [81]
75Ruibiao Qiu [6]
76D. Costello Razaghi [55]
77Peyman Razaghi [44] [61] [63] [85] [86]
78Sandeep K. Reddy [10]
79Shengbing Ren [18]
80Wonjong Rhee [14] [16]
81Kexing Rui [18] [23]
82Michael Rys [28]
83Mohamed Saad [48]
84Gideon Schaller [28]
85Oliver Seeliger [28]
86Shyamala C. Sivakumar [31]
87Kevin Streff [50]
88Fangting Sun [8] [13] [20] [39]
89Yan Lindsay Sun (Yan Sun) [29] [41] [47] [59]
90Aleksandras Surna [79]
91Xuejun Tan [50]
92Dragan Tomic [28]
93David P. Varodayan [24]
94Jan Verlinden [37]
95Takaharu Wakida [3]
96Jian Wang [9] [12]
97Rubin Wang [30]
98Shirley Wang [79]
99Xun Wang [51] [73] [75]
100Yali Wang [27] [32]
101Rob Watson [52]
102Weiyu Wu [5]
103Lei Xiao [55]
104Jian Xu [18] [23]
105Ming Xu [76]
106Dong Xuan [10] [26] [33] [43] [51] [64] [73] [75]
107Guoying Yu [77]
108Jun Yuan [42] [49] [70]
109Peter Zabback [79]
110Qi Zhang [7]
111Shin Zhang [79]
112Nan Zhang [45] [78] [82]
113Wei Zhao [10] [33] [45] [51] [64] [75] [81] [82]
114Bo Zheng [52]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)