| 2008 |
| 13 | EE | Jing Yuan,
Zhu Li,
Ruixi Yuan:
Information Entropy Based Clustering Method for Unsupervised Internet Traffic Classification.
ICC 2008: 1588-1592 |
| 12 | EE | Chengjie Wu,
Ruixi Yuan,
Hongchao Zhou:
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks.
VTC Spring 2008: 113-117 |
| 11 | EE | Yong He,
Ruixi Yuan,
Xiaojun Ma,
Jun Li:
The IEEE 802.11 Power Saving Mechanism: An Experimental Study.
WCNC 2008: 1362-1367 |
| 2007 |
| 10 | EE | Ruixi Yuan,
Li Zhao,
Wenyu Wang:
Cooperation and Competition Dynamics in an Online Game Community.
HCI (15) 2007: 475-484 |
| 9 | EE | Zhu Li,
Ruixi Yuan,
Xiaohong Guan:
Traffic Classification - Towards Accurate Real Time Network Applications.
HCI (4) 2007: 67-76 |
| 8 | EE | Zhu Li,
Ruixi Yuan,
Xiaohong Guan:
Accurate Classification of the Internet Traffic Based on the SVM Method.
ICC 2007: 1373-1378 |
| 7 | EE | Yong He,
Ruixi Yuan,
Xiaojun Ma,
Jun Li,
C. Wang:
Scheduled PSM for Minimizing Energy in Wireless LANs.
ICNP 2007: 154-163 |
| 2006 |
| 6 | EE | Haoran Feng,
Ruixi Yuan,
Chundi Mu:
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks.
CIT 2006: 232 |
| 5 | EE | Ruixi Yuan,
Qianchuan Zhao,
Hong Cai,
Wenyu Wang,
Hui Li:
Service Selection Modeling in Networked Environments.
ICEBE 2006: 298-301 |
| 4 | EE | Wenyu Wang,
Li Zhao,
Ruixi Yuan:
Improving cooperation in peer-to-peer systems using social networks.
IPDPS 2006 |
| 1997 |
| 3 | | Dipankar Raychaudhuri,
Leslie J. French,
Robert J. Siracusa,
Subir K. Biswas,
Ruixi Yuan,
Partha Narasimhan,
Cesar A. Johnston:
WATMnet: A Prototype Wireless ATM System for Multimedia Personal Communication.
IEEE Journal on Selected Areas in Communications 15(1): 83-95 (1997) |
| 1996 |
| 2 | | Ruixi Yuan,
Subir K. Biswas,
Leslie J. French,
Jun Li,
Dipankar Raychaudhuri:
A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks.
MONET 1(3): 287-298 (1996) |
| 1995 |
| 1 | | Ruixi Yuan:
Traffic Pattern Based Mobile Routing Scheme.
Computer Communications 18(1): 32-36 (1995) |