Search

Your search keyword '"Xiaojiang Chen"' showing total 68 results

Search Constraints

Start Over You searched for: Author "Xiaojiang Chen" Remove constraint Author: "Xiaojiang Chen" Publisher ieee Remove constraint Publisher: ieee
68 results on '"Xiaojiang Chen"'

Search Results

1. R&P: An Low-Cost Device-Free Activity Recognition for E-Health

2. Social Connection Aware Team Formation for Participatory Tasks

4. Fitness-guided Resilience Testing of Microservice-based Applications

5. Demand-side Ubiquitous Electric power Internet of Things: Architecture, Functionalities and Technologies

6. Design and application of intelligent concentrator based on Internet of things

7. Research on Intelligent Concentrator Based on Edge Computing Technology

8. Social Connection Aware Team Formation for Participatory Tasks

9. WisDriver:A WiFi and Smartphone Sensing System for Safely Driving

10. WiMi: Target Material Identification with Commodity Wi-Fi Devices

11. GCC-beta: Improving Interactive Live Video Streaming via an Adaptive Low-Latency Congestion Control

12. Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing

13. SpeAR: A Fast AR System with High Accuracy Deployed on Mobile Devices

14. AppIS: Protect Android Apps Against Runtime Repackaging Attacks

15. 2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue

16. SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation

17. Exploit dynamic data flows to protect software against semantic attacks

18. Protect Sensitive Information against Channel State Information Based Attacks

19. Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization

20. iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization

21. iGuard: A real-time anti-theft system for smartphones

22. Watch Traffic in the Sky: A Method for Path Selection in Packet Transmission between V2V from Macro Perspective

23. Smoggy-Link: Fingerprinting interference for predictable wireless concurrency

24. Exploiting Dynamic Scheduling for VM-Based Code Obfuscation

25. SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone

26. DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN

27. Analysis of spectrum utilization for ISM band cognitive Radio Sensor Networks

28. DualSync: Taming clock skew variation for synchronization in low-power wireless networks

29. FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas

30. Analysis of an Unreliable Opportunistic Spectrum Sharing System under Multiple Call Collision Results

31. LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs

32. Multi-link Passive Localization with Low Cost in Wireless Sensor Networks

33. A survival condition model of earthen sites based on the danger theory

34. Who Move the Treasures: A RFID-based Approach for the Treasures

35. RPC: A Localization Method Based on Regional Partition and Cooperation

39. DE2: Localization with the Rotating RSS Using a Single Beacon

40. DLF: Target Detection and Localization in Wireless Network

41. Prioritizing the Data in the Target-Tracking Wireless Sensor Networks

42. Bandwidth Reservation for Target Tracking in Region-Base Wireless Sensor Networks

43. An Immune Theory Based Health Monitoring and Risk Evaluation of Earthen Sites with Internet of Things

44. LCS: Compressive sensing based device-free localization for multiple targets in sensor networks

45. RDL: A novel approach for passive object localization in WSN based on RSSI

46. The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health Monitoring

47. A Reliable Transmission Protocol Based on Dynamic Link Cache

48. A QoS Architecture for IOT

49. RP2PT: A reliable point-to-point transport protocol for wireless sensor networks

50. A Software Protection Framework Based on Thin Virtual Machine Using Distorted Encryption

Catalog

Books, media, physical & digital resources