Effective capacity: a wireless link model for support of quality of service D Wu, R Negi IEEE Transactions on wireless communications 2 (4), 630-643, 2003 | 1386 | 2003 |
Streaming video over the Internet: approaches and directions D Wu, YT Hou, W Zhu, YQ Zhang, JM Peha IEEE Transactions on circuits and systems for video technology 11 (3), 282-300, 2001 | 1172 | 2001 |
Transporting real-time video over the Internet: Challenges and approaches D Wu, YT Hou, YQ Zhang Proceedings of the IEEE 88 (12), 1855-1877, 2000 | 589 | 2000 |
SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks Q He, D Wu, P Khosla 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No …, 2004 | 563 | 2004 |
Energy-optimal mobile cloud computing under stochastic wireless channel W Zhang, Y Wen, K Guan, D Kilper, H Luo, DO Wu IEEE Transactions on Wireless Communications 12 (9), 4569-4581, 2013 | 546 | 2013 |
Power-rate-distortion analysis for wireless video communication under energy constraints Z He, Y Liang, L Chen, I Ahmad, D Wu IEEE transactions on circuits and systems for video technology 15 (5), 645-658, 2005 | 408 | 2005 |
Scalable video coding and transport over broadband wireless networks D Wu, YT Hou, YQ Zhang Proceedings of the IEEE 89 (1), 6-20, 2001 | 346 | 2001 |
On end-to-end architecture for transporting MPEG-4 video over the Internet D Wu, YT Hou, W Zhu, HJ Lee, T Chiang, YQ Zhang, HJ Chao IEEE Transactions on Circuits and Systems for Video Technology 10 (6), 923-941, 2000 | 307 | 2000 |
Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications J Kong, J Cui, D Wu, M Gerla MILCOM 2005-2005 IEEE Military Communications Conference, 1535-1541, 2005 | 232 | 2005 |
Secure localization and authentication in ultra-wideband sensor networks Y Zhang, W Liu, Y Fang, D Wu IEEE Journal on Selected areas in communications 24 (4), 829-835, 2006 | 220 | 2006 |
Can we beat DDoS attacks in clouds? S Yu, Y Tian, S Guo, DO Wu IEEE Transactions on Parallel and Distributed Systems 25 (9), 2245-2254, 2013 | 215 | 2013 |
Fault-tolerant and scalable key management for smart grid D Wu, C Zhou IEEE Transactions on Smart Grid 2 (2), 375-381, 2011 | 198 | 2011 |
Resource allocation and performance analysis of wireless video sensors Z He, D Wu IEEE transactions on circuits and systems for video technology 16 (5), 590-599, 2006 | 189 | 2006 |
Collaborative task execution in mobile cloud computing under a stochastic wireless channel W Zhang, Y Wen, DO Wu IEEE Transactions on Wireless Communications 14 (1), 81-93, 2014 | 183 | 2014 |
Energy-efficient optimal opportunistic forwarding for delay-tolerant networks Y Li, Y Jiang, D Jin, L Su, L Zeng, D Wu IEEE Transactions on Vehicular Technology 59 (9), 4500-4512, 2010 | 173 | 2010 |
The impact of node selfishness on multicasting in delay tolerant networks Y Li, G Su, DO Wu, D Jin, L Su, L Zeng IEEE Transactions on Vehicular Technology 60 (5), 2224-2238, 2011 | 172 | 2011 |
EABS: An event-aware backpressure scheduling scheme for emergency Internet of Things T Qiu, R Qiao, DO Wu IEEE Transactions on Mobile Computing 17 (1), 72-84, 2017 | 170 | 2017 |
Energy-efficient scheduling policy for collaborative execution in mobile cloud computing W Zhang, Y Wen, DO Wu 2013 Proceedings Ieee Infocom, 190-194, 2013 | 162 | 2013 |
The quest for personal control over mobile location privacy Q He, D Wu, P Khosla IEEE communications magazine 42 (5), 130-136, 2004 | 145 | 2004 |
An efficient mobile authentication scheme for wireless networks C Tang, DO Wu IEEE Transactions on Wireless Communications 7 (4), 1408-1416, 2008 | 139 | 2008 |