default search action
Wuxu Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c22]Wuxu Peng, Linda Huang, Julia Jia, Emma Ingram:
Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection. TrustCom/BigDataSE 2018: 849-854 - 2016
- [c21]Anthony Amaro, Wuxu Peng, Stan McClellan:
Bandwidth as a service: Transport layer bandwidth guarantees for cloud environments. ICTC 2016: 487-492 - [c20]Anthony Amaro, Wuxu Peng, Stan McClellan:
A survey of cloud bandwidth control mechanisms. ICTC 2016: 493-498 - 2015
- [j13]Stan McClellan, Wuxu Peng, Eduardo Gonzalez:
Improving Throughput in SCTP via Dynamic Optimization of Retransmission Bounds. Netw. Protoc. Algorithms 7(3): 89-110 (2015) - [c19]Stan McClellan, Wuxu Peng, Eduardo Gonzalez:
Dynamic throughput optimization in SCTP. ICC Workshops 2015: 1527-1532 - [c18]Martin Burtscher, Wuxu Peng, Apan Qasem, Hongchi Shi, Dan E. Tamir, Heather Thiry:
A Module-based Approach to Adopting the 2013 ACM Curricular Recommendations on Parallel Computing. SIGCSE 2015: 36-41 - 2014
- [c17]Eduardo Gonzalez, Stan McClellan, Wuxu Peng:
RTOmin as a balancing parameter between fast retransmissions and timeouts within stream control transmission protocol (SCTP). ICSAI 2014: 687-691 - 2010
- [j12]F. Furman Haddix, Wuxu Peng:
A uniform process alternator for arbitrary topologies. J. High Speed Networks 17(2): 73-81 (2010)
2000 – 2009
- 2007
- [j11]S. Kami Makki, Seema Jani, Xiaohua Jia, Wuxu Peng:
Preference-Function Algorithm: a novel approach for selection of the users' preferred websites. Int. J. Bus. Intell. Data Min. 2(3): 328-346 (2007) - [j10]Wuxu Peng, Yalin Wang, E. K. Park, Kia Makki:
Dynamic key management for secure routing in MANET. Wirel. Commun. Mob. Comput. 7(10): 1233-1241 (2007) - 2006
- [j9]Wuxu Peng, Shamila Makki:
The CSMA/DM LAN protocol. Int. J. Commun. Syst. 19(8): 897-914 (2006) - 2005
- [c16]Wuxu Peng, Zhuojing Li, F. Furman Haddix:
A practical spanning tree based MANET routing algorithm. ICCCN 2005: 19-24 - 2004
- [j8]Wuxu Peng, Kia Makki:
Lossy Communicating Finite State Machines. Telecommun. Syst. 25(3-4): 433-448 (2004) - [c15]Wuxu Peng, Yalin Wang, Kia Makki:
Dynamic Key Management for Secure Routing In LCMRMG. ICCCN 2004: 227-232 - 2003
- [c14]Wuxu Peng, Xin Zhang, Kia Makki:
Locality caching multiroot multigeneration routing algorithm in mobile ad hoc networks. ICCCN 2003: 229-234 - 2000
- [c13]Wuxu Peng, Chunyan Wei:
Distributed wavelength assignment protocols with priority for WDM all-optical networks. ICCCN 2000: 625-630
1990 – 1999
- 1998
- [c12]James Holt, Wuxu Peng:
Improving the PIM Routing Protocol with Adaptive Switching Mechanism between Its Two Sparse Sub-Modes. ICCCN 1998: 768-773 - 1997
- [j7]Wuxu Peng, Kia Makki:
A modular methodology to verify communication protocols. Comput. Commun. 20(12): 1069-1077 (1997) - [j6]Wuxu Peng:
Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. Mob. Networks Appl. 2(3): 251-257 (1997) - [c11]James Holt, Wuxu Peng:
An Innovative Routing Protocol Evaluation Tool. ICCCN 1997: 524- - [c10]John Dell, Kia Makki, Niki Pissinou, Wuxu Peng:
Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. PDPTA 1997: 1229-1238 - 1996
- [j5]Wuxu Peng, Kia Makki:
Reachability and reverse reachability analysis of CFSMs. Comput. Commun. 19(8): 668-674 (1996) - [j4]Wuxu Peng, Kia Makki:
Petri Nets and Self-Stabilization of Communication Protocols. Informatica (Slovenia) 20(1) (1996) - 1995
- [j3]Wuxu Peng, S. Purushothaman Iyer:
A New Typee of Pushdown Automata on Infinite Trees. Int. J. Found. Comput. Sci. 6(2): 169-186 (1995) - [c9]Wuxu Peng, Kia Makki:
On Reachability Analysis of Communicating Finite State Machines. ICCCN 1995: 58 - [c8]Wuxu Peng:
Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis. ICCCN 1995: 656 - 1994
- [c7]Wuxu Peng:
Single-link and time communicating finite state machines. ICNP 1994: 126-133 - 1993
- [c6]Wuxu Peng:
On Petri nets and self-stabilization of communication protocols. ICNP 1993: 166-174 - 1992
- [j2]Wuxu Peng, S. Purushothaman:
Analysis of a Class of Communicating Finite State Machines. Acta Informatica 29(6/7): 499-522 (1992) - [c5]Wuxu Peng, S. Purushothaman:
Empty Stack Pushdown Omega-Tree Automata. CAAP 1992: 248-264 - 1991
- [j1]Wuxu Peng, S. Purushothaman:
Data Flow Analysis of Communicating Finite State Machines. ACM Trans. Program. Lang. Syst. 13(3): 399-442 (1991) - 1990
- [c4]Wuxu Peng, S. Purushothaman:
A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines. CAV 1990: 243-252 - [c3]Wuxu Peng, S. Purushothaman Iyer:
A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines. CAV (DIMACS/AMS volume) 1990: 395-404
1980 – 1989
- 1989
- [c2]Wuxu Peng, S. Purushothaman:
Analysis of communicating processes for non-progress. ICDCS 1989: 280-287 - [c1]Wuxu Peng, S. Purushothaman:
Towards Dataflow Analysis of Communicating Finite State Machines. PODC 1989: 45-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint