default search action
On-Ching Yue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j20]Wai-Kit Sze, Yulin Deng, Wing Cheong Lau, Murali S. Kodialam, Thyaga Nandagopal, On-Ching Yue:
Channel-Oblivious Counting Algorithms for Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 26(12): 3303-3316 (2015) - 2013
- [j19]Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau:
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA. IEEE Trans. Inf. Theory 59(1): 384-396 (2013) - [c28]Yulin Deng, Wing Cheong Lau, On-Ching Yue:
Design and evaluation of RFID counting algorithms under time-correlated channels. CCNC 2013: 443-448 - 2012
- [j18]Wee Lum Tan, Wing Cheong Lau, On-Ching Yue:
Performance analysis of an adaptive, energy-efficient MAC protocol for wireless sensor networks. J. Parallel Distributed Comput. 72(4): 504-514 (2012) - [c27]Tan Hing Hui, Wing Cheong Lau, On-Ching Yue:
VECADS: Vehicular Context-Aware Downstream Scheduling for Drive-Thru Internet. VTC Fall 2012: 1-6 - [i1]Yue Wang, On-Ching Yue:
A Tutorial of 802.11 Implementation in NS-2. CoRR abs/1202.3576 (2012) - 2011
- [j17]Chi-ho Lam, Wing Cheong Lau, On-Ching Yue:
Enhancing distributed traffic monitoring via traffic digest splitting. Comput. Networks 55(6): 1379-1393 (2011) - [j16]Wee Lum Tan, Wing Cheong Lau, On-Ching Yue, Tan Hing Hui:
Analytical Models and Performance Evaluation of Drive-thru Internet Systems. IEEE J. Sel. Areas Commun. 29(1): 207-222 (2011) - [c26]Ka Chun Lam, Wing Cheong Lau, On-Ching Yue:
Hitchbot - Delivering Malicious URLs via Social Hitch-Hiking. GLOBECOM 2011: 1-6 - 2010
- [j15]Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue:
Partial Interference and Its Performance Impact on Wireless Multiple Access Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c25]Kin-Fai Li, Wing Cheong Lau, On-Ching Yue:
Session Reliability and Capacity Allocation in Dynamic Spectrum Access Networks. ICC 2010: 1-6 - [c24]Ho Yan Suen, Wing Cheong Lau, On-Ching Yue:
Detecting Anomalous Web Browsing via Diffusion Wavelets. ICC 2010: 1-6
2000 – 2009
- 2009
- [c23]Wai-Kit Sze, Wing Cheong Lau, On-Ching Yue:
Fast RFID Counting under Unreliable Radio Channels. ICC 2009: 1-5 - [c22]Chun-Pong Luk, Wing Cheong Lau, On-Ching Yue:
Opportunistic Routing with Directional Antennas in Wireless Mesh Networks. INFOCOM 2009: 2886-2890 - [c21]Wee Lum Tan, Wing Cheong Lau, On-Ching Yue:
Modeling resource sharing for a road-side access point supporting drive-thru internet. Vehicular Ad Hoc Networks 2009: 33-42 - 2008
- [c20]Sai Kit Chui, On-Ching Yue, Wing Cheong Lau:
Impact of Handoff Control Messages on VoIP over Wireless LAN System Capacity. EW 2008 - [c19]Yin-Ki Ip, Wing Cheong Lau, On-Ching Yue:
Performance Modeling of Epidemic Routing with Heterogeneous Node Types. ICC 2008: 219-224 - [c18]Kin-Fai Li, Wing Cheong Lau, On-Ching Yue:
Link Restoration in Cognitive Radio Networks. ICC 2008: 371-376 - [c17]Chun-Pong Luk, Wing Cheong Lau, On-Ching Yue:
An Analysis of Opportunistic Routing in Wireless Mesh Network. ICC 2008: 2877-2883 - 2007
- [c16]Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue:
Characterizing and Exploiting Partial Interference in Wireless Mesh Networks. ICC 2007: 102-108 - [c15]Ching-Wan Yuen, Wing Cheong Lau, On-Ching Yue:
CAPEL: A Packet Discard Policy for Real-Time Traffic Over Wireless Networks. ICC 2007: 158-163 - [c14]Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau:
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA. ICNP 2007: 330-331 - [c13]Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue:
Stability of Finite-User Slotted ALOHA Under Partial Interference in Wireless Mesh Networks. PIMRC 2007: 1-5 - [c12]Wee Lum Tan, Wing Cheong Lau, On-Ching Yue:
An Energy-Efficient and Receiver-Driven MAC Protocol for Wireless Sensor Networks. VTC Fall 2007: 138-142 - [c11]Yin-Ki Ip, Wing Cheong Lau, On-Ching Yue:
Forwarding and Replication Strategies for DTN with Resource Constraints. VTC Spring 2007: 1260-1264 - 2006
- [c10]Wee Lum Tan, On-Ching Yue, Wing Cheong Lau:
Performance Evaluation of Differentiated Services Mechanisms Over Wireless Sensor Networks. VTC Fall 2006: 1-5 - [c9]Ching-Wan Yuen, On-Ching Yue:
Channel State Dependent Packet Discard Policy for 3G Networks. VTC Spring 2006: 405-409 - [c8]Sai Kit Chui, On-Ching Yue:
An Access Point Coordination System for Improved VoIP/WLAN Handover Performance. VTC Spring 2006: 501-505 - [c7]KaMing Lau, On-Ching Yue:
An Improved IEEE8O2.11 PSM Based on Server Vacation Models. VTC Spring 2006: 1256-1260 - 2002
- [c6]Wing Cheong Lau, Wei Luo, Hsuan-Jung Su, On-Ching Yue, Qinqing Zhang:
Analysis of UMTS radio link control. GLOBECOM 2002: 748-752
1990 – 1999
- 1999
- [c5]Mooi Choo Chuah, Qinqing Zhang, On-Ching Yue:
Access priority schemes in UMTS MAC. WCNC 1999: 781-786 - 1998
- [j14]Bharat T. Doshi, Enrique J. Hernandez-Valencia, Kotikalapudi Sriram, Yung-Terng Wang, On-Ching Yue:
Protocols, performance, and controls for voice over wide area packet networks. Bell Labs Tech. J. 3(4): 297-337 (1998) - 1996
- [j13]On-Ching Yue:
Design trade-offs in cellular/PCS systems. IEEE Commun. Mag. 34(9): 146-152 (1996) - [c4]On-Ching Yue:
A graphical method for cellular/PCS system design tradeoffs. PIMRC 1996: 1155-1159 - 1994
- [j12]Cynthia A. Funka-Lea, Bernice S. Gotz, On-Ching Yue:
Q+: Interactive Visual Modeling for Performance Analysis and Simulation of Queueing Systems. Int. J. Comput. Simul. 4(2) (1994) - [c3]Antonio DeSimone, Cynthia A. Funka-Lea, Behrokh Samadi, On-Ching Yue:
Performance engineering of enterprise computing systems. CAMAD 1994 - [c2]Kang Peng, Po-Wen Cheng, On-Ching Yue:
Network operations processes planning. WSC 1994: 1451-1454 - 1991
- [j11]Yuval Lirov, On-Ching Yue:
Automated network troubleshooting knowledge acquisition. Appl. Intell. 1(2): 121-132 (1991) - [j10]Yuval Lirov, On-Ching Yue:
Expert maintenance systems in telecommunication networks. J. Intell. Robotic Syst. 4(4): 303-319 (1991) - 1990
- [j9]On-Ching Yue, Charles A. Brooks:
Performance of the timed token scheme in MAP. IEEE Trans. Commun. 38(7): 1006-1012 (1990)
1980 – 1989
- 1989
- [c1]Charles A. Brooks, On-Ching Yue:
Effect of the Token Holding Timer on MAP Performance. INFOCOM 1989: 342-347 - 1985
- [j8]Kai Y. Eng, On-Ching Yue, Barry G. Haskell, Catherine R. Grimes:
A VCR-based access system for large pictorial databases. AT&T Tech. J. 64(10): 2435-2447 (1985) - 1982
- [j7]On-Ching Yue:
Maximum likelihood combining for noncoherent and differentially coherent frequency-hopping multiple-access systems. IEEE Trans. Inf. Theory 28(4): 631-638 (1982) - 1981
- [j6]On-Ching Yue:
Performance of Frequency-Hopping Multiple-Access Multilevel FSK Systems with Hard-Limited and Linear Combining. IEEE Trans. Commun. 29(11): 1687-1694 (1981) - [j5]Kai Y. Eng, On-Ching Yue:
Time Compression Multiplexing of Multiple Television Signals in Satellite Channels Using Chirp Transform Processors. IEEE Trans. Commun. 29(12): 1832-1840 (1981) - 1980
- [j4]On-Ching Yue:
Useful Bounds on the Performance of a Spread-Spectrum Mobile Communication System in Various Fading Environments. IEEE Trans. Commun. 28(10): 1819-1823 (1980)
1970 – 1979
- 1979
- [j3]On-Ching Yue:
Saddle Point Approximation for the Error Probability in PAM Systems with Intersymbol Interference. IEEE Trans. Commun. 27(10): 1604-1609 (1979) - 1978
- [j2]On-Ching Yue, Robert Lugannani, Stephen O. Rice:
Series Approximations for the Amplitude Distribution and Density of Shot Processes. IEEE Trans. Commun. 26(1): 45-54 (1978) - 1975
- [j1]On-Ching Yue, E. L. Rope, G. Tricoles:
Two Reconstruction Methods for Microwave Imaging of Buried Dielectric Anomalies. IEEE Trans. Computers 24(4): 381-390 (1975)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint