default search action
Ruixi Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j13]Jing Yuan, Ruixi Yuan, Xi Chen:
Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic. Int. J. Comput. Commun. Control 9(1): 101-112 (2014) - [j12]Hengtao Wang, Qing-Shan Jia, Chen Song, Ruixi Yuan, Xiaohong Guan:
Building occupant level estimation based on heterogeneous information fusion. Inf. Sci. 272: 145-157 (2014) - 2013
- [j11]Yong He, Jie Sun, Xiaojun Ma, Athanasios V. Vasilakos, Ruixi Yuan, Weibo Gong:
Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs. IEEE/ACM Trans. Netw. 21(1): 204-217 (2013) - [c19]Cangqi Zhou, Qianchuan Zhao, Ruixi Yuan:
An angle-based dissimilarity for accelerating the clustering of dynamic data in networks. ICNSC 2013: 199-204 - 2012
- [j10]Li Li, Qing-Shan Jia, Hengtao Wang, Ruixi Yuan, Xiaohong Guan:
A systematic method for network topology reconfiguration with limited link additions. J. Netw. Comput. Appl. 35(6): 1979-1989 (2012) - [j9]Li Zhao, Xiaohong Guan, Ruixi Yuan:
Modeling collective blogging dynamics of popular incidental topics. Knowl. Inf. Syst. 31(2): 371-387 (2012) - [c18]Yuheng Li, Yiping Zhang, Ruixi Yuan:
Characterizing user access behaviors in mobile TV system. ICC 2012: 2093-2097 - 2011
- [c17]Yuheng Li, Yiping Zhang, Ruixi Yuan:
Measurement and analysis of a large scale commercial mobile internet TV system. Internet Measurement Conference 2011: 209-224 - 2010
- [j8]Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu:
An SVM-based machine learning method for accurate internet traffic classification. Inf. Syst. Frontiers 12(2): 149-156 (2010) - [j7]Yong He, Jie Sun, Ruixi Yuan, Weibo Gong:
A reservation based backoff method for video streaming in 802.11 home networks. IEEE J. Sel. Areas Commun. 28(3): 332-343 (2010) - [j6]Yong He, Ruixi Yuan, Weibo Gong:
Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs. IEEE Trans. Mob. Comput. 9(5): 657-671 (2010) - [c16]Hengtao Wang, Qing-Shan Jia, Chen Song, Ruixi Yuan, Xiaohong Guan:
Estimation of occupancy level in indoor environment based on heterogeneous information fusion. CDC 2010: 5086-5091 - [c15]Yong He, Xiaojun Ma, Jie Sun, Ruixi Yuan, Weibo Gong:
Deterministic Backoff: Towards Efficient Polling for 802.11e HCCA in Wireless Home Networks. ICC 2010: 1-6 - [c14]Junsong Wang, Ruixi Yuan:
Synthesis of PI-type Congestion Controller for AQM Router in TCP/AQM Network. LSMS/ICSEE (1) 2010: 69-76
2000 – 2009
- 2009
- [j5]Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li:
Analysis of the impact of background traffic on the performance of 802.11 power saving mechanism. IEEE Commun. Lett. 13(3): 164-166 (2009) - [j4]Yong He, Ruixi Yuan:
A Novel Scheduled Power Saving Mechanism for 802.11 Wireless LANs. IEEE Trans. Mob. Comput. 8(10): 1368-1383 (2009) - [c13]Li Zhao, Ruixi Yuan, Xiaohong Guan, Mingyang Li:
Propagation Modeling and Analysis of Incidental Topics in Blogosphere. HCI (12) 2009: 401-410 - [c12]Yong He, Ruixi Yuan, Jie Sun, Weibo Gong:
Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs. ICNP 2009: 21-30 - [c11]Shuqiao Zhou, Haoran Feng, Ruixi Yuan:
Error Compensation for Cricket Indoor Location System. PDCAT 2009: 390-395 - 2008
- [c10]Jing Yuan, Zhu Li, Ruixi Yuan:
Information Entropy Based Clustering Method for Unsupervised Internet Traffic Classification. ICC 2008: 1588-1592 - [c9]Chengjie Wu, Ruixi Yuan, Hongchao Zhou:
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks. VTC Spring 2008: 113-117 - [c8]Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li:
The IEEE 802.11 Power Saving Mechanism: An Experimental Study. WCNC 2008: 1362-1367 - 2007
- [c7]Zhu Li, Ruixi Yuan, Xiaohong Guan:
Traffic Classification - Towards Accurate Real Time Network Applications. HCI (4) 2007: 67-76 - [c6]Ruixi Yuan, Li Zhao, Wenyu Wang:
Cooperation and Competition Dynamics in an Online Game Community. HCI (15) 2007: 475-484 - [c5]Zhu Li, Ruixi Yuan, Xiaohong Guan:
Accurate Classification of the Internet Traffic Based on the SVM Method. ICC 2007: 1373-1378 - [c4]Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang:
Scheduled PSM for Minimizing Energy in Wireless LANs. ICNP 2007: 154-163 - 2006
- [c3]Haoran Feng, Ruixi Yuan, Chundi Mu:
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks. CIT 2006: 232 - [c2]Ruixi Yuan, Qianchuan Zhao, Hong Cai, Wenyu Wang, Hui Li:
Service Selection Modeling in Networked Environments. ICEBE 2006: 298-301 - [c1]Wenyu Wang, Li Zhao, Ruixi Yuan:
Improving cooperation in peer-to-peer systems using social networks. IPDPS 2006
1990 – 1999
- 1997
- [j3]Dipankar Raychaudhuri, Leslie J. French, Robert J. Siracusa, Subir K. Biswas, Ruixi Yuan, Partha Narasimhan, Cesar A. Johnston:
WATMnet: A Prototype Wireless ATM System for Multimedia Personal Communication. IEEE J. Sel. Areas Commun. 15(1): 83-95 (1997) - 1996
- [j2]Ruixi Yuan, Subir K. Biswas, Leslie J. French, Jun Li, Dipankar Raychaudhuri:
A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks. Mob. Networks Appl. 1(3): 287-298 (1996) - 1995
- [j1]Ruixi Yuan:
Traffic Pattern Based Mobile Routing Scheme. Comput. Commun. 18(1): 32-36 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint