default search action
Tonghong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j40]Jie Xu, Jingyu Wang, Qi Qi, Jianxin Liao, Haifeng Sun, Zhu Han, Tonghong Li:
Network-aware task selection to reduce multi-application makespan in cloud. J. Netw. Comput. Appl. 176: 102889 (2021)
2010 – 2019
- 2019
- [j39]Jingyu Wang, Zirui Zhuang, Qi Qi, Tonghong Li, Jianxin Liao:
Deep reinforcement learning-based cooperative interactions among heterogeneous vehicular networks. Appl. Soft Comput. 82 (2019) - [j38]Jingyu Wang, Bo He, Jing Wang, Tonghong Li:
Intelligent VNFs Selection Based on Traffic Identification in Vehicular Cloud Networks. IEEE Trans. Veh. Technol. 68(5): 4140-4147 (2019) - 2018
- [j37]Xiaoyuan Fu, Jingyu Wang, Qi Qi, Jianxin Liao, Tonghong Li:
Incentive Mechanisms for Resource Scaling-out Game of Stream Big Data Analytics. J. Grid Comput. 16(4): 569-585 (2018) - [j36]Jianxin Liao, Baoran Li, Jingyu Wang, Qi Qi, Tonghong Li:
Rapid Relevance Feedback Strategy Based on Distributed CBIR System. Int. J. Semantic Web Inf. Syst. 14(2): 1-26 (2018) - [j35]Min Feng, Jianxin Liao, Sude Qing, Tonghong Li, Jingyu Wang:
COVE: Co-operative Virtual Network Embedding for Network Virtualization. J. Netw. Syst. Manag. 26(1): 79-107 (2018) - 2017
- [j34]Jianxin Liao, Haifeng Sun, Jingyu Wang, Qi Qi, Kai Li, Tonghong Li:
Density cluster based approach for controller placement problem in large-scale software defined networkings. Comput. Networks 112: 24-35 (2017) - [j33]Shengwen Tian, Jianxin Liao, Tonghong Li, Jingyu Wang, Guanghai Cui:
Resilient Routing Overlay Network Construction with Super-Relay Nodes. KSII Trans. Internet Inf. Syst. 11(4): 1911-1930 (2017) - [j32]Jianxin Liao, Lei Zhang, Tonghong Li, Jingyu Wang, Qi Qi:
A generalized design of distributed rateless codes with decreasing ripple size for multiple-access relay networks. Wirel. Networks 23(7): 2177-2188 (2017) - [c13]Xiaoyuan Fu, Jingyu Wang, Qi Qi, Jianxin Liao, Tonghong Li:
Tax-Based Mechanisms for Resource Scaling-Out of Stream Big Data Analytics. PDCAT 2017: 52-59 - 2016
- [j31]Jianxin Liao, Lei Zhang, Tonghong Li, Jingyu Wang, Qi Qi:
Efficient and fair scheduler of multiple resources for MapReduce system. IET Softw. 10(6): 182-188 (2016) - [j30]Jianxin Liao, Lei Zhang, Tonghong Li, Jingyu Wang, Qi Qi:
Design of optimised multiple partial recovery LT codes. IET Commun. 10(9): 1053-1062 (2016) - [j29]Jianxin Liao, Jun Gong, Shan Jiang, Tonghong Li, Jingyu Wang:
Conflicts in Overlay Environments: Inefficient Equilibrium and Incentive Mechanism. KSII Trans. Internet Inf. Syst. 10(5): 2286-2309 (2016) - [j28]Jianxin Liao, Min Feng, Sude Qing, Tonghong Li, Jingyu Wang:
LIVE: Learning and Inference for Virtual Network Embedding. J. Netw. Syst. Manag. 24(2): 227-256 (2016) - [j27]Jianxin Liao, Di Yang, Tonghong Li, Qi Qi, Jingyu Wang, Haifeng Sun:
Fusion feature for LSH-based image retrieval in a cloud datacenter. Multim. Tools Appl. 75(23): 15405-15427 (2016) - [j26]Jingyu Wang, Jianxin Liao, Tonghong Li, Jing Wang:
Game-theoretic model of asymmetrical multipath selection in pervasive computing environment. Pervasive Mob. Comput. 27: 37-57 (2016) - [j25]Qi Qi, Jingyu Wang, Qi Li, Tonghong Li, Yufei Cao:
Resource orchestration for multi-task application in home-to-home cloud. IEEE Trans. Consumer Electron. 62(2): 191-199 (2016) - 2015
- [j24]Jianxin Liao, Ziteng Cui, Jingyu Wang, Tonghong Li, Qi Qi, Jing Wang:
A coalitional game approach on improving interactions in multiple overlay environments. Comput. Networks 87: 1-15 (2015) - [j23]Jingyu Wang, Jianxin Liao, Tonghong Li, Jing Wang:
On the collaborations of multiple selfish overlays using multi-path resources. Peer-to-Peer Netw. Appl. 8(2): 203-215 (2015) - [j22]Jingyu Wang, Jianxin Liao, Tonghong Li, Jing Wang:
Asymmetrical Multi-path Selection Game for Wireless Overlay Networks. Wirel. Pers. Commun. 85(4): 2407-2429 (2015) - [c12]Shan Jiang, Jun Gong, Jingyu Wang, Jianxin Liao, Tonghong Li:
Interactions among Overlays and Traffic Engineering: Equilibrium and Cooperation without Payment. GLOBECOM 2015: 1-7 - [c11]Shan Jiang, Jianxin Liao, Jun Gong, Jingyu Wang, Tonghong Li:
Competitive equilibrium and stable coalition in overlay environments. LCN 2015: 365-372 - 2014
- [j21]Jianxin Liao, Di Yang, Tonghong Li, Jingyu Wang, Qi Qi, Xiaomin Zhu:
A scalable approach for content based image retrieval in cloud datacenter. Inf. Syst. Frontiers 16(1): 129-141 (2014) - [j20]Jianxin Liao, Min Feng, Tonghong Li, Jingyu Wang, Sude Qing:
Topology-aware Virtual Network Embedding Using Multiple Characteristics. KSII Trans. Internet Inf. Syst. 8(1): 145-164 (2014) - [j19]Jianxin Liao, Shengwen Tian, Jingyu Wang, Tonghong Li, Qi Qi:
Load-Balanced One-hop Overlay Multipath Routing with Path Diversity. KSII Trans. Internet Inf. Syst. 8(2): 443-461 (2014) - [j18]Jingyu Wang, Jianxin Liao, Jing Wang, Tonghong Li, Qi Qi:
Estimating the Effects of Multipath Selection on Concurrent Multipath Transfer. KSII Trans. Internet Inf. Syst. 8(4): 1406-1423 (2014) - [j17]Jinzhu Wang, Jianxin Liao, Tonghong Li, Jing Wang, Jingyu Wang, Qi Qi:
Probe-based end-to-end overload control for networks of SIP servers. J. Netw. Comput. Appl. 41: 114-125 (2014) - [c10]Jingyu Wang, Jianxin Liao, Jing Wang, Qi Qi, Shengwen Tian, Tonghong Li:
Introducing collaborations for multi-path selection of multiple selfish overlays. ISCC 2014: 1-6 - [c9]Di Yang, Jianxin Liao, Qi Qi, Jingyu Wang, Tonghong Li:
An image retrieval framework for distributed datacenters. LCN 2014: 406-409 - 2012
- [j16]Jianxin Liao, Qi Qi, Zhaoyong Xun, Tonghong Li, Yufei Cao, Jingyu Wang:
A linear chained approach for service invocation in IP Multimedia Subsystem. Comput. Electr. Eng. 38(4): 840-852 (2012) - [j15]Cheng Zhang, Jianxin Liao, Tonghong Li, Xiaomin Zhu:
Probabilistic fault localization with sliding windows. Sci. China Inf. Sci. 55(5): 1186-1200 (2012) - [j14]Jianxin Liao, Jinzhu Wang, Tonghong Li, Jing Wang, Jingyu Wang, Xiaomin Zhu:
A distributed end-to-end overload control mechanism for networks of SIP servers. Comput. Networks 56(12): 2847-2868 (2012) - [j13]Jingyu Wang, Jianxin Liao, Tonghong Li, Ping Zhang:
Correlation-aware multipath selection to enhance path diversity in ubiquitous computing environment. Int. J. Ad Hoc Ubiquitous Comput. 11(4): 246-257 (2012) - [j12]Jianxin Liao, Qi Qi, Tonghong Li, Yufei Cao, Xiaomin Zhu, Jingyu Wang:
An optimized QoS scheme for IMS-NEMO in heterogeneous networks. Int. J. Commun. Syst. 25(2): 185-204 (2012) - [j11]Jingyu Wang, Jianxin Liao, Tonghong Li:
OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer. J. Netw. Comput. Appl. 35(2): 633-643 (2012) - 2011
- [j10]Jianxin Liao, Jingyu Wang, Tonghong Li, Xiaomin Zhu:
Introducing multipath selection for concurrent multipath transfer in the future internet. Comput. Networks 55(4): 1024-1035 (2011) - [j9]Jianxin Liao, Jinzhu Wang, Tonghong Li, Jingyu Wang, Xiaomin Zhu:
A token-bucket based notification traffic control mechanism for IMS presence service. Comput. Commun. 34(10): 1243-1257 (2011) - [j8]Jianxin Liao, Cheng Zhang, Tonghong Li, Xiaomin Zhu:
Reducing the Inaccuracy Caused by Inappropriate Time Window in Probabilistic Fault Localization. IEICE Trans. Commun. 94-B(1): 128-138 (2011) - [j7]Jianxin Liao, Jingyu Wang, Tonghong Li, Xiaomin Zhu:
Multipath Probing and Grouping in Multihomed Networks. IEICE Trans. Inf. Syst. 94-D(3): 710-713 (2011) - 2010
- [j6]Jianxin Liao, Qi Qi, Xiaomin Zhu, Yufei Cao, Tonghong Li:
Enhanced IMS Handoff Mechanism for QoS Support over Heterogeneous Network. Comput. J. 53(10): 1719-1737 (2010) - [j5]Jianxin Liao, Jingyu Wang, Xiaomin Zhu, Tonghong Li:
Exploiting path diversity to enhance aggregating throughput for multihomed wireless devices. IEEE Trans. Consumer Electron. 56(2): 613-619 (2010) - [j4]Jianxin Liao, Jingyu Wang, Tonghong Li, Xiaomin Zhu, Ping Zhang:
Sender-based multipath out-of-order scheduling for high-definition videophone in multi-homed devices. IEEE Trans. Consumer Electron. 56(3): 1466-1472 (2010) - [j3]Jianxin Liao, Cheng Zhang, Tonghong Li, Xiaomin Zhu:
An efficient fault diagnosis technique for home unified service system. IEEE Trans. Consumer Electron. 56(3): 1487-1494 (2010) - [j2]Qi Qi, Yufei Cao, Tonghong Li, Xiaomin Zhu, Jingyu Wang:
Soft handover mechanism based on RTP parallel transmission for mobile IPTV services. IEEE Trans. Consumer Electron. 56(4): 2276-2281 (2010) - [c8]Menghui Yang, Zhituo Li, Weikang Yang, Tonghong Li:
Analysis of Software Rejuvenation in Clustered Computing System with Dependency Relation between Nodes. CIT 2010: 46-53 - [c7]Menghui Yang, Hua Liu, Tonghong Li:
Implementation and Performance for Lawful Intercept of VoIP Calls based on SIP Session Border Controller. CIT 2010: 2635-2642
2000 – 2009
- 2009
- [j1]Jianxin Liao, Qi Qi, Tonghong Li, Yufei Cao, Xiaomin Zhu:
A demand-driven parsing method for SIP offload in home network. IEEE Trans. Consumer Electron. 55(3): 1308-1314 (2009) - [c6]Tonghong Li, Yuanzhen Li, Jianxin Liao:
A Contention-Based Routing Protocol for Vehicular Ad Hoc Networks in City Environments. ICDCS Workshops 2009: 482-487 - [c5]Menghui Yang, Tonghong Li, Weikang Yang, Xin Su, Jing Wang:
A Channel Estimation Scheme for STBC-Based TDS-OFDM MIMO System. ScalCom-EmbeddedCom 2009: 160-166 - [c4]Menghui Yang, Tonghong Li, Weikang Yang, Xin Su, Jing Wang:
A High Spectrum Efficiency Transmission Scheme. ScalCom-EmbeddedCom 2009: 167-172 - 2005
- [c3]Tonghong Li, Qunying Xie, Jing Wang, Winston Khoon Guan Seah:
Seamless Multi-hop Handover in IPv6 Based Hybrid Wireless Networks. ICOIN 2005: 884-893 - 2004
- [c2]Tonghong Li, Chan Kwang Mien, Joshua Liew Seng Arn, Winston Khoon Guan Seah:
Mobile Internet Access in BAS. ICDCS Workshops 2004: 736-741 - 2002
- [c1]Tonghong Li, Andreas Hoffmann, Marc Born, Ina Schieferdecker:
A platform architecture to support the deployment of distributed applications. ICC 2002: 2592-2596
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint