default search action
Ing-Ray Chen
Person information
- affiliation: Virginia Tech, Blacksburg, Virginia, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j124]Dian Chen, Qisheng Zhang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Energy-Adaptive and Robust Monitoring for Smart Farms Based on Solar-Powered Wireless Sensors. IEEE Internet Things J. 11(18): 29781-29797 (2024) - [c99]Dian Chen, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
eMTD: Energy-Aware Moving Target Defense for Sustainable Solar-powered Sensor-based Smart Farms. NOMS 2024: 1-7 - [i5]Dian Chen, Paul Yang, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms. CoRR abs/2402.10280 (2024) - 2023
- [j123]Qisheng Zhang, Dian Chen, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
Attack-Resistant, Energy-Adaptive Monitoring for Smart Farms: Uncertainty-Aware Deep Reinforcement Learning Approach. IEEE Internet Things J. 10(16): 14254-14268 (2023) - [j122]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Social media-based social-psychological community resilience analysis of five countries on COVID-19. J. Comput. Soc. Sci. 6(2): 1001-1032 (2023) - 2022
- [j121]Jaber Valinejad, Zhen Guo, Jin-Hee Cho, Ing-Ray Chen:
Measuring Community Resilience During the COVID-19 Based on Community Wellbeing and Resource Distribution. J. Soc. Comput. 3(4): 322-344 (2022) - [j120]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. ACM Trans. Internet Techn. 22(1): 24:1-24:31 (2022) - [c98]Qisheng Zhang, Yash Mahajan, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho:
An Attack-Resilient and Energy-Adaptive Monitoring System for Smart Farms. GLOBECOM 2022: 2776-2781 - [c97]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
SAFER: Social Capital-Based Friend Recommendation to Defend against Phishing Attacks. ICWSM 2022: 241-252 - 2021
- [j119]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures: A Survey. IEEE Access 9: 1770-1806 (2021) - [j118]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation. IEEE Trans. Netw. Serv. Manag. 18(3): 3154-3169 (2021) - [j117]Ding-Chau Wang, Ing-Ray Chen, Hamid Al-Hamadi:
Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design. IEEE Trans. Reliab. 70(1): 188-199 (2021) - 2020
- [j116]Hamid Al-Hamadi, Mohammad Saoud, Ing-Ray Chen, Jin-Hee Cho:
Optimizing the Lifetime of IoT-Based Star and Mesh Networks. IEEE Access 8: 63090-63105 (2020) - [j115]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang, Meshal Almashan:
Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems. IEEE Access 8: 168994-169009 (2020) - [j114]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang, Meshal Almashan:
Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems". IEEE Access 8: 207181 (2020) - [j113]Jemish V. Maisuria, Saurabh N. Mehta, Ing-Ray Chen:
Bayesian-Based Spectrum Sensing and Optimal Channel Estimation for MAC Layer Protocol in Cognitive Radio Sensor Networks. Comput. J. 63(6): 942-957 (2020) - [j112]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020) - [i4]Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra:
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey. CoRR abs/2004.07678 (2020) - [i3]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020) - [i2]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation. CoRR abs/2007.08469 (2020)
2010 – 2019
- 2019
- [j111]Hamid Al-Hamadi, Ing-Ray Chen, Jin-Hee Cho:
Trust Management of Smart Service Communities. IEEE Access 7: 26362-26378 (2019) - [j110]Jin-Hee Cho, Hamid Al-Hamadi, Ing-Ray Chen:
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7: 92296-92313 (2019) - [j109]Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access 7: 118556-118580 (2019) - [j108]Ing-Ray Chen, Jia Guo, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, Ilsun You:
Trust-Based Service Management for Mobile Cloud IoT Systems. IEEE Trans. Netw. Serv. Manag. 16(1): 246-263 (2019) - [j107]Terrence J. Moore, Jin-Hee Cho, Ing-Ray Chen:
Network Adaptations Under Cascading Failures for Mission-Oriented Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1184-1198 (2019) - [j106]Jia Guo, Ing-Ray Chen, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Cloud Participatory Sensing of Air Quality. Wirel. Pers. Commun. 105(4): 1461-1474 (2019) - [c96]Hamid Al-Hamadi, Ing-Ray Chen, Ding-Chau Wang:
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems. ISADS 2019: 1-6 - 2018
- [j105]Ji Wang, Ing-Ray Chen, Jeffrey J. P. Tsai, Ding-Chau Wang:
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks. Comput. Commun. 116: 90-100 (2018) - [j104]Jin-Hee Cho, Ing-Ray Chen:
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 151-165 (2018) - [j103]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [j102]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Yen-Cheng Lu, Chang-Tien Lu, Jeffrey J. P. Tsai:
CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks. IEEE Trans. Serv. Comput. 11(6): 908-921 (2018) - [c95]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c94]Ing-Ray Chen, Jia Guo, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, Ilsun You:
Trust as a Service for IoT Service Management in Smart Cities. HPCC/SmartCity/DSS 2018: 1358-1365 - [c93]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c92]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [i1]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - 2017
- [j101]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97: 1-14 (2017) - [j100]Jin-Hee Cho, Yating Wang, Ing-Ray Chen, Kevin S. Chan, Ananthram Swami:
A Survey on Modeling and Optimizing Multi-Objective Systems. IEEE Commun. Surv. Tutorials 19(3): 1867-1901 (2017) - [j99]Hamid Al-Hamadi, Ing-Ray Chen:
Trust-Based Decision Making for Health IoT Systems. IEEE Internet Things J. 4(5): 1408-1419 (2017) - [j98]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Jeffrey J. P. Tsai:
Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 14(1): 217-232 (2017) - [j97]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Ananthram Swami, Kevin S. Chan:
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 10(4): 660-672 (2017) - [c91]Jia Guo, Ing-Ray Chen, Ding-Chao Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces. FSDM 2017: 479-484 - [c90]Lijing Wang, Jin-Hee Cho, Ing-Ray Chen, Jiangzhuo Chen:
PDGM: Percolation-based directed graph matching in social networks. ICC 2017: 1-7 - [c89]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai:
A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems. MobileCloud 2017: 125-130 - 2016
- [j96]Jin-Hee Cho, Ing-Ray Chen, Kevin S. Chan:
Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Networks 44: 58-75 (2016) - [j95]Liang Zhao, Ting Hua, Chang-Tien Lu, Ing-Ray Chen:
A topic-focused trust model for Twitter. Comput. Commun. 76: 1-11 (2016) - [j94]Ing-Ray Chen, Fenye Bao, Jia Guo:
Trust-Based Service Management for Social Internet of Things Systems. IEEE Trans. Dependable Secur. Comput. 13(6): 684-696 (2016) - [j93]Robert Mitchell, Ing-Ray Chen:
Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems. IEEE Trans. Reliab. 65(1): 350-358 (2016) - [j92]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Trans. Serv. Comput. 9(3): 482-495 (2016) - [c88]Jia Guo, Ing-Ray Chen, Jeffrey J. P. Tsai, Hamid Al-Hamadi:
Trust-Based IoT Participatory Sensing for Hazard Detection and Response. ICSOC Workshops 2016: 79-84 - [c87]Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:
Parameterizing Moving Target Defenses. NTMS 2016: 1-6 - [c86]Hamid Al-Hamadi, Ing-Ray Chen:
Trust-based decision making for environmental health community of interest IoT systems. WiMob 2016: 1-6 - 2015
- [j91]Ing-Ray Chen, Jia Guo:
Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Networks 33: 154-167 (2015) - [j90]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. IEEE Trans. Dependable Secur. Comput. 12(1): 16-30 (2015) - [j89]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(3): 451-466 (2015) - [j88]Hamid Al-Hamadi, Ing-Ray Chen:
Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks. ACM Trans. Sens. Networks 11(3): 47:1-47:24 (2015) - [j87]Yating Wang, Ing-Ray Chen, Ding-Chau Wang:
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges. Wirel. Pers. Commun. 80(4): 1607-1623 (2015) - [c85]Jia Guo, Ing-Ray Chen:
A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. SCC 2015: 324-331 - [c84]Yating Wang, Ing-Ray Chen, Jin-Hee Cho:
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks. ISADS 2015: 71-77 - [c83]Ing-Ray Chen, Robert Mitchell, Jin-Hee Cho:
On modeling of adversary behavior and defense for survivability of military MANET applications. MILCOM 2015: 629-634 - 2014
- [j86]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Networks 19: 59-74 (2014) - [j85]Ing-Ray Chen, Yinan Li, Robert Mitchell, Ding-Chau Wang:
Scalable and efficient dual-region based mobility management for ad hoc networks. Ad Hoc Networks 23: 52-64 (2014) - [j84]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection in wireless network applications. Comput. Commun. 42: 1-23 (2014) - [j83]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Trans. Parallel Distributed Syst. 25(5): 1200-1210 (2014) - [j82]Robert Mitchell, Ing-Ray Chen:
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications. IEEE Trans. Syst. Man Cybern. Syst. 44(5): 593-604 (2014) - [c82]Ing-Ray Chen, Jia Guo:
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. AINA 2014: 49-56 - [c81]Ji Wang, Ing-Ray Chen:
Trust-based data fusion mechanism design in cognitive radio networks. CNS 2014: 53-59 - [c80]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust management for service composition in SOA-based IoT systems. WCNC 2014: 3444-3449 - 2013
- [j81]Yinan Li, Ing-Ray Chen:
Dynamic agent-based hierarchical multicast for wireless mesh networks. Ad Hoc Networks 11(6): 1683-1698 (2013) - [j80]Jin-Hee Cho, Ing-Ray Chen:
On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks 11(8): 2217-2234 (2013) - [j79]Yinan Li, Ing-Ray Chen:
Hierarchical agent-based secure and reliable multicast in wireless mesh networks. Comput. Commun. 36(14): 1515-1526 (2013) - [j78]Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46(4): 55:1-55:29 (2013) - [j77]Hamid Al-Hamadi, Ing-Ray Chen:
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 10(2): 189-203 (2013) - [j76]Robert Mitchell, Ing-Ray Chen:
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Trans. Reliab. 62(1): 199-210 (2013) - [j75]Robert Mitchell, Ing-Ray Chen:
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications. IEEE Trans. Smart Grid 4(3): 1254-1263 (2013) - [j74]Robert Mitchell, Ing-Ray Chen:
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Wirel. Pers. Commun. 68(4): 1377-1391 (2013) - [j73]Ding-Chau Wang, Weiping He, Ing-Ray Chen:
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 69(1): 449-469 (2013) - [c79]Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen:
Access Protocols in Data Partitioning Based Cloud Storage. IEEE CLOUD 2013: 398-405 - [c78]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Integrated social and quality of service trust management of mobile groups in ad hoc networks. ICICS 2013: 1-5 - [c77]Hamid Al-Hamadi, Ing-Ray Chen:
Adaptive network management for countering selective capture in wireless sensor networks. CNSM 2013: 203-210 - [c76]Jin-Hee Cho, Ing-Ray Chen, Yating Wang, Kevin S. Chan:
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. ICPADS 2013: 372-379 - [c75]Yinan Li, Ing-Ray Chen, Ding-Chau Wang:
Dual-Region Location Management for Mobile Ad Hoc Networks. ICPADS 2013: 388-395 - [c74]Hamid Al-Hamadi, Ing-Ray Chen:
Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks. ISADS 2013: 1-7 - [c73]Fenye Bao, Ing-Ray Chen, Jia Guo:
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems. ISADS 2013: 1-7 - [c72]Yating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami:
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives. MILCOM 2013: 1862-1867 - [c71]Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen:
Composite trust-based public key management in mobile ad hoc networks. SAC 2013: 1949-1956 - 2012
- [j72]Ing-Ray Chen, Yating Wang:
Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation. IEEE Commun. Lett. 16(10): 1640-1643 (2012) - [j71]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 35(3): 1001-1012 (2012) - [j70]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169-183 (2012) - [j69]Yinan Li, Ing-Ray Chen:
Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding. IEEE Trans. Netw. Serv. Manag. 9(3): 226-239 (2012) - [j68]Weiping He, Ing-Ray Chen, Ding-Chau Wang:
DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems. Wirel. Pers. Commun. 62(3): 479-496 (2012) - [j67]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 66(2): 443-459 (2012) - [c70]Bingsheng Wang, Haili Dong, Arnold P. Boedihardjo, Chang-Tien Lu, Harland Yu, Ing-Ray Chen, Jing Dai:
An integrated framework for spatio-temporal-textual search and mining. SIGSPATIAL/GIS 2012: 570-573 - [c69]Robert Mitchell, Ing-Ray Chen:
Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems. ICCCN 2012: 1-7 - [c68]Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami:
A Provenance-Based Trust Model for Delay Tolerant Networks. IFIPTM 2012: 52-67 - [c67]Hamid Al-Hamadi, Ing-Ray Chen:
Energy vs. QoS Tradeoff Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. ISPA 2012: 387-394 - [c66]Fenye Bao, Ing-Ray Chen:
Trust management for the internet of things and its application to service composition. WOWMOM 2012: 1-6 - 2011
- [j66]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tutorials 13(4): 562-583 (2011) - [j65]Yinan Li, Ing-Ray Chen:
Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks. J. Parallel Distributed Comput. 71(7): 1034-1046 (2011) - [j64]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Evaluation 68(1): 58-75 (2011) - [j63]Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy:
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 161-176 (2011) - [j62]Yinan Li, Ing-Ray Chen:
Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(3): 349-361 (2011) - [j61]Jin-Hee Cho, Ing-Ray Chen:
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems. Wirel. Pers. Commun. 60(4): 725-750 (2011) - [c65]Sumit Shah, Fenye Bao, Chang-Tien Lu, Ing-Ray Chen:
CROWDSAFE: crowd sourcing of crime incidents and safe routing on mobile devices. GIS 2011: 521-524 - [c64]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Trust-Based Intrusion Detection in Wireless Sensor Networks. ICC 2011: 1-6 - [c63]Yinan Li, Ing-Ray Chen:
Hierarchical Agent-Based Secure Multicast for Wireless Mesh Networks. ICC 2011: 1-6 - [c62]Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. IFIPTM 2011: 265-276 - [c61]Robert Mitchell, Ing-Ray Chen:
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection. IWCMC 2011: 2256-2261 - [c60]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical trust management for wireless sensor networks and its application to trust-based routing. SAC 2011: 1732-1738 - [c59]Robert Mitchell, Ing-Ray Chen:
A hierarchical performance model for intrusion detection in cyber-physical systems. WCNC 2011: 2095-2100 - 2010
- [j60]Ing-Ray Chen, Yating Wang, Ding-Chau Wang:
Reliability of wireless sensors with code attestation for intrusion detection. Inf. Process. Lett. 110(17): 778-786 (2010) - [j59]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. IEEE Trans. Reliab. 59(1): 231-241 (2010) - [j58]Jin-Hee Cho, Ing-Ray Chen:
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Networks 16(4): 1157-1173 (2010) - [j57]Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:
Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks. Wirel. Pers. Commun. 53(1): 111-131 (2010) - [j56]Ing-Ray Chen, Ding-Chau Wang:
Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks. Wirel. Pers. Commun. 54(4): 635-649 (2010) - [c58]Ramy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen:
Towards trustworthy shared networked sensor-actuator systems. CSIIRW 2010: 43 - [c57]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Trust Management for Encounter-Based Routing in Delay Tolerant Networks. GLOBECOM 2010: 1-6 - [c56]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs. IFIPTM 2010: 141-156 - [c55]Yinan Li, Ing-Ray Chen:
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks. LCN 2010: 128-135 - [c54]Weiping He, Ing-Ray Chen, Ding-Chau Wang:
Cross-layer integrated mobility and service management utilizing smart routers in mobile IPv6 systems. MoMM 2010: 140-147
2000 – 2009
- 2009
- [j55]Okan Yilmaz, Ing-Ray Chen:
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. Comput. Commun. 32(2): 317-323 (2009) - [j54]Jeffery W. Wilson, Ing-Ray Chen:
Performance characteristics of location-based group membership and data consistency algorithms in mobile ad hoc networks. Int. J. Pervasive Comput. Commun. 5(4): 497-516 (2009) - [j53]Okan Yilmaz, Ing-Ray Chen:
Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks. Inf. Process. Lett. 109(15): 868-875 (2009) - [j52]Weiping He, Ing-Ray Chen:
A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems. J. Parallel Distributed Comput. 69(6): 559-572 (2009) - [c53]Okan Yilmaz, Ing-Ray Chen:
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. AINA 2009: 463-470 - [c52]Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. CSE (2) 2009: 641-650 - [c51]Ing-Ray Chen, Anh Ngoc Speer, Mohamed Eltoweissy:
Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks. IPDPS 2009: 1-8 - [c50]Jin-Hee Cho, Ing-Ray Chen:
Performance analysis of distributed intrusion detection protocols for mobile group communication systems. IPDPS 2009: 1-8 - [c49]Ing-Ray Chen, Ding-Chau Wang:
On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection. ISPAN 2009: 184-189 - [c48]Weiping He, Ing-Ray Chen:
DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems. ITNG 2009: 1165-1170 - [c47]Robert Mitchell, Ing-Ray Chen, Mohamed Eltoweissy:
Signalprint-Based Intrusion Detection in Wireless Networks. SEWCN 2009: 77-88 - 2008
- [j51]Sapna E. George, Ing-Ray Chen:
Movement-based checkpointing and logging for failure recovery of database applications in mobile environments. Distributed Parallel Databases 23(3): 189-205 (2008) - [j50]Weiping He, Ing-Ray Chen:
Proxy-based hybrid cache management in Mobile IP systems. Inf. Process. Lett. 106(1): 26-32 (2008) - [j49]Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang:
Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Evaluation 65(5): 319-344 (2008) - [j48]Jin-Hee Cho, Ing-Ray Chen, Mohamed Eltoweissy:
On optimal batch rekeying for secure group communications in wireless networks. Wirel. Networks 14(6): 915-927 (2008) - [c46]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks. AINA Workshops 2008: 644-649 - [c45]Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:
Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks. AINA Workshops 2008: 1299-1304 - [c44]Okan Yilmaz, Ing-Ray Chen:
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Classes in Wireless Networks. ICCCN 2008: 191-196 - [c43]Jin-Hee Cho, Ing-Ray Chen:
Effect of intrusion detection on secure group communications in hierarchically structured group architectures. LCN 2008: 942-949 - [c42]Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. PRDC 2008: 289-296 - [c41]Yansheng Zhang, Farokh B. Bastani, I-Ling Yen, Jicheng Fu, Ing-Ray Chen:
Availability Analysis of Robotic Swarm Systems. PRDC 2008: 331-338 - 2007
- [j47]Ing-Ray Chen, Weiping He, Baoshan Gu:
Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems. Comput. J. 50(3): 281-293 (2007) - [j46]Anh Phan Speer, Ing-Ray Chen:
Effect of redundancy on the mean time to failure of wireless sensor networks. Concurr. Comput. Pract. Exp. 19(8): 1119-1128 (2007) - [j45]Ing-Ray Chen, Weiping He, Baoshan Gu:
DMAP: integrated mobility and service management in mobile IPv6 systems. Wirel. Pers. Commun. 43(2): 711-723 (2007) - [c40]Weiping He, Ing-Ray Chen, Baoshan Gu:
A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems. AINA 2007: 354-361 - [c39]Ing-Ray Chen, Ding-Chau Wang:
Modeling and analysis of regional registration based mobile multicast service management. ICPADS 2007: 1-6 - 2006
- [j44]Ing-Ray Chen, Bojan Cukic:
High Assurance Software Systems. Comput. J. 49(5): 507-508 (2006) - [j43]Ing-Ray Chen, Baoshan Gu, Sheng-Tzong Cheng:
On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems. IEEE Trans. Mob. Comput. 5(2): 179-192 (2006) - [j42]Sheng-Tzong Cheng, Chun-Yen Wang, Ing-Ray Chen:
Filtering strategies for TFC selection schemes in 3GPP W-CDMA systems. IEEE Trans. Wirel. Commun. 5(5): 1023-1032 (2006) - [j41]Ing-Ray Chen, Okan Yilmaz, I-Ling Yen:
Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks. Wirel. Pers. Commun. 38(3): 357-376 (2006) - [j40]Wei Hao, Jicheng Fu, Jiang He, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen:
Extending Proxy Caching Capability: Issues and Performance. World Wide Web 9(3): 253-275 (2006) - [c38]Anh Phan Speer, Ing-Ray Chen:
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks. AINA (2) 2006: 373-382 - [c37]Okan Yilmaz, Ing-Ray Chen:
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks. ICPADS (1) 2006: 605-612 - [c36]Ing-Ray Chen, Weiping He, Baoshan Gu:
DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 Systems. LCN 2006: 753-760 - [c35]Anh Phan Speer, Ing-Ray Chen:
On Optimal Path and Source Redundancy for Achieving QoS and Maximizing Lifetime of Query-Based Wireless Sensor Networks. MASCOTS 2006: 51-60 - [c34]Sapna E. George, Ing-Ray Chen, Ying Jin:
Movement-based checkpointing and logging for recovery in mobile computing systems. MobiDE 2006: 51-58 - [c33]Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang:
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks. SUTC (1) 2006: 411-419 - 2005
- [j39]Baoshan Gu, Ing-Ray Chen:
Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems. Mob. Networks Appl. 10(4): 453-463 (2005) - [j38]Ing-Ray Chen, Sheng-Tun Li, I-Ling Yen:
Adaptive QoS Control Based on Benefit Optimization for Video Servers Providing Differentiated Services. Multim. Tools Appl. 25(2): 167-185 (2005) - [j37]Ing-Ray Chen, Baoshan Gu, Sapna E. George, Sheng-Tzong Cheng:
On failure recoverability of client-server applications in mobile wireless environments. IEEE Trans. Reliab. 54(1): 115-122 (2005) - [j36]Ing-Ray Chen, Ngoc Anh Phan, I-Ling Yen:
Update Propagation Algorithms for Supporting Disconnected Write in Mobile Wireless Systems with Data Broadcasting Capability. Wirel. Pers. Commun. 34(3): 227-253 (2005) - 2004
- [j35]Ing-Ray Chen, Luiz A. DaSilva, Scott F. Midkiff:
Editorial: Mobile and Pervasive Computing. Comput. J. 47(4): 404 (2004) - [j34]Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu:
Analyzing reconfigurable algorithms for managing replicated data . J. Syst. Softw. 72(3): 417-430 (2004) - [j33]Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen:
Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks. IEEE Trans. Software Eng. 30(4): 218-230 (2004) - [j32]Ding-Chau Wang, Ing-Ray Chen, Chih-Ping Chu, I-Ling Yen:
Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems. Wirel. Pers. Commun. 28(1): 17-33 (2004) - [c32]Naresh Verma, Ing-Ray Chen:
Admission Control Algorithms Integrated with Pricing for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks. ICPADS 2004: 495-502 - [c31]Ing-Ray Chen, Jeffery W. Wilson, Frank Driscoll, Karen Rigopoulos:
Performance Analysis of Location-Based Data Consistency Algorithms in Mobile Ad Hoc Networks. ICPADS 2004: 503- - [c30]Qingkai Ma, Wei Li, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen:
Survivable Systems Based on an Adaptive NMR Algorithm. IPDPS 2004 - [c29]Luiz A. DaSilva, Scott F. Midkiff, Ing-Ray Chen:
A Hands-on Course on Wireless and Mobile Systems Design. PerCom Workshops 2004: 241-246 - 2003
- [j31]Ing-Ray Chen, Naresh Verma:
A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects. Comput. J. 46(6): 645-659 (2003) - [j30]Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu:
Analyzing User-Perceived Dependability and Performance Characteristics of Voting Algorithms for Managing Replicated Data. Distributed Parallel Databases 14(3): 199-219 (2003) - [j29]Sheng-Tzong Cheng, Chi-Ming Chen, Ing-Ray Chen:
Performance evaluation of an admission control algorithm: dynamic threshold with negotiation. Perform. Evaluation 52(1): 1-13 (2003) - [j28]Ing-Ray Chen, Baoshan Gu:
Quantitative Analysis of a Hybrid Replication with Forwarding Strategy for Efficient and Uniform Location Management in Mobile Wireless Networks. IEEE Trans. Mob. Comput. 2(1): 3-15 (2003) - [c28]Ing-Ray Chen, Naresh Verma:
Simulation Study of a Class of Autonomous Host-Centric Mobility Prediction Algorithms for Wireless Cellular and Ad Hoc Networks. Annual Simulation Symposium 2003: 65-72 - [c27]Ing-Ray Chen, Ngoc Anh Phan:
Update Propagation Algorithms for Supporting Disconnected Operations in Mobile Wireless Systems with Data Broadcasting. ICDCS Workshops 2003: 784-789 - [c26]Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen:
High-Assurance Synthesis of Security Services from Basic Microservices. ISSRE 2003: 154-168 - 2002
- [j27]Ing-Ray Chen, Baoshan Gu:
A Comparative Cost Analysis of Degradable Location Management Algorithms in Wireless Networks. Comput. J. 45(3): 304-319 (2002) - [j26]Sheng-Tzong Cheng, Ing-Ray Chen:
A self-adjusting quality of service control scheme. Inf. Process. Lett. 83(6): 337-344 (2002) - [j25]Ing-Ray Chen, Ngoc Anh Phan, I-Ling Yen:
Algorithms for Supporting Disconnected Write Operations for Wireless Web Access in Mobile Client-Server Environments. IEEE Trans. Mob. Comput. 1(1): 46-58 (2002) - [c25]Farokh B. Bastani, Sung Kim, I-Ling Yen, Ing-Ray Chen:
An Architecture-Based Comparison of Verification and Statistical Reliability Assessment Methods for Embedded Software Systems. Symposium on Object-Oriented Real-Time Distributed Computing 2002: 177-180 - [c24]Farokh B. Bastani, Sung Kim, I-Ling Yen, Ing-Ray Chen:
Reliability Assessment of Framework-Based Distributed Embedded Software Systems. ISSRE 2002: 367-376 - [c23]Ing-Ray Chen, Sheng-Tun Li, I-Ling Yen:
QoS Control Algorithms Based on Benefit Optimization for Video Servers Providing Differentiated Services. JCIS 2002: 988-991 - [c22]Ing-Ray Chen, Edward A. Fox:
Design and Analysis of A Set-Top Box for Video Streaming Services. JCIS 2002: 1005-1008 - 2001
- [j24]Ing-Ray Chen:
Special Issue Editorial: High Assurance Systems. Comput. J. 44(6): 471-472 (2001) - [j23]Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:
Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks. Mob. Networks Appl. 6(2): 105-115 (2001) - [c21]Ing-Ray Chen, Sheng-Tun Li:
A Cost-Based Admission Control Algorithm for Handling Mixed Workloads in Multimedia Server Systems. ICPADS 2001: 543-548 - [c20]Ing-Ray Chen, Ngoc Anh Phan, I-Ling Yen:
Analysis of Algorithms for Supporting Disconnected Write Operations in Mobile Client-Server Environments. ISADS 2001: 456-463 - 2000
- [j22]Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu:
Response time behavior of distributed voting algorithms for managing replicated data. Inf. Process. Lett. 75(6): 247-253 (2000) - [j21]Sheng-Tzong Cheng, Chi-Ming Chen, Ing-Ray Chen:
Dynamic Quota-Based Admission Control with Sub-Rating in Multimedia Servers. Multim. Syst. 8(2): 83-91 (2000) - [j20]Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:
Analysis and Comparison of Location Strategies for Reducing Registration Cost in PCS Networks. Wirel. Pers. Commun. 12(2): 117-136 (2000) - [c19]Ding-Chau Wang, Chih-Ping Chu, Ing-Ray Chen:
Analyzing Reconfigurable Algorithms for Managing Replicated Data with Strict Consistency Requirements: A Case Study. COMPSAC 2000: 608-613
1990 – 1999
- 1999
- [j19]Ing-Ray Chen, Sayed Atef Banawan:
Performance and Stability Analysis of Multilevel Data Structures with Deferred Reorganization. IEEE Trans. Software Eng. 25(5): 690-700 (1999) - [c18]Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu:
Response Time Behavior of Voting Schemes for Managing Replicated Data. COMPSAC 1999: 139-144 - [c17]I-Ling Yen, Biao Chen, Ing-Ray Chen:
Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure. HASE 1999: 161-168 - 1998
- [j18]Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:
Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks. Comput. J. 41(4): 243-253 (1998) - [j17]Ing-Ray Chen, Tao-Hung Hsi:
Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers. Perform. Evaluation 33(2): 89-112 (1998) - [c16]Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:
Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks. ICPADS 1998: 266-273 - [c15]Sheng-Tzong Cheng, Chi-Ming Chen, Ing-Ray Chen:
A Study of Self-adjusting Quality of Service Control Schemes. WSC 1998: 1623-1628 - 1997
- [c14]Ing-Ray Chen, Tsong-Min Chen, Chiang Lee:
Performance characterization of forwarding strategies in personal communication networks. COMPSAC 1997: 137-142 - 1996
- [j16]Ing-Ray Chen, Chi-Ming Chen:
Threshold-Based Admission Control Policies for Multimedia Servers. Comput. J. 39(9): 757-766 (1996) - [j15]Ing-Ray Chen, Ding-Chau Wang:
Analysis of Replicated Data with Repair Dependency. Comput. J. 39(9): 767-779 (1996) - [c13]Ing-Ray Chen, Ding-Chau Wang:
Repairman Models for Replicated Data Management: A Case Study. PDIS 1996: 184-195 - [c12]Ing-Ray Chen, Tao-Hung Hsi:
Threshold-based dynamic admission control algorithms for real-time multimedia servers. SAC 1996: 224-229 - [c11]Ing-Ray Chen, Ding-Chau Wang:
Analyzing Dynamic Voting Using Petri Nets. SRDS 1996: 44-53 - 1995
- [j14]Ing-Ray Chen:
A Degradable Blink-Tree with Periodic Data Reorganization. Comput. J. 38(3): 245-252 (1995) - [j13]Ing-Ray Chen, I-Ling Yen:
Analysis of Probabilistic Error Checking Procedures on Storage Systems. Comput. J. 38(5): 348-354 (1995) - [j12]Ing-Ray Chen:
On Applying Imprecise Computation to Real-Time AI Systems. Comput. J. 38(6): 434-442 (1995) - [j11]Ing-Ray Chen:
Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking. Comput. J. 38(9): 717-733 (1995) - [j10]Ing-Ray Chen, Farokh B. Bastani, Ta-Wei Tsao:
On the Reliability of AI Planning Software in Real-Time Applications. IEEE Trans. Knowl. Data Eng. 7(1): 4-13 (1995) - [c10]I-Ling Yen, Ing-Ray Chen:
Quality Assessment for Multiple Server Cooperating Systems. COMPSAC 1995: 218-223 - [c9]Ing-Ray Chen, Salah Hassan:
Performance analysis of a periodic data reorganization algorithm for concurrent Blink-trees in database systems. SAC 1995: 40-45 - 1994
- [j9]Ing-Ray Chen, Bryant L. Poole:
Performance Evaluation of Rule Grouping on a Real-Time Expert System Architecture. IEEE Trans. Knowl. Data Eng. 6(6): 883-891 (1994) - [j8]Ing-Ray Chen, Farokh B. Bastani:
Warm Standby in Hierarchically Structured Process-Control Programs. IEEE Trans. Software Eng. 20(8): 658-663 (1994) - [c8]Ing-Ray Chen, Rajakumar Betapudi:
A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection. SAC 1994: 539-544 - [c7]I-Ling Yen, Ing-Ray Chen, Farokh B. Bastani:
On the reliability of dependable soft real-time cooperating systems. WORDS 1994: 132-137 - 1993
- [j7]Farokh B. Bastani, Ing-Ray Chen:
The Reliability of Embedded AI Systems. IEEE Expert 8(2): 72-78 (1993) - [j6]Farokh B. Bastani, Ing-Ray Chen:
Assessment of the Reliability of AI Programs. Int. J. Artif. Intell. Tools 2(2): 235-248 (1993) - [j5]Farokh B. Bastani, Ing-Ray Chen, Ta-Wei Tsao:
A Software Reliability Model for Artificial Intelligence Programs. Int. J. Softw. Eng. Knowl. Eng. 3(1): 99-114 (1993) - [j4]Ing-Ray Chen, Sayed Atef Banawan:
Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers. IEEE Trans. Software Eng. 19(9): 902-911 (1993) - [c6]Ing-Ray Chen, Ta-Wei Tsao, Farokh B. Bastani:
Reliability of uniprocessor and multiprocessor real-time artificial intelligence planning systems. ISSRE 1993: 160-167 - [c5]Ing-Ray Chen:
Effect of Probabilistic Error Checking Procedures and Performability of Robust Objects. SAC 1993: 677-681 - 1992
- [j3]Ing-Ray Chen, Sayed Atef Banawan:
A Reduced Markov Model for the Performance Analysis of Data Structure Servers with Periodic Maintenance. Comput. J. 35(Additional-Papers): A363-A368 (1992) - [c4]Ing-Ray Chen, Sayed Atef Banawan:
A uniform approach to the stability and performance analysis of concurrent data structure maintenance policies. SAC 1992: 160-168 - 1991
- [j2]Farokh B. Bastani, Ing-Ray Chen, Wael Hilal Bahaa-El-Din:
A Model for the Stability Analysis of Maintenance Stragies for Linear List. Comput. J. 34(1): 80-87 (1991) - 1990
- [c3]Farokh B. Bastani, Ing-Ray Chen:
Assessment of the reliability of AI programs. TAI 1990: 753-759
1980 – 1989
- 1988
- [j1]Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen:
A Class of Inherently Fault Tolerant Distributed Programs. IEEE Trans. Software Eng. 14(10): 1432-1442 (1988) - [c2]Farokh B. Bastani, Ing-Ray Chen:
The Role of Artificial Intelligence in Fault-Tolerant Process-Control Systems. IEA/AIE (Vol. 2) 1988: 1049-1058 - 1986
- [c1]Farokh B. Bastani, Wael Hilal Bahaa-El-Din, Ing-Ray Chen:
Performance Analysis of Concurrent Maintenance Policies for Servers in a Distributed Environment. FJCC 1986: 611-619
Coauthor Index
aka: Ding-Chao Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint