Suivre
Qun Li
Qun Li
IEEE Fellow, Professor of Computer Science, William & Mary
Adresse e-mail validée de cs.wm.edu - Page d'accueil
Titre
Citée par
Citée par
Année
A survey of fog computing: concepts, applications and issues
S Yi, C Li, Q Li
Proceedings of the 2015 workshop on mobile big data, 37-42, 2015
18512015
Fog computing: Platform and applications
S Yi, Z Hao, Z Qin, Q Li
2015 Third IEEE workshop on hot topics in web systems and technologies …, 2015
10502015
Global clock synchronization in sensor networks
Q Li, D Rus
IEEE Transactions on computers 55 (2), 214-226, 2006
8522006
Online power-aware routing in wireless ad-hoc networks
Q Li, J Aslam, D Rus
Proceedings of the 7th annual international conference on Mobile computing …, 2001
7202001
Security and privacy issues of fog computing: A survey
S Yi, Z Qin, Q Li
Wireless Algorithms, Systems, and Applications: 10th International …, 2015
6682015
Sending messages to mobile users in disconnected ad-hoc wireless networks
Q Li, D Rus
Proceedings of the 6th annual international conference on Mobile computing …, 2000
4342000
Distributed algorithms for guiding navigation across a sensor network
Q Li, M De Rosa, D Rus
Proceedings of the 9th annual international conference on Mobile computing …, 2003
4122003
Lavea: Latency-aware video analytics on edge computing platform
S Yi, Z Hao, Q Zhang, Q Zhang, W Shi, Q Li
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 1-13, 2017
3542017
IMDGuard: Securing implantable medical devices with the external wearable guardian
F Xu, Z Qin, CC Tan, B Wang, Q Li
2011 Proceedings IEEE INFOCOM, 1862-1870, 2011
3152011
Outlier detection in sensor networks
B Sheng, Q Li, W Mao, W Jin
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2662007
Elliptic curve cryptography-based access control in sensor networks
H Wang, B Sheng, Q Li
International Journal of Security and Networks 1 (3-4), 127-137, 2006
2522006
Hierarchical power-aware routing in sensor networks
Q Li, J Aslam, D Rus
Proceedings of the DIMACS workshop on pervasive networking 10 (381677.381687), 2001
2492001
Challenges and software architecture for fog computing
Z Hao, E Novak, S Yi, Q Li
IEEE Internet Computing 21 (2), 44-53, 2017
2302017
Secure and serverless RFID authentication and search protocols
CC Tan, B Sheng, Q Li
IEEE Transactions on Wireless Communications 7 (4), 1400-1407, 2008
2292008
Efficient service handoff across edge servers via docker container migration
L Ma, S Yi, Q Li
Proceedings of the second ACM/IEEE symposium on edge computing, 1-13, 2017
2222017
Body sensor network security: an identity-based cryptography approach
CC Tan, H Wang, S Zhong, Q Li
Proceedings of the first ACM conference on Wireless network security, 148-153, 2008
2042008
Efficient implementation of public key cryptosystems on mote sensors (short paper)
H Wang, Q Li
ICICS, 519-528, 2006
1942006
Counting RFID tags efficiently and anonymously
H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1902010
A timing-based scheme for rogue AP detection
H Han, B Sheng, CC Tan, Q Li, S Lu
Parallel and Distributed Systems, IEEE Transactions on 22 (11), 1912-1925, 2011
1842011
IBE-Lite: A lightweight identity-based cryptography for body sensor networks
CC Tan, H Wang, S Zhong, Q Li
IEEE Transactions on Information Technology in Biomedicine 13 (6), 926-932, 2009
1842009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20