Wei Shi
Wei Shi
Associate Prof., School of Info. Tech., Faculty of Engineering & Design, Carleton University
Verified email at carleton.ca - Homepage
Cited by
Cited by
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds
Y Wang, W Shi
IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014
Coverage protocols for wireless sensor networks: Review and future directions
R Elhabyan, W Shi, M St-Hilaire
Journal of Communications and Networks 21 (1), 45-60, 2019
Black hole search in asynchronous rings using tokens
S Dobrev, R Královič, N Santoro, W Shi
Algorithms and Complexity, 139-150, 2006
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks
R Elhabyan, W Shi, M St-Hilaire
Journal of Network and Computer Applications 114, 57-69, 2018
Black hole search with tokens in interconnected networks
W Shi
Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens
S Dobrev, N Santoro, W Shi
International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
An improved xen credit scheduler for i/o latency-sensitive applications on multicores
L Zeng, Y Wang, W Shi, D Feng
2013 International Conference on Cloud Computing and Big Data, 267-274, 2013
Black hole search in computer networks: State-of-the-art, challenges and future directions
M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang
Journal of Parallel and Distributed Computing 88, 1-15, 2016
Modeling and validating requirements using executable cotnracts and scenarios
D Arnold, JP Corriveau, W Shi
2010 Eighth ACIS International Conference on Software Engineering Research …, 2010
Scattered black hole search in an oriented ring using tokens
S Dobrev, N Santoro, W Shi
2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007
Scenario-based validation: Beyond the user requirements notation
D Arnold, JP Corriveau, W Shi
2010 21st Australian Software Engineering Conference, 75-84, 2010
Sensor deployment by a robot in an unknown orthogonal region: Achieving full coverage
E Mesa-Barrameda, N Santoro, W Shi, N Taleb
2014 20th IEEE International Conference on Parallel and Distributed Systems …, 2014
Locating a black hole in an un-oriented ring using tokens: The case of scattered agents
S Dobrev, N Santoro, W Shi
Euro-Par 2007 Parallel Processing, 608-617, 2007
Virtual servers co-migration for mobile accesses: Online versus off-line
Y Wang, W Shi, M Hu
IEEE Transactions on Mobile Computing 14 (12), 2576-2589, 2015
On optimal budget-driven scheduling algorithms for MapReduce jobs in the hetereogeneous cloud
Y Wang, W Shi
Technical Report TR-13–02, Carleton Univ., 2013
A scheduling algorithm for hadoop mapreduce workflows with budget constraints in the heterogeneous cloud
A Wylie, W Shi, JP Corriveau, Y Wang
2016 IEEE International Parallel and Distributed Processing Symposium …, 2016
Searching for a black hole in interconnected networks using mobile agents and tokens
W Shi, J Garcia-Alfaro, JP Corriveau
Journal of Parallel and Distributed Computing 74 (1), 1945-1958, 2014
The system can't perform the operation now. Try again later.
Articles 1–20