Skip to main content

Page for Publication based on Types

Publication

Modeling and Analytics of Software Systems

Journal Paper

  1. Zhao, Y., Damevski, K., & Chen, H. (2023). A Systematic Survey of Just-in-Time Software Defect Prediction. ACM Computing Surveys, 55(10), 201:1–201:35. https://doi.org/10.1145/3567550

    Recent years have experienced sustained focus in research on software defect prediction that aims to predict the likelihood of software defects. Moreover, with the increased interest in continuous deployment, a variant of software defect prediction called Just-in-Time Software Defect Prediction (JIT-SDP) focuses on predicting whether each incremental software change is defective. JIT-SDP is unique in that it consists of two interconnected data streams, one consisting of the arrivals of software changes stemming from design and implementation, and the other the (defective or clean) labels of software changes resulting from quality assurance processes.We present a systematic survey of 67 JIT-SDP studies with the objective to help researchers advance the state of the art in JIT-SDP and to help practitioners become familiar with recent progress. We summarize best practices in each phase of the JIT-SDP workflow, carry out a meta-analysis of prior studies, and suggest future research directions. Our meta-analysis of JIT-SDP studies indicates, among other findings, that the predictive performance correlates with change defect ratio, suggesting that JIT-SDP is most performant in projects that experience relatively high defect ratios. Future research directions for JIT-SDP include situating each technique into its application domain, reliability-aware JIT-SDP, and user-centered JIT-SDP.

    @article{zhao2022systematic,
      author = {Zhao, Yunhua and Damevski, Kostadin and Chen, Hui},
      title = {A Systematic Survey of Just-in-Time Software Defect Prediction},
      month = feb,
      year = {2023},
      issue_date = {October 2023},
      publisher = {Association for Computing Machinery},
      address = {New York, NY, USA},
      volume = {55},
      number = {10},
      pages = {201:1-201:35},
      issn = {0360-0300},
      url = {https://dl.acm.org/doi/10.1145/3567550},
      doi = {10.1145/3567550},
      journal = {ACM Computing Surveys},
      articleno = {201},
      numpages = {35},
      keywords = {software change metrics, release software defect prediction, machine learning, searching-based algorithms, Software defect prediction, just-in-time software defect prediction, change defect density, change-level software defect prediction}
    }
    
  1. Zhao, Y., Damevski, K., & Chen, H. (2023). Supplementary Material for: A Systematic Survey of Just-in-time Software Defect Prediction. ACM Computing Surveys, 55(10), 201:1–201:25. https://dl.acm.org/action/downloadSupplement?doi=10.1145%2F3567550&file=3567550-supp.pdf
    @article{zhao2022systematicsuppl,
      author = {Zhao, Yunhua and Damevski, Kostadin and Chen, Hui},
      title = {Supplementary Material for:
      		A Systematic Survey of Just-in-time Software Defect
      			Prediction},
      year = {2023},
      issue_date = {October 2023},
      publisher = {Association for Computing Machinery},
      address = {New York, NY, USA},
      volume = {55},
      number = {10},
      pages = {201:1-201:25},
      issn = {0360-0300},
      url = {https://dl.acm.org/action/downloadSupplement?doi=10.1145%2F3567550&file=3567550-supp.pdf},
      note = {Online only: \url{https://dl.acm.org/action/downloadSupplement?doi=10.1145%2F3567550&file=3567550-supp.pdf}},
      journal = {ACM Computing Surveys},
      month = feb,
      numpages = {25}
    }
    
  1. Chen, H., Damevski, K., Shepherd, D., & Kraft, N. A. (2019). Modeling hierarchical usage context for software exceptions based on interaction data. Automated Software Engineering, 26(4), 733–756. https://doi.org/10.1007/s10515-019-00265-3

    Traces of user interactions with a software system, captured in production, are commonly used as an input source for user experience testing. In this paper, we present an alternative use, introducing a novel approach of modeling user interaction traces enriched with another type of data gathered in production—software fault reports consisting of software exceptions and stack traces. The model described in this paper aims to improve developers’ comprehension of the circumstances surrounding a specific software exception and can highlight specific user behaviors that lead to a high frequency of software faults. Modeling the combination of interaction traces and software crash reports to form an interpretable and useful model is challenging due to the complexity and variance in the combined data source. Therefore, we propose a probabilistic unsupervised learning approach, adapting the nested hierarchical Dirichlet process, which is a Bayesian non-parametric hierarchical topic model originally applied to natural language data. This model infers a tree of topics, each of whom describes a set of commonly co-occurring commands and exceptions. The topic tree can be interpreted hierarchically to aid in categorizing the numerous types of exceptions and interactions. We apply the proposed approach to large scale datasets collected from the ABB RobotStudio software application, and evaluate it both numerically and with a small survey of the RobotStudio developers.

    @article{chen2019modeling,
      author = {Chen, Hui and Damevski, Kostadin and Shepherd, David and Kraft, Nicholas A.},
      title = {Modeling hierarchical usage context for software exceptions based on interaction data},
      journal = {Automated Software Engineering},
      year = {2019},
      month = dec,
      day = {01},
      volume = {26},
      number = {4},
      pages = {733--756},
      issn = {1573-7535},
      doi = {10.1007/s10515-019-00265-3},
      url = {https://doi.org/10.1007/s10515-019-00265-3}
    }
    
  1. Chen, H., Coogle, J., & Damevski, K. (2019). Modeling Stack Overflow tags and topics as a hierarchy of concepts. Journal of Systems and Software, 156, 283–299. https://doi.org/https://doi.org/10.1016/j.jss.2019.07.033

    Developers rely on online Q&A forums to look up technical solutions, to pose questions on implementation problems, and to enhance their community profile by contributing answers. Many popular developer communication platforms, such as the Stack Overflow Q&A forum, require threads of discussion to be tagged by their contributors for easier lookup in both asking and answering questions. In this paper, we propose to leverage Stack Overflow’s tags to create a hierarchical organization of concepts discussed on this platform. The resulting concept hierarchy couples tags with a model of their relevancy to prospective questions and answers. For this purpose, we configure and apply a supervised multi-label hierarchical topic model to Stack Overflow questions and demonstrate the quality of the model in several ways: by identifying tag synonyms, by tagging previously unseen Stack Overflow posts, and by exploring how the hierarchy could aid exploratory searches of the corpus. The results suggest that when traversing the inferred hierarchical concept model of Stack Overflow the questions become more specific as one explores down the hierarchy and more diverse as one jumps to different branches. The results also indicate that the model is an improvement over the baseline for the detection of tag synonyms and that the model could enhance existing ensemble methods for suggesting tags for new questions. The paper indicates that the concept hierarchy as a modeling imperative can create a useful representation of the Stack Overflow corpus. This hierarchy can be in turn integrated into development tools which rely on information retrieval and natural language processing, and thereby help developers more efficiently navigate crowd-sourced online documentation.

    @article{CHEN2019283,
      title = {Modeling {Stack Overflow} tags and topics as a hierarchy of concepts},
      journal = {Journal of Systems and Software},
      volume = {156},
      pages = {283 - 299},
      month = oct,
      year = {2019},
      issn = {0164-1212},
      doi = {https://doi.org/10.1016/j.jss.2019.07.033},
      url = {http://www.sciencedirect.com/science/article/pii/S0164121219301499},
      author = {Chen, Hui and Coogle, John and Damevski, Kostadin},
      keywords = {Concept hierarchy, Hierarchical topic model, Stack overflow, Tag synonym identification, Tag prediction, Entropy-based search evaluation}
    }
    
  1. Damevski, K., Chen, H., Shepherd, D. C., Kraft, N. A., & Pollock, L. (2018). Predicting Future Developer Behavior in the IDE Using Topic Models. IEEE Transactions on Software Engineering, 44(11), 1100–1111. https://doi.org/10.1109/TSE.2017.2748134
    @article{damevski8024001,
      author = {Damevski, Kostadin and Chen, Hui and Shepherd, David C. and Kraft, Nicholas A. and Pollock, Lori},
      journal = {IEEE Transactions on Software Engineering},
      title = {Predicting Future Developer Behavior in the IDE Using Topic Models},
      year = {2018},
      volume = {44},
      number = {11},
      pages = {1100-1111},
      keywords = {program debugging;recommender systems;software engineering;future developer behavior;early software command recommender systems;negative user reaction;unusually complex applications;command recommendations;recommendation generation;user experience;command recommenders;future task context;debug OR;future development commands;software development interaction data;predicting future IDE commands;empirically-interpretable observations;Natural languages;Data models;Analytical models;Predictive models;Visualization;Adaptation models;Data analysis;Command recommendation systems;IDE interaction data},
      doi = {10.1109/TSE.2017.2748134},
      issn = {0098-5589},
      month = nov
    }
    

Conference Paper

  1. Damevski, K., Chen, H., Shepherd, D., & Pollock, L. (2016). Interactive Exploration of Developer Interaction Traces Using a Hidden Markov Model. Proceedings of the 13th International Workshop on Mining Software Repositories, 126–136. https://doi.org/10.1145/2901739.2901741
    @inproceedings{Damevski_2016_IED_2901739_2901741,
      author = {Damevski, Kostadin and Chen, Hui and Shepherd, David and Pollock, Lori},
      title = {Interactive Exploration of Developer Interaction Traces Using a
              Hidden Markov Model},
      booktitle = {Proceedings of the 13th International Workshop on Mining
              Software Repositories},
      series = {MSR '16},
      year = {2016},
      isbn = {978-1-4503-4186-8},
      location = {Austin, Texas},
      pages = {126--136},
      numpages = {11},
      url = {http://doi.acm.org/10.1145/2901739.2901741},
      doi = {10.1145/2901739.2901741},
      acmid = {2901741},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {IDE usage data, field studies, hidden-markov model}
    }
    

System and Network Security

Journal Paper

  1. Duncan, S. P., & Chen, H. (2023). Detecting network-based internet censorship via latent feature representation learning. Computers & Security, 128(103138), 103138:1–103138:13. https://doi.org/https://doi.org/10.1016/j.cose.2023.103138

    Internet censorship is a phenomenon of societal importance and attracts investigation from multiple disciplines. Several research groups, such as Censored Planet, have deployed large scale Internet measurement platforms to collect network reachability data. However, existing studies generally rely on manually designed rules (i.e., using censorship fingerprints) to detect network-based Internet censorship from the data. While this rule-based approach yields a high true positive detection rate, it suffers from several challenges: it requires human expertise, is laborious, and cannot detect any censorship not captured by the rules. Seeking to overcome these challenges, we design and evaluate a classification model based on latent feature representation learning and an image-based classification model to detect network-based Internet censorship. To infer latent feature representations from network reachability data, we propose a sequence-to-sequence autoencoder to capture the structure and the order of data elements in the data. To estimate the probability of censorship events from the inferred latent features, we rely on a densely connected multi-layer neural network model. Our image-based classification model encodes a network reachability data record as a gray-scale image and classifies the image as censored or not using a dense convolutional neural network. We compare and evaluate both approaches using data sets from Censored Planet via a hold-out evaluation. Both classification models are capable of detecting network-based Internet censorship as we were able to identify instances of censorship not detected by the known fingerprints. Latent feature representations likely encode more nuances in the data since the latent feature learning approach discovers a greater quantity, and a more diverse set, of new censorship instances.

    @article{duncan2022detecting,
      title = {Detecting network-based internet censorship via latent feature representation learning},
      journal = {Computers \& Security},
      volume = {128},
      number = {103138},
      pages = {103138:1-103138:13},
      numpages = {13},
      year = {2023},
      issn = {0167-4048},
      doi = {https://doi.org/10.1016/j.cose.2023.103138},
      url = {https://www.sciencedirect.com/science/article/pii/S0167404823000482},
      author = {Duncan, Shawn P. and Chen, Hui},
      keywords = {Internet censorship, Internet censorship detection, Network-based internet censorship detection, Deep neural network, Feature representation learning}
    }
    
  1. Xiao, Y., Zeng, L., Chen, H., & Li, T. (2019). Prototyping Flow-Net Logging for Accountability Management in Linux Operating Systems. IEEE Access, 7, 131172–131187. https://doi.org/10.1109/ACCESS.2019.2937637
    @article{Xiao8813093,
      author = {{Xiao}, Y. and {Zeng}, L. and {Chen}, H. and {Li}, T.},
      journal = {IEEE Access},
      title = {Prototyping Flow-Net Logging for Accountability Management in Linux Operating Systems},
      year = {2019},
      month = aug,
      volume = {7},
      number = {},
      pages = {131172-131187},
      keywords = {Linux;Access control;Kernel;Internet of Things;Computer security;Computer security;accountability;logging;auditing;flow-net;IoT},
      doi = {10.1109/ACCESS.2019.2937637},
      issn = {}
    }
    
  1. Fu, B., Xiao, Y., & Chen, H. (2018). FNF: Flow-net based fingerprinting and its applications. Computers & Security, 75, 167–181. https://doi.org/https://doi.org/10.1016/j.cose.2018.02.005
    @article{FU2018167,
      title = {{FNF}: Flow-net based fingerprinting and its applications},
      journal = {Computers \& Security},
      volume = {75},
      pages = {167 - 181},
      month = jun,
      year = {2018},
      issn = {0167-4048},
      doi = {https://doi.org/10.1016/j.cose.2018.02.005},
      url = {http://www.sciencedirect.com/science/article/pii/S0167404818300877},
      author = {Fu, Bo and Xiao, Yang and Chen, Hui},
      keywords = {Flow-net, Logging, Fingerprint, Intrusion detection, Computer networks, Computer systems}
    }
    
  1. Zeng, L., Chen, H., & Xiao, Y. (2017). Accountable Administration in Operating Systems. International Journal of Information and Computer Security, 9, 157–179. https://doi.org/10.1504/IJICS.2017.10005900
    @article{zeng2017accountable,
      author = {Zeng, Lei and Chen, Hui and Xiao, Yang},
      title = {Accountable Administration in Operating Systems},
      journal = {International Journal of Information and Computer Security},
      year = {2017},
      volume = {9},
      no = {3},
      pages = {157--179},
      doi = {10.1504/IJICS.2017.10005900},
      publisher = {Indersciene}
    }
    
  1. Zeng, L., Xiao, Y., Chen, H., Sun, B., & Han, W. (2016). Computer operating system logging and security issues: a survey. Security and Communication Networks, 9(17), 4804–4821. https://doi.org/10.1002/sec.1677
    @article{SEC_SEC1677,
      author = {Zeng, Lei and Xiao, Yang and Chen, Hui and Sun, Bo and Han, Wenlin},
      title = {Computer operating system logging and security issues: a survey},
      journal = {Security and Communication Networks},
      volume = {9},
      number = {17},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.1677},
      doi = {10.1002/sec.1677},
      pages = {4804--4821},
      keywords = {logging, operating system, Linux, Unix, security},
      year = {2016}
    }
    
  1. Zeng, L., Xiao, Y., & Chen, H. (2015). Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. Security and Communication Networks, 8(18), 3523–3534. https://doi.org/10.1002/sec.1277
    @article{SEC_SEC1277,
      author = {Zeng, Lei and Xiao, Yang and Chen, Hui},
      title = {Auditing overhead, auditing adaptation, and benchmark evaluation in {Linux}},
      journal = {Security and Communication Networks},
      volume = {8},
      number = {18},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.1277},
      doi = {10.1002/sec.1277},
      pages = {3523--3534},
      keywords = {logging, overhead, Linux, auditing},
      year = {2015}
    }
    
  1. Xiao, Z., Xiao, Y., & Chen, H. (2014). An Accountable Framework for Sensing-oriented Mobile Cloud Computing. Journal of Internet Technology, 15(5), 813–822. https://doi.org/10.6138/JIT.2014.15.5.11
    @article{Xiaozf2014,
      title = {An Accountable Framework for Sensing-oriented Mobile Cloud Computing},
      author = {Xiao, Zhifeng and Xiao, Yang and Chen, Hui},
      journal = {Journal of Internet technology},
      volume = {15},
      number = {5},
      pages = {813 - 822},
      month = sep,
      year = {2014},
      doi = {10.6138/JIT.2014.15.5.11},
      preprint = {preprint/AccntMobiCloud_16_Xiao.pdf}
    }
    
  1. Liu, J., Xiao, Y., Chen, H., Ozdemir, S., Dodle, S., & Singh, V. (2010). A Survey of Payment Card Industry Data Security Standard. IEEE Communications Surveys and Tutorials, 12(3), 287–303. https://doi.org/10.1109/SURV.2010.031810.00083
    @article{LIU_5455788,
      author = {Liu, Jing and Xiao, Yang and Chen, Hui and Ozdemir, S. and Dodle, S. and Singh, V.},
      journal = {IEEE Communications Surveys and Tutorials},
      title = {A Survey of Payment Card Industry Data Security Standard},
      month = {Third Quarter},
      year = {2010},
      volume = {12},
      number = {3},
      pages = {287-303},
      keywords = {credit transactions;research and development;security of data;PCI Data Security Standard;PCI Qualified Security Assessors;PCI security scanning;Payment Card Industry;QSA;Security Standards Council;credit cards;debit cards;payment card data handling;payment card networks;payment card transaction processing;prepaid cards;security breaches;security infrastructures;service providers;technical research problems;Data Security Standard;Payment Card Industry;Security},
      doi = {10.1109/SURV.2010.031810.00083},
      issn = {1553-877X}
    }
    
  1. Chen, H., Xiao, Y., Hong, X., Hu, F., & Xie, J. (L. (2009). A survey of anonymity in wireless communication systems. Security and Communication Networks, 2(5), 427–444. https://doi.org/10.1002/sec.78
    @article{SEC_SEC78,
      author = {Chen, Hui and Xiao, Yang and Hong, Xiaoyan and Hu, Fei and Xie, Jiang (Linda)},
      title = {A survey of anonymity in wireless communication systems},
      journal = {Security and Communication Networks},
      volume = {2},
      number = {5},
      publisher = {John Wiley & Sons, Ltd.},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.78},
      doi = {10.1002/sec.78},
      pages = {427--444},
      keywords = {anonymity, untraceability, temporary identity, ad hoc networks, authentication, routing, wireless networks},
      year = {2009}
    }
    

Conference Paper

  1. Fu, B., Xiao, Y., & Chen, H. (2017). FNF: Flow-net Based Fingerprinting. Proceedings of the ACM Turing 50th Celebration Conference - China, 31:1–31:5. https://doi.org/10.1145/3063955.3063986
    @inproceedings{Fu_2017_FFB_3063955_3063986,
      author = {Fu, Bo and Xiao, Yang and Chen, Hui},
      title = {{FNF}: Flow-net Based Fingerprinting},
      booktitle = {Proceedings of the ACM Turing 50th Celebration Conference - China},
      series = {ACM TUR-C '17},
      year = {2017},
      isbn = {978-1-4503-4873-7},
      location = {Shanghai, China},
      pages = {31:1--31:5},
      articleno = {31},
      numpages = {5},
      url = {http://doi.acm.org/10.1145/3063955.3063986},
      doi = {10.1145/3063955.3063986},
      acmid = {3063986},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {fingerprinting, flow-net, intrusion detection},
      preprint = {preprint/1569942619.pdf}
    }
    
  1. Zeng, L., Xiao, Y., & Chen, H. (2015). Linux Auditing: Overhead and Adaptation. Proceedings of the 2015 IEEE International Conference on Communications (ICC ’15) - Communication and Information Systems Security Symposium, 7168–7173. https://doi.org/10.1109/ICC.2015.7249470
    @inproceedings{Xiao_2015_ICC_1570037667,
      author = {Zeng, Lei and Xiao, Yang and Chen, Hui},
      title = {Linux Auditing: Overhead and Adaptation},
      booktitle = {Proceedings of the 2015 IEEE International Conference 
              on Communications (ICC '15) - Communication and Information Systems Security Symposium},
      series = {ICC '15},
      day = {8 -- 12},
      month = jun,
      year = {2015},
      pages = {7168-7173},
      doi = {10.1109/ICC.2015.7249470},
      keywords = {Adaptive systems;Computers;Encyclopedias;Linux;Operating systems;Security;Servers;Linux;auditing;logging;overhead},
      url = {https://doi.org/10.1109/ICC.2015.7249470},
      preprint = {preprint/Linux_auditing_Overhead_and_adaptation_preprint.pdf}
    }
    
  1. Zeng, L., Xiao, Y., & Chen, H. (2015). Accountable Logging in Operating Systems. Proceedings of the 2015 IEEE International Conference on Communications (ICC ’15) - Communication and Information Systems Security Symposium, 7163–7167. https://doi.org/10.1109/ICC.2015.7249469
    @inproceedings{Xiao_2015_ICC_1570042889,
      author = {Zeng, Lei and Xiao, Yang and Chen, Hui},
      title = {Accountable Logging in Operating Systems},
      booktitle = {Proceedings of the 2015 IEEE International Conference 
              on Communications (ICC '15) - Communication and Information Systems Security Symposium},
      series = {ICC '15},
      year = {2015},
      day = {8 -- 12},
      month = jun,
      pages = {7163-7167},
      doi = {10.1109/ICC.2015.7249469},
      url = {https://doi.org/10.1109/ICC.2015.7249469},
      preprint = {preprint/Accountable_logging_in_operating_systems_preprint.pdf}
    }
    
  1. Zeng, L., Chen, H., & Xiao, Y. (2011). Accountable Administration and Implementation in Operating Systems. Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2011.6134107
    @inproceedings{ZENG_6134107,
      author = {Zeng, Lei and Chen, Hui and Xiao, Yang},
      booktitle = {Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE},
      title = {Accountable Administration and Implementation in Operating Systems},
      year = {2011},
      pages = {1-5},
      keywords = {Linux;security of data;Linux;accountable administration model;real world operating system;security models;Access control;Computers;File systems;Kernel;Linux},
      doi = {10.1109/GLOCOM.2011.6134107},
      issn = {1930-529X}
    }
    

Networked Sensor Systems and Applications

Journal Paper

  1. Chen, H., & Wang, J. (2023). Active Learning for Efficient Soil Monitoring in Large Terrain with Heterogeneous Sensor Network. Sensors, 23(5), 2365:1–2365:25. https://doi.org/10.3390/s23052365

    Soils are a complex ecosystem that provides critical services, such as growing food, supplying antibiotics, filtering wastes, and maintaining biodiversity; hence monitoring soil health and domestication is required for sustainable human development. Low-cost and high-resolution soil monitoring systems are challenging to design and build. Compounded by the sheer size of the monitoring area of interest and the variety of biological, chemical, and physical parameters to monitor, naive approaches to adding or scheduling more sensors will suffer from cost and scalability problems. We investigate a multi-robot sensing system integrated with an active learning-based predictive modeling technique. Taking advantage of advances in machine learning, the predictive model allows us to interpolate and predict soil attributes of interest from the data collected by sensors and soil surveys. The system provides high-resolution prediction when the modeling output is calibrated with static land-based sensors. The active learning modeling technique allows our system to be adaptive in data collection strategy for time-varying data fields, utilizing aerial and land robots for new sensor data. We evaluated our approach using numerical experiments with a soil dataset focusing on heavy metal concentration in a flooded area. The experimental results demonstrate that our algorithms can reduce sensor deployment costs via optimized sensing locations and paths while providing high-fidelity data prediction and interpolation. More importantly, the results verify the adapting behavior of the system to the spatial and temporal variations of soil conditions.

    @article{s23052365,
      author = {Chen, Hui and Wang, Ju},
      title = {Active Learning for Efficient Soil Monitoring in Large Terrain with Heterogeneous Sensor Network},
      journal = {Sensors},
      volume = {23},
      year = {2023},
      number = {5},
      pages = {2365:1-2365:25},
      numpages = {25},
      article-number = {2365},
      url = {https://www.mdpi.com/1424-8220/23/5/2365},
      issn = {1424-8220},
      doi = {10.3390/s23052365}
    }
    
  1. Wang, J., Damevski, K., & Chen, H. (2015). Sensor data modeling and validating for wireless soil sensor network . Computers and Electronics in Agriculture , 112(0), 75–82. https://doi.org/http://dx.doi.org/10.1016/j.compag.2014.12.016
    @article{Wang201575,
      title = {Sensor data modeling and validating for wireless soil sensor network },
      journal = {Computers and Electronics in Agriculture },
      volume = {112},
      number = {0},
      pages = {75 - 82},
      month = mar,
      year = {2015},
      note = {Special Issue in Precision Agriculture },
      issn = {0168-1699},
      doi = {http://dx.doi.org/10.1016/j.compag.2014.12.016},
      url = {http://www.sciencedirect.com/science/article/pii/S0168169914003263},
      author = {Wang, Ju and Damevski, Kostadin and Chen, Hui},
      keywords = {High-tunnel greenhouse }
    }
    
  1. Xiao, Y., Chen, H., Wu, K., Sun, B., Zhang, Y., Sun, X., & Liu, C. (2010). Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks. IEEE Transactions on Computers, 59(4), 507–521. https://doi.org/10.1109/TC.2009.170
    @article{XIAO_5313803,
      author = {Xiao, Yang and Chen, Hui and Wu, Kui and Sun, Bo and Zhang, Ying and Sun, Xinyu and Liu, Chong},
      journal = {IEEE Transactions on Computers},
      title = {Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks},
      year = {2010},
      month = apr,
      volume = {59},
      number = {4},
      pages = {507-521},
      keywords = {scheduling;sensor placement;signal detection;wireless sensor networks;detection delay;detection probability;network coverage intensity;quality of service;randomized scheduling algorithm;wireless sensor network coverage;Algorithm design and analysis;Analytical models;Batteries;Computer science;Delay;Energy consumption;Event detection;Intrusion detection;Mathematics;Processor scheduling;Quality of service;Scheduling algorithm;Sun;Wireless sensor networks;Wireless sensor network;coverage;network lifetime;optimization.;quality of service},
      doi = {10.1109/TC.2009.170},
      issn = {0018-9340}
    }
    
  1. Xiao, Y., Zhang, Y., Peng, M., Chen, H., Du, X., Sun, B., & Wu, K. (2009). Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. Computer Networks, 53(14), 2458–2475. https://doi.org/10.1016/j.comnet.2009.05.002
    @article{Xiao20092458,
      title = {Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks},
      journal = {Computer Networks},
      volume = {53},
      number = {14},
      pages = {2458 - 2475},
      year = {2009},
      note = {},
      issn = {1389-1286},
      doi = {10.1016/j.comnet.2009.05.002},
      url = {http://www.sciencedirect.com/science/article/pii/S1389128609001595},
      author = {Xiao, Yang and Zhang, Yanping and Peng, Miao and Chen, Hui and Du, Xiaojiang and Sun, Bo and Wu, Kui},
      keywords = {Three-dimensional}
    }
    

Conference Paper

  1. Peng, M., Xiao, Y., Chen, H., Hao, Q., Vasilakos, A. V., & Wu, J. (2012). Sensor Distribution on Coverage in Sensor Networks. In X. Zhang & D. Qiao (Eds.), Quality, Reliability, Security and Robustness in Heterogeneous Networks (Vol. 74, pp. 328–344). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29222-4_24
    @incollection{sensordist2012,
      author = {Peng, Miao and Xiao, Yang and Chen, Hui and Hao, Qi and Vasilakos, Athanasios V. and Wu, Jie},
      year = {2012},
      isbn-13 = {978-3-642-29221-7},
      booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous
          Networks},
      volume = {74},
      series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
      editor = {Zhang, Xi and Qiao, Daji},
      doi = {10.1007/978-3-642-29222-4_24},
      title = {Sensor Distribution on Coverage in Sensor Networks},
      url = {http://dx.doi.org/10.1007/978-3-642-29222-4_24},
      publisher = {Springer Berlin Heidelberg},
      keywords = {Coverage; sensor network; distribution},
      pages = {328-344}
    }
    
  1. Wang, J., Damevski, K., & Chen, H. (2011). Model refinement and data filtering in high-tunnel greenhouse sensor network. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 43–50. https://doi.org/10.1145/2069105.2069113
    @inproceedings{Wang_2011_MRD_2069105_2069113,
      author = {Wang, Ju and Damevski, Kostadin and Chen, Hui},
      title = {Model refinement and data filtering in high-tunnel greenhouse sensor network},
      booktitle = {Proceedings of the 7th ACM symposium on {QoS} and security for wireless and mobile networks},
      series = {Q2SWinet '11},
      year = {2011},
      isbn-13 = {978-1-4503-0899-1},
      location = {Miami, Florida, USA},
      pages = {43--50},
      numpages = {8},
      url = {http://doi.acm.org/10.1145/2069105.2069113},
      doi = {10.1145/2069105.2069113},
      acmid = {2069113},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {high-tunnel greenhouse, statistical model, wireless actuating network, wireless sensor network}
    }
    
  1. Xiao, Y., Chen, H., Zhang, Y., Du, X., Sun, B., & Wu, K. (2008). Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. Distributed Computing Systems Workshops, 2008. ICDCS ’08. 28th International Conference On, 315–320. https://doi.org/10.1109/ICDCS.Workshops.2008.39
    @inproceedings{XIAO_4577802,
      author = {Xiao, Yang and Chen, Hui and Zhang, Yanping and Du, Xiaojiang and Sun, Bo and Wu, Kui},
      booktitle = {Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on},
      title = {Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks},
      year = {2008},
      pages = {315-320},
      keywords = {scheduling;telecommunication security;wireless sensor networks;intrusion objects;randomized scheduling algorithm;wireless sensor networks;Analytical models;Computer science;Intelligent sensors;Intrusion detection;Object detection;Performance analysis;Protocols;Scheduling algorithm;Shape;Wireless sensor networks;Intrusion Objects;Randomized Scheduling Algorithm;Sensor Networks;Shapes},
      doi = {10.1109/ICDCS.Workshops.2008.39},
      issn = {1545-0678},
      url = {https://doi.org/10.1109/ICDCS.Workshops.2008.39}
    }
    
  1. Xiao, Y., Zhang, Y., Sun, X., & Chen, H. (2007). Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks. Communications, 2007. ICC ’07. IEEE International Conference On, 3541–3545. https://doi.org/10.1109/ICC.2007.585
    @inproceedings{XIAO_4289256,
      author = {Xiao, Yang and Zhang, Ying and Sun, Xinyu and Chen, Hui},
      booktitle = {Communications, 2007. ICC '07. IEEE International Conference on},
      title = {Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks},
      year = {2007},
      pages = {3541-3545},
      keywords = {delays;probability;scheduling;wireless sensor networks;asymptotic coverage;detection delay;detection probability;mathematical lemmas;network coverage intensity;randomized scheduling;wireless sensor networks;Communications Society;Computer science;Delay;Equations;Event detection;Intrusion detection;Mathematics;Scheduling algorithm;USA Councils;Wireless sensor networks},
      doi = {10.1109/ICC.2007.585},
      url = {https://doi.org/10.1109/ICC.2007.585}
    }
    
  1. Xiao, Y., Chen, H., Wu, K., Sun, B., & Liu, C. (2007). Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks. Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, 3741–3745. https://doi.org/10.1109/WCNC.2007.685
    @inproceedings{XIAO_4224930,
      author = {Xiao, Yang and Chen, Hui and Wu, Kui and Sun, Bo and Liu, Chong},
      booktitle = {Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE},
      title = {Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks},
      year = {2007},
      pages = {3741-3745},
      keywords = {demodulation;randomised algorithms;scheduling;wireless sensor
          networks;coverage;detection metrics;randomized scheduling
          algorithm;wireless sensor network;Analytical models;Communications
          Society;Computational modeling;Computer science;Delay;Event
          detection;Intrusion detection;Scheduling algorithm;USA Councils;Wireless
          sensor networks},
      doi = {10.1109/WCNC.2007.685},
      issn = {1525-3511},
      url = {https://doi.org/10.1109/WCNC.2007.685}
    }
    
  1. Xiao, Y., Chen, H., Wu, K., Liu, C., & Sun, B. (2006). Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks. Global Telecommunications Conference, 2006. GLOBECOM ’06. IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2006.948
    @inproceedings{XIAO_4151578,
      author = {Xiao, Yang and Chen, Hui and Wu, Kui and Liu, Chong and Sun, Bo},
      booktitle = {Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE},
      title = {Maximizing Network Lifetime under {QoS} Constraints in Wireless Sensor Networks},
      year = {2006},
      pages = {1-5},
      keywords = {quality of service;wireless sensor networks;QoS constraints;delay detection;detection probability;quality of service constraints;randomized scheduling algorithm;wireless sensor networks;Algorithm design and analysis;Computer science;Delay;Electronic mail;Event detection;Intrusion detection;Peer to peer computing;Quality of service;Scheduling algorithm;Wireless sensor networks},
      doi = {10.1109/GLOCOM.2006.948},
      issn = {1930-529X},
      url = {https://doi.org/10.1109/GLOCOM.2006.948}
    }
    

Caching for Wireless Data Access

Journal Paper

  1. Chen, H., Xiao, Y., & Vrbsky, S. V. (2013). An update-based step-wise optimal cache replacement for wireless data access. Computer Networks, 57(1), 197–212. https://doi.org/10.1016/j.comnet.2012.09.012
    @article{Chen2013197,
      title = {An update-based step-wise optimal cache replacement for wireless data access},
      journal = {Computer Networks},
      volume = {57},
      number = {1},
      pages = {197 - 212},
      year = {2013},
      note = {},
      issn = {1389-1286},
      doi = {10.1016/j.comnet.2012.09.012},
      url = {http://www.sciencedirect.com/science/article/pii/S1389128612003374},
      author = {Chen, Hui and Xiao, Yang and Vrbsky, Susan V.},
      keywords = {Wireless data access}
    }
    
  1. Chen, H., Xiao, Y., & Vrbsky, S. V. (2008). Scalability study of cache access mechanisms in multiple-cell wireless networks. Computer Networks, 52(15), 3017–3027. https://doi.org/10.1016/j.comnet.2008.06.018
    @article{Chen20083017,
      title = {Scalability study of cache access mechanisms in multiple-cell wireless networks},
      journal = {Computer Networks},
      volume = {52},
      number = {15},
      pages = {3017 - 3027},
      year = {2008},
      issn = {1389-1286},
      doi = {10.1016/j.comnet.2008.06.018},
      url = {http://www.sciencedirect.com/science/article/pii/S1389128608002156},
      author = {Chen, Hui and Xiao, Yang and Vrbsky, Susan V.},
      keywords = {Lease}
    }
    
  1. Chen, H., & Xiao, Y. (2007). On-Bound Selection Cache Replacement Policy for Wireless Data Access. IEEE Transactions on Computers, 56(12), 1597–1611. https://doi.org/10.1109/TC.2007.70768
    @article{CHEN_4358225,
      author = {Chen, Hui and Xiao, Yang},
      journal = {IEEE Transactions on Computers},
      title = {On-Bound Selection Cache Replacement Policy for Wireless Data Access},
      month = dec,
      year = {2007},
      volume = {56},
      number = {12},
      pages = {1597-1611},
      keywords = {bandwidth allocation;cache storage;client-server systems;radio access networks;OBS cache replacement policy;limited bandwidth usage reduction;mobile devices;on-bound selection policy;wireless data access;wireless networks;Access protocols;Bandwidth;Broadcasting;Costs;History;Network servers;Upper bound;Wireless application protocol;Wireless communication;Wireless networks;access;cache;communication cost;effective hit ratio;replacement policy;update;wireless networks},
      doi = {10.1109/TC.2007.70768},
      issn = {0018-9340}
    }
    
  1. Chen, H., Xiao, Y., & Shen, X. (2006). Update-Based Cache Access and Replacement in Wireless Data Access. IEEE Transactions on Mobile Computing, 5(12), 1734–1748. https://doi.org/10.1109/TMC.2006.188
    @article{CHEN_1717441,
      author = {Chen, Hui and Xiao, Yang and Shen, Xuemin},
      journal = {IEEE Transactions on Mobile Computing},
      title = {Update-Based Cache Access and Replacement in Wireless Data Access},
      month = dec,
      year = {2006},
      volume = {5},
      number = {12},
      pages = {1734-1748},
      keywords = {cache storage;data communication;radio access networks;access-based replacement policies;cache access mechanism;cache hit ratio;call-back;least access-to-update difference;least access-to-update ratio;poll-per-read;update-based cache access;update-based replacement policies;wireless data access;wireless networks;Bandwidth;Broadcasting;Costs;Databases;Delay;Frequency;Land mobile radio cellular systems;Network servers;Wireless LAN;Wireless networks;Cache replacement policy;access;update;wireless network.},
      doi = {10.1109/TMC.2006.188},
      issn = {1536-1233}
    }
    
  1. Xiao, Y., & Chen, H. (2006). Optimal callback with two-level adaptation for wireless data access. IEEE Transactions on Mobile Computing, 5(8), 1087–1102. https://doi.org/10.1109/TMC.2006.119
    @article{XIAO_1644752,
      author = {Xiao, Yang and Chen, Hui},
      journal = {IEEE Transactions on Mobile Computing},
      title = {Optimal callback with two-level adaptation for wireless data access},
      month = aug,
      year = {2006},
      volume = {5},
      number = {8},
      pages = {1087-1102},
      keywords = {cache storage;data communication;mobile radio;radio access networks;callback cache mechanisms;mobile terminals;optimal callback;push threshold;update-to-access-ratio;wireless data access;wireless networks;Analytical models;Bandwidth;Cost function;Handheld computers;Internet;Mobile computing;Network servers;Web server;Wireless application protocol;Wireless networks;Adaptive;cache;callback;strong consistency;wireless data access.},
      doi = {10.1109/TMC.2006.119},
      issn = {1536-1233}
    }
    
  1. Chen, H., & Xiao, Y. (2006). Cache access and replacement for future wireless Internet. IEEE Communications Magazine, 44(5), 113–123. https://doi.org/10.1109/MCOM.2006.1637956
    @article{CHEN_1637956,
      author = {Chen, Hui and Xiao, Yang},
      journal = {IEEE Communications Magazine},
      title = {Cache access and replacement for future wireless Internet},
      month = may,
      year = {2006},
      volume = {44},
      number = {5},
      pages = {113-123},
      keywords = {Internet;cache storage;mobile radio;battery power consumption;cache access;cache replacement;future wireless Internet;wireless Internet caching;Access protocols;Bandwidth;Batteries;Communication system security;Internet;Markup languages;Transport protocols;Web server;Wireless application protocol;Wireless networks},
      doi = {10.1109/MCOM.2006.1637956},
      issn = {0163-6804}
    }
    

Conference Paper

  1. Chen, H., Xiao, Y., & Vrbsky, S. V. (2007). Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet. Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, 1943–1947. https://doi.org/10.1109/GLOCOM.2007.373
    @inproceedings{CHEN_4411283,
      author = {Chen, Hui and Xiao, Yang and Vrbsky, S.V.},
      booktitle = {Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE},
      title = {Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet},
      year = {2007},
      pages = {1943-1947},
      keywords = {Internet;cache storage;database management systems;radio links;telecommunication traffic;cache access mechanisms;call-back;database size;invalidation report scalability;lease schemes;multiple-cell wireless Internet;network size;network traffic;network transmission costs;poll-each-read;subscription ratio;Batteries;Broadcasting;Costs;Databases;Delay;Internet;Personal communication networks;Scalability;Subscriptions;Wireless networks},
      doi = {10.1109/GLOCOM.2007.373},
      url = {https://doi.org/10.1109/GLOCOM.2007.373}
    }
    
  1. Chen, H., Xiao, Y., & Shen, X. (2006). Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet. Global Telecommunications Conference, 2006. GLOBECOM ’06. IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2006.240
    @inproceedings{CHEN_4150870,
      author = {Chen, Hui and Xiao, Yang and Shen, Xuemin},
      booktitle = {Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE},
      title = {Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet},
      year = {2006},
      pages = {1-5},
      keywords = {Internet;cache storage;optimisation;radio networks;cache access
          algorithm;next generation wireless Internet;update-based step-wise optimal
          cache replacement;wireless data access;Algorithm design and
          analysis;Analytical models;Batteries;Computer science;Cost
          function;Delay;History;Internet;Network servers;Wireless networks},
      doi = {10.1109/GLOCOM.2006.240},
      issn = {1930-529X},
      url = {https://doi.org/10.1109/GLOCOM.2006.240}
    }
    
  1. Chen, H., & Xiao, Y. (2006). Asymptotical keep-best Cache Replacement Policy for Wireless Data Access. Communications, 2006. ICC ’06. IEEE International Conference On, 1, 397–402. https://doi.org/10.1109/ICC.2006.254760
    @inproceedings{CHEN_4024150,
      author = {Chen, Hui and Xiao, Yang},
      booktitle = {Communications, 2006. ICC '06. IEEE International Conference
          on},
      title = {Asymptotical keep-best Cache Replacement Policy for Wireless Data
          Access},
      year = {2006},
      volume = {1},
      pages = {397-402},
      keywords = {Access protocols;Broadcasting;Computer science;Costs;Handheld
          computers;Mobile communication;Mobile computing;Network servers;Wireless
          application protocol;Wireless networks},
      doi = {10.1109/ICC.2006.254760},
      issn = {8164-9547},
      url = {https://doi.org/10.1109/ICC.2006.254760}
    }
    
  1. Xiao, Y., & Chen, H. (2005). An adaptive callback cache access for wireless Internet. Global Telecommunications Conference, 2005. GLOBECOM ’05. IEEE, 2. https://doi.org/10.1109/GLOCOM.2005.1577797
    @inproceedings{XIAO_1577797,
      author = {Xiao, Yang and Chen, Hui},
      booktitle = {Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE},
      title = {An adaptive callback cache access for wireless Internet},
      year = {2005},
      volume = {2},
      pages = {},
      keywords = {Internet;cache storage;mobile radio;radio access
          networks;adaptive callback cache access;mobile termination;second level
          adaptation;update-to-access-ratio;wireless Internet;wireless data
          access;Access protocols;Analytical models;Computer science;Cost
          function;Electronic mail;Internet;Network servers;Performance analysis;Web
          server;Wireless application protocol},
      doi = {10.1109/GLOCOM.2005.1577797}
    }
    
  1. Chen, H., Xiao, Y., & Shen, X. (2005). Performance analysis of server-based poll-each-read in wireless Internet. Global Telecommunications Conference, 2005. GLOBECOM ’05. IEEE, 2. https://doi.org/10.1109/GLOCOM.2005.1577798
    @inproceedings{CHEN_1577798,
      author = {Chen, Hui and Xiao, Yang and Shen, Xuemin},
      booktitle = {Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE},
      title = {Performance analysis of server-based poll-each-read in wireless
          Internet},
      year = {2005},
      volume = {2},
      pages = {},
      keywords = {Internet;cache storage;data communication;file servers;radio
          access networks;cache mechanisms;server-based poll-each-read;wireless
          Internet;wireless data access;Bandwidth;Computer
          science;Costs;Databases;Delay;Internet;Network servers;Performance
          analysis;Wireless application protocol;Wireless networks},
      doi = {10.1109/GLOCOM.2005.1577798}
    }
    
  1. Chen, H., Xiao, Y., & Shen, X. (2005). Update-based cache replacement policies in wireless data access. 2nd International Conference on Broadband Networks, 2005., 797–804 Vol. 2. https://doi.org/10.1109/ICBN.2005.1589689
    @inproceedings{CHEN_1589689,
      author = {Chen, Hui and Xiao, Yang and Shen, Xuemin},
      booktitle = {2nd International Conference on Broadband Networks, 2005.},
      title = {Update-based cache replacement policies in wireless data access},
      year = {2005},
      pages = {797-804 Vol. 2},
      keywords = {cache storage;data communication;radio access networks;access frequency;access-based replacement policies;least access-to-update difference;least access-to-update ratio;update frequency;update-based cache replacement;wireless data access;Bandwidth;Broadcasting;Computer science;Costs;Databases;Delay;Frequency;Mobile communication;Network servers;Wireless networks},
      doi = {10.1109/ICBN.2005.1589689},
      month = oct
    }
    

Mobility Management in Cellular Wireless Networks

Journal Paper

  1. Xiao, Y., Chen, H., Guizani, M., & Chen, H.-H. (2012). Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks. IEEE Transactions on Mobile Computing, 11(9), 1532–1544. https://doi.org/http://doi.ieeecomputersociety.org/10.1109/TMC.2011.166
    @article{Xiao_10_1109_TMC_2011_166,
      author = {Xiao, Yang and Chen, Hui and Guizani, Mohsen and Chen, Hsiao-Hwa},
      title = {Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks},
      journal = {IEEE Transactions on Mobile Computing},
      volume = {11},
      number = {9},
      issn = {1536-1233},
      year = {2012},
      pages = {1532-1544},
      doi = {http://doi.ieeecomputersociety.org/10.1109/TMC.2011.166},
      publisher = {IEEE Computer Society},
      address = {Los Alamitos, CA, USA}
    }
    
  1. Xiao, Y., Chen, H., Du, X., Zhang, Y., Chen, H.-H., & Guizani, M. (2009). On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks. IEEE Transactions on Wireless Communications, 8(9), 4406–4410. https://doi.org/10.1109/TWC.2009.080717
    @article{XIAO_5285156,
      author = {Xiao, Yang and Chen, Hui and Du, Xiaojiang and Zhang, Yan and Chen, Hsiao-Hwa and Guizani, M.},
      journal = {IEEE Transactions on Wireless Communications},
      title = {On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks},
      year = {2009},
      month = sep,
      volume = {8},
      number = {9},
      pages = {4406-4410},
      keywords = {cellular radio;mobile communication;paging communication;cellular service;hierarchical blanket paging;hierarchical pipeline paging;hierarchical sequential paging;mobile terminal;multitier overlaid hierarchical cellular networks;paging requests;Cellular networks;Computer science;Costs;Delay;Information science;Land mobile radio cellular systems;Paging strategies;Pipeline processing;Satellites;Telecommunication traffic;Multi-tier network;cellular network;hierarchical pipeline paging},
      doi = {10.1109/TWC.2009.080717},
      issn = {1536-1276}
    }
    
  1. Xiao, Y., Chen, H., Du, X., & Guizani, M. (2007). Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems. IEEE Transactions on Vehicular Technology, 56(5), 2745–2755. https://doi.org/10.1109/TVT.2007.898380
    @article{XIAO_4305549,
      author = {Xiao, Yang and Chen, Hui and Du, Xiaojiang and Guizani, M.},
      journal = {IEEE Transactions on Vehicular Technology},
      title = {Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems},
      month = sep,
      year = {2007},
      volume = {56},
      number = {5},
      pages = {2745-2755},
      keywords = {paging communication;telecommunication switching;blanket paging;mobile switching center;mobile terminal;paging delay constraint;paging request;performance analysis;pipeline probability paging;sequential probability paging;wireless networks;wireless systems;Analytical models;Computer science;Costs;Delay;Industrial control;Paging strategies;Performance analysis;Personal communication networks;Pipeline processing;Wireless networks;Concurrent;paging;parallel;performance evaluation;pipeline;wireless systems},
      doi = {10.1109/TVT.2007.898380},
      issn = {0018-9545}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2007). Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless Systems. IEEE Transactions on Wireless Communications, 6(10), 3632–3640. https://doi.org/10.1109/TWC.2007.060048
    @article{XIAO_4350313,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      journal = {IEEE Transactions on Wireless Communications},
      title = {Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless Systems},
      year = {2007},
      month = oct,
      volume = {6},
      number = {10},
      pages = {3632-3640},
      keywords = {cellular radio;optimisation;paging communication;personal communication networks;probability;quality of service;queueing theory;FIFO manner;PCS networks;QoS constraint;known location probabilities;nonblocking pipeline probability paging scheme;optimization problems;paging request;personal communication service;wireless systems;Aging;Computer science;Constraint optimization;Costs;Delay;Paging strategies;Personal communication networks;Pipeline processing;Quality of service;Senior members},
      doi = {10.1109/TWC.2007.060048},
      issn = {1536-1276}
    }
    
  1. Xiao, Y., Chen, H., Chen, H.-H., Sun, B., & Chen, C. L. P. (2007). Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration. IEEE Transactions on Wireless Communications, 6(6), 2086–2095. https://doi.org/10.1109/TWC.2007.05432
    @article{XIAO_4251152,
      author = {Xiao, Yang and Chen, Hui and Chen, Hsiao-Hwa and Sun, Bo and Chen, C.L.P.},
      journal = {IEEE Transactions on Wireless Communications},
      title = {Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration},
      month = jun,
      year = {2007},
      volume = {6},
      number = {6},
      pages = {2086-2095},
      keywords = {database management systems;mobile computing;mobility management (mobile radio);personal communication networks;system recovery;adaptive p-persistent backoff database failure restoration;analytical model;demand reregistration messages;home location register;inaccurate estimation;mobile database;mobility databases;mobility management;optimal utilization;personal communications services networks;successful transmission probability;visitor location register;Analytical models;Base stations;Computer crashes;Computer science;Databases;Degradation;Fault tolerance;Mobile radio mobility management;Personal communication networks;Sun},
      doi = {10.1109/TWC.2007.05432},
      issn = {1536-1276}
    }
    
  1. Xiao, Y., & Chen, H. (2006). Optimal periodic location area update for mobile telecommunications networks. IEEE Transactions on Wireless Communications, 5(4), 930–937. https://doi.org/10.1109/TWC.2006.1618942
    @article{XIAO_1618942,
      author = {Xiao, Yang and Chen, Hui},
      journal = {IEEE Transactions on Wireless Communications},
      title = {Optimal periodic location area update for mobile telecommunications networks},
      month = apr,
      year = {2006},
      volume = {5},
      number = {4},
      pages = {930-937},
      keywords = {3G mobile communication;telecommunication signalling;3GPP specifications;Universal Mobile Telecommunications System;failure call setup probability;initial trunk setup cost;mobile stations;mobile telecommunications networks;normal location area update;periodic location area update;signaling cost;3G mobile communication;Analytical models;Base stations;Batteries;Circuits;Computer science;Cost function;Databases;Land mobile radio cellular systems;Upper bound},
      doi = {10.1109/TWC.2006.1618942},
      issn = {1536-1276}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2006). Performance evaluation of pipeline paging under paging delay constraint for wireless systems. IEEE Transactions on Mobile Computing, 5(1), 64–76. https://doi.org/10.1109/TMC.2006.14
    @article{XIAO_1542017,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      journal = {IEEE Transactions on Mobile Computing},
      title = {Performance evaluation of pipeline paging under paging delay constraint for wireless systems},
      month = jan,
      year = {2006},
      volume = {5},
      number = {1},
      pages = {64-76},
      keywords = {paging communication;pipeline processing;telecommunication traffic;adaptive scheme;blanket paging scheme;cost minimization;multiple paging requests;optimization problems;paging delay constraint;performance evaluation;pipeline paging;sequential paging scheme;traffic load;wireless systems;Analytical models;Base stations;Cost function;Delay;Paging strategies;Personal communication networks;Pipeline processing;Quality of service;Telecommunication traffic;Telephony;Index Terms- Parallel;paging;pipeline;wireless systems.},
      doi = {10.1109/TMC.2006.14},
      issn = {1536-1233}
    }
    

Conference Paper

  1. Xiao, Y., Chen, H., Du, X., & Guizani, M. (2007). Paging Schemes Performance for Wireless Systems. Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, 5260–5264. https://doi.org/10.1109/GLOCOM.2007.997
    @inproceedings{XIAO_4411907,
      author = {Xiao, Yang and Chen, Hui and Du, Xiaojiang and Guizani, M.},
      booktitle = {Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE},
      title = {Paging Schemes Performance for Wireless Systems},
      year = {2007},
      pages = {5260-5264},
      keywords = {paging communication;blanket paging scheme;pipeline probability paging scheme;sequential probability paging scheme;wireless systems;Algorithm design and analysis;Analytical models;Bandwidth;Computer science;Costs;Delay;Neodymium;Paging strategies;Personal communication networks;Pipeline processing},
      doi = {10.1109/GLOCOM.2007.997},
      url = {https://doi.org/10.1109/GLOCOM.2007.997}
    }
    
  1. Xiao, Y., & Chen, H. (2007). An Analytical Model of the ODPLAU Scheme for Telecommunication Networks. Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, 3194–3198. https://doi.org/10.1109/WCNC.2007.589
    @inproceedings{XIAO_4224834,
      author = {Xiao, Yang and Chen, Hui},
      booktitle = {Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE},
      title = {An Analytical Model of the {ODPLAU} Scheme for Telecommunication Networks},
      year = {2007},
      pages = {3194-3198},
      keywords = {3G mobile communication;mobility management (mobile radio);ODPLAU scheme;location management;optimal dynamic periodic location area update scheme;telecommunication networks;3G mobile communication;Algorithm design and analysis;Analytical models;Batteries;Circuit simulation;Communications Society;Computer science;Cost function;Mobile computing;Traffic control},
      doi = {10.1109/WCNC.2007.589},
      issn = {1525-3511},
      url = {https://doi.org/10.1109/WCNC.2007.589}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2006). On Evaluating and Optimizing Pipeline Probability Paging under QoS constraints in Wireless Systems. Global Telecommunications Conference, 2006. GLOBECOM ’06. IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2006.946
    @inproceedings{XIAO_4151576,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      booktitle = {Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE},
      title = {On Evaluating and Optimizing Pipeline Probability Paging under {QoS} constraints in Wireless Systems},
      year = {2006},
      pages = {1-5},
      keywords = {paging communication;probability;quality of service;QoS constraints;blanket paging scheme;pipeline probability paging scheme;quality of service;sequential probability paging scheme;wireless systems;Algorithm design and analysis;Computer science;Constraint optimization;Costs;Delay;Paging strategies;Partitioning algorithms;Pipeline processing;Quality of service;Wireless networks},
      doi = {10.1109/GLOCOM.2006.946},
      issn = {1930-529X},
      url = {https://doi.org/10.1109/GLOCOM.2006.946}
    }
    
  1. Xiao, Y., Guizani, M., & Chen, H. (2006). Hierarchical Pipeline Paging in Hierarchical Wireless Networks. Global Telecommunications Conference, 2006. GLOBECOM ’06. IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2006.959
    @inproceedings{XIAO_4151589,
      author = {Xiao, Yang and Guizani, M. and Chen, Hui},
      booktitle = {Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE},
      title = {Hierarchical Pipeline Paging in Hierarchical Wireless Networks},
      year = {2006},
      pages = {1-5},
      keywords = {paging communication;queueing theory;telecommunication terminals;cellular networks;hierarchical pipeline paging;hierarchical wireless networks;mobile terminal;waiting queues;Base stations;Computer science;Costs;Delay;Land mobile radio cellular systems;Macrocell networks;Microcell networks;Paging strategies;Pipeline processing;Wireless networks},
      doi = {10.1109/GLOCOM.2006.959},
      issn = {1930-529X},
      url = {https://doi.org/10.1109/GLOCOM.2006.959}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2006). Pipeline Probability Paging for Wireless Systems. Communications, 2006. ICC ’06. IEEE International Conference On, 4, 1731–1735. https://doi.org/10.1109/ICC.2006.254969
    @inproceedings{XIAO_4024402,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      booktitle = {Communications, 2006. ICC '06. IEEE International Conference
          on},
      title = {Pipeline Probability Paging for Wireless Systems},
      year = {2006},
      volume = {4},
      pages = {1731-1735},
      keywords = {Algorithm design and analysis;Bandwidth;Computer
          science;Costs;Delay;Mobile computing;Paging strategies;Personal
          communication networks;Pipeline
          processing;Scheduling;Concurrent;Paging;Parallel;Pipeline;Wireless
          Systems},
      doi = {10.1109/ICC.2006.254969},
      issn = {8164-9547},
      url = {https://doi.org/10.1109/ICC.2006.254969}
    }
    
  1. Xiao, Y., & Chen, H. (2006). Periodic Location Area Update Schemes for UMTS 3G Mobile Networks: Optimality and Comparison. Communications, 2006. ICC ’06. IEEE International Conference On, 3, 955–960. https://doi.org/10.1109/ICC.2006.254872
    @inproceedings{XIAO_4024263,
      author = {Xiao, Yang and Chen, Hui},
      booktitle = {Communications, 2006. ICC '06. IEEE International Conference
          on},
      title = {Periodic Location Area Update Schemes for {UMTS} {3G} Mobile Networks:
          Optimality and Comparison},
      year = {2006},
      volume = {3},
      pages = {955-960},
      keywords = {3G mobile communication;Analytical models;Base stations;Broadcasting;Circuits;Computer science;Cost function;Land mobile radio cellular systems;Mobile computing;Performance analysis;Location Management;Optimization;Periodic Location Area Update;UMTS},
      doi = {10.1109/ICC.2006.254872},
      issn = {8164-9547},
      url = {https://doi.org/10.1109/ICC.2006.254872}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2005). Analytically modeling pipeline paging for wireless systems. Global Telecommunications Conference, 2005. GLOBECOM ’05. IEEE, 6, 3387–3391. https://doi.org/10.1109/GLOCOM.2005.1578401
    @inproceedings{XIAO_1578401,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      booktitle = {Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE},
      title = {Analytically modeling pipeline paging for wireless systems},
      year = {2005},
      volume = {6},
      pages = {3387-3391},
      keywords = {mobile radio;telecommunication traffic;blanket paging
          scheme;multiple paging requests;pipeline paging scheme;sequential paging
          scheme;traffic load;wireless systems;Analytical models;Base
          stations;Computer science;Cost function;Delay;Paging strategies;Personal
          communication networks;Pipeline processing;Queueing
          analysis;Telecommunication traffic},
      doi = {10.1109/GLOCOM.2005.1578401},
      url = {https://doi.org/10.1109/GLOCOM.2005.1578401}
    }
    
  1. Xiao, Y., Chen, H., & Guizani, M. (2005). Pipeline paging for wireless systems. Wireless Communications and Networking Conference, 2005 IEEE, 3, 1347–1352. https://doi.org/10.1109/WCNC.2005.1424712
    @inproceedings{XIAO_1424712,
      author = {Xiao, Yang and Chen, Hui and Guizani, M.},
      booktitle = {Wireless Communications and Networking Conference, 2005 IEEE},
      title = {Pipeline paging for wireless systems},
      year = {2005},
      volume = {3},
      pages = {1347-1352},
      keywords = {delays;mobile radio;paging communication;telecommunication
          traffic;blanket paging;cost;discovery rate;location area;mobile
          terminal;multiple paging requests;paging areas;pipeline paging;sequential
          paging;total delay;wireless systems;Base stations;Costs;Delay;Mobile radio
          mobility management;Paging strategies;Personal communication
          networks;Pipeline processing;Quality of service;Telecommunication
          traffic;Telephony},
      doi = {10.1109/WCNC.2005.1424712},
      issn = {1525-3511}
    }
    
  1. Chen, H., & Xiao, Y. (2004). Optimal dynamic periodic location update for UMTS mobile networks - a simulation approach. Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE, 225–229. https://doi.org/10.1109/GLOCOMW.2004.1417578
    @inproceedings{CHEN_1417578,
      author = {Chen, Hui and Xiao, Yang},
      booktitle = {Global Telecommunications Conference Workshops, 2004. GlobeCom
          Workshops 2004. IEEE},
      title = {Optimal dynamic periodic location update for {UMTS} mobile networks -
          a simulation approach},
      year = {2004},
      pages = {225-229},
      keywords = {3G mobile communication;gradient
          methods;optimisation;telecommunication network management;UMTS mobile
          network;Universal Mobile Telecommunications System;gradient descent
          algorithm;location management;mobile station;optimal dynamic periodic
          location update;optimization;simulation approach;3G mobile
          communication;Analytical models;Circuit simulation;Computational
          modeling;Computer network management;Computer science;Computer
          simulation;Cost function;Mobile communication;Mobile computing},
      doi = {10.1109/GLOCOMW.2004.1417578}
    }
    

Medium Access Control in Underwater Acoustic Networks

Journal Paper

  1. Xiao, Y., Zhang, Y., Gibson, J. H., Xie, G. G., & Chen, H. (2011). Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks. Cluster Computing, 14(1), 65–80. https://doi.org/10.1007/s10586-009-0093-z
    @article{Xiao_2011_PAA_1960999_1961025,
      author = {Xiao, Yang and Zhang, Yanping and Gibson, John H. and Xie, Geoffrey G. and Chen, Hui},
      title = {Performance analysis of {ALOHA} and p-persistent {ALOHA} for multi-hop underwater acoustic sensor networks},
      journal = {Cluster Computing},
      issue_date = {March 2011},
      volume = {14},
      number = {1},
      month = mar,
      year = {2011},
      issn = {1386-7857},
      pages = {65--80},
      numpages = {16},
      url = {http://dx.doi.org/10.1007/s10586-009-0093-z},
      doi = {10.1007/s10586-009-0093-z},
      acmid = {1961025},
      publisher = {Kluwer Academic Publishers},
      address = {Hingham, MA, USA},
      keywords = {ALOHA, MAC, Multi-hop, Underwater acoustic sensor networks, p-persistent ALOHA}
    }
    

Conference Paper

  1. Gibson, J. H., Xie, G. G., Xiao, Y., & Chen, H. (2007). Analyzing the Performance of Multi-hop Underwater Acoustic Sensor Networks. OCEANS 2007 - Europe, 1–6. https://doi.org/10.1109/OCEANSE.2007.4302367
    @inproceedings{GIBSON_4302367,
      author = {Gibson, J.H. and Xie, G.G. and Xiao, Yang and Chen, Hui},
      booktitle = {OCEANS 2007 - Europe},
      title = {Analyzing the Performance of Multi-hop Underwater Acoustic Sensor Networks},
      year = {2007},
      pages = {1-6},
      keywords = {access protocols;telecommunication network topology;telecommunication traffic;underwater acoustic communication;underwater acoustic propagation;wireless sensor networks;Aloha variant analysis;RTS-CTS scheme;contention-based medium access control protocol;multihop underwater acoustic sensor networks;network size;propagation delay;string topology;traffic load;Access protocols;Acoustic sensors;Degradation;Media Access Protocol;Network topology;Performance analysis;Propagation delay;Proposals;Spread spectrum communication;Underwater acoustics;Aloha Protocol;Medium Access Control;Underwater Acoustic Network},
      doi = {10.1109/OCEANSE.2007.4302367},
      url = {https://doi.org/10.1109/OCEANSE.2007.4302367}
    }
    

Wireless Networks

Conference Paper

  1. Wang, J., Chen, H., Damevski, K., & Liu, J. (2012). Mobility-Tolerant, Efficient Multicast in Mobile Cloud Applications. In N. Venkatasubramanian, V. Getov, & S. Steglich (Eds.), Mobile Wireless Middleware, Operating Systems, and Applications (Vol. 93, pp. 167–180). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30607-5_16
    @incollection{mobilecloud2012,
      author = {Wang, Ju and Chen, Hui and Damevski, Kostadin and Liu, Jonathan},
      title = {Mobility-Tolerant, Efficient Multicast in Mobile Cloud
          Applications},
      year = {2012},
      isbn-13 = {978-3-642-30606-8},
      booktitle = {Mobile Wireless Middleware, Operating Systems, and Applications},
      volume = {93},
      series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
      editor = {Venkatasubramanian, Nalini and Getov, Vladimir and Steglich, Stephan},
      doi = {10.1007/978-3-642-30607-5_16},
      url = {http://dx.doi.org/10.1007/978-3-642-30607-5_16},
      publisher = {Springer Berlin Heidelberg},
      keywords = {multicast; mobile cloud; reliability; mobility; fail-recovery; MAC protocol; wireless network},
      pages = {167-180}
    }
    
  1. Zhang, X., Xiao, Y., Chen, H., & Hu, T. (2007, May 18). A Decision-tree Approach to Analyzing Channel Allocation Algorithms for Two-tier Wireless Local Loops. Proceedings of the 2nd Annual Conference of the Midwest United States Association for Information Systems (MWAIS.2007). https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1105&context=mwais2007
    @inproceedings{mwais2007,
      author = {Zhang, Xihui and Xiao, Yang and Chen, Hui and Hu, Tao},
      title = {A Decision-tree Approach to Analyzing Channel Allocation
          Algorithms for Two-tier Wireless Local Loops},
      booktitle = {Proceedings of the 2nd Annual Conference of the Midwest United
          States Association for Information Systems (MWAIS.2007)},
      month = may,
      day = {18 -- 19},
      year = {2007},
      location = {Springfield, Illinois},
      url = {https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1105&context=mwais2007}
    }
    

Computing Education

Journal Paper

  1. Lee, J.-S., Damevski, K., & Chen, H. (2016). Exploring Computer Science Students’ Learning of Sensor-Driven Mobile App Design: A Case Study. International Journal of Teaching and Case Studies, 3/4, 187–206. https://doi.org/10.1504/IJTCS.2016.080934
    @article{ijtcs_teaching_2016,
      author = {Lee, Joon-Suk and Damevski, Kostadin and Chen, Hui},
      title = {Exploring Computer Science Students’ Learning of Sensor-Driven Mobile App Design: A Case Study},
      journal = {International Journal of Teaching and Case Studies},
      year = {2016},
      volume = {3/4},
      no = {7},
      pages = {187--206},
      doi = {10.1504/IJTCS.2016.080934}
    }
    

Conference Paper

  1. Chen, H., Ciborowska, A., & Damevski, K. (2019). Using Automated Prompts for Student Reflection on Computer Security Concepts. Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 506–512. https://doi.org/10.1145/3304221.3319731
    @inproceedings{Chen_2019_UAP_3304221_3319731,
      author = {Chen, Hui and Ciborowska, Agnieszka and Damevski, Kostadin},
      title = {Using Automated Prompts for Student Reflection on Computer Security Concepts},
      booktitle = {Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education},
      series = {ITiCSE '19},
      year = {2019},
      isbn = {978-1-4503-6301-3},
      location = {Aberdeen, Scotland Uk},
      pages = {506--512},
      numpages = {7},
      url = {http://doi.acm.org/10.1145/3304221.3319731},
      doi = {10.1145/3304221.3319731},
      acmid = {3319731},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {automated reflection, reflection, reflection prompt}
    }
    
  1. Chen, H., & Damevski, K. (2014). A Teaching Model for Development of Sensor-driven Mobile Applications. Proceedings of the 2014 Conference on Innovation and Technology in Computer Science Education, 147–152. https://doi.org/10.1145/2591708.2591719
    @inproceedings{Chen_2014_TMD_2591708_2591719,
      author = {Chen, Hui and Damevski, Kostadin},
      title = {A Teaching Model for Development of Sensor-driven Mobile Applications},
      booktitle = {Proceedings of the 2014 Conference on Innovation and Technology in Computer Science Education},
      series = {ITiCSE '14},
      year = {2014},
      isbn = {978-1-4503-2833-3},
      location = {Uppsala, Sweden},
      pages = {147--152},
      numpages = {6},
      url = {http://doi.acm.org/10.1145/2591708.2591719},
      doi = {10.1145/2591708.2591719},
      acmid = {2591719},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {sensors-driven mobile applications, teaching model}
    }
    
  1. Chen, H., Damevski, K., & Edwards, W. M. (2013). Infusing cyber-physical systems concepts into an introductory computer science course. The 18th Annual Conference of the Northeast Region Of the Consortium for Computing Sciences in Colleges (J. Comput. Sci. Coll.), 28(6), 26–34. http://dl.acm.org/citation.cfm?id=2460156.2460164
    @inproceedings{Chen_2013_ICS_2460156_2460164,
      author = {Chen, Hui and Damevski, Kostadin and Edwards, Willie M.},
      title = {Infusing cyber-physical systems concepts into an introductory computer science course},
      booktitle = {the 18th Annual Conference of the Northeast region of
       the Consortium for Computing Sciences in Colleges (J. Comput. Sci. Coll.)},
      issue_date = {June 2013},
      volume = {28},
      number = {6},
      month = jun,
      year = {2013},
      issn = {1937-4771},
      pages = {26--34},
      numpages = {9},
      url = {http://dl.acm.org/citation.cfm?id=2460156.2460164},
      acmid = {2460164},
      publisher = {Consortium for Computing Sciences in Colleges},
      address = {USA}
    }
    
  1. Damevski, K., Altayeb, B., Chen, H., & Walter, D. (2013). Teaching cyber-physical systems to computer scientists via modeling and verification. Proceeding of the 44th ACM Technical Symposium on Computer Science Education, 567–572. https://doi.org/10.1145/2445196.2445365
    @inproceedings{Damevski_2013_TCS_2445196_2445365,
      author = {Damevski, Kostadin and Altayeb, Badreldin and Chen, Hui and Walter, David},
      title = {Teaching cyber-physical systems to computer scientists via modeling and verification},
      booktitle = {Proceeding of the 44th ACM technical symposium on Computer science education},
      series = {SIGCSE '13},
      year = {2013},
      isbn-13 = {978-1-4503-1868-6},
      location = {Denver, Colorado, USA},
      pages = {567--572},
      numpages = {6},
      url = {http://doi.acm.org/10.1145/2445196.2445365},
      doi = {10.1145/2445196.2445365},
      acmid = {2445365},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {computer science education, cyber-physical systems}
    }
    

High Performance Computing

Conference Paper

  1. Damevski, K., Chen, H., & Dahlgren, T. L. (2009). Reducing component contract overhead by offloading enforcement. Proceedings of the 2009 Workshop on Component-Based High Performance Computing, 1–4. https://doi.org/10.1145/1687774.1687784
    @inproceedings{Damevski_2009_RCC_1687774_1687784,
      author = {Damevski, Kostadin and Chen, Hui and Dahlgren, Tamara L.},
      title = {Reducing component contract overhead by offloading enforcement},
      booktitle = {Proceedings of the 2009 Workshop on Component-Based High Performance Computing},
      series = {CBHPC '09},
      year = {2009},
      isbn-13 = {978-1-60558-718-9},
      location = {Portland, Oregon},
      pages = {1--4},
      articleno = {10},
      numpages = {4},
      url = {http://doi.acm.org/10.1145/1687774.1687784},
      doi = {10.1145/1687774.1687784},
      acmid = {1687784},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {contract offloading, runtime checking}
    }
    
  1. Damevski, K., & Chen, H. (2009). Automated Provenance Collection for CCA Component Assemblies. In G. Allen, J. Nabrzyski, E. Seidel, G. D. Albada, J. Dongarra, & P. M. A. Sloot (Eds.), Computational Science . ICCS 2009 (Vol. 5544, pp. 259–268). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-01970-8_26
    @incollection{provenance2009,
      year = {2009},
      isbn-13 = {978-3-642-01969-2},
      booktitle = {Computational Science . ICCS 2009},
      volume = {5544},
      series = {Lecture Notes in Computer Science},
      editor = {Allen, Gabrielle and Nabrzyski, Jaros.aw and Seidel, Edward and Albada, GeertDick and Dongarra, Jack and Sloot, PeterM.A.},
      doi = {10.1007/978-3-642-01970-8_26},
      title = {Automated Provenance Collection for CCA Component Assemblies},
      url = {http://dx.doi.org/10.1007/978-3-642-01970-8_26},
      publisher = {Springer Berlin Heidelberg},
      author = {Damevski, Kostadin and Chen, Hui},
      pages = {259-268}
    }
    

Biomolecular Computing

Conference Paper

  1. Garzon, M. H., Neel, A., & Chen, H. (2003). Efficiency and Reliability of DNA-Based Memories. In E. Cantú, J. A. Foster, K. Deb, L. D. Davis, R. Roy, U.-M. O.Reilly, H.-G. Beyer, R. Standish, G. Kendall, S. Wilson, M. Harman, J. Wegener, D. Dasgupta, M. A. Potter, A. C. Schultz, K. A. Dowsland, N. Jonoska, & J. Miller (Eds.), Genetic and Evolutionary Computation . GECCO 2003 (Vol. 2723, pp. 379–389). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45105-6_47
    @incollection{edna2003,
      title = {Efficiency and Reliability of {DNA}-Based Memories},
      year = {2003},
      isbn-13 = {978-3-540-40602-0},
      booktitle = {Genetic and Evolutionary Computation . GECCO 2003},
      volume = {2723},
      series = {Lecture Notes in Computer Science},
      editor = {Cantú, Erick and Foster, JamesA. and Deb, Kalyanmoy and Davis, LawrenceDavid and Roy, Rajkumar and O.Reilly, Una-May and Beyer, Hans-Georg and Standish, Russell and Kendall, Graham and Wilson, Stewart and Harman, Mark and Wegener, Joachim and Dasgupta, Dipankar and Potter, MitchA. and Schultz, AlanC. and Dowsland, KathrynA. and Jonoska, Natasha and Miller, Julian},
      doi = {10.1007/3-540-45105-6_47},
      url = {http://dx.doi.org/10.1007/3-540-45105-6_47},
      publisher = {Springer Berlin Heidelberg},
      author = {Garzon, MaxH. and Neel, Andrew and Chen, Hui},
      pages = {379-389},
      language = {English}
    }
    

Geophysics

Journal Paper

  1. Chen, H., Chiu, J.-M., Pujol, J., Kim, K., Chen, K.-C., Huang, B.-S., Yeh, Y.-H., & Chiu, S.-C. (2006). A Simple Algorithm for Local Earthquake Location Using 3D Vp and Vs Models: Test Examples in the Central United States and in Central Eastern Taiwan. Bulletin of the Seismological Society of America, 96(1), 288–305. https://doi.org/10.1785/0120040102

    Traditional local-earthquake location using a horizontally layered homogeneous velocity model is limited in its resolution and reliability due to the existence of frequently overlooked 3D complexity of the real Earth. During traditional 3D seismic tomography, simultaneous earthquake relocation using the resultant 3D velocity model has produced reliable earthquake locations; however, only a small subset of events are typically used and thus relocated in the inversion. The rest of the events in a catalog must then be relocated using the 3D models. The repeated calculation of travel times across 3D VP and VS models is also not efficient and not practical for a routine network earthquake location when the very time-consuming exact 3D raytracing is used. Because high-resolution earthquake data are now available from many modern seismic networks, representative high-resolution 3D VP and VS models for a region can be better determined. By taking advantage of recently available high-speed computer technology and large disk space, we implemented a simple algorithm to efficiently locate every local earthquake using the best available regional 3D VP and VS models. Once the VP and VS information for all cubic cells in a 3D grid model are determined, P and S travel times from each grid point to all seismic stations can be calculated and stored on disk files for later usage. During the iteration process for earthquake location, travel times from a trial hypocenter to all recording stations can be determined simply by a linear interpolation from those of the adjacent eight grid points available in the previously stored disk files without the need for raytracing. The iterations continue until the hypocenter adjustments at the end of the last iteration are below the given criteria and the travel-time residual, or the difference between the observed and the calculated travel times, is a minimum. Therefore, any local earthquake can be efficiently and reliably located using the available 3D velocity models. This simple location program has been applied to relocate earthquakes in the New Madrid Seismic Zone (nmsz) of the central United States and in the central eastern Taiwan region. Preliminary results in both regions reveal that earthquake hypocenters can be efficiently relocated in spite of the very significant lateral structural variations. Tests with data from Taiwan further demonstrate that the resolution of seismic tomography and the relocated seismicity is sensitive to relative distribution of seismic-network stations and background seismicity. Thus, this single-event location program can be applied to relocate all earthquakes in a seismic-network catalog and, more importantly, to allow routine earthquake location for any seismic network using the available 3D velocity models.

    @article{Chen01022006,
      author = {Chen, Hui and Chiu, Jer-Ming and Pujol, Jose and Kim, Kwanghee and Chen, Kou-Cheng and Huang, Bor-Shouh and Yeh, Yih-Hsiung and Chiu, Shu-Chioung},
      title = {A Simple Algorithm for Local Earthquake Location Using 3D {Vp} and {Vs} Models: Test Examples in the Central United States and in Central Eastern Taiwan},
      volume = {96},
      number = {1},
      pages = {288-305},
      year = {2006},
      doi = {10.1785/0120040102},
      url = {http://www.bssaonline.org/content/96/1/288.abstract},
      eprint = {http://www.bssaonline.org/content/96/1/288.full.pdf+html},
      journal = {Bulletin of the Seismological Society of America}
    }
    
  1. Xu, Y., Liu, F., Liu, J., & Chen, H. (2002). Crust and upper mantle structure beneath western China from P wave travel time tomography. Journal of Geophysical Research: Solid Earth, 107(B10), ESE 4–1–ESE 4–15. https://doi.org/10.1029/2001JB000402
    @article{JGRB_JGRB12995,
      author = {Xu, Yi and Liu, Futian and Liu, Jianhua and Chen, Hui},
      title = {Crust and upper mantle structure beneath western China from P wave travel time tomography},
      journal = {Journal of Geophysical Research: Solid Earth},
      volume = {107},
      number = {B10},
      issn = {2156-2202},
      url = {http://dx.doi.org/10.1029/2001JB000402},
      doi = {10.1029/2001JB000402},
      pages = {ESE 4-1--ESE 4-15},
      keywords = {western China, crust and upper mantle, seismic tomography, lithospheric structure, continental collision},
      year = {2002}
    }
    
  1. Xu, P., Liu, F., Ye, K., Wang, Q., Cong, B., & Chen, H. (2002). Flake tectonics in the Sulu orogen in eastern China as revealed by seismic tomography. Geophysical Research Letters, 29(10), 23–21–23–24. https://doi.org/10.1029/2001GL014185
    @article{GRL_GRL15417,
      author = {Xu, Peifen and Liu, Futian and Ye, Kai and Wang, Qingchen and Cong, Bolin and Chen, Hui},
      title = {Flake tectonics in the Sulu orogen in eastern China as revealed by seismic tomography},
      journal = {Geophysical Research Letters},
      volume = {29},
      number = {10},
      issn = {1944-8007},
      url = {http://dx.doi.org/10.1029/2001GL014185},
      doi = {10.1029/2001GL014185},
      pages = {23-1--23-4},
      year = {2002}
    }
    
  1. Xu, P., Liu, F., Wang, Q., Cong, B., & Chen, H. (2001). Slab-like high velocity anomaly in the uppermost mantle beneath the Dabie-Sulu Orogen. Geophysical Research Letters, 28(9), 1847–1850. https://doi.org/10.1029/2000GL012187
    @article{GRL_GRL14132,
      author = {Xu, Peifen and Liu, Futian and Wang, Qingchen and Cong, Bolin and Chen, Hui},
      title = {Slab-like high velocity anomaly in the uppermost mantle beneath the Dabie-Sulu Orogen},
      journal = {Geophysical Research Letters},
      volume = {28},
      number = {9},
      issn = {1944-8007},
      url = {http://dx.doi.org/10.1029/2000GL012187},
      doi = {10.1029/2000GL012187},
      pages = {1847--1850},
      year = {2001}
    }
    
  1. Sun, R., Liu, F., He, J., & Chen, H. (2001). Structural Setting of Strong Earthquakes in the Huabei Area of China. Pure and Applied Geophysics, 158(5-6), 903–918. https://doi.org/10.1007/PL00001212
    @article{sunruomei2001,
      year = {2001},
      issn = {0033-4553},
      journal = {pure and applied geophysics},
      volume = {158},
      number = {5-6},
      doi = {10.1007/PL00001212},
      title = {Structural Setting of Strong Earthquakes in the Huabei Area of China},
      url = {http://dx.doi.org/10.1007/PL00001212},
      publisher = {Birkhäuser Verlag},
      keywords = {Key words: Strong earthquake, tomography, velocity structure, Huabei area.},
      author = {Sun, R. and Liu, F. and He, J. and Chen, H.},
      pages = {903-918},
      language = {English}
    }