Name
Affiliation
Papers
BENXIONG HUANG
Huazhong University, Wuhan, China
37
Collaborators
Citations 
PageRank 
79
168
19.36
Referers 
Referees 
References 
493
688
264
Search Limit
100688
Title
Citations
PageRank
Year
A Real-Time Passenger Flow Estimation and Prediction Method for Urban Bus Transit Systems.80.622017
Bandwidth-aware energy efficient flow scheduling with SDN in data center networks.140.552017
Channel Capacity Analysis of the Multiple Orthogonal Sequence Spread Spectrum Watermarking in Audio Signals40.392016
Fast Frequency Estimation Algorithm by Least Squares Phase Unwrapping.10.382016
Exploiting Collective Spontaneous Mobility to Improve Location Prediction of Mobile Phone Users.00.342015
Exploration of Collective Pattern to Improve Location Prediction of Mobile Phone Users10.352015
Energy-Efficient and Reliable Routing for Mobility Prediction-Based MANETs.00.342015
Channel Capacity Analysis of the Generalized Spread Spectrum Watermarking in Audio Signals30.422015
Bandwidth-Aware Energy Efficient Routing with SDN in Data Center Networks30.392015
Identifying Hot Lines of Urban Spatial Structure Using Cellphone Call Detail Record Data10.342014
Multi-source Broadcast Scheduling Algorithm of Barrage Relay Network in Tactical MANET10.352014
Shadow VoD: Performance Evaluation as a Capability in Production P2P-CDN Hybrid VoD Networks20.362014
Segmentation of Urban Areas Using Vector-Based Model10.342014
Region Partition Using User Mobility Patterns Based on Topic Model00.342013
What We Use to Predict a Mobile-Phone Users' Status in Campus?40.432013
Inferring Barriers of Urban City Using Mobile Phone Record00.342013
Detecting Geographic Community in Mobile Social Network10.362012
Cyber-Individual Meets Brain Informatics442.082011
Adaptive multi-channel MAC protocol for dense VANET with directional antennas60.522010
Game System of Treadmill Based on Video Capture.00.342010
Activity Recognition from Call Detail Record: Relation Between Mobile Behavior Pattern and Social Attribute Using Hierarchical Conditional Random Fields.10.362010
On Fourier interpolation error for band-limited signals30.432009
Password Recovery for RAR Files Using CUDA30.472009
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks00.342008
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding30.412008
Delta Compression for Information Push Services00.342008
Reduce Time Synchronization Cost for High Latency and Resource-Constrained Sensor Networks20.402008
A Flexible Garbage Collect Algorithm for Flash Storage Management00.342008
Double threshold energy detection of cooperative spectrum sensing in cognitive radio462.932008
P2p-Avs: P2p Based Cooperative Voip Spam Filtering60.502007
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards30.452007
A novel method for estimating the instantaneous parameters of radio transmitter signals00.342007
HLA-Based Network Simulation for Interactive Communication System20.442007
A new feature vector using local surrounding-line integral bispectra for identifying radio transmitters00.342007
Adaptive MAC Scheme Ready for Delay Assurances in Wireless Networks00.342006
A Cluster-Based Energy-Efficient Scheme for Sensor Networks20.472005
The mechanism of ASN.1 encoding and decoding implementation in network protocols30.922003