Publications

Journal Publications

  • Xiaojun Ruan, Q. Yang, M. I. Alghamdi, S. Yin, and X. Qin, "ES-MPICH2: A Message Passing Interface with Enhanced Security," IEEE Transaction on Dependable and Secure Computing, vol. 9, no. 3, pp.361-374, May/June 2012.

  • Xian Pan, Junwei Huang, Zhen Ling, Bin Lu, and Xinwen Fu, “Long PN Code Based Traceback in Wireless Networks,” International Journal of Performability Engineering - Special Issue on Dependability of Wireless Systems and Networks, Volume 8, Number 2, March 2012 , pp. 173-182.

  • Z. Jiang, Z. Li, N. Xiao, Jie Wu, “Capability Information: A Cost-effective Information Model for Multi-hop Routing of Wireless Ad Hoc Networks in the Real Environment”, Journal of Parallel and Distributed Computing, Vol. 71, No. 8, August 2011. Document is also available at http://www.sciencedirect.com/science/article/pii/S0743731511000773.

  • X. Chen, Q. J. Gu, Z. Jiang, and J. Wu, “Fast Mobility Control Protocols with Sink Location Protection in Wireless Sensor Networks”, the International Journal of Internet Protocol Technology, Indersciences, Vol 6. No. ½, 2011.

  • A. Manzanares, X. Qin, Xiaojun Ruan, and S. Yin, “PRE-BUD: Prefetching for Energy-Efficient Parallel I/O Systems with Buffer Disks,” ACM Transaction on Storage, vol. 7, no. 1, Jun. 2011.

  • Z. Jiang, J. Wu, and R. Kline, “Mobility Control for Achieving Optimal Configuration in Wireless Sensor Networks”, Journal of Wireless Networks, Vol. 16, No. 1, Kluwer Academic Publishers Hingham, MA, USA, January, 2010.

  • Z. Jiang, and J. Wu, “On Achieving the Shortest-Path Routing in 2-D Meshes”, International Journal of Foundations of Computer Science, Vol. 18, No. 6, 2008, p1279-1297.

  • Z. Jiang, J. Wu, and R. Kline, “Mobility Control for Achieving Optimal Configuration in Wireless Sensor Networks”, Journal of Wireless Networks, on-line publication, available at http://www.springerlink.com/content/u516nr6m3m504l02/, June, 2008.

  • Z. Jiang, J. Wu, and D. Wang, “A New Fault-information Model for Adaptive & Minimal Routing in 3-D Meshes”, IEEE Transactions on Reliability, Vol. 57, No. 1, March 2008, p149-162.

Refereed Conference Publications

  • B. Romoser, R. Fares, P. Janovics, Z.-L. Zong, Xiaojun Ruan, and X. Qin, “Global Workload Characterization of A Large Scale Satellite Image Distribution System,” Proc. the 31st IEEE International Performance Computing and Communications Conference (IPCCC), Nov. 2012. Information is available at http://www.ipccc.org/ipccc2012/main.php?page=10.

  • X.-F. Jiang, M. I. Alghamdi, J. Zhang, M. Al Assaf, Xiaojun Ruan, T. Muzaffar, and X. Qin,“Thermal Modeling and Analysis of Storage Systems,” Proc. the 31st IEEE International Performance Computing and Communications Conference (IPCCC), Nov. 2012. Information is available at http://www.ipccc.org/ipccc2012/main.php?page=10.

  • Xiaojun Ruan, M. I. Alghamdi, X.-F. Jiang, Z.-L. Zong, Y. Tian, and X. Qin, “Improving Write Performance by Enhancing Internal Parallelism of Solid State Drives,” Proc. the 31st IEEE International Performance Computing and Communications Conference (IPCCC), Nov. 2012. Information is available at http://www.ipccc.org/ipccc2012/main.php?page=10.

  • Z. Jiang, J. Wu, M. Guo, Z. Zhao, and D. Wu, “A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor Networks”, Proc. of the 31st IEEE International Symposium on Reliable Distributed Systems, October 8-11, Irvine, CA, 2012. Information is available at http://web.mst.edu/~cswebdb/srds2012/program.html.

  • Z.-Y. Ding, X.-F. Jiang, S. Yin, Xiaojun Ruan, Xiao Qin, K.-H. Chang, M. I. Alghamdi, and M. Qiu “Multicore-Enabled Smart Storage for Clusters,” Proc. the 2012 IEEE International Conference on Cluster Computing (Cluster 2012), Beijing, China, September 24-28, 2012. Information is available at http://ieeecluster2012.csp.escience.cn/dct/page/65621.

  • Z. Jiang, D. Wu, M. Guo, J. Wu, R. Kline, and X. Wang, “Minimum Latency Broadcasting with Conflict Awareness in Wireless Sensor Networks”, Proc. of the 41st International Conference on Parallel Processing, September 10-13, Pittsburgh, PA, 2012. Information is available at http://www.icpp2012.org/program.php.

  • Y. Wang, J. Wu, Z. Jiang, and F. Li, “A Joint Replication-Migration-based Routing in Delay Tolerant Networks”, Proc. of the IEEE International Conference on Communications, June 10-15, Ottawa, Canada, 2012. Information is available at http://www.ieee-icc.org/2012/program/symposia/AH.html and http://www.informatik.uni-trier.de/~ley/pers/hd/j/Jiang:Zhen.html.

  • S. Yin, Y. Tian, J. Xie, X. Qin, M. Alghamdi, Xiaojun Ruan, M.-K. Qiu, "Reliability Analysis of An Energy-Aware RAID System," Proc. 20th IEEE Int'l Performance Comp. and Comm. Conf. (IPCCC), Orlando, FL, Nov. 17-19, 2011. Information is available at http://ipccc.org/ipccc2011/2011_Program_FINALPRINT.pdf .

  • Z. Jiang, E. Fernandez, and L. Cheng, “A Pedagogical Pattern for Teaching Computer Programming to Non-CS majors”, Proc. of the 18th Conference on Pattern Language of Program (PLoP), in conjunction with ACM FLASH 2011, October 21-23, Portland, Oregon, 2011. Information is available at http://www.hillside.net/plop/2011/index.php?nav=program.

  • Z. L. Zong, X. Qin, Xiaojun Ruan, and M. Nijim, "Heat-Based Dynamic Data Caching: A Load Balancing Strategy for Energy-Efficient Parallel Storage Systems with Buffer Disks," Proceedings of the 27th IEEE Symposium on Massive Storage Systems and Technologies (MSST 2011), Denver, CO, May, 2011. Information is available at http://storageconference.org/2011/Presentations.html.

  • Z. Jiang, R. Ito, J. Wu, “A Metric for Routing in Delay-Sensitive Applications of Wireless Sensor Networks”, best paper award, Proc. of IEEE MASS, San Francisco, CA, November 8-11, 2010. Information is available at http://mass2010.soe.ucsc.edu/program.

  • A. Agah and M. Asadi, "Incentivizing Cooperation in Wireless Sensor Networks for Prevention of DoS Attack using Minimum Battery Discharge: A Game Theoretic Approach", Proc. of the Symposium on Emerging Trends in Mobile, Sensor and Social Networks, Arlington, TX, Oct.7-8, 2010. Information is also available at http://crewman.uta.edu/crewman-10th-anniversary-celebration/CReWMaN_10th_Anniversary_Workshop/Agenda_files/CReWMaN_MSS_2010_Program.pdf .

  • Z. Jiang, Z. Li, N. Xiao, Jie Wu, “CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment”, Proc. of IEEE NAS, Macau, SAR, China, July 15-17, 2010. Information is available at http://www.nas-conference.org/NAS-2010/program.html.

  • R. Epstein and D. Zhang, “All the News That’s Fit to Blog.” Proc. of the 14th Colloquium for Information System Security Education, Baltimore, Maryland, June 7-9, 2010. Information is available at http://www.cisse.info/archives/category/14-papers.

  • D. Drager and A. Agah, " Battery Power Saving Strategy on Wireless Sensor Nodes Using Selective Node Shutdown", Proc. of the 25th Pennsylvania Computer and Information Science Educators (PACISE) Conference, Poster Presentation, West Chester, PA, April 9-10, 2010. PDF Available

  • C. Zimmerman and A. Agah, "Forensics Investigation By Capturing Email and Instant Message Packets", Proc. of the 25th Pennsylvania Computer and Information Science Educators (PACISE) Conference, Poster Presentation, West Chester, PA, April 9-10, 2010. PDF Available

  • R. Epstein, “Workplace Issues in an Undergraduate Software Engineering Course.” Proc. of the 23rd Annual IEEE-CS Conference on Software Engineering Education and Training, Pittsburgh, PA, March 9-12, 2010. Information is available at http://cseet2010.dei.uc.pt/index.php?title=Day_1_-_Tuesday,_March_9th,_2010.

  • Q. Gu, X. Chen, Z. Jiang, J. Wu, “Sink-Anonymity Mobility Control in Wireless Sensor Networks”, Proc. of the IEEE WiMob 2009, Marrakech, Morocco, October 12-14, 2009. Information is available at http://conferences.computer.org/wimob2009/WiMob2009-Program.pdf .

  • Z. Jiang, and E. Fernandez, “Composing Analysis Patterns to Build Complex Models: Flight Reservation”, Proc. of the 16th Conference on Pattern Language of Program (PLoP), in conjunction with ACM Agile 2009, August 28-30, Chicago, 2009. Information is available at http://www.hillside.net/plop/2009/index.php?nav=program.

  • D. Drager, A. Agah and M. Asadi, "Sensor Graphing via Wireless Sensor Network to a Mobile Internet Device", Proc. of the 2009 International Conference on Wireless Networks, Las Vegas, Nevada, July 13-16, 2009. Information is also available at http://www.worldacademyofscience.org/worldcomp09/ws/program/icw16/?searchterm=afrand.

  • Z. Jiang, J. Ma, W. Lou, and J. Wu, “A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks”, WWASN-ICDCS workshop in conjunction with IEEE ICDCS 2009, Montreal, Quebec, Canada, June 22-26, 2009. Information is available at http://www.informatik.uni-trier.de/~ley/pers/hd/j/Jiang:Zhen.html.

  • R. Epstein, “News and Notes.” Proc. the 13th Colloquium for Information System Security Education, Fairbanks, Alaska, June 1-3, 2009. Information is available at http://www.cisse.info/archives/category/12-papers?start=10.

  • R. Epstein, “Integrating Security into an Undergraduate Course on Software Engineering.” Proc. the 13th Colloquium for Information System Security Education, Fairbanks, Alaska, June 1-3, 2009. Information is available at http://www.cisse.info/archives/category/12-papers?start=10.

  • Cheer-Sun Yang, “Using Incremental Projects for Student-Centered Learning,” IADIS Conference on Cognition and Exploratory Learning in Digital Age (CELDA), Freiburg, Germany, October 13-15, 2008. Information is available at http://www.iadisportal.org/celda-2008-proceedings.

  • J. Wu, and Z. Jiang, “A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks.” Proc. of the IEEE PIMRC, Cannes, France, September 15-18, 2008. Information is available at http://www.ewh.ieee.org/conf/pimrc/docs/IEEE_PIMRC_2008_Programme.pdf .

  • M. Asadi, A. Agah and S. PerIi, "Developing Appellations for Lego Robots Using Multiple Platforms", Proc. of the 2008 International Conference on Security and Management, Las Vegas, Nevada, July 14-17, 2008. Information is also available at http://www.worldacademyofscience.org/worldcomp08/ws/program/sam15 and http://www.dblp.org/search/index.php#query=author:afrand_agah%20author:afrand_agah:&qp=W1.4:F1.4:F2.4:F3.4:F4.4:H1.1000.

  • O. Epelbaum, A. Agah and M. Asadi, "A Secure Online Chat System", Proc. of the 2008 International Conference on Security and Management, Las Vegas, Nevada, July 14-17, 2008. Information is also available at http://www.worldacademyofscience.org/worldcomp08/ws/program/sam15 and http://www.dblp.org/search/index.php#query=author:afrand_agah%20author:afrand_agah:&qp=W1.4:F1.4:F2.4:F3.4:F4.4:H1.1000.

  • Z. Jiang, J. Wu, R. Kline, and J. Krantz, “Mobility Control for Complete Coverage in Wireless Sensor Networks.” Proc. of the 28th IEEE International Conference on Distributed Computing Systems (Workshop WWASN), Beijing, China, June 17-20, 2008. Information is available at http://www.informatik.uni-trier.de/~ley/pers/hd/j/Jiang:Zhen.html.

  • R. Epstein, “And You Thought the Killer Robot was Bad.” Proc. of the 12th Colloquium for Information System Security Education, Dallas, June 2-4, 2008. Information is available at http://www.cisse.info/archives/category/10-papers?start=10.

  • X. Chen, Z. Jiang, and J. Wu, “Mobility Control Schemes with Quick Convergence in Wireless Sensor Networks”, Proc. of IEEE IPDPS (Workshop APDCM), Miami, FL, April 14-18, 2008. Information is available at http://www.informatik.uni-trier.de/~ley/pers/hd/j/Jiang:Zhen.html.

  • R. Epstein, “Getting Students to Think about How Agile Processes Can Be Made More Secure.” Proc. of the IEEE CSEET, Charleston, SC, April 14-17, 2008. Information is available at http://toc.proceedings.com/03087webtoc.pdf .

  • R. Epstein, “A Software Engineering Course with an Emphasis on Software Processes and Security.” Proc. of the IEEE CSEET, Charleston, SC, April 14-17, 2008. Information is available at http://toc.proceedings.com/03087webtoc.pdf .

  • Z. Jiang, J. Ma, W. Lou, and J. Wu, “An Information Model for Geographic Greedy Forwarding in Wireless Ad Hoc Sensor Networks”, Proc. of IEEE/ACM INFOCOM’08, Phoenix, AZ, April 13-18, 2008. Information is available at http://www.ieee-infocom.org/2008/tech_prog.html.

Books & Book Chapters

  • Y. Tian, M.I. Alghamdi, Xiaojun Ruan, J. Xie, and X. Qin, “Towards a Secure Fragment Allocation of Files in Heterogeneous Distributed Systems,” Scalable Computing and Communications: Theory and Practice, John Wiley & Sons, Sept. 2012.

  • Cheer-Sun Yang, “Fundamentals of Computing,” Second Edition, West Chester University Bookstore, 2012.

  • S. Yin, Xiaojun Ruan, A. Manzanares, X. Qin, “ROD: A Practical Approach to Improving Reliability of Energy-Efficient Parallel Disk Systems”, Energy Aware Distributed Computing Systems, Wiley Series on Parallel and Distributed Computing, May 2011. DOI: 10.1002/9781118342015.ch15

  • Cheer-Sun Yang, “Fundamentals of Computing,” West Chester University Bookstore, 2010.

  • A. Agah, M. Asadi and S. K. Das, "Prevention of DoS Attacks in Sensor Networks using Repeated Game Theory", book chapter, editors Z. Jiang and Y. Pan, Nova Science Publishers, Inc., 2009.

  • Z. Jiang, and Y. Pan, “From Problem towards Solution: Wireless Sensor Networks Security”, Nova Publishers, May 2009.

Back to top of page.