Yingshu Li, Ph.D. - Publications

Affiliations: 
2005 University of Minnesota, Twin Cities, Minneapolis, MN 
Area:
Computer Science

98 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Li J, Siddula M, Cheng X, Cheng W, Tian Z, Li Y. Approximate data aggregation in sensor equipped IoT networks Tsinghua Science and Technology. 25: 44-55. DOI: 10.26599/Tst.2019.9010023  0.645
2020 Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users Wireless Communications and Mobile Computing. 2020: 1-13. DOI: 10.1155/2020/8892321  0.549
2020 Zhu T, Li J, Gao H, Li Y. Latency-efficient Data Collection Scheduling in Battery-free Wireless Sensor Networks Acm Transactions On Sensor Networks. 16: 1-21. DOI: 10.1145/3390956  0.453
2020 Chen Q, Gao H, Cheng L, Li Y. Label Coloring Based Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Ieee Transactions On Mobile Computing. 19: 1123-1137. DOI: 10.1109/Tmc.2019.2907956  0.48
2020 Liu T, Wang Y, Li Y, Tong X, Qi L, Jiang N. Privacy Protection based on Stream Cipher for Spatio-temporal Data in IoT Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.2990428  0.445
2020 Sai AMVV, Li Y. A Survey on Privacy Issues in Mobile Social Networks Ieee Access. 8: 130906-130921. DOI: 10.1109/Access.2020.3009691  0.412
2020 Wang Y, Gao Y, Li Y, Tong X. A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems Computer Networks. 171: 107144. DOI: 10.1016/J.Comnet.2020.107144  0.364
2019 Zhao B, Wang Y, Li Y, Gao Y, Tong X. Task Allocation Model Based on Worker Friend Relationship for Mobile Crowdsourcing. Sensors (Basel, Switzerland). 19. PMID 30813250 DOI: 10.3390/S19040921  0.377
2019 Zhu T, Wang J, Cheng S, Li Y, Li J. Retrieving the relative kernel dataset from big sensory data for continuous queries in IoT systems Eurasip Journal On Wireless Communications and Networking. 2019. DOI: 10.1186/S13638-019-1467-4  0.375
2019 Zhu T, Li J, Gao H, Li Y. Broadcast Scheduling in Battery-Free Wireless Sensor Networks Acm Transactions On Sensor Networks. 15: 1-34. DOI: 10.1145/3356472  0.441
2019 Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Anonymization in Online Social Networks Based on Enhanced Equi-Cardinal Clustering Ieee Transactions On Computational Social Systems. 6: 809-820. DOI: 10.1109/Tcss.2019.2928324  0.589
2019 Miao D, Cai Z, Yu J, Li Y. Triangle edge deletion on planar glasses-free RGB-digraphs Theoretical Computer Science. 788: 2-11. DOI: 10.1016/J.Tcs.2018.10.034  0.315
2019 Miao D, Liu X, Li Y, Li J. Vertex cover in conflict graphs Theoretical Computer Science. 774: 103-112. DOI: 10.1016/J.Tcs.2016.07.009  0.32
2019 Cheng S, Li Y, Tian Z, Cheng W, Cheng X. A model for integrating heterogeneous sensory data in IoT systems Computer Networks. 150: 1-14. DOI: 10.1016/J.Comnet.2018.11.032  0.505
2018 Hu Y, Wang Y, Li Y, Tong X. An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions. Sensors (Basel, Switzerland). 18. PMID 30322207 DOI: 10.3390/S18103453  0.367
2018 Liu B, Wang W, Kim D, Li Y, Kwon S, Jiang Y. On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks Ieee/Acm Transactions On Networking. 26: 412-421. DOI: 10.1109/Tnet.2017.2780262  0.443
2018 Cai Z, He Z, Guan X, Li Y. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks Ieee Transactions On Dependable and Secure Computing. 15: 577-590. DOI: 10.1109/Tdsc.2016.2613521  0.376
2018 Li J, Cai Z, Wang J, Han M, Li Y. Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems Ieee Transactions On Computational Social Systems. 5: 324-334. DOI: 10.1109/Tcss.2018.2797225  0.381
2018 Liang Y, Cai Z, Yu J, Han Q, Li Y. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices Ieee Network. 32: 8-14. DOI: 10.1109/Mnet.2018.1700349  0.306
2018 Wang Y, Li Y, Chi Z, Tong X. The Truthful Evolution and Incentive for Large-Scale Mobile Crowd Sensing Networks Ieee Access. 6: 51187-51199. DOI: 10.1109/Access.2018.2869665  0.348
2018 Siddula M, Li L, Li Y. An Empirical Study on the Privacy Preservation of Online Social Networks Ieee Access. 6: 19912-19922. DOI: 10.1109/Access.2018.2822693  0.445
2018 Miao D, Cai Z, Li Y. SEF view deletion under bounded condition Theoretical Computer Science. 749: 17-25. DOI: 10.1016/J.Tcs.2017.07.033  0.302
2018 Liu X, Li Y, Li J, Feng Y. On the complexity and approximability of repair position selection problem Journal of Combinatorial Optimization. 1-19. DOI: 10.1007/S10878-018-0362-Y  0.313
2017 Fang X, Luo J, Gao H, Wu W, Li Y. Scheduling multi-task jobs with extra utility in data centers. Eurasip Journal On Wireless Communications and Networking. 2017: 200. PMID 29213279 DOI: 10.1186/S13638-017-0986-0  0.326
2017 Duan Z, Yan M, Han Q, Li L, Li Y. IoT-based cost saving offloading system for cellular networks Tsinghua Science and Technology. 22: 379-388. DOI: 10.23919/Tst.2017.7986941  0.368
2017 Han M, Li Y, Li J, Li L, Han Q. Maximizing Influence in Sensed Heterogenous Social Network with Privacy Preservation International Journal of Sensor Networks. 1: 1. DOI: 10.1504/Ijsnet.2017.10007412  0.425
2017 Li Y, Bourgeois AG, Lybarger FW, Han M, Duan Z, Ai C. Time constraint influence maximization algorithm in the age of big data International Journal of Computational Science and Engineering. 15: 165. DOI: 10.1504/Ijcse.2017.10008085  0.472
2017 Liang Y, Cai Z, Han Q, Li Y. Location Privacy Leakage through Sensory Data Security and Communication Networks. 2017: 1-12. DOI: 10.1155/2017/7576307  0.37
2017 Zhang L, Li Y, Wang L, Lu J, Li P, Wang X. An Efficient Context-Aware Privacy Preserving Approach for Smartphones Security and Communication Networks. 2017: 1-11. DOI: 10.1155/2017/4842694  0.341
2017 Li J, Cheng S, Cai Z, Yu J, Wang C, Li Y. Approximate Holistic Aggregation in Wireless Sensor Networks Acm Transactions On Sensor Networks. 13: 1-24. DOI: 10.1145/3027488  0.412
2017 He Z, Cai Z, Yu J, Wang X, Sun Y, Li Y. Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks Ieee Transactions On Vehicular Technology. 66: 2789-2800. DOI: 10.1109/Tvt.2016.2585591  0.37
2017 Shi T, Cheng S, Cai Z, Li Y, Li J. Exploring Connected Dominating Sets in Energy Harvest Networks Ieee/Acm Transactions On Networking. 25: 1803-1817. DOI: 10.1109/Tnet.2017.2657688  0.545
2017 Chang RN, Cheng X, Cheng W, Lee W, Li Y, Yu J. Guest Editorial Special Issue on Fog Computing in the Internet of Things Ieee Internet of Things Journal. 4: 1113-1116. DOI: 10.1109/Jiot.2017.2750438  0.487
2017 Zheng X, Cai Z, Yu J, Wang C, Li Y. Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems Ieee Internet of Things Journal. 4: 1868-1878. DOI: 10.1109/Jiot.2017.2679483  0.314
2017 Wang J, Li Y, Yang D, Gao H, Luo G, Li J. Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services Ieee Access. 5: 24580-24592. DOI: 10.1109/Access.2017.2766669  0.373
2016 Bi R, Li Y, Tan G, Sun L. Optimizing Retransmission Threshold in Wireless Sensor Networks. Sensors (Basel, Switzerland). 16. PMID 27171092 DOI: 10.3390/S16050665  0.495
2016 Kim D, Zhong J, Lee M, Li D, Li Y, Tokuta AO. Efficient respondents selection for biased survey using homophily-high social relation graph Discrete Mathematics, Algorithms and Applications. 8: 1650071. DOI: 10.1142/S1793830916500713  0.37
2016 Bi R, Li Y, Zheng X. An optimal content caching framework for utility maximization Tsinghua Science and Technology. 21: 374-384. DOI: 10.1109/Tst.2016.7536715  0.428
2016 Shi T, Wan J, Cheng S, Cai Z, Li Y, Li J. Time-Bounded Positive Influence in Social Networks Proceedings - 2015 International Conference On Identification, Information, and Knowledge in the Internet of Things, Iiki 2015. 134-139. DOI: 10.1109/IIKI.2015.37  0.366
2016 Liu G, Li Y. Social-aware data dissemination service in mobile social network with controlled overhead Pervasive and Mobile Computing. 33: 127-139. DOI: 10.1016/J.Pmcj.2016.04.010  0.439
2016 Han M, Yan M, Cai Z, Li Y. An exploration of broader influence maximization in timeliness networks with opportunistic selection Journal of Network and Computer Applications. 63: 39-49. DOI: 10.1016/J.Jnca.2016.01.004  0.42
2016 Guo L, Li Y, Cai Z. Minimum-latency aggregation scheduling in wireless sensor network Journal of Combinatorial Optimization. 31: 279-310. DOI: 10.1007/S10878-014-9748-7  0.421
2016 Shi T, Cheng S, Cai Z, Li Y, Li J. Retrieving the maximal time-bounded positive influence set from social networks Personal and Ubiquitous Computing. 20: 717-730. DOI: 10.1007/s00779-016-0943-7  0.367
2015 Gao H, Fang X, Li J, Li Y. Data Collection in Multi-Application Sharing Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 26: 403-412. DOI: 10.1109/Tpds.2013.289  0.449
2015 Gao J, Li J, Li Y. Approximate event detection over multi-modal sensing data Journal of Combinatorial Optimization. DOI: 10.1007/S10878-015-9847-0  0.435
2014 He J, Ji S, Pan Y, Li Y. Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 25: 1681-1690. DOI: 10.1109/Tpds.2013.160  0.491
2014 He JS, Ji S, Beyah R, Xie Y, Li Y. Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm Transactions On Emerging Telecommunications Technologies. 26: 147-163. DOI: 10.1002/ett.2797  0.328
2013 Ji S, He J(, Uluagac AS, Beyah R, Li Y. Cell-based snapshot and continuous data collection in wireless sensor networks Acm Transactions On Sensor Networks. 9: 1-29. DOI: 10.1145/2489253.2489264  0.522
2013 Liu G, Krishnamani J, Sunderraman R, Li Y. Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks 2013 Ieee 32nd International Performance Computing and Communications Conference, Ipccc 2013. DOI: 10.1109/PCCC.2013.6742793  0.348
2013 Ji S, He J(, Pan Y, Li Y. Continuous data aggregation and capacity in probabilistic wireless sensor networks Journal of Parallel and Distributed Computing. 73: 729-745. DOI: 10.1016/J.Jpdc.2013.02.005  0.469
2013 Kim D, Li D, Asgari O, Li Y, Tokuta AO, Oh H. Computing an effective decision making group of a society using social network analysis Journal of Combinatorial Optimization. 28: 577-587. DOI: 10.1007/S10878-013-9687-8  0.309
2013 Han M, Yan M, Li J, Ji S, Li Y. Neighborhood-based uncertainty generation in social networks Journal of Combinatorial Optimization. 28: 561-576. DOI: 10.1007/S10878-013-9684-Y  0.501
2012 He J, Ji S, Yan M, Pan Y, Li Y. Load-balanced CDS construction in wireless sensor networks via genetic algorithm International Journal of Sensor Networks. 11: 166. DOI: 10.1504/Ijsnet.2012.046331  0.43
2012 Li Y, Cao X, Beyah R, Thai MT. Guest editorial: Special issue on wireless computing and networking Tsinghua Science and Technology. 17: 485-486. DOI: 10.1109/Tst.2012.6314525  0.649
2012 Ji S, Cai Z, Li Y, Jia X. Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 23: 1844-1855. DOI: 10.1109/Tpds.2011.286  0.479
2012 Yan M, He JS, Ji S, Li Y. Multi-regional query scheduling in wireless sensor networks with minimum latency Wireless Communications and Mobile Computing. 14: 849-864. DOI: 10.1002/wcm.2238  0.345
2012 He JS, Ji S, Pan Y, Li Y. Greedy construction of load-balanced virtual backbones in wireless sensor networks Wireless Communications and Mobile Computing. 14: 673-688. DOI: 10.1002/wcm.2218  0.311
2011 Wang X, Jiang X, Yang T, Li Q, Li Y. Node Aggregation Degree-Aware Random Routing for Non-uniform Wireless Sensor Networks Ieice Transactions On Communications. 94: 97-108. DOI: 10.1587/Transcom.E94.B.97  0.457
2011 Li Y, Vu C, Ai C, Chen G, Zhao Y. Transforming Complete Coverage Algorithms to Partial Coverage Algorithms for Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 22: 695-703. DOI: 10.1109/Tpds.2010.124  0.511
2011 He J, Ji S, Pan Y, Li Y. Reliable and energy efficient target coverage for wireless sensor networks Tsinghua Science and Technology. 16: 464-474. DOI: 10.1016/S1007-0214(11)70066-9  0.421
2011 Xiong N, Park JH, Yang LT, Koh BS, Li Y. A security management scheme for failure detector distributed systems based on self-tuning control theory Journal of Intelligent Manufacturing. 22: 333-342. DOI: 10.1007/S10845-009-0315-5  0.347
2010 Du R, Ai C, Guo L, Chen J, Liu J, He J, Li Y. A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks Journal of Communications. 5. DOI: 10.4304/Jcm.5.9.654-664  0.436
2010 Xiong N, Jia X, Yang LT, Vasilakos AV, Li Y, Pan Y. A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks Ieee Transactions On Parallel and Distributed Systems. 21: 1254-1266. DOI: 10.1109/Tpds.2010.29  0.35
2010 Li Y, Ai C, Vu C, Pan Y, Beyah R. Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 21: 1373-1385. DOI: 10.1109/Tpds.2009.129  0.434
2010 Uluagac AS, Beyah RA, Li Y, Copeland JA. VEBEK: Virtual energy-based encryption and keying for wireless sensor networks Ieee Transactions On Mobile Computing. 9: 994-1007. DOI: 10.1109/Tmc.2010.51  0.47
2010 Saxena H, Ai C, Valero M, Li Y, Beyah R. DSF - A distributed security framework for heterogeneous wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. 1836-1843. DOI: 10.1109/MILCOM.2010.5679559  0.378
2010 Li Y, Wu Y, Ai C, Beyah R. On the construction of k-connected m-dominating sets in wireless networks Journal of Combinatorial Optimization. 23: 118-139. DOI: 10.1007/S10878-010-9346-2  0.443
2009 Xiong N, He J, Park JH, Cooley DH, Li Y. A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security Journal of Universal Computer Science. 15: 1119-1142. DOI: 10.3217/Jucs-015-05-1119  0.308
2009 WILLSON JK, GAO X, QU Z, ZHU Y, LI Y, WU W. EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS Discrete Mathematics, Algorithms and Applications. 1: 437-461. DOI: 10.1142/S1793830909000348  0.507
2009 VU C, CAI Z, LI Y. DISTRIBUTED ENERGY-EFFICIENT ALGORITHMS FOR COVERAGE PROBLEM IN ADJUSTABLE SENSING RANGES WIRELESS SENSOR NETWORKS Discrete Mathematics, Algorithms and Applications. 1: 299-317. DOI: 10.1142/S1793830909000245  0.525
2009 Kim D, Wu Y, Li Y, Zou F, Du D. Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 20: 147-157. DOI: 10.1109/Tpds.2008.74  0.613
2009 Xiong N, Vasilakos AV, Yang LT, Song L, Pan Y, Kannan R, Li Y. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems Ieee Journal On Selected Areas in Communications. 27: 495-509. DOI: 10.1109/Jsac.2009.090512  0.355
2009 Xiong N, Pan Y, Jia X, Park JH, Li Y. Design and analysis of a self-tuning feedback controller for the Internet Computer Networks. 53: 1784-1797. DOI: 10.1016/J.Comnet.2009.02.005  0.324
2009 Xiong N, Yang LT, Li Y. ODMCA: An adaptive data mining control algorithm in multicarrier networks Computer Communications. 32: 560-567. DOI: 10.1016/J.Comcom.2008.08.026  0.407
2009 Ai C, Hou H, Li Y, Beyah R. Authentic delay bounded event detection in heterogeneous wireless sensor networks Ad Hoc Networks. 7: 599-613. DOI: 10.1016/j.adhoc.2008.07.004  0.316
2009 Wu Y, Gao X, Li Y. A framework of distributed indexing and data dissemination in large scale wireless sensor networks Optimization Letters. 4: 335-345. DOI: 10.1007/S11590-009-0149-2  0.438
2009 Wang C, Thai MT, Li Y, Wang F, Wu W. Optimization scheme for sensor coverage scheduling with bandwidth constraints Optimization Letters. 3: 63-75. DOI: 10.1007/S11590-008-0091-8  0.665
2009 Xiong N, Vasilakos AV, Yang LT, Pedrycz W, Zhang Y, Li Y. A Resilient and Scalable Flocking Scheme in Autonomous Vehicular Networks Mobile Networks and Applications. 15: 126-136. DOI: 10.1007/S11036-009-0168-3  0.391
2009 Li Y, Ai C, Cai Z, Beyah R. Sensor scheduling for p-percent coverage in wireless sensor networks Cluster Computing. 14: 27-40. DOI: 10.1007/S10586-009-0088-9  0.5
2008 Wang F, Thai MT, Li Y, Cheng X, Du DZ. Fault-tolerant topology control for all-to-one and one-to-all communication in wireless networks Ieee Transactions On Mobile Computing. 7: 322-331. DOI: 10.1109/Tmc.2007.70743  0.726
2008 Wang X, Li Q, Li Y. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks Journal of Combinatorial Optimization. 20: 47-62. DOI: 10.1007/S10878-008-9190-9  0.42
2007 Vu CT, Beyah RA, Li Y. Composite event detection in wireless sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 264-271. DOI: 10.1109/PCCC.2007.358903  0.365
2007 Thai MT, Li Y, Du DZ, Wang F. O (log n) -localized algorithms on the coverage problem in heterogeneous sensor networks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 85-92. DOI: 10.1109/PCCC.2007.358882  0.604
2007 Wu Y, Wang F, Thai MT, Li Y. Constructing k-connected M-dominating sets in wireless sensor networks Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2007.4454774  0.613
2007 Wang C, Thai MT, Li Y, Wang F, Wu W. Minimum coverage breach and maximum network lifetime in wireless sensor networks Globecom - Ieee Global Telecommunications Conference. 1118-1123. DOI: 10.1109/GLOCOM.2007.215  0.619
2007 Li Y, Gao S. Designing k-coverage schedules in wireless sensor networks Journal of Combinatorial Optimization. 15: 127-146. DOI: 10.1007/S10878-007-9072-6  0.483
2006 Li Y, Thai MT, Wang F, Du DZ. On the construction of a strongly connected broadcast arborescence with bounded transmission delay Ieee Transactions On Mobile Computing. 5: 1460-1470. DOI: 10.1109/Tmc.2006.154  0.722
2006 Dhawan A, Vu CT, Zelikovsky A, Li Y, Prasad SK. Maximum lifetime of sensor networks with adjustable sensing range Proc. - Seventh Acis Int. Conf. On Software Eng., Artific. Intelligence, Netw., and Parallel/Distributed Comput., Snpd 2006, Including Second Acis Int. Worshop On Sawn 2006. 2006: 285-289. DOI: 10.1109/SNPD-SAWN.2006.46  0.32
2006 Wu W, Du H, Jia X, Li Y, Huang SC. Minimum connected dominating sets and maximal independent sets in unit disk graphs Theoretical Computer Science. 352: 1-7. DOI: 10.1016/J.Tcs.2005.08.037  0.331
2006 Du DZ, Thai MT, Li Y, Liu D, Zhu S. Strongly connected dominating sets in wireless sensor networks with unidirectional links Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3841: 13-24. DOI: 10.1007/11610113_2  0.716
2006 Cheng MX, Sun J, Min M, Li Y, Wu W. Energy-efficient broadcast and multicast routing in multihop ad hoc wireless networks Wireless Communications and Mobile Computing. 6: 213-223. DOI: 10.1002/Wcm.381  0.76
2005 Li Y, Thai MT, Liu Z, Wu W. Protein-protein interaction and group testing in bipartite graphs. International Journal of Bioinformatics Research and Applications. 1: 414-9. PMID 18048145 DOI: 10.1504/Ijbra.2005.008444  0.552
2005 Thai MT, Li Y, Du DZ. A combination of wireless multicast advantage and Hitch-hiking Ieee Communications Letters. 9: 1037-1039. DOI: 10.1109/Lcomm.2005.1576580  0.704
2005 Li J, Li Y, Thai MT. Data caching and query processing in MANETs International Journal of Pervasive Computing and Communications. 1: 169-178. DOI: 10.1108/17427370580000122  0.597
2005 Li Y, Cheng X, Wu W. Optimal topology control for balanced energy consumption in wireless networks Journal of Parallel and Distributed Computing. 65: 124-131. DOI: 10.1016/J.Jpdc.2004.09.014  0.457
2005 Du H, Jia X, Wang F, Thai M, Li Y. A note on optical network with nonsplitting nodes Journal of Combinatorial Optimization. 10: 199-202. DOI: 10.1007/S10878-005-2273-Y  0.624
2005 Li Y, Thai MT, Wang F, Yi CW, Wan PJ, Du DZ. On greedy construction of connected dominating sets in wireless networks Wireless Communications and Mobile Computing. 5: 927-932. DOI: 10.1002/Wcm.356  0.711
2004 Ruan L, Du H, Jia X, Wu W, Li Y, Ko KI. A greedy approximation for minimum connected dominating sets Theoretical Computer Science. 329: 325-330. DOI: 10.1016/J.Tcs.2004.08.013  0.594
Show low-probability matches.