default search action
Mooi Choo Chuah
Person information
- affiliation: Lehigh University, Bethlehem, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Zhen Yao, Xin Li, Bo Lang, Mooi Choo Chuah:
Goal-LBP: Goal-Based Local Behavior Guided Trajectory Prediction for Autonomous Driving. IEEE Trans. Intell. Transp. Syst. 25(7): 6770-6779 (2024) - [j29]Bo Lang, Xin Li, Mooi Choo Chuah:
BEV-TP: End-to-End Visual Perception and Trajectory Prediction for Autonomous Driving. IEEE Trans. Intell. Transp. Syst. 25(11): 18537-18546 (2024) - [c89]Zhen Yao, Jiawei Xu, Shuhang Hou, Mooi Choo Chuah:
CrackNex: a Few-shot Low-light Crack Segmentation Model Based on Retinex Theory for UAV Inspections. ICRA 2024: 11155-11162 - [i7]Zhen Yao, Jiawei Xu, Shuhang Hou, Mooi Choo Chuah:
CrackNex: a Few-shot Low-light Crack Segmentation Model Based on Retinex Theory for UAV Inspections. CoRR abs/2403.03063 (2024) - [i6]Zhihao Zheng, Mooi Choo Chuah:
Latent Disentanglement for Low Light Image Enhancement. CoRR abs/2408.06245 (2024) - [i5]Zhen Yao, Mooi Choo Chuah:
Event-guided Low-light Video Semantic Segmentation. CoRR abs/2411.00639 (2024) - 2023
- [c88]Zhihao Zheng, Xiaowen Ying, Zhen Yao, Mooi Choo Chuah:
Robustness of Trajectory Prediction Models Under Map-Based Attacks. WACV 2023: 4530-4539 - 2022
- [j28]Zhuozhao Li, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah:
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes. IEEE/ACM Trans. Netw. 30(4): 1644-1658 (2022) - [c87]Xiaowen Ying, Mooi Choo Chuah:
UCTNet: Uncertainty-Aware Cross-Modal Transformer Network for Indoor RGB-D Semantic Segmentation. ECCV (30) 2022: 20-37 - 2021
- [c86]Xiaowen Ying, Xin Li, Mooi Choo Chuah:
SRNet: Spatial Relation Network for Efficient Single-stage Instance Segmentation in Videos. ACM Multimedia 2021: 347-356 - [c85]Xiaowen Ying, Xin Li, Mooi Choo Chuah:
Weakly-supervised Object Representation Learning for Few-shot Semantic Segmentation. WACV 2021: 1496-1505 - 2020
- [j27]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Signature Verification Using Critical Segments for Securing Mobile Transactions. IEEE Trans. Mob. Comput. 19(3): 724-739 (2020) - [c84]Zhuozhao Li, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah:
Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes. ICDCS 2020: 1191-1192 - [c83]Zhuozhao Li, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah:
Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes. ICPP 2020: 67:1-67:11 - [c82]Wanzhao Yang, Mooi Choo Chuah, Lifeifan Du:
M&M: Deep learning aided multi-facet mental health support tool for College Students. HealthDL@MobiSys 2020: 10-15
2010 – 2019
- 2019
- [c81]Huan Yang, Liang Cheng, Mooi Choo Chuah:
Deep-Learning-Based Network Intrusion Detection for SCADA Systems. CNS 2019: 1-7 - [c80]Xin Li, Xiaowen Ying, Mooi Choo Chuah:
GRIP: Graph-based Interaction-aware Trajectory Prediction. ITSC 2019: 3960-3966 - [c79]Xin Li, Shuai Zhang, Bolan Jiang, Yingyong Qi, Mooi Choo Chuah, Ning Bi:
DAC: Data-Free Automatic Acceleration of Convolutional Networks. WACV 2019: 1598-1606 - [i4]Xin Li, Xiaowen Ying, Mooi Choo Chuah:
GRIP: Graph-based Interaction-aware Trajectory Prediction. CoRR abs/1907.07792 (2019) - 2018
- [j26]Xiaonan Guo, Jian Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah:
Device-free Personalized Fitness Assistant Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 165:1-165:23 (2018) - [j25]Kwami Senam Sedzro, Alberto J. Lamadrid, Mooi Choo Chuah:
Generalized Minimax: A Self-Enforcing Pricing Scheme for Load Aggregators. IEEE Trans. Smart Grid 9(3): 1953-1963 (2018) - [c78]Qinghan Xue, Mooi Choo Chuah:
Deep Learning Based Medical Diagnosis System Using Multiple Data Sources. BCB 2018: 699-706 - [c77]Nikolas Lamb, Mooi Choo Chuah:
A Strawberry Detection System Using Convolutional Neural Networks. IEEE BigData 2018: 2515-2520 - [c76]Huan Yang, Liang Cheng, Mooi Choo Chuah:
Detecting Payload Attacks on Programmable Logic Controllers (PLCs). CNS 2018: 1-9 - [c75]Qinghan Xue, Xiaoran Wang, Samuel Meehan, Jilong Kuang, Jun Alex Gao, Mooi Choo Chuah:
Recurrent Neural Networks Based Obesity Status Prediction Using Activity Data. ICMLA 2018: 865-870 - [c74]Xiaowen Ying, Xin Li, Mooi Choo Chuah:
LiveFace: A Multi-task CNN for Fast Face-Authentication. ICMLA 2018: 955-960 - [c73]Xin Li, Mooi Choo Chuah:
ReHAR: Robust and Efficient Human Activity Recognition. WACV 2018: 362-371 - [i3]Xin Li, Mooi Choo Chuah:
ReHAR: Robust and Efficient Human Activity Recognition. CoRR abs/1802.09745 (2018) - [i2]Qinghan Xue, Xiaoran Wang, Samuel Meehan, Jilong Kuang, Alex Gao, Mooi Choo Chuah:
Recurrent Neural Networks based Obesity Status Prediction Using Activity Data. CoRR abs/1809.07828 (2018) - [i1]Xin Li, Shuai Zhang, Bolan Jiang, Yingyong Qi, Mooi Choo Chuah, Ning Bi:
DAC: Data-free Automatic Acceleration of Convolutional Networks. CoRR abs/1812.08374 (2018) - 2017
- [j24]Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor:
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching. IEEE Trans. Dependable Secur. Comput. 14(4): 377-391 (2017) - [c72]Qinghan Xue, Mooi Choo Chuah:
Incentivising High Quality Crowdsourcing Clinical Data for Disease Prediction. CHASE 2017: 185-194 - [c71]Xin Li, Mooi Choo Chuah:
SBGAR: Semantics Based Group Activity Recognition. ICCV 2017: 2895-2904 - [c70]Qinghan Xue, Lei Liu, Weipeng Chen, Mooi Choo Chuah:
Automatic Generation and Recommendation for API Mashups. ICMLA 2017: 119-124 - [c69]Xin Li, Qinghan Xue, Mooi Choo Chuah:
CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system. INFOCOM 2017: 1-9 - [c68]Luke Bernick, Alexander Dennis, Mooi Choo Chuah:
LILI Version2: A Low-Cost Robot that Tells Interactive Stories and Recognizes Objects. MASS 2017: 486-491 - [c67]Xiaonan Guo, Bo Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah:
WiFi-Enabled Smart Human Dynamics Monitoring. SenSys 2017: 16:1-16:13 - 2016
- [j23]Dawei Li, Mooi Choo Chuah:
Accurate Image Retrieval with Unsupervised 2-Stage k-NN Re-Ranking. Int. J. Multim. Data Eng. Manag. 7(1): 41-59 (2016) - [c66]Qinghan Xue, Mooi Choo Chuah, Yingying Chen:
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS). AsiaCCS 2016: 841-852 - [c65]Huan Yang, Liang Cheng, Mooi Choo Chuah:
Evaluation of utility-privacy trade-offs of data manipulation techniques for smart metering. CNS 2016: 396-400 - [c64]Dawei Li, Theodoros Salonidis, Nirmit V. Desai, Mooi Choo Chuah:
DeepCham: Collaborative Edge-Mediated Adaptive Deep Learning for Mobile Object Recognition. SEC 2016: 64-76 - [c63]Huan Yang, Liang Cheng, Mooi Choo Chuah:
Detecting Peer-to-Peer Botnets in SCADA Systems. GLOBECOM Workshops 2016: 1-6 - 2015
- [j22]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones. Ad Hoc Sens. Wirel. Networks 27(1-2): 51-73 (2015) - [j21]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems. IEEE Trans. Mob. Comput. 14(9): 1961-1974 (2015) - [c62]Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Critical segment based real-time E-signature for securing mobile transactions. CNS 2015: 7-15 - [c61]Wenbo Li, Longyin Wen, Mooi Choo Chuah, Siwei Lyu:
Category-Blind Human Action Recognition: A Practical Recognition System. ICCV 2015: 4444-4452 - [c60]Dawei Li, Mooi Choo Chuah:
A Novel Unsupervised 2-Stage k-NN Re-Ranking Algorithm for Image Retrieval. ISM 2015: 160-165 - [c59]Anthony Lowhur, Mooi Choo Chuah:
Dense Optical Flow Based Emotion Recognition Classifier. MASS 2015: 573-578 - [c58]Dawei Li, Mooi Choo Chuah:
EMOD: an efficient on-device mobile visual search system. MMSys 2015: 25-36 - [c57]Qinghan Xue, Mooi Choo Chuah:
Cuckoo-Filter Based Privacy-Aware Search over Encrypted Cloud Data. MSN 2015: 60-68 - [c56]Wenbo Li, Longyin Wen, Mooi Choo Chuah, Yi Zhang, Zhen Lei, Stan Z. Li:
Online Visual Tracking Using Temporally Coherent Part Cluster. WACV 2015: 9-16 - [e2]Mooi Choo Chuah, Shaojie Tang, Panlong Yang:
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, MSCC@MobiHoc 2015, Hangzhou, China, June 22, 2015. ACM 2015, ISBN 978-1-4503-3518-8 [contents] - 2014
- [j20]Yan Wang, Mooi Choo Chuah, Yingying Chen:
Incentive Based Data Sharing in Delay Tolerant Mobile Networks. IEEE Trans. Wirel. Commun. 13(1): 370-381 (2014) - [c55]Ying Mao, Jiayin Wang, Bo Sheng, Mooi Choo Chuah:
LAAR: Long-Range Radio Assisted Ad-Hoc Routing in MANETs. ICNP 2014: 350-355 - [c54]Mooi Choo Chuah, Daniel Coombe, Christopher Garman, Cassandra Guerrero, John R. Spletzer:
Lehigh Instrument for Learning Interaction (LILI): An Interactive Robot to Aid Development of Social Skills for Autistic Children. MASS 2014: 731-736 - [c53]Justin Manweiler, Mohammed (Ehsan) Hoque, David Chu, Mooi Choo Chuah:
Panel: future trends and research issues in mobile augmented reality. MARS@MobiSys 2014: 13 - [c52]Dawei Li, Mooi Choo Chuah, Li Tian:
Demo: lehigh explorer augmented campus tour (LACT). MARS@MobiSys 2014: 15-16 - [e1]Mooi Choo Chuah, Pan Hui:
Proceedings of the 2014 Workshop on Mobile Augmented Reality and Robotic Technology-Based Systems, MARS 2014, Bretton Woods, New Hampshire, USA, June 16, 2014. ACM 2014, ISBN 978-1-4503-2823-4 [contents] - 2013
- [j19]Zhengrui Qin, Qun Li, Mooi Choo Chuah:
Defending against Unidentifiable Attacks in Electric Power Grids. IEEE Trans. Parallel Distributed Syst. 24(10): 1961-1971 (2013) - [c51]Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Towards self-healing smart grid via intelligent local controller switching under jamming. CNS 2013: 127-135 - [c50]Dawei Li, Mooi Choo Chuah:
SCOM: A Scalable Content Centric Network Architecture with Mobility Support. MSN 2013: 25-32 - [c49]Z. Qin, Dawei Li, Mooi Choo Chuah:
Lehigh Explorer: A Real Time Video Streaming Application with Mobility Support for Content Centric Networks. MSN 2013: 33-40 - [c48]Dawei Li, Mooi Choo Chuah:
EMOVIS: An Efficient Mobile Visual Search System for Landmark Recognition. MSN 2013: 53-60 - [c47]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Smartphone based user verification leveraging gait recognition for mobile healthcare systems. SECON 2013: 149-157 - 2012
- [j18]Mooi Choo Chuah, Peng Yang, S. Roy, Bo Sheng:
Performance Evaluation of Dissemination Schemes for Coded Packets in Heterogeneous Sparse Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 15(2-4): 151-181 (2012) - [c46]Yan Wang, Mooi Choo Chuah, Yingying Chen:
Incentive driven information sharing in delay tolerant mobile networks. GLOBECOM 2012: 5279-5284 - [c45]Zhengrui Qin, Qun Li, Mooi Choo Chuah:
Unidentifiable Attacks in Electric Power Systems. ICCPS 2012: 193-202 - [c44]Yanzhi Ren, Yingying Chen, Mooi Choo Chuah:
Social closeness based clone attack detection for mobile healthcare system. MASS 2012: 191-199 - [c43]Ying Mao, Bo Sheng, Mooi Choo Chuah:
Scalable Keyword-Based Data Retrievals in Future Content-Centric Networks. MSN 2012: 116-123 - 2011
- [c42]Gregory Fedynyshyn, Mooi Choo Chuah, Gang Tan:
Detection and Classification of Different Botnet C&C Channels. ATC 2011: 228-242 - [c41]Mooi Choo Chuah, Xiong Xiong:
Secure Content Centric Mobile Network. GLOBECOM 2011: 1-6 - [c40]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching. GLOBECOM 2011: 1-6 - [c39]Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen:
Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare. MASS 2011: 646-651 - [c38]Mooi Choo Chuah, B. Herbst, D. Li:
Gateway-based interdomain routing scheme for intentional named message delivery in Disruption Tolerant Networks. MILCOM 2011: 1934-1939 - 2010
- [j17]Jie Yang, Yanzhi Ren, Yingying Chen, Mooi Choo Chuah:
A social community based approach for reducing the propagation of infectious diseases in healthcare. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 7-9 (2010) - [j16]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting wormhole attacks in delay-tolerant networks. IEEE Wirel. Commun. 17(5): 36-42 (2010) - [c37]Mooi Choo Chuah, Peng Yang, Pan Hui:
Cooperative User Centric Information Dissemination in Human Content-Based Networks. ICPADS 2010: 794-799 - [c36]Mooi Choo Chuah, Wei Chen:
Cooperative Multichannel MAC (COMMAC) for Cognitive Radio Networks. VTC Fall 2010: 1-5 - [c35]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. WCNC 2010: 1-6 - [c34]Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen:
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j15]Peng Yang, Mooi Choo Chuah:
Performance evaluations of data-centric information retrieval schemes for DTNs. Comput. Networks 53(4): 541-555 (2009) - [j14]Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison:
Performance comparison of different multicast routing strategies in disruption tolerant networks. Comput. Commun. 32(16): 1731-1741 (2009) - [j13]Yong Xi, Mooi Choo Chuah:
An encounter-based multicast scheme for disruption tolerant networks. Comput. Commun. 32(16): 1742-1756 (2009) - [j12]Mooi Choo Chuah, Peng Yang:
Context-aware multicast routing scheme for Disruption Tolerant Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 269-281 (2009) - [c33]Mooi Choo Chuah, Alexandra Coman:
Identifying Connectors and Communities: Understanding Their Impacts on the Performance of a DTN Publish/Subscribe System. CSE (4) 2009: 1093-1098 - [c32]Mooi Choo Chuah, Peng Yang:
Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme. ICCCN 2009: 1-6 - [c31]Mooi Choo Chuah, Peng Yang, Yong Xi:
How Mobility Models Affect the Design of Network Coding Schemes for Disruption Tolerant Networks. ICDCS Workshops 2009: 172-177 - 2008
- [j11]Mooi Choo Chuah, Peng Yang:
Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks. Int. J. Ad Hoc Ubiquitous Comput. 3(3): 174-184 (2008) - [j10]Walter J. Scheirer, Mooi Choo Chuah:
Syntax vs. semantics: competing approaches to dynamic network intrusion detection. Int. J. Secur. Networks 3(1): 24-35 (2008) - [c30]Yong Xi, Mooi Choo Chuah:
Performance evaluation of an encountered based multicast scheme for disruption tolerant networks. MASS 2008: 353-358 - [c29]Ryan Metzger, Mooi Choo Chuah:
Opportunistic information distribution in challenged networks. Challenged Networks 2008: 97-104 - [c28]Peng Yang, Mooi Choo Chuah:
Efficient Interdomain Multicast Delivery in Disruption Tolerant Networks. MSN 2008: 81-88 - 2007
- [j9]Mooi Choo Chuah, Wenbin Ma:
Integrated Buffer and Route Management in a DTN with Message Ferry. J. Inf. Sci. Eng. 23(4): 1123-1139 (2007) - [j8]Yong Xi, Mooi Choo Chuah, Kirk Chang:
Performance Evaluation of a Power Management Scheme for Disruption Tolerant Network. Mob. Networks Appl. 12(5-6): 370-380 (2007) - [c27]Mooi Choo Chuah, Peng Yang:
Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes. CCNC 2007: 227-233 - [c26]Mooi Choo Chuah, Fen Fu:
ECG Anomaly Detection via Time Series Analysis. ISPA Workshops 2007: 123-135 - [c25]Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison:
SHIM: a scalable hierarchical inter-domain multicast approach for disruption tolerant networks. IWCMC 2007: 170-175 - [c24]Mooi Choo Chuah, Peng Yang, Jianbin Han:
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. MobiQuitous 2007: 1-8 - [c23]Yong Xi, Mooi Choo Chuah, Kirk Chang:
Performance evaluation of a power management scheme for disruption tolerant network. QSHINE 2007: 28 - 2006
- [j7]Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 3(2): 141-155 (2006) - [c22]Walter J. Scheirer, Mooi Choo Chuah:
The Strength of Syntax Based Approaches to Dynamic Network Intrusion Detection. CISS 2006: 1473-1478 - [c21]Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah, William M. Pottenger:
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. ICDM 2006: 874-879 - [c20]Walter J. Scheirer, Mooi Choo Chuah:
Network intrusion detection with semantics-aware capability. IPDPS 2006 - [c19]Mooi Choo Chuah, Kun Huang:
Detecting Selective Dropping Attacks in BGP. LCN 2006: 959-966 - [c18]Mooi Choo Chuah, Fen Fu:
Performance Study of Robust Data Transfer Protocol for VANETs. MSN 2006: 377-391 - [c17]Peng Yang, Mooi Choo Chuah:
Context-aware multicast routing scheme for disruption tolerant networks. PE-WASUN 2006: 66-73 - [c16]Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison:
OS-multicast: On-demand Situation-aware Multicasting in Disruption Tolerant Networks. VTC Spring 2006: 96-100 - [c15]Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng:
Store-and-Forward Performance in a DTN. VTC Spring 2006: 187-191 - [c14]Mooi Choo Chuah, Vinay Goel, Brian D. Davison:
Performance evaluation of mobility management scheme in DTN. WCNC 2006: 539-544 - 2005
- [c13]Mooi Choo Chuah, Liang Cheng, Brian D. Davison:
Enhanced disruption and fault tolerant network architecture for bundle delivery (EDIFY). GLOBECOM 2005: 6 - [c12]Doru Calin, Santosh Paul Abraham, Mooi Choo Chuah:
Performance of UMTS code sharing algorithms in the presence of mixed Web, email and FTP traffic. PIMRC 2005: 1672-1677 - [c11]Wenbin Ma, Mooi Choo Chuah:
Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks. WOWMOM 2005: 368-373 - [c10]Ramesh Viswanathan, Jing (Tiffany) Li, Mooi Choo Chuah:
Message Ferrying for Constrained Scenarios. WOWMOM 2005: 487-489 - 2004
- [j6]Prathima Agrawal, Mooi Choo Chuah, Jens Zander:
Guest Editorial: Multimedia multicast/broadcast services in 3G/4G networks. IEEE Commun. Mag. 42(2): 62-63 (2004) - [c9]Mooi Choo Chuah, Wing Cheong Lau, Yoohwan Kim, H. Jonathan Chao:
Transient performance of PacketScore for blocking DDoS attacks. ICC 2004: 1892-1896 - [c8]Mooi Choo Chuah, Teck Hu, Wei Luo:
UMTS Release 99/4 airlink enhancement for supporting MBMS services. ICC 2004: 3231-3235 - [c7]Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks. INFOCOM 2004: 2594-2604 - 2003
- [c6]Cem Uygur Saraydar, Santosh Paul Abraham, Mooi Choo Chuah, Ashwin Sampath:
Impact of rate control on the capacity of an Iub link: single service case. ICC 2003: 954-958 - [c5]Cem U. Saraydar, Santosh Paul Abraham, Mooi Choo Chuah:
Impact of rate control on the capacity of an Iub link: multiple service case. WCNC 2003: 1418-1423 - 2002
- [j5]Mooi Choo Chuah, Kamesh Medepalli, Se-Yong Park, Jiansong Wang:
Quality of service in third-generation IP-based radio access networks. Bell Labs Tech. J. 7(2): 67-89 (2002) - [c4]Mooi Choo Chuah, Wei Luo, Xiaowei Zhang:
Impacts of inactivity timer values on UMTS system capacity. WCNC 2002: 897-903 - 2000
- [c3]Enrique J. Hernandez-Valencia, Mooi Choo Chuah:
Transport delays for UMTS VoIP. WCNC 2000: 1552-1556
1990 – 1999
- 1999
- [j4]Mooi Choo Chuah, Enrique J. Hernandez-Valencia:
Mobile virtual private dial-up services. Bell Labs Tech. J. 4(3): 51-72 (1999) - [c2]Mooi Choo Chuah, Qinqing Zhang, On-Ching Yue:
Access priority schemes in UMTS MAC. WCNC 1999: 781-786 - 1997
- [j3]Mooi Choo Chuah, Bharat T. Doshi, Subrahmanyam Dravida, Richard P. Ejzak, Sanjiv Nanda:
Link Layer Retransmission Schemes for Circuit-Mode Sata Over the CDMA Physical Channel. Mob. Networks Appl. 2(2): 195-211 (1997) - 1994
- [j2]Wing Shing Wong, Mooi Choo Chuah:
A Hybrid Approach to Address Normalization. IEEE Expert 9(6): 38-45 (1994) - [j1]Mooi Choo Chuah:
Analysis of networks of queues via projection techniques. IEEE Trans. Autom. Control. 39(8): 1588-1599 (1994) - 1990
- [c1]Mooi Choo Chuah, Rene L. Cruz:
Approximate Analysis of Average Performance of (sigma, rho) Regulators. INFOCOM 1990: 874-880
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint