Conference Papers

  • Kadamgode, S., Shi, W., Corriveau, J. –P., Cyberbullying Detection using Ensemble Method. Proceedings of the 3rd International Conference on Data Science and Machine Learning (DSML 2022). pp. to appear. September 17~18, 2022, Copenhagen, Denmark.

  • Zhang, D., Shi, W., St-Hilaire, M. and Yang, R., A Blockchain-Based Distributed Pruning Deep Compression Approach for Cooperative Positioning in Internet of Vehicles. Proceedings of the 2022 International Wireless Communications and Mobile Computing Conference (IWCMC 2022). pp. to appear. May 30 – June 3, 2022, Dubrovnik, Croatia.

  • Iliaee, N., Liu, S., E., Shi, W., Non-Intrusive Load Monitoring based Demand Prediction for Smart Meter Attack Detection. Proceedings of the 10th International Conference on Control, Automation and Information Science (ICCAIS 2021). pp. 370-374. October 2021. Xi’an, China.

  • V. Kataramanachary, H., Reveron, E., Shi, W., Storage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as Files. Proceedings of the 11th International Conference on Communication Systems & Networks (COMSNETS 2020). pp. 535-538. Jan 7-11, 2020. Bengaluru, India. (pdf)(BibTex)

  • Tang, K., Liao, S., Bhuiyan, A., Shi, W., Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks. Proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019), [Best Paper Award]. pp. 3-17. Nov. 12 – 15, 2019. Guangzhou, China. (pdf)(BibTex)

  • Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., Bhuiyan, M., Multi-Miner’s Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. Proceedings of the 2019 IEEE International Conference on Cyber Physical and Social Computing (CPSCom-2019), pp. 687-693. July 14-17, 2019. Atlanta, USA. (pdf)(BibTex)

  • Yu, K., Shi, W., Santoro, N., Ma, X., Real-time Outlier Detection over Streaming Data. Proceedings of the IEEE Smart World Congress (SWC 2019), August 19-23, 2019. pp. 125-132. Leicester, UK. (pdf)(BibTex)

  • Croft, W.L., Sack, J., Shi, W.. Differentially Private Obfuscation of Facial Images. Proceedings of the International IFIP Cross Domain Conference for Machine Learning & Knowledge Extraction (CD-MAKE 2019). pp. 229-249. Canterbury, UK. (pdf)(BibTex)

  • Elhabyan, R., Shi, W. and St-Hilaire, M., “A Full Area Coverage Guaranteed Energy Efficient Network Configuration Strategy for 3D Wireless Sensor Networks”, 31st Annual IEEE Canadian Conference on Electrical & Computer Engineering (CCECE 2018), pp. 1-6, Quebec city, QC, Canada, May 2018. [IEEE Women in Engineering (WIE) Best Paper Award]. (pdf)

  • Elhabyan, R., Shi, W., St-Hilaire, M.: An Obstacle-aware Clustering Protocol for Wireless Sensor Networks with Irregular Terrain. The 16th International Conference on Wired/Wireless Internet Communications (IFIP WWIC 2018). pp. 54-66. June 18 – 20, 2018, Boston, USA. (pdf)(BibTex)

  • Elhabyan, R. and Shi, W. and St-Hilaire, M.: Evolutionary-based Coverage Control Mechanism for Clustered Wireless Sensor Networks. The 16th International Conference on Wired/Wireless Internet Communications (IFIP WWIC 2018), pp. 67-80. June 18 – 20, 2018, Boston, USA.(pdf)(BibTex)

  • Peng, M., Shi, W., Corriveau, J. –P., Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens. IEEE Conference on Communications and Network Security (CNS 2018), pp. 1-9. May 30-June 1, 2018. Beijing, China. (pdf)(BibTex)

  • Zeng, L., Shi, W., Ni, F., Song, J., Xu, C., Wang, Y., SHAstor: A Scalable HDFS-based Storage Framework for Small-Write Efficiency in PervasiveComputing. Proceedings of the IEEE Cloud and Bigdata Computing (CBDCom 2018), [Best Paper Award]. pp. 1140-1145. October 8–11, 2018. Guangzhou, P.R.China.(pdf)(BibTex)

  •  Corriveau, J. –P., Elhabyan, R., Lu, D., and Shi, W., MCSA: A Multi-Criteria Shuffling Algorithm for the Mapreduce Framework. Proceedings of the IEEE Cloud and Bigdata Computing (CBDCom 2017), pp. 1-6. Aug 4–8, 2017 | St. Francisco, USA. (pdf)(BibTex)

  • Shi, W., Corriveau, J. –P. and Peng, M., Faulty Node Repair and Dynamically Spawned Black Hole Search. Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), pp. 144-162. October 10–12, 2016. Guangzhou, People’s Republic of China. (pdf)(BibTex)

  • Wylie, A., Shi, W., Corriveau, J.-P., Wang, W., A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS) – ParLearning, pp. 1433-1442. May 23-27, 2016. Chicago, USA. (pdf)(BibTex)

  • Wang, Y. and Shi, W., On Performance Resilient Scheduling for Scientific Workflows in HPC Systems with Constrained Storage Resources. Proceedings of the 6th ACM Workshop on Scientific Cloud Computing (ScienceCloud ’15), June 16, 2015, Portland, OR, USA, pp. 17-24. (pdf)(BibTex)

  • Shi, W., Wang, Y., Niu, B., Croft, W.L. and Peng, M. Smart Shuffling in MapReduce: a solution to Balance Network Traffic and Workloads. Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2015), December 07-10, 2015, Limassol, Cyprus, pp. 35-44. (pdf)(BibTex)

  • Mesa-Barrameda E., Santoro N., Shi, W. and Taleb, N., Sensor Deployment by a Robot in an Unknown Orthogonal Region: Achieving Full Coverage. Accepted, IEEE International Workshop on Parallel and Distributed Computing in Geoinformation and Remote Sensing (PDGRS-ICPADS’14).( Acceptance rate 18.6%). (pdf)(BibTex)

  • Shelley, M., Shi, W. and Corriveau, J.-P.: Use Case Map Traversal against Sequence Breaking, IEEE 2014 International Conference on Progress in Informatics and Computing, May 16-18, 2014, Shanghai, China, PP. 359-367. (pdf)(BibTex)

  • Corriveau, J.-P., Shi, W. and Radonjic, V.: Requirements Verification (Legal Challenges in Compliance Testing), IEEE 2014 International Conference on Progress in Informatics and Computing, May 16-18, 2014, Shanghai, China, PP. 451-454. (pdf)(BibTex)

  • Wang, Y., and Shi, W., On Optimal Parallel Scheduling Algorithms with Budget&Deadline Constraints for Fork&Join Workflows in Clouds. ICON (2013). pp. 245-252. Jan, 2013.

  • Y. Wang, and W. Shi, On Scheduling Algorithms for MapReduce Jobs in the Heterogeneous Cloud. The 17th International Conference on Principles of Distributed Systems (OPODIS ’13), pp 251-265. (one of the 18 accepted papers)(pdf)(BibTex)

  • Wang, Yang, and Wei Shi. On service migration in the cloud to facilitate mobile accesses. In Cluster Computing (CLUSTER), 2013 IEEE International Conference on, pp. 1-5. IEEE, 2013. (pdf)(BibTex)

  • Shelley, M., Shi, W. and Corriveau, J.-P., On Preventing Sequence Breaking in Video Games. The 12th Annual Workshop on Network and Systems Support for Games (NetGames ’13), December 2013, pp. 1-2. Denver, Colorado,  (pdf)(BibTex)

  • Zeng, L., Wang, Y., Shi, W. and Feng, D., Optimizing Xen Credit Scheduler for I/O Latency-Sensitive Applications on Multicores, 2013 In-ternational Conference on Cloud Computing and Big Data (IEEE Cloud-ComAsia ’13), Fuzhou, China, December, PP. 264-273. (pdf)(BibTex)

  • Shi, W. and Wang, Y., Adaptive Search-based Service Migrations with Virtual Moves in Clouds for Mobile Accesses, The 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC ’13), Dresden, Germany, Dec 9-12, 2013, pp. 195-202. (pdf)(BibTex)

  • Hu, M. and Wang, Y. and Shi, W., Scheduling Soft Aperiodic Messages on FlexRay in-Vehicle Networks. The 19th IEEE International Conference on Networks (ICON ’13), Singapore, December, pp: 1-6. (pdf)(BibTex)

  • Bashardoust, S., Corriveau, J.-P. and Shi, W., A Template-Based Approach to Modeling Variability, Software Engineering Research and Practice (SERP), Las Vegas, Nevada, July 2013, pp.336-342. (pdf)(BibTex)

  • Corriveau, J.-P. and Shi, W., On Acceptance Testing, Software Engineering Research and Practice (SERP), Las Vegas, Nevada, July,2013, pp.218-224. (pdf)

  • Agar, J., Corriveau, J.-P. and Shi. W., Play Patterns for Path Prediction in Multiplayer Online Games. The 7th International Conference on Communications and Networking (ChinaCOM 2012), Kunming, China, August 2012, pp.12-17. (pdf)(BibTex)

  • Shi, W., Yao, M. and Corriveau, J.-P. Resilient Secure Localization and Detection of Colluding Attackers. International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW 2012), Belgrade, Serbia, July 2012, pp. 181-192. (pdf)(BibTex)

  • Corriveau, J.-P. and Shi, W., Generating Verifiable Test Scenarios, (SERP 2011), Las Vegas, USA, July 2011, pp. 315-321. (pdf)

  • Shi, W. and Corriveau, J. -P., A Comprehensive Review of Sensor Relocation. In Proceedings of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing (GREENCOM-CPSCOM ’10). IEEE Computer Society, Hangzhou, China, December 2010, pp. 780-785. (pdf)(BibTex)

  • Arnold, D., Corriveau, J.-P. and Shi, W., Validation against Actual Behavior: Still a Challenge for Testing Tools (SERP 2010), Las Vegas, USA, July 2010, pp. 212-218. (BibTex)

  • Arnold, D., Corriveau, J.-P. and Shi, W., Reconciling Offshore Outsourcing with Model-Based Testing. (SEAFOOD 2010), Saint Petersburg, Russia, June 2010, pp. 6-22. (pdf)(BibTex)

  • Shi, W., Barbeau, M. and Corriveau, J.-P., Detection of the Evil Ring Attack in Wireless Sensor Networks Using Cross Verification. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montreal, Canada, June 2010, pp.1-6. (pdf)(BibTex)

  • Arnold, D., Corriveau, J.-P. and Shi, W., Modeling and Validating Requirements using Executable Contracts and Scenarios. Software Engineering Research, Management and Applications (SERA 2010), Montreal, Canada, May 2010, pp. 311-320. (pdf)(BibTex)

  • Corriveau, J.-P. and Shi, W., Teaching Strategies to Millenial Students. In Proceedings of the International Academic Conference on the Future of Game Design and Technology (Futureplay ’10). ACM, New York, NY, USA, May 2010, pp. 143-150. (pdf)(BibTex)

  • Arnold, D., Corriveau, J.-P. and Shi, W., Scenario Based-Validation: Beyond the User Requirements Notation. The 21st Australian Software Engineering Conference, Auckland, New Zealand, April 2010, pp. 75-84. (pdf)(BibTex)

  • Shi, W., Lee, G., Hinchley, J., Corriveau, J.-P., Kapralos B. and Hogue, A., Using a Virtual Learning Environment with Highly Interactive Elements in Second Life to Engage Millennial Students. The 2010 International Conference on e-Education, e-Business, e-Management and e-Leaning (IC4E 2010), pp. 255-259. (pdf)(BibTex)

  • W. Shi, Black Hole Search with Tokens in Interconnected Networks. The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), pp. 670-682. (pdf)(BibTex)

  • S. Dobrev, N. Santoro and W. Shi, Scattered Black Hole Search in an Oriented Ring with Tokens. IEEE International Parallel and Distributed Processing Symposium, (IPDPS-APDCM 2007), Long Beach, California, March, 2007, pp. 1-8. (pdf)(BibTex)

  • S. Dobrev, N. Santoro and W. Shi, Locating a Black Hole in a Ring Using Tokens: The Case of Dispersed Agents. The 13th International Euro-Par Conference European Conference on Parallel and Distributed Computing (Euro-Par 2007), Rennes, France, August 2007, pp. 608-617. (pdf)(BibTex)

  • S. Dobrev, R. Kralovic, N. Santoro and W. Shi, Black hole search in asynchronous rings using tokens. The 6th Conference on Algorithms and Complexity (CIAC~’06), Rome, Italy, May, 2006, pp. 139-150. (pdf)(BibTex)

  • W. Shi and J.-P. Corriveau, System Family Engineering in Leader Election in the Ring Topology. International Association of Science and Technology for Development (IASTED 2004), Innsbruck, February, 2004, pp. 398-403. (BibTex)

  • W. Shi and J.-P. Corriveau, An Executable Model for a Family of Election Algorithms. International Parallel and Distributed Processing Symposium (IPDPS 2004), Santa Fe, New Mexico, April, 2004, pp. 178-186. (pdf)(BibTex)