{"id":421,"date":"2019-07-21T19:00:15","date_gmt":"2019-07-21T23:00:15","guid":{"rendered":"http:\/\/www.csit.carleton.ca\/wshi\/?page_id=421"},"modified":"2019-07-21T19:00:15","modified_gmt":"2019-07-21T23:00:15","slug":"technical-reports","status":"publish","type":"page","link":"https:\/\/www.csit.carleton.ca\/wshi\/?page_id=421","title":{"rendered":"Technical Reports"},"content":{"rendered":"<ul>\n<li>Shi, W., Wang, Y. On Optimal Budget-Driven Scheduling Algorithms for MapReduce Jobs in the Heterogeneous Cloud. School of\u00a0Computer Science, Carleton University, Technical Report TR-13-02, Ottawa, July, 2013.(<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=190\" target=\"_blank\">pdf<\/a>)(<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=271\" target=\"_blank\">BibTex<\/a>)<\/li>\n<li>Shi, W. and Barbeau, M. and J.-P. Corriveau, Cross Verification-based Detection of the Evil Ring Attack in Wireless Sensor Networks. School of Computer Science, Carleton University, Technical Report TR-10-08, Ottawa, April, 2010. (<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=222\" target=\"_blank\">pdf<\/a>)(<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=270\" target=\"_blank\">BibTex<\/a>)<\/li>\n<li>W. Shi, Q. Deng, B. Liang, Parallel ROLAP Data Cubes Performance Comparison and Analysis. School of Computer Science, Carleton University, Technical Report TR-07-02, Ottawa, January, 2007.(<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=223\" target=\"_blank\">pdf<\/a>)(<a href=\"http:\/\/localhost\/wordpress\/?attachment_id=269\" target=\"_blank\">BibTex<\/a>)<\/li>\n<li>Dobrev, S., Kralovic, R., Santoro N. and Shi, W., Black hole search in asynchronous rings using tokens.School of Computer Science, Carleton University, Technical Report TR-06, Ottawa, April, 2006.<\/li>\n<li>W. Shi, User guide for &#8220;Information Management System for the Chinese Civil Administration Ministry&#8221;, Founder Order Computer Systems Ltd, Beijing, 2001.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Shi, W., Wang, Y. On Optimal Budget-Driven Scheduling Algorithms for MapReduce Jobs in the Heterogeneous Cloud. School of\u00a0Computer Science, Carleton University, Technical Report TR-13-02, Ottawa, July, 2013.(pdf)(BibTex) Shi, W. and Barbeau, M. and J.-P. Corriveau, Cross Verification-based Detection of the Evil Ring Attack in Wireless Sensor Networks. School of Computer Science, Carleton University, Technical Report<\/p>\n<p><a href=\"https:\/\/www.csit.carleton.ca\/wshi\/?page_id=421\" class=\"more-link themebutton\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/pages\/421"}],"collection":[{"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=421"}],"version-history":[{"count":1,"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/pages\/421\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=\/wp\/v2\/pages\/421\/revisions\/422"}],"wp:attachment":[{"href":"https:\/\/www.csit.carleton.ca\/wshi\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}