James Yu Publications

Book Chapter

James Yu, “Scheduling and Performance Analysis of QoS for IEEE 802.16 Broadband Wireless Access Networks,” A chapter in WiMAX Handbook, to be published by Taylor & Francis Group, LLC (2007)

Refereed Journal Articles

  1. Imad Al Ajarmeh, James Yu and Mohamed Amezziane, "Modeling VoIP Traffic on Converged IP Networks with Dynamic Resource Allocation", INTERNATIONAL JOURNAL of COMMUNICATIONS, ISSN: 1998-4480, Issue 1, Volume 4, 2010, page 47-55
    http://www.naun.org/journals/communications/19-445.pdf

  2. James Yu and Imad Al-Ajarmeh "Design and Traffic Engineering of VoIP for Enterprise and Carrier Networks," International Journals on Advances in Telecommunicaitons, vol 1, no 1, 2009. http://www.iariajournals.org/telecommunications/tocv1n1.html
  3. Chibiao Liu and James Yu, “A Solution to WLAN Authentication and Association DoS Attacks,” IAENG International Journal of Computer Science, accepted for publication in 2007,

  4. Chibiao Liu, and James Yu, "Review and Analysis of Wireless LAN Security Attacks and Solutions," Journal of International Engineering Consortium, Volume-59, 2006, ISBN: 978-1-931695-53-4, pp. 539-554.

  5. R. T. Sheldon, J. T. Yu, et. al. “Reliability Measurement: from Theory to Practice,” IEEE Software, (July 1992), pp. 13-20.

  6. J. T. Yu, “Improving Productivity and Quality with Awk,”  IEEE Software, (March 1990), pp. 94-95.

  7. J. T. Yu, H. E. Dunsmore, and V. Y. Shen, “An Analysis of Several Software Defect Models,” IEEE, Transactions on Software Engineering, SE-14, 9 (September 1988) pp. 1261-1279.

  8. J. T. Yu, et. al. “SMDC: An Interactive Software Metrics Data Collection System,” The Journals of Systems and Software, 8,  (1988) pp. 39-46.

  9. V. Y. Shen, S. Thebaut, J. T. Yu, and L. Paulsen, “Identifying Error-Prone Software: An Empirical Study,” (with Shen, Thebaut, and Paulsen) IEEE Transactions on Software Engineering, SE-11, 4 (April 1985) pp. 317-324.


Refereed Conference Proceedings

  1. James Yu, "Detection of Wireless Rogue Access Points (AP) Attacks," Pan Africa Conference on Science, Computing, and Telecommunications (PACT'13), Lusaka, Zambia, July 2013

  2. Imad Al Ajarmeh, James Yu, Mohamed Amezziane, "G/G/c/c Simulation Model for VoIP Traffic Engineering with non-Parametric Validation," 8th International Conference on Digital Telecommunications (ICDT), Venice, Italy, April 2013 (Best Paper Award)

  3. Khalid Elbadawi, Yongning Tang, and James Yu, "Towards an Efficient Verification on Network Configuration," 8th International Conferences on Network and Service Management, " Las Vegas, USA, October 2012.

  4. Imad Al Ajarmeh, James Yu and Mohamed Amezziane, "Modeling Call Arrivals on VoIP Networks as Linear Gaussian Process under Heavy Traffic Condition," IEEE International Conference on Networks, Singapore, December 2011 (PDF)

  5. Imad Al Ajarmeh, James Yu, and Mohamed Amezziane, "Framework for Modeling Call Holding Time for VoIP Tandem Networks," IEEE Globecom 2011, Houston, Texas, December 2011.

  6. Khalid Elmansoe and James Yu, "Improving Network Services Configuration Management," International Conference on Computer Communication Networks (ICCCN 2011), Maui, Hawaii, July 2011

  7. Khalid Elmansor and James Yu, "High Level Abstraction Modeling for Network Configuration Verification," IEEE Globecom 2010, Miami, FL, December 2010

  8.  Imad Al Ajarmeh, James Yu and Mohamed Amezziane, "Framework of Applying a Non-Homogeneous Poisson Process to Model VoIP Traffic on Tandem Networks", Proceedings of 10th WSEAS International Conference on Informatics and Communications, pp. 164-169, Taipei, Taiwan, August 2010. http://portal.acm.org/citation.cfm?id=1863926

  9. Chibiao Liu, James Yu, and Greg Brewster, "Empirical Studies and Queuing Modeling of Denial of Service Attacks against 802.11 WLANs," IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, Canada, June 2010. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5534920&tag=1

  10. James Yu and Imad Al Ajarmeh, "An Empirical Study of the NETCONF Protocol", The Sixth International Conference on Networking and Services (ICNS 2010), Cancun, Mexico, March 2010  ISBN: 978-0-7695-3969-0, http://www.computer.org/portal/web/csdl/doi/10.1109/ICNS.2010.41

  11. Khalid Elmansor and James Yu, “A Cost-Effective Measurement Tool for Assessing High Availability Network Solutions,”  International Conference on High Performance Computing, Networking and Communication Systems (HPCNCS-09),  ISRST, Florida, July 2009, pp. 147-154.

  12. James Yu and Imad Al-Ajarmeh, "Case Study of Botnet Attacks against Linux Systems," 42th Midwest Instruction and Computing Symposium (MICS), Rapid City, South Dakota, April 2009.

  13. Imad Al-Ajarmeh, Kaled El-Zayyat, and James Yu, "A Hybrid Routing Protocol for Mobile Ad Hoc and Wireless Sensor Networks," 4th IEEE International Conference on Wireless Communications, Networking, and Mobile Computing," Dalain, China, October 2008.

  14. Chibiao Liu and James Yu, "Rogue Access Point based Denial of Service (DoS) Attacks against 802.11 WLANs," 4th Advanced International Conference on Telecommunications (AICT), Athens, Greece, June 2008.

  15. James Yu, "A Policy-Based Scheduling Tool for Network Labs," 41th Midwest Instruction and Computing Symposium (MICS), La Cross, Wisconsin, April 2008, pp. 352-363.

  16. James Yu, “An Innovative Lab Environment for Supporting Hands-on Networking Exercises to Distance Learning Students,” Proceedings of the IASED International Conferences on Internet Multimedia Services and Applications (IMSA),  pp. 13-17 Honolulu, August 2007.  http://portal.acm.org/citation.cfm?id=1659853

  17. James Yu and Imad Al-Ajarmeh, “Call Admission Control and Traffic Engineering of VoIP,” 2nd International Conference on Digital Telecommunications, San Jose, CA, July 2007 (Best Paper Award) ISBN: 0-7695-2910-0  http://www.computer.org/portal/web/csdl/doi/10.1109/ICDT.2007.44

  18. Chibiao Liu and James Yu, “A Solution to WLAN Authentication and Association DoS Attacks,” 2nd Jordan International Conference on Computer Science and Engineering, Al-Salt, Jordan, December 2006,

  19. Chibiao Liu and James Yu, " Protecting Enterprise Wireless LANs Using an Integrated  Security Approach of VPN over 802.11i,”  3rd International Conference on Cyber Information Technology and System Applications (CITSA), Orlando Florida, July 2006

  20. Chibiao Liu and J. T. Yu, “An Analysis of DoS Attacks on Wireless LAN,” IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET2006), Banff Canada (July 2006)

  21. J. T. Yu and Chibiao Liu, "Performance Analysis of Mobile VPN Architecture," 4th Annual Conference on Telecommunications, and Information Technology, Las Vegas, (March 2006)

  22. J. T. Yu and Chibiao Liu, "Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LAN," Advanced International Conference on Telecommunications, Guadeloupe, (February 2006)

  23. J. T. Yu, “Applying 802.1w to Developing High Availability Linux Server,”, 11th International Conference on Information Systems Analysis and Synthesis (ISAS 2005), July 2005, Orlando, FL.

  24. J. T. Yu,Applying SoftEther for Networking Education,” 38th Midwest Instruction and Computing Symposium,” Eau Claire, Wisconsin, (April 2005)

  25. J. T. Yu, “Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC),”  The 16th International Conferences on Wireless Communications, Calgary, Canada (July 2004)

  26. J. T. Yu, “Performance Evaluation on Linux Bridge,” Telecommunications System Management Conference 2004, Louisville, Kentucky  (April 2004)

  27.  J. T. Yu, “Applying IEEE 802.1w to Improve Service Availability,”  IEEE 2003 International Conference on Dependable Systems and Network (DSN 2003), (June 2003), pp. 88-89.

  28.  J. T. Yu, “Developing an Enterprise-Wide Executive Information System,” Best Paper Award at International Symposium on Applied Corporate Computing (ISACC'95), (October 1995), Monterrey, Mexico. pp. 183-190.

  29. J. W. Johnson, J. T. Yu, et. al. “Process Quality Management and Improvement on a Large Software Development Project,”  Telecom'91. (October 1991).

  30. J. T. Yu, “Software Density Metrics: Assumptions, Applications, and Limitations,” Proceedings of 7th Pacific Northwest Software Quality Conference, (September 1989), pp. 289-299.

  31.  J. T. Yu, “Software Quality Assurance Plan for the International 5ESS Switch,” International Telecommunications Symposium, Taipei, Taiwan, ROC (September 1987), pp. 83-89.

  32.  J. T. Yu and M. J. DiMario, “Software Fault Models: An Approach with Static and Dynamic Analysis,”  (with M. J. DiMario), National Communications Forum87, Chicago (September 1987), pp. 1174-1178.

  33.  J. T. Yu, “Software Measurements: Do We Understand What We Are Measuring?” Proceedings of IEEE Global  Telecommunications Conference (December 1986) pp. 1442-1447.


Conference Tutorials:

  1. Wireless Security, 2nd Jordan International Conference on Computer Science and Engineering, Al-Slat, Jordan, December 2006

  2. Wireless Security,  Tutorial at TelecomNext, Las Vegas,, March 2006

  3. Wireless Security – Standards, Current Practices, and technology Trend. Tutorial at EntNet@Supercomm 2005, Chicago, June, 2005

  4. Wireless LAN – Technologies, Business Cases, and Challenges, Network Tutorial at EntNet@Supercomm 2004, Chicago, June 23, 2004

Magazines:

  1. James Yu, Khalid Elmansor, Imad Ajarmeh, and  Carl Morgen,, "NETCONF: A new approach to network management." CompactPCI and AdvancedTCA Systems, Vol 13 (6), December 2009. http://www.compactpci-systems.com/articles/id/?4359

 Invited Talks

  1. “Supporting 247 Networking Labs with Hands-on Exercises,”  Faulty Teaching and Learning Conference, DePaul University, April 13, 2007

  2. "Remote Networking Labs for Hands-on Exercises," Teaching and Technology Conference, DePaul University, April 7, 2006

  3. WiMAX – A Killer Technology or another Hype, Communications Society, Chicago Chapter, November  2005

  4. Wireless LAN – Technologies and Challenges, IEEE Communications Society, Chicago Chapter, January 12, 2004

  5. Emerging Data Networks: from Kbps to Gbps Invited Talk at Inter-University Congress on Electrical and Computer Engineering (CIECE'98,) (March 1998), Durango, Mexico.

  6. Building Web-Based Information Systems on High Speed Network. Invited Talk at 4th International Congress of Research on Computer Sciences (CIICC'97,) (October 1997), Durango, Mexico.

  7. Client/Server Technologies for On-line Information Delivery.  Tutorials at International Symposium on Applied Corporate Computing (ISACC'96), (October 1996), Monterrey, Mexico