Publications


Selected Papers in Refereed Journals

  • [J13] Croft, W. L., Shi, W., Sack, J. -R. and Corriveau, J.-P., Comparison of Approaches of Geographic Partitioning for Data Anonymization. Journal of Geographical Systems. In press.(BibTex)
  • [J12] W. L. Croft, W. Shi, J. -R. Sack, and J.-P. Corriveau, Geographic Partitioning Techniques for the Anonymization of Health Care Data. International Journal of Geographical Information Science. April 2016. doi: http://www.tandfonline.com/doi/pdf/10.1080/13658816.2016.1172314. (pdf)(BibTex)
  • [J11] M., Peng, W. Shi, J.-P. Corriveau, R. Pazzi and Y. Wang, Black Hole Search in Computer Networks: State-of-the-Art, Challenges and Future Directions. Elsevier's Journal of Parallel and Distributed Computing , Vol 88, pp.1-15. February 2016. (in progress).(pdf) (Link) (BibTex)
  • [J10] Y. Wang, W. Shi, On Optimal Scheduling Algorithms for Well-Structured Workflows in the Cloud with Budget and Deadline Constraints. Parallel Processing Letters, accepted, May 2015. (pdf) (BibTex)
  • [J9] Y. Wang, W. Shi, M. Hu, Virtual Services Co-Migration for Mobile Accesses: Online vs. Offline. IEEE Transactions on Mobile Computing, Volume:PP, Issue: 99 , 2015. doi:10.1109/TMC.2015.2404791.015. (pdf) (BibTex)
  • [J8] Y. Wang, W. Shi, Dataflow-based Scheduling for Scientific Workflows in HPC with Storage Constraints. The Computer Journal (2014) doi: 10.1093/comjnl/bxu109. (5-Yr impact factor: 1.024). (pdf)(BibTex)
  • [J7] Wei Shi, Jean-Pierre Corriveau, and Jacob Agar, “Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game,” International Journal of Computer Games Technology, vol. 2014, Article ID 138596, 18 pages, 2014. doi:10.1155/2014/138596. (pdf)(BibTex)
  • [J6] Y. Wang, W. Shi, Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous. IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp.306-319. 2014. doi: 10.1109/TCC.2014.2316812.(pdf)(BibTex)
  • [J5] Shi, W., Corriveau, J.-P. and Agar, J., Path Prediction in MMOGs Using Play Patterns. The International Journal of Computer Games Technology, pp. to appear, 2014. (BibTex)
  • [J4] Corriveau, J.-P. and Shi, W. "Traceability in Acceptance Testing". Journal of Software Engineering and Applications (JSEA), 6(10A), pp. 36-46, 2013.(pdf)(BibTex)
  • [J3] Shi, W., Garcia-Alfaro, J. and Corriveau, J.-P. "Searching for a Black Hole in an Interconnected Network Topology using Mobile Agents in Token Model". Journal of Parallel and Distributed Computing(JPDC), in press. (pdf)(BibTex)
  • [J2] Shi, W., Barbeau, M., Garcia-Alfaro, J. and Corriveau, J.-P. "Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks". Journal of Ad Hoc & Sensor Wireless Networks(AHSWN)", 17(1-2), pp. 87-102, 2013. (pdf)(BibTex)
  • [J1] Dobrev, S., Santoro N. and Shi, W. "Using Scattered Mobile Agents to Locate a Black Hole in an Un-oriented Ring with Tokens". International Journal of Foundations of Computer Science (IJFCS), 19 (6), pp. 1355 - 1372, 2008.(pdf)(BibTex)

Selected Papers in Refereed Conference Proceedings

  • [C35] Shi, W., Corriveau, J. –P. and Peng, M., Faulty Node Repair and Dynamically Spawned Black Hole Search. Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), October 10–12, 2016 | Guangzhou, People’s Republic of China.(pdf)(BibTex)
  • [C34] Wylie, A., Shi, Corriveau, J.-P., W., Wang, A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS) – ParLearning,pp. 1433-1442. (pdf)(BibTex)
  • [C33] Shelley, M., Shi, W. and Corriveau, J.-P., Use Case Map Traversal against Sequence Breaking, IEEE 2014 International Conference on Progress in Informatics and Computing, May 16-18, 2014, Shanghai, China, pp.359-367.(pdf)(BibTex)
  • [C32] Corriveau, J.-P., Shi, W. and Radonjic, V., Requirements Verification (Legal Challenges in Compliance Testing), IEEE 2014 International Conference on Progress in Informatics and Computing, May 16-18, 2014, Shanghai, China, pp.451-454.(pdf)(BibTex)
  • [C31] Shi, W., Wang, Y., Niu, B., Croft, W.-L. and Peng, M., Smart Shuffling in MapReduce: a Solution to Balance Network Traffic and Workloads, IEEE UCC, 2015, pp. to appear. (Acceptance rate 27.5%) (pdf) (BibTex)
  • [C30] Wang, Y. and Shi, W., On Performance Resilient Scheduling for Scientific Workflows in HPC Systems with Constrained Storage Resources, ACM ScienceCloud 2015, pp. 17-24. (pdf) (BibTex)
  • [C29] Peng, M., Shi, W. and Croft, W.-L., A Dynamically Spawned Black Hole and Faulty Nodes Repair in Ring Networks, submitted to OPODIS 2015. (BibTex)
  • [C28] Mesa-Barrameda E., Santoro N., Shi, W. and Taleb, N., Sensor Deployment by a Robot in an Unknown Orthogonal Region: Achieving Full Coverage. Accepted, IEEE International Workshop on Parallel and Distributed Computing in Geoinformation and Remote Sensing (PDGRS-ICPADS'14). ( Acceptance rate 18.6%). (BibTex)
  • [C27] Wang, Yang, and Wei Shi. On Optimal Parallel Scheduling Algorithms with Budget&Deadline Constraints for Fork&Join Workflows in Clouds. ICON (2013): 245-252.(pdf) (BibTex)
  • [C26] Shelley, M., Shi, W. and Corriveau, J.-P., On Preventing Sequence Breaking in Video Games. The 12th Annual Workshop on Network and Systems Support for Games (NetGames '13), Denver, Colorado, December, 2 pages. (pdf)(BibTex)
  • [C25] Zeng, L., Wang, Y., Shi, W. and Feng, D., Optimizing Xen Credit Scheduler for I/O Latency-Sensitive Applications on Multicores, 2013 In- ternational Conference on Cloud Computing and Big Data (IEEE Cloud- ComAsia '13), Fuzhou, China, December, 8 pages, to appear. (pdf)(BibTex)
  • [C24] Shi, W. and Wang, Y., Adaptive Search-based Service Migrations with Virtual Moves in Clouds for Mobile Accesses, The 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC '13), Dresden, Germany, December, 8 pages, PP. 195-202. (pdf)(BibTex)
  • [C23] Wang, Y., Shi, W., On Scheduling Algorithms for MapReduce Jobs in the Heterogeneous Cloud. The 17th International Conference on Principles of Distributed Systems (OPODIS '13), Nice, France, December, 15 pages, pp 251-265. (pdf)(BibTex)
  • [C22] Hu, M. and Wang, Y. and Shi, W., Scheduling Soft Aperiodic Messages on FlexRay in-Vehicle Networks. The 19th IEEE International Conference on Networks (ICON '13), Singapore, China, December, 6 pages, pp 1-6. (pdf)(BibTex)
  • [C21] Shi, W., Wang, Y., On Service Migration in the Cloud to Facilitate Mobile Accesses. The 19th IEEE Cluster 2013, Indianapolis, Indiana, September, 2013, 6 pages. (pdf)(BibTex)
  • [C20] Bashardoust, S., Corriveau, J.-P. and Shi, W., A Template-Based Approach to Modeling Variability, (SERP '13), Las Vegas, Nevada, July 2013, 7 pages.(pdf)(BibTex)
  • [C19] Corriveau, J.-P. and Shi, W., On Acceptance Testing, (SERP '13), Las Vegas, Nevada, July, 7 pages, proceedings to appear. (pdf)(BibTex)
  • [C18] Agar, J., Corriveau, J-P. and Shi. W., Play Patterns for Path Prediction in Multiplayer Online Games. The 7th International Conference on Communications and Networking (ChinaCOM ~’12), Kunming, China, August 2012, 6 pages. (pdf)(BibTex)
      • [C17] Shi, W., Yao, M. and Corriveau, J.-P. "Resilient Secure Localization and Detection of Colluding Attackers". International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW ~’12), Belgrade, Serbia, July 2012, pp. 181-192. (pdf)(BibTex)
                • [C16] Corriveau, J.-P. and Shi, W., Generating Verifiable Test Scenarios, (SERP ‘11), Las Vegas, USA, July 2011, pp. 315-321. (pdf)(BibTex)
                      • [C15] Shi, W. and Corriveau, J-P., An Exhaustive Overview on Sensor Relocation. The 2nd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN ~'10), Hangzhou, China, Nov 2010, 6 pages. (BibTex)
                      • [C14] Arnold, D., Corriveau, J.-P. and Shi, W., Validation against Actual Behavior: Still a Challenge for Testing Tools (SERP~'10), Las Vegas, USA, July 2010, pp. 212-218. (pdf)(BibTex)
                      • [C13] Arnold, D., Corriveau, J.-P. and Shi, W., Reconciling Offshore Outsourcing with Model-Based Testing. (SEAFOOD~'10), Saint Petersburg, Russia, June 2010, pp. 6-22. (pdf)(BibTex)
                      • [C12] Shi, W., Barbeau, M. and Corriveau, J.-P., Detection of the Evil Ring Attack in Wireless Sensor Networks Using Cross Verification. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM~'10), Montreal, Canada, June 2010, 8 pages. (pdf)(BibTex)
                      • [C11] Arnold, D., Corriveau, J.-P. and Shi, W., Modeling and Validating Requirements using Executable Contracts and Scenarios. Software Engineering Research, Management and Applications (SERA~'10), Montreal, Canada, May 2010, pp. 311-320. (pdf)(BibTex)
                      • [C10] Corriveau, J.-P. and Shi, W., Teaching Strategies to Millenial Students. FuturePlay 2010, Vancouver, Canada, May 2010. (pdf)(BibTex)
                      • [C9] Arnold, D., Corriveau, J.-P. and Shi, W., Scenario Based-Validation: Beyond the User Requirements Notation. The 21st Australian Software Engineering Conference, Auckland, New Zealand, April 2010, pp. 75-84. (pdf)(BibTex)
                      • [C8] Shi, W. et al., Using a Virtual Learning Environment with Highly Interactive Elements in Second Life to Engage Millennial Students. The 2010 International Conference on e-Education, e-Business, e-Management and e-Leaning (IC4E~'10), pp. 255-259. (pdf)(BibTex)
                      • [C7] Shi, W. and Corriveau, J.-P., A Comprehensive Review of Sensor Relocation. Proceeding of the 2010 IEEE/ACM Int’l Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing (GREENCOM-CPSCOM ’10). IEEE Computer Society, Washington, DC, USA, December 2010, pp.780-785. (pdf)(BibTex)
                                      • [C6] W. Shi, Black Hole Search with Tokens in Interconnected Networks. The 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS~'09), pp. 670-682. (pdf)(BibTex)
                                                                • [C5] S. Dobrev, N. Santoro and W. Shi, Scattered Black Hole Search in an Oriented Ring with Tokens. IEEE International Parallel and Distributed Processing Symposium, (IPDPS-APDCM~'07), Long Beach, California, March, 2007, pp. 1-8. (pdf)(BibTex)
                                                                • [C4] S. Dobrev, N. Santoro and W. Shi, Locating a Black Hole in a Ring Using Tokens: The Case of Dispersed Agents. The 13th International Euro-Par Conference European Conference on Parallel and Distributed Computing (Euro-Par~'07), Rennes, France, August 2007, pp. 608-617. (pdf)(BibTex)
                                                                    • [C3] S. Dobrev, R. Kralovic, N. Santoro and W. Shi, Black hole search in asynchronous rings using tokens. The 6th Conference on Algorithms and Complexity (CIAC~'06), Rome, Italy, May, 2006, pp. 139-150. (pdf)(BibTex)
                                                                            • [C2] W. Shi and J-P. Corriveau, System Family Engineering in Leader Election in the Ring Topology. International Association of Science and Technology for Development (IASTED~'04), Innsbruck, February, 2004, pp. 398-403. (BibTex)
                                                                            • [C1] W. Shi and J-P. Corriveau, An Executable Model for a Family of Election Algorithms. International Parallel and Distributed Processing Symposium (IPDPS~'04), Santa Fe, New Mexico, April, 2004, pp. 178-186. (pdf)(BibTex)