


default search action
Cong-Cong Xing
Person information
- affiliation: Nicholls State University, Thibodaux, LA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j53]Cong-Cong Xing, Jun Huang:
Programming the Prisoner's Dilemma Problem: A Case Study. J. Comput. Sci. Coll. 40(7): 91-101 (2025)- 2024
[j52]Cong-Cong Xing, Jun Huang:
The Interplay of 2D Arrays and Nested Loops. J. Comput. Sci. Coll. 39(6): 107-110 (2024)- 2022
[j51]Cong-Cong Xing, Jun Huang:
A way to visualize higher dimensional arrays, matrices, and spaces: nifty assignment. J. Comput. Sci. Coll. 37(6): 68-70 (2022)
[j50]Qiang Wang
, Hao Jiang
, Ying Jiang
, Shuwen Yi
, Lixia Li, Cong-Cong Xing
, Jun Huang
:
On Searching Multiple Disjoint Shortest Paths in Scale-Free Networks With Hyperbolic Geometry. IEEE Trans. Netw. Sci. Eng. 9(4): 2772-2785 (2022)
[j49]Jun Huang
, Qiang Duan
, Cong-Cong Xing
, Bo Gu
, Guodong Wang, Sherali Zeadally
, Erich J. Baker
:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3501-3515 (2022)- 2021
[j48]Cong-Cong Xing, Jun Huang:
How can it be fixed in terms of typing?: nifty assignment. J. Comput. Sci. Coll. 36(6): 69-70 (2021)
[j47]Jun Huang
, Baohua Yu
, Cong-Cong Xing
, Tomás Cerný
, Zhaolong Ning
:
Online Energy Scheduling Policies in Energy Harvesting Enabled D2D Communications. IEEE Trans. Ind. Informatics 17(8): 5678-5687 (2021)- 2020
[j46]Cong-Cong Xing, Jun Huang:
Abstract syntax BNF is not ambiguous/inadequate. J. Comput. Sci. Coll. 35(9): 97-98 (2020)
[j45]Jun Huang
, Jingjing Cui, Cong-Cong Xing
, Hamid Gharavi:
Energy-Efficient SWIPT-Empowered D2D Mode Selection. IEEE Trans. Veh. Technol. 69(4): 3903-3915 (2020)
[j44]Jun Huang
, Cong-Cong Xing
, Mohsen Guizani
:
Power Allocation for D2D Communications With SWIPT. IEEE Trans. Wirel. Commun. 19(4): 2308-2320 (2020)
[c19]Jun Huang, Guohuan Wang, Cong-Cong Xing:
POET: An Energy-efficient Resource Management Mechanism for One-to-Many D2D Communications. WCNC 2020: 1-6
2010 – 2019
- 2019
[j43]Jun Huang, Yide Zhou, Qiang Duan, Cong-Cong Xing:
Fast approaches for semantic service composition in big data environment. Int. J. Big Data Intell. 6(1): 1-10 (2019)
[j42]Cong-Cong Xing, Jun Huang:
Understanding the identity function in SML by theory. J. Comput. Sci. Coll. 34(7): 87-88 (2019)
[j41]Jun Huang
, Chao Huang, Cong-Cong Xing
, Zheng Chang
, Yanxiao Zhao
, Qinglin Zhao
:
An Energy-Efficient Communication Scheme for Collaborative Mobile Clouds in Content Sharing: Design and Optimization. IEEE Trans. Ind. Informatics 15(10): 5700-5707 (2019)
[j40]Jun Huang
, Yong Liao, Cong-Cong Xing
, Zheng Chang
:
Multi-Hop D2D Communications With Network Coding: From a Performance Perspective. IEEE Trans. Veh. Technol. 68(3): 2270-2282 (2019)- 2018
[j39]Zhaowen Lin, Fei Xiao, Yi Sun, Yan Ma, Cong-Cong Xing, Jun Huang:
A Secure Encryption-Based Malware Detection System. KSII Trans. Internet Inf. Syst. 12(4): 1799-1818 (2018)
[j38]Cong-Cong Xing, Jun Huang:
Adding game theory into computer science. J. Comput. Sci. Coll. 33(4): 92-100 (2018)
[j37]Jun Huang, Mingli Zhao, Yide Zhou, Cong-Cong Xing:
In-Vehicle Networking: Protocols, Challenges, and Solutions. IEEE Netw. 33(1): 92-98 (2018)
[j36]Jun Huang
, Hao Xiang, Cong-Cong Xing, Qiang Duan
:
Multi-priority fork-join scheduling in SDN for high-performance data transmissions in mobile crowdsourcing. Pervasive Mob. Comput. 49: 153-167 (2018)
[j35]Jun Huang
, Jinyun Zou, Cong-Cong Xing
:
Energy-Efficient Mode Selection for D2D Communications in Cellular Networks. IEEE Trans. Cogn. Commun. Netw. 4(4): 869-882 (2018)
[j34]Jun Huang
, Jinyun Zou, Cong-Cong Xing
:
Competitions Among Service Providers in Cloud Computing: A New Economic Model. IEEE Trans. Netw. Serv. Manag. 15(2): 866-877 (2018)
[j33]Jun Huang, Cong-Cong Xing
, Sung Y. Shin, Fen Hou, Ching-Hsien Hsu
:
Optimizing M2M Communications and Quality of Services in the IoT for Sustainable Smart Cities. IEEE Trans. Sustain. Comput. 3(1): 4-15 (2018)
[j32]Jun Huang
, Cong-Cong Xing
, Yi Qian
, Zygmunt J. Haas:
Resource Allocation for Multicell Device-to-Device Communications Underlaying 5G Networks: A Game-Theoretic Mechanism With Incomplete Information. IEEE Trans. Veh. Technol. 67(3): 2557-2570 (2018)
[j31]Jun Huang
, Shuai Huang, Cong-Cong Xing
, Yi Qian
:
Game-Theoretic Power Control Mechanisms for Device-to-Device Communications Underlaying Cellular System. IEEE Trans. Veh. Technol. 67(6): 4890-4900 (2018)
[c18]Jun Huang, Yong Liao, Cong-Cong Xing:
Efficient power control for D2D with SWIPT. RACS 2018: 106-111- 2017
[j30]Jun Huang
, Fang Fang, Cong-Cong Xing, Yi Qian:
IP Flow Mobility in the Industry: From An Economic Perspective. IEEE Access 5: 3055-3068 (2017)
[j29]Jun Huang, Cong-Cong Xing, Chonggang Wang:
Simultaneous Wireless Information and Power Transfer: Technologies, Applications, and Research Challenges. IEEE Commun. Mag. 55(11): 26-32 (2017)
[j28]Cong-Cong Xing, Jun Huang:
Programming the prisoners' dilemma problem. J. Comput. Sci. Coll. 32(5): 49-56 (2017)
[j27]Jun Huang, Liqian Xu, Qiang Duan, Cong-Cong Xing, Jiangtao Luo, Shui Yu
:
Modeling and performance analysis for multimedia data flows scheduling in software defined networks. J. Netw. Comput. Appl. 83: 89-100 (2017)
[j26]Jun Huang, Hamid Gharavi, Huifang Yan, Cong-Cong Xing:
Network Coding in Relay-Based Device-to-Device Communications. IEEE Netw. 31(4): 102-107 (2017)
[j25]Jun Huang
, Xiang Li, Cong-Cong Xing, Wei Wang, Kun Hua
, Song Guo
:
DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains. IEEE Trans. Emerg. Top. Comput. 5(1): 134-140 (2017)
[j24]Jun Huang
, Qiang Duan, Cong-Cong Xing, Honggang Wang
:
Topology Control for Building a Large-Scale and Energy-Efficient Internet of Things. IEEE Wirel. Commun. 24(1): 67-73 (2017)
[c17]Jun Huang, Yide Zhou, Qiang Duan, Cong-Cong Xing:
Semantic Web Service Composition in Big Data Environment. GLOBECOM 2017: 1-7
[c16]Jun Huang, Mengxi Zeng, Cong-Cong Xing, Jiangtao Luo, Fen Hou:
Modeling and analysis for admission control of M2M communications using network calculus. ICC 2017: 1-6
[c15]Jun Huang, Shuai Huang, Cong-Cong Xing:
When D2D Meets Network Coding: A Tutorial Case Study. RACS 2017: 146-151- 2016
[j23]Hong Tang, Haichen Shen, Cong-Cong Xing:
A teamwork approach to improving the downloading time in BitTorrent-like systems. Int. J. Comput. Sci. Eng. 12(4): 319-329 (2016)
[j22]Cong-Cong Xing:
Seven different proofs for |P(A)|=2n. J. Comput. Sci. Coll. 31(5): 53-61 (2016)
[j21]Cong-Cong Xing:
A mutually beneficial assignment to mathematics and computer programming: nifty assignment. J. Comput. Sci. Coll. 31(5): 70-71 (2016)- 2015
[j20]Yanbing Liu, Zhong Yuan, Cong-Cong Xing, Bo Gong, Yunpeng Xiao
, Hong Liu
:
A behavioral anomaly detection strategy based on time series process portraits for desktop virtualization systems. Clust. Comput. 18(2): 979-988 (2015)
[j19]Jun Huang, Liqian Xu, Mengxi Zeng, Huifang Yan, Qiang Duan, Cong-Cong Xing:
Hybrid Scheduling for Quality of Service Guarantee of Multimedia Data Flows in Software Defined Networks. EAI Endorsed Trans. Cloud Syst. 1(3): e1 (2015)
[j18]Cong-Cong Xing:
How can memory bits and power sets benefit each other?: nifty assignment. J. Comput. Sci. Coll. 30(5): 32-33 (2015)
[j17]Jun Huang, Liqian Xu, Cong-Cong Xing, Qiang Duan:
A Novel Bioinspired Multiobjective Optimization Algorithm for Designing Wireless Sensor Networks in the Internet of Things. J. Sensors 2015: 192194:1-192194:16 (2015)
[c14]Jun Huang, Liqian Xu, Mengxi Zeng, Cong-Cong Xing, Qiang Duan, Yuhong Yan:
Hybrid Scheduling for Quality of Service Guarantee in Software Defined Networks to Support Multimedia Cloud Services. SCC 2015: 788-792
[c13]Jun Huang, Fang Fang, Yi Sun, Huifang Yan, Cong-Cong Xing, Qiang Duan, Wei Wang:
A New Economic Model in Cloud Computing: Cloud Service Provider vs. Network Service Provider. GLOBECOM 2015: 1-6
[c12]Jun Huang, Ying Yin, Yi Sun, Yanxiao Zhao, Cong-Cong Xing, Qiang Duan:
Game theoretic resource allocation for multicell D2D communications with incomplete information. ICC 2015: 3039-3044
[c11]Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua
:
Multiple Service Providers with IP Flow Mobility: From an Economic Perspective. ICCCN 2015: 1-8
[c10]Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-Cong Xing, Qiang Duan:
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. SAC 2015: 688-694
[c9]Qiang Duan, Mengxi Zeng, Jun Huang, Cong-Cong Xing:
Performance analysis for a service delivery platform in software defined network. SAC 2015: 2257-2262
[c8]Jun Huang, Yi Sun, Cong-Cong Xing, Yanxiao Zhao, Qianbin Chen
:
A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network. WASA 2015: 222-231- 2014
[j16]Cong-Cong Xing:
Adding coinduction into discrete mathematics. J. Comput. Sci. Coll. 29(5): 84-90 (2014)
[c7]Jun Huang, Xiang Li, Yin Ying, Yi Sun, Qiang Duan, Cong-Cong Xing:
FAMOUS: a novel fast multi-constrained multicast routing algorithm. RACS 2014: 149-154- 2013
[j15]Cong-Cong Xing, Wendy Zhang, Jiahao Li:
On the dovetail counting method. J. Comput. Sci. Coll. 28(5): 24-33 (2013)
[j14]Cong-Cong Xing:
The struggle with syntactic sugar, what it denotes, and the meaning of programs. J. Comput. Sci. Coll. 28(5): 82-84 (2013)- 2012
[j13]Cong-Cong Xing:
What exactly to prove? J. Comput. Sci. Coll. 27(5): 43-44 (2012)- 2011
[j12]Cong-Cong Xing:
A web-based graphical set theory proof assistance system. J. Comput. Sci. Coll. 26(5): 6-15 (2011)
[j11]Cong-Cong Xing:
Function composition is a good practice: nifty assignment. J. Comput. Sci. Coll. 26(5): 154-156 (2011)- 2010
[j10]Cong-Cong Xing:
A graphical framework for assisting proofs. J. Comput. Sci. Coll. 25(5): 48-57 (2010)
2000 – 2009
- 2009
[j9]Cong-Cong Xing:
How interpreters work: an overlooked topic in undergraduate computer science education. J. Comput. Sci. Coll. 25(2): 159-166 (2009)- 2008
[j8]Cong-Cong Xing:
A Graph-Based Type Representation for Objects. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 10 (2008)
[j7]Cong-Cong Xing:
Enhancing the learning and teaching of functions through programming in ML. J. Comput. Sci. Coll. 23(4): 97-104 (2008)
[c6]Cong-Cong Xing:
Binary Methods and Parameterized Types in Java: A Conflicting point between Theory and Practice. Software Engineering Research and Practice 2008: 661-667- 2007
[j6]Cong-Cong Xing:
Program Verifications, Object Interdependencies, and Object Types. e Informatica Softw. Eng. J. 1(1): 77-98 (2007)
[j5]Cong-Cong Xing:
Proof diagrams: a graphical tool for assisting set proofs. J. Comput. Sci. Coll. 22(5): 70-77 (2007)
[c5]Cong-Cong Xing:
An Object Type Graph System. TASE 2007: 87-96- 2006
[j4]Cong-Cong Xing:
Contravariant methods in Java and C++. J. Comput. Sci. Coll. 21(5): 69-75 (2006)
[c4]Cong-Cong Xing:
An algorithm for computing links. ACM Southeast Regional Conference 2006: 585-589
[c3]Cong-Cong Xing:
Enhancing program verifications by restricting object types. SAC 2006: 1816-1821- 2005
[j3]Cong-Cong Xing, Boumediene Belkhouche:
Représentation graphique des objets et sous-typage. Obj. Logiciel Base données Réseaux 11(1-2): 191-206 (2005)
[j2]Cong-Cong Xing, Bill P. Buckles:
On the size of the search space of join optimization. J. Comput. Sci. Coll. 20(6): 136-142 (2005)
[c2]Cong-Cong Xing, Boumediene Belkhouche
:
The movable point problem and its resolution in object type graphs. ACM Southeast Regional Conference (2) 2005: 315-320
[c1]Cong-Cong Xing, Boumediene Belkhouche:
Object Interdependencies, Behaviors, Semantics, and Types. PLC 2005: 245-- 2003
[j1]Cong-Cong Xing, Boumediene Belkhouche
:
On pseudo object-oriented programming considered harmful. Commun. ACM 46(10): 115-117 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-27 23:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







