当前位置: X-MOL首页全球导师 国内导师 › 张俊星

个人简介

张俊星博士是内蒙古大学计算机学院教授、博士生导师、内蒙古自治区“无线网络与移动计算”重点实验室主任、“操作系统”自治区级精品课和“计算机网络”校级创新团队的负责人。担当过IEEE Transactions on Mobile Computing,Wireless Networks,ICNP等多个国际期刊和会议的审稿工作。他是微软认证的解决方案开发专家(MCSD),拥有Solaris, Informix等多项专业认证,并且是多个国际学术社团和荣誉社团的成员。获得过内蒙古自治区“草原英才”称号、美国犹他大学全额奖学金、美国科罗拉多州立大学全额奖学金、以及美国计算机协会旅行津贴。 教育经历 2010年,美国犹他大学计算学院,博士; 2004年,美国科罗拉多州立大学计算机科学系,硕士; 1996年,北京邮电大学计算机工程系,学士。 科研项目 [1] 主持项目:4项,其中有国家自然科学基金项目、内蒙古自然科学基金(杰青)项目、“草原英才”工程项目、内蒙古大学高层次人才引进科研启动基金(一层次骨干)项目等,累积经费193万元。 [2] 以核心成员参与项目:5项,其中包含国家自然科学基金项目,内蒙古自然科学基金项目、美国自然科学基金(NSF)项目等。

研究领域

移动与无线网络、网络测量与建模、网络安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1] Dustin Maas, Mohammad Hammed Firooz, Junxing Zhang, Neal Patwari, and Sneha Kumar Kasera, “Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation,” IEEE Transactions on Wireless Communications, Volume: 11, Issue: 1 Page(s): 1 – 8, Jan. 2012.SCI核心检索,检索号WOS: 000299527700001。影响因子:2.586。被引用次数:9。 [2] Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, and Piyush Rai, “Distinguishing Locations Across Perimeters Using Wireless Link Measurements,” in Proceedings of the 30th IEEE Conference on Computer and Communications (INFOCOM), Shanghai, China, April 2011. EI检索,Accession number: 20113114196474。被引用次数:6。 [3] Junxing Zhang, Sneha Kumar Kasera, and Neal Patwari, “Mobility Assisted Secret Key Generation Using Wireless Link Signatures,” in Proceedings of the 29th IEEE Conference on Computer and Communications (INFOCOM) Mini-Conference, San Diego, CA, March 2010. EI检索,Accession number: 20102413006256。被引用次数:15。 [4] Junxing Zhang, Mohammad Hamed Firooz, Neal Patwari, and Sneha Kumar Kasera, “Advancing Wireless Link Signatures for Location Distinction,” in Proceedings of the 14th Annual International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA, Sept. 2008. SCI, EI共同检索,UT:ISI: 000265962300003,Accession number: 20090811916824。被引用次数:49。 [5] Dustin Maas, Neal Patwari, Junxing Zhang, Sneha Kumar Kasera, and Michael Jensen, “Location Distinction in a MIMO Channel,” in Proceedings of the Virginia Tech Symposium on Wireless Personal Communications, Blacksburg, VA, June 2009. [6] Robert Ricci, Jonathon Duerig, Pramod Sanaga, Daniel Gebhardt, Mike Hibler, Kevin Atkinson, Junxing Zhang, Sneha Kasera, and Jay Lepreau, “The Flexlab Approach to Realistic Evaluation of Networked Systems,” in Proceedings of the fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI), pages 201-214, Cambridge, MA, April 2007. [7] P. Sugavanam, H. J. Siegel, A. A. Maciejewski, M. Oltikar, A. Mehta, R. Pichel, A. Horiuchi, V. Shestak, M. Al-Otaibi, Y. Krishnamurthy, S. Ali, J. Zhang, M. Aydin, P. Lee, K. Guru, M. Raskey, and A. Pippin, "Robust Static Allocation of Resources for Independent Tasks under Makespan and Dollar Cost Constraints," Journal of Parallel and Distributed Computing, Vol. 67, No. 4, pp. 400-416, April 2007. [8] Junxing Zhang and Indrajit Ray,“Towards Secure Multi-sited Transactional Revision Control System,”Computer Standards and Interfaces, Volume 29, Issue 3 (March 2007) Pages: 365-375. SCI, EI共同检索, UT:ISI:000244582300009,Accession number: 20070610409988。 [9] Indrajit Ray and Junxing Zhang, "Towards a New Standard for Allowing Consistency in Revision Control Systems,” Computer Standards and Interfaces, Volume 29, Issue 3 (March 2007) Pages: 355-364. [10] Jonathon Duerig, Robert Ricci, Junxing Zhang, Daniel Gebhardt, Sneha Kasera, Jay Lepreau, “Flexlab: A Realistic, Controlled, and Friendly Environment for Evaluating Networked Systems,” Fifth Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006. [11] Jonathon Duerig, Robert Ricci, Junxing Zhang, Sneak Kasera, and Jay Lepreau, “An Application-Centric Approach to Emulating Internet Paths,” in Poster Session of the Third USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California, April 2006.? [12] Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, and Junxing Zhang, “Functional Correctness Proofs of Encryption Algorithms,” in Proceedings of the 12th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR), Montego Bay, Jamaica, December, 2005. [13] P. Sugavanam, H. J. Siegel, A. A. Maciejewski, J. Zhang, V. Shestak, M. Raskey, A. Pippin, R. Pichel, M. Oltikar, A. Mehta, P. Lee, Y. Krishnamurthy, A. Horiuchi, K. Guru, M. Aydin, M. Al-Otaibi, and S. Ali, “Robust Mapping of Independent Tasks when Dollar Cost for Processors is a Constraint,” 4th International Workshop on Algorithms, Models, and Tools for Parallel Computing on Heterogeneous Networks (HeteroPar-05), in Proceedings of the 2005 International Conference on Cluster Computing (Cluster ), Boston, MA, Sept. 2005. [14] Junxing Zhang and Konrad Slind, "Verification of Euclids Algorithm for Finding Multiplicative Inverses," in Proceedings of the 18th International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2005), Emerging Trends, Oxford, UK, August 2005. [15] Konrad Slind, Steven Barrus, Seungkeol Choe, Chris Condrat, Jianjun Duan, Sivaram Gopalakrishnan, Aaron Knoll, Hiro Kuwahara, Guodong Li, Scott Little, Lei Liu, Steffanie Moore, Robert Palmer, Claurissa Tuttle, Sean Walton, Yu Yang, and Junxing Zhang, “Teaching a HOL Course: Experience Report,” in Proceedings of the 18th International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2005), Emerging Trends, Oxford, UK, August 2005. [16] P. V. Sugavanam, H. J. Siegel, A. A. Maciejewski, S. A. Ali, M. Al-Otaibi, M. Aydin, K. Guru, A. Horiuchi, Y. G. Krishnamurthy, P. Lee, A. Mehta, M. Oltikar, R. Pichel, A. J. Pippin, M. Raskey, V. Shestak, and J. Zhang, “Processor Allocation for Tasks that is Robust Against Errors in Computation Time Estimates,” 14th Heterogeneous Computing Workshop (HCW 2005), in the CD-ROM proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), Denver, CO, April 4-8, 2005. [17] Junxing Zhang and Indrajit Ray, “Secure Multi-Sited Version Control System,” in Proceedings of the Sixth IFIP WG 11.5 Conference on Integrity and Control in Information Systems, Lausanne, Switzerland, November 13-14, Kluwer Academic Publishers, 2003. [18]李华、张俊星、谢辉,一种计算机网络课的教学方法设计,计算机教育,2012 (01)。 [19]李华、王燕、谢辉、张俊星,计算机网络系列课程实验方法探索,第五届全国高校计算机网络教学研讨会。优秀论文奖,颁奖单位中国计算机协会互联网专业委员会、教育专业委员会。2012年10月26日-27日。

推荐链接
down
wechat
bug