Search the dblp DataBase
Rocky K. C. Chang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xiapu Luo , Rocky K. C. Chang Optimizing the Pulsing Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:582-591 [Conf ] Xiapu Luo , Rocky K. C. Chang Novel Approaches to End-to-End Packet Reordering Measurement. [Citation Graph (0, 0)][DBLP ] Internet Measurment Conference, 2005, pp:227-238 [Conf ] Guangmin Hu , Rocky K. C. Chang Forwarding State Scalability-Aware Multicast Routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2005, pp:395-400 [Conf ] Filli Y. Y. Cheng , Rocky K. C. Chang A Tree Switching Protocol for Multicast State Reduction. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:672-677 [Conf ] Rocky K. C. Chang , King P. Fung Transport layer proxy for stateful UDP packet filtering. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:595-600 [Conf ] Xiapu Luo , Rocky K. C. Chang , Edmond W. W. Chan Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2005, pp:97-104 [Conf ] Xiapu Luo , Rocky K. C. Chang On a New Class of Pulsing Denial-of-Service Attacks and the Defense. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Rocky K. C. Chang A Multicast-On-Large-Demand Approach to the Flash Crowd Problem. [Citation Graph (0, 0)][DBLP ] WWW (Posters), 2003, pp:- [Conf ] Sum Lam , Rocky K. C. Chang , Yi Xie Relative stability analysis of multiple queues. [Citation Graph (0, 0)][DBLP ] VALUETOOLS, 2006, pp:65- [Conf ] Yi Xie , Rocky K. C. Chang Stability-constrained optimization for energy efficiency in polling-based wireless networks. [Citation Graph (0, 0)][DBLP ] VALUETOOLS, 2006, pp:23- [Conf ] Fai Siu , Rocky K. C. Chang Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:1, pp:61-74 [Journal ] King P. Fung , Rocky K. C. Chang A Transport-Level Proxy for Secure Multimedia Streams. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:6, pp:57-67 [Journal ] Rocky K. C. Chang , Hong Y. Wang Routing Properties of a Recursive Interconnection Network. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2001, v:61, n:6, pp:838-849 [Journal ] Rocky K. C. Chang , Sum Lam A novel approach to queue stability analysis of polling models. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2000, v:40, n:1-3, pp:27-46 [Journal ] Sum Lam , Rocky K. C. Chang Stability comparison in single-server-multiple-queue systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS Performance Evaluation Review, 2001, v:29, n:3, pp:32-34 [Journal ] Sum Lam , Rocky K. C. Chang Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks. [Citation Graph (0, 0)][DBLP ] SIGMETRICS Performance Evaluation Review, 2003, v:31, n:2, pp:20-22 [Journal ] Xiapu Luo , Edmond W. W. Chan , Rocky K. C. Chang Cloak: A Ten-Fold Way for Reliable Covert Communications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:283-298 [Conf ] Yi Xie , Rocky K. C. Chang Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] TCP covert timing channels: Design and detection. [Citation Graph (, )][DBLP ] CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding. [Citation Graph (, )][DBLP ] Crafting Web Counters into Covert Channels. [Citation Graph (, )][DBLP ] Teaching computer networking with the help of personal computer networks. [Citation Graph (, )][DBLP ] An active approach to measuring routing dynamics induced by autonomous systems. [Citation Graph (, )][DBLP ] A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement. [Citation Graph (, )][DBLP ] Protecting Internet Services from Low-Rate DoS Attacks. [Citation Graph (, )][DBLP ] Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. [Citation Graph (, )][DBLP ] Inbound traffic engineering for multi-homed ASes using AS path prepending. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs