The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shigang Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shigang Chen, Yi Deng, Paul C. Attie, Wei Sun
    Optimal Deadlock Detection in Distributed Systems Based on Locally Constructed Wait-for Graphs. [Citation Graph (1, 0)][DBLP]
    ICDCS, 1996, pp:613-619 [Conf]
  2. Shigang Chen, Randy Chow
    A New Perspective in Defending against DDoS. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:186-190 [Conf]
  3. Shigang Chen, Klara Nahrstedt
    Distributed QoS Routing with Imprecise State Information. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:614-623 [Conf]
  4. Shigang Chen, Yong Tang
    Slowing Down Internet Worms. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:312-319 [Conf]
  5. Zhan Zhang, Shigang Chen, Yibei Ling, Randy Chow
    Resilient Capacity-Aware Multicast Based on Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:565-574 [Conf]
  6. Shigang Chen, Klara Nahrstedt
    Hierarchical Scheduling for Multiple Classes of Applications in Connection-Oriented Integrated-Service Networks. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 1, 1999, pp:153-158 [Conf]
  7. Ye Xia, Shigang Chen, Vivekanand Korgaonkar
    Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2006, pp:411-420 [Conf]
  8. Shigang Chen, Klara Nahrstedt, Yuval Shavitt
    A QoS-Aware Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1594-1603 [Conf]
  9. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney
    A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  10. Yong Tang, Shigang Chen
    Defending against Internet worms: a signature-based approach. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1384-1394 [Conf]
  11. Mark Foster, Joseph N. Wilson, Shigang Chen
    Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:183-194 [Conf]
  12. Shigang Chen, Klara Nahrstedt
    Distributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing. [Citation Graph (0, 0)][DBLP]
    LCN, 1998, pp:80-89 [Conf]
  13. King-Shan Lui, Klara Nahrstedt, Shigang Chen
    Hierarchical QoS Routing in Delay-Bandwidth Sensitive Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:579-588 [Conf]
  14. Shigang Chen, Zhan Zhang
    Localized algorithm for aggregate fairness in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2006, pp:274-285 [Conf]
  15. Shigang Chen, Yibei Ling
    Stochastic analysis of distributed deadlock scheduling. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:265-273 [Conf]
  16. Wenliang Du, Yunghsiang S. Han, Shigang Chen
    Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]
  17. Yibei Ling, Shigang Chen, Cho-Yu Jason Chiang
    On Optimal Deadlock Detection Scheduling. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:9, pp:1178-1187 [Journal]
  18. King-Shan Lui, Klara Nahrstedt, Shigang Chen
    Routing with topology aggregation in delay-bandwidth sensitive networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:17-29 [Journal]
  19. Shigang Chen, Qingguo Song
    Perimeter-Based Defense against High Bandwidth DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:6, pp:526-537 [Journal]
  20. Shigang Chen, Na Yang
    Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:9, pp:934-946 [Journal]
  21. Zhan Zhang, Shigang Chen, Yibei Ling, Randy Chow
    Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:2, pp:135-147 [Journal]
  22. Yong Tang, Shigang Chen
    An Automated Signature-Based Approach against Polymorphic Internet Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:879-892 [Journal]
  23. Shigang Chen, Yong Tang
    DAW: A Distributed Antiworm System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:893-906 [Journal]
  24. Li Lao, Jun-Hong Cui, Mario Gerla, Shigang Chen
    A Scalable Overlay Multicast Architecture for Large-Scale Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:4, pp:449-459 [Journal]
  25. Yibei Ling, Shigang Chen, Xiaola Lin
    On the Performance Regularity of Web Servers. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2004, v:7, n:3, pp:241-258 [Journal]
  26. Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
    Protecting Receiver-Location Privacy in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1955-1963 [Conf]
  27. Zhan Zhang, Shigang Chen, MyungKeun Yoon
    MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1091-1099 [Conf]
  28. Shigang Chen, Klara Nahrstedt
    Routing by distributed recursive computation and information reuse. [Citation Graph (0, 0)][DBLP]
    IPCCC, 1999, pp:393-399 [Conf]
  29. Yang Sun, Guangbin Fan, Shigang Chen
    Scalable and energy efficient data dissemination in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:1061-1066 [Conf]
  30. Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
    AID: A global anti-DoS service. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:15, pp:4252-4269 [Journal]
  31. Yong Tang, Shigang Chen, Yibei Ling
    State aggregation of large network domains. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:873-885 [Journal]
  32. Shigang Chen, Yuguang Fang, Ye Xia
    Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:7, pp:762-776 [Journal]
  33. Shiping Chen, Baile Shi, Shigang Chen
    ACOM: Any-source Capacity-constrained Overlay Multicast in Non-DHT P2P Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:9, pp:1188-1201 [Journal]
  34. Shigang Chen, Yong Tang, Wenliang Du
    Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal]

  35. Building a Scalable P2P Network with Small Routing Delay. [Citation Graph (, )][DBLP]


  36. Speed Up Queries in Unstructured Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  37. Reducing the Size of Rule Set in a Firewall. [Citation Graph (, )][DBLP]


  38. Analysis of Maximum Executable Length for Detecting Text-Based Malware. [Citation Graph (, )][DBLP]


  39. Achieving Global End-to-End Maxmin in Multihop Wireless Networks. [Citation Graph (, )][DBLP]


  40. Using Analog Network Coding to Improve the RFID Reading Throughput. [Citation Graph (, )][DBLP]


  41. Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  42. DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. [Citation Graph (, )][DBLP]


  43. Exact Modeling of Propagation for Permutation-Scanning Worms. [Citation Graph (, )][DBLP]


  44. Fit a Spread Estimator in Small Memory. [Citation Graph (, )][DBLP]


  45. Energy Efficient Algorithms for the RFID Estimation Problem. [Citation Graph (, )][DBLP]


  46. Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  47. MAC-layer Time Fairness across Multiple Wireless LANs. [Citation Graph (, )][DBLP]


  48. Can CSMA/CA networks be made fair? [Citation Graph (, )][DBLP]


  49. Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol. [Citation Graph (, )][DBLP]


  50. A Novel Solution for End-to-End Fairness Problem in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  51. Real-Time Detection of Invisible Spreaders. [Citation Graph (, )][DBLP]


  52. Algorithms and performance of load-balancing with multiple hash functions in massive content distribution. [Citation Graph (, )][DBLP]


  53. Efficient file search in non-DHT P2P networks. [Citation Graph (, )][DBLP]


  54. On Optimal Deadlock Detection Scheduling [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002