|
Search the dblp DataBase
Shigang Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shigang Chen, Yi Deng, Paul C. Attie, Wei Sun
Optimal Deadlock Detection in Distributed Systems Based on Locally Constructed Wait-for Graphs. [Citation Graph (1, 0)][DBLP] ICDCS, 1996, pp:613-619 [Conf]
- Shigang Chen, Randy Chow
A New Perspective in Defending against DDoS. [Citation Graph (0, 0)][DBLP] FTDCS, 2004, pp:186-190 [Conf]
- Shigang Chen, Klara Nahrstedt
Distributed QoS Routing with Imprecise State Information. [Citation Graph (0, 0)][DBLP] ICCCN, 1998, pp:614-623 [Conf]
- Shigang Chen, Yong Tang
Slowing Down Internet Worms. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:312-319 [Conf]
- Zhan Zhang, Shigang Chen, Yibei Ling, Randy Chow
Resilient Capacity-Aware Multicast Based on Overlay Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:565-574 [Conf]
- Shigang Chen, Klara Nahrstedt
Hierarchical Scheduling for Multiple Classes of Applications in Connection-Oriented Integrated-Service Networks. [Citation Graph (0, 0)][DBLP] ICMCS, Vol. 1, 1999, pp:153-158 [Conf]
- Ye Xia, Shigang Chen, Vivekanand Korgaonkar
Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] ICPADS (1), 2006, pp:411-420 [Conf]
- Shigang Chen, Klara Nahrstedt, Yuval Shavitt
A QoS-Aware Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP] INFOCOM, 2000, pp:1594-1603 [Conf]
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP] INFOCOM, 2004, pp:- [Conf]
- Yong Tang, Shigang Chen
Defending against Internet worms: a signature-based approach. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:1384-1394 [Conf]
- Mark Foster, Joseph N. Wilson, Shigang Chen
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:183-194 [Conf]
- Shigang Chen, Klara Nahrstedt
Distributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing. [Citation Graph (0, 0)][DBLP] LCN, 1998, pp:80-89 [Conf]
- King-Shan Lui, Klara Nahrstedt, Shigang Chen
Hierarchical QoS Routing in Delay-Bandwidth Sensitive Networks. [Citation Graph (0, 0)][DBLP] LCN, 2000, pp:579-588 [Conf]
- Shigang Chen, Zhan Zhang
Localized algorithm for aggregate fairness in wireless sensor networks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2006, pp:274-285 [Conf]
- Shigang Chen, Yibei Ling
Stochastic analysis of distributed deadlock scheduling. [Citation Graph (0, 0)][DBLP] PODC, 2005, pp:265-273 [Conf]
- Wenliang Du, Yunghsiang S. Han, Shigang Chen
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. [Citation Graph (0, 0)][DBLP] SDM, 2004, pp:- [Conf]
- Yibei Ling, Shigang Chen, Cho-Yu Jason Chiang
On Optimal Deadlock Detection Scheduling. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2006, v:55, n:9, pp:1178-1187 [Journal]
- King-Shan Lui, Klara Nahrstedt, Shigang Chen
Routing with topology aggregation in delay-bandwidth sensitive networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:17-29 [Journal]
- Shigang Chen, Qingguo Song
Perimeter-Based Defense against High Bandwidth DDoS Attacks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:6, pp:526-537 [Journal]
- Shigang Chen, Na Yang
Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:9, pp:934-946 [Journal]
- Zhan Zhang, Shigang Chen, Yibei Ling, Randy Chow
Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:2, pp:135-147 [Journal]
- Yong Tang, Shigang Chen
An Automated Signature-Based Approach against Polymorphic Internet Worms. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:879-892 [Journal]
- Shigang Chen, Yong Tang
DAW: A Distributed Antiworm System. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:7, pp:893-906 [Journal]
- Li Lao, Jun-Hong Cui, Mario Gerla, Shigang Chen
A Scalable Overlay Multicast Architecture for Large-Scale Applications. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:4, pp:449-459 [Journal]
- Yibei Ling, Shigang Chen, Xiaola Lin
On the Performance Regularity of Web Servers. [Citation Graph (0, 0)][DBLP] World Wide Web, 2004, v:7, n:3, pp:241-258 [Journal]
- Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
Protecting Receiver-Location Privacy in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1955-1963 [Conf]
- Zhan Zhang, Shigang Chen, MyungKeun Yoon
MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1091-1099 [Conf]
- Shigang Chen, Klara Nahrstedt
Routing by distributed recursive computation and information reuse. [Citation Graph (0, 0)][DBLP] IPCCC, 1999, pp:393-399 [Conf]
- Yang Sun, Guangbin Fan, Shigang Chen
Scalable and energy efficient data dissemination in wireless sensor networks. [Citation Graph (0, 0)][DBLP] IWCMC, 2006, pp:1061-1066 [Conf]
- Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
AID: A global anti-DoS service. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:15, pp:4252-4269 [Journal]
- Yong Tang, Shigang Chen, Yibei Ling
State aggregation of large network domains. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:4, pp:873-885 [Journal]
- Shigang Chen, Yuguang Fang, Ye Xia
Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2007, v:6, n:7, pp:762-776 [Journal]
- Shiping Chen, Baile Shi, Shigang Chen
ACOM: Any-source Capacity-constrained Overlay Multicast in Non-DHT P2P Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:9, pp:1188-1201 [Journal]
- Shigang Chen, Yong Tang, Wenliang Du
Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP] J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal]
Building a Scalable P2P Network with Small Routing Delay. [Citation Graph (, )][DBLP]
Speed Up Queries in Unstructured Peer-to-Peer Networks. [Citation Graph (, )][DBLP]
Reducing the Size of Rule Set in a Firewall. [Citation Graph (, )][DBLP]
Analysis of Maximum Executable Length for Detecting Text-Based Malware. [Citation Graph (, )][DBLP]
Achieving Global End-to-End Maxmin in Multihop Wireless Networks. [Citation Graph (, )][DBLP]
Using Analog Network Coding to Improve the RFID Reading Throughput. [Citation Graph (, )][DBLP]
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. [Citation Graph (, )][DBLP]
Exact Modeling of Propagation for Permutation-Scanning Worms. [Citation Graph (, )][DBLP]
Fit a Spread Estimator in Small Memory. [Citation Graph (, )][DBLP]
Energy Efficient Algorithms for the RFID Estimation Problem. [Citation Graph (, )][DBLP]
Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
MAC-layer Time Fairness across Multiple Wireless LANs. [Citation Graph (, )][DBLP]
Can CSMA/CA networks be made fair? [Citation Graph (, )][DBLP]
Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol. [Citation Graph (, )][DBLP]
A Novel Solution for End-to-End Fairness Problem in Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Real-Time Detection of Invisible Spreaders. [Citation Graph (, )][DBLP]
Algorithms and performance of load-balancing with multiple hash functions in massive content distribution. [Citation Graph (, )][DBLP]
Efficient file search in non-DHT P2P networks. [Citation Graph (, )][DBLP]
On Optimal Deadlock Detection Scheduling [Citation Graph (, )][DBLP]
Search in 0.020secs, Finished in 0.023secs
|