The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dafang Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenwei Li, Dafang Zhang, Jinmin Yang, Gaogang Xie
    An Active Measurement Approach for Link Faults Monitoring in ISP Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:1066-1071 [Conf]
  2. Wenwei Li, Dafang Zhang, Jinmin Yang
    Remote OS Fingerprinting Using BP Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:367-372 [Conf]
  3. Wenwei Li, Dafang Zhang, Jinmin Yang, Gaogang Xie, Lei Wang
    A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:184-189 [Conf]
  4. Wenwei Li, Dafang Zhang, Gaogang Xie, Jinmin Yang
    TCP and ICMP in Network Measurement: An Experimental Evaluation. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:870-881 [Conf]
  5. Yuan-sheng Luo, Dafang Zhang, Yinghua Min
    An Improved Scheme of Index-Based Checkpointing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:167-174 [Conf]
  6. Shaohuai Tian, Yingping Lu, Dafang Zhang
    Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:91-100 [Conf]
  7. Kun Huang, Dafang Zhang
    On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:75-79 [Conf]
  8. Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang
    A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:499-508 [Conf]
  9. Kun Huang, Lie Wang, Dafang Zhang, Yongwei Liu
    A Dynamic Quota-Based Peer Selection Strategy in BitTorrent. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:267-274 [Conf]
  10. Li Wenwei, Zhang Dafang, Yang Jinmin, Xie Gaogang
    On evaluating the differences of TCP and ICMP in network measurement. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:2, pp:428-439 [Journal]

  11. Performance Evaluation of End-to-End Path Capacity Measurement Tools in a Controlled Environment. [Citation Graph (, )][DBLP]


  12. A Partition-Based Broadcast Algorithm over DHT for Large-Scale Computing Infrastructures. [Citation Graph (, )][DBLP]


  13. An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness. [Citation Graph (, )][DBLP]


  14. A Regular Expression Matching Algorithm Using Transition Merging. [Citation Graph (, )][DBLP]


  15. A Scalable Bloom Filter for Membership Queries. [Citation Graph (, )][DBLP]


  16. Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. [Citation Graph (, )][DBLP]


  17. Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement System. [Citation Graph (, )][DBLP]


  18. A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection. [Citation Graph (, )][DBLP]


  19. A Token-based Broadcast Algorithm over DHT for Large-scale Computing Infrastructures. [Citation Graph (, )][DBLP]


  20. Accelerating the bit-split string matching algorithm using Bloom filters. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002