|
Search the dblp DataBase
John Chuang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kartik Hosanagar, Ramayya Krishnan, Michael D. Smith, John Chuang
Optimal Pricing of Content Delivery Network (CDN) Services. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Nicolas Christin, John Chuang
A cost-based analysis of overlay routing geometries. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:2566-2577 [Conf]
- Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang
A Secure, Publisher-Centric Web Caching Infrastructure. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1235-1243 [Conf]
- Nicolas Christin, John Chuang
On the Cost of Participating in a Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP] IPTPS, 2004, pp:22-32 [Conf]
- Ahsan Habib, John Chuang
Incentive mechanism for peer-to-peer media streaming. [Citation Graph (0, 0)][DBLP] IWQoS, 2004, pp:171-180 [Conf]
- Abhishek Ghose, Jens Grossklags, John Chuang
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP] Mobile Data Management, 2003, pp:45-62 [Conf]
- Paul Laskowski, John Chuang
Network monitors and contracting systems: competition and innovation. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2006, pp:183-194 [Conf]
- Michal Feldman, John Chuang, Ion Stoica, Scott Shenker
Hidden-action in multi-hop routing. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2005, pp:117-126 [Conf]
- Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
Robust incentive techniques for peer-to-peer networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2004, pp:102-111 [Conf]
- Nicolas Christin, Andreas S. Weigend, John Chuang
Content availability, pollution and poisoning in file sharing peer-to-peer networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2005, pp:68-77 [Conf]
- Michal Feldman, John Chuang
The Evolution of Cooperation under Cheap Pseudonyms. [Citation Graph (0, 0)][DBLP] CEC, 2005, pp:284-291 [Conf]
- John Chuang, Steve Kafka, Kim Norlen
Efficiency and Performance of Web Cache Reporting Strategies. [Citation Graph (0, 0)][DBLP] WISE Workshops, 2002, pp:120-129 [Conf]
- Nicolas Christin, Jens Grossklags, John Chuang
Near Rationality and Competitive Equilibria in Networked Systems [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Nicolas Christin, John Chuang
On the Cost of Participating in a Peer-to-Peer Network [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Abhishek Ghose, Jens Grossklags, John Chuang
Resilient Data-Centric Storage in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2003, v:4, n:11, pp:- [Journal]
- Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:1010-1014 [Journal]
- Moshe Babaioff, John Chuang
On the Optimality and Interconnection of Valiant Load-Balancing Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:80-88 [Conf]
- Ahsan Habib, Nicolas Christin, John Chuang
Taking Advantage of Multihoming with Session Layer Striping. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Ahsan Habib, John Chuang
Improving application QoS with residential multihoming. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:12, pp:3323-3337 [Journal]
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]
Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]
Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]
User-directed routing: from theory, towards practice. [Citation Graph (, )][DBLP]
Security and insurance management in networks with heterogeneous agents. [Citation Graph (, )][DBLP]
Secure or insure?: a game-theoretic analysis of information security games. [Citation Graph (, )][DBLP]
Modeling the adoption of new network architectures. [Citation Graph (, )][DBLP]
Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|