The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Chuang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kartik Hosanagar, Ramayya Krishnan, Michael D. Smith, John Chuang
    Optimal Pricing of Content Delivery Network (CDN) Services. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  2. Nicolas Christin, John Chuang
    A cost-based analysis of overlay routing geometries. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2566-2577 [Conf]
  3. Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang
    A Secure, Publisher-Centric Web Caching Infrastructure. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1235-1243 [Conf]
  4. Nicolas Christin, John Chuang
    On the Cost of Participating in a Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:22-32 [Conf]
  5. Ahsan Habib, John Chuang
    Incentive mechanism for peer-to-peer media streaming. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2004, pp:171-180 [Conf]
  6. Abhishek Ghose, Jens Grossklags, John Chuang
    Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2003, pp:45-62 [Conf]
  7. Paul Laskowski, John Chuang
    Network monitors and contracting systems: competition and innovation. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:183-194 [Conf]
  8. Michal Feldman, John Chuang, Ion Stoica, Scott Shenker
    Hidden-action in multi-hop routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:117-126 [Conf]
  9. Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
    Robust incentive techniques for peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2004, pp:102-111 [Conf]
  10. Nicolas Christin, Andreas S. Weigend, John Chuang
    Content availability, pollution and poisoning in file sharing peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:68-77 [Conf]
  11. Michal Feldman, John Chuang
    The Evolution of Cooperation under Cheap Pseudonyms. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:284-291 [Conf]
  12. John Chuang, Steve Kafka, Kim Norlen
    Efficiency and Performance of Web Cache Reporting Strategies. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2002, pp:120-129 [Conf]
  13. Nicolas Christin, Jens Grossklags, John Chuang
    Near Rationality and Competitive Equilibria in Networked Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  14. Nicolas Christin, John Chuang
    On the Cost of Participating in a Peer-to-Peer Network [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  15. Abhishek Ghose, Jens Grossklags, John Chuang
    Resilient Data-Centric Storage in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:11, pp:- [Journal]
  16. Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang
    A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:1010-1014 [Journal]
  17. Moshe Babaioff, John Chuang
    On the Optimality and Interconnection of Valiant Load-Balancing Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:80-88 [Conf]
  18. Ahsan Habib, Nicolas Christin, John Chuang
    Taking Advantage of Multihoming with Session Layer Striping. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  19. Ahsan Habib, John Chuang
    Improving application QoS with residential multihoming. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3323-3337 [Journal]

  20. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]


  21. Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]


  22. Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]


  23. User-directed routing: from theory, towards practice. [Citation Graph (, )][DBLP]


  24. Security and insurance management in networks with heterogeneous agents. [Citation Graph (, )][DBLP]


  25. Secure or insure?: a game-theoretic analysis of information security games. [Citation Graph (, )][DBLP]


  26. Modeling the adoption of new network architectures. [Citation Graph (, )][DBLP]


  27. Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002