|
Search the dblp DataBase
Dong Xuan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:84-91 [Conf]
- Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan
Sensor Network Configuration Under Physical Attacks. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:23-32 [Conf]
- Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
Scalable QoS Guaranteed Communication Services for Real-Time Applications. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:180-187 [Conf]
- Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang
Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:408-417 [Conf]
- Dong Xuan, Weijia Jia
Distributed Admission Control for Anycast Flows with QoS Requirements. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:292-300 [Conf]
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP] ICPP, 2003, pp:483-492 [Conf]
- Weijia Jia, Gaochao Xu, Dong Xuan, Wei Zhao
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP] ICPP, 1999, pp:508-515 [Conf]
- Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
Utilization-Based Admission Control for Real-Time Applications. [Citation Graph (0, 0)][DBLP] ICPP, 2000, pp:251-0 [Conf]
- Dong Xuan, Weijia Jia, Wei Zhao
Routing Algorithms for Anycast Messages. [Citation Graph (0, 0)][DBLP] ICPP, 1998, pp:122-0 [Conf]
- Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:266-281 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:669-678 [Conf]
- Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu
A design of overlay anonymous multicast protocol. [Citation Graph (0, 0)][DBLP] IPDPS, 2006, pp:- [Conf]
- Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai
Deploying wireless sensors to achieve both coverage and connectivity. [Citation Graph (0, 0)][DBLP] MobiHoc, 2006, pp:131-142 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
A Study of Providing Statistical QoS in a Differentiated Sevices Network. [Citation Graph (0, 0)][DBLP] NCA, 2003, pp:297-304 [Conf]
- Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan, Wei Zhao
Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP] IEEE Real Time Technology and Applications Symposium, 2002, pp:266-275 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] IEEE Real Time Technology and Applications Symposium, 2001, pp:127-129 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] IEEE Real-Time Systems Symposium, 2001, pp:289-298 [Conf]
- Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
- Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan
Effective query aggregation for data services in sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:18, pp:3733-3744 [Journal]
- Wei Yu, Sriram Chellappan, Dong Xuan
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2005, v:21, n:1, pp:209-219 [Journal]
- Shengquan Wang, Dong Xuan, Wei Zhao
Analyzing and enhancing the resilience of structured peer-to-peer systems. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2005, v:65, n:2, pp:207-219 [Journal]
- Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei Liu
Mutual anonymous overlay multicast. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1205-1216 [Journal]
- Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li
Utilization-Based Admission Control for Scalable Real-Time Communication. [Citation Graph (0, 0)][DBLP] Real-Time Systems, 2003, v:24, n:2, pp:171-202 [Journal]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing absolute differentiated services for real-time applications in static-priority scheduling networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:326-339 [Journal]
- Weijia Jia, Dong Xuan, Wanqing Tu, Lidong Lin, Wei Zhao
Distributed Admission Control for Anycast Flows. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:8, pp:673-686 [Journal]
- Weijia Jia, Wei Zhao, Dong Xuan, Gaochao Xu
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:10, pp:984-1000 [Journal]
- Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:619-632 [Journal]
- Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao
Design and Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:3, pp:276-288 [Journal]
- Dong Xuan, Weijia Jia, Wei Zhao, HongWen Zhu
A Routing Protocol for Anycast Messages. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:6, pp:571-588 [Journal]
- Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan, Changqing Xu
Mobility Limited Flip-Based Sensor Networks Deployment. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:2, pp:199-211 [Journal]
- Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
- Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
Distributed policy processing in active-service based infrastructures. [Citation Graph (0, 0)][DBLP] Int. J. Communication Systems, 2006, v:19, n:7, pp:727-750 [Journal]
- Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:235-244 [Conf]
- Zhimin Yang, Eylem Ekici, Dong Xuan
A Localization-Based Anti-Sensor Network System. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:2396-2400 [Conf]
- Sriram Chellappan, Wenjun Gu, Xiaole Bai, Dong Xuan, Bin Ma, Kaizhong Zhang
Deploying Wireless Sensor Networks under Limited Mobility Constraints. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2007, v:6, n:10, pp:1142-1157 [Journal]
- Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan, Weijia Jia
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:12, pp:1784-1796 [Journal]
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. [Citation Graph (, )][DBLP]
A new cell counter based attack against tor. [Citation Graph (, )][DBLP]
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. [Citation Graph (, )][DBLP]
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. [Citation Graph (, )][DBLP]
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks. [Citation Graph (, )][DBLP]
Blind Detection of Spread Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]
D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks. [Citation Graph (, )][DBLP]
Malicious Shellcode Detection with Virtual Memory Snapshots. [Citation Graph (, )][DBLP]
Pattern Mutation in Wireless Sensor Deployment. [Citation Graph (, )][DBLP]
Network Decoupling for Secure Communications in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. [Citation Graph (, )][DBLP]
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. [Citation Graph (, )][DBLP]
Low-connectivity and full-coverage three dimensional wireless sensor networks. [Citation Graph (, )][DBLP]
PerFallD: A pervasive fall detection system using mobile phones. [Citation Graph (, )][DBLP]
Link-layer protection in 802.11i WLANS with dummy authentication. [Citation Graph (, )][DBLP]
Stealthy video capturer: a new video-based spyware in 3G smartphones. [Citation Graph (, )][DBLP]
Turning heterogeneity into an advantage in wireless ad-hoc network routing. [Citation Graph (, )][DBLP]
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. [Citation Graph (, )][DBLP]
Search in 0.087secs, Finished in 0.090secs
|