The SCEAS System
Navigation Menu

Search the dblp DataBase


Xiao Su: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiao Su, Benjamin W. Wah
    Streaming Video with Optimized Reconstruction-Based DCT. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (I), 2000, pp:271-274 [Conf]
  2. Xiao Su, Yi Shang, Yuqing Mai
    Delay-sensitive delivery of scalable coded images over peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1627-1630 [Conf]
  3. Benjamin W. Wah, Xiao Su
    Streaming Video with Transformation-Based Error Concealment and Reconstruction. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 1, 1999, pp:238-243 [Conf]
  4. Yuan Fan, Xiao Su
    In-Memory Storage and Search System for Event Management in Network Security. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:734-739 [Conf]
  5. Xiao Su
    Loss Aware Rate Allocations in H.263 Coded Video Transmissions. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:374-378 [Conf]
  6. Xiao Su, Yi Shang
    Error Concealment of Transform Coded Images With Continuous QoS. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:699-703 [Conf]
  7. Yuqing Mai, Radhika Upadrashta, Xiao Su
    J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:804-808 [Conf]
  8. Mehdi Salour, Xiao Su
    Dynamic Two-Layer Signature-Based IDS with Unequal Databases. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:77-82 [Conf]
  9. Christina N. Michael, Xiao Su
    Incorporating a New Hash Function in OpenPGP and SSL/TLS. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:556-561 [Conf]
  10. Benjamin W. Wah, Xiao Su, Dong Lin
    A Survey of Error-Concealment Schemes for Real-Time Audio and Video Transmissions over the Internet*. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2000, pp:17-24 [Conf]
  11. Benjamin W. Wah, Dong Lin, Xiao Su
    Streaming Real-Time Audio and Video Data with Transformation-Based Error Concealment and Reconstruction. [Citation Graph (0, 0)][DBLP]
    WISE, 2000, pp:2-13 [Conf]
  12. Xiao Su, Benjamin W. Wah
    Loss Aware Rate Allocations in H.263 Coded Video Transmissions. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 2005, v:14, n:6, pp:1157-1172 [Journal]
  13. Xiao Su, Rod Fatoohi, Tao Wang
    Optimizing transmission time of scalable coded images in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:10, n:5, pp:413-421 [Journal]
  14. Xiao Su, Tao Wang
    Sequence of linear programming for transmission of fine-scalable coded content in bandwidth-limited environments. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2006, v:11, n:5, pp:455-466 [Journal]
  15. Xiao Su, Benjamin W. Wah
    Multidescription video streaming with optimized reconstruction-based DCT and neural-network compensations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2001, v:3, n:1, pp:123-131 [Journal]
  16. Christopher Baker, Arash Shaban-Nejad, Xiao Su, Volker Haarslev, Greg Butler
    Semantic web infrastructure for fungal enzyme biotechnologists. [Citation Graph (0, 0)][DBLP]
    J. Web Sem., 2006, v:4, n:3, pp:168-180 [Journal]
  17. Christopher Baker, Xiao Su, Greg Butler, Volker Haarslev
    Ontoligent Interactive Query Tool. [Citation Graph (0, 0)][DBLP]
    CSWWS, 2006, pp:155-169 [Conf]

  18. Adaptive Voice Spam Control with User Behavior Analysis. [Citation Graph (, )][DBLP]

  19. Optimal Incentive-Based Scheduling of Layered Video Packets in P2P Streaming. [Citation Graph (, )][DBLP]

  20. Local Reference with Early Termination in H.264 Motion Estimation. [Citation Graph (, )][DBLP]

  21. A User-Driven Transmission Scheme for Voice Over IP Applications. [Citation Graph (, )][DBLP]

  22. Detection and filtering Spam over Internet Telephony - a user-behavior-aware intermediate-network-based approach. [Citation Graph (, )][DBLP]

  23. Optimal dissemination of layered videos in P2P-Based IPTV networks. [Citation Graph (, )][DBLP]

  24. A new TCP congestion control algorithm for media streaming. [Citation Graph (, )][DBLP]

  25. Secure Compressed Domain Watermarking for H.264 Video. [Citation Graph (, )][DBLP]

  26. An Evaluation of Transport Protocols in Peer-to-Peer Media Streaming. [Citation Graph (, )][DBLP]

  27. Exploiting Reference Frame History in H.264/AVC Motion Estimation. [Citation Graph (, )][DBLP]

  28. CuMPE: Cluster-Management and Power-Efficient protocol for wireless sensor networks. [Citation Graph (, )][DBLP]

  29. A survey of internet worm detection and containment. [Citation Graph (, )][DBLP]

Search in 0.043secs, Finished in 0.045secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002