The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shou-Hsuan Stephen Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shou-Hsuan Stephen Huang
    Height-Balanced Trees of Order (beta,gamma,delta). [Citation Graph (2, 11)][DBLP]
    ACM Trans. Database Syst., 1985, v:10, n:2, pp:261-284 [Journal]
  2. James R. Bitner, Shou-Hsuan Stephen Huang
    Key Comparison Optimal 2-3 Trees with Maximum Utilization. [Citation Graph (1, 0)][DBLP]
    SIAM J. Comput., 1981, v:10, n:3, pp:558-570 [Journal]
  3. Ming D. Wan, Shou-Hsuan Stephen Huang, Jianhua Yang
    Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:255-262 [Conf]
  4. Jianhua Yang, Shou-Hsuan Stephen Huang
    Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:1005-1010 [Conf]
  5. Jianhua Yang, Shou-Hsuan Stephen Huang, Ming D. Wan
    A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:231-236 [Conf]
  6. Han-Ching Wu, Shou-Hsuan Stephen Huang
    Detecting Stepping-Stone with Chaff Perturbations. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:85-90 [Conf]
  7. Wei-Min Jeng, Shou-Hsuan Stephen Huang
    An Efficient Sparse Matrix Based Parallel Image Reconstruction Algorithm for PET on SP2. [Citation Graph (0, 0)][DBLP]
    CBMS, 1999, pp:171-176 [Conf]
  8. Wei-Min Jeng, Shou-Hsuan Stephen Huang, David J. Yang
    A Portable PET Image Reconstruction System for Parallel Machines. [Citation Graph (0, 0)][DBLP]
    CBMS, 1998, pp:137-0 [Conf]
  9. Steve Szu-Yu Hu, Shou-Hsuan Stephen Huang, Barry E. Jacobs
    DAVID Universal Books Management System. [Citation Graph (0, 4)][DBLP]
    DASFAA, 1991, pp:430-438 [Conf]
  10. Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang, Günter R. Hagedorn M.
    R2H: A Framework to Transform Relations into Hypertext. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2002, pp:471-476 [Conf]
  11. Jianhua Yang, Shou-Hsuan Stephen Huang
    Improved Thumbprint and Its Application for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:433-442 [Conf]
  12. James Sablatura, Shou-Hsuan Stephen Huang
    Multi-User Interactive 3D Presentation System via the Internet. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2002, pp:279-284 [Conf]
  13. Yuan Cai, Shou-Hsuan Stephen Huang, Chien-Chi Lin
    Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 5. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1995, pp:105-112 [Conf]
  14. Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
    A Sub-linear Parallel Algorithm for Some Dynamic Programming Problems. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1990, pp:261-264 [Conf]
  15. Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
    On Embeddings of Rectangles into Optimal Squares. [Citation Graph (0, 0)][DBLP]
    ICPP, 1993, pp:73-76 [Conf]
  16. Wei-Min Jeng, Shou-Hsuan Stephen Huang
    Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:245-252 [Conf]
  17. Chien-Chi Lin, Xin Ma, Shou-Hsuan Stephen Huang
    Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three. [Citation Graph (0, 0)][DBLP]
    ICPP, Vol. 2, 1996, pp:62-69 [Conf]
  18. Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang
    Similarity Among Web pages Based on their Link Structure. [Citation Graph (0, 0)][DBLP]
    IKE, 2003, pp:232-238 [Conf]
  19. Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
    A New Combinatorial Approach to Optimal Embeddings of Rectangles. [Citation Graph (0, 0)][DBLP]
    IPPS, 1994, pp:715-722 [Conf]
  20. Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
    Resistance Analysis to Intruders' Evasion of Detecting Intrusion. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:383-397 [Conf]
  21. Shou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada
    Exploring Similarity among Web Pages Using the Hyperlink Structure. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:344-348 [Conf]
  22. Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang
    A Dynamic Mobility Management Scheme for VoIP Services. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:340-345 [Conf]
  23. Wei-Min Jeng, Shou-Hsuan Stephen Huang
    An Efficient Parallel EM Algorithm: A Sparse Matrix Compaction Technique. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2954-2960 [Conf]
  24. Venkatraman Viswanathan, Shou-Hsuan Stephen Huang, Hongfei Liu
    Parallel dynamic programming. [Citation Graph (0, 0)][DBLP]
    SPDP, 1990, pp:497-500 [Conf]
  25. Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang
    WebLQM : A Web Community Examiner. [Citation Graph (0, 0)][DBLP]
    WWW Posters, 2001, pp:- [Conf]
  26. Shou-Hsuan Stephen Huang, C. K. Wong
    Generalized Binary Split Trees. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1984, v:21, n:, pp:113-123 [Journal]
  27. Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
    A New Combinatorial Approach to Optimal Embeddings of Rectangles. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1996, v:16, n:2, pp:161-180 [Journal]
  28. Shou-Hsuan Stephen Huang
    Ordered Priority Queues. [Citation Graph (0, 0)][DBLP]
    BIT, 1986, v:26, n:4, pp:442-450 [Journal]
  29. Shou-Hsuan Stephen Huang
    A VLSI Partition Algorithm. [Citation Graph (0, 0)][DBLP]
    BIT, 1988, v:28, n:2, pp:215-226 [Journal]
  30. Shou-Hsuan Stephen Huang, Venkatraman Viswanathan
    On the Construction of Weighted Time-Optimal B-Trees. [Citation Graph (0, 0)][DBLP]
    BIT, 1990, v:30, n:2, pp:207-215 [Journal]
  31. Shou-Hsuan Stephen Huang, C. K. Wong
    Binary Search Trees with Limited Rotation. [Citation Graph (0, 0)][DBLP]
    BIT, 1983, v:23, n:4, pp:436-455 [Journal]
  32. Jianhua Yang, Shou-Hsuan Stephen Huang
    Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:137-144 [Journal]
  33. Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
    On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:3, pp:123-129 [Journal]
  34. Shou-Hsuan Stephen Huang
    Optimal Multiway Split Trees. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1987, v:8, n:1, pp:146-156 [Journal]
  35. Shou-Hsuan Stephen Huang, C. K. Wong
    Optimal Binary Split Trees. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1984, v:5, n:1, pp:69-79 [Journal]
  36. Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
    A Sublinear Parallel Algorithm for Some Dynamic Programming Problems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1992, v:106, n:2, pp:361-371 [Journal]
  37. Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
    Parallel Dynamic Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:3, pp:326-328 [Journal]
  38. Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang
    Stepping-Stone Detection Via Request-Response Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:276-285 [Conf]

  39. Detecting Stepping-Stone Connection Using Association Rule Mining. [Citation Graph (, )][DBLP]


  40. Detecting Masqueraders Using High Frequency Commands as Signatures. [Citation Graph (, )][DBLP]


  41. Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. [Citation Graph (, )][DBLP]


  42. Masquerade Detection Using Command Prediction and Association Rules Mining. [Citation Graph (, )][DBLP]


  43. Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. [Citation Graph (, )][DBLP]


  44. A Multidimensional Flow Cytometry Data Classification. [Citation Graph (, )][DBLP]


  45. Stepping-stone detection algorithm based on order preserving mapping. [Citation Graph (, )][DBLP]


  46. An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. [Citation Graph (, )][DBLP]


  47. User Behavior Analysis in Masquerade Detection Using Principal Component Analysis. [Citation Graph (, )][DBLP]


  48. Integrating Direct3D Programming into Computer Science Curriculum. [Citation Graph (, )][DBLP]


  49. Detecting Stepping-Stone Intruders with Long Connection Chains. [Citation Graph (, )][DBLP]


  50. Performance of Neural Networks in Stepping-Stone Intrusion Detection. [Citation Graph (, )][DBLP]


  51. Mining TCP/IP packets to detect stepping-stone intrusion. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002