|
Search the dblp DataBase
Shou-Hsuan Stephen Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shou-Hsuan Stephen Huang
Height-Balanced Trees of Order (beta,gamma,delta). [Citation Graph (2, 11)][DBLP] ACM Trans. Database Syst., 1985, v:10, n:2, pp:261-284 [Journal]
- James R. Bitner, Shou-Hsuan Stephen Huang
Key Comparison Optimal 2-3 Trees with Maximum Utilization. [Citation Graph (1, 0)][DBLP] SIAM J. Comput., 1981, v:10, n:3, pp:558-570 [Journal]
- Ming D. Wan, Shou-Hsuan Stephen Huang, Jianhua Yang
Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:255-262 [Conf]
- Jianhua Yang, Shou-Hsuan Stephen Huang
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:1005-1010 [Conf]
- Jianhua Yang, Shou-Hsuan Stephen Huang, Ming D. Wan
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:231-236 [Conf]
- Han-Ching Wu, Shou-Hsuan Stephen Huang
Detecting Stepping-Stone with Chaff Perturbations. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:85-90 [Conf]
- Wei-Min Jeng, Shou-Hsuan Stephen Huang
An Efficient Sparse Matrix Based Parallel Image Reconstruction Algorithm for PET on SP2. [Citation Graph (0, 0)][DBLP] CBMS, 1999, pp:171-176 [Conf]
- Wei-Min Jeng, Shou-Hsuan Stephen Huang, David J. Yang
A Portable PET Image Reconstruction System for Parallel Machines. [Citation Graph (0, 0)][DBLP] CBMS, 1998, pp:137-0 [Conf]
- Steve Szu-Yu Hu, Shou-Hsuan Stephen Huang, Barry E. Jacobs
DAVID Universal Books Management System. [Citation Graph (0, 4)][DBLP] DASFAA, 1991, pp:430-438 [Conf]
- Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang, Günter R. Hagedorn M.
R2H: A Framework to Transform Relations into Hypertext. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2002, pp:471-476 [Conf]
- Jianhua Yang, Shou-Hsuan Stephen Huang
Improved Thumbprint and Its Application for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:433-442 [Conf]
- James Sablatura, Shou-Hsuan Stephen Huang
Multi-User Interactive 3D Presentation System via the Internet. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2002, pp:279-284 [Conf]
- Yuan Cai, Shou-Hsuan Stephen Huang, Chien-Chi Lin
Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 5. [Citation Graph (0, 0)][DBLP] ICPP (3), 1995, pp:105-112 [Conf]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
A Sub-linear Parallel Algorithm for Some Dynamic Programming Problems. [Citation Graph (0, 0)][DBLP] ICPP (3), 1990, pp:261-264 [Conf]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
On Embeddings of Rectangles into Optimal Squares. [Citation Graph (0, 0)][DBLP] ICPP, 1993, pp:73-76 [Conf]
- Wei-Min Jeng, Shou-Hsuan Stephen Huang
Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers. [Citation Graph (0, 0)][DBLP] ICPP, 1998, pp:245-252 [Conf]
- Chien-Chi Lin, Xin Ma, Shou-Hsuan Stephen Huang
Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three. [Citation Graph (0, 0)][DBLP] ICPP, Vol. 2, 1996, pp:62-69 [Conf]
- Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang
Similarity Among Web pages Based on their Link Structure. [Citation Graph (0, 0)][DBLP] IKE, 2003, pp:232-238 [Conf]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
A New Combinatorial Approach to Optimal Embeddings of Rectangles. [Citation Graph (0, 0)][DBLP] IPPS, 1994, pp:715-722 [Conf]
- Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:383-397 [Conf]
- Shou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada
Exploring Similarity among Web Pages Using the Hyperlink Structure. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:344-348 [Conf]
- Eunjung Lee, Jinsuk Baek, Shou-Hsuan Stephen Huang
A Dynamic Mobility Management Scheme for VoIP Services. [Citation Graph (0, 0)][DBLP] ITNG, 2006, pp:340-345 [Conf]
- Wei-Min Jeng, Shou-Hsuan Stephen Huang
An Efficient Parallel EM Algorithm: A Sparse Matrix Compaction Technique. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:2954-2960 [Conf]
- Venkatraman Viswanathan, Shou-Hsuan Stephen Huang, Hongfei Liu
Parallel dynamic programming. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:497-500 [Conf]
- Jesús Ubaldo Quevedo, Shou-Hsuan Stephen Huang
WebLQM : A Web Community Examiner. [Citation Graph (0, 0)][DBLP] WWW Posters, 2001, pp:- [Conf]
- Shou-Hsuan Stephen Huang, C. K. Wong
Generalized Binary Split Trees. [Citation Graph (0, 0)][DBLP] Acta Inf., 1984, v:21, n:, pp:113-123 [Journal]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
A New Combinatorial Approach to Optimal Embeddings of Rectangles. [Citation Graph (0, 0)][DBLP] Algorithmica, 1996, v:16, n:2, pp:161-180 [Journal]
- Shou-Hsuan Stephen Huang
Ordered Priority Queues. [Citation Graph (0, 0)][DBLP] BIT, 1986, v:26, n:4, pp:442-450 [Journal]
- Shou-Hsuan Stephen Huang
A VLSI Partition Algorithm. [Citation Graph (0, 0)][DBLP] BIT, 1988, v:28, n:2, pp:215-226 [Journal]
- Shou-Hsuan Stephen Huang, Venkatraman Viswanathan
On the Construction of Weighted Time-Optimal B-Trees. [Citation Graph (0, 0)][DBLP] BIT, 1990, v:30, n:2, pp:207-215 [Journal]
- Shou-Hsuan Stephen Huang, C. K. Wong
Binary Search Trees with Limited Rotation. [Citation Graph (0, 0)][DBLP] BIT, 1983, v:23, n:4, pp:436-455 [Journal]
- Jianhua Yang, Shou-Hsuan Stephen Huang
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. [Citation Graph (0, 0)][DBLP] Computers & Security, 2007, v:26, n:2, pp:137-144 [Journal]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Rakesh M. Verma
On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:63, n:3, pp:123-129 [Journal]
- Shou-Hsuan Stephen Huang
Optimal Multiway Split Trees. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1987, v:8, n:1, pp:146-156 [Journal]
- Shou-Hsuan Stephen Huang, C. K. Wong
Optimal Binary Split Trees. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1984, v:5, n:1, pp:69-79 [Journal]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
A Sublinear Parallel Algorithm for Some Dynamic Programming Problems. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1992, v:106, n:2, pp:361-371 [Journal]
- Shou-Hsuan Stephen Huang, Hongfei Liu, Venkatraman Viswanathan
Parallel Dynamic Programming. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:3, pp:326-328 [Journal]
- Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang
Stepping-Stone Detection Via Request-Response Traffic Analysis. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:276-285 [Conf]
Detecting Stepping-Stone Connection Using Association Rule Mining. [Citation Graph (, )][DBLP]
Detecting Masqueraders Using High Frequency Commands as Signatures. [Citation Graph (, )][DBLP]
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. [Citation Graph (, )][DBLP]
Masquerade Detection Using Command Prediction and Association Rules Mining. [Citation Graph (, )][DBLP]
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. [Citation Graph (, )][DBLP]
A Multidimensional Flow Cytometry Data Classification. [Citation Graph (, )][DBLP]
Stepping-stone detection algorithm based on order preserving mapping. [Citation Graph (, )][DBLP]
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. [Citation Graph (, )][DBLP]
User Behavior Analysis in Masquerade Detection Using Principal Component Analysis. [Citation Graph (, )][DBLP]
Integrating Direct3D Programming into Computer Science Curriculum. [Citation Graph (, )][DBLP]
Detecting Stepping-Stone Intruders with Long Connection Chains. [Citation Graph (, )][DBLP]
Performance of Neural Networks in Stepping-Stone Intrusion Detection. [Citation Graph (, )][DBLP]
Mining TCP/IP packets to detect stepping-stone intrusion. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.452secs
|