|
Search the dblp DataBase
Ying-Dar Lin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai
Scalable Automaton Matching for High-Speed Deep Content Inspection. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:858-863 [Conf]
- Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor. [Citation Graph (0, 0)][DBLP] ASAP, 2005, pp:113-118 [Conf]
- Yuan-Cheng Lai, Ying-Dar Lin
Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds. [Citation Graph (0, 0)][DBLP] ICCCN, 1997, pp:70-75 [Conf]
- Yuan-Cheng Lai, Ying-Dar Lin, Wei-Che Yu, Yuh-Tay Lin
GMNF-DVMRP : A Modified Version of Distance Vector Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP] ICCCN, 1997, pp:65-69 [Conf]
- Ching-Ming Tien, Shuo-Yen Wen, Ying-Dar Lin, Yuan-Cheng Lai
Request Scheduling for Differentiated QoS at Website Gateway. [Citation Graph (0, 0)][DBLP] ICOIN, 2006, pp:542-551 [Conf]
- Po-Ching Lin, Ming-Dao Liu, Ying-Dar Lin, Yuan-Cheng Lai
An Early Decision Algorithm to Accelerate Web Content Filtering. [Citation Graph (0, 0)][DBLP] ICOIN, 2006, pp:833-841 [Conf]
- Huan-Yun Wei, Ching-Chuang Chiang, Ying-Dar Lin
Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1415-1420 [Conf]
- Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai
VPN Gateways over Network Processors: Implementation and Evaluation. [Citation Graph (0, 0)][DBLP] IEEE Real-Time and Embedded Technology and Applications Symposium, 2005, pp:480-486 [Conf]
- Ching-Ming Tien, Cho-Jun Lee, Po-Wen Cheng, Ying-Dar Lin
SOAP Request Scheduling for Differentiated Quality of Service. [Citation Graph (0, 0)][DBLP] WISE Workshops, 2005, pp:63-72 [Conf]
- Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai
Designing an Integrated Architecture for Network Content Security Gateways. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:11, pp:66-72 [Journal]
- Joe Shang-chieh Wu, Ying-Dar Lin
An efficient and orderly implementation of bypass queue under bursty traffic. [Citation Graph (0, 0)][DBLP] Parallel Computing, 1998, v:24, n:14, pp:2143-2148 [Journal]
- Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic. [Citation Graph (0, 0)][DBLP] IPDPS, 2007, pp:1-9 [Conf]
- Ying-Dar Lin, Shih-Chiang Tsao, Un-Pio Leong
On-the-fly TCP path selection algorithm in access link load balancing. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:2, pp:351-357 [Journal]
- Yi-Neng Lin, Yao-Chung Chang, Ying-Dar Lin, Yuan-Cheng Lai
Resource allocation in network processors for network intrusion prevention systems. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:7, pp:1030-1036 [Journal]
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors. [Citation Graph (, )][DBLP]
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway. [Citation Graph (, )][DBLP]
DiffServ over Network Processors: Implementation and Evaluation. [Citation Graph (, )][DBLP]
Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems. [Citation Graph (, )][DBLP]
A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations. [Citation Graph (, )][DBLP]
On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS. [Citation Graph (, )][DBLP]
Multiple-resource request scheduling for differentiated QoS at website gateway. [Citation Graph (, )][DBLP]
Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway". [Citation Graph (, )][DBLP]
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. [Citation Graph (, )][DBLP]
Using String Matching for Deep Packet Inspection. [Citation Graph (, )][DBLP]
Profiling and accelerating string matching algorithms in three network content security applications. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.301secs
|