The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hongli Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hongjie Sun, Binxing Fang, Hongli Zhang
    User-Perceived Web QoS Measurement and Evaluation System. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:157-165 [Conf]
  2. Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang
    Developing a user-level middleware for out-of-core computation on Grids. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:686-690 [Conf]
  3. Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang
    Topology-Based Macroscopical Response and Control Technology for Network Security Event. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:560-566 [Conf]
  4. Jun Zheng, Mingzeng Hu, Hongli Zhang
    Usage Behavior Profiling for Anomaly Detection using Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Communication Systems and Applications, 2005, pp:107-112 [Conf]
  5. Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang
    Measurement and Modeling of Large-Scale Peer-to-Peer Storage System. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:270-277 [Conf]
  6. Wei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao
    Ad Hoc Debugging Environment for Grid Applications. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:113-120 [Conf]
  7. Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang
    PGMS: A P2P-Based Grid Monitoring System. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:903-906 [Conf]
  8. Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang
    Network Performance Measurement Methodologies in PGMS. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:466-473 [Conf]
  9. Weizhe Zhang, Hongli Zhang, Hui He, Mingzeng Hu
    Multisite Task Scheduling on Distributed Computing Grid. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:57-64 [Conf]
  10. Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang
    Anomaly Detection Using Fast SOFM. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:530-537 [Conf]
  11. Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang
    Fast Detection of Worm Infection for Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:672-681 [Conf]
  12. Hui He, Mingzeng Hu, Hongli Zhang
    Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:155-159 [Conf]
  13. Weizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu
    Multisite Resource Selection and Scheduling Algorithm on Computational Grid. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  14. Zhiyu Hao, Xiao-chun Yun, Hongli Zhang
    An Efficient Routing Mechanism in Network Simulation. [Citation Graph (0, 0)][DBLP]
    PADS, 2006, pp:150-157 [Conf]
  15. Hui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang
    On the Effectiveness of multi-similarity for early detection of worms. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:229-233 [Conf]
  16. Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang
    The Practice of I/O Optimizations for Out-of-Core Computation. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:81-85 [Conf]
  17. Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang
    Explaining BitTorrent Traffic Self-Similarity. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:839-843 [Conf]
  18. Hongjie Sun, Binxing Fang, Hongli Zhang
    A Distributed Architecture for Network Performance Measurement and Evaluation System. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:471-475 [Conf]
  19. Weizhe Zhang, Mingzeng Hu, Hongli Zhang
    Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:1063-1067 [Conf]
  20. XiaoFeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang
    A Model for Estimating the Performance of Synchronous Parallel Network Simulation. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:548-553 [Conf]
  21. Wei Wang, Binxing Fang, Hongli Zhang
    Grid-Enabled Parallel Debugging Environment: A Portal Solution. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2004, pp:856-862 [Conf]
  22. Hongli Zhang, Margaret Martonosi
    A Mathematical Cache Miss Analysis for Pointer Data Structures. [Citation Graph (0, 0)][DBLP]
    PPSC, 2001, pp:- [Conf]
  23. Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang
    A parallel programming interface for out-of-core cluster applications. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2006, v:9, n:3, pp:321-327 [Journal]
  24. Wu Yang, Bin-Xing Fang, Bo Liu, Hong-Li Zhang
    Intrusion detection system for high-speed network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:13, pp:1288-1294 [Journal]
  25. Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang
    Defending against distributed denial-of-service attacks with an auction-based method. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2006, v:4, n:3, pp:341-351 [Journal]
  26. Weizhe Zhang, Mingzeng Hu, Hongli Zhang, Kaipeng Liu
    A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1855-1862 [Journal]

  27. A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. [Citation Graph (, )][DBLP]


  28. Scenario Discovery Using Abstracted Correlation Graph. [Citation Graph (, )][DBLP]


  29. Alertclu: A Realtime Alert Aggregation and Correlation System. [Citation Graph (, )][DBLP]


  30. Analyzing BitTorrent Traffic Across Large Network. [Citation Graph (, )][DBLP]


  31. On Destination Set in IP-Level Topology Measurement. [Citation Graph (, )][DBLP]


  32. IDS alarms reduction using data mining. [Citation Graph (, )][DBLP]


  33. Modeling network attacks for scenario construction. [Citation Graph (, )][DBLP]


  34. 2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems. [Citation Graph (, )][DBLP]


  35. Optimal Network Security Strengthening Using Attack-Defense Game Model. [Citation Graph (, )][DBLP]


  36. T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification Algorithm. [Citation Graph (, )][DBLP]


  37. Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System. [Citation Graph (, )][DBLP]


  38. Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. [Citation Graph (, )][DBLP]


  39. HiFiP2P: The Simulator Capable of Massive Nodes and MeasuredUnderlay. [Citation Graph (, )][DBLP]


  40. Online Granular Prediction Model for Web Prefetching. [Citation Graph (, )][DBLP]


  41. Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems. [Citation Graph (, )][DBLP]


  42. HHMA: A Hierarchical Hybrid Memory Architecture Sharing Multi-Port Memory. [Citation Graph (, )][DBLP]


  43. A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. [Citation Graph (, )][DBLP]


  44. Intrusion detection alarms reduction using root cause analysis and clustering. [Citation Graph (, )][DBLP]


Search in 0.071secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002