The SCEAS System
Navigation Menu

Search the dblp DataBase


Lih-Chyau Wuu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Longsong Lin, Ming-Shou Liu, Lih-Chyau Wuu, Chun-Yeh Tsai
    A QoS-Based Resource Reservation Protocol for Priority-Differentiated Delay-Bounded Multicast. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1999, pp:549-560 [Conf]
  2. Shing-Tsaan Huang, Lih-Chyau Wuu, Ming-Shin Tsai
    Distributed Execution Model for Self-Stabilizing Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1994, pp:432-439 [Conf]
  3. Lih-Chyau Wuu, Hui-Chun Chen
    A Scalable Framework for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:225-238 [Conf]
  4. Ting-Yuan Wang, Lih-Chyau Wuu, Shing-Tsaan Huang
    A Scalable Core Migration Protocol for Dynamic Multicast Tree. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2002, pp:48-0 [Conf]
  5. Lih-Chyau Wuu, Ming-Shou Liu, Longsong Lin, Yao-Te Huang
    Decentralized Reconfiguration of Multicast Trees on Faulty Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  6. Shing-Tsaan Huang, Lih-Chyau Wuu
    Self-Stabilizing Token Circulation in Uniform Networks. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1997, v:10, n:4, pp:181-187 [Journal]
  7. Lih-Chyau Wuu, Shing-Tsaan Huang
    Identity Assignment in Uniform Synchronous Rings. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:49, n:5, pp:257-262 [Journal]
  8. Ting-Yuan Wang, Lih-Chyau Wuu, Shing-Tsaan Huang
    A Scalable Core Migration Protocol for Dynamic Multicast Tree. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:3, pp:479-501 [Journal]
  9. Lih-Chyau Wuu, Shing-Tsaan Huang
    Distributed Self-Stabilizing Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:2, pp:307-319 [Journal]
  10. Lih-Chyau Wuu, Longsong Lin, Shing-Chyi Shiao
    Constructing Delay-Bounded Multicast Trees in Computer Networks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:3, pp:507-524 [Journal]
  11. Tzong-Jye Liu, Lih-Chyau Wuu
    Randomized three-state alternator for uniform rings. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:10, pp:1347-1351 [Journal]
  12. Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen
    A longest prefix first search tree for IP lookup. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3354-3367 [Journal]
  13. Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen
    Building intrusion pattern miner for Snort network intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1699-1715 [Journal]

  14. An Adaptive Control Scheme of Reserved Bandwidth for RPR in Steering Mode. [Citation Graph (, )][DBLP]

  15. A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. [Citation Graph (, )][DBLP]

  16. A polymorphic shellcode detection mechanism in the network. [Citation Graph (, )][DBLP]

  17. Zero-Collision RFID Tags Identification Based on CDMA. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002