The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eric Y. Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eric Y. Chen, Timothy M. Chan
    A Space-Efficient Algorithm for Segment Intersection. [Citation Graph (0, 0)][DBLP]
    CCCG, 2003, pp:68-71 [Conf]
  2. Eric Y. Chen, Timothy M. Chan
    Space-Efficient Algorithms for Klee's Measure Problem. [Citation Graph (0, 0)][DBLP]
    CCCG, 2005, pp:27-30 [Conf]
  3. Hervé Brönnimann, Timothy M. Chan, Eric Y. Chen
    Towards in-place geometric algorithms and data structures. [Citation Graph (0, 0)][DBLP]
    Symposium on Computational Geometry, 2004, pp:239-246 [Conf]
  4. Timothy M. Chan, Eric Y. Chen
    Multi-pass geometric algorithms. [Citation Graph (0, 0)][DBLP]
    Symposium on Computational Geometry, 2005, pp:180-189 [Conf]
  5. Eric Y. Chen, Akinori Yonezawa
    FSP: Federation of Service Providers on the Internet. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1213-1218 [Conf]
  6. Eric Y. Chen
    AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2001, pp:1-15 [Conf]
  7. Yoshinori Kobayashi, Eric Y. Chen, Yoshihiro Oyama, Akinori Yonezawa
    Protecting Web Servers from Octopus Attacks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2006, pp:82-85 [Conf]
  8. Yuji Soejima, Eric Y. Chen, Hitoshi Fuji
    Detecting DDoS Attacks by Analyzing Client Response Patterns. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2005, pp:98-101 [Conf]
  9. Timothy M. Chan, Eric Y. Chen
    Multi-Pass Geometric Algorithms. [Citation Graph (0, 0)][DBLP]
    Discrete & Computational Geometry, 2007, v:37, n:1, pp:79-102 [Journal]

  10. Convex Hull of the Union of Convex Objects in the Plane: an Adaptive Analysis. [Citation Graph (, )][DBLP]


  11. Optimal in-place algorithms for 3-D convex hulls and 2-D segment intersection. [Citation Graph (, )][DBLP]


  12. Geometric Streaming Algorithms with a Sorting Primitive. [Citation Graph (, )][DBLP]


  13. Using Call Patterns to Detect Unwanted Communication Callers. [Citation Graph (, )][DBLP]


  14. In-place 2-d nearest neighbor search. [Citation Graph (, )][DBLP]


  15. Succinct geometric indexes supporting point location queries. [Citation Graph (, )][DBLP]


  16. Using end-to-middle security to protect against evil twin access points. [Citation Graph (, )][DBLP]


  17. Scalable Detection of SIP Fuzzing Attacks. [Citation Graph (, )][DBLP]


  18. A countermeasure againstDDOS attacks using active networks technologies. [Citation Graph (, )][DBLP]


  19. Optimal in-place and cache-oblivious algorithms for 3-d convex hulls and 2-d segment intersection. [Citation Graph (, )][DBLP]


  20. Succinct Geometric Indexes Supporting Point Location Queries [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002