|
Search the dblp DataBase
Dongyan Xu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
Protection mechanisms for application service hosting platforms. [Citation Graph (0, 0)][DBLP] CCGRID, 2004, pp:656-663 [Conf]
- Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
QoS-Aware Discovery of Wide-Area Distributed Services. [Citation Graph (0, 0)][DBLP] CCGRID, 2001, pp:92-99 [Conf]
- Simon G. M. Koo, Catherine Rosenberg, Dongyan Xu
Analysis of Parallel Downloading for Large File Distribution. [Citation Graph (0, 0)][DBLP] FTDCS, 2003, pp:128-0 [Conf]
- Xuxian Jiang, Dongyan Xu
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. [Citation Graph (0, 0)][DBLP] HPDC, 2003, pp:174-183 [Conf]
- Dongyan Xu, Klara Nahrstedt, Arun Viswanathan, Duangdao Wichadakul
QoS and Contention-Aware Multi-Resource Reservation. [Citation Graph (0, 0)][DBLP] HPDC, 2000, pp:3-10 [Conf]
- Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP] ICDCS, 2006, pp:38- [Conf]
- Dongyan Xu, Mohamed Hefeeda, Susanne E. Hambrusch, Bharat K. Bhargava
On Peer-to-Peer Media Streaming. [Citation Graph (0, 0)][DBLP] ICDCS, 2002, pp:363-371 [Conf]
- Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt
Multimedia Service Configuration and Reservation in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:512-519 [Conf]
- Yi Cui, Dongyan Xu, Klara Nahrstedt
SMART: A Scalable Middleware solution for Ubiquitous Multimedia Service Delivery. [Citation Graph (0, 0)][DBLP] ICME, 2001, pp:- [Conf]
- Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt
Resource-Aware Configuration of Ubiquitous Multimedia Services. [Citation Graph (0, 0)][DBLP] IEEE International Conference on Multimedia and Expo (II), 2000, pp:851-854 [Conf]
- Siddhartha K. Goel, Manish Singh, Dongyan Xu, Baochun Li
Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2002, pp:152-158 [Conf]
- Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongyan Xu
Executing MPI programs on virtual machines in an Internet sharing system. [Citation Graph (0, 0)][DBLP] IPDPS, 2006, pp:- [Conf]
- Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. [Citation Graph (0, 0)][DBLP] IPSN, 2005, pp:348-355 [Conf]
- Xuxian Jiang, Dongyan Xu
VIOLIN: Virtual Internetworking on Overlay Infrastructure. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:937-946 [Conf]
- Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Regnier
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. [Citation Graph (0, 0)][DBLP] iTrust, 2004, pp:161-175 [Conf]
- Catherine Rosenberg, Pascal Pons, Dongyan Xu
Policy-driven multifile distribution. [Citation Graph (0, 0)][DBLP] IWQoS, 2004, pp:193-197 [Conf]
- Duangdao Wichadakul, Klara Nahrstedt, Xiaohui Gu, Dongyan Xu
2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework. [Citation Graph (0, 0)][DBLP] Middleware, 2001, pp:373-394 [Conf]
- Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan Xu, Bharat K. Bhargava
PROMISE: peer-to-peer media streaming using CollectCast. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 2003, pp:45-54 [Conf]
- Dongyan Xu, Xuxian Jiang
Towards an integrated multimedia service hosting overlay. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 2004, pp:96-103 [Conf]
- Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications. [Citation Graph (0, 0)][DBLP] MobiSys, 2003, pp:- [Conf]
- Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:1-21 [Conf]
- Xuxian Jiang, Dongyan Xu
Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:15-28 [Conf]
- Xuxian Jiang, Dongyan Xu
Profiling self-propagating worms via behavioral footprinting. [Citation Graph (0, 0)][DBLP] WORM, 2006, pp:17-24 [Conf]
- Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
QoS and Contention-Aware Multi-Resource Reservation. [Citation Graph (0, 0)][DBLP] Cluster Computing, 2001, v:4, n:2, pp:95-107 [Journal]
- Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen
Virtual Distributed Environments in a Shared Infrastructure. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:5, pp:63-69 [Journal]
- Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
MeGaDiP: A wide-area Media Gateway Discovery Protocol. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2002, v:141, n:1-2, pp:37-59 [Journal]
- Xuxian Jiang, Dongyan Xu, Yi-Min Wang
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
- Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat K. Bhargava, Boyan Botev
CollectCast: A peer-to-peer service for media streaming. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2005, v:11, n:1, pp:68-81 [Journal]
- Baochun Li, Dongyan Xu, Klara Nahrstedt
An integrated runtime QoS-aware middleware framework for distributed multimedia applications. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2002, v:8, n:5, pp:420-430 [Journal]
- Dongyan Xu, Sunil Suresh Kulkarni, Catherine Rosenberg, Heung-Keung Chai
Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2006, v:11, n:4, pp:383-399 [Journal]
- Yi Cui, Klara Nahrstedt, Dongyan Xu
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery. [Citation Graph (0, 0)][DBLP] Multimedia Tools Appl., 2004, v:22, n:2, pp:137-170 [Journal]
- Hiroshi Yamauchi, Dongyan Xu
Portable virtual cycle accounting for large-scale distributed cycle sharing systems. [Citation Graph (0, 0)][DBLP] Parallel Computing, 2007, v:33, n:4-5, pp:314-327 [Journal]
- Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:1010-1014 [Journal]
- Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:9, pp:987-1000 [Journal]
- Yi Lu, Weichao Wang, B. Bhargava, Dongyan Xu
Trust-based privacy preservation for peer-to-peer data sharing. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:498-502 [Journal]
- Xiaohui Gu, Klara Nahrstedt, Wanghong Yuan, Duangdao Wichadakul, Dongyan Xu
An XML-based Quality of Service Enabling Language for the Web. [Citation Graph (0, 0)][DBLP] J. Vis. Lang. Comput., 2002, v:13, n:1, pp:61-95 [Journal]
- Ryan Riley, Xuxian Jiang, Dongyan Xu
An Architectural Approach to Preventing Code Injection Attacks. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:30-40 [Conf]
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. [Citation Graph (, )][DBLP]
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]
VioCluster: Virtualization for Dynamic Computational Domains. [Citation Graph (, )][DBLP]
Polymorphing Software by Randomizing Data Structure Layout. [Citation Graph (, )][DBLP]
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. [Citation Graph (, )][DBLP]
VNsnap: Taking snapshots of virtual networked environments with minimal downtime. [Citation Graph (, )][DBLP]
Middleware Integration and Deployment Strategies for Cyberinfrastructures. [Citation Graph (, )][DBLP]
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure. [Citation Graph (, )][DBLP]
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure. [Citation Graph (, )][DBLP]
Strict control dependence and its effect on dynamic information flow analyses. [Citation Graph (, )][DBLP]
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. [Citation Graph (, )][DBLP]
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. [Citation Graph (, )][DBLP]
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]
Multi-aspect profiling of kernel rootkit behavior. [Citation Graph (, )][DBLP]
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems [Citation Graph (, )][DBLP]
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.306secs
|