The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dongyan Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
    Protection mechanisms for application service hosting platforms. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:656-663 [Conf]
  2. Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
    QoS-Aware Discovery of Wide-Area Distributed Services. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2001, pp:92-99 [Conf]
  3. Simon G. M. Koo, Catherine Rosenberg, Dongyan Xu
    Analysis of Parallel Downloading for Large File Distribution. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2003, pp:128-0 [Conf]
  4. Xuxian Jiang, Dongyan Xu
    SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. [Citation Graph (0, 0)][DBLP]
    HPDC, 2003, pp:174-183 [Conf]
  5. Dongyan Xu, Klara Nahrstedt, Arun Viswanathan, Duangdao Wichadakul
    QoS and Contention-Aware Multi-Resource Reservation. [Citation Graph (0, 0)][DBLP]
    HPDC, 2000, pp:3-10 [Conf]
  6. Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
    Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:38- [Conf]
  7. Dongyan Xu, Mohamed Hefeeda, Susanne E. Hambrusch, Bharat K. Bhargava
    On Peer-to-Peer Media Streaming. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:363-371 [Conf]
  8. Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt
    Multimedia Service Configuration and Reservation in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:512-519 [Conf]
  9. Yi Cui, Dongyan Xu, Klara Nahrstedt
    SMART: A Scalable Middleware solution for Ubiquitous Multimedia Service Delivery. [Citation Graph (0, 0)][DBLP]
    ICME, 2001, pp:- [Conf]
  10. Dongyan Xu, Duangdao Wichadakul, Klara Nahrstedt
    Resource-Aware Configuration of Ubiquitous Multimedia Services. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:851-854 [Conf]
  11. Siddhartha K. Goel, Manish Singh, Dongyan Xu, Baochun Li
    Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2002, pp:152-158 [Conf]
  12. Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongyan Xu
    Executing MPI programs on virtual machines in an Internet sharing system. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  13. Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
    Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:348-355 [Conf]
  14. Xuxian Jiang, Dongyan Xu
    VIOLIN: Virtual Internetworking on Overlay Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:937-946 [Conf]
  15. Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Regnier
    E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:161-175 [Conf]
  16. Catherine Rosenberg, Pascal Pons, Dongyan Xu
    Policy-driven multifile distribution. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2004, pp:193-197 [Conf]
  17. Duangdao Wichadakul, Klara Nahrstedt, Xiaohui Gu, Dongyan Xu
    2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework. [Citation Graph (0, 0)][DBLP]
    Middleware, 2001, pp:373-394 [Conf]
  18. Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan Xu, Bharat K. Bhargava
    PROMISE: peer-to-peer media streaming using CollectCast. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2003, pp:45-54 [Conf]
  19. Dongyan Xu, Xuxian Jiang
    Towards an integrated multimedia service hosting overlay. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:96-103 [Conf]
  20. Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou
    iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2003, pp:- [Conf]
  21. Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
    Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:1-21 [Conf]
  22. Xuxian Jiang, Dongyan Xu
    Collapsar: A VM-Based Architecture for Network Attack Detention Center. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:15-28 [Conf]
  23. Xuxian Jiang, Dongyan Xu
    Profiling self-propagating worms via behavioral footprinting. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:17-24 [Conf]
  24. Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
    QoS and Contention-Aware Multi-Resource Reservation. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2001, v:4, n:2, pp:95-107 [Journal]
  25. Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen
    Virtual Distributed Environments in a Shared Infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:5, pp:63-69 [Journal]
  26. Dongyan Xu, Klara Nahrstedt, Duangdao Wichadakul
    MeGaDiP: A wide-area Media Gateway Discovery Protocol. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2002, v:141, n:1-2, pp:37-59 [Journal]
  27. Xuxian Jiang, Dongyan Xu, Yi-Min Wang
    Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1165-1180 [Journal]
  28. Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat K. Bhargava, Boyan Botev
    CollectCast: A peer-to-peer service for media streaming. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:1, pp:68-81 [Journal]
  29. Baochun Li, Dongyan Xu, Klara Nahrstedt
    An integrated runtime QoS-aware middleware framework for distributed multimedia applications. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2002, v:8, n:5, pp:420-430 [Journal]
  30. Dongyan Xu, Sunil Suresh Kulkarni, Catherine Rosenberg, Heung-Keung Chai
    Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2006, v:11, n:4, pp:383-399 [Journal]
  31. Yi Cui, Klara Nahrstedt, Dongyan Xu
    Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2004, v:22, n:2, pp:137-170 [Journal]
  32. Hiroshi Yamauchi, Dongyan Xu
    Portable virtual cycle accounting for large-scale distributed cycle sharing systems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2007, v:33, n:4-5, pp:314-327 [Journal]
  33. Ahsan Habib, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang
    A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:1010-1014 [Journal]
  34. Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
    Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:9, pp:987-1000 [Journal]
  35. Yi Lu, Weichao Wang, B. Bhargava, Dongyan Xu
    Trust-based privacy preservation for peer-to-peer data sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:498-502 [Journal]
  36. Xiaohui Gu, Klara Nahrstedt, Wanghong Yuan, Duangdao Wichadakul, Dongyan Xu
    An XML-based Quality of Service Enabling Language for the Web. [Citation Graph (0, 0)][DBLP]
    J. Vis. Lang. Comput., 2002, v:13, n:1, pp:61-95 [Journal]
  37. Ryan Riley, Xuxian Jiang, Dongyan Xu
    An Architectural Approach to Preventing Code Injection Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:30-40 [Conf]

  38. Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. [Citation Graph (, )][DBLP]


  39. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]


  40. VioCluster: Virtualization for Dynamic Computational Domains. [Citation Graph (, )][DBLP]


  41. Polymorphing Software by Randomizing Data Structure Layout. [Citation Graph (, )][DBLP]


  42. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. [Citation Graph (, )][DBLP]


  43. VNsnap: Taking snapshots of virtual networked environments with minimal downtime. [Citation Graph (, )][DBLP]


  44. Middleware Integration and Deployment Strategies for Cyberinfrastructures. [Citation Graph (, )][DBLP]


  45. Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure. [Citation Graph (, )][DBLP]


  46. Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure. [Citation Graph (, )][DBLP]


  47. Strict control dependence and its effect on dynamic information flow analyses. [Citation Graph (, )][DBLP]


  48. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]


  49. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. [Citation Graph (, )][DBLP]


  50. Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. [Citation Graph (, )][DBLP]


  51. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. [Citation Graph (, )][DBLP]


  52. Multi-aspect profiling of kernel rootkit behavior. [Citation Graph (, )][DBLP]


  53. LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems [Citation Graph (, )][DBLP]


  54. Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002