|
Search the dblp DataBase
Chun-Ying Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:359- [Conf]
- Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:403-412 [Conf]
- Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. [Citation Graph (0, 0)][DBLP] HiPC, 2005, pp:432-443 [Conf]
- Shu-Hsing Chung, Chun-Ying Huang, Amy H. I. Lee
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:610-620 [Conf]
- Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
Secure Multicast Using Proxy Encryption. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:280-290 [Conf]
- Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
The impact of network variabilities on TCP clocking schemes. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:2770-2775 [Conf]
- Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei
Secure Content Delivery using Key Composition. [Citation Graph (0, 0)][DBLP] LCN, 2005, pp:484-485 [Conf]
- Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
Game traffic analysis: an MMORPG perspective. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2005, pp:19-24 [Conf]
- Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. [Citation Graph (0, 0)][DBLP] PRDC, 2005, pp:133-139 [Conf]
- Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
Quantifying Skype user satisfaction. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2006, pp:399-410 [Conf]
- Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang
Confessible Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:25- [Conf]
- Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. [Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:7- [Conf]
- Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei
Design and Implementation of Secure Communication Channels over UPnP Networks. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:307-312 [Conf]
- Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
An empirical evaluation of TCP performance in online games. [Citation Graph (0, 0)][DBLP] Advances in Computer Entertainment Technology, 2006, pp:5- [Conf]
- Chun-Ying Huang, Chin-Laung Lei
Bounding Peer-to-Peer Upload Traffic in Client Networks. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:759-769 [Conf]
- Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei
On the Sensitivity of Online Game Playing Time to Network QoS. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal]
Optimal service selection for composition based on weighted service flow and Genetic Algorithm. [Citation Graph (, )][DBLP]
A MIP model for IC final testing order selection problem. [Citation Graph (, )][DBLP]
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. [Citation Graph (, )][DBLP]
Fast-Flux Bot Detection in Real Time. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|