The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kuan-Ta Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:359- [Conf]
  2. Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei
    Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:403-412 [Conf]
  3. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
    The impact of network variabilities on TCP clocking schemes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2770-2775 [Conf]
  4. Kuan-Ta Chen, Chin-Laung Lei
    Design Implications of Social Interaction in Online Games. [Citation Graph (0, 0)][DBLP]
    ICEC, 2006, pp:318-321 [Conf]
  5. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei
    Secure Content Delivery using Key Composition. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:484-485 [Conf]
  6. Kuan-Ta Chen, Chin-Laung Lei
    Network game design: hints and implications of player interaction. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2006, pp:17- [Conf]
  7. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
    Game traffic analysis: an MMORPG perspective. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2005, pp:19-24 [Conf]
  8. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
    Quantifying Skype user satisfaction. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:399-410 [Conf]
  9. Kuan-Ta Chen, Polly Huang, Chin-Laung Lei
    How sensitive are online gamers to network quality? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:11, pp:34-38 [Journal]
  10. Kuan-Ta Chen, Polly Huang, Chin-Laung Lei
    Game traffic analysis: An MMORPG perspective. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:16, pp:3002-3023 [Journal]
  11. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
    An empirical evaluation of TCP performance in online games. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2006, pp:5- [Conf]
  12. Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-hua Chu, Chin-Laung Lei, Wen-Chin Chen
    Identifying MMORPG bots: a traffic analysis approach. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2006, pp:4- [Conf]
  13. Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli Sreedevi, Kuan-Ta Chen, Chen-Hung Yu, Hao-hua Chu
    Finding Self-Similarities in Opportunistic People Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2286-2290 [Conf]
  14. Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei
    On the Sensitivity of Online Game Playing Time to Network QoS. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  15. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal]

  16. Detection of MMORPG bots based on behavior analysis. [Citation Graph (, )][DBLP]


  17. Rapid Detection of Constant-Packet-Rate Flows. [Citation Graph (, )][DBLP]


  18. Automatic storytelling in comics: a case study on World of Warcraft. [Citation Graph (, )][DBLP]


  19. Toward an understanding of the processing delay of peer-to-peer relay nodes. [Citation Graph (, )][DBLP]


  20. Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online Game Angel Love Online. [Citation Graph (, )][DBLP]


  21. On the Construction of Initial Basis Function for Efficient Value Function Approximation. [Citation Graph (, )][DBLP]


  22. Peer-to-Peer Application Recognition Based on Signaling Activity. [Citation Graph (, )][DBLP]


  23. Trajectory Based Behavior Analysis for User Verification. [Citation Graph (, )][DBLP]


  24. OneClick: A Framework for Measuring Network Quality of Experience. [Citation Graph (, )][DBLP]


  25. Tuning Skype's Redundancy Control Algorithm for User Satisfaction. [Citation Graph (, )][DBLP]


  26. Game Bot Detection Based on Avatar Trajectory. [Citation Graph (, )][DBLP]


  27. Analysis of Area Revisitation Patterns in World of Warcarft. [Citation Graph (, )][DBLP]


  28. Involuntary Information Leakage in Social Network Services. [Citation Graph (, )][DBLP]


  29. On formal models for social verification. [Citation Graph (, )][DBLP]


  30. KissKissBan: a competitive human computation game for image annotation. [Citation Graph (, )][DBLP]


  31. A crowdsourceable QoE evaluation framework for multimedia content. [Citation Graph (, )][DBLP]


  32. User identification based on game-play activity patterns. [Citation Graph (, )][DBLP]


  33. Game bot identification based on manifold learning. [Citation Graph (, )][DBLP]


  34. Quantifying the effect of content-based transport strategies for online role playing games. [Citation Graph (, )][DBLP]


  35. An analysis of WoW players' game hours. [Citation Graph (, )][DBLP]


  36. An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. [Citation Graph (, )][DBLP]


  37. Fast-Flux Bot Detection in Real Time. [Citation Graph (, )][DBLP]


  38. An Analytical Approach to Optimizing the Utility of ESP Games. [Citation Graph (, )][DBLP]


  39. An Analytical Study of Puzzle Selection Strategies for the ESP Game. [Citation Graph (, )][DBLP]


  40. Inferring Speech Activity from Encrypted Skype Traffic. [Citation Graph (, )][DBLP]


  41. Surfing in the crowd: feasibility study of experience sharing in a Taiwanese night market. [Citation Graph (, )][DBLP]


  42. Detecting VoIP Traffic Based on Human Conversation Patterns. [Citation Graph (, )][DBLP]


  43. Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. [Citation Graph (, )][DBLP]


  44. What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002