The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Weibo Gong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley
    Monitoring and early warning for internet worms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:190-199 [Conf]
  2. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
    Code red worm propagation modeling and analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:138-147 [Conf]
  3. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    Email Worms Modeling and Defense. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:409-414 [Conf]
  4. Yuling Qu, Patrick Kelly, Haluk Derin, Weibo Gong
    Conditional Event Algebra Techniques for Iterated Image Estimation. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1997, pp:219-222 [Conf]
  5. Honggang Zhang, Donald F. Towsley, Weibo Gong
    TCP Connection Game: A Study on the Selfish Behavior of TCP Users. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:301-310 [Conf]
  6. Aura Ganz, Weibo Gong, Xudong Wang
    Wavelength Assignment in Multihop Lightwave Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1993, pp:1367-1374 [Conf]
  7. Michele Garetto, Weibo Gong, Donald F. Towsley
    Modeling Malware Spreading Dynamics. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  8. Yang Guo, Weibo Gong, Donald F. Towsley
    Time-Stepped Hybrid Simulation (TSHS) for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:441-450 [Conf]
  9. C. V. Hollot, Vishal Misra, Donald F. Towsley, Weibo Gong
    A Control Theoretic Analysis of RED. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1510-1519 [Conf]
  10. C. V. Hollot, Vishal Misra, Donald F. Towsley, Weibo Gong
    On Designing Improved Controllers for AQM Routers Supporting TCP Flows. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1726-1734 [Conf]
  11. Yong Liu, Honggang Zhang, Weibo Gong, Donald F. Towsley
    On the interaction between overlay routing and underlay routing. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2543-2553 [Conf]
  12. Chun Zhang, Yong Liu, Weibo Gong, James F. Kurose, R. Moll, Donald F. Towsley
    On optimal routing with multiple traffic matrices. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:607-618 [Conf]
  13. Abhishek Chandra, Weibo Gong, Prashant J. Shenoy
    Dynamic Resource Allocation for Shared Data Centers Using Online Measurements. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2003, pp:381-400 [Conf]
  14. Xiaotao Liu, Prashant J. Shenoy, Weibo Gong
    A time series-based approach for power management in mobile processors and disks. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2004, pp:74-79 [Conf]
  15. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai
    Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:199-206 [Conf]
  16. Benyuan Liu, Yang Guo, James F. Kurose, Donald F. Towsley, Weibo Gong
    Fluid Simulation of Large Scale Networks: Issues and Tradeoffs. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2136-2142 [Conf]
  17. Vishal Misra, Weibo Gong, Donald F. Towsley
    Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:151-160 [Conf]
  18. Abhishek Chandra, Weibo Gong, Prashant J. Shenoy
    Dynamic resource allocation for shared data centers using online measurements. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:300-301 [Conf]
  19. Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
    Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
  20. Yong Huang, Weibo Gong, Dev Gupta
    MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LAN. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:49-58 [Conf]
  21. Yong Liu, Weibo Gong, Prashant J. Shenoy
    On the impact of concurrent downloads. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2001, pp:1300-1305 [Conf]
  22. Christos G. Panayiotou, Christos G. Cassandras, Weibo Gong
    Model abstraction for discrete event systems using neural networks and sensitivity information. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2000, pp:335-341 [Conf]
  23. Purushottam Kulkarni, Prashant J. Shenoy, Weibo Gong
    Scalable techniques for memory-efficient CDN simulations. [Citation Graph (0, 0)][DBLP]
    WWW, 2003, pp:609-618 [Conf]
  24. Weibo Gong, Yong Liu, Vishal Misra, Donald F. Towsley
    Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications . [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:3, pp:377-399 [Journal]
  25. Qi Xue, Weibo Gong, Aura Ganz
    Proportional Service Differentiation in Wireless LANs Using Spacing-based Channel Occupancy Regulation. [Citation Graph (0, 0)][DBLP]
    MONET, 2006, v:11, n:2, pp:229-240 [Journal]
  26. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    On the performance of Internet worm scanning strategies. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:7, pp:700-723 [Journal]
  27. Weibo Gong, Hong Yang
    Rational Approximants for Some Performance Analysis Problems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:12, pp:1394-1404 [Journal]
  28. Yujing Wu, Weibo Gong
    Error analysis of burst level modeling of active-idle sources. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Model. Comput. Simul., 2004, v:14, n:3, pp:278-304 [Journal]
  29. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao
    The monitoring and early detection of internet worms. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:5, pp:961-974 [Journal]
  30. Yujing Wu, Weibo Gong, Donald F. Towsley
    Decomposition properties in fluid queues. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2008, v:65, n:1, pp:82-98 [Journal]
  31. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:105-118 [Journal]

  32. Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs. [Citation Graph (, )][DBLP]


  33. A Three-Stage Load-Balancing Switch. [Citation Graph (, )][DBLP]


  34. Secure Wireless Communication with Dynamic Secrets. [Citation Graph (, )][DBLP]


  35. A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. [Citation Graph (, )][DBLP]


  36. Mobility Can Help: Protect User Identity with Dynamic Credential. [Citation Graph (, )][DBLP]


  37. Worm propagation modeling and analysis under dynamic quarantine defense. [Citation Graph (, )][DBLP]


  38. Dense Parity Check Based Secrecy Sharing in Wireless Communications. [Citation Graph (, )][DBLP]


  39. TCP Performance in Coded Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  40. Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis. [Citation Graph (, )][DBLP]


Search in 0.138secs, Finished in 0.140secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002