|
Search the dblp DataBase
Weibo Gong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley
Monitoring and early warning for internet worms. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:190-199 [Conf]
- Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
Code red worm propagation modeling and analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:138-147 [Conf]
- Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
Email Worms Modeling and Defense. [Citation Graph (0, 0)][DBLP] ICCCN, 2004, pp:409-414 [Conf]
- Yuling Qu, Patrick Kelly, Haluk Derin, Weibo Gong
Conditional Event Algebra Techniques for Iterated Image Estimation. [Citation Graph (0, 0)][DBLP] ICIP (2), 1997, pp:219-222 [Conf]
- Honggang Zhang, Donald F. Towsley, Weibo Gong
TCP Connection Game: A Study on the Selfish Behavior of TCP Users. [Citation Graph (0, 0)][DBLP] ICNP, 2005, pp:301-310 [Conf]
- Aura Ganz, Weibo Gong, Xudong Wang
Wavelength Assignment in Multihop Lightwave Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 1993, pp:1367-1374 [Conf]
- Michele Garetto, Weibo Gong, Donald F. Towsley
Modeling Malware Spreading Dynamics. [Citation Graph (0, 0)][DBLP] INFOCOM, 2003, pp:- [Conf]
- Yang Guo, Weibo Gong, Donald F. Towsley
Time-Stepped Hybrid Simulation (TSHS) for Large Scale Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2000, pp:441-450 [Conf]
- C. V. Hollot, Vishal Misra, Donald F. Towsley, Weibo Gong
A Control Theoretic Analysis of RED. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1510-1519 [Conf]
- C. V. Hollot, Vishal Misra, Donald F. Towsley, Weibo Gong
On Designing Improved Controllers for AQM Routers Supporting TCP Flows. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1726-1734 [Conf]
- Yong Liu, Honggang Zhang, Weibo Gong, Donald F. Towsley
On the interaction between overlay routing and underlay routing. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:2543-2553 [Conf]
- Chun Zhang, Yong Liu, Weibo Gong, James F. Kurose, R. Moll, Donald F. Towsley
On optimal routing with multiple traffic matrices. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:607-618 [Conf]
- Abhishek Chandra, Weibo Gong, Prashant J. Shenoy
Dynamic Resource Allocation for Shared Data Centers Using Online Measurements. [Citation Graph (0, 0)][DBLP] IWQoS, 2003, pp:381-400 [Conf]
- Xiaotao Liu, Prashant J. Shenoy, Weibo Gong
A time series-based approach for power management in mobile processors and disks. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2004, pp:74-79 [Conf]
- Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. [Citation Graph (0, 0)][DBLP] PADS, 2005, pp:199-206 [Conf]
- Benyuan Liu, Yang Guo, James F. Kurose, Donald F. Towsley, Weibo Gong
Fluid Simulation of Large Scale Networks: Issues and Tradeoffs. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:2136-2142 [Conf]
- Vishal Misra, Weibo Gong, Donald F. Towsley
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2000, pp:151-160 [Conf]
- Abhishek Chandra, Weibo Gong, Prashant J. Shenoy
Dynamic resource allocation for shared data centers using online measurements. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2003, pp:300-301 [Conf]
- Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
- Yong Huang, Weibo Gong, Dev Gupta
MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LAN. [Citation Graph (0, 0)][DBLP] WOWMOM, 2006, pp:49-58 [Conf]
- Yong Liu, Weibo Gong, Prashant J. Shenoy
On the impact of concurrent downloads. [Citation Graph (0, 0)][DBLP] Winter Simulation Conference, 2001, pp:1300-1305 [Conf]
- Christos G. Panayiotou, Christos G. Cassandras, Weibo Gong
Model abstraction for discrete event systems using neural networks and sensitivity information. [Citation Graph (0, 0)][DBLP] Winter Simulation Conference, 2000, pp:335-341 [Conf]
- Purushottam Kulkarni, Prashant J. Shenoy, Weibo Gong
Scalable techniques for memory-efficient CDN simulations. [Citation Graph (0, 0)][DBLP] WWW, 2003, pp:609-618 [Conf]
- Weibo Gong, Yong Liu, Vishal Misra, Donald F. Towsley
Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications . [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:3, pp:377-399 [Journal]
- Qi Xue, Weibo Gong, Aura Ganz
Proportional Service Differentiation in Wireless LANs Using Spacing-based Channel Occupancy Regulation. [Citation Graph (0, 0)][DBLP] MONET, 2006, v:11, n:2, pp:229-240 [Journal]
- Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
On the performance of Internet worm scanning strategies. [Citation Graph (0, 0)][DBLP] Perform. Eval., 2006, v:63, n:7, pp:700-723 [Journal]
- Weibo Gong, Hong Yang
Rational Approximants for Some Performance Analysis Problems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:12, pp:1394-1404 [Journal]
- Yujing Wu, Weibo Gong
Error analysis of burst level modeling of active-idle sources. [Citation Graph (0, 0)][DBLP] ACM Trans. Model. Comput. Simul., 2004, v:14, n:3, pp:278-304 [Journal]
- Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao
The monitoring and early detection of internet worms. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2005, v:13, n:5, pp:961-974 [Journal]
- Yujing Wu, Weibo Gong, Donald F. Towsley
Decomposition properties in fluid queues. [Citation Graph (0, 0)][DBLP] Perform. Eval., 2008, v:65, n:1, pp:82-98 [Journal]
- Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:105-118 [Journal]
Semi-Random Backoff: Towards Resource Reservation for Channel Access in Wireless LANs. [Citation Graph (, )][DBLP]
A Three-Stage Load-Balancing Switch. [Citation Graph (, )][DBLP]
Secure Wireless Communication with Dynamic Secrets. [Citation Graph (, )][DBLP]
A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. [Citation Graph (, )][DBLP]
Mobility Can Help: Protect User Identity with Dynamic Credential. [Citation Graph (, )][DBLP]
Worm propagation modeling and analysis under dynamic quarantine defense. [Citation Graph (, )][DBLP]
Dense Parity Check Based Secrecy Sharing in Wireless Communications. [Citation Graph (, )][DBLP]
TCP Performance in Coded Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.155secs
|