The SCEAS System
Navigation Menu

Search the dblp DataBase


Chuang Lin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yixin Jiang, Chuang Lin, Zhiguang Shan, Zhen Chen
    Modeling and Performance Analysis of Network-Based Intrusion Detection Cluster. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:530-535 [Conf]
  2. Yao Zhao, Chuang Lin, Hao Yin
    Security Authentication of 3G-WLAN Interworking. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:429-436 [Conf]
  3. Zhijia Chen, Hao Yin, Chuang Lin, Lu Ai
    3D-wavelet based Secure and Scalable Media Streaming in a Centralcontrolled P2P Framework. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:708-715 [Conf]
  4. Zhijia Chen, Chuang Lin, Hao Wen, Hao Yin
    An Analytical Model for Evaluating IEEE 802.15.4 CSMA/CA Protocol in Low-Rate Wireless Application. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:899-904 [Conf]
  5. Gaocai Wang, Chuang Lin, Xiaodong Liu
    Performance Modeling and Analysis for Centralized Resource Scheduling in Metropolitan-Area Grids. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:583-589 [Conf]
  6. Yuanzhuo Wang, Chuang Lin, Zhengli Zhai, Yang Yang
    A Dependable Task Scheduling Strategy for a Fault Tolerant Grid Model. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:534-539 [Conf]
  7. Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng
    Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:408-417 [Conf]
  8. Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min
    A Key Embedded Video Codec for Secure Video Multicast. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:77-87 [Conf]
  9. Xuehai Peng, Chuang Lin
    Architecture of Trustworthy Networks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:269-276 [Conf]
  10. Chuang Lin, Yang Qu II, Fengyuan Ren, Dan C. Marinescu
    Performance Equivalent Analysis of Workflow Systems Based on Stochastic Petri Net Models. [Citation Graph (0, 0)][DBLP]
    EDCIS, 2002, pp:64-79 [Conf]
  11. Yang Qu II, Chuang Lin, Jiye Wang
    Linear Temporal Inference of Workflow Management Systems Based on Timed Petri Nets Models. [Citation Graph (0, 0)][DBLP]
    EDCIS, 2002, pp:30-44 [Conf]
  12. Xiaodong Liu, Qionghai Dai, Chuang Lin
    A Fuzzy Advance Reservation Mechanism of Network Bandwidth in Video Grid. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:706-715 [Conf]
  13. Chuang Lin, Zhiguang Shan
    Grid Research in China: Origins and Directions. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:209-212 [Conf]
  14. Zhiguang Shan, Chuang Lin, Fengyuan Ren, Yaya Wei
    Modeling and Performance Analysis of a Multiserver Multiqueue System on the Grid. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2003, pp:337-343 [Conf]
  15. Stephen S. Yau, William C. Chu, Francis Lau, Chuang Lin, Kinji Mori, P. K. Sinka
    Current State and Future Trends of Distributed Computing Systems in Asia. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:200- [Conf]
  16. Wenjiang Zhou, Chuang Lin, Yin Li, Zhangxi Tan
    Queue Management for QoS Provision Build on Network Processor. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2003, pp:219-0 [Conf]
  17. Yang Qu, Chuang Lin, Yajuan Li, Zhiguang Shan
    Survivability Analysis of Grid Resource Management System Topology. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:738-743 [Conf]
  18. Zhangxi Tan, Chuang Lin, Hao Yin, Ye Hong, Guangxi Zhu
    Approximate Performance Analysis of Web Services Flow Using Stochastic Petri Net. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:193-200 [Conf]
  19. Yang Qu, Chuang Lin, Yajuan Li, Zhiguang Shan
    Performability Evaluation of Resource Scheduling Algorithms for Computational Grids. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:319-326 [Conf]
  20. Yuanzhuo Wang, Chuang Lin, Yang Yang, Junjie Lv, Yang Qu
    A Game-Based Intrusion Tolerant Mechanism for Grid Service. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:380-386 [Conf]
  21. Yang Qu, Chuang Lin, Yuanzhuo Wang, Zhiguang Shan
    QoS-aware Composite Service Selection in Grids. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:458-465 [Conf]
  22. Yuanzhuo Wang, Chuang Lin, Yang Yang, Yang Qu
    Grid Service Workflow Models and Their Equivalent Simplification Methods. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:302-307 [Conf]
  23. Sebastien Berton, Hao Yin, Chuang Lin, Geyong Min
    Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:387-394 [Conf]
  24. Yaya Wei, Chuang Lin, Xiaowen Chu, Zhiguang Shan, Fengyuan Ren
    Class-Based Latency Assurances for Web Servers. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:388-394 [Conf]
  25. Bo Zheng, Chuang Lin
    AM-Trie: A High-Speed Parallel Packet Classification Algorithm for Network Processor. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:41-48 [Conf]
  26. Chuang Lin, Bo Li, Jianping Wu
    Modeling ATM traffic using stochastic Petri net. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1997, pp:538-0 [Conf]
  27. Hao Yin, Zhangxi Tan, Chuang Lin, Geyong Min, Xiaowen Chu
    Considering Network Context for Efficient Simulation of Highly Parallel Network Processors. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1171-1180 [Conf]
  28. Xueyan Tang, Samuel T. Chanson, Huicheng Chi, Chuang Lin
    Session-Affinity Aware Request Allocation for Web Clusters. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:142-149 [Conf]
  29. Chuang Lin, Samuel T. Chanson
    ATM admission models of stochastic high level Petri nets based on hierarchical modeling. [Citation Graph (0, 0)][DBLP]
    ICNP, 1995, pp:144-151 [Conf]
  30. Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu, Mingwei Xu
    SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:515-524 [Conf]
  31. Hao Yin, Chuang Lin, Jin-Jun Zhuang, Qiang Ni
    An Adaptive Distance Learning System Based on Media Streaming. [Citation Graph (0, 0)][DBLP]
    ICWL, 2004, pp:184-192 [Conf]
  32. Bo Zheng, Chuang Lin, Xuehai Peng
    AM-Trie: An OC-192 Parallel Multidimensional Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:377-384 [Conf]
  33. Fengyuan Ren, Chuang Lin, Ying Xunhe, Xiuming Shan, Wang Fubao
    A Robust Active Queue Management Algorithm Based on Sliding Mode Variable Structure Control. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  34. Yixin Jiang, Chuang Lin, Zhen Chen, Hao Yin
    Using Petri Nets to Verify Security Policies in Mandatory Access Control Model. [Citation Graph (0, 0)][DBLP]
    IRI, 2004, pp:271-276 [Conf]
  35. Yong Jiang, Chuang Lin, Jianping Wu, Xiaoxia Sun
    Integrated Performance Evaluating Criteria for Network Traffic Control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:438-443 [Conf]
  36. Chuang Lin, Dan C. Marinescu, Yongchang Ji, Gabriela M. Marinescu
    On synthetic criteria for evaluation of network traffic control policies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:63-68 [Conf]
  37. Fengyuan Ren, Chuang Lin, Bo Wei
    Design a robust controller for active queue management in large delay networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:748-754 [Conf]
  38. Yaya Wei, Chuang Lin, Fengyuan Ren, Raad Raad, Eryk Dutkiewicz
    Dynamic Priority Handoff Scheme in Differentiated QoS Wireless Multimedia Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:131-136 [Conf]
  39. Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu
    Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:57-62 [Conf]
  40. Yanfei Fan, Fengyuan Ren, Chuang Lin
    Design a PID Controller for Active Queue Management. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:985-990 [Conf]
  41. Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang
    AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:748-755 [Conf]
  42. Chuang Lin, Lijie Sheng, Jianping Wu, Mingwei Xu
    An Integrative Scheme of Differentiated Services: Modeling and Performance Analysis. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2000, pp:441-448 [Conf]
  43. Hao Yin, Chuang Lin, Feng Qiu, Xuening Liu, Dapeng Wu
    TrustStream: a novel secure and scalable media streaming architecture. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:295-298 [Conf]
  44. Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi
    Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:114-125 [Conf]
  45. Yajuan Li, Chuang Lin, Quanlin Li, Zhiguang Shan
    Performance Modeling and Analysis for Resource Scheduling in Data Grids. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:32-39 [Conf]
  46. Hao Yin, Zhangxi Tan, Chuang Lin, Guangxi Zhu
    Adding Security to Network Via Network Processors. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:427-434 [Conf]
  47. Feng Qiu, Chuang Lin, Hao Yin
    EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:395-404 [Conf]
  48. Hao Yin, Xiaowen Chu, Chuang Lin, Feng Qiu, Geyong Min
    A Novel Key Management and Distribution Solution for Secure Video Multicast. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:246-257 [Conf]
  49. Hao Yin, Chuang Lin, Ting Cui, Xiaomeng Huang, Zhangxi Tan
    A Novel Multiple Time Scale Congestion Control Scheme for Multimedia Traffic. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:338-346 [Conf]
  50. Huanying Zou, Chuang Lin, Hao Yin, Zhen Chen, Feng Qiu, Xuening Liu
    Optimal Priority Packetization with Multi-layer UEP for Video Streaming over Wireless Network. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:442-449 [Conf]
  51. Chuang Lin, Dan C. Marinescu
    On Stochastic High-Level Petri Nets. [Citation Graph (0, 0)][DBLP]
    PNPM, 1987, pp:34-43 [Conf]
  52. Yaya Wei, Fengyuan Ren, Chuang Lin, Thiemo Voigt
    Fuzzy Control for Guaranteeing Absolute Delays in Web Servers. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:48- [Conf]
  53. Chuang Lin, Yaya Wei, Zhiguang Shan
    Adaptive Resource Management for Mobile Multimedia Communications in Asymmetric Wireless Network. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:45- [Conf]
  54. Yixin Jiang, Chuang Lin, Hao Yin, Zhangxi Tan
    Security analysis of mandatory access control model. [Citation Graph (0, 0)][DBLP]
    SMC (6), 2004, pp:5013-5018 [Conf]
  55. Hao Yin, Zhangxi Tan, Chuang Lin, Yixin Jiang, Feng Qiu
    Modeling mobile Web services flow using generalized stochastic high-level Petri net. [Citation Graph (0, 0)][DBLP]
    SMC (5), 2004, pp:4953-4958 [Conf]
  56. Chuang Lin, Jeng-Shyang Pan
    Robust VQ-Based Digital Image Watermarking for Noisy Channel. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:673-676 [Conf]
  57. Ye Hong, Chuang Lin, Yang Qu, Zhiguang Shan
    Performance Modeling of Grid Resource Management and Scheduling Systems. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:92- [Conf]
  58. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Ping-Sung Liao
    A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:113-116 [Conf]
  59. Chia An Huang, Jeng-Shyang Pan, Te-hui Kuo, Jaw-Shyang Wu, Chuang Lin
    A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:47-50 [Conf]
  60. Chuang Lin, Jeng-Shyang Pan, Chin-Shiuh Shieh, Peng Shi
    An Information Hiding Scheme for OFDM Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:51-54 [Conf]
  61. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
    Self-healing group key distribution with time-limited node revocation for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:14-23 [Journal]
  62. Fengyuan Ren, Chuang Lin, Bo Wei
    A nonlinear control theoretic analysis to TCP-RED system. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:49, n:4, pp:580-592 [Journal]
  63. Zhiguang Shan, Chuang Lin, Dan C. Marinescu, Yang Yang
    Modeling and performance analysis of QoS-aware load balancing of Web-server clusters. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:40, n:2, pp:235-256 [Journal]
  64. Fengyuan Ren, Chuang Lin, Bo Wei
    A robust active queue management algorithm in large delay networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:5, pp:485-493 [Journal]
  65. Fengyuan Ren, Chuang Lin, Xunhe Yin
    Design a congestion controller based on sliding mode variable structure control. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:9, pp:1050-1061 [Journal]
  66. Yaya Wei, Chuang Lin, Fengyuan Ren, Raad Raad, Eryk Dutkiewicz
    Dynamic handoff scheme in differentiated QoS wireless multimedia networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:10, pp:1001-1011 [Journal]
  67. Yao Yue, Chuang Lin, Zhangxi Tan
    Analyzing the performance and fairness of BitTorrent-like networks using a general fluid model. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:18, pp:3946-3956 [Journal]
  68. Chuang Lin, Yang Qu II
    Temporal inference of workflow systems based on time petri nets: Quantitative and qualitative analysis. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2004, v:19, n:5, pp:417-442 [Journal]
  69. Chuang Lin, Mingwei Xu
    Stability Analysis of Buffer Priority Scheduling Policies Using Petri Nets. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:3, pp:278-286 [Journal]
  70. Chuang Lin, Xuehai Peng
    Research on Network Architecture with Trustworthiness and Controllability. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:732-739 [Journal]
  71. Jianer Chen, Gaocai Wang, Chuang Lin, Tao Wang, Guojun Wang
    Probabilistic analysis on mesh network fault tolerance. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2007, v:67, n:1, pp:100-110 [Journal]
  72. Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li
    Optimization and Benchmark of Cryptographic Algorithms on Network Processors. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2004, v:24, n:5, pp:55-69 [Journal]
  73. Hao Yin, Zhangxi Tan, Chuang Lin, Geyong Min, Yanfei Fan
    A context-based simulation tool for design and evaluation of network processors. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2006, v:14, n:3, pp:263-278 [Journal]
  74. Chuang Lin, Dan C. Marinescu
    Stochastic High-Level Petri Nets and Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:7, pp:815-825 [Journal]
  75. Qionghai Dai, Xinjian Chen, Chuang Lin
    A novel VLSI architecture for multidimensional discrete wavelet transform. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2004, v:14, n:8, pp:1105-1110 [Journal]
  76. Chuang Lin, A. Chaudhary, Andrew B. Whinston, Dan C. Marinescu
    Logical Inference of Horn Clauses in Petri Net Models. [Citation Graph (0, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1993, v:5, n:3, pp:416-425 [Journal]
  77. Hao Yin, Chuang Lin, Feng Qiu, Jiangchuan Liu, Geyong Min, Bo Li
    CASM: a content-aware protocol for secure video multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:2, pp:270-277 [Journal]
  78. Chuang Lin, Zhiguang Shan, Ting Liu, Yang Qu, Fengyuan Ren
    Modeling and Inference of Extended Interval Temporal Logic for Nondeterministic Intervals. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2005, v:35, n:5, pp:682-696 [Journal]
  79. Xuemin Shen, Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao
    Wireless network security. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:269-271 [Journal]
  80. Bo Li, Chuang Lin, Samuel T. Chanson
    Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1998, v:4, n:4, pp:279-290 [Journal]
  81. Zhiguang Shan, Chuang Lin
    Modeling and Performance Evaluation of Hierarchical Job Scheduling on the Grids. [Citation Graph (0, 0)][DBLP]
    GCC, 2007, pp:296-303 [Conf]
  82. Jia Ni, Chuang Lin, Zhen Chen, Peter Ungsunan
    A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor. [Citation Graph (0, 0)][DBLP]
    ICPP, 2007, pp:16- [Conf]
  83. Xin Jiang, Chuang Lin, Hao Yin, Yada Hu
    A Scheduling Model for Maximizing Availability with Makespan Constraint Based on Residual Lifetime in Heterogeneous Clusters. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:31-40 [Conf]
  84. Yao Yue, Chuang Lin, Zhangxi Tan
    Analyzing the Performance and Fairness of BitTorrent-like Networks Using a General Fluid Model. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  85. Xiaomeng Huang, Chuang Lin, Fengyuan Ren
    A novel high speed transport protocol based on explicit virtual load feedback. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:7, pp:1800-1814 [Journal]
  86. Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
    A queueing analysis for the denial of service (DoS) attacks in computer networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3564-3573 [Journal]
  87. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu
    A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal]
  88. Hao Yin, Feng Qiu, Chuang Lin, Geyong Min, Xiaowen Chu
    A novel key-embedded scheme for secure video multicast systems. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2006, v:32, n:5, pp:376-393 [Journal]

  89. Quality of Protection with Performance Analysis in IP Multimedia Subsystem. [Citation Graph (, )][DBLP]

  90. Model-Driven Dependability Analysis of Virtualization Systems. [Citation Graph (, )][DBLP]

  91. Throughput Analysis of Wireless Multi-hop Chain Networks. [Citation Graph (, )][DBLP]

  92. Performance Analysis and Industrial Practice of Peer-Assisted Content Distribution Network for Large-Scale Live Video Streaming. [Citation Graph (, )][DBLP]

  93. A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. [Citation Graph (, )][DBLP]

  94. A Double Domain Based Robust Digital Image Watermarking Scheme. [Citation Graph (, )][DBLP]

  95. Comprehensive Analysis of Performance, Fault-Tolerance and Scalability in Grid Resource Management System. [Citation Graph (, )][DBLP]

  96. A Trust and Context Based Access Control Model for Distributed Systems. [Citation Graph (, )][DBLP]

  97. VCNF: A Secure Video Conferencing System Based on P2P Technology. [Citation Graph (, )][DBLP]

  98. Experimental Analysis of Super-Seeding in BitTorrent. [Citation Graph (, )][DBLP]

  99. Opportunistic Scheduler Evaluation Using Discriminatory Processor Sharing Model. [Citation Graph (, )][DBLP]

  100. Performance Analysis of Sleep Scheduling Schemes in Sensor Networks using Stochastic Petri Net. [Citation Graph (, )][DBLP]

  101. Performance Analysis of Retransmission and Redundancy Schemes in Sensor Networks. [Citation Graph (, )][DBLP]

  102. Security Analysis of Enterprise Network Based on Stochastic Game Nets Model. [Citation Graph (, )][DBLP]

  103. How Scalable Could P2P Live Media Streaming System Be with the Stringent Time Constraint? [Citation Graph (, )][DBLP]

  104. End-to-End Congestion Control for High Speed Networks Based on Population Ecology Models. [Citation Graph (, )][DBLP]

  105. P2P Accelerated Mass Data Distribution over Booming Internet: Effectiveness and Bottlenecks. [Citation Graph (, )][DBLP]

  106. Improving the Convergence and Stability of Congestion Control Algorithm. [Citation Graph (, )][DBLP]

  107. Inside the bird's nest: measurements of large-scale live VoD from the 2008 olympics. [Citation Graph (, )][DBLP]

  108. Inside the New Coolstreaming: Principles, Measurements and Performance Implications. [Citation Graph (, )][DBLP]

  109. Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. [Citation Graph (, )][DBLP]

  110. P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP]

  111. Network processing performability evaluation on heterogeneous reliability multicore processors using SRN model. [Citation Graph (, )][DBLP]

  112. TNC-compatible NAC System implemented on Network Processor. [Citation Graph (, )][DBLP]

  113. A loosely synchronized gossip-based algorithm for aggregate information computation. [Citation Graph (, )][DBLP]

  114. IVForensic: a digital forensics service platform for internet videos. [Citation Graph (, )][DBLP]

  115. Design and deployment of a hybrid CDN-P2P system for live video streaming: experiences with LiveSky. [Citation Graph (, )][DBLP]

  116. ELCP: An Effort-Based Least Cost Path Scheme for MANETs. [Citation Graph (, )][DBLP]

  117. A novel secure wireless video surveillance system based on Intel IXP425 network processor. [Citation Graph (, )][DBLP]

  118. RENA: region-based routing in intermittently connected mobile network. [Citation Graph (, )][DBLP]

  119. On the Server Placement Problem of P2P Live Media Streaming System. [Citation Graph (, )][DBLP]

  120. Towards a Universal Friendly P2P Media Streaming Application: An Evaluation Framework. [Citation Graph (, )][DBLP]

  121. Design and Analysis of a Backpressure Congestion Control Algorithm in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  122. Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. [Citation Graph (, )][DBLP]

  123. Performance analysis of reliable transport schemes joint with the optimal frequency and optimal packet length in underwater sensor networks. [Citation Graph (, )][DBLP]

  124. Formal Proof of the IDOP_SP Protocol Based on the Petri Net. [Citation Graph (, )][DBLP]

  125. Saturation aware TCP throughput prediction. [Citation Graph (, )][DBLP]

  126. Towards a Trustworthy and Controllable Peer-Server-Peer Media Streaming: An Analytical Study and An Industrial Perspective. [Citation Graph (, )][DBLP]

  127. The Redeployment Issue in Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  128. A Tree-Based Signature Scheme for VANETs. [Citation Graph (, )][DBLP]

  129. Analyzing the Reliability of Group Transmission in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  130. Optimization of Energy Efficient Transmission in Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  131. An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent. [Citation Graph (, )][DBLP]

  132. Security Analysis for Online Banking System Using Hierarchical Stochastic Game Nets Model. [Citation Graph (, )][DBLP]

  133. Enhancing Tit-for-Tat Strategy to Cope with Free-Riding in Unreliable P2P Networks. [Citation Graph (, )][DBLP]

  134. Improving Multi-Core System Dependability with Asymmetrically Reliable Cores. [Citation Graph (, )][DBLP]

  135. A Study of Forward Error Correction Schemes for Reliable Transport in Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  136. Alleviating Congestion Using Traffic-Aware Dynamic Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  137. Approximate Performance Analysis of Job Scheduling on Computational Grids. [Citation Graph (, )][DBLP]

  138. Efficient Re-Keying Scheme for Group Key Distribution. [Citation Graph (, )][DBLP]

  139. Scheduling gain analysis of opportunistic OFDMA and OFDM-TDMA systems. [Citation Graph (, )][DBLP]

  140. A Formal Approach to Verify Grid Service Composition Based on Interaction Pattern. [Citation Graph (, )][DBLP]

  141. QoS-aware Scheduling Algorithm Based on Complete Matching of User Jobs and Grid Services. [Citation Graph (, )][DBLP]

  142. A NetFlow based flow analysis and monitoring system in enterprise networks. [Citation Graph (, )][DBLP]

  143. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. [Citation Graph (, )][DBLP]

  144. An efficient dynamic-identity based signature scheme for secure network coding. [Citation Graph (, )][DBLP]

  145. Quality of protection analysis and performance modeling in IP multimedia subsystem. [Citation Graph (, )][DBLP]

  146. A secure multipath routing protocol in mobile ad hoc networks. [Citation Graph (, )][DBLP]

Search in 0.098secs, Finished in 0.106secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002