Search the dblp DataBase
Chuang Lin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yixin Jiang , Chuang Lin , Zhiguang Shan , Zhen Chen Modeling and Performance Analysis of Network-Based Intrusion Detection Cluster. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:530-535 [Conf ] Yao Zhao , Chuang Lin , Hao Yin Security Authentication of 3G-WLAN Interworking. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:429-436 [Conf ] Zhijia Chen , Hao Yin , Chuang Lin , Lu Ai 3D-wavelet based Secure and Scalable Media Streaming in a Centralcontrolled P2P Framework. [Citation Graph (0, 0)][DBLP ] AINA, 2007, pp:708-715 [Conf ] Zhijia Chen , Chuang Lin , Hao Wen , Hao Yin An Analytical Model for Evaluating IEEE 802.15.4 CSMA/CA Protocol in Low-Rate Wireless Application. [Citation Graph (0, 0)][DBLP ] AINA Workshops (2), 2007, pp:899-904 [Conf ] Gaocai Wang , Chuang Lin , Xiaodong Liu Performance Modeling and Analysis for Centralized Resource Scheduling in Metropolitan-Area Grids. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:583-589 [Conf ] Yuanzhuo Wang , Chuang Lin , Zhengli Zhai , Yang Yang A Dependable Task Scheduling Strategy for a Fault Tolerant Grid Model. [Citation Graph (0, 0)][DBLP ] APWeb Workshops, 2006, pp:534-539 [Conf ] Xiaowen Chu , Yixin Jiang , Chuang Lin , Fujun Feng Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:408-417 [Conf ] Hao Yin , Chuang Lin , Feng Qiu , Xiaowen Chu , Geyong Min A Key Embedded Video Codec for Secure Video Multicast. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:77-87 [Conf ] Xuehai Peng , Chuang Lin Architecture of Trustworthy Networks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:269-276 [Conf ] Chuang Lin , Yang Qu II , Fengyuan Ren , Dan C. Marinescu Performance Equivalent Analysis of Workflow Systems Based on Stochastic Petri Net Models. [Citation Graph (0, 0)][DBLP ] EDCIS, 2002, pp:64-79 [Conf ] Yang Qu II , Chuang Lin , Jiye Wang Linear Temporal Inference of Workflow Management Systems Based on Timed Petri Nets Models. [Citation Graph (0, 0)][DBLP ] EDCIS, 2002, pp:30-44 [Conf ] Xiaodong Liu , Qionghai Dai , Chuang Lin A Fuzzy Advance Reservation Mechanism of Network Bandwidth in Video Grid. [Citation Graph (0, 0)][DBLP ] FSKD, 2006, pp:706-715 [Conf ] Chuang Lin , Zhiguang Shan Grid Research in China: Origins and Directions. [Citation Graph (0, 0)][DBLP ] FTDCS, 2004, pp:209-212 [Conf ] Zhiguang Shan , Chuang Lin , Fengyuan Ren , Yaya Wei Modeling and Performance Analysis of a Multiserver Multiqueue System on the Grid. [Citation Graph (0, 0)][DBLP ] FTDCS, 2003, pp:337-343 [Conf ] Stephen S. Yau , William C. Chu , Francis Lau , Chuang Lin , Kinji Mori , P. K. Sinka Current State and Future Trends of Distributed Computing Systems in Asia. [Citation Graph (0, 0)][DBLP ] FTDCS, 2004, pp:200- [Conf ] Wenjiang Zhou , Chuang Lin , Yin Li , Zhangxi Tan Queue Management for QoS Provision Build on Network Processor. [Citation Graph (0, 0)][DBLP ] FTDCS, 2003, pp:219-0 [Conf ] Yang Qu , Chuang Lin , Yajuan Li , Zhiguang Shan Survivability Analysis of Grid Resource Management System Topology. [Citation Graph (0, 0)][DBLP ] GCC, 2005, pp:738-743 [Conf ] Zhangxi Tan , Chuang Lin , Hao Yin , Ye Hong , Guangxi Zhu Approximate Performance Analysis of Web Services Flow Using Stochastic Petri Net. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:193-200 [Conf ] Yang Qu , Chuang Lin , Yajuan Li , Zhiguang Shan Performability Evaluation of Resource Scheduling Algorithms for Computational Grids. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:319-326 [Conf ] Yuanzhuo Wang , Chuang Lin , Yang Yang , Junjie Lv , Yang Qu A Game-Based Intrusion Tolerant Mechanism for Grid Service. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:380-386 [Conf ] Yang Qu , Chuang Lin , Yuanzhuo Wang , Zhiguang Shan QoS-aware Composite Service Selection in Grids. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:458-465 [Conf ] Yuanzhuo Wang , Chuang Lin , Yang Yang , Yang Qu Grid Service Workflow Models and Their Equivalent Simplification Methods. [Citation Graph (0, 0)][DBLP ] GCC Workshops, 2006, pp:302-307 [Conf ] Sebastien Berton , Hao Yin , Chuang Lin , Geyong Min Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] GCC, 2006, pp:387-394 [Conf ] Yaya Wei , Chuang Lin , Xiaowen Chu , Zhiguang Shan , Fengyuan Ren Class-Based Latency Assurances for Web Servers. [Citation Graph (0, 0)][DBLP ] HPCC, 2005, pp:388-394 [Conf ] Bo Zheng , Chuang Lin AM-Trie: A High-Speed Parallel Packet Classification Algorithm for Network Processor. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (4), 2006, pp:41-48 [Conf ] Chuang Lin , Bo Li , Jianping Wu Modeling ATM traffic using stochastic Petri net. [Citation Graph (0, 0)][DBLP ] ICCCN, 1997, pp:538-0 [Conf ] Hao Yin , Zhangxi Tan , Chuang Lin , Geyong Min , Xiaowen Chu Considering Network Context for Efficient Simulation of Highly Parallel Network Processors. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:1171-1180 [Conf ] Xueyan Tang , Samuel T. Chanson , Huicheng Chi , Chuang Lin Session-Affinity Aware Request Allocation for Web Clusters. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:142-149 [Conf ] Chuang Lin , Samuel T. Chanson ATM admission models of stochastic high level Petri nets based on hierarchical modeling. [Citation Graph (0, 0)][DBLP ] ICNP, 1995, pp:144-151 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu , Mingwei Xu SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. [Citation Graph (0, 0)][DBLP ] ICOIN, 2003, pp:515-524 [Conf ] Hao Yin , Chuang Lin , Jin-Jun Zhuang , Qiang Ni An Adaptive Distance Learning System Based on Media Streaming. [Citation Graph (0, 0)][DBLP ] ICWL, 2004, pp:184-192 [Conf ] Bo Zheng , Chuang Lin , Xuehai Peng AM-Trie: An OC-192 Parallel Multidimensional Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP ] IMSCCS (1), 2006, pp:377-384 [Conf ] Fengyuan Ren , Chuang Lin , Ying Xunhe , Xiuming Shan , Wang Fubao A Robust Active Queue Management Algorithm Based on Sliding Mode Variable Structure Control. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Yixin Jiang , Chuang Lin , Zhen Chen , Hao Yin Using Petri Nets to Verify Security Policies in Mandatory Access Control Model. [Citation Graph (0, 0)][DBLP ] IRI, 2004, pp:271-276 [Conf ] Yong Jiang , Chuang Lin , Jianping Wu , Xiaoxia Sun Integrated Performance Evaluating Criteria for Network Traffic Control. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:438-443 [Conf ] Chuang Lin , Dan C. Marinescu , Yongchang Ji , Gabriela M. Marinescu On synthetic criteria for evaluation of network traffic control policies. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:63-68 [Conf ] Fengyuan Ren , Chuang Lin , Bo Wei Design a robust controller for active queue management in large delay networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:748-754 [Conf ] Yaya Wei , Chuang Lin , Fengyuan Ren , Raad Raad , Eryk Dutkiewicz Dynamic Priority Handoff Scheme in Differentiated QoS Wireless Multimedia Networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:131-136 [Conf ] Miao Zhang , Jianping Wu , Chuang Lin , Ke Xu Rethink the tradeoff between proportional controller and PI controller. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:57-62 [Conf ] Yanfei Fan , Fengyuan Ren , Chuang Lin Design a PID Controller for Active Queue Management. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:985-990 [Conf ] Zhen Chen , Chuang Lin , Jia Ni , Dong-Hua Ruan , Bo Zheng , Yixin Jiang AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:748-755 [Conf ] Chuang Lin , Lijie Sheng , Jianping Wu , Mingwei Xu An Integrative Scheme of Differentiated Services: Modeling and Performance Analysis. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2000, pp:441-448 [Conf ] Hao Yin , Chuang Lin , Feng Qiu , Xuening Liu , Dapeng Wu TrustStream: a novel secure and scalable media streaming architecture. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2005, pp:295-298 [Conf ] Yixin Jiang , Chuang Lin , Xuemin Shen , Minghui Shi Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:114-125 [Conf ] Yajuan Li , Chuang Lin , Quanlin Li , Zhiguang Shan Performance Modeling and Analysis for Resource Scheduling in Data Grids. [Citation Graph (0, 0)][DBLP ] NPC, 2005, pp:32-39 [Conf ] Hao Yin , Zhangxi Tan , Chuang Lin , Guangxi Zhu Adding Security to Network Via Network Processors. [Citation Graph (0, 0)][DBLP ] NPC, 2004, pp:427-434 [Conf ] Feng Qiu , Chuang Lin , Hao Yin EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming. [Citation Graph (0, 0)][DBLP ] PCM, 2006, pp:395-404 [Conf ] Hao Yin , Xiaowen Chu , Chuang Lin , Feng Qiu , Geyong Min A Novel Key Management and Distribution Solution for Secure Video Multicast. [Citation Graph (0, 0)][DBLP ] PCM (2), 2005, pp:246-257 [Conf ] Hao Yin , Chuang Lin , Ting Cui , Xiaomeng Huang , Zhangxi Tan A Novel Multiple Time Scale Congestion Control Scheme for Multimedia Traffic. [Citation Graph (0, 0)][DBLP ] PCM (2), 2004, pp:338-346 [Conf ] Huanying Zou , Chuang Lin , Hao Yin , Zhen Chen , Feng Qiu , Xuening Liu Optimal Priority Packetization with Multi-layer UEP for Video Streaming over Wireless Network. [Citation Graph (0, 0)][DBLP ] PCM, 2006, pp:442-449 [Conf ] Chuang Lin , Dan C. Marinescu On Stochastic High-Level Petri Nets. [Citation Graph (0, 0)][DBLP ] PNPM, 1987, pp:34-43 [Conf ] Yaya Wei , Fengyuan Ren , Chuang Lin , Thiemo Voigt Fuzzy Control for Guaranteeing Absolute Delays in Web Servers. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:48- [Conf ] Chuang Lin , Yaya Wei , Zhiguang Shan Adaptive Resource Management for Mobile Multimedia Communications in Asymmetric Wireless Network. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:45- [Conf ] Yixin Jiang , Chuang Lin , Hao Yin , Zhangxi Tan Security analysis of mandatory access control model. [Citation Graph (0, 0)][DBLP ] SMC (6), 2004, pp:5013-5018 [Conf ] Hao Yin , Zhangxi Tan , Chuang Lin , Yixin Jiang , Feng Qiu Modeling mobile Web services flow using generalized stochastic high-level Petri net. [Citation Graph (0, 0)][DBLP ] SMC (5), 2004, pp:4953-4958 [Conf ] Chuang Lin , Jeng-Shyang Pan Robust VQ-Based Digital Image Watermarking for Noisy Channel. [Citation Graph (0, 0)][DBLP ] ICICIC (3), 2006, pp:673-676 [Conf ] Ye Hong , Chuang Lin , Yang Qu , Zhiguang Shan Performance Modeling of Grid Resource Management and Scheduling Systems. [Citation Graph (0, 0)][DBLP ] SKG, 2005, pp:92- [Conf ] Chuang Lin , Jeng-Shyang Pan , Chin-Shiuh Shieh , Ping-Sung Liao A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:113-116 [Conf ] Chia An Huang , Jeng-Shyang Pan , Te-hui Kuo , Jaw-Shyang Wu , Chuang Lin A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:47-50 [Conf ] Chuang Lin , Jeng-Shyang Pan , Chin-Shiuh Shieh , Peng Shi An Information Hiding Scheme for OFDM Wireless Networks. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:51-54 [Conf ] Yixin Jiang , Chuang Lin , Minghui Shi , Xuemin Shen Self-healing group key distribution with time-limited node revocation for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:1, pp:14-23 [Journal ] Fengyuan Ren , Chuang Lin , Bo Wei A nonlinear control theoretic analysis to TCP-RED system. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:49, n:4, pp:580-592 [Journal ] Zhiguang Shan , Chuang Lin , Dan C. Marinescu , Yang Yang Modeling and performance analysis of QoS-aware load balancing of Web-server clusters. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:40, n:2, pp:235-256 [Journal ] Fengyuan Ren , Chuang Lin , Bo Wei A robust active queue management algorithm in large delay networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:5, pp:485-493 [Journal ] Fengyuan Ren , Chuang Lin , Xunhe Yin Design a congestion controller based on sliding mode variable structure control. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:9, pp:1050-1061 [Journal ] Yaya Wei , Chuang Lin , Fengyuan Ren , Raad Raad , Eryk Dutkiewicz Dynamic handoff scheme in differentiated QoS wireless multimedia networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:10, pp:1001-1011 [Journal ] Yao Yue , Chuang Lin , Zhangxi Tan Analyzing the performance and fairness of BitTorrent-like networks using a general fluid model. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:18, pp:3946-3956 [Journal ] Chuang Lin , Yang Qu II Temporal inference of workflow systems based on time petri nets: Quantitative and qualitative analysis. [Citation Graph (0, 0)][DBLP ] Int. J. Intell. Syst., 2004, v:19, n:5, pp:417-442 [Journal ] Chuang Lin , Mingwei Xu Stability Analysis of Buffer Priority Scheduling Policies Using Petri Nets. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2003, v:18, n:3, pp:278-286 [Journal ] Chuang Lin , Xuehai Peng Research on Network Architecture with Trustworthiness and Controllability. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2006, v:21, n:5, pp:732-739 [Journal ] Jianer Chen , Gaocai Wang , Chuang Lin , Tao Wang , Guojun Wang Probabilistic analysis on mesh network fault tolerance. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2007, v:67, n:1, pp:100-110 [Journal ] Zhangxi Tan , Chuang Lin , Hao Yin , Bo Li Optimization and Benchmark of Cryptographic Algorithms on Network Processors. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2004, v:24, n:5, pp:55-69 [Journal ] Hao Yin , Zhangxi Tan , Chuang Lin , Geyong Min , Yanfei Fan A context-based simulation tool for design and evaluation of network processors. [Citation Graph (0, 0)][DBLP ] Simulation Modelling Practice and Theory, 2006, v:14, n:3, pp:263-278 [Journal ] Chuang Lin , Dan C. Marinescu Stochastic High-Level Petri Nets and Applications. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:7, pp:815-825 [Journal ] Qionghai Dai , Xinjian Chen , Chuang Lin A novel VLSI architecture for multidimensional discrete wavelet transform. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2004, v:14, n:8, pp:1105-1110 [Journal ] Chuang Lin , A. Chaudhary , Andrew B. Whinston , Dan C. Marinescu Logical Inference of Horn Clauses in Petri Net Models. [Citation Graph (0, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1993, v:5, n:3, pp:416-425 [Journal ] Hao Yin , Chuang Lin , Feng Qiu , Jiangchuan Liu , Geyong Min , Bo Li CASM: a content-aware protocol for secure video multicast. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2006, v:8, n:2, pp:270-277 [Journal ] Chuang Lin , Zhiguang Shan , Ting Liu , Yang Qu , Fengyuan Ren Modeling and Inference of Extended Interval Temporal Logic for Nondeterministic Intervals. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2005, v:35, n:5, pp:682-696 [Journal ] Xuemin Shen , Chuang Lin , Yan (Lindsay) Sun , Jianping Pan , Peter Langendörfer , Zhenfu Cao Wireless network security. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:269-271 [Journal ] Bo Li , Chuang Lin , Samuel T. Chanson Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 1998, v:4, n:4, pp:279-290 [Journal ] Zhiguang Shan , Chuang Lin Modeling and Performance Evaluation of Hierarchical Job Scheduling on the Grids. [Citation Graph (0, 0)][DBLP ] GCC, 2007, pp:296-303 [Conf ] Jia Ni , Chuang Lin , Zhen Chen , Peter Ungsunan A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor. [Citation Graph (0, 0)][DBLP ] ICPP, 2007, pp:16- [Conf ] Xin Jiang , Chuang Lin , Hao Yin , Yada Hu A Scheduling Model for Maximizing Availability with Makespan Constraint Based on Residual Lifetime in Heterogeneous Clusters. [Citation Graph (0, 0)][DBLP ] NPC, 2007, pp:31-40 [Conf ] Yao Yue , Chuang Lin , Zhangxi Tan Analyzing the Performance and Fairness of BitTorrent-like Networks Using a General Fluid Model. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Xiaomeng Huang , Chuang Lin , Fengyuan Ren A novel high speed transport protocol based on explicit virtual load feedback. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:7, pp:1800-1814 [Journal ] Yang Wang , Chuang Lin , Quan-Lin Li , Yuguang Fang A queueing analysis for the denial of service (DoS) attacks in computer networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:12, pp:3564-3573 [Journal ] Yixin Jiang , Chuang Lin , Minghui Shi , Xuemin Shen , Xiaowen Chu A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal ] Hao Yin , Feng Qiu , Chuang Lin , Geyong Min , Xiaowen Chu A novel key-embedded scheme for secure video multicast systems. [Citation Graph (0, 0)][DBLP ] Computers & Electrical Engineering, 2006, v:32, n:5, pp:376-393 [Journal ] Quality of Protection with Performance Analysis in IP Multimedia Subsystem. [Citation Graph (, )][DBLP ] Model-Driven Dependability Analysis of Virtualization Systems. [Citation Graph (, )][DBLP ] Throughput Analysis of Wireless Multi-hop Chain Networks. [Citation Graph (, )][DBLP ] Performance Analysis and Industrial Practice of Peer-Assisted Content Distribution Network for Large-Scale Live Video Streaming. [Citation Graph (, )][DBLP ] A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. [Citation Graph (, )][DBLP ] A Double Domain Based Robust Digital Image Watermarking Scheme. [Citation Graph (, )][DBLP ] Comprehensive Analysis of Performance, Fault-Tolerance and Scalability in Grid Resource Management System. [Citation Graph (, )][DBLP ] A Trust and Context Based Access Control Model for Distributed Systems. [Citation Graph (, )][DBLP ] VCNF: A Secure Video Conferencing System Based on P2P Technology. [Citation Graph (, )][DBLP ] Experimental Analysis of Super-Seeding in BitTorrent. [Citation Graph (, )][DBLP ] Opportunistic Scheduler Evaluation Using Discriminatory Processor Sharing Model. [Citation Graph (, )][DBLP ] Performance Analysis of Sleep Scheduling Schemes in Sensor Networks using Stochastic Petri Net. [Citation Graph (, )][DBLP ] Performance Analysis of Retransmission and Redundancy Schemes in Sensor Networks. [Citation Graph (, )][DBLP ] Security Analysis of Enterprise Network Based on Stochastic Game Nets Model. [Citation Graph (, )][DBLP ] How Scalable Could P2P Live Media Streaming System Be with the Stringent Time Constraint? [Citation Graph (, )][DBLP ] End-to-End Congestion Control for High Speed Networks Based on Population Ecology Models. [Citation Graph (, )][DBLP ] P2P Accelerated Mass Data Distribution over Booming Internet: Effectiveness and Bottlenecks. [Citation Graph (, )][DBLP ] Improving the Convergence and Stability of Congestion Control Algorithm. [Citation Graph (, )][DBLP ] Inside the bird's nest: measurements of large-scale live VoD from the 2008 olympics. [Citation Graph (, )][DBLP ] Inside the New Coolstreaming: Principles, Measurements and Performance Implications. [Citation Graph (, )][DBLP ] Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. [Citation Graph (, )][DBLP ] P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP ] Network processing performability evaluation on heterogeneous reliability multicore processors using SRN model. [Citation Graph (, )][DBLP ] TNC-compatible NAC System implemented on Network Processor. [Citation Graph (, )][DBLP ] A loosely synchronized gossip-based algorithm for aggregate information computation. [Citation Graph (, )][DBLP ] IVForensic : a digital forensics service platform for internet videos. [Citation Graph (, )][DBLP ] Design and deployment of a hybrid CDN-P2P system for live video streaming: experiences with LiveSky. [Citation Graph (, )][DBLP ] ELCP: An Effort-Based Least Cost Path Scheme for MANETs. [Citation Graph (, )][DBLP ] A novel secure wireless video surveillance system based on Intel IXP425 network processor. [Citation Graph (, )][DBLP ] RENA: region-based routing in intermittently connected mobile network. [Citation Graph (, )][DBLP ] On the Server Placement Problem of P2P Live Media Streaming System. [Citation Graph (, )][DBLP ] Towards a Universal Friendly P2P Media Streaming Application: An Evaluation Framework. [Citation Graph (, )][DBLP ] Design and Analysis of a Backpressure Congestion Control Algorithm in Wireless Sensor Network. [Citation Graph (, )][DBLP ] Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. [Citation Graph (, )][DBLP ] Performance analysis of reliable transport schemes joint with the optimal frequency and optimal packet length in underwater sensor networks. [Citation Graph (, )][DBLP ] Formal Proof of the IDOP_SP Protocol Based on the Petri Net. [Citation Graph (, )][DBLP ] Saturation aware TCP throughput prediction. [Citation Graph (, )][DBLP ] Towards a Trustworthy and Controllable Peer-Server-Peer Media Streaming: An Analytical Study and An Industrial Perspective. [Citation Graph (, )][DBLP ] The Redeployment Issue in Underwater Sensor Networks. [Citation Graph (, )][DBLP ] A Tree-Based Signature Scheme for VANETs. [Citation Graph (, )][DBLP ] Analyzing the Reliability of Group Transmission in Wireless Sensor Network. [Citation Graph (, )][DBLP ] Optimization of Energy Efficient Transmission in Underwater Sensor Networks. [Citation Graph (, )][DBLP ] An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent. [Citation Graph (, )][DBLP ] Security Analysis for Online Banking System Using Hierarchical Stochastic Game Nets Model. [Citation Graph (, )][DBLP ] Enhancing Tit-for-Tat Strategy to Cope with Free-Riding in Unreliable P2P Networks. [Citation Graph (, )][DBLP ] Improving Multi-Core System Dependability with Asymmetrically Reliable Cores. [Citation Graph (, )][DBLP ] A Study of Forward Error Correction Schemes for Reliable Transport in Underwater Sensor Networks. [Citation Graph (, )][DBLP ] Alleviating Congestion Using Traffic-Aware Dynamic Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Approximate Performance Analysis of Job Scheduling on Computational Grids. [Citation Graph (, )][DBLP ] Efficient Re-Keying Scheme for Group Key Distribution. [Citation Graph (, )][DBLP ] Scheduling gain analysis of opportunistic OFDMA and OFDM-TDMA systems. [Citation Graph (, )][DBLP ] A Formal Approach to Verify Grid Service Composition Based on Interaction Pattern. [Citation Graph (, )][DBLP ] QoS-aware Scheduling Algorithm Based on Complete Matching of User Jobs and Grid Services. [Citation Graph (, )][DBLP ] A NetFlow based flow analysis and monitoring system in enterprise networks. [Citation Graph (, )][DBLP ] A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. [Citation Graph (, )][DBLP ] An efficient dynamic-identity based signature scheme for secure network coding. [Citation Graph (, )][DBLP ] Quality of protection analysis and performance modeling in IP multimedia subsystem. [Citation Graph (, )][DBLP ] A secure multipath routing protocol in mobile ad hoc networks. [Citation Graph (, )][DBLP ] Search in 0.098secs, Finished in 0.106secs