The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bin Xiao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bin Xiao, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha
    Design and Analysis of Improved Shortest Path Tree Update for Network Routing. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2003, pp:82-87 [Conf]
  2. Naixue Xiong, Yanxiang He, Yan Yang, Bin Xiao, Xiaohua Jia
    On Designing a Novel PI Controller for AQM Routers Supporting TCP Flows. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:991-1002 [Conf]
  3. Zili Shao, Qingfeng Zhuge, Meilin Liu, Bin Xiao, Edwin Hsing-Mean Sha
    Switching-Activity Minimization on Instruction-Level Loop Scheduling for VLIWDSP Applications. [Citation Graph (0, 0)][DBLP]
    ASAP, 2004, pp:224-234 [Conf]
  4. Zili Shao, Qingfeng Zhuge, Chun Xue, Bin Xiao, Edwin Hsing-Mean Sha
    High-level synthesis for DSP applications using heterogeneous functional units. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2005, pp:302-304 [Conf]
  5. Qingfeng Zhuge, Zili Shao, Bin Xiao, Edwin Hsing-Mean Sha
    Design space minimization with timing and code size optimization for embedded DSP. [Citation Graph (0, 0)][DBLP]
    CODES+ISSS, 2003, pp:144-149 [Conf]
  6. Zili Shao, Qingfeng Zhuge, Meilin Liu, Edwin Hsing-Mean Sha, Bin Xiao
    Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:53-63 [Conf]
  7. Bin Xiao, Jiadi Yu, Zili Shao, Minglu Li
    Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    EUC, 2006, pp:375-384 [Conf]
  8. Chun Xue, Zili Shao, Edwin Hsing-Mean Sha, Bin Xiao
    Optimizing Address Assignment for Scheduling Embedded DSPs. [Citation Graph (0, 0)][DBLP]
    EUC, 2004, pp:64-73 [Conf]
  9. Bin Xiao, Jiannong Cao, Edwin Hsing-Mean Sha
    Maintaining Comprehensive Resource Availability in P2P Networks. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:543-550 [Conf]
  10. Yu Hua, Bin Xiao
    A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services. [Citation Graph (0, 0)][DBLP]
    HiPC, 2006, pp:277-288 [Conf]
  11. Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao
    A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:560-569 [Conf]
  12. Bin Xiao, Lu Liu, Aling Zhang
    Asymmetric Demand Information and Channel Profits When Retailers Compete. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:38-40 [Conf]
  13. Bin Xiao, Jiantao Pu, Shihai Dong
    Multimodal Integration Using Complex Feature Set. [Citation Graph (0, 0)][DBLP]
    ICMI, 2000, pp:245-252 [Conf]
  14. Kevin F. Chen, Edwin Hsing-Mean Sha, Bin Xiao
    Universal Routing in Distributed Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:555-559 [Conf]
  15. Ying Chen, Zili Shao, Qingfeng Zhuge, Chun Xue, Bin Xiao, Edwin Hsing-Mean Sha
    Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:2-6 [Conf]
  16. Yanxiang He, Wei Chen, Wenling Peng, Bin Xiao
    An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:265-269 [Conf]
  17. Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean Sha
    An Active Detecting Method Against SYN Flooding Attack. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:709-715 [Conf]
  18. Bo Yu, Bin Xiao
    Detecting selective forwarding attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  19. Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha
    Variable Partitioning and Scheduling of Multiple Memory Architectures for DSP. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  20. Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha
    Performance optimization of multiple memory architectures for DSP. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2002, pp:469-472 [Conf]
  21. Bin Xiao, Wei Chen, Yanxiang He
    A Novel Technique for Detecting DDoS Attacks at Its Early Stage. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:825-834 [Conf]
  22. Bin Xiao, Jiannong Cao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha
    Approximation Algorithms Design for Disk Partial Covering Problem. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:104-110 [Conf]
  23. Bin Xiao, Jiannong Cao, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha
    Dynamic Update of Shortest Path Tree in OSPF. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:18-23 [Conf]
  24. Bin Xiao, Zili Shao, Chantana Chantrapornchai, Edwin Hsing-Mean Sha, Qingfeng Zhuge
    Optimal Code Size Reduction for Software-Pipelined and Unfolded Loops. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:144-149 [Conf]
  25. Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao
    Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:409-413 [Conf]
  26. Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao
    Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:780-785 [Conf]
  27. Hekang Chen, Shuigeng Zhou, Bin Xiao, Jihong Guan, Bo Huang
    A Novel Energy-Efficient Backbone for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:600-611 [Conf]
  28. Yanxiang He, Wei Chen, Bin Xiao
    Detecting SYN Flooding Attacks Near Innocent Side. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:443-452 [Conf]
  29. Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Chantana Chantrapornchai
    Analysis and Algorithms for Partitioning of Large-scale Adaptive Mobile Networks. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:302-308 [Conf]
  30. Bin Xiao, Esma Aïmeur, José Manuel Fernandez
    PCFinder: An Intelligent Product Recommendation Agent for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:181-0 [Conf]
  31. Hongyun Yu, Huichao Zou, Bin Xiao
    Stability Analysis of Cross Beam System with Two Time Delays. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:536-540 [Conf]
  32. Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha
    Efficient Algorithms for Dynamic Update of Shortest Path Tree in Networking. [Citation Graph (0, 0)][DBLP]
    I. J. Comput. Appl., 2004, v:11, n:1, pp:60-75 [Journal]
  33. Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao, Edwin Hsing-Mean Sha
    Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:4, pp:443-453 [Journal]
  34. Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha
    Code size reduction technique and implementation for software-pipelined DSP applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2003, v:2, n:4, pp:590-613 [Journal]
  35. Bin Xiao, Wei Chen, Yanxiang He
    A novel approach to detecting DDoS Attacks at an Early Stage. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2006, v:36, n:3, pp:235-248 [Journal]
  36. Zili Shao, Bin Xiao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha
    Loop scheduling with timing and switching-activity minimization for VLIW DSP. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Design Autom. Electr. Syst., 2006, v:11, n:1, pp:165-185 [Journal]
  37. Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha
    Efficient Update of Shortest Path Algorithms for Network Routing. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2001, pp:315-320 [Conf]
  38. Yong Tang, Xicheng Lu, Bin Xiao
    Generating Simplified Regular Expression Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:478-488 [Conf]
  39. Bin Xiao, Jiannong Cao, Zili Shao, Qingfeng Zhuge, Edwin Hsing-Mean Sha
    Analysis and algorithms design for the partition of large-scale adaptive mobile wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:8, pp:1899-1912 [Journal]
  40. María S. Pérez, Bin Xiao
    Special section: Security on grids and distributed systems. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:6, pp:774-775 [Journal]
  41. Bin Xiao, Bo Yu, Chuanshan Gao
    CHEMAS: Identify suspect nodes in selective forwarding attacks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2007, v:67, n:11, pp:1218-1230 [Journal]
  42. Xuan Wang, Bin Xiao, Jian-Feng Ma, Xiu-Li Bi
    Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:12, pp:3503-3508 [Journal]

  43. MDA based generic C4ISR effectiveness evaluation system. [Citation Graph (, )][DBLP]


  44. A Walking Beacon-Assisted Localization in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  45. Bouncing Tracks in Sensor Networks. [Citation Graph (, )][DBLP]


  46. Time-Based Privacy Protection for Multi-attribute Data in WSNs. [Citation Graph (, )][DBLP]


  47. Bounded LSH for Similarity Search in Peer-to-Peer File Systems. [Citation Graph (, )][DBLP]


  48. Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams. [Citation Graph (, )][DBLP]


  49. Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. [Citation Graph (, )][DBLP]


  50. The 5th International Workshop on Security in Systems and Networks. [Citation Graph (, )][DBLP]


  51. Achieving optimal data storage position in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.423secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002