Search the dblp DataBase
Johnny S. Wong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Natalia Stakhanova , Sergio Ferrero , Johnny S. Wong , Ying Cai A Reputation-based Trust Management in Peer-to-Peer Network Systems. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:510-515 [Conf ] Armin R. Mikler , Vasant Honavar , Johnny S. Wong Analysis of Utility-Theoretic Heuristics for Intelligent Adaptive Network Routing. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, Vol. 1, 1996, pp:96-101 [Conf ] Linda M. Null , Johnny S. Wong Data Security for Object-Oriented Programming Systems Based on Inference Engines (Abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1990, pp:411- [Conf ] Linda M. Null , Johnny S. Wong The DIAMOND Security Policy for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1992, pp:49-56 [Conf ] Yu Cao , Wallapak Tavanapong , Dalei Li , Jung-Hwan Oh , Piet C. de Groen , Johnny S. Wong A Visual Model Approach for Parsing Colonoscopy Videos. [Citation Graph (0, 0)][DBLP ] CIVR, 2004, pp:160-169 [Conf ] Zhan Chen , Jing Ding , Mu Zhang , Wallapak Tavanapong , Johnny S. Wong Hierarchical Clustering-Merging for Multidimensional Index Structures. [Citation Graph (0, 0)][DBLP ] CIVR, 2003, pp:81-90 [Conf ] Guy G. Helmer , Johnny S. Wong , Vasant Honavar , Les Miller Feature Selection Using a Genetic Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] GECCO, 1999, pp:1781- [Conf ] Johnny S. Wong , Linda M. Null Intelligent interfaces for secure multilevel database systems. [Citation Graph (0, 0)][DBLP ] IEA/AIE (2), 1989, pp:977-981 [Conf ] Wanida Putthividhya , Minh Tran , Wallapak Tavanapong , Johnny S. Wong Core selection with end-to-end QoS support. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:328-333 [Conf ] Ying Cai , Zhan Chen , Johnny S. Wong Leveraging Broadband Access for True On-Demand Delivery of Internet Videos. [Citation Graph (0, 0)][DBLP ] SAINT, 2004, pp:171-177 [Conf ] Minh Tran , Wanida Putthividhya , Wallapak Tavanapong , Johnny S. Wong A Case for a Generalized Periodic Broadcast Server: Design, Analysis, and Implementation. [Citation Graph (0, 0)][DBLP ] SAINT, 2004, pp:127-134 [Conf ] Waqar Hague , Johnny S. Wong Distributed real-time nested transactions. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:27, n:2, pp:85-95 [Journal ] Guy G. Helmer , Johnny S. Wong , Vasant Honavar , Les Miller Automated discovery of concise predictive rules for intrusion detection. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2002, v:60, n:3, pp:165-175 [Journal ] Guy G. Helmer , Johnny S. Wong , Vasant Honavar , Les Miller , Yanxin Wang Lightweight agents for intrusion detection. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2003, v:67, n:2, pp:109-122 [Journal ] Guy G. Helmer , Johnny S. Wong , Subhasri Madaka Anomalous intrusion detection system for hostile Java applets. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:273-286 [Journal ] Shawn P. Laird , Johnny S. Wong , William J. Schaller , Bradley J. Erickson , Piet C. de Groen Design and implementation of an Internet-based medical image viewing system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2003, v:66, n:2, pp:167-181 [Journal ] Armin R. Mikler , Vasant Honavar , Johnny S. Wong Autonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:56, n:3, pp:231-246 [Journal ] Armin R. Mikler , Johnny S. Wong , Vasant Honavar Quo Vadis - A Framework for Intelligent Routing in Large Communication Networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1997, v:37, n:1, pp:61-73 [Journal ] Priyamvadha Thambu , Johnny S. Wong An efficient token-based mutual exclusion algorithm in a distributed system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1995, v:28, n:3, pp:267-276 [Journal ] Guy G. Helmer , Johnny S. Wong , Mark Slagell , Vasant Honavar , Les Miller , Robyn R. Lutz A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2002, v:7, n:4, pp:207-220 [Journal ] Tony T. Y. Suen , Johnny S. Wong Efficient Task Migration Algorithm for Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1992, v:3, n:4, pp:488-499 [Journal ] Robyn R. Lutz , Johnny S. Wong Detecting Unsafe Error Recovery Schedules. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1992, v:18, n:8, pp:749-760 [Journal ] Danyu Liu , Yu Cao , Kihwan Kim , Sean Stanek , Bancha Doungratanaex-Chai , Kungen Lin , Wallapak Tavanapong , Johnny S. Wong , Jung-Hwan Oh , Piet C. de Groen Arthemis: Annotation software in an integrated capturing and analysis system for colonoscopy. [Citation Graph (0, 0)][DBLP ] Computer Methods and Programs in Biomedicine, 2007, v:88, n:2, pp:152-163 [Journal ] Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP ] A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP ] Mobile Personal Health Care System for Patients with Diabetes. [Citation Graph (, )][DBLP ] Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing. [Citation Graph (, )][DBLP ] On Evaluation of Response Cost for Intrusion Response Systems. [Citation Graph (, )][DBLP ] Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. [Citation Graph (, )][DBLP ] Composition of Services for Notification in Smart Homes. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.007secs