The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Johnny S. Wong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong, Ying Cai
    A Reputation-based Trust Management in Peer-to-Peer Network Systems. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:510-515 [Conf]
  2. Armin R. Mikler, Vasant Honavar, Johnny S. Wong
    Analysis of Utility-Theoretic Heuristics for Intelligent Adaptive Network Routing. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, Vol. 1, 1996, pp:96-101 [Conf]
  3. Linda M. Null, Johnny S. Wong
    Data Security for Object-Oriented Programming Systems Based on Inference Engines (Abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1990, pp:411- [Conf]
  4. Linda M. Null, Johnny S. Wong
    The DIAMOND Security Policy for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1992, pp:49-56 [Conf]
  5. Yu Cao, Wallapak Tavanapong, Dalei Li, Jung-Hwan Oh, Piet C. de Groen, Johnny S. Wong
    A Visual Model Approach for Parsing Colonoscopy Videos. [Citation Graph (0, 0)][DBLP]
    CIVR, 2004, pp:160-169 [Conf]
  6. Zhan Chen, Jing Ding, Mu Zhang, Wallapak Tavanapong, Johnny S. Wong
    Hierarchical Clustering-Merging for Multidimensional Index Structures. [Citation Graph (0, 0)][DBLP]
    CIVR, 2003, pp:81-90 [Conf]
  7. Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller
    Feature Selection Using a Genetic Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    GECCO, 1999, pp:1781- [Conf]
  8. Johnny S. Wong, Linda M. Null
    Intelligent interfaces for secure multilevel database systems. [Citation Graph (0, 0)][DBLP]
    IEA/AIE (2), 1989, pp:977-981 [Conf]
  9. Wanida Putthividhya, Minh Tran, Wallapak Tavanapong, Johnny S. Wong
    Core selection with end-to-end QoS support. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:328-333 [Conf]
  10. Ying Cai, Zhan Chen, Johnny S. Wong
    Leveraging Broadband Access for True On-Demand Delivery of Internet Videos. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:171-177 [Conf]
  11. Minh Tran, Wanida Putthividhya, Wallapak Tavanapong, Johnny S. Wong
    A Case for a Generalized Periodic Broadcast Server: Design, Analysis, and Implementation. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:127-134 [Conf]
  12. Waqar Hague, Johnny S. Wong
    Distributed real-time nested transactions. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:27, n:2, pp:85-95 [Journal]
  13. Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller
    Automated discovery of concise predictive rules for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:60, n:3, pp:165-175 [Journal]
  14. Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller, Yanxin Wang
    Lightweight agents for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:109-122 [Journal]
  15. Guy G. Helmer, Johnny S. Wong, Subhasri Madaka
    Anomalous intrusion detection system for hostile Java applets. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:273-286 [Journal]
  16. Shawn P. Laird, Johnny S. Wong, William J. Schaller, Bradley J. Erickson, Piet C. de Groen
    Design and implementation of an Internet-based medical image viewing system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:66, n:2, pp:167-181 [Journal]
  17. Armin R. Mikler, Vasant Honavar, Johnny S. Wong
    Autonomous agents for coordinated distributed parameterized heuristic routing in large dynamic communication networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:56, n:3, pp:231-246 [Journal]
  18. Armin R. Mikler, Johnny S. Wong, Vasant Honavar
    Quo Vadis - A Framework for Intelligent Routing in Large Communication Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1997, v:37, n:1, pp:61-73 [Journal]
  19. Priyamvadha Thambu, Johnny S. Wong
    An efficient token-based mutual exclusion algorithm in a distributed system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:28, n:3, pp:267-276 [Journal]
  20. Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn R. Lutz
    A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2002, v:7, n:4, pp:207-220 [Journal]
  21. Tony T. Y. Suen, Johnny S. Wong
    Efficient Task Migration Algorithm for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1992, v:3, n:4, pp:488-499 [Journal]
  22. Robyn R. Lutz, Johnny S. Wong
    Detecting Unsafe Error Recovery Schedules. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1992, v:18, n:8, pp:749-760 [Journal]
  23. Danyu Liu, Yu Cao, Kihwan Kim, Sean Stanek, Bancha Doungratanaex-Chai, Kungen Lin, Wallapak Tavanapong, Johnny S. Wong, Jung-Hwan Oh, Piet C. de Groen
    Arthemis: Annotation software in an integrated capturing and analysis system for colonoscopy. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2007, v:88, n:2, pp:152-163 [Journal]

  24. Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP]


  25. A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP]


  26. Mobile Personal Health Care System for Patients with Diabetes. [Citation Graph (, )][DBLP]


  27. Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing. [Citation Graph (, )][DBLP]


  28. On Evaluation of Response Cost for Intrusion Response Systems. [Citation Graph (, )][DBLP]


  29. Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  30. Composition of Services for Notification in Smart Homes. [Citation Graph (, )][DBLP]


Search in 0.081secs, Finished in 0.082secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002