Ken Wong

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2018
Decoy Systems with Low Energy Bluetooth Communication.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Improving Predictable Shared-Disk Clusters Performance for Database Clouds.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Buddy Instance - A Mechanism for Increasing Availability in Shared-Disk Clusters.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

Bluetooth for decoy systems: A practical study.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2014
On the effect of subliminal priming on subjective perception of images: A machine learning approach.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2011
Verification of Noise-Parameter Measurements and Uncertainties.
IEEE Trans. Instrum. Meas., 2011

2010
Design of an Extensible Network Testbed.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2008
Operational experience with a virtual networking laboratory.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

A remotely accessible network processor-based router for network experimentation.
Proceedings of the 2008 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2008

2007
Teaching experiences with a virtual network laboratory.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Experimental evaluation of a coarse-grained switch scheduler.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007

2006
The open network laboratory.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006

2005
The open network laboratory: a resource for networking research and education.
Comput. Commun. Rev., 2005

2002
Design and Evaluation of a High Performance Dynamically Extensible Router.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

1999
Incorporating Process Induced Effects into RC Extraction.
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999

1998
Refinement of Safety-Related Hazards into Verifiable Code Assertions.
Proceedings of the Computer Safety, 1998

Looking at Code With Your Safety Goggles On.
Proceedings of the Reliable Software Technologies, 1998

1989
Performance Analysis of a Parallel Logic Simulation Machine.
J. Parallel Distributed Comput., 1989

1986
What does go wrong - The facts.
Comput. Law Secur. Rev., 1986

The risk involved in computerisation what can go wrong.
Comput. Law Secur. Rev., 1986

1985
Computer crime - Risk management and computer security.
Comput. Secur., 1985


  Loading...