Xitao Wen

According to our database1, Xitao Wen authored at least 12 papers between 2012 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

Toward A Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture.
IEEE/ACM Trans. Netw., 2017

2016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
OSA: An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility.
IEEE/ACM Trans. Netw., 2014

VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter.
Comput. Networks, 2014

Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

2013
Towards a secure controller platform for openflow applications.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

2012
VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012


  Loading...