Ying-Dar Lin

Orcid: 0000-0002-5226-4396

Affiliations:
  • National Chiao Tung University, Hsinchu, Taiwan


According to our database1, Ying-Dar Lin authored at least 283 papers between 1991 and 2025.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to multi-hop cellular communications and deep packet inspection".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams.
Comput. Networks, 2025

2024
Ratio-Based Offloading Optimization for Edge and Vehicular-Fog Federated Systems: A Multi-Agent TD3 Approach.
IEEE Trans. Veh. Technol., November, 2024

MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology.
IEEE Trans. Netw. Serv. Manag., August, 2024

Prioritization and offloading in P4 switch integrated with NFV.
Telecommun. Syst., July, 2024

Imperceptible adversarial attack via spectral sensitivity of human visual system.
Multim. Tools Appl., June, 2024

Understanding Privacy Risks of High-Accuracy Radio Positioning and Sensing in Wireless Networks.
IEEE Commun. Mag., May, 2024

Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024

AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.
J. Netw. Comput. Appl., 2024

The universal federator: A third-party authentication solution to federated cloud, edge, and fog.
J. Netw. Comput. Appl., 2024

P4toNFV: Offloading from P4 switches to NFV in programmable data planes.
Int. J. Commun. Syst., 2024

Two-stage multi-datasource machine learning for attack technique and lifecycle detection.
Comput. Secur., 2024

Improving quality of indicators of compromise using STIX graphs.
Comput. Secur., 2024

3GPP Edge-Fog federation: Transparent 3rd-party authentication and application mobility.
Comput. Commun., 2024

Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement.
IEEE Access, 2024

Neural Network-based Functional Degradation for Cyber-Physical Systems.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

Unmasking Vulnerabilities: Adversarial Attacks against DRL-based Resource Allocation in O-RAN.
Proceedings of the IEEE International Conference on Communications, 2024

Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop.
Telecommun. Syst., December, 2023

Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023

Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
Computer, December, 2023

Host-based intrusion detection with multi-datasource and deep learning.
J. Inf. Secur. Appl., November, 2023

A Novel Multi-Stage Approach for Hierarchical Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., September, 2023

Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems.
J. Netw. Comput. Appl., June, 2023

Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023

Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023

Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture.
IEEE Trans. Netw. Serv. Manag., March, 2023

Offloading Using Traditional Optimization and Machine Learning in Federated Cloud-Edge-Fog Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2023

Resource Management in LADNs Supporting 5G V2X Communications.
IEEE Access, 2023

Enhancing Cyber Threat Intelligence with Named Entity Recognition Using BERT-CRF.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Low-Latency Service Chaining With Predefined NSH-Based Multipath Across Multiple Datacenters.
IEEE Trans. Netw. Serv. Manag., December, 2022

Combined Communication and Computing Resource Scheduling in Sliced 5G Multi-Access Edge Computing Systems.
IEEE Trans. Veh. Technol., 2022

Analyzing vertical and horizontal offloading in federated cloud and edge computing systems.
Telecommun. Syst., 2022

Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022

ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022

A Survey on Offloading in Federated Cloud-Edge-Fog Systems with Traditional Optimization and Machine Learning.
CoRR, 2022

Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022

Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication With Application Mobility Support.
IEEE Access, 2022

Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility.
Proceedings of the IEEE International Conference on Communications, 2022

Prioritized Traffic Shaping for Low-latency MEC Flows in MEC-enabled Cellular Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Scalable Mobile Edge Computing: A Two-Tier Multi-Site Multi-Server Architecture with Autoscaling and Offloading.
IEEE Wirel. Commun., 2021

Decentralized Configuration Protocols for Low-Cost Offloading From Multiple Edges to Multiple Vehicular Fogs.
IEEE Trans. Veh. Technol., 2021

QoS Violation Probability Minimization in Federating Vehicular-Fogs With Cloud and Edge Systems.
IEEE Trans. Veh. Technol., 2021

Scaling and Offloading Optimization in Pre-CORD and Post-CORD Multi-Access Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021

The Universal Fog Proxy: A Third-party Authentication Solution for Federated Fog Systems with Multiple Protocols.
IEEE Netw., 2021

CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021

Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems.
CoRR, 2021

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges.
IEEE Commun. Surv. Tutorials, 2021

O2MD²: A New Post-Quantum Cryptosystem With One-to-Many Distributed Key Management Based on Prime Modulo Double Encapsulation.
IEEE Access, 2021

Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

Offloading Optimization with Delay Constraint in the 3-tier Federated Cloud, Edge, and Fog Systems.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Transparent AAA Security Design for Low-Latency MEC-Integrated Cellular Networks.
IEEE Trans. Veh. Technol., 2020

End-to-End Slicing With Optimized Communication and Computing Resource Allocation in Multi-Tenant 5G Systems.
IEEE Trans. Veh. Technol., 2020

Smoothed Graphic User Interaction on Smartphones With Motion Prediction.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading.
IEEE Trans. Netw. Serv. Manag., 2020

Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020

ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines.
J. Netw. Comput. Appl., 2020

Smart IoT Solutions for Combating the COVID-19 Pandemic.
IEEE Internet Things Mag., 2020

Cost minimization in placing service chains for virtualized network functions.
Int. J. Commun. Syst., 2020

Editorial: Fourth Quarter 2020 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2020

Editorial: Third Quarter 2020 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2020

Editorial: Second Quarter 2020 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2020

Editorial: First Quarter 2020 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2020

Full encapsulation or internal buffering in OpenFlow based hardware switches?
Comput. Networks, 2020

Maximizing accuracy in multi-scanner malware detection systems.
Comput. Networks, 2020

Communication and Computing Cost Optimization of Meshed Hierarchical NFV Datacenters.
IEEE Access, 2020

OMNI: Omni-directional Dual Cost Optimization of Two-Tier Federated Cloud-Edge Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Modeling and Minimizing Latency in Three-tier V2X Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Communication and Computation Offloading for 5G V2X: Modeling and Optimization.
Proceedings of the IEEE Global Communications Conference, 2020

Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
Communication and Computation Offloading for Multi-RAT Mobile Edge Computing.
IEEE Wirel. Commun., 2019

End-to-End Slicing as a Service with Computing and Communication Resource Allocation for Multi-Tenant 5G Systems.
IEEE Wirel. Commun., 2019

Generic Validation Criteria and Methodologies for SDN Applications.
IEEE Syst. J., 2019

Analytical Modelling of Software and Hardware Switches with Internal Buffer in Software-Defined Networks.
J. Netw. Comput. Appl., 2019

Performance modeling and analysis of TCP and UDP flows over software defined networks.
J. Netw. Comput. Appl., 2019

A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019

SDN-based dynamic multipath forwarding for inter-data center networking.
Int. J. Commun. Syst., 2019

Circuit-based logical layer 2 bridging in software-defined data center networking.
Int. J. Commun. Syst., 2019

Proactive multipath routing with a predictive mechanism in software-defined networks.
Int. J. Commun. Syst., 2019

Editorial: Fourth Quarter 2019 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2019

Editorial: Third Quarter 2019 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2019

Editorial: Second Quarter 2019 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2019

Editorial: First Quarter 2019 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2019

Cost Minimization with Offloading to Vehicles in two-Tier Federated Edge and Vehicular-Fog Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

2018
Two-tier dynamic load balancing in SDN-enabled Wi-Fi networks.
Wirel. Networks, 2018

Wi-Fi offloading between LTE and WLAN with combined UE and BS information.
Wirel. Networks, 2018

Multi-Operator Fairness in Transparent RAN Sharing by Soft-Partition With Blocking and Dropping Mechanism.
IEEE Trans. Veh. Technol., 2018

Clustering and Symbolic Regression for Power Consumption Estimation on Smartphone Hardware Subsystems.
IEEE Trans. Sustain. Comput., 2018

Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters.
IEEE Trans. Netw. Serv. Manag., 2018

Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices for Mobile Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2018

Soft Partitioning Flow Tables for Virtual Networking in Multi-Tenant Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Energy Cost Optimization in Dynamic Placement of Virtualized Network Function Chains.
IEEE Trans. Netw. Serv. Manag., 2018

OFBench: Performance Test Suite on OpenFlow Switches.
IEEE Syst. J., 2018

Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018

Hierarchical CORD for NFV Datacenters: Resource Allocation with Cost-Latency Tradeoff.
IEEE Netw., 2018

Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018

Modelling Software-Defined Networking: Software and hardware switches.
J. Netw. Comput. Appl., 2018

Performance modeling and comparison of NFV integrated with SDN: Under or aside?
J. Netw. Comput. Appl., 2018

Joint server and network optimization toward load-balanced service chaining.
Int. J. Commun. Syst., 2018

Editorial: Fourth Quarter 2018 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2018

Editorial: Third Quarter 2018 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2018

Editorial: Second Quarter 2018 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2018

Editorial: First Quarter 2018 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2018

Network Testing and Analytics.
IEEE Commun. Mag., 2018

Benchmarking handheld graphical user interface: Smoothness quality of experience.
Comput. Electr. Eng., 2018

Multi-operator Fairness in Transparent RAN Sharing.
Proceedings of the 2018 International Conference on Computing, 2018

Modelling Switches with Internal Buffering in Software-Defined Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Mobile Edge Computing Platform Deployment in 4G LTE Networks: A Middlebox Approach.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

2017
Transparent RAN Sharing of 5G Small Cells and Macrocells.
IEEE Wirel. Commun., 2017

Guest Editorial: IoT: Protocol Stack, Cross-Layer, and Power Consumption Issues.
IEEE Wirel. Commun., 2017

Scalable multicasting with multiple shared trees in software defined networking.
J. Netw. Comput. Appl., 2017

Editorial: Fourth Quarter 2017 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2017

Editorial: Third Quarter 2017 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2017

Editorial: Second Quarter 2017 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2017

Editorial: First Quarter 2017 IEEE Communications Surveys and Tutorials.
IEEE Commun. Surv. Tutorials, 2017

Network Testing and Analytics.
IEEE Commun. Mag., 2017

Network Cloudification: SDN-NFV and 5G-MEC with Edge and Fog Computing.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority Queueing.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computing.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017

Performance Modeling and Analysis of TCP Connections over Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Performance Modeling of SDN with NFV under or aside the Controller.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

2016
SEMI: Semi-Online Power Estimates for Smartphone Hardware Components.
IEEE Trans. Sustain. Comput., 2016

The Budgeted Maximum Coverage Problem in Partially Deployed Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2016

PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces.
IEEE Syst. J., 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Netw., 2016

High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016

CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems.
Int. J. Commun. Syst., 2016

Traffic diversity and code coverage: a preliminary analysis.
Int. J. Commun. Syst., 2016

Application Performance Profiling in Android Dalvik Virtual Machines.
IEICE Trans. Inf. Syst., 2016

Communications and Privacy under Surveillance.
Computer, 2016

Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016

Global Communications Newsletter (May 2016).
IEEE Commun. Mag., 2016

Network Testing and Analytics [Series Editorial].
IEEE Commun. Mag., 2016

Network Testing [Series Editorial].
IEEE Commun. Mag., 2016

Cloud Security.
IEEE Cloud Comput., 2016

A joint network and server load balancing algorithm for chaining virtualized network functions.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Fast failover and switchover for link failures and congestion in software defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
PCT and IOT in LTE Networks: A Study on Test Cases and Test Results.
EAI Endorsed Trans. Ubiquitous Environ., 2015

Integration of Spatial Reuse and Allocation for Downlink Broadcast in LTE-Advanced and WiMAX Relay Networks.
IEEE Trans. Veh. Technol., 2015

Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds.
IEEE Syst. J., 2015

Three-phase behavior-based detection and classification of known and unknown malware.
Secur. Commun. Networks, 2015

Stateful traffic replay for web application proxies.
Secur. Commun. Networks, 2015

An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015

Two-tier project and job scheduling for SaaS cloud service providers.
J. Netw. Comput. Appl., 2015

Security and privacy in unified communications: Challenges and solutions.
Comput. Commun., 2015

Network testing [Series Editorial].
IEEE Commun. Mag., 2015

Semi-online power estimation for smartphone hardware components.
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015

Analytical model for power savings in LTE networks using DRX mechanism.
Proceedings of the Twenty First National Conference on Communications, 2015

Browser fuzzing by scheduled mutation and generation of document object models.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
Multihop cellular: from research to systems, standards, and applications [Guest Editorial].
IEEE Wirel. Commun., 2014

On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices.
IEEE Trans. Software Eng., 2014

On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014

Improving the Accuracy of Automated GUI Testing for Embedded Systems.
IEEE Softw., 2014

Behavior-based botnet detection in parallel.
Secur. Commun. Networks, 2014

Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Secur. Commun. Networks, 2014

Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications.
IEEE J. Sel. Areas Commun., 2014

Calibrating parameters and formulas for process-level energy consumption profiling in smartphones.
J. Netw. Comput. Appl., 2014

Automatic Analysis and Classification of Obfuscated Bot Binaries.
Int. J. Netw. Secur., 2014

Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, Software Defined Networking and Beyond.
Int. J. Netw. Comput., 2014

Redefining Security Criteria for Networking Devices with Case Studies.
IEEE Secur. Priv., 2014

Software-Defined Networking: Standardization for Cloud Computing's Second Wave.
Computer, 2014

Active versus Passive Malware Collection.
Computer, 2014

Mobile Application Security.
Computer, 2014

Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoS.
Comput. Networks, 2014

Bug traces: identifying and downsizing packet traces with failures triggered in networking devices.
IEEE Commun. Mag., 2014

Network testing series [Series Editorial].
IEEE Commun. Mag., 2014

Dynamic DRX algorithms for reduced energy consumption and delay in LTE networks.
Proceedings of the 2014 IFIP Wireless Days, 2014

2013
Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems.
J. Netw. Comput. Appl., 2013

Reconfigurable Multi-Resolution Performance Profiling in Android Applications.
IEICE Trans. Inf. Syst., 2013

In-Kernel Relay for Scalable One-to-Many Streaming.
IEEE Multim., 2013

Creditability-based weighted voting for reducing false positives and negatives in intrusion detection.
Comput. Secur., 2013

Identifying android malicious repackaged applications by thread-grained system call sequences.
Comput. Secur., 2013

Topics in network testing [Series editorial].
IEEE Commun. Mag., 2013

Network testing series.
IEEE Commun. Mag., 2013

Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, 4G LTE, and Beyond.
Proceedings of the First International Symposium on Computing and Networking, 2013

2012
Test coverage optimization for large code problems.
J. Syst. Softw., 2012

Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems.
Int. J. Netw. Secur., 2012

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems.
IEEE Commun. Surv. Tutorials, 2012

Session level flow classification by packet size distribution and session grouping.
Comput. Networks, 2012

Low-storage capture and loss recovery selective replay of real flows.
IEEE Commun. Mag., 2012

Topics in network testing.
IEEE Commun. Mag., 2012

Network testing series [Series Editorial].
IEEE Commun. Mag., 2012

Real traffic replay over WLAN with environment emulation.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A fast-converging TCP-equivalent window-averaging rate control scheme.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

2011
Utilizing Multiple Channels With Fewer Radios in Wireless Mesh Networks.
IEEE Trans. Veh. Technol., 2011

A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning.
IEEE Trans. Computers, 2011

Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks.
IEICE Trans. Inf. Syst., 2011

NAT-Compatibility Testbed: An Environment to Automatically Verify Direct Connection Rate.
IEEE Commun. Lett., 2011

To Call or To Be Called Behind NATs is Sensitive in Solving the Direct Connection Problem.
IEEE Commun. Lett., 2011

Realizing and benchmarking broadcast algorithms in wireless mesh networks.
Comput. Commun., 2011

Research challenges towards the Future Internet.
Comput. Commun., 2011

A fuzzy pattern-based filtering algorithm for botnet detection.
Comput. Networks, 2011

Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines.
Ad Hoc Networks, 2011

2010
Design issues and experimental studies of wireless LAN Mesh.
IEEE Wirel. Commun., 2010

Thread allocation in CMP-based multithreaded network processors.
Parallel Comput., 2010

How NAT-compatible are VoIP applications?
IEEE Commun. Mag., 2010

On campus beta site: architecture designs, operational experience, and top product defects.
IEEE Commun. Mag., 2010

Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009

A fast scalable automaton-matching accelerator for embedded content processors.
ACM Trans. Embed. Comput. Syst., 2009

Hardware-Software Codesign for High-Speed Signature-based Virus Scanning.
IEEE Micro, 2009

Application classification using packet size distribution and port association.
J. Netw. Comput. Appl., 2009

Efficient dynamic frame aggregation in IEEE 802.11s mesh networks.
Int. J. Commun. Syst., 2009

Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Comput. Commun., 2009

Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems.
Proceedings of IEEE International Conference on Communications, 2009

2008
Modeling and analysis of core-centric network processors.
ACM Trans. Embed. Comput. Syst., 2008

Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008

kP2PADM: An In-Kernel Architecture of P2P Management Gateway.
IEICE Trans. Inf. Syst., 2008

Accelerating Web Content Filtering by the Early Decision Algorithm.
IEICE Trans. Inf. Syst., 2008

Using String Matching for Deep Packet Inspection.
Computer, 2008

Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway".
Comput. Commun., 2008

Multiple-resource request scheduling for differentiated QoS at website gateway.
Comput. Commun., 2008

On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS.
Comput. Networks, 2008

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Deterministic high-speed root-hashing automaton matching coprocessor for embedded network processor.
SIGARCH Comput. Archit. News, 2007

Taxonomy and Evaluation of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and Responsiveness.
IEEE Netw., 2007

Resource allocation in network processors for network intrusion prevention systems.
J. Syst. Softw., 2007

A platform-based SoC design and implementation of scalable automaton matching for deep packet inspection.
J. Syst. Archit., 2007

Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs.
IEICE Trans. Commun., 2007

On-the-fly TCP path selection algorithm in access link load balancing.
Comput. Commun., 2007

kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Scalable Automaton Matching for High-Speed Deep Content Inspection.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006

Designing an Integrated Architecture for Network Content Security Gateways.
Computer, 2006

Request Scheduling for Differentiated QoS at Website Gateway.
Proceedings of the Information Networking, 2006

An Early Decision Algorithm to Accelerate Web Content Filtering.
Proceedings of the Information Networking, 2006

2005
SOAP Request Scheduling for Differentiated Quality of Service.
Proceedings of the Web Information Systems Engineering - WISE 2005 Workshops, 2005

VPN Gateways over Network Processors: Implementation and Evaluation.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005

2004
Perceptual codec and interaction aware playout algorithms and quality measurements for VoIP systems.
IEEE Trans. Consumer Electron., 2004

Assessing and Improving TCP Rate Shaping over Edge Gateways.
IEEE Trans. Computers, 2004

On shaping TCP traffic at edge gateways.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Tunnel minimization and relay for managing virtual private networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
DiffServ edge routers over network processors: implementation and evaluation.
IEEE Netw., 2003

A Survey and Measurement-Based Comparison of Bandwidth Management Techniques.
IEEE Commun. Surv. Tutorials, 2003

Evolution and Evaluation of Internet Content Delivery.
Proceedings of the International Conference on Internet Computing, 2003

Scalable Transparent E-Mail Outsourcing Services for Enterprises: Design and Benchmark.
Proceedings of the International Conference on Internet Computing, 2003

Direct Web switch routing with state migration, TCP masquerade, and cookie name rewriting.
Proceedings of the Global Telecommunications Conference, 2003

2002
Multihop cellular: A novel architecture for wireless data communications.
J. Commun. Networks, 2002

Building an Integrated Security Gateway: Mechanisms, Performance Evaluations, Implementations, and Research Issues.
IEEE Commun. Surv. Tutorials, 2002

RPIM-SM: extending PIM-SM for RP relocation.
Comput. Commun., 2002

QoS routing granularity in MPLS networks.
IEEE Commun. Mag., 2002

DiffServ over Network Processors: Implementation and Evaluation.
Proceedings of the 10th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2002), August 21, 2002

Base-centric routing protocol for multihop cellular networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
Interleaving collision resolution engines in n-ary tree protocols.
IEEE Commun. Lett., 2001

Open Source Software Development: An Overview.
Computer, 2001

Dynamic resizing of utilization target in measurement-based admission control.
Comput. Commun., 2001

Ordered lookup with bypass matching for scalable per-flow classification in layer 4 routers.
Comput. Commun., 2001

Pre-order Deficit Round Robin: a new scheduling algorithm for packet-switched networks.
Comput. Networks, 2001

Granularity of QoS Routing in MPLS Networks.
Proceedings of the Quality of Service, 2001

Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

Extension of RP relocation to PIM-SM multicast routing.
Proceedings of the IEEE International Conference on Communications, 2001

Two-stage dynamic uplink channel and slot assignment for GPRS.
Proceedings of the IEEE International Conference on Communications, 2001

Two-phase minislot scheduling algorithm for HFC QoS services provisioning.
Proceedings of the Global Telecommunications Conference, 2001

Bandwidth brokers of instantaneous and book-ahead requests for differentiated services networks.
Proceedings of the Global Telecommunications Conference, 2001

Multipath QoS routing with bandwidth guarantee.
Proceedings of the Global Telecommunications Conference, 2001

2000
Statistically optimized minislot allocation for initial and collision resolution in hybrid fiber coaxial networks.
IEEE J. Sel. Areas Commun., 2000

Multihop wireless IEEE 802.11 LANs: A prototype implementation.
J. Commun. Networks, 2000

A novel pairing algorithm for high-speed large-scale switches.
IEEE Commun. Lett., 2000

An Investigation into HFC MAC Protocols: Mechanisms, Implementation, and Research Issues.
IEEE Commun. Surv. Tutorials, 2000

Multihop Cellular: A New Architecture for Wireless Communications.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
The dual flow control problem of TCP over ATM ABR services.
Int. J. Commun. Syst., 1999

1998
A timestamp-sensitive scheduling algorithm for MPEG-II multiplexers in CATV networks.
IEEE Trans. Broadcast., 1998

Allocation and scheduling algorithms for IEEE 802.14 and MCNS in hybrid fiber coaxial networks.
IEEE Trans. Broadcast., 1998

An efficient and orderly implementation of bypass queue under bursty traffic.
Parallel Comput., 1998

Interoperability of EFCI and ER switches for ABR services in ATM networks.
IEEE Netw., 1998

GMNF-DVMRP: an enhanced version of distance vector multicast routing protocol.
Int. J. Commun. Syst., 1998

On IEEE 802.14 Medium Access Control Protocols.
IEEE Commun. Surv. Tutorials, 1998

Performance analysis of rate-based flow control under a variable number of sources.
Comput. Networks ISDN Syst., 1998

Interoperability of EFCI and ER switches for ABR services in ATM networks.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

QoS routing in multihop packet radio environment.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1997
A hierarchical network storage architecture for video-on-demand services.
IEEE Trans. Broadcast., 1997

PCUP: pipelined cyclic upstream protocol over hybrid fiber coax.
IEEE Netw., 1997

Broadband service creation and operations.
IEEE Commun. Mag., 1997

GMNF-DVMRP : A Modified Version of Distance Vector Multicast Routing Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
Alarm correlation for congestion diagnosis in ATM networks.
Proceedings of the 1996 Network Operations and Management Symposium, 1996

Characterization and Control of Highly Correlated Traffic in High-Speed Networks.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996

1993
Induction and Deduction for Autonomous Networks.
IEEE J. Sel. Areas Commun., 1993

HAP: A New Model for Packet Arrivals.
J. High Speed Networks, 1993

1991
Brouter: the transparent bridge with shortest path in interconnected LANs.
Proceedings of the 16th Conference on Local Computer Networks, 1991

Network management using database discovery tools.
Proceedings of the 16th Conference on Local Computer Networks, 1991


  Loading...