Yuan-Cheng Lai

Orcid: 0000-0003-3695-5784

According to our database1, Yuan-Cheng Lai authored at least 224 papers between 1996 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams.
Comput. Networks, 2025

2024
Ratio-Based Offloading Optimization for Edge and Vehicular-Fog Federated Systems: A Multi-Agent TD3 Approach.
IEEE Trans. Veh. Technol., November, 2024

MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology.
IEEE Trans. Netw. Serv. Manag., August, 2024

Prioritization and offloading in P4 switch integrated with NFV.
Telecommun. Syst., July, 2024

Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024

AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.
J. Netw. Comput. Appl., 2024

P4toNFV: Offloading from P4 switches to NFV in programmable data planes.
Int. J. Commun. Syst., 2024

Two-stage multi-datasource machine learning for attack technique and lifecycle detection.
Comput. Secur., 2024

A distinguished-bit tracking knowledge-based query tree for RFID tag identification.
Comput. Commun., 2024

Selecting and Developing a Quantum Internet Simulator for the Needs of New Audience: Practices and Considerations.
IEEE Access, 2024

Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement.
IEEE Access, 2024

Path Finding via Shape Context Matching.
Proceedings of the 16th International Conference on Advanced Computational Intelligence, 2024

Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Dual-uCPE for High-Availability Retailer Services with Fault Toleranceand Load Balancing.
IEEE Internet Things Mag., December, 2023

Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
Computer, December, 2023

Host-based intrusion detection with multi-datasource and deep learning.
J. Inf. Secur. Appl., November, 2023

Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems.
J. Netw. Comput. Appl., June, 2023

Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection.
Comput. Secur., June, 2023

Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation.
Comput. Networks, June, 2023

Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture.
IEEE Trans. Netw. Serv. Manag., March, 2023

The Candlestick-Tracking Trend Decision for Day Trading on Taiwan Index Futures Market.
Proceedings of the 2023 5th International Electronics Communication Conference, 2023

2022
Combined Communication and Computing Resource Scheduling in Sliced 5G Multi-Access Edge Computing Systems.
IEEE Trans. Veh. Technol., 2022

Analyzing vertical and horizontal offloading in federated cloud and edge computing systems.
Telecommun. Syst., 2022

A Bit-Tracking Knowledge-Based Query Tree for RFID Tag Identification in IoT Systems.
Sensors, 2022

Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics.
J. Inf. Secur. Appl., 2022

ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions.
J. Inf. Secur. Appl., 2022

Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection.
IEEE Access, 2022

A Deep Learning Methodology to Detect Trojaned AI-based DDoS Defend Model.
Proceedings of the 8th International Conference on Automation, Robotics and Applications, 2022

Video-Based Text to American Sign Language via Transitional Motion Synthesis.
Proceedings of the 12th International Conference on Advanced Computer Information Technologies, 2022

A Weather-Based Traffic Prediction System Using Big Data Techniques.
Proceedings of the 12th International Conference on Advanced Computer Information Technologies, 2022

2021
QoS Violation Probability Minimization in Federating Vehicular-Fogs With Cloud and Edge Systems.
IEEE Trans. Veh. Technol., 2021

Scaling and Offloading Optimization in Pre-CORD and Post-CORD Multi-Access Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021

A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network.
Sensors, 2021

CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection.
J. Netw. Comput. Appl., 2021

Buffering and prioritization in switches for fast processing table-miss packets in software-defined networks.
Int. J. Commun. Syst., 2021

Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems.
CoRR, 2021

Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

Offloading Optimization with Delay Constraint in the 3-tier Federated Cloud, Edge, and Fog Systems.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Transparent AAA Security Design for Low-Latency MEC-Integrated Cellular Networks.
IEEE Trans. Veh. Technol., 2020

Smoothed Graphic User Interaction on Smartphones With Motion Prediction.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading.
IEEE Trans. Netw. Serv. Manag., 2020

Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation.
IEEE Netw., 2020

ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines.
J. Netw. Comput. Appl., 2020

Cost minimization in placing service chains for virtualized network functions.
Int. J. Commun. Syst., 2020

A knowledge-based Query Tree with Shortcutting and Couple-Resolution for RFID tag identification.
Comput. Commun., 2020

Full encapsulation or internal buffering in OpenFlow based hardware switches?
Comput. Networks, 2020

OMNI: Omni-directional Dual Cost Optimization of Two-Tier Federated Cloud-Edge Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
Communication and Computation Offloading for Multi-RAT Mobile Edge Computing.
IEEE Wirel. Commun., 2019

Generic Validation Criteria and Methodologies for SDN Applications.
IEEE Syst. J., 2019

Social-Aware Peer Discovery for Energy Harvesting-Based Device-To-Device Communications.
Sensors, 2019

Analytical Modelling of Software and Hardware Switches with Internal Buffer in Software-Defined Networks.
J. Netw. Comput. Appl., 2019

Performance modeling and analysis of TCP and UDP flows over software defined networks.
J. Netw. Comput. Appl., 2019

A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms.
J. Netw. Comput. Appl., 2019

Proactive multipath routing with a predictive mechanism in software-defined networks.
Int. J. Commun. Syst., 2019

Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

F1ow-based Anomaly Detection Using Multilayer Perceptron in Software Defined Networks.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

2018
Two-tier dynamic load balancing in SDN-enabled Wi-Fi networks.
Wirel. Networks, 2018

Wi-Fi offloading between LTE and WLAN with combined UE and BS information.
Wirel. Networks, 2018

Clustering and Symbolic Regression for Power Consumption Estimation on Smartphone Hardware Subsystems.
IEEE Trans. Sustain. Comput., 2018

Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices for Mobile Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2018

Soft Partitioning Flow Tables for Virtual Networking in Multi-Tenant Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

OFBench: Performance Test Suite on OpenFlow Switches.
IEEE Syst. J., 2018

Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018

Hierarchical CORD for NFV Datacenters: Resource Allocation with Cost-Latency Tradeoff.
IEEE Netw., 2018

Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches.
J. Netw. Comput. Appl., 2018

Modelling Software-Defined Networking: Software and hardware switches.
J. Netw. Comput. Appl., 2018

Performance modeling and comparison of NFV integrated with SDN: Under or aside?
J. Netw. Comput. Appl., 2018

Joint server and network optimization toward load-balanced service chaining.
Int. J. Commun. Syst., 2018

Benchmarking handheld graphical user interface: Smoothness quality of experience.
Comput. Electr. Eng., 2018

An Interleaved-Sleeping-Listening scheduler for power saving in mobile stations.
Comput. Electr. Eng., 2018

Query Tree with Knowledge-based Splitting for RFID Tag Identification.
Proceedings of the 2018 International Conference on Sensors, Signal and Image Processing, 2018

Modelling Switches with Internal Buffering in Software-Defined Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Scalable multicasting with multiple shared trees in software defined networking.
J. Netw. Comput. Appl., 2017

Efficient time-oriented anti-collision protocol for RFID tag identification.
Comput. Commun., 2017

A Group Bandwidth Reservation Scheme to Enhance the Driver's Safety in Vehicles and Transport Environment.
Comput. J., 2017

Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority Queueing.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Accurate Traffic Flow Estimation in Urban Roads with Considering the Traffic Signals.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

Hash-based load balanced traffic steering on softswitches for chaining virtualized network functions.
Proceedings of the IEEE International Conference on Communications, 2017

Performance Modeling and Analysis of TCP Connections over Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Performance Modeling of SDN with NFV under or aside the Controller.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

2016
SEMI: Semi-Online Power Estimates for Smartphone Hardware Components.
IEEE Trans. Sustain. Comput., 2016

PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces.
IEEE Syst. J., 2016

High performance traffic classification based on message size sequence and distribution.
J. Netw. Comput. Appl., 2016

Traffic diversity and code coverage: a preliminary analysis.
Int. J. Commun. Syst., 2016

Application Performance Profiling in Android Dalvik Virtual Machines.
IEICE Trans. Inf. Syst., 2016

Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization.
Computer, 2016

A joint network and server load balancing algorithm for chaining virtualized network functions.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Fast failover and switchover for link failures and congestion in software defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification.
IEEE/ACM Trans. Netw., 2015

Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds.
IEEE Syst. J., 2015

Three-phase behavior-based detection and classification of known and unknown malware.
Secur. Commun. Networks, 2015

Stateful traffic replay for web application proxies.
Secur. Commun. Networks, 2015

An extended SDN architecture for network function virtualization with a case study on intrusion prevention.
IEEE Netw., 2015

Two-tier project and job scheduling for SaaS cloud service providers.
J. Netw. Comput. Appl., 2015

A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Semi-online power estimation for smartphone hardware components.
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems, 2015

Browser fuzzing by scheduled mutation and generation of document object models.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices.
IEEE Trans. Software Eng., 2014

On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks.
IEEE Trans. Netw. Serv. Manag., 2014

Improving the Accuracy of Automated GUI Testing for Embedded Systems.
IEEE Softw., 2014

Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Secur. Commun. Networks, 2014

Calibrating parameters and formulas for process-level energy consumption profiling in smartphones.
J. Netw. Comput. Appl., 2014

Automatic Analysis and Classification of Obfuscated Bot Binaries.
Int. J. Netw. Secur., 2014

A bandwidth allocation algorithm with channel quality and QoS aware for IEEE 802.16 base stations.
Int. J. Commun. Syst., 2014

Adaptive frame on binary splitting for radio frequency identification anticollision.
Int. J. Commun. Syst., 2014

Development and Evaluation of Across-Unit Diagnostic Feedback Mechanism for Online Learning.
J. Educ. Technol. Soc., 2014

Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoS.
Comput. Networks, 2014

Bug traces: identifying and downsizing packet traces with failures triggered in networking devices.
IEEE Commun. Mag., 2014

Using collaborative annotating and data mining on formative assessments to enhance learning efficiency.
Comput. Appl. Eng. Educ., 2014

2013
A Novel Query Tree Protocol with Bit Tracking in RFID Tag Identification.
IEEE Trans. Mob. Comput., 2013

Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems.
J. Netw. Comput. Appl., 2013

A tracking system using location prediction and dynamic threshold for minimizing SMS delivery.
J. Commun. Networks, 2013

Reconfigurable Multi-Resolution Performance Profiling in Android Applications.
IEICE Trans. Inf. Syst., 2013

In-Kernel Relay for Scalable One-to-Many Streaming.
IEEE Multim., 2013

Timely Diagnostic Feedback for Database Concept Learning.
J. Educ. Technol. Soc., 2013

Harnessing Collaborative Annotations on Online Formative Assessments.
J. Educ. Technol. Soc., 2013

A semi-blocking algorithm on adaptive query splitting for RFID tag identification.
EURASIP J. Wirel. Commun. Netw., 2013

Creditability-based weighted voting for reducing false positives and negatives in intrusion detection.
Comput. Secur., 2013

Identifying android malicious repackaged applications by thread-grained system call sequences.
Comput. Secur., 2013

An RFID anti-collision algorithm with dynamic condensation and ordering binary tree.
Comput. Commun., 2013

Online formative assessments with social network awareness.
Comput. Educ., 2013

2012
Two Couple-Resolution Blocking Protocols on Adaptive Query Splitting for RFID Tag Identification.
IEEE Trans. Mob. Comput., 2012

Test coverage optimization for large code problems.
J. Syst. Softw., 2012

A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks.
J. Netw. Comput. Appl., 2012

Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems.
Int. J. Netw. Secur., 2012

Heuristic algorithms for two-dimensional uplink burst construction in IEEE 802.16 networks.
Comput. Stand. Interfaces, 2012

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems.
IEEE Commun. Surv. Tutorials, 2012

Session level flow classification by packet size distribution and session grouping.
Comput. Networks, 2012

Low-storage capture and loss recovery selective replay of real flows.
IEEE Commun. Mag., 2012

Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems.
IEEE Commun. Mag., 2012

Real traffic replay over WLAN with environment emulation.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A fast-converging TCP-equivalent window-averaging rate control scheme.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst Construction.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Utilizing Multiple Channels With Fewer Radios in Wireless Mesh Networks.
IEEE Trans. Veh. Technol., 2011

A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning.
IEEE Trans. Computers, 2011

Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks.
IEICE Trans. Inf. Syst., 2011

Two-dimensional downlink burst construction in IEEE 802.16 networks.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Thread allocation in CMP-based multithreaded network processors.
Parallel Comput., 2010

General binary tree protocol for coping with the capture effect in RFID tag identification.
IEEE Commun. Lett., 2010

A high-performance and well-manageable distributed measurement laboratory with an object-oriented approach.
Comput. Appl. Eng. Educ., 2010

Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Realizing a Sub-Linear Time String-Matching Algorithm With a Hardware Accelerator Using Bloom Filters.
IEEE Trans. Very Large Scale Integr. Syst., 2009

Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification.
IEEE/ACM Trans. Netw., 2009

A fast scalable automaton-matching accelerator for embedded content processors.
ACM Trans. Embed. Comput. Syst., 2009

Hardware-Software Codesign for High-Speed Signature-based Virus Scanning.
IEEE Micro, 2009

Application classification using packet size distribution and port association.
J. Netw. Comput. Appl., 2009

Manageable and Extensible Video Streaming Systems for On-Line Monitoring of Remote Laboratory Experiments.
Int. J. Online Eng., 2009

Efficient dynamic frame aggregation in IEEE 802.11s mesh networks.
Int. J. Commun. Syst., 2009

Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Comput. Commun., 2009

Efficient development of a web-based environmental testing system using a novel two-layer software architecture.
Comput. Appl. Eng. Educ., 2009

Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems.
Proceedings of IEEE International Conference on Communications, 2009

Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
Modeling and analysis of core-centric network processors.
ACM Trans. Embed. Comput. Syst., 2008

Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy.
J. Syst. Softw., 2008

DCCP: Transport Protocol with Congestion Control and Unreliability.
IEEE Internet Comput., 2008

kP2PADM: An In-Kernel Architecture of P2P Management Gateway.
IEICE Trans. Inf. Syst., 2008

Accelerating Web Content Filtering by the Early Decision Algorithm.
IEICE Trans. Inf. Syst., 2008

A Pair-Resolution Blocking Algorithm on Adaptive Binary Splitting for RFID Tag Identification.
IEEE Commun. Lett., 2008

DCCP Congestion Control with Virtual Recovery to Achieve TCP-Fairness.
IEEE Commun. Lett., 2008

Using String Matching for Deep Packet Inspection.
Computer, 2008

Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway".
Comput. Commun., 2008

Multiple-resource request scheduling for differentiated QoS at website gateway.
Comput. Commun., 2008

Achieving proportional loss rate differentiation in a wireless network with a multi-state link.
Comput. Commun., 2008

On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS.
Comput. Networks, 2008

DCCP partial reliability extension with sequence number compensation.
Comput. Networks, 2008

A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Robust TCP Vegas in Wireless Networks.
Proceedings of the Advances in Multimedia Information Processing, 2008

Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base Stations.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Deterministic high-speed root-hashing automaton matching coprocessor for embedded network processor.
SIGARCH Comput. Archit. News, 2007

Taxonomy and Evaluation of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and Responsiveness.
IEEE Netw., 2007

Resource allocation in network processors for network intrusion prevention systems.
J. Syst. Softw., 2007

A platform-based SoC design and implementation of scalable automaton matching for deep packet inspection.
J. Syst. Archit., 2007

Provision of proportional delay differentiation in wireless LAN using a cross-layer fine-tuning scheduling scheme.
IET Commun., 2007

TCP-friendly congestion control to guarantee smoothness by Slack Term.
Comput. Commun., 2007

Two schedulers to provide delay proportion and reduce queueing delay simultaneously.
Comput. Networks, 2007

kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Dynamic Backoff Time Adjustment with Considering Channel Condition for IEEE 802.11e EDCA.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Achieving Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Link.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Scalable Automaton Matching for High-Speed Deep Content Inspection.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Non-Work-Conserving Scheduler to Provide Proportional Delay Differentiated Services and Best Effort Service.
IEICE Trans. Commun., 2006

A high-performance and fair scheduler for the wireless network with a multi-state channel.
IEEE Commun. Lett., 2006

Profiling and accelerating string matching algorithms in three network content security applications.
IEEE Commun. Surv. Tutorials, 2006

Designing an Integrated Architecture for Network Content Security Gateways.
Computer, 2006

Request Scheduling for Differentiated QoS at Website Gateway.
Proceedings of the Information Networking, 2006

An Early Decision Algorithm to Accelerate Web Content Filtering.
Proceedings of the Information Networking, 2006

A Web-based Server Management System with IPMI and WMI Techniques.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

2005
VPN Gateways over Network Processors: Implementation and Evaluation.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Some Schedulers to Achieve Proportional Junk Rate Differentiation.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Some Packet Schedulers for Proportional Delay Differentiated Services and Best Effort Service.
Proceedings of The 2005 International Conference on Internet Computing, 2005

A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005

2004
Perceptual codec and interaction aware playout algorithms and quality measurements for VoIP systems.
IEEE Trans. Consumer Electron., 2004

A Novel TCP-Friendly Congestion Control with Virtual Reno and Slack Term.
Proceedings of the Information Networking, 2004

A TCP-Friendly Congestion Control to Guarantee Smoothness by Slack Term.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Packet schedulers to provide proportional delay differentiation and reduce packet queueing delay simultaneously.
Proceedings of IEEE International Conference on Communications, 2004

A non-work-conserving scheduler to provide proportional delay Differentiated Services.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
A novel scheduler for proportional delay differentiation by considering packet transmission time.
IEEE Commun. Lett., 2003

A novel admission control for fairly admitting wideband and narrowband calls.
IEEE Commun. Lett., 2003

Some Improvements of TCP Congestion Control.
Proceedings of the Information Networking, 2003

A Look-Ahead Scheduler to Provide Proportional Delay Differentiation in Wireless Network with a Multi-state Link.
Proceedings of the Information Networking, 2003

A high-performance scheduler to achieve proportional delay differentiation.
Proceedings of IEEE International Conference on Communications, 2003

2002
Performance comparison between TCP Reno and TCP Vegas.
Comput. Commun., 2002

Three remedied algorithms for Advanced Waiting Time Scheduler.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Performance Analysis of Wireless TCP.
Proceedings of the Information Networking, 2002

A Novel Scheduler for the Proportional Delay Differentiation Model by Considering Packet Transmission Time.
Proceedings of the Information Networking, 2002

A Fair Admission Control for Large-Bandwidth Multimedia Applications.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

A novel admission control for optimal fairness.
Proceedings of the Global Telecommunications Conference, 2002

2001
Unfairness of measurement-based admission controls in a heterogeneous environment.
Int. J. Commun. Syst., 2001

Improving the Performance of TCP Vegas in a Heterogeneous Environment.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

TCP congestion control algorithms and a performance comparison.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

Some fair measurement-based admission controls.
Proceedings of the Global Telecommunications Conference, 2001

1999
The dual flow control problem of TCP over ATM ABR services.
Int. J. Commun. Syst., 1999

1998
Interoperability of EFCI and ER switches for ABR services in ATM networks.
IEEE Netw., 1998

GMNF-DVMRP: an enhanced version of distance vector multicast routing protocol.
Int. J. Commun. Syst., 1998

Performance analysis of rate-based flow control under a variable number of sources.
Comput. Networks ISDN Syst., 1998

Interoperability of EFCI and ER switches for ABR services in ATM networks.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1997
A hierarchical network storage architecture for video-on-demand services.
IEEE Trans. Broadcast., 1997

GMNF-DVMRP : A Modified Version of Distance Vector Multicast Routing Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
Characterization and Control of Highly Correlated Traffic in High-Speed Networks.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996


  Loading...