default search action
BibTeX records: Rocky K. C. Chang
@inproceedings{DBLP:conf/dsn/WuGDC21, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {543--554}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00063}, doi = {10.1109/DSN48987.2021.00063}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WuGDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11527, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, journal = {CoRR}, volume = {abs/2005.11527}, year = {2020}, url = {https://arxiv.org/abs/2005.11527}, eprinttype = {arXiv}, eprint = {2005.11527}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19, author = {Shiwei Zhang and Weichao Li and Daoyuan Wu and Bo Jin and Rocky K. C. Chang and Debin Gao and Yi Wang and Ricky K. P. Mok}, title = {An empirical study of mobile network behavior and application performance in the wild}, booktitle = {Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3326285.3329039}, doi = {10.1145/3326285.3329039}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuGCHCD19, author = {Daoyuan Wu and Debin Gao and Rocky K. C. Chang and En He and Eric K. T. Cheng and Robert H. Deng}, title = {Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouCGFZ18, author = {Peng Zhou and Rocky K. C. Chang and Xiaojing Gu and Minrui Fei and Jianying Zhou}, title = {Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {98--111}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2015.2509984}, doi = {10.1109/TDSC.2015.2509984}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouCGFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiWCM18, author = {Weichao Li and Daoyuan Wu and Rocky K. C. Chang and Ricky K. P. Mok}, title = {Toward Accurate Network Delay Measurement on Android Phones}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {3}, pages = {717--732}, year = {2018}, url = {https://doi.org/10.1109/TMC.2017.2737990}, doi = {10.1109/TMC.2017.2737990}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LiWCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsys/LeeC18, author = {Steven W. K. Lee and Rocky K. C. Chang}, editor = {Pablo C{\'{e}}sar and Michael Zink and Niall Murray}, title = {Enhancing the experience of multiplayer shooter games via advanced lag compensation}, booktitle = {Proceedings of the 9th {ACM} Multimedia Systems Conference, MMSys 2018, Amsterdam, The Netherlands, June 12-15, 2018}, pages = {284--293}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3204949.3204971}, doi = {10.1145/3204949.3204971}, timestamp = {Wed, 21 Nov 2018 12:44:02 +0100}, biburl = {https://dblp.org/rec/conf/mmsys/LeeC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/MokCL17, author = {Ricky K. P. Mok and Rocky K. C. Chang and Weichao Li}, title = {Detecting Low-Quality Workers in QoE Crowdtesting: {A} Worker Behavior-Based Approach}, journal = {{IEEE} Trans. Multim.}, volume = {19}, number = {3}, pages = {530--543}, year = {2017}, url = {https://doi.org/10.1109/TMM.2016.2619901}, doi = {10.1109/TMM.2016.2619901}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/MokCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/LeeC17, author = {Steven W. K. Lee and Rocky K. C. Chang}, title = {On "shot around a corner" in first-person shooter games}, booktitle = {15th Annual Workshop on Network and Systems Support for Games, NetGames 2017, Taipei, Taiwan, June 22-23, 2017}, pages = {7--12}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NetGames.2017.7991545}, doi = {10.1109/NETGAMES.2017.7991545}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/netgames/LeeC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, editor = {Dilma Da Silva and Bryan Ford}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, booktitle = {Proceedings of the 2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {445--457}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, journal = {CoRR}, volume = {abs/1703.07551}, year = {2017}, url = {http://arxiv.org/abs/1703.07551}, eprinttype = {arXiv}, eprint = {1703.07551}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouGC16, author = {Peng Zhou and Xiaojing Gu and Rocky K. C. Chang}, title = {Harvesting File Download Exploits in the Web: {A} Hacker's View}, journal = {Comput. J.}, volume = {59}, number = {4}, pages = {522--540}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv072}, doi = {10.1093/COMJNL/BXV072}, timestamp = {Fri, 03 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/MokLC16, author = {Ricky K. P. Mok and Weichao Li and Rocky K. C. Chang}, title = {IRate: Initial Video Bitrate Selection System for {HTTP} Streaming}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {6}, pages = {1914--1928}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2559078}, doi = {10.1109/JSAC.2016.2559078}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/MokLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/LiWCM16, author = {Weichao Li and Daoyuan Wu and Rocky K. C. Chang and Ricky K. P. Mok}, editor = {Athina Markopoulou and Michalis Faloutsos and Vyas Sekar and Dejan Kostic}, title = {Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement}, booktitle = {Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016}, pages = {497--504}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2999572.2999595}, doi = {10.1145/2999572.2999595}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/LiWCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChangSV16, author = {Rocky K. C. Chang and Hulya Seferoglu and Laurent Vanbever}, editor = {Athina Markopoulou and Michalis Faloutsos and Vyas Sekar and Dejan Kostic}, title = {{ACM} CoNEXT 2016 Student Workshop}, booktitle = {Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016}, pages = {507--508}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2999572.3004861}, doi = {10.1145/2999572.3004861}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/ChangSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/MembreyVC16, author = {Peter Membrey and Darryl Veitch and Rocky K. C. Chang}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Time to Measure the Pi}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {327--334}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987476}, timestamp = {Tue, 06 Nov 2018 11:07:19 +0100}, biburl = {https://dblp.org/rec/conf/imc/MembreyVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLCG16, author = {Daoyuan Wu and Weichao Li and Rocky K. C. Chang and Debin Gao}, title = {MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic}, journal = {CoRR}, volume = {abs/1610.01282}, year = {2016}, url = {http://arxiv.org/abs/1610.01282}, eprinttype = {arXiv}, eprint = {1610.01282}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiMWC15, author = {Weichao Li and Ricky K. P. Mok and Daoyuan Wu and Rocky K. C. Chang}, title = {On the accuracy of smartphone-based mobile network measurement}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {370--378}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218402}, doi = {10.1109/INFOCOM.2015.7218402}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiMWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/MokLC15, author = {Ricky K. P. Mok and Weichao Li and Rocky K. C. Chang}, title = {Detecting low-quality crowdtesting workers}, booktitle = {23rd {IEEE} International Symposium on Quality of Service, IWQoS 2015, Portland, OR, USA, June 15-16, 2015}, pages = {201--206}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IWQoS.2015.7404734}, doi = {10.1109/IWQOS.2015.7404734}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/MokLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/LeeC15, author = {Wai{-}Kiu Lee and Rocky K. C. Chang}, title = {Evaluation of lag-related configurations in first-person shooter games}, booktitle = {2015 International Workshop on Network and Systems Support for Games, NetGames 2015, Zagreb, Croatia, December 3-4, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NetGames.2015.7382997}, doi = {10.1109/NETGAMES.2015.7382997}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/netgames/LeeC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/MokLC15, author = {Ricky K. P. Mok and Weichao Li and Rocky K. C. Chang}, editor = {Jelena Mirkovic and Yong Liu}, title = {Improving the Packet Send-Time Accuracy in Embedded Devices}, booktitle = {Passive and Active Measurement - 16th International Conference, {PAM} 2015, New York, NY, USA, March 19-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8995}, pages = {332--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15509-8\_25}, doi = {10.1007/978-3-319-15509-8\_25}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/MokLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuC15, author = {Daoyuan Wu and Rocky K. C. Chang}, title = {Indirect File Leaks in Mobile Applications}, journal = {CoRR}, volume = {abs/1511.00104}, year = {2015}, url = {http://arxiv.org/abs/1511.00104}, eprinttype = {arXiv}, eprint = {1511.00104}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLHC14, author = {Yajuan Tang and Xiapu Luo and Qing Hui and Rocky K. C. Chang}, title = {Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {3}, pages = {339--353}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2291970}, doi = {10.1109/TIFS.2013.2291970}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangLHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WuC14, author = {Daoyuan Wu and Rocky K. C. Chang}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Analyzing Android Browser Apps for file: // Vulnerabilities}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {345--363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_20}, doi = {10.1007/978-3-319-13257-0\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/WuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/MokLC14, author = {Ricky K. P. Mok and Weichao Li and Rocky K. C. Chang}, editor = {Fabi{\'{a}}n E. Bustamante and Y. Charlie Hu and Arvind Krishnamurthy and Sylvia Ratnasamy}, title = {A user behavior based cheat detection mechanism for crowdtesting}, booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014}, pages = {123--124}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2619239.2631447}, doi = {10.1145/2619239.2631447}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/MokLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuC14, author = {Daoyuan Wu and Rocky K. C. Chang}, title = {Analyzing Android Browser Apps for file: // Vulnerabilities}, journal = {CoRR}, volume = {abs/1404.4553}, year = {2014}, url = {http://arxiv.org/abs/1404.4553}, eprinttype = {arXiv}, eprint = {1404.4553}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLC14, author = {Daoyuan Wu and Xiapu Luo and Rocky K. C. Chang}, title = {A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps}, journal = {CoRR}, volume = {abs/1405.6282}, year = {2014}, url = {http://arxiv.org/abs/1405.6282}, eprinttype = {arXiv}, eprint = {1405.6282}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouLCC13, author = {Peng Zhou and Xiapu Luo and Ang Chen and Rocky K. C. Chang}, title = {SGor: Trust graph based onion routing}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3522--3544}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.005}, doi = {10.1016/J.COMNET.2013.08.005}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhouLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouLC13, author = {Peng Zhou and Xiapu Luo and Rocky K. C. Chang}, title = {Inference attacks against trust-based onion routing: Trust degree to the rescue}, journal = {Comput. Secur.}, volume = {39}, pages = {431--446}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.09.007}, doi = {10.1016/J.COSE.2013.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LiuLCS13, author = {Yujing Liu and Xiapu Luo and Rocky K. C. Chang and Jinshu Su}, title = {Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {6}, pages = {1147--1157}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.130616}, doi = {10.1109/JSAC.2013.130616}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LiuLCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ChenCLFC13, author = {Ang Chen and Edmond W. W. Chan and Xiapu Luo and Waiting W. T. Fok and Rocky K. C. Chang}, editor = {Filip De Turck and Yixin Diao and Choong Seon Hong and Deep Medhi and Ramin Sadre}, title = {An efficient approach to multi-level route analytics}, booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management {(IM} 2013), Ghent, Belgium, May 27-31, 2013}, pages = {101--108}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6572975/}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/ChenCLFC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/FokLMLLCC13, author = {Waiting W. T. Fok and Xiapu Luo and Ricky K. P. Mok and Weichao Li and Yujing Liu and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Filip De Turck and Yixin Diao and Choong Seon Hong and Deep Medhi and Ramin Sadre}, title = {MonoScope: Automating network faults diagnosis based on active measurements}, booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management {(IM} 2013), Ghent, Belgium, May 27-31, 2013}, pages = {210--217}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6572988/}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/FokLMLLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiMCF13, author = {Weichao Li and Ricky K. P. Mok and Rocky K. C. Chang and Waiting W. T. Fok}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {Appraising the delay accuracy in browser-based network measurement}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {361--368}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504760}, doi = {10.1145/2504730.2504760}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/LiMCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/XueMC13, author = {Lei Xue and Ricky K. P. Mok and Rocky K. C. Chang}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {OMware: an open measurement ware for stable residential broadband measurement}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {497--498}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2491702}, doi = {10.1145/2486001.2491702}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/XueMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pam/2013, editor = {Matthew Roughan and Rocky K. C. Chang}, title = {Passive and Active Measurement - 14th International Conference, {PAM} 2013, Hong Kong, China, March 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7799}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36516-4}, doi = {10.1007/978-3-642-36516-4}, isbn = {978-3-642-36515-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoCZC12, author = {Xiapu Luo and Edmond W. W. Chan and Peng Zhou and Rocky K. C. Chang}, title = {Robust Network Covert Communications Based on {TCP} and Enumerative Combinatorics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {890--902}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.64}, doi = {10.1109/TDSC.2012.64}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiuSC12, author = {Yujing Liu and Jinshu Su and Rocky K. C. Chang}, title = {{LDC:} Detecting {BGP} Prefix Hijacking by Load Distribution Change}, booktitle = {26th {IEEE} International Parallel and Distributed Processing Symposium Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25, 2012}, pages = {1197--1203}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IPDPSW.2012.147}, doi = {10.1109/IPDPSW.2012.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiuSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsys/MokLCC12, author = {Ricky K. P. Mok and Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Mark Claypool and Carsten Griwodz}, title = {{QDASH:} a QoE-aware {DASH} system}, booktitle = {Proceedings of the Third Annual {ACM} {SIGMM} Conference on Multimedia Systems, MMSys 2012, Chapel Hill, NC, USA, February 22-24, 2012}, pages = {11--22}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2155555.2155558}, doi = {10.1145/2155555.2155558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsys/MokLCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/LiuLCS12, author = {Yujing Liu and Xiapu Luo and Rocky K. C. Chang and Jinshu Su}, editor = {Robert Bestak and Lukas Kencl and Li Erran Li and Joerg Widmer and Hao Yin}, title = {Characterizing Inter-domain Rerouting after Japan Earthquake}, booktitle = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7290}, pages = {124--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30054-7\_10}, doi = {10.1007/978-3-642-30054-7\_10}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/LiuLCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhouLC12, author = {Peng Zhou and Xiapu Luo and Rocky K. C. Chang}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {More Anonymity through Trust Degree in Trust-Based Onion Routing}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {273--291}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_17}, doi = {10.1007/978-3-642-36883-7\_17}, timestamp = {Fri, 03 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhouLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuoZZPLC11, author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Exposing invisible timing-based traffic watermarks with {BACKLIT}}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {197--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076760}, doi = {10.1145/2076732.2076760}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LuoZZPLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChenCLC11, author = {Ang Chen and Edmond W. W. Chan and Xiapu Luo and Rocky K. C. Chang}, editor = {Hyun{-}chul Kim and Dimitrios Koutsonikolas and Costin Raiciu}, title = {An integrative multi-level analysis of internet path changes}, booktitle = {Proceedings of The {ACM} CoNEXT Student Workshop, CoNEXT '11 Student, Tokyo, Japan, December 6-9, 2011}, pages = {4:1--4:2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2079327.2079331}, doi = {10.1145/2079327.2079331}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/ChenCLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChanCLMLC11, author = {Edmond W. W. Chan and Ang Chen and Xiapu Luo and Ricky K. P. Mok and Weichao Li and Rocky K. C. Chang}, editor = {Kenjiro Cho and Mark Crovella}, title = {{TRIO:} measuring asymmetric capacity with three minimum round-trip times}, booktitle = {Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011}, pages = {15}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2079296.2079311}, doi = {10.1145/2079296.2079311}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/ChanCLMLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LuoZCCL11, author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Rocky K. C. Chang and Wenke Lee}, title = {A combinatorial approach to network covert communications with applications in Web Leaks}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {474--485}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958260}, doi = {10.1109/DSN.2011.5958260}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LuoZCCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/MokCC11, author = {Ricky K. P. Mok and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Measuring the quality of experience of {HTTP} video streaming}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {485--492}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990550}, doi = {10.1109/INM.2011.5990550}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/MokCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/LiFCLC11, author = {Weichao Li and Waiting W. T. Fok and Edmond W. W. Chan and Xiapu Luo and Rocky K. C. Chang}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Planetopus: {A} system for facilitating collaborative network monitoring}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {911--924}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990499}, doi = {10.1109/INM.2011.5990499}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/LiFCLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuoZCLCP11, author = {Xiapu Luo and Peng Zhou and Edmond W. W. Chan and Wenke Lee and Rocky K. C. Chang and Roberto Perdisci}, title = {{HTTPOS:} Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/httpos-sealing-information-leaks-with-browser-side-obfuscation-of-encrypted-flows}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LuoZCLCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/ChanLFLC11, author = {Edmond W. W. Chan and Xiapu Luo and Waiting W. T. Fok and Weichao Li and Rocky K. C. Chang}, editor = {Neil Spring and George F. Riley}, title = {Non-cooperative Diagnosis of Submarine Cable Faults}, booktitle = {Passive and Active Measurement - 12th International Conference, {PAM} 2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6579}, pages = {224--234}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19260-9\_23}, doi = {10.1007/978-3-642-19260-9\_23}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/ChanLFLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/MokCLC11, author = {Ricky K. P. Mok and Edmond W. W. Chan and Xiapu Luo and Rocky K. C. Chang}, editor = {Nina Taft and David Wetherall}, title = {Inferring the QoE of {HTTP} video streaming from user-viewing activities}, booktitle = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011}, pages = {31--36}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2018602.2018611}, doi = {10.1145/2018602.2018611}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/MokCLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-5794, author = {Peng Zhou and Xiapu Luo and Ang Chen and Rocky K. C. Chang}, title = {STor: Social Network based Anonymous Communication in Tor}, journal = {CoRR}, volume = {abs/1110.5794}, year = {2011}, url = {http://arxiv.org/abs/1110.5794}, eprinttype = {arXiv}, eprint = {1110.5794}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-5794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ChangFLCL10, author = {Rocky K. C. Chang and Waiting W. T. Fok and Weichao Li and Edmond W. W. Chan and Xiapu Luo}, title = {Neighbor-Cooperative Measurement of Network Path Quality}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684138}, doi = {10.1109/GLOCOM.2010.5684138}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ChangFLCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ChanLLFC10, author = {Edmond W. W. Chan and Xiapu Luo and Weichao Li and Waiting W. T. Fok and Rocky K. C. Chang}, editor = {Mark Allman}, title = {Measurement of loss pairs in network paths}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {88--101}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879154}, doi = {10.1145/1879141.1879154}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ChanLLFC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/HuangCH09, author = {Chin{-}Tser Huang and Rocky K. C. Chang and Polly Huang}, title = {Signal Processing Applications in Network Intrusion Detection Systems}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/527689}, doi = {10.1155/2009/527689}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/HuangCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LuoCC09, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, title = {Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/256821}, doi = {10.1155/2009/256821}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/LuoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChanLC09a, author = {Edmond W. W. Chan and Xiapu Luo and Rocky K. C. Chang}, editor = {Matthew Caesar and Polly Huang and Luigi Iannone}, title = {Reliable asymmetric path capacity measurement}, booktitle = {Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, Co-Next Student Workshop '09, Rome, Italy, December 1, 2009}, pages = {55--56}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1658997.1659027}, doi = {10.1145/1658997.1659027}, timestamp = {Wed, 19 May 2021 08:28:09 +0200}, biburl = {https://dblp.org/rec/conf/conext/ChanLC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChanLC09, author = {Edmond W. W. Chan and Xiapu Luo and Rocky K. C. Chang}, editor = {J{\"{o}}rg Liebeherr and Giorgio Ventre and Ernst W. Biersack and Srinivasan Keshav}, title = {A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement}, booktitle = {Proceedings of the 2009 {ACM} Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009}, pages = {205--216}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1658939.1658963}, doi = {10.1145/1658939.1658963}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/ChanLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LuoCC09, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, title = {{CLACK:} {A} Network Covert Channel Based on Partial Acknowledgment Encoding}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198826}, doi = {10.1109/ICC.2009.5198826}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LuoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/TangLHC09, author = {Yajuan Tang and Xiapu Luo and Qing Hui and Rocky K. C. Chang}, title = {On generalized low-rate denial-of-quality attack against Internet services}, booktitle = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, USA, 13-15 July 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IWQoS.2009.5201419}, doi = {10.1109/IWQOS.2009.5201419}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/TangLHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LuoCC09, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Geoffrey M. Voelker and Alec Wolman}, title = {Design and Implementation of {TCP} Data Probes for Reliable and Metric-Rich Network Path Monitoring}, booktitle = {Proceedings of the 2009 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2009, San Diego, CA, USA, June 14-19, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/usenix-09/design-and-implementation-tcp-data-probes-reliable-and-metric-rich-network-path}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/LuoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LuoCC08, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, title = {{TCP} covert timing channels: Design and detection}, booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, pages = {420--429}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DSN.2008.4630112}, doi = {10.1109/DSN.2008.4630112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LuoCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/WangCLC07, author = {Jessie Hui Wang and Dah{-}Ming Chiu and John C. S. Lui and Rocky K. C. Chang}, title = {Inter-AS Inbound Traffic Engineering via {ASPP}}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {4}, number = {1}, pages = {62--70}, year = {2007}, url = {https://doi.org/10.1109/TNSM.2007.030106}, doi = {10.1109/TNSM.2007.030106}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/WangCLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LuoCC07, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Cloak: {A} Ten-Fold Way for Reliable Covert Communications}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {283--298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_19}, doi = {10.1007/978-3-540-74835-9\_19}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LuoCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/expcs/LoCC07, author = {Samantha Lo and Rocky K. C. Chang and Lorenzo Colitti}, title = {An active approach to measuring routing dynamics induced by autonomous systems}, booktitle = {Proceedings of the Workshop on Experimental Computer Science, Part of {ACM} FCRC, San Diego, CA, USA, 13-14 June 2007}, pages = {20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1281700.1281720}, doi = {10.1145/1281700.1281720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/expcs/LoCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/TangLC07, author = {Yajuan Tang and Xiapu Luo and Rocky K. C. Chang}, editor = {Eric Goetz and Sujeet Shenoi}, title = {Protecting Internet Services from Low-Rate DoS Attacks}, booktitle = {Critical Infrastructure Protection, Post-Proceedings of the First Annual {IFIP} Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007}, series = {{IFIP}}, volume = {253}, pages = {251--265}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-75462-8\_18}, doi = {10.1007/978-0-387-75462-8\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/TangLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LuoCC07, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Crafting Web Counters into Covert Channels}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {337--348}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_29}, doi = {10.1007/978-0-387-72367-9\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LuoCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/XieC06, author = {Yi Xie and Rocky K. C. Chang}, title = {Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.820}, doi = {10.1109/GLOCOM.2006.820}, timestamp = {Fri, 21 Feb 2020 18:38:36 +0100}, biburl = {https://dblp.org/rec/conf/globecom/XieC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/LuoCC06, author = {Xiapu Luo and Edmond W. W. Chan and Rocky K. C. Chang}, editor = {Joseph L. Hellerstein and Burkhard Stiller}, title = {Vanguard: {A} New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks}, booktitle = {Management of Integrated End-to-End Communications and Services, 10th {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006, Vancouver, Canada, April 3-7, 2006. Proceedings}, pages = {507--518}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/NOMS.2006.1687579}, doi = {10.1109/NOMS.2006.1687579}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/LuoCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/XieC06, author = {Yi Xie and Rocky K. C. Chang}, editor = {Luciano Lenzini and Rene L. Cruz}, title = {Stability-constrained optimization for energy efficiency in polling-based wireless networks}, booktitle = {Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, {VALUETOOLS} 2006, Pisa, Italy, October 11-13, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {180}, pages = {23}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1190095.1190124}, doi = {10.1145/1190095.1190124}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/valuetools/XieC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/LamCX06, author = {Sum Lam and Rocky K. C. Chang and Yi Xie}, editor = {Luciano Lenzini and Rene L. Cruz}, title = {Relative stability analysis of multiple queues}, booktitle = {Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, {VALUETOOLS} 2006, Pisa, Italy, October 11-13, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {180}, pages = {65}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1190095.1190178}, doi = {10.1145/1190095.1190178}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/valuetools/LamCX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChangL05, author = {Rocky K. C. Chang and Michael Lo}, title = {Inbound traffic engineering for multihomed ASs using {AS} path prepending}, journal = {{IEEE} Netw.}, volume = {19}, number = {2}, pages = {18--25}, year = {2005}, url = {https://doi.org/10.1109/MNET.2005.1407694}, doi = {10.1109/MNET.2005.1407694}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LuoC05, author = {Xiapu Luo and Rocky K. C. Chang}, title = {Optimizing the Pulsing Denial-of-Service Attacks}, booktitle = {2005 International Conference on Dependable Systems and Networks {(DSN} 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings}, pages = {582--591}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/DSN.2005.75}, doi = {10.1109/DSN.2005.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LuoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LuoC05, author = {Xiapu Luo and Rocky K. C. Chang}, title = {Novel Approaches to End-to-End Packet Reordering Measurement}, booktitle = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005, Berkeley, California, USA, October 19-21, 2005}, pages = {227--238}, publisher = {{USENIX} Association}, year = {2005}, url = {http://www.usenix.org/events/imc05/tech/luo.html}, timestamp = {Mon, 08 Jul 2019 07:25:34 +0200}, biburl = {https://dblp.org/rec/conf/imc/LuoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/HuC05, author = {Guangmin Hu and Rocky K. C. Chang}, title = {Forwarding State Scalability-Aware Multicast Routing}, booktitle = {Proceedings of the 10th {IEEE} Symposium on Computers and Communications {(ISCC} 2005), 27-30 June 2005, Murcia, Cartagena, Spain}, pages = {395--400}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISCC.2005.73}, doi = {10.1109/ISCC.2005.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/HuC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/LuoCC05, author = {Xiapu Luo and Rocky K. C. Chang and Edmond W. W. Chan}, title = {Performance Analysis of {TCP/AQM} Under Denial-of-Service Attacks}, booktitle = {13th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2005), 27-29 September 2005, Atlanta, GA, {USA}}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MASCOTS.2005.50}, doi = {10.1109/MASCOTS.2005.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/LuoCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuoC05, author = {Xiapu Luo and Rocky K. C. Chang}, title = {On a New Class of Pulsing Denial-of-Service Attacks and the Defense}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/new-class-pulsing-denial-service-attacks-and-defense/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/ChanC04, author = {Hang T. Chan and Rocky K. C. Chang}, title = {Strifeshadow Fantasy: a massive multi-player online game}, booktitle = {1st {IEEE} Consumer Communications and Networking Conference, {CCNC} 2004, Las Vegas, NV, USA, January 5-8, 2004}, pages = {557--562}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CCNC.2004.1286922}, doi = {10.1109/CCNC.2004.1286922}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/ChanC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/Chang04, author = {Rocky K. C. Chang}, editor = {Roger D. Boyle and Martyn Clark and Amruth N. Kumar}, title = {Teaching computer networking with the help of personal computer networks}, booktitle = {Proceedings of the 9th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2004, Leeds, UK, June 28-30, 2004}, pages = {208--212}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007996.1008052}, doi = {10.1145/1007996.1008052}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/iticse/Chang04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ChangL04, author = {Rocky K. C. Chang and Michael Lo}, title = {Inbound traffic engineering for multi-homed ASes using {AS} path prepending}, booktitle = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea, 19-23 April 2004, Proceedings}, pages = {89--102}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/NOMS.2004.1317645}, doi = {10.1109/NOMS.2004.1317645}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/ChangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/LamC03, author = {Sum Lam and Rocky K. C. Chang}, title = {Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {31}, number = {2}, pages = {20--22}, year = {2003}, url = {https://doi.org/10.1145/959143.959156}, doi = {10.1145/959143.959156}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/LamC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Chang03, author = {Rocky K. C. Chang}, editor = {Irwin King and Tam{\'{a}}s M{\'{a}}ray}, title = {A Multicast-On-Large-Demand Approach to the Flash Crowd Problem}, booktitle = {Proceedings of the Twelfth International World Wide Web Conference - Posters, {WWW} 2003, Budapest, Hungary, May 20-24, 2003}, year = {2003}, url = {http://www2003.org/cdrom/papers/poster/p270/P270-Chang.html}, timestamp = {Wed, 17 Jul 2013 16:59:51 +0200}, biburl = {https://dblp.org/rec/conf/www/Chang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Chang02, author = {Rocky K. C. Chang}, title = {Defending against flooding-based distributed denial-of-service attacks: a tutorial}, journal = {{IEEE} Commun. Mag.}, volume = {40}, number = {10}, pages = {42--51}, year = {2002}, url = {https://doi.org/10.1109/MCOM.2002.1039856}, doi = {10.1109/MCOM.2002.1039856}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Chang02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SiuC02, author = {Fai Siu and Rocky K. C. Chang}, title = {Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies}, journal = {Comput. Networks}, volume = {38}, number = {1}, pages = {61--74}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(01)00240-7}, doi = {10.1016/S1389-1286(01)00240-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SiuC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/WanC02, author = {Kalman K. K. Wan and Rocky K. C. Chang}, title = {Engineering of a global defense infrastructure for DDoS attacks}, booktitle = {Proceedings 10th {IEEE} International Conference on Networks: Towards Network Superiority, {ICON} 2002, Singapore, August 27-30, 2002}, pages = {419--427}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICON.2002.1033348}, doi = {10.1109/ICON.2002.1033348}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icon/WanC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ChangF02, author = {Rocky K. C. Chang and King P. Fung}, title = {Transport layer proxy for stateful {UDP} packet filtering}, booktitle = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications {(ISCC} 2002), 1-4 July 2002, Taormina, Italy}, pages = {595--600}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ISCC.2002.1021735}, doi = {10.1109/ISCC.2002.1021735}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ChangF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ChangW01, author = {Rocky K. C. Chang and Hong Y. Wang}, title = {Routing Properties of a Recursive Interconnection Network}, journal = {J. Parallel Distributed Comput.}, volume = {61}, number = {6}, pages = {838--849}, year = {2001}, url = {https://doi.org/10.1006/jpdc.2001.1729}, doi = {10.1006/JPDC.2001.1729}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/ChangW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/LamC01, author = {Sum Lam and Rocky K. C. Chang}, title = {Stability comparison in single-server-multiple-queue systems}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {29}, number = {3}, pages = {32--34}, year = {2001}, url = {https://doi.org/10.1145/507553.507567}, doi = {10.1145/507553.507567}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/LamC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/ChangL01a, author = {Rocky K. C. Chang and Sum Lam}, title = {Per-queue stability analysis of a random access system}, journal = {{IEEE} Trans. Autom. Control.}, volume = {46}, number = {9}, pages = {1466--1470}, year = {2001}, url = {https://doi.org/10.1109/9.948479}, doi = {10.1109/9.948479}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tac/ChangL01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/TsangC01, author = {EsteUa C. M. Tsang and Rocky K. C. Chang}, title = {A simulation study on the throughput fairness of {TCP} Vegas}, booktitle = {Proceedings 9th {IEEE} International Conference on Networks, {ICON} 2001, Bangkok, Thailand, October 10-11, 2001}, pages = {469--474}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICON.2001.962387}, doi = {10.1109/ICON.2001.962387}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/TsangC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/FungC00, author = {King P. Fung and Rocky K. C. Chang}, title = {A Transport-Level Proxy for Secure Multimedia Streams}, journal = {{IEEE} Internet Comput.}, volume = {4}, number = {6}, pages = {57--67}, year = {2000}, url = {https://doi.org/10.1109/4236.895017}, doi = {10.1109/4236.895017}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/FungC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/ChangL00, author = {Rocky K. C. Chang and Sum Lam}, title = {A novel approach to queue stability analysis of polling models}, journal = {Perform. Evaluation}, volume = {40}, number = {1-3}, pages = {27--46}, year = {2000}, url = {https://doi.org/10.1016/S0166-5316(99)00068-1}, doi = {10.1016/S0166-5316(99)00068-1}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/ChangL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/ChangC00, author = {Rocky K. C. Chang and Ho Y. Chan}, title = {A throughput deadlock-free {TCP} for high-speed Internet}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, {ICON} 2000, Singapore, September 5-8, 2000}, pages = {87--92}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICON.2000.875773}, doi = {10.1109/ICON.2000.875773}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/ChangC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ChengC00, author = {Filli Y. Y. Cheng and Rocky K. C. Chang}, title = {A Tree Switching Protocol for Multicast State Reduction}, booktitle = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications {(ISCC} 2000), 4-6 July 2000, Antibes, France}, pages = {672--677}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ISCC.2000.860716}, doi = {10.1109/ISCC.2000.860716}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ChengC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/SiuC98, author = {Fai Siu and Rocky K. C. Chang}, editor = {Peng{-}Jun Wan and Ding{-}Zhu Du and Panos M. Pardalos}, title = {Optimal node assignment in reconfigurable {WDM} lightwave networks with regular virtual topologies}, booktitle = {Multichannel Optical Networks: Theory and Practice, Proceedings of a {DIMACS} Workshop, March 16-19, 1998}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {46}, pages = {205--226}, publisher = {{DIMACS/AMS}}, year = {1998}, url = {https://doi.org/10.1090/dimacs/046/15}, doi = {10.1090/DIMACS/046/15}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/SiuC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/SiuC98, author = {Fai Siu and Rocky K. C. Chang}, title = {Optimal node assignment in reconfigurable {WDM} lightwave networks with regular virtual topologies}, booktitle = {Proceedings of the Third {IEEE} Symposium on Computers and Communications {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece}, pages = {375--379}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISCC.1998.702550}, doi = {10.1109/ISCC.1998.702550}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/SiuC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/SiuC98a, author = {Fai Siu and Rocky K. C. Chang}, title = {Improving the performance of reconfigurable {WDM} lightwave networks with deflection routing via node reassignment}, booktitle = {Proceedings of the Third {IEEE} Symposium on Computers and Communications {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece}, pages = {385--389}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISCC.1998.702552}, doi = {10.1109/ISCC.1998.702552}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/SiuC98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/WongC98, author = {Simon C. Wong and Rocky K. C. Chang}, title = {An optimal end-to-end bypass configuration algorithm for self-heating VP-based {ATM} networks}, booktitle = {Proceedings of the Third {IEEE} Symposium on Computers and Communications {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece}, pages = {627--631}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISCC.1998.702611}, doi = {10.1109/ISCC.1998.702611}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/WongC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.