


Остановите войну!
for scientists:


default search action
Tzi-cker Chiueh
Tzi-Cker Chiueh
Person information

- affiliation: Industrial Technology Research Institute, Hsinchu, Taiwan
- affiliation (former): Stony Brook University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j24]Shen-Ming Chung
, Ming-Der Shieh, Tzi-Cker Chiueh:
FETCH: A cloud-native searchable encryption scheme enabling efficient pattern search on encrypted data within cloud services. Int. J. Commun. Syst. 36(1) (2023) - 2021
- [c227]Tzi-cker Chiueh:
Keynote I: Advances in memory state-preserving fault tolerance. DSN 2021: xxvii-xxxi - 2020
- [j23]Shen-Ming Chung
, Ming-Der Shieh, Tzi-Cker Chiueh, Chia-Chia Liu, Chia-Heng Tu:
uFETCH: A Unified Searchable Encryption Scheme and Its Saas-Native to Make DBMS Privacy-Preserving. IEEE Access 8: 93894-93906 (2020) - [c226]Chieh-Yu Yu, Che-Rung Lee, Po-Jui Tsao, Yu-Shiang Lin, Tzi-Cker Chiueh:
Efficient Group Fault Tolerance for Multi-tier Services in Cloud Environments. ICC 2020: 1-7 - [c225]Kevin Cheng, Spoorti Doddamani, Tzi-cker Chiueh, Yongheng Li, Kartik Gopalan:
Directvisor: virtualization for bare-metal cloud. VEE 2020: 45-58
2010 – 2019
- 2019
- [c224]Tzi-cker Chiueh, Peng-Kai Hsu, Chao-Tang Lee, Yu-sheng Lin, Yi-Fu Hung, Sian-Jing Lin, Tai-Hua Hsiao:
Evaluation of a Disaggregated Rack System. APSys 2019: 107-113 - 2018
- [c223]Shen-Ming Chung, Ming-Der Shieh, Tzi-Cker Chiueh:
A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption. SC² 2018: 127-130 - [c222]William Cheng-Chun Tu, Tzi-cker Chiueh:
Seamless Fail-over for PCIe Switched Networks. SYSTOR 2018: 101-111 - [c221]Tzi-cker Chiueh, Mao-Cheng Huang, Kai-Cheung Juang, Shih-Hao Liang, Welkin Ling:
Virtualizing Energy Storage Management Using RAIBA. USENIX Annual Technical Conference 2018: 187-198 - 2017
- [c220]Tzi-cker Chiueh, Jyh Shyuer Peng:
Dynamic Refresh Rate Control for IGZO Display. APSys 2017: 9:1-9:6 - [c219]Yifeng Sun, Tzi-cker Chiueh:
TCP Performance Optimization for Epoch-based Execution. APSys 2017: 10:1-10:7 - 2016
- [c218]Tzi-cker Chiueh:
Keynote speaker: Visualization for deep learning training. PacificVis 2016 - [c217]Ting-Chou Lu, Li-Ren Huang, Yu Lee, Kun-Ju Tsai, Yu-Te Liao
, Nai-Chen Cheng, Yuan-Hua Chu, Yi-Hsing Tsai, Fang-Chu Chen, Tzi-cker Chiueh:
Invited - Wireless sensor nodes for environmental monitoring in internet of things. DAC 2016: 3:1-3:5 - [c216]Tzi-cker Chiueh, Houcheng Lin, Ares Chao, Anthony, Tan-Gen Wu, Chieh-Min Wang, Yu-Sung Wu:
Smartphone Virtualization. ICPADS 2016: 141-150 - [c215]Xiang Gao, Tzi-cker Chiueh:
Towards Seamless Resynchronization for Active-Active Database Clustering. ICPADS 2016: 1127-1134 - [i5]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Duplication of Windows Services. CoRR abs/1608.08051 (2016) - [i4]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining Windows Inter-Process Communications for OS-Level Virtual Machine. CoRR abs/1609.04781 (2016) - [i3]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing System and Ordinary Services in Windows-based OS-Level Virtual Machines. CoRR abs/1609.04785 (2016) - 2015
- [c214]Jui-Hao Chiang, Tzi-cker Chiueh, Han-Lin Li:
Memory Reclamation and Compression Using Accurate Working Set Size Estimation. CLOUD 2015: 187-194 - [c213]Shih-Hao Liang, Tzi-cker Chiueh, Welkin Ling:
Go Gentle into the Good Night via Controlled Battery Discharging. APSys 2015: 17:1-17:6 - [c212]Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai:
An intelligent surveillance video analysis service in cloud environment. ICCST 2015: 1-6 - [c211]Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang:
Security considerations in ITRI cloud OS. ICCST 2015: 107-112 - [c210]Jui-Hao Chiang, Tzi-cker Chiueh, Han-Lin Li:
Memory Pressure Balancing on Virtualized Servers. RTCSA 2015: 70-79 - [c209]Cheng-Chun Tu, Michael Ferdman, Chao-Tang Lee, Tzi-cker Chiueh:
A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery. VEE 2015: 1-15 - 2014
- [j22]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014) - [c208]Cheng-Chun Tu, Chao-Tang Lee, Tzi-cker Chiueh:
Marlin: a memory-based rack area network. ANCS 2014: 125-136 - [c207]Ming-Wei Chang, Tzi-cker Chiueh, Chia-Ming Chang:
Virtual keyboard for head mounted display-based wearable devices. ICPADS 2014: 225-232 - [c206]Yi-Ling Chen, Tse-Shih Chen, Liang-Chun Yin, Tsiao-Wen Huang, Shiou-Yaw Wang, Tzi-cker Chiueh:
City Eyes: An Unified Computational Framework for Intelligent Video Surveillance in Cloud Environment. iThings/GreenCom/CPSCom 2014: 324-327 - [c205]Cheng-Chun Tu, Pai-Wei Wang, Tzi-cker Chiueh:
In-Band Control for an Ethernet-Based Software-Defined Network. SYSTOR 2014: 1:1-1:11 - [c204]Tzi-cker Chiueh, Weafon Tsao, Hou-Chiang Sun, Ting-Fang Chien, An-Nan Chang, Cheng-Ding Chen:
Software Orchestrated Flash Array. SYSTOR 2014: 14:1-14:11 - [c203]Jennia Hizver, Tzi-cker Chiueh:
Real-time deep virtual machine introspection and its applications. VEE 2014: 3-14 - 2013
- [j21]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Malware Clearance for Secure Commitment of OS-Level Virtual Machines. IEEE Trans. Dependable Secur. Comput. 10(2): 70-83 (2013) - [c202]Jennia Hizver, Tzi-cker Chiueh:
Cloud-Based Application Whitelisting. IEEE CLOUD 2013: 636-643 - [c201]Alexey Smirnov, Mikhail Zhidko, Ying-Shiuan Pan, Po-Jui Tsao, Kuang-Chih Liu, Tzi-cker Chiueh:
Evaluation of a Server-Grade Software-Only ARM Hypervisor. IEEE CLOUD 2013: 855-862 - [c200]Yi-Ling Chen, Tse-Shih Chen, Tsiao-Wen Huang, Liang-Chun Yin, Shiou-Yaw Wang, Tzi-cker Chiueh:
Intelligent Urban Video Surveillance System for Automatic Vehicle Detection and Tracking in Clouds. AINA 2013: 814-821 - [c199]Yifeng Sun, Tzi-cker Chiueh:
SIDE: Isolated and efficient execution of unmodified device drivers. DSN 2013: 1-12 - [c198]Jui-Hao Chiang, Han-Lin Li, Tzi-cker Chiueh:
Working Set-based Physical Memory Ballooning. ICAC 2013: 95-99 - [c197]Chien-Yung Lee, Yu-Wei Lee, Cheng-Chun Tu, Pai-Wei Wang, Yu-Cheng Wang, Chih-Yu Lin, Tzi-cker Chiueh:
Autonomic Fail-over for a Software-Defined Container Computer Network. ICAC 2013: 225-234 - [c196]Cheng-Chun Tu, Chao-Tang Lee, Tzi-cker Chiueh:
Secure I/O device sharing among virtual machines on multiple hosts. ISCA 2013: 108-119 - [c195]Dilip Nijagal Simha, Tzi-cker Chiueh, Ganesh Karuppur Rajagopalan, Pallav Bose:
High-throughput low-latency fine-grained disk logging. SIGMETRICS 2013: 255-266 - [c194]Dilip Nijagal Simha, Maohua Lu, Tzi-cker Chiueh:
A scalable deduplication and garbage collection engine for incremental backup. SYSTOR 2013: 16:1-16:12 - [c193]Jui-Hao Chiang, Han-Lin Li, Tzi-cker Chiueh:
Introspection-based memory de-duplication and migration. VEE 2013: 51-62 - 2012
- [j20]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Enforcing Mandatory Access Control in Commodity OS to Disable Malware. IEEE Trans. Dependable Secur. Comput. 9(4): 541-555 (2012) - [c192]Tzi-cker Chiueh, Cheng-Chun Tu, Yu-Cheng Wang, Pai-Wei Wang, Kai-Wen Li, Yu-Ming Huang:
Peregrine: An All-Layer-2 Container Computer Network. IEEE CLOUD 2012: 686-693 - [c191]Dilip Nijagal Simha, Maohua Lu, Tzi-cker Chiueh:
An update-aware storage system for low-locality update-intensive workloads. ASPLOS 2012: 375-386 - [c190]Maohua Lu, Tzi-cker Chiueh:
Speculative Memory State Transfer for Active-Active Fault Tolerance. CCGRID 2012: 268-275 - [c189]Tzi-cker Chiueh, Matthew Conover, Bruce Montague:
Surreptitious Deployment and Execution of Kernel Agents in Windows Guests. CCGRID 2012: 507-514 - [c188]Tzi-cker Chiueh, Dilip Nijagal Simha, Alankar Saxena, Saurabh Bhola, Ping-Hung Lin, Cheng-En Pang:
Encryption Domain Text Retrieval. CloudCom 2012: 107-112 - [c187]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Facilitating inter-application interactions for OS-level virtualization. VEE 2012: 75-86 - 2011
- [c186]Jennia Hizver, Tzi-cker Chiueh:
Tracking payment card data flow using virtual machine state introspection. ACSAC 2011: 277-285 - [c185]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. AsiaCCS 2011: 135-144 - [c184]Jennia Hizver, Tzi-cker Chiueh:
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems. Financial Cryptography Workshops 2011: 55-69 - [c183]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Safe side effects commitment for OS-level virtualization. ICAC 2011: 111-120 - [c182]Jui-Hao Chiang, Maohua Lu, Tzi-cker Chiueh:
Bootstrapped migration for Linux OS. ICAC 2011: 209-212 - [c181]Jui-Hao Chiang, Maohua Lu, Tzi-cker Chiueh:
Physical Machine State Migration. ICPADS 2011: 25-32 - [c180]Ying-Shiuan Pan, Jui-Hao Chiang, Han-Lin Li, Po-Jui Tsao, Ming-Fen Lin, Tzi-cker Chiueh:
Hypervisor Support for Efficient Memory De-duplication. ICPADS 2011: 33-39 - [c179]Santosh Sonawane, Tzi-cker Chiueh:
Optimization of an Instrumentation Tool for Stripped Win32/X86 Binaries. ICPADS 2011: 134-141 - [c178]Maohua Lu, Dilip Nijagal Simha, Tzi-cker Chiueh:
Scalable Index Update for Block-Level Continuous Data Protection. NAS 2011: 372-381 - [c177]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing system and ordinary services in Windows-based OS-level virtual machines. SAC 2011: 579-583 - [c176]Jennia Hizver, Tzi-cker Chiueh:
Automated Discovery of Credit Card Data Flow for PCI DSS Compliance. SRDS 2011: 51-58
2000 – 2009
- 2009
- [j19]Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng, Tzi-cker Chiueh:
WShare: an instant secure collaboration workspace over ad hoc wireless LAN. Int. J. Pervasive Comput. Commun. 5(4): 428-447 (2009) - [c175]Xin Hu, Tzi-cker Chiueh, Kang G. Shin:
Large-scale malware indexing using function-call graphs. CCS 2009: 611-620 - [c174]Maohua Lu, Tzi-cker Chiueh:
Fast memory state synchronization for virtualization-based fault tolerance. DSN 2009: 534-543 - [c173]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining windows inter-process communications for OS-level virtual machine. VDTS@EuroSys 2009: 30-35 - [c172]Maohua Lu, Tzi-cker Chiueh:
File Versioning for Block-Level Continuous Data Protection. ICDCS 2009: 327-334 - [c171]Jui-Hao Chiang, Tzi-cker Chiueh:
Accurate Clock Synchronization for IEEE 802.11-Based Multi-Hop Wireless Networks. ICNP 2009: 11-20 - [c170]Fanglu Guo, Tzi-cker Chiueh:
Device-transparent network-layer handoff for micro-mobility. MASCOTS 2009: 1-10 - [c169]Fanglu Guo, Tzi-cker Chiueh:
DAFT: Disk geometry-Aware File system Traversal. MASCOTS 2009: 1-10 - [c168]Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa Krishnan, Tzi-cker Chiueh:
Globally fair radio resource allocation for wireless mesh networks. MASCOTS 2009: 1-10 - [c167]Jui-Hao Chiang, Tzi-cker Chiueh:
Implementation and evaluation of a mobile tetherless VoIP/PSTN gateway. MobiQuitous 2009: 1-10 - [c166]Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh:
Automatic Generation of String Signatures for Malware Detection. RAID 2009: 101-120 - [c165]Yanjun Wu, Tzi-cker Chiueh, Chen Zhao:
Efficient and Automatic Instrumentation for Packed Binaries. ISA 2009: 307-316 - 2008
- [c164]Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
Web Application Attack Prevention for Tiered Internet Services. IAS 2008: 186-191 - [c163]Susanta Nanda, Tzi-cker Chiueh:
Execution Trace-Driven Automated Attack Signature Generation. ACSAC 2008: 195-204 - [c162]Tzi-cker Chiueh:
Fast Bounds Checking Using Debug Register. HiPEAC 2008: 99-113 - [c161]Gang Peng, Tzi-cker Chiueh:
Availability and Fairness Support for Storage QoS Guarantee. ICDCS 2008: 589-596 - [c160]Tzi-cker Chiueh, Shweta Bajpai:
Accurate and Efficient Inter-Transaction Dependency Tracking. ICDE 2008: 1209-1218 - [c159]Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh:
Design of a Channel Characteristics-Aware Routing Protocol. INFOCOM 2008: 2441-2449 - [c158]Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:
A Study of the Packer Problem and Its Solutions. RAID 2008: 98-115 - [c157]Maohua Lu, Tzi-cker Chiueh, Shibiao Lin:
An Incremental File System Consistency Checker for Block-Level CDP Systems. SRDS 2008: 157-162 - [c156]Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh:
Applications of a feather-weight virtual machine. VEE 2008: 171-180 - [c155]Gang Wu, Sathyanarayana Singh, Tzi-cker Chiueh:
Implementation of dynamic channel switching on IEEE 802.11-based wireless mesh networks. WICON 2008: 39 - [c154]Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh:
An empirical comparison of throughput-maximizing wireless mesh routing protocols. WICON 2008: 40 - 2007
- [j18]Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin:
Slack allocation techniques for intra-path load balancing. J. High Speed Networks 16(3): 211-237 (2007) - [j17]Chuan-Kai Yang, Tzi-cker Chiueh:
Time-Critical Rendering of Tetrahedral Meshes. J. Inf. Sci. Eng. 23(5): 1437-1451 (2007) - [j16]Srikant Sharma, Inho Baek, Tzi-cker Chiueh:
OmniCon: a Mobile IP-based vertical handoff system for wireless LAN and GPRS links. Softw. Pract. Exp. 37(7): 779-798 (2007) - [c153]Alexey Smirnov, Tzi-cker Chiueh:
Automatic Patch Generation for Buffer Overflow Attacks. IAS 2007: 165-170 - [c152]Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Accurate Application-Specific Sandboxing for Win32/Intel Binaries. IAS 2007: 375-382 - [c151]Wei Li, Tzi-cker Chiueh:
Automated Format String Attack Prevention for Win32/X86 Binaries. ACSAC 2007: 398-409 - [c150]Ningning Zhu, Tzi-cker Chiueh:
Portable and Efficient Continuous Data Protection for Network File Servers. DSN 2007: 687-697 - [c149]Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa Krishnan, Tzi-cker Chiueh:
End-to-End Flow Fairness Over IEEE 802.11-Based Wireless Mesh Networks. INFOCOM 2007: 2361-2365 - [c148]Fanglu Guo, Tzi-cker Chiueh:
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN. INFOCOM 2007: 2366-2370 - [c147]Ashish Raniwala, Srikant Sharma, Pradipta De, Rupa Krishnan, Tzi-cker Chiueh:
Evaluation of a Stateful Transport Protocol for Multi-channel Wireless Mesh Networks. IWQoS 2007: 74-82 - [c146]Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin:
Load Balancing Routing of Fault Tolerant QoS-Guaranteed VPNs. IWQoS 2007: 100-108 - [c145]Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
Dynamic multi-process information flow tracking for web application security. Middleware (Demos and Posters) 2007: 19 - [c144]Maohua Lu, Shibiao Lin, Tzi-cker Chiueh:
Efficient Logging and Replication Techniques for Comprehensive Data Protection. MSST 2007: 171-184 - [c143]Gang Wu, Tzi-cker Chiueh:
Passive and accurate traffic load estimation for infrastructure-mode wireless lan. MSWiM 2007: 109-116 - [c142]Gang Wu, Fanglu Guo, Tzi-cker Chiueh:
Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN. NCA 2007: 69-78 - [c141]Shibiao Lin, Maohua Lu, Tzi-cker Chiueh:
Transparent Reliable Multicast for Ethernet-Based Storage Area Networks. NCA 2007: 87-94 - [c140]Shweta Bajpai, Alexey Smirnov, Tzi-cker Chiueh:
Accurate Inter-Transaction Dependency Tracking for Repairable DBMS. NCA 2007: 161-168 - [c139]Shibiao Lin, Srikant Sharma, Tzi-cker Chiueh:
Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet Networks. NCA 2007: 239-248 - [c138]David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin:
RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007 - [c137]Jeffrey Wilhelm, Tzi-cker Chiueh:
A Forced Sampled Execution Approach to Kernel Rootkit Identification. RAID 2007: 219-235 - [c136]Tzi-cker Chiueh, Rupa Krishnan, Pradipta De, Jui-Hao Chiang:
A networked robot system for wireless network emulation. ROBOCOMM 2007: 32 - 2006
- [j15]Kartik Gopalan, Lan Huang, Gang Peng, Tzi-cker Chiueh, Yow-Jian Lin:
Statistical admission control using delay distribution measurements. ACM Trans. Multim. Comput. Commun. Appl. 2(4): 258-281 (2006) - [j14]Chuan-Kai Yang, Tzi-cker Chiueh:
Integration of volume decompression and out-of-core iso-surface extraction from irregular volume data. Vis. Comput. 22(4): 249-265 (2006) - [c135]Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
How to Automatically and Accurately Sandbox Microsoft IIS. ACSAC 2006: 213-222 - [c134]Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Foreign Code Detection on the Windows/X86 Platform. ACSAC 2006: 279-288 - [c133]Lap-Chung Lam, Tzi-cker Chiueh:
A General Dynamic Information Flow Tracking Framework for Security Applications. ACSAC 2006: 463-472 - [c132]Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh:
Scalable network-based buffer overflow attack detection. ANCS 2006: 163-172 - [c131]Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
BIRD: Binary Interpretation using Runtime Disassembly. CGO 2006: 358-370 - [c130]Lap-Chung Lam, Wei Li, Tzi-cker Chiueh:
Accurate and Automated System Call Policy-Based Intrusion Prevention. DSN 2006: 413-424 - [c129]Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin:
Network-Wide Load Balancing Routing With Performance Guarantees. ICC 2006: 943-948 - [c128]Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh:
Spoof Detection for Preventing DoS Attacks against DNS Servers. ICDCS 2006: 37 - [c127]Lap-Chung Lam, Yang Yu, Tzi-cker Chiueh:
Secure Mobile Code Execution Service. LISA 2006: 53-62 - [c126]Pradipta De, Ashish Raniwala, Rupa Krishnan, Krishna Tatavarthi, Jatan Modi, Nadeem Ahmed Syed, Srikant Sharma, Tzi-cker Chiueh:
MiNT-m: an autonomous mobile wireless experimentation platform. MobiSys 2006: 124-137 - [c125]Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh:
A feather-weight virtual machine for windows applications. VEE 2006: 24-34 - 2005
- [j13]