![]() | 2009 | |
---|---|---|
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo: Xprobe2++: Low volume remote network information gathering tool. DSN 2009: 205-210 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo: Holography: A Hardware Virtualization Tool for Malware Analysis. PRDC 2009: 263-268 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Yih-Farn Chen, Yennun Huang, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Jeremy Rahe, Bin Wei, Zhen Xiao: Towards capacity and profit optimization of video-on-demand services in a peer-assisted IPTV platform. Multimedia Syst. 15(1): 19-32 (2009) |
2008 | ||
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo: Towards Adaptive Covert Communication System. PRDC 2008: 153-159 |
2007 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yennun Huang, Serban Jora, John Murray, Bin Wei: Clicker - An IPTV Remote Control in Your Cell Phone. ICME 2007: 1055-1058 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Yih-Farn Chen, Rittwik Jana, Hongbo Jiang, Michael Rabinovich, Amy Reibman, Bin Wei, Zhen Xiao: Capacity analysis of MediaGrid: a P2P IPTV platform for fiber to the node (FTTN) networks. IEEE Journal on Selected Areas in Communications 25(1): 131-139 (2007) |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang: Self-Healing Spyware: Detection, and Remediation. IEEE Transactions on Reliability 56(4): 588-596 (2007) |
2006 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo: A Stateful Approach to Spyware Detection and Removal. PRDC 2006: 173-182 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Ming-Wei Wu, Yennun Huang, Ing-Yi Chen, Shyue-Kung Lu, Sy-Yen Kuo: A Scalable Port Forwarding for P2P-Based Wi-Fi Applications. WASA 2006: 26-37 |
2005 | ||
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai: An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo: A Multi-Faceted Approach towards Spam-Resistible Mail. PRDC 2005: 208-218 |
2004 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Deron Liang, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Woei-Jyh Lee, Timothy K. Tsai, Chung-Yih Wang: NT-SwiFT: software implemented fault tolerance on Windows NT. Journal of Systems and Software 71(1-2): 127-141 (2004) |
2001 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiantao Pan, Philip Koopman, Daniel P. Siewiorek, Yennun Huang, Robert Gruber, Mimi Ling Jiang: Robustness Testing and Hardening of CORBA ORB Implementations. DSN 2001: 141-150 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Chi-Yi Lin, Sy-Yen Kuo, Yennun Huang: A Checkpointing Tool for Palm Operating System. DSN 2001: 71-76 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Chungyih-Yih Wang, Ching-Chi Hsu, Yennun Huang: VORAL: A System for Voice Over IP Routing in Application Layer. IEEE Real Time Technology and Applications Symposium 2001: 165-170 |
2000 | ||
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Chi-Yi Lin, Jichiang Tsai, Sy-Yen Kuo, Yennun Huang: Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom. ICDCS Workshop on Distributed Real-Time Systems 2000: B7-B13 |
1999 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | P. Emerald Chung, Woei-Jyh Lee, Joanne Shih, Shalini Yajnik, Yennun Huang: Fault-Injection Experiments for Distributed Objects. DOA 1999: 88-97 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | P. Emerald Chung, Woei-Jyh Lee, Yennun Huang, Deron Liang, Chung-Yih Wang: Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications. FTCS 1999: 220-223 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Sachin Garg, Yennun Huang, Chandra M. R. Kintala, Kishor S. Trivedi, Shalini Yajnik: Performance and Reliability Evaluation of Passive Replication Schemes in Application Level Fault Tolerance. FTCS 1999: 322-329 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Chuan-Ching Sue, Wen-Yu Tseng, Sy-Yen Kuo, Yennun Huang: An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks. ISCC 1999: 209-215 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Shih-Chang Wang, Hung-Yau Lin, Sy-Yen Kuo, Yennun Huang: A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes. PRDC 1999: 210-217 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Mangesh Kasbekar, Chita R. Das, Shalini Yajnik, Reinhard Klemm, Yennun Huang: Issues in the Design of a Reflective Library for Checkpointing C++ Objects. SRDS 1999: 224-233 |
1998 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Arash Baratloo, P. Emerald Chung, Yennun Huang, Sampath Rangarajan, Shalini Yajnik: Filterfresh: Hot Replication of Java RMI Server Objects. COOTS 1998: 65-78 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Sampath Rangarajan, Sachin Garg, Yennun Huang: Checkpoints-on-Demand with Active Replication. SRDS 1998: 75-83 |
1997 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Min Wang, Pi-Yu Chung, Yennun Huang, E. N. Elnozahy: Integrating Checkpointing with Transaction Processing. FTCS 1997: 304-308 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Sampath Rangarajan, Yennun Huang, Satish K. Tripathi: On the Scalability and Mean-Time to Failure of k Resilient Protocols. Acta Inf. 34(7): 543-556 (1997) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Om P. Damani, P. Emerald Chung, Yennun Huang, Chandra M. R. Kintala, Yi-Min Wang: ONE-IP: Techniques for Hosting a Service on a Cluster of Machines. Computer Networks 29(8-13): 1019-1027 (1997) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Min Wang, Yennun Huang, W. Kent Fuchs, Chandra M. R. Kintala, Gaurav Suri: Progressive Retry for Software Failure Recovery in Message-Passing Applications. IEEE Trans. Computers 46(10): 1137-1141 (1997) |
1996 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Sachin Garg, Yennun Huang, Chandra M. R. Kintala, Kishor S. Trivedi: Minimizing Completion Time of a Program by Checkpointing and Rejuvenation. SIGMETRICS 1996: 252-261 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang: Developing reliable applications on cluster systems. SRDS 1996: 165-166 |
1995 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pi-Yu Chung, Chandra M. R. Kintala: Checkpointing and Its Applications. FTCS 1995: 22-31 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Chandra M. R. Kintala, Nick Kolettis, N. Dudley Fulton: Software Rejuvenation: Analysis, Module and Applications. FTCS 1995: 381-390 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Yi-Min Wang: Why Optimistic Message Logging Has Not Been Used In Telecommunications Systems. FTCS 1995: 459-463 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Sampath Rangarajan, Yennun Huang, Satish K. Tripathi: Computing Reliability Intervals for k-Resilient Protocols. IEEE Trans. Computers 44(3): 462-466 (1995) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Dipak Ghosal, T. V. Lakshman, Yennun Huang: Parallel architectures for processing high speed network signaling protocols. IEEE/ACM Trans. Netw. 3(6): 716-728 (1995) |
1994 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Dipak Ghosal, T. V. Lakshman, Yennun Huang: High-Speed Protocol Processing Using Parallel Architectures. INFOCOM 1994: 159-166 |
1993 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Min Wang, Yennun Huang, W. Kent Fuchs: Progressive Retry for Software Error Recovery in Distributed Systems. FTCS 1993: 138-144 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Chandra M. R. Kintala: Software Implemented Fault Tolerance Technologies and Experience. FTCS 1993: 2-9 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Chandra M. R. Kintala, Pankaj Jalote: Two Techniques for Transient Software Error Recovery. Hardware and Software Architectures for Fault Tolerance 1993: 159-170 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Satish K. Tripathi: Resource Allocation for Primary-Site Fault-Tolerant Systems. IEEE Trans. Software Eng. 19(2): 108-119 (1993) |
1992 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Sampath Rangarajan, Yennun Huang, Satish K. Tripathi: Computing Threshold Times for k-Resilient Protocols. ICPP (2) 1992: 24-27 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, T. V. Lakshman, Dipak Ghosal: On the Availability of Parallel Protocol-Processing Systems. ICPP (3) 1992: 351-354 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Pankaj Jalote: Effect of Fault Tolerance on Response Time-Analysis of the Primary Site Approach. IEEE Trans. Computers 41(4): 420-428 (1992) |
1991 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Satish K. Tripathi: Resource Allocation for Distributed Systems with Fault Tolerant Nodes. Fault-Tolerant Computing Systems 1991: 241-252 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | T. V. Lakshman, Dipak Ghosal, Yennun Huang, Satish K. Tripathi: Effective Load and Resource Sharing in Parallel Protocol-Processing Systems. ICPP (1) 1991: 382-390 |
1989 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Pankaj Jalote: Availability Analysis of the Primary Site Approach for Fault Tolerance. SRDS 1989: 130-136 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Yennun Huang, Pankaj Jalote: Analytic Models for the Primary Site Approach to Fault-Tolerance. Acta Inf. 26(6): 543-557 (1989) |
1987 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Satish K. Tripathi, Yennun Huang, Sushil Jajodia: Local Area Networks: Software and Related Issues. IEEE Trans. Software Eng. 13(8): 872-879 (1987) |