Chun-Ying Huang

According to our database1, Chun-Ying Huang authored at least 68 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017.
TOMCCAP, 2018

Scenario-Based Microservice Retrieval Using Word2Vec.
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018

Design and Implement Binary Fuzzing Based on Libfuzzer.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Fixation Prediction for 360° Video Streaming in Head-Mounted Virtual Reality.
Proceedings of the 27th Workshop on Network and Operating Systems Support for Digital Audio and Video, 2017

360° Video Viewing Dataset in Head-Mounted Virtual Reality.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

2016
Toward an Adaptive Screencast Platform: Measurement and Optimization.
TOMCCAP, 2016

The Future of Cloud Gaming [Point of View].
Proceedings of the IEEE, 2016

High performance traffic classification based on message size sequence and distribution.
J. Network and Computer Applications, 2016

Decapitation via digital epidemics: a bio-inspired transmissive attack.
IEEE Communications Magazine, 2016

A Survey on Cloud Gaming: Future of Computer Games.
IEEE Access, 2016

Towards Ultra-Low-Bitrate Video Conferencing Using Facial Landmarks.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Smart Beholder: An Extensible Smart Lens Platform.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Effects of Online Peer Feedback on Dancers at Different Levels.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

2015
Enabling Adaptive Cloud Gaming in an Open-Source Cloud Gaming Platform.
IEEE Trans. Circuits Syst. Video Techn., 2015

Placing Virtual Machines to Optimize Cloud Gaming Experience.
IEEE Trans. Cloud Computing, 2015

Stateful traffic replay for web application proxies.
Security and Communication Networks, 2015

An integrated DEA-MODM methodology for portfolio optimization.
Operational Research, 2015

Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled.
J. Inf. Sci. Eng., 2015

Low power algorithm-architecture co-design of fast Independent Component Analysis (FICA) for multi-gas sensor applications.
Proceedings of the VLSI Design, Automation and Test, 2015

Energy-efficient gas recognition system with event-driven power control.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

Code Coverage Measurement for Android Dynamic Analysis Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming.
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015

Screencast dissected: performance measurements and design considerations.
Proceedings of the 6th ACM Multimedia Systems Conference, 2015

Smart Beholder: An Open-Source Smart Lens for Mobile Photography.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

2014
GamingAnywhere: The first open source cloud gaming system.
TOMCCAP, 2014

On the Quality of Service of Cloud Gaming Systems.
IEEE Trans. Multimedia, 2014

Behavior-based botnet detection in parallel.
Security and Communication Networks, 2014

Mobile Application Security.
IEEE Computer, 2014

Measuring the client performance and energy consumption in mobile cloud gaming.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

GPU consolidation for cloud games: Are we there yet?
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

Quantifying User Satisfaction in Mobile Cloud Games.
Proceedings of the 6th ACM Mobile Video Workshop, MoVid 2014, Singapore, 2014

Screencast in the Wild: Performance and Limitations.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Cloud gaming onward: research opportunities and outlook.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
Effective bot host detection based on network failure models.
Computer Networks, 2013

QoE-Aware Virtual Machine Placement for Cloud Games.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

GamingAnywhere: an open cloud gaming system.
Proceedings of the Multimedia Systems Conference 2013, 2013

GamingAnywhere: an open-source cloud gaming testbed.
Proceedings of the ACM Multimedia Conference, 2013

2012
Session level flow classification by packet size distribution and session grouping.
Computer Networks, 2012

Session Level Flow Classification by Packet Size Distribution and Session Grouping.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Using one-time passwords to prevent password phishing attacks.
J. Network and Computer Applications, 2011

A fuzzy pattern-based filtering algorithm for botnet detection.
Computer Networks, 2011

Measuring the latency of cloud gaming systems.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Semantic web service discovery based on business rule annotation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
Fast-Flux Bot Detection in Real Time.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Optimal service selection for composition based on weighted service flow and Genetic Algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

2008
Heuristic algorithms to solve the capacity allocation problem in photolithography area (CAPPA).
OR Spectrum, 2008

Capacity pricing mechanism for wafer fabrication.
Computers & Industrial Engineering, 2008

A MIP model for IC final testing order selection problem.
Proceedings of the 2008 International Conference on Modeling, 2008

2007
Secure multicast in dynamic environments.
Computer Networks, 2007

Design and Implementation of Secure Communication Channels over UPnP Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Bounding Peer-to-Peer Upload Traffic in Client Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Quantifying Skype user satisfaction.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

On the Sensitivity of Online Game Playing Time to Network QoS.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

The Impact of Network Variabilities on TCP Clocking Schemes.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Confessible Threshold Ring Signatures.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area.
Proceedings of the Computational Science and Its Applications, 2006

Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

A distributed key assignment protocol for secure multicast based on proxy cryptography.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

An empirical evaluation of TCP performance in online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

2005
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Game traffic analysis: an MMORPG perspective.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Secure Content Delivery using Key Composition.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

The impact of network variabilities on TCP clocking schemes.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Secure Multicast Using Proxy Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
Proceedings of the High Performance Computing, 2005


  Loading...