Dongyan Xu

According to our database1, Dongyan Xu authored at least 176 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ZBCAN: A Zero-Byte CAN Defense System.
Proceedings of the 32nd USENIX Security Symposium, 2023

PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Fuzzing SGX Enclaves via Host Program Mutations.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing.
IEEE Secur. Priv., 2022

DnD: A Cross-Architecture Deep Neural Network Decompiler.
Proceedings of the 31st USENIX Security Symposium, 2022

ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.
Proceedings of the 30th USENIX Security Symposium, 2021

PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Proceedings of the 30th USENIX Security Symposium, 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Proceedings of the 30th USENIX Security Symposium, 2021

SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening.
Proceedings of the 30th USENIX Security Symposium, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Evading Voltage-Based Intrusion Detection on Automotive CAN.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
IEEE Trans. Dependable Secur. Comput., 2020

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020

RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

Forensic Investigation of Industrial Control Systems Using Deterministic Replay.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019

Flight Recovery of MAVs with Compromised IMU.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

2018
Redundancy-Free UAV Sensor Fault Isolation And Recovery.
CoRR, 2018

Gemini: Guest-transparent honey files via hypervisor-level access redirection.
Comput. Secur., 2018

Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Lprov: Practical Library-aware Provenance Tracing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Live acquisition of main memory data from Android smartphones and smartwatches.
Digit. Investig., 2017

J-Force: Forced Execution on JavaScript.
Proceedings of the 26th International Conference on World Wide Web, 2017

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017

Self Destructing Exploit Executions via Input Perturbation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

CPR: cross platform binary code reuse via platform independent trace program.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

vMocity: Traveling VMs Across Heterogeneous Clouds.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

LDX: Causality Inference by Lightweight Dual Execution.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

vRead: Efficient Data Access for Hadoop in Virtualized Clouds.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GUITAR: Piecing Together Android App GUIs from Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

iRiS: Vetting Private API Abuse in iOS Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Dual Execution for On the Fly Fine Grained Execution Comparison.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

CLUE: System trace analytics for cloud service performance diagnosis.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Reuse-oriented reverse engineering of functional components from x86 binaries.
Proceedings of the 36th International Conference on Software Engineering, 2014

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Virtualization and security: happily ever after?
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

vPipe: Piped I/O Offloading for Efficient Data Movement in Virtualized Clouds.
Proceedings of the ACM Symposium on Cloud Computing, 2014

2013
vPipe: One Pipe to Connect Them All.
login Usenix Mag., 2013

Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments.
ACM Trans. Comput. Syst., 2013

vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

High Accuracy Attack Provenance via Binary-based Execution Partition.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

PIEtrace: Platform independent executable trace.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Improved kernel security through memory layout randomization.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

DRIP: A framework for purifying trojaned kernel drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

LogGC: garbage collecting audit log.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the Cloud.
IEEE Trans. Serv. Comput., 2012

Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes.
IEEE Trans. Parallel Distributed Syst., 2012

IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Guest-transparent instruction authentication for self-patching kernels.
Proceedings of the 31st IEEE Military Communications Conference, 2012

vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing.
Proceedings of the 21st International Symposium on High-Performance Parallel and Distributed Computing, 2012

CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
In-network live snapshot service for recovering virtual infrastructures.
IEEE Netw., 2011

Guest editorial - second part of special issue on cloud computing.
J. Internet Serv. Appl., 2011

Guest editorial - special issue on cloud computing.
J. Internet Serv. Appl., 2011

Autonomic live adaptation of virtual networked environments in a multidomain infrastructure.
J. Internet Serv. Appl., 2011

Process Implanting: A New Active Introspection Framework for Virtualization.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Challenges in supporting virtual infrastructures in the cloud.
Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing, 2011

Opportunistic flooding to improve TCP transmit performance in virtualized clouds.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010

Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010

An Architectural Approach to Preventing Code Injection Attacks.
IEEE Trans. Dependable Secur. Comput., 2010

Guest Editorial: "Special issue on selected papers from NOSSDAV 2009".
Multim. Syst., 2010

Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
CoRR, 2010

LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems
CoRR, 2010

DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload.
Proceedings of the Conference on High Performance Computing Networking, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Automatic Reverse Engineering of Data Structures from Binary Execution.
Proceedings of the Network and Distributed System Security Symposium, 2010

Strict control dependence and its effect on dynamic information flow analyses.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Multi-aspect profiling of kernel rootkit behavior.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

VNsnap: Taking snapshots of virtual networked environments with minimal downtime.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Polymorphing Software by Randomizing Data Structure Layout.
Proceedings of the Detection of Intrusions and Malware, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distributed Syst., 2008

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

Middleware Integration and Deployment Strategies for Cyberinfrastructures.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Portable virtual cycle accounting for large-scale distributed cycle sharing systems.
Parallel Comput., 2007

RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Taking snapshots of virtual networked environments.
Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, 2007

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Trust-based privacy preservation for peer-to-peer data sharing.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis.
IEEE Trans. Parallel Distributed Syst., 2006

Analysis of a CDN-P2P hybrid architecture for cost-effective streaming media distribution.
Multim. Syst., 2006

Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distributed Comput., 2006

Profiling self-propagating worms via behavioral footprinting.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Mixed Reality Tabletop (MRT): A Low-Cost Teleconferencing Framework for Mixed-Reality Applications.
Proceedings of the IEEE Virtual Reality Conference, 2006

Executing MPI programs on virtual machines in an Internet sharing system.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure.
Proceedings of the 3rd International Conference on Autonomic Computing, 2006

Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005

CollectCast: A peer-to-peer service for media streaming.
Multim. Syst., 2005

Virtual Distributed Environments in a Shared Infrastructure.
Computer, 2005

Virtual Playgrounds for Worm Behavior Investigation.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

VioCluster: Virtualization for Dynamic Computational Domains.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2004
Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery.
Multim. Tools Appl., 2004

Collapsar: A VM-Based Architecture for Network Attack Detention Center.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Towards an integrated multimedia service hosting overlay.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

Policy-driven multifile distribution.
Proceedings of the Quality of Service, 2004

E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004

VIOLIN: Virtual Internetworking on Overlay Infrastructure.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Protection mechanisms for application service hosting platforms.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
vBET: a VM-based emulation testbed.
Proceedings of the ACM SIGCOMM workshop on Models, 2003

iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications.
Proceedings of the First International Conference on Mobile Systems, 2003

PROMISE: peer-to-peer media streaming using CollectCast.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

GnuStream: a P2P media streaming system prototype.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003

Analysis of Parallel Downloading for Large File Distribution.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

2002
An XML-based Quality of Service Enabling Language for the Web.
J. Vis. Lang. Comput., 2002

An integrated runtime QoS-aware middleware framework for distributed multimedia applications.
Multim. Syst., 2002

MeGaDiP: A wide-area Media Gateway Discovery Protocol.
Inf. Sci., 2002

Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

On Peer-to-Peer Media Streaming.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
An Integrated and Qos-Aware Framework for Multimedia Service Management
PhD thesis, 2001

QoS-aware middleware for ubiquitous and heterogeneous environments.
IEEE Commun. Mag., 2001

QoS and Contention-Aware Multi-Resource Reservation.
Clust. Comput., 2001

Towards integrated runtime solutions in QoS-aware middleware.
Proceedings of the 2001 International Workshop on Multimedia Middleware, 2001

2K: An Integrated Approach of QoS Compilation and Reconfigurable, Component-Based Run-Time Middleware for the Unified QoS Management Framework.
Proceedings of the Middleware 2001, 2001

SMART: A Scalable Middleware solution for Ubiquitous Multimedia Service Delivery.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

QoS-Aware Discovery of Wide-Area Distributed Services.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Resource-Aware Configuration of Ubiquitous Multimedia Services.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Multimedia Service Configuration and Reservation in Heterogeneous Environments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

QoS and Contention-Aware Multi-Resource Reservation.
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000

1999
QoS-directed error control of video multicast in wireless networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999


  Loading...