Tzi-cker Chiueh

Affiliations:
  • Industrial Technology Research Institute, Hsinchu, Taiwan
  • Stony Brook University, USA (former)


According to our database1, Tzi-cker Chiueh authored at least 250 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FETCH: A cloud-native searchable encryption scheme enabling efficient pattern search on encrypted data within cloud services.
Int. J. Commun. Syst., 2023

2021
Keynote I: Advances in memory state-preserving fault tolerance.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
uFETCH: A Unified Searchable Encryption Scheme and Its Saas-Native to Make DBMS Privacy-Preserving.
IEEE Access, 2020

Directvisor: virtualization for bare-metal cloud.
Proceedings of the VEE '20: 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2020

Efficient Group Fault Tolerance for Multi-tier Services in Cloud Environments.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Evaluation of a Disaggregated Rack System.
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 2019

2018
Virtualizing Energy Storage Management Using RAIBA.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Seamless Fail-over for PCIe Switched Networks.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption.
Proceedings of the 8th IEEE International Symposium on Cloud and Service Computing, 2018

2017
TCP Performance Optimization for Epoch-based Execution.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

Dynamic Refresh Rate Control for IGZO Display.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Duplication of Windows Services.
CoRR, 2016

Towards Seamless Resynchronization for Active-Active Database Clustering.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Smartphone Virtualization.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Invited - Wireless sensor nodes for environmental monitoring in internet of things.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Keynote speaker: Visualization for deep learning training.
Proceedings of the 2016 IEEE Pacific Visualization Symposium, 2016

2015
A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Memory Pressure Balancing on Virtualized Servers.
Proceedings of the 21st IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2015

Security considerations in ITRI cloud OS.
Proceedings of the International Carnahan Conference on Security Technology, 2015

An intelligent surveillance video analysis service in cloud environment.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Go Gentle into the Good Night via Controlled Battery Discharging.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

Memory Reclamation and Compression Using Accurate Working Set Size Estimation.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization.
IEEE Trans. Computers, 2014

Real-time deep virtual machine introspection and its applications.
Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2014

In-Band Control for an Ethernet-Based Software-Defined Network.
Proceedings of the International Conference on Systems and Storage, 2014

Software Orchestrated Flash Array.
Proceedings of the International Conference on Systems and Storage, 2014

City Eyes: An Unified Computational Framework for Intelligent Video Surveillance in Cloud Environment.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Virtual keyboard for head mounted display-based wearable devices.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Marlin: a memory-based rack area network.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
Malware Clearance for Secure Commitment of OS-Level Virtual Machines.
IEEE Trans. Dependable Secur. Comput., 2013

Introspection-based memory de-duplication and migration.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

A scalable deduplication and garbage collection engine for incremental backup.
Proceedings of the 6th Annual International Systems and Storage Conference, 2013

High-throughput low-latency fine-grained disk logging.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Secure I/O device sharing among virtual machines on multiple hosts.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

Autonomic Fail-over for a Software-Defined Container Computer Network.
Proceedings of the 10th International Conference on Autonomic Computing, 2013

Working Set-based Physical Memory Ballooning.
Proceedings of the 10th International Conference on Autonomic Computing, 2013

SIDE: Isolated and efficient execution of unmodified device drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Intelligent Urban Video Surveillance System for Automatic Vehicle Detection and Tracking in Clouds.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Evaluation of a Server-Grade Software-Only ARM Hypervisor.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

Cloud-Based Application Whitelisting.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Enforcing Mandatory Access Control in Commodity OS to Disable Malware.
IEEE Trans. Dependable Secur. Comput., 2012

Facilitating inter-application interactions for OS-level virtualization.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

Encryption Domain Text Retrieval.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Speculative Memory State Transfer for Active-Active Fault Tolerance.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Surreptitious Deployment and Execution of Kernel Agents in Windows Guests.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

An update-aware storage system for low-locality update-intensive workloads.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

Peregrine: An All-Layer-2 Container Computer Network.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Automated Discovery of Credit Card Data Flow for PCI DSS Compliance.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Virtualizing system and ordinary services in Windows-based OS-level virtual machines.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Scalable Index Update for Block-Level Continuous Data Protection.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Optimization of an Instrumentation Tool for Stripped Win32/X86 Binaries.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Hypervisor Support for Efficient Memory De-duplication.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Physical Machine State Migration.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Safe side effects commitment for OS-level virtualization.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

Bootstrapped migration for Linux OS.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems.
Proceedings of the Financial Cryptography and Data Security, 2011

Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Tracking payment card data flow using virtual machine state introspection.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2009
WShare: an instant secure collaboration workspace over ad hoc wireless LAN.
Int. J. Pervasive Comput. Commun., 2009

Efficient and Automatic Instrumentation for Packed Binaries.
Proceedings of the Advances in Information Security and Assurance, 2009

Automatic Generation of String Signatures for Malware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Implementation and evaluation of a mobile tetherless VoIP/PSTN gateway.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Globally fair radio resource allocation for wireless mesh networks.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

DAFT: Disk geometry-Aware File system Traversal.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Device-transparent network-layer handoff for micro-mobility.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Accurate Clock Synchronization for IEEE 802.11-Based Multi-Hop Wireless Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

File Versioning for Block-Level Continuous Data Protection.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Confining windows inter-process communications for OS-level virtual machine.
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009

Fast memory state synchronization for virtualization-based fault tolerance.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Large-scale malware indexing using function-call graphs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Implementation of dynamic channel switching on IEEE 802.11-based wireless mesh networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

An empirical comparison of throughput-maximizing wireless mesh routing protocols.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Applications of a feather-weight virtual machine.
Proceedings of the 4th International Conference on Virtual Execution Environments, 2008

An Incremental File System Consistency Checker for Block-Level CDP Systems.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

A Study of the Packer Problem and Its Solutions.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Design of a Channel Characteristics-Aware Routing Protocol.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Accurate and Efficient Inter-Transaction Dependency Tracking.
Proceedings of the 24th International Conference on Data Engineering, 2008

Availability and Fairness Support for Storage QoS Guarantee.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Fast Bounds Checking Using Debug Register.
Proceedings of the High Performance Embedded Architectures and Compilers, 2008

Execution Trace-Driven Automated Attack Signature Generation.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Web Application Attack Prevention for Tiered Internet Services.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
OmniCon: a Mobile IP-based vertical handoff system for wireless LAN and GPRS links.
Softw. Pract. Exp., 2007

Time-Critical Rendering of Tetrahedral Meshes.
J. Inf. Sci. Eng., 2007

Slack allocation techniques for intra-path load balancing.
J. High Speed Networks, 2007

A networked robot system for wireless network emulation.
Proceedings of the 1st International Conference on Robot Communication and Coordination, 2007

A Forced Sampled Execution Approach to Kernel Rootkit Identification.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2007

Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet Networks.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Transparent Reliable Multicast for Ethernet-Based Storage Area Networks.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Accurate Inter-Transaction Dependency Tracking for Repairable DBMS.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Passive and accurate traffic load estimation for infrastructure-mode wireless lan.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Efficient Logging and Replication Techniques for Comprehensive Data Protection.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

Dynamic multi-process information flow tracking for web application security.
Proceedings of the Middleware 2007, 2007

Evaluation of a Stateful Transport Protocol for Multi-channel Wireless Mesh Networks.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Load Balancing Routing of Fault Tolerant QoS-Guaranteed VPNs.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

End-to-End Flow Fairness Over IEEE 802.11-Based Wireless Mesh Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Portable and Efficient Continuous Data Protection for Network File Servers.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Automated Format String Attack Prevention for Win32/X86 Binaries.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Automatic Patch Generation for Buffer Overflow Attacks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Accurate Application-Specific Sandboxing for Win32/Intel Binaries.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Integration of volume decompression and out-of-core iso-surface extraction from irregular volume data.
Vis. Comput., 2006

Statistical admission control using delay distribution measurements.
ACM Trans. Multim. Comput. Commun. Appl., 2006

A feather-weight virtual machine for windows applications.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

MiNT-m: an autonomous mobile wireless experimentation platform.
Proceedings of the 4th International Conference on Mobile Systems, 2006

Secure Mobile Code Execution Service.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Spoof Detection for Preventing DoS Attacks against DNS Servers.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Network-Wide Load Balancing Routing With Performance Guarantees.
Proceedings of IEEE International Conference on Communications, 2006

Accurate and Automated System Call Policy-Based Intrusion Prevention.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

BIRD: Binary Interpretation using Runtime Disassembly.
Proceedings of the Fourth IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2006), 2006

Scalable network-based buffer overflow attack detection.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

Foreign Code Detection on the Windows/X86 Platform.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

How to Automatically and Accurately Sandbox Microsoft IIS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

A General Dynamic Information Flow Tracking Framework for Security Applications.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Design considerations for a multihop wireless network testbed.
IEEE Commun. Mag., 2005

An integrated approach for P2P file sharing on multi-hop wireless networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

An Integrated Pipeline of Decompression, Simplification and Rendering for Irregular Volume Data.
Proceedings of the 4th Eurographics / IEEE VGTC International Workshop on Volume Graphics, 2005

TBBT: scalable and accurate trace replay for file server evaluation.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Sequence Number-Based MAC Address Spoof Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2005

Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

MiNT: a miniaturized network testbed for mobile wireless research.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Design, Implementation, and Evaluation of a Repairable Database Management System.
Proceedings of the 21st International Conference on Data Engineering, 2005

Network-Centric Buffer Cache Organization.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

TBBT: Scalable and Accurate Trace Replay for File Server Evaluation.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

Checking Array Bound Violation Using Segmentation Hardware.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Scalable and Robust WLAN Connectivity Using Access Point Array.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Automated and Safe Vulnerability Assessment.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

Low-latency mobile IP handoff for infrastructure-mode wireless LANs.
IEEE J. Sel. Areas Commun., 2004

Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
CoRR, 2004

Programmable Ethernet Switches and Their Applications
CoRR, 2004

Load balancing routing with bandwidth-delay guarantees.
IEEE Commun. Mag., 2004

Multi-dimensional storage virtualization.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Automatic Extraction of Accurate Application-Specific Sandboxing Policy.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Probabilistic delay guarantees using delay distribution measurement.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

Viking: A Multi-Spanning-Tree Ethernet Architecture for Metropolitan Area and Cluster Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Experiences in Building A Multihoming Load Balancing System.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

OmniCon: A Mobile IP-Based Vertical Handoff System for Wireless LAN and GPRS Links.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Towards Automatic Learning of Valid Services for Honeypots.
Proceedings of the Distributed Computing and Internet Technology, 2004

Evaluation of a wireless enterprise backbone network architecture.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects, 2004

A Portable Implementation Framework for Intrusion-Resilient Database Management Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Display-only file server: a solution against information theft due to insider attack.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

DataPhone: an intelligent phone for data conferencing.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

WiVision: a wireless video system for real-time distribution and on-demand playback.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

Tracing the Root of "Rootable" Processes.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

CTCP: A Transparent Centralized TCP/IP Architecture for Network Security.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Implementation of a Modern Web Search Engine Cluster.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

Design, Implementation, and Evaluation of a Digital Lectern System.
Proceedings of the Advances in Web-Based Learning, 2003

Lectern II: a multimedia lecture capturing and editing system.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

A Path Information Caching and Aggregation Approach to Traffic Source Identification.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

VirtualWire: A Fault Injection and Analysis Tool for Network Protocols.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

A case for network-centric buffer cache organization.
Proceedings of the 11th Annual IEEE Symposium on High Performance Interconnects, 2003

Design, Implementation, and Evaluation of Repairable File Service.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Compression-Domain Editing of 3D Models.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003

Performance Guarantees for Cluster-Based Internet Services.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

2002
Spout: a transparent proxy for safe execution of Java applets.
IEEE J. Sel. Areas Commun., 2002

I/O-Conscious Data Preparation for Large-Scale Web Search Engines.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

A Decoupled Architecture for Application-Specific File Prefetching.
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002

Implementation and evaluation of a QoS-capable cluster-based IP router.
Proceedings of the 2002 ACM/IEEE conference on Supercomputing, 2002

Improving route lookup performance using network processor cache.
Proceedings of the 2002 ACM/IEEE conference on Supercomputing, 2002

Compression-Domain Parallel Rendering.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Evaluation of A Programmable Cluster-Based IP Router.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Performance Guarantee for Cluster-Based Internet Services.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Sago: A Network Resource Management System for Real-Time Content Distribution.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

An FPGA Implementation of Triangle Mesh Decompression.
Proceedings of the 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 2002

Track-Based Disk Logging.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Compression Techniques for Active Video Content.
Proceedings of the 2002 Data Compression Conference (DCC 2002), 2002

2001
I/O-Conscious Volume Rendering.
Proceedings of the 3rd Joint Eurographics - IEEE TCVG Symposium on Visualization, 2001

Charm: An I/O-Driven Execution Strategy for High-Performance Transaction Processing.
Proceedings of the General Track: 2001 USENIX Annual Technical Conference, 2001

RAD: A Compile-Time Solution to Buffer Overflow Attacks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Design Issues in System Support for Programmable Routers.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

Quality of service guarantee on 802.11 networks.
Proceedings of the Ninth Symposium on High Performance Interconnects, 2001

Stonehenge: a fault-tolerant real-time network-attached storage device.
Proceedings of the Ninth Symposium on High Performance Interconnects, 2001

2000
Zodiac: A history-based interactive video authoring system.
Multim. Syst., 2000

Cache Memory Design for Internet Processors.
IEEE Micro, 2000

On-the-Fly rendering of losslessly compressed irregular volume data.
Proceedings of the 11th IEEE Visualization Conference, 2000

Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device.
Proceedings of the Eighth NASA Goddard Space Flight Center Conference on Mass Storage Systems and Technologies in cooperation with Seventeenth IEEE Symposium on Mass Storage Systems, 2000

Application-Specific File Prefetching for Multimedia Programs.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Variorum: A Multimedia-Based Program Documentation System.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

A Digital Desk System for Video-Free Course - Lecture Capturing and Playback.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Aggregate TCP Congestion Control using Multiple Network Probing.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Spout: A Transparent Distributed Execution Engine for Java Applets.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Suez: A Cluster-based Scalable Real-Time Packet Router.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Cache Memory Design for Network Processors.
Proceedings of the Sixth International Symposium on High-Performance Computer Architecture, 2000

1999
Performance analysis of an RSVP-capable router.
IEEE Netw., 1999

The integration of real-time I/O and network support in the Stony Brook Video Server.
IEEE Netw., 1999

Integrating segmentation and paging protection for safe, efficient and transparent software extensions.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

Phoenix: a low-power fault-tolerant real-time network-attached storage device.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

Dynamic 3D Graphics Workload Characterization and the Architectural Implications.
Proceedings of the 32nd Annual IEEE/ACM International Symposium on Microarchitecture, 1999

Automatic Fault Detection and Recovery in Real Time Switched Ethernet Networks.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

High Performance IP Routing Table Lookup using CPU Caching.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

Operating Systems Support for Programmable Cluster-based Internet Routers.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Intra-Address Space Protection using Segmentation Hardware.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

RETHER: A Software-Only Real-Time Ethernet for PLC Networks.
Proceedings of the USENIX Workshop on Embedded Systems 1999, 1999

1998
Real-Time Performance Guarantees over Wired/Wireless LANs.
Proceedings of the Fourth IEEE Real-Time Technology and Applications Symposium, 1998

Performance Evaluation of the Stony Brook Video Server.
Proceedings of the 1998 International Conference on Parallel Processing Workshops, 1998

Implementation and Performance Evaluation of Locust.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

An Empirical Study of Admission Control Strategies in Video Servers.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Implementation and Evaluation of the Parallel Mesa Library.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

Design, Implementation, and Evaluation of a Parallel Index Server for Shape Image Database.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

EtheReal: A Host-Transparent Real-Time Fast Ethernet Switch.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

A Breadth-First Approach To Efficient Mesh Traversal.
Proceedings of the 1998 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, Lisbon, Portugal, August 31, 1998

Multi-Resolution Indexing for Shape Images.
Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, 1998

1997
Chitra Venkatramani, Michael Vernick: Design and Implementation of the Stony Brook Video Server.
Softw. Pract. Exp., 1997

Integrated volume compression and visualization.
Proceedings of the 8th IEEE Visualization Conference, 1997

SASE: Implementation of a Compressed Text Search Engine.
Proceedings of the 1st USENIX Symposium on Internet Technologies and Systems, 1997

Design and Evaluation of a DRAM-based Shared Memory ATM Switch.
Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1997

A Parallel Pipelined Renderer for Time-Varying Volume Data.
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997

Design and implementation of a real-time switch for segmented Ethernets.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

Implementation and Evaluation of a Multimedia File System.
Proceedings of the International Conference on Multimedia Computing and Systems, 1997

Distributed Systems Support for Networked Games.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

Characterization of Static 3D Graphics Workloads.
Proceedings of the 1997 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, 1997

Heresy: A Virtual Image-Space 3D Rasterization Architecture.
Proceedings of the 1997 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, 1997

1996
Adventures in Building the Stony Brook Video Server.
Proceedings of the Forth ACM International Conference on Multimedia '96, 1996

Burst Handling of Digital Video Traffic.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Evaluation of Checkpoint Mechanisms for Massively Parallel Machines.
Proceedings of the Digest of Papers: FTCS-26, 1996

1995
Cube-3: A Real-Time Architecture for High-Resolution Volume Visualization.
Proceedings of the 1994 Symposium on Volume Visualization, 1995

Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol.
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995

A Compiler-Directed Distributed Shared Memory System.
Proceedings of the 9th international conference on Supercomputing, 1995

Performance Optimization for Parallel Tape Arrays.
Proceedings of the 9th international conference on Supercomputing, 1995

1994
Content-Based Image Indexing.
Proceedings of the VLDB'94, 1994

Sunder: a programmable hardware prefetch architecture for numerical loops.
Proceedings of the Proceedings Supercomputing '94, 1994

Supporting Real-Time Traffic on Ethernet.
Proceedings of the 15th IEEE Real-Time Systems Symposium (RTSS '94), 1994

Efficient implementation techniques for vector memory systems.
Proceedings of the International Symposium on Parallel Architectures, 1994

Papyrus: A History-Based VLSI Design Process Management System.
Proceedings of the Tenth International Conference on Data Engineering, 1994

1993
A History Approach of Automatic Relationships Establisment for VLSI Design Database.
IEEE Trans. Knowl. Data Eng., 1993

Polar: A Storage Architecture for Fast Checkpointing.
J. Inf. Sci. Eng., 1993

A novel memory access mechanism for arbitrary-view-projection volume rendering.
Proceedings of the Proceedings Supercomputing '93, 1993

Multi-Resolution Video Representation for Parallel Disk Arrays.
Proceedings of the First ACM International Conference on Multimedia '93, 1993

A Generational Algorithm to Multiprocessor Cache Coherence.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

Trail: A Track-Based Logging Disk Architecture for Zero-Overhead Writes.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993

A Vector Memory System Based on Wafer-Scale Integrated Memory Arrays.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993

1992
Optimization of Fuzzy Logic Inference Architecture.
Computer, 1992

A Case for Wafer-Scale Interconnected Memory Arrays.
Proceedings of the Proceedings Supercomputing '92, 1992

Eliminating the Address Translation Bottleneck for Physical Address Cache.
Proceedings of the ASPLOS-V Proceedings, 1992

1991
Trait: An Attribute Management System for VLSI Design Objects.
Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, 1991

An integrated memory management scheme for dynamic alias resolution.
Proceedings of the Proceedings Supercomputing '91, 1991

Optimization of Fuzzy Logic Implementation.
Proceedings of the 21st International Symposium on Multiple-Valued Logic, 1991

Multi-Threaded Vectorization.
Proceedings of the 18th Annual International Symposium on Computer Architecture. Toronto, 1991

Liger: A Hybrid Dataflow Architeture Exploiting Data/Control Locality.
Proceedings of the International Conference on Parallel Processing, 1991

An Architectural Technique for Cache-level Garbage Collection.
Proceedings of the Functional Programming Languages and Computer Architecture, 1991

HERESY: a hybrid approach to automatic schematic generation.
Proceedings of the conference on European design automation, 1991

Papyrus: A Structured History Database for VLSI Design Flow Management.
Proceedings of the Database Systems for Advanced Applications '91, 1991

1990
A History Model for Managing the VLSI Design Process.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 1990

1989
Managing the VLSI Design Process.
Proceedings of the Computer-Aided Cooperative Product Development, MIT-JSME Workshop, 1989


  Loading...